• Title/Summary/Keyword: rule application

Search Result 759, Processing Time 0.03 seconds

User Targerting SaaS Application Mash-Up Service Framework using Complex-Context and Rule-Martix (복합 콘텍스트 및 Rule-Matrix를 활용한 사용자 맞춤형 SaaS 어플리케이션 연동 서비스 프레임워크)

  • Jung, Jong Jin;Cui, Yun;Kwon, Kyung Min;Lee, Han Ku
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.7
    • /
    • pp.1054-1064
    • /
    • 2017
  • With the development of cloud computing, internet technology and Internet of Things(IoT), most of applications are being smarter and changing from native application to SaaS (Software as a Service) application. New versatile SaaS applications are being released through various app portals (e.g. appstore, googleplay, T-Store, and so on). However, a user has a difficulty in searching, choosing an suitable application to him. It is also hard for him to know what functions of each SaaS application are useful. He wants to be recommended something inter-operated SaaS service according to his personality and his situation. Therefore, this paper presents a way of making mash-up of SaaS applications in order to provide the most convenient inter-operated SaaS service to user. This paper also presents SaaS Application Mash-up Framework (SAMF), complex context and rule matrix. The proposed SAMF is a main system that totally manage SaaS application mash-up service. Complex context and rule matrix are key components in order to recommend what SaaS applications are needed and how those SaaS applications are inter-operated. The SAMF collects complex contexts (User Description, Status Description, SaaS Service Description) in order to choose which SaaS applications are useful, analyze what functions to use, how to mash-up.

Rule & Regulation for Passenger Ship (여객선 적용 Rule & Regulation)

  • Lee, Gun-Ho;Gang, Hag-Soo;Joo, Young-Ryeol
    • Special Issue of the Society of Naval Architects of Korea
    • /
    • 2007.09a
    • /
    • pp.14-21
    • /
    • 2007
  • A passenger ship is consist of five(5) constituents; passenger, sea, crew, port and ship itself and the rule & regulation which is applicable to passenger ship are differently required as their objects of constituents. the basic concept of rule & regulation can be defined all activities to keep safety of ship and her constituents. Especially, the rule & regulation for passenger ship design and construction shall be considered not only safety of ship itself but also safety of lives, so its are required more severe than commercial vessel. Recently, the IMO have finished the rule making work on the 'passenger ship safety' since it has been discussed last 2000 and next MSC meeting will be adopted the results. In this paper, the application method of rule & regulation are treated and the new rule which were made by IMO are introduced. The rule & regulation for passenger ship is one of the most important things. therefore, it is required to careful consideration to apply on the rule application.

  • PDF

A Consideration on Fraud Exception and the Principle of Independence under the L/C transaction (신용장의 독립성의 원칙의 예외로서의 사기원칙에 관한 고찰)

  • Lee, Jong-Won
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.34
    • /
    • pp.55-74
    • /
    • 2007
  • The documentary credit has been functioning as an indispensable tool for making international commercial transactions safer throughout the world since ICC adopted the second revision of the Uniform Customs and Practices for Commercial Documentary Credits in 1962. Letter of Credit transaction should be cleared by the principle of the trust and integrity and vile partners sometimes make a fraud on the L/C by the misinterpretation of the documents. As there is no rule but no exception, exception from application of these principles is allowed. The fraud exception nile constitutes contracting out an application of basic principles, this rule should apply restrictively and in many authorities a court does not apply this rule to nominated bank, confirming bank, and bona fide holder of draft even if fraud is involved in L/C transactions. If not, we lose a lot of benefits from the credit as valuable commercial device through reservation of these principles to take a few benefits. So, We need to recognize that the fraud exception rule should be applied restrictively. Therefore, this study reviewed condition of application and exception from application of fraud exception rule in view of Cardozo's opinion, the Sztejn court, and UCC Sections-114(2).

  • PDF

Development of a Knowledge Discovery System using Hierarchical Self-Organizing Map and Fuzzy Rule Generation

  • Koo, Taehoon;Rhee, Jongtae
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.431-434
    • /
    • 2001
  • Knowledge discovery in databases(KDD) is the process for extracting valid, novel, potentially useful and understandable knowledge form real data. There are many academic and industrial activities with new technologies and application areas. Particularly, data mining is the core step in the KDD process, consisting of many algorithms to perform clustering, pattern recognition and rule induction functions. The main goal of these algorithms is prediction and description. Prediction means the assessment of unknown variables. Description is concerned with providing understandable results in a compatible format to human users. We introduce an efficient data mining algorithm considering predictive and descriptive capability. Reasonable pattern is derived from real world data by a revised neural network model and a proposed fuzzy rule extraction technique is applied to obtain understandable knowledge. The proposed neural network model is a hierarchical self-organizing system. The rule base is compatible to decision makers perception because the generated fuzzy rule set reflects the human information process. Results from real world application are analyzed to evaluate the system\`s performance.

  • PDF

Implementation of Object-oriented Active Rule System in Distributed Environment (분산환경에서 객체지향 능동 규칙 시스템 구현)

  • Go, Goeng-Uk;Yu, Sang-Bong;Kim, Gi-Chang;Cha, Sang-Gyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2875-2888
    • /
    • 1999
  • In this paper we present compiler-based active rule system to efficiently maintain spatial integrity constraints in a heterogeneous, distributed environment. Specially, the prototype active rule system presented has been developed as a component of a whole middleware system called SDBC(Spatile DataBase Connectivity). Due to this reason, our active rule system is provided for heterogeneous ODBMSs in a distributed environment and used to define spatial integrity constraints using the active rules in E-C-A(Event-Condition-Action) type. Using this active rule system, an application programmer can free himself from a heavier burden on the integrity maintenance of application objects. In the compiler-based approach, active rules applicable to events raised by a database program are directly inserted into the program in a function type by the preprocessor, and then they are compiled with the application program source codes. One advantage of this approach is that there is no run-time overhead accompanied by monitoring all the database transitions when preprocessed program is executed. This active rule system also provides facilities to manage changed rules and dynamically interpret those rules at run-tuime.

  • PDF

Reanalysis of Dissimilation in Harmonic Phonology

  • Oh, Kwan-Young
    • English Language & Literature Teaching
    • /
    • v.8 no.2
    • /
    • pp.91-104
    • /
    • 2003
  • The purpose of this paper is to show that when we consider the analytical ways of Dissimilation, it becomes clear that it is insufficient to deal with it in just linear and nonlinear ways. Thus within a new framework to be introduced in this paper, Harmonic Phonology, we will reanalyze the phenomenon. We will also consider how the Obligatory Contour Principle (hereinafter, OCP) is used as both rule trigger and rule blocker in rule application, and works as a universal constraint, that is, a filtering device of ill formed representation. As we also consider it under the new framework, we can show the application position and motivation of rules appropriately and represent the phenomenon synthetically. (Yosu National University)

  • PDF

Generalized Fuzzy Quantitative Association Rules Mining with Fuzzy Generalization Hierarchies

  • Lee, Keon-Myung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.210-214
    • /
    • 2002
  • Association rule mining is an exploratory learning task to discover some hidden dependency relationships among items in transaction data. Quantitative association rules denote association rules with both categorical and quantitative attributes. There have been several works on quantitative association rule mining such as the application of fuzzy techniques to quantitative association rule mining, the generalized association rule mining for quantitative association rules, and importance weight incorporation into association rule mining fer taking into account the users interest. This paper introduces a new method for generalized fuzzy quantitative association rule mining with importance weights. The method uses fuzzy concept hierarchies fer categorical attributes and generalization hierarchies of fuzzy linguistic terms fur quantitative attributes. It enables the users to flexibly perform the association rule mining by controlling the generalization levels for attributes and the importance weights f3r attributes.

Approximation of Frequent Itemsets with Maximum Size by One-scan for Association Rule Mining Application (연관 규칙 탐사 응용을 위한 한 번 읽기에 의한 최대 크기 빈발항목 추정기법)

  • Han, Gab-Soo
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.475-484
    • /
    • 2008
  • Nowadays, lots of data mining applications based on continuous and online real time are increasing by the rapid growth of the data processing technique. In order to do association rule mining in that application, we have to use new techniques to find the frequent itemsets. Most of the existing techniques to find the frequent itemsets should scan the total database repeatedly. But in the application based on the continuous and online real time, it is impossible to scan the total database repeatedly. We have to find the frequent itemsets with only one scan of the data interval for that kind of application. So in this paper we propose an approximation technique which finds the maximum size of the frequent itemsets and items included in the maximum size of the frequent itemsets for the processing of association rule mining.

A Multiple Pattern Matching Scheme to Improve Rule Application Performance (규칙 적용 성능을 개선하기 위한 다중 패턴매칭 기법)

  • Lee, Jae-Kook;Kim, Hyong-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.79-88
    • /
    • 2008
  • On the internet, the NIDS(Network Intrusion Detection System) has been widely deployed to protect the internal network. The NIDS builds a set of rules with analysis results on illegal packets and filters them using the rules, thus protecting the internal system. The number of rules is ever increasing as the attacks are becoming more widespread and well organized these days. As a result, the performance degradation has been found severe in the rule application fer the NIDS. In this paper, we propose a multiple pattern matching scheme to improve rule application performance. Then we compare our algorithm with Wu-Mantel algorithm which is known to do high performance multi-pattern matching.

Analysis on Validity of Discounting the Deferred Payment Undertaking under Documentary Credit Transactions - with a Special Reference to the Application of Fraud Rule - (신용장거래에서 연지급확약할인의 유효성에 관한 연구 -사가의 원칙 적용을 중심으로-)

  • Hahn, Jae-Phil
    • Journal of Arbitration Studies
    • /
    • v.21 no.2
    • /
    • pp.133-156
    • /
    • 2011
  • This paper is to analyze the legality in which the fraud rule allow the issuer of L/C or a court to disrupt the payment to the beneficiary under the deferred payment credit when the nominated bank for deferred payment undertaking made prepayment or negotiation before the maturity date and fraud is identified to be involved. Since the function of commercial L/C is to provide absolute assurance of payment to a beneficiary, the fraud rule based on fraud exception has been known as the negative factor which lead to the disruption of "principle of independence & abstraction" under the commercial L/C transactions. As a result, the fraud rule is necessary to limit the activities of fraudsters, but its scope must be carefully circumscribed so as not to deny commercial utility to an instrument that exists to serve as an assurance of payment. But the fraud itself has not been firmly established because it is inherently pliable in its concept. There are numerous contents to describe the application of fraud to the L/C transactions as a standard such as egregious fraud, intentional fraud, L/C fraud(omitted here), flexible fraud, and constructive fraud. And so the standard applicable to the commercial transaction as the fraud rule would be high or low depending upon the various standards of fraud.

  • PDF