• Title/Summary/Keyword: rule check

Search Result 132, Processing Time 0.026 seconds

Implementation of Context-Aware Android Application for Automatic Task Setting (상황 인지 기반의 자동 태스크 설정을 위한 안드로이드 어플리케이션 구현)

  • Bak, Na-Yeon;Chung, Da-hae;Chang, Byeong-Mo;Choi, Kwanghoon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.434-443
    • /
    • 2016
  • Users can set manually Android phone to do particular tasks on some situations. This type of setting is inconvenient, and also provide with unnecessary services, which don't consider users' situation. In this research, we design and implement a context-aware automatic task setting application. Users can get context-aware service by setting desired tasks based on contexts using this system. We design a language for describing context-action rules, and statically check validity of context-action rules by performing syntax and semantic check.

REQUIREMENTS FOR AUTOMATED CODE CHECKING FOR FIRE RESISTANCE AND EGRESS RULE USING BIM

  • Jiyong Jeong;Ghang Lee
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.316-322
    • /
    • 2009
  • The more repetitive, complex and objective the work, the more effective automation is. Code checking is an example of this. Checking building codes through a thick set of drawings is error-prone and time-consuming. In order to overcome this problem, several organizations have initiated efforts to automate building-code checking. Initiated study mainly focused on checking codes for invalidation, required size and crash, and then area of checkable codes have been expanding. But, it has not been considered for codes regarding anti-disaster/egress, which is also issued these days. This study is about how to automatically check codes for anti-disaster and egress based on Korea building codes. The codes can be categorized as five sections: egress way, material/capability, principals of evacuation, evacuation stairway and fire protection partition. To check automatically, there are problems, such as expression of codes for egress and limitation of extractable information from the BIM model. This paper shows what problems exist and assignments to be resolved. Also, current developing processes are presented, and suggestions are made about the direction for the work that remains.

  • PDF

Smart Contract's Hierarchical Rules Modularization and Security Mechanism (스마트 컨트랙트의 계층형 규칙 모듈화와 보안 메커니즘)

  • An, Jung Hyun;Na, Sung Hyun;Park, Young B.
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.1
    • /
    • pp.74-78
    • /
    • 2019
  • As software becomes larger and network technology develops, the management of distributed data becomes more popular. Therefore, it is becoming increasingly important to use blockchain technology that can guarantee the integrity of data in various fields by utilizing existing infrastructure. Blockchain is a distributed computing technology that ensures that servers participating in a network maintain and manage data according to specific agreement algorithms and rules to ensure integrity. As smart contracts are applied, not only passwords but also various services to be applied to the code. In order to reinforce existing research on smart contract applied to the blockchain, we proposed a dynamic conditional rule of smart contract that can formalize rules of smart contract by introducing ontology and SWRL and manage rules dynamically in various situations. In the previous research, there is a module that receives the upper rule in the blockchain network, and the rule layer is formed according to this module. However, for every transaction request, it is a lot of resources to check the top rule in a blockchain network, or to provide it to every blockchain network by a reputable organization every time the rule is updated. To solve this problem, we propose to separate the module responsible for the upper rule into an independent server. Since the module responsible for the above rules is separated into servers, the rules underlying the service may be transformed or attacked in the middleware. Therefore, the security mechanism using TLS and PKI is added as an agent in consideration of the security factor. In this way, the benefits of computing resource management and security can be achieved at the same time.

Relationships between Types of Emotional Words and Abilities of Science-Knowledge Generation in Students' Scientific Observation and Rule-Discovery (과학적 관찰과 규칙성 발견 활동에서 나타나는 감성단어 유형과 과학 지식 생성력과의 관계)

  • Kwon, Yong-Ju;Shin, Dong-Hoon;Han, Hye-Young;Park, Yun-Bok
    • Journal of The Korean Association For Science Education
    • /
    • v.24 no.6
    • /
    • pp.1106-1117
    • /
    • 2004
  • The purposes of this study were to analyze types of scientific emotion word and to investigate the relationship between the ISE(Index of Scientific Emotion) and the ability of science-knowledge generation in subjects' scientific observation and rule-discovery. The subjects were asked to perform four scientific tasks. The tasks were developed that are suitable for scientific observation and rule-discovery. In performing tasks, the subjects were asked to describe their generated science-knowledge and scientific emotion through self-report questionnaire, performing each task. The strength of their scientific emotion was also measured using adjective emoticon check lists. In subjects' scientific observing, they showed 33.3% of interest emotion which was the biggest, 15.0% of acceptance emotion, and 11.3% of love emotion, respectively. In scientific rule-discovering, types of emotion were shown as 23.8% of interest, 21.5% of disgust, and 10.8% of acceptance, respectively. In addition, ability of science-knowledge generation was significantly correlated to ISE.

A Basic Study on the Development of a BIM-based Realtime Performance Evaluation Technology for the User Life Safety in the Buildings (건물 내의 사용자 생활안전설계를 위한 BIM기반 실시간 성능검토 기술개발에 관한 기초연구)

  • Lee, Yun Gil
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.9
    • /
    • pp.1058-1067
    • /
    • 2015
  • Dweller's safety is one of the most important factors for the evaluation of building performance. The process of conventional safety design which is normally performed by the codes and designer's experiences is not enough to check the whole possibilities of unexpected accidents in the built environment. It means that the dwellers might be always exposed by the dangerous situation which should have been removed in the architectural design process. In order to solve this problem, this study intends to introduce a rule-based performance evaluation technology based on BIM(Building Information Modeling). The proposed technology focuses on the real time evaluation of dweller's safety in the ordinary life in the designed building alternatives and uses a commercial BIM tool as a design and evaluation platform.

A Design Rule checker Based on Bit-Mapping (Bit-map 방식에 의한 설계규칙 검사)

  • Eo, Gil-Su;Kim, Gyeong-Tae;Gyeong, Jong-Min
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.22 no.2
    • /
    • pp.36-43
    • /
    • 1985
  • This paper describes a DRC (Design Rule Check) algorithm and its program implement-ation which requires CPU time linearly proportional to the number of rectangular patterns n the NMOS If layout. While the CPU time for conventional DRC algorithm is proportion-al to 0(nlogn) or 0(n**1.2), (n:number of rectangles it was shown that the present also-rithm only consumes CPU time linearly proportional to 0(n).

  • PDF

Intelligent consistency checking method for the use case model

  • Lee, Eun-young;Shim, Woo-gon;Paik, In-sup
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.50-56
    • /
    • 2003
  • In the development of complex software system, it is important to use hierarchical use case model due to the complex scope of development procedure. The use case model is core factor of the OMG (Object Management Group)'s UML (Unified Modeling Language) diagrams. In this paper, we propose a novel method to check syntactic consistency automatically in use case models at the different level of abstraction. This method is a rule-based approach which utilizes actor tree, use case tree and use case description. The proposed method is simulated on ITS (Intelligent Transportation System) architecture for the verification.

  • PDF

Access Control Rules and Adaptation Rules Safety Check for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 접근 제어 규칙과 상황적응 규칙의 안전성 검사)

  • Jeong, Hye-Ryeong;Choi, Ki-Hwan;Doh, Kyung-Goo;Ahn, Joonseon;Chang, Byeong-Mo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.831-834
    • /
    • 2007
  • 유비쿼터스 환경에 대한 관심이 높아짐에 따라 모바일에 관련된 하드웨어 개발은 물론 소프트웨어에 대한 관심도 마찬가지로 높아지고 있다. 소프트웨어에 대해 높아지고 있는 관심 중에서도 자원의 공유 혹은 접근에 대한 보안은 매우 중요한 이슈로 떠오르고 있다. 본 논문에서는 유비쿼터스 소프트웨어를 개발하기 위한 더 나은 프로그래밍 환경을 제공할 수 있는 정책 기술 언어로 작성된 정책 명세에 포함되는 권한의 제어를 위한 접근 제어 규칙(Access Control Rule)과 변화되는 상황을 감지하기 위한 상황 적응 규칙(Adaptation Rule)을 검사하여 규칙 사이의 안전성을 검사하기 위한 방법을 제시한다. 또한 규칙 사이의 안전성을 말하기 위해 사용되는 타입 시스템에 대해서도 설명한다.

Design of Dynamic Time Warp Element for Speech Recognition (음성인식을 위한 Dynamic Time Warp 소자의 설계)

  • 최규훈;김종민
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.3
    • /
    • pp.543-552
    • /
    • 1994
  • Dynamic Time Warp(DTW) needs for iterative calculations and the design of PE cell suitable for the operations is very important. Accordingly, this paper aims at real time recognition design enables large dictionary hardware realization using DTW algorithm. The DTW PE cell separated into three large blocks. "MIN" is the one block for counting accumulated minimum distance. "ADD" block calculates these minimum distances, and "ABS" seeks for the absolute values to the total sum of local distances. Circuit design and verification about the three block have been accomplished, and performed layout '||'&'||' DRC(design rule check) using 1.2 m CMOS N-Well rule base.CMOS N-Well rule base.

  • PDF

Detecting Errors and Checking Consistency in the Object-Oriented Design Models (객체지향 설계방법에서 오류 검출과 일관성 점검기법 연구)

  • Jeong, Gi-Won;Jo, Yong-Seon;Gwon, Seong-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2072-2087
    • /
    • 1999
  • As software size ever increases and user's requirements become more and more sophisticated., the importance of software quality is more and more emphasized. However, we are not satisfied for the present techniques on detecting errors and checking consistency in the object-oriented design model. This paper proposes a systematic approach which produces implementable rules to detect errors and check consistency. At first, the meta-models for UML diagrams are constructed, generalized meta-rules are reduced from the meta-models, and then the meta-rules are applied to produce the implementable rules. This approach enables to pursue the completeness of the rules and the automation of rule application. An example of rule application shows the feasibility of the rule application.

  • PDF