• Title/Summary/Keyword: association schemes

Search Result 426, Processing Time 0.022 seconds

An Indexing Technique for Object-Oriented Geographical Databases (객체지향 지리정보 데이터베이스를 위한 색인기법)

  • Bu, Ki-Dong
    • Journal of the Korean association of regional geographers
    • /
    • v.3 no.2
    • /
    • pp.105-120
    • /
    • 1997
  • One of the most important issues of object-oriented geographical database system is to develop an indexing technique which enables more efficient I/O processing within aggregation hierarchy or inheritance hierarchy. Up to present, several indexing schemes have been developed for this purpose. However, they have separately focused on aggregation hierarchy or inheritance hierarchy of object-oriented data model. A recent research is proposing a nested-inherited index which combines these two hierarchies simultaneously. However, this new index has some weak points. It has high storage costs related to its use of auxiliary index. Also, it cannot clearly represent the inheritance relationship among classes within its index structure. To solve these problems, this thesis proposes a pointer-chain index. Using pointer chain directory, this index composes a hierarchy-typed chain to show the hierarchical relationship among classes within inheritance hierarchy. By doing these, it could fetch the OID list of objects to be retrieved more easily than before. In addition, the pointer chain directory structure could accurately recognize target cases and subclasses and deal with "select-all" typed query without collection of schema semantic information. Also, it could avoid the redundant data storing, which usually happens in the process of using auxiliary index. This study evaluates the performance of pointer chain indexing technique by way of simulation method to compare nested-inherited index. According to this simulation, the pointer chain index is proved to be more efficient with regard to storage cost than nested-inherited index. Especially in terms of retrieval operation, it shows efficient performance to that of nested-inherited index.

  • PDF

A study on Management and Problems in the Instruction of the Subject of Technology and Home Economics under the Implementation of the 7th National Curriculum Guideline (제 7차 교육과정에서 기술ㆍ가정교과 수업의 운영실태와 문제점에 관한 연구 - 제주도지역을 중심으로 -)

  • 고인숙;김혜연
    • Journal of Korean Home Economics Education Association
    • /
    • v.15 no.4
    • /
    • pp.67-86
    • /
    • 2003
  • The purpose of this study was to understand on management and problems in the instruction of the subject of Technology and Home Economics, and to suggest the effective implementation schemes under 7th national curriculum guideline. The major results of this study were as follows. First, the teachers perceived the first reason why the subject of Technology and Home economics is being more unpopular is because the subject becomes not to include in the subjects of the national examinations for the Universities. Second. the teachers regarded the main problem in the present instruction of the subject of Technology and Home economics under 7th curriculum as the incorporation of the subject between Technology and Home economics, namely, no relation and organization with two majors. Third, which the teachers regarded as important tasks for effective management of the subject of Technology and Home economics were to lesser the extra charges except instruction related work of the teachers, and to increase the supply of the teachers itself.

  • PDF

Approximate Lost Data Recovery Scheme for Data Centric Storage Environments in Wireless Sensor Networks (무선 센서 네트워크 데이터 중심 저장 환경을 위한 소실 데이터 근사 복구 기법)

  • Seong, Dong-Ook;Park, Jun-Ho;Hong, Seung-Wan;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.21-28
    • /
    • 2012
  • The data centric storage (DCS) scheme is one of representative methods to efficiently store and maintain data generated in wireless sensor networks. In the DCS schemes, each node has the specified data range for storing data. This feature is highly vulnerable to the faults of nodes. In this paper, we propose a new recovery scheme for the lost data caused by the faults of nodes in DCS environments. The proposed scheme improves the accuracy of query results by recovering the lost data using the spatial continuity of physical data. To show the superiority of our proposed scheme, we simulate it in the DCS environments with the faults of nodes. In the result, our proposed scheme improves the accuracy by about 28% through about 2.5% additional energy consumption over the existing scheme.

The Design Feature of Self-work Model Senior Cohousing Projects in Denmark (덴마크 자치관리모델(Self-work Model) 노인용 코하우징의 디자인 특성)

  • 최정신
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.4
    • /
    • pp.1-19
    • /
    • 2003
  • In Scandinavian countries, where the society experienced change of typical nuclear family structure and higher vocational activity rates of married women earlier than East Asian countries, cohousing scheme has been evolved as an alternative housing to reduce housework for working women, and to reduce loneliness of elderly people who stay in their own homes. They can promote active mutual relationship among residents in the community. Korean family structure has been stemmed to more like extended family, but the tendency to live independently from their married children is getting more and more common in new cohort of senior citizens who are active, healthy, economically stable and higher educated. Korea has been industrialized rather rapidly since 1970's and faces to many societal phenomena about quality of life for senior citizens. Introduction of alternative housing solution for these senior citizens is necessary in Korea. In this paper, Danish senior cohousing scheme, particularly, self-work model project is described about its design feature in accordance to site planning, common facility, and dwelling unit. Aiming to mutual support and more frequent social contacts among residents, self-work model cohousing scheme has different design concept from the service mode scheme. Information about design feature of senior cohousing was collected from the published data with drawings and from field survey to 10 exiting projects in Denmark. Of those, 5 projects were described as a case study. It, hopefully, could provide practical information for architectural design when establishment of senior cohousing schemes start in Korea in the near future.

A Distributed Lightpath Establishment Scheme Considering User Traffic Characteristics in WDM/TDM Networks (WDM/TDM 네트워크에서 사용자 요구 트래픽 특성을 고려한 분산 광 경로 설정 기법)

  • 임재복;이현태
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.2
    • /
    • pp.68-75
    • /
    • 2004
  • In this paper, n study a distributed establishment scheme to setup lightpath in WDM/TDM Network considering user traffic characteristics. We propose a GBTA(guaranteed-bandwidth time-slot allocation) algorithm which assigns time-slots according to the requred traffic so that it can utilize given network resources efficiently in RWTA(routing and wavelength time-slot assignment) schemes. We consider traffic specification on the basis of ATM traffic classes. Also, in order to increase link utilization and minimize blocking probability, we extend distributed lightpath establishment protocol based on GBTA algorithm. In order to establish lightpath in distributed WDM/IDM network, we use backward resonation protocol that resewes resource with recent information. We use DOWTns(Distributed Optical WDM/TDM ns) that is extended from NS(Network Simulator), in order to verify proposed GBTA-based optical wavelength routed network.

  • PDF

Numerical Model of One-Dimensional Advection-Diffusion Equation Applying Split-Operator Method (연산자 분리기법에 의한 1차원 이송-확산방정식의 수치모형)

  • Lee, Jeong-Gyu;Gang, Chang-Gu;Lee, Jong-In
    • Journal of Korea Water Resources Association
    • /
    • v.30 no.2
    • /
    • pp.143-154
    • /
    • 1997
  • A numerical model for solving advection-diffusion equation is presented by splitoperator method combining the Holly-Preissmann scheme with a fifth-degree interpolating polynomial for advection operator and the explicit scheme porposed by Hobson et al. for diffusion operator. To examine the developed model, the obtained numerical solutions are compared with both the analytic solution and those from the existing models for the instantaneous source (Gaussian hill) and the continuous source (advanced front) at upstream boundary with constant velocity and diffusivity condition. For the various cases having different Courant and Peclet numbers, it is shown that the present study provides stable solutions even for Courant numbers exceeding one. The result obtained by the present study also agree well with existing analytical solutions for both cases. The proposed explicit scheme somewhat releases the conventional restriction of explicit schemes for determining the time step size and provides satisfactory results for relatively large time step size.

  • PDF

Design and Implementation of eRTOS Real-time Operating Systems for Wearable Computers (웨어러블 컴퓨터를 위한 저전력 실시간 운영체제 eRTOS 설계 및 구현)

  • Cho, Moon-Haeng;Choi, Chan-Woo;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.42-54
    • /
    • 2008
  • In recent years, embedded systems have been expanding their application domains from traditional embedded systems such as military weapons, robots, satellites and digital convergence systems such as celluar phones, PMP(Portable Multimedia Player), PDAs(Personal Digital Assistants) to Next Generation Personal Computers(NGPCs) such as eating PCs, wearable computers. The NGPCs are network-based, human-centric digital information devices diverged from the traditional PCs used mainly for document writing, internet searching and database management. Wearable computers with battery capacity and memory size limitations have to use real-time operating systems with small footprints and low power management techniques to provide user's QoS in spite of hardware constraints. In this paper, we have designed and implemented a low-power RTOS (called eRTOS) for wearable computers. The implemented eRTOS has 18KB footprints and the dynamic power management and the device power management schemes are adapted in it. Experimental results with wearable computer applications show that the low power techniques could save energy up to 47 %.

Recommending Personalized POI Considering Time and User Activity in Location Based Social Networks (위치기반 소셜 네트워크에서 시간과 사용자 활동을 고려한 개인화된 POI 추천)

  • Lee, Kyunam;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.64-75
    • /
    • 2018
  • With the development of location-aware technologies and the activation of smart phones, location based social networks(LBSN) have been activated to allow people to easily share their location. In particular, studies on recommending the location of user interests by using the user check-in function in LBSN have been actively conducted. In this paper, we propose a location recommendation scheme considering time and user activities in LBSN. The proposed scheme considers user preference changes over time, local experts, and user interest in rare places. In other words, it uses the check-in history over time and distinguishes the user activity area to identify local experts. It also considers a rare place to give a weight to the user preferred place. It is shown through various performance evaluations that the proposed scheme outperforms the existing schemes.

Incremental Processing Scheme for Graph Streams Considering Data Reuse (데이터 재사용을 고려한 그래프 스트림의 점진적 처리 기법)

  • Cho, Jungkweon;Han, Jinsu;Kim, Minsoo;Choi, Dojin;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.465-475
    • /
    • 2018
  • Recently, as the use of social media and IoT has increased, large graph streams has been generating and studies on real-time processing for them have been actively carrying out. In this paper we propose a incremental graph stream processing scheme that reuses previous result data when the graph changes continuously. We also propose a cost model to selectively perform incremental processing and static processing. The proposed cost model computes the predicted value of the detection cost and the processing cost of the recalculation area based on the actually processed history and performs the incremental processing when the incremental processing is more profit than the static processing. The proposed incremental processing increases the efficiency by processing only the part that changes when the graph update occurs. Also, by collecting only the previous result data of the changed part and performing the incremental processing, the disk I/O costs are reduced. It is shown through various performance evaluations that the proposed scheme outperforms the existing schemes.

Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System) (W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.93-100
    • /
    • 2007
  • Internet had spread in all fields with the fast speed during the last 10 years. Lately, wireless network is also spreading rapidly. Also, number of times that succeed attack attempt and invasion for wireless network is increasing rapidly TMS system was developed to overcome these threat on wireless network. Existing TMS system supplies active confrontation mechanism on these threats. However, existent TMS has limitation that new form of attack do not filtered efficiently. Therefor this paper proposes a new method that it automatically compute the threat from the imput packets with vector space model and detect anomaly detection of wireless network. Proposed mechanism in this research analyzes similarity degree between packets, and detect something wrong symptom of wireless network and then classify these threats automatically.