• Title/Summary/Keyword: document structure

Search Result 593, Processing Time 0.032 seconds

Efficient Linear Path Query Processing using Information Retrieval Techniques for Large-Scale Heterogeneous XML Documents (정보 검색 기술을 이용한 대규모 이질적인 XML 문서에 대한 효율적인 선형 경로 질의 처리)

  • 박영호;한욱신;황규영
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.540-552
    • /
    • 2004
  • We propose XIR-Linear, a novel method for processing partial match queries on large-scale heterogeneous XML documents using information retrieval (IR) techniques. XPath queries are written in path expressions on a tree structure representing an XML document. An XPath query in its major form is a partial match query. The objective of XIR-Linear is to efficiently support this type of queries for large-scale documents of heterogeneous schemas. XIR-Linear has its basis on the schema-level methods using relational tables and drastically improves their efficiency and scalability using an inverted index technique. The method indexes the labels in label paths as key words in texts, and allows for finding the label paths that match the queries far more efficiently than string match used in conventional methods. We demonstrate the efficiency and scalability of XIR-Linear by comparing it with XRel and XParent using XML documents crawled from the Internet. The results show that XIR-Linear is more efficient than both XRel and XParent by several orders of magnitude for linear path expressions as the number of XML documents increases.

Implementation of a Function-Based Design Document Navigation Tool for UML Analysis (UML 분석을 위한 함수 기반 설계내역 항해기의 구현)

  • Kim, Won-Jung;Bae, Myung-Nam;Yang, Jae-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.8
    • /
    • pp.543-554
    • /
    • 2002
  • System developers create a lot of design documents by various case tools. It is necessary to have the tools for facilitating the analysis of the documents. These tools can be used to understand and verify the whole process of a system, by defining relationships among the documents and providing free navigation methods. In this paper, we develop a navigation tool that enables the developers to systematically analyze the system by capturing duplication, instance, and transition relationships between the documents. Different from the navigation facilities of the other UML design tools, this tool makes it possible to navigate design elements in design documents such as sequence diagrams, state diagrams and class diagrams. In other words, it can be used to systematically capture and verify both the static structure and the dynamic behavior of the system by keeping track of such elements. To provide such a facility, 1) we define three relationships: duplication, instance, and transition, 2) assign relation to the related design elements according to the predefined way. and then 3) present a set of functions for navigating related design elements.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

Keyword Network Visualization for Text Summarization and Comparative Analysis (문서 요약 및 비교분석을 위한 주제어 네트워크 가시화)

  • Kim, Kyeong-rim;Lee, Da-yeong;Cho, Hwan-Gue
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.139-147
    • /
    • 2017
  • Most of the information prevailing in the Internet space consists of textual information. So one of the main topics regarding the huge document analyses that are required in the "big data" era is the development of an automated understanding system for textual data; accordingly, the automation of the keyword extraction for text summarization and abstraction is a typical research problem. But the simple listing of a few keywords is insufficient to reveal the complex semantic structures of the general texts. In this paper, a text-visualization method that constructs a graph by computing the related degrees from the selected keywords of the target text is developed; therefore, two construction models that provide the edge relation are proposed for the computing of the relation degree among keywords, as follows: influence-interval model and word- distance model. The finally visualized graph from the keyword-derived edge relation is more flexible and useful for the display of the meaning structure of the target text; furthermore, this abstract graph enables a fast and easy understanding of the target text. The authors' experiment showed that the proposed abstract-graph model is superior to the keyword list for the attainment of a semantic and comparitive understanding of text.

XSLT Stylesheet Design for Building Web Presentation Layer (웹 프리젠테이션 레이어 생성을 위한 XSLT 스타일쉬트 설계)

  • 채정화;유철중;장옥배
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.3
    • /
    • pp.255-266
    • /
    • 2004
  • In the Web-based information systems, separating the business process logic from the data and presentation logic brings about a wide range of advantages. However, this separation is not easily achieved; even the data logic may be not separated from the presentation layer. So, it requires to define an model for business processes, and then to map the model into the user's dynamic interface using the logic separating strategy. This paper presents a stylesheet method to recognize the process by extending XSLT (Extensible Stylesheet Language Transformations), in order to achieve the logic separation. To do this, it provides an specification of the business process, and a scheme that extracts business model factors and their interactions using a Petri-net notation to show the business model into the process point of view. This is an attempt to separate users' interaction from the business process, that is, dynamic components of interaction Web document from the process structure of Web applications. Our architecture consist mainly of an XSLT controller that is extended by a process control component. The XSLT controller is responsible for receiving the user requests and searching the relevant templet rule related to different user requests one by one. Separation of concerns facilities the development of service-oriented Web sites by making if modular. As a result, the development of service-oriented Web sites would be very easy, and can be changed without affecting the other modules, by virtue of the modularization concept. So, it is easy to develop and maintain the Web applications in independent manner.

Analysis of the Scientific Research Process of a Participant in Undergraduate Research Program by Cultural Historical Activity Theory (문화역사적 활동이론을 통한 학부생 연구지원 프로그램 참여자의 과학연구 수행과정의 분석)

  • Lee, Jiwon
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.3
    • /
    • pp.343-354
    • /
    • 2018
  • In this study, the first experience of the whole research process of a novice scientist (student A) who participated in the Undergraduate Research Program (URP) was analyzed. The data were collected through observation, interviews, and document analysis with the cultural historical activity theory being used as a theoretical lens. At the beginning of novice's research, the mentor guided him in setting a research goal and provided mediating artifacts. Student A formed a research team based on the vertical relationship without a shared mental model. Two major contradictions occurred and they were the sources of changes of student A's activity system. The first contradiction was between the mentor's educational philosophy and the mentee's educational needs, which was resolved in a way that student A asked and used the mentor's network to obtain his needs about task-specific details. The second contradiction arose because the team members wanted horizontal relationship while student A wanted to stick to the vertical relationship. After student A accepted the opinions of the team members, they cooperatively changed the division of labor in the activity system. Student A decided to become a scientist and not a physics teacher, even if his major is physics education after finishing his URP research process. His URP experience also created and expanded his network in the academic field, and his negative attitude toward collaboration changed positively. Through the analysis of the structure and changes in the activity system of URP research, implications for instructional method and support system of the apprenticeship can be obtained.

The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading (블록체인 기반 가상화폐 거래의 보안 위험 및 대응방안)

  • Chung, Young-Seek;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.100-106
    • /
    • 2018
  • Since the concept of virtual currency called Bitcoin was announced in 2008, the blockchain technology, which is the basis of Bitcoin, is attracting attention as an important platform technology in the era of the 4th industrial revolution that can change our society in the future. Although Existing electronic financial transactions store and manage all transaction history at a reliable central organization such as government and bank, blockchain-based electronic financial transactions are composed of a distributed structure in which all participants participating in the transaction store and manage the transaction history, it is possible to secure transaction transparency while reducing system construction and operation costs. Besides the virtual currency that started with bit coins, the technology of these blockchains has been extended in various fields such as smart contracts and document management. The key technology area of this blockchain is security based on proven cryptographic technology to make it difficult to forge and hack, but there are security risks such as security vulnerabilities in the virtual currency trading service, We will discuss security risks in using virtual currency and discuss countermeasures. Especially security accidents of virtual currency exchanges are occurring frequently recently, the damage of users who trade the virtual currency is also increasing, we propose security threats and security countermeasures against virtual currency exchanges.

Design of Web 2.0 based Bibliographic Information Network for Life Science (Web 2.0 기반의 생명과학 문헌정보 네트워크 설계)

  • Ahn, Bu-Young;Kim, Dae-Jung;Han, Jeong-Min;Park, Yang-Sook
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.1051-1056
    • /
    • 2007
  • In current web-based systems, it is generally recognized that one way flow of information from providers to users can cause the static problem of document structure. Therefore, information update frequency and interaction between providers and users are quiet slow. Monopolized information can obstruct the free user's access and heterogeneous format and different protocols also make users difficult to retrieve and to collect information. To resolve these problems, in this study, we introduce the Web 2.0 to move toward the user's participation and share based on the social network and the OAI protocol to improve the free access and the interoperability on bibliographic information for Life Science and then design the bibliographic information network for life science. This network has four main functions such as: 1) Open Repository function that can make up user community for sharing and data exchange. Data such as article, seminar material, research note and research report are considered in design. 2) Open Collection function that can collect and store the metadata on distributed bibliographic information networks, 3) Open Access function that can manage the metadata in the open access environment, and 4) Administration function that can monitor the user activity and statistics and can inspect the registered data.

  • PDF

A Design and Implementation of Reliability Analyzer for Embedded Software using Markov Chain Model and Unit Testing (내장형 소프트웨어 마르코프 체인 모델과 단위 테스트를 이용한 내장형 소프트웨어 신뢰도 분석 도구의 설계와 구현)

  • Kwak, Dong-Gyu;Yoo, Chae-Woo;Choi, Jae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.1-10
    • /
    • 2011
  • As requirements of embedded system get complicated, the tool for analyzing the reliability of embedded software is being needed. A probabilistic modeling is used as the way of analyzing the reliability of a software and to apply it to embedded software controlling multiple devices. So, it is necessary to specialize that to embedded software. Also, existing reliability analyzers should measure the transition probability of each condition in different ways and doesn't consider reusing the model once used. In this paper, we suggest a reliability analyzer for embedded software using embedded software Markov chin model and a unit testing tool. Embedded software Markov chain model is model specializing Markov chain model which is used for analyzing reliability to an embedded software. And a unit testing tool has host-target structure which is appropriate to development environment of embedded software. This tool can analyze the reliability more easily than existing tool by automatically measuring the transition probability between units for analyzing reliability from the result of unit testing. It can also directly apply the test result updated by unit testing tool by representing software model as a XML oriented document and has the advantage that many developers can access easily using the web oriented interface and SVN store. In this paper, we show reliability analyzing of a example by so doing show usefulness of reliability analyzer.

Software development project management using Agile methodology (Agile 방법론을 이용한 소프트웨어 개발 프로젝트관리)

  • kim, tai-dal
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.155-162
    • /
    • 2016
  • In recent years, hoping the interaction of individuals and rather than software development process and tools, and customers want software that works first, rather than a comprehensive document, in cooperation with the customer, rather than the developer negotiate a contract, to each other stick to the plan I think even more so than the value that corresponds to the change. In view of this, software development is given the autonomy and motivation to project team rather than process-oriented and have a passion and vision and human relations oriented management approach is required. In recent years, increasing the productivity benefits of agile development processes, improved quality, efficiency and customer satisfaction as is demonstrated in the methodology selected to promote the project, attention was given to the experts. Contemporary demands with regard to the methodology chosen to meet your needs, in this paper in the organization, and to solve the problems of product-based Cross functional team proposed methodology Feature Team model, this model is an organizational Cross functional team and the team is not the outcome (product) basis, were examined for the model that points to progress the development across multiple product as a functional unit, value-plan through the driven agile technique-based model and proposed a difference. And the domain analysis, required extraction by conventional JAD (joint application development) meeting the targets for the object-oriented modeling, in modeling and organize, review, aware in advance and the UML Structure and Behavior Diagrams and proposed to proceed with the project.