• Title/Summary/Keyword: Checking Rule

Search Result 72, Processing Time 0.025 seconds

Schema management skills for semantic web construction (시멘틱웹 구축을 위한 스키마 관리 기법 연구)

  • Kim, Byung-Gon;Oh, Sung-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.9-15
    • /
    • 2007
  • As the information of the internet increased, importance of sematic web for collecting and integration of these informations to support decision making of some group or ordinary people are growing as well. Basis structure that composes semantic web is ontology and languages like XML, RDF/RDF schema and OWL are basis means that compose ontology schema. When composes and manages Ontology schema, one of the important consideration point is that schema is changed as times go by. Therefore, change of domain of schema, change of data concept or change of relation between resource etc. are reflected in the ontology system. In this study, we suggest semantic web schema management skill in terms of version management. We categorized version change forms and created version graph for checking of version transition. With created version graph, we define transitivity rule and propose schema tag for detail application which enables extending of applicable version schema.

  • PDF

Term Distribution Index and Word2Vec Methods for Systematic Exploring and Understanding of the Rule on Occupational Safety and Health Standards (산업안전보건기준에 관한 규칙의 체계적 탐색과 이해를 위한 단어분포 지표와 Word2Vec 분석 방법)

  • Jae Ho Jeong;Seong Rok Chang;Yongyoon Suh
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.3
    • /
    • pp.69-76
    • /
    • 2023
  • The purpose of the rules on the Occupational Safety and Health Standards (hereafter safety and health rules) is to regulate the safety and health measures stipulated in the Occupational Safety and Health Act and the specific instructions necessary for their implementation. However, the safety and health rules are extensive and complexly connected, making navigation difficult for users. In order for users to readily access safety and health rules, this study analyzed the frequency, distribution, and significance of terms included in the overall rules. First, the term distribution index was created based on the frequency and distribution of words extracted through text mining. The term distribution index derives from whether a word appears only in a specific chapter or across all rules. This allows users to effectively explore terms to be followed in a specific working environment and terms to be complied with in the overall working environment. Next, the related words of the previously derived terms were visualized through t-SNE and the Word2Vec algorithm. This can help prioritize the things that need to be managed first, focusing on key terms without checking the overall rules. Moreover, this study can help users explore safety and health rules by allowing them to understand the distribution of words and visualize related terms.

A Generalized Hyperparamodulation Strategy Based on a Forward Reasoning for the Equality Relation ; RHU- resolution*

  • Lee, Jin-Hyeong;Im, Yeong-Hwan;O, Gil-Rok
    • ETRI Journal
    • /
    • v.9 no.1
    • /
    • pp.84-96
    • /
    • 1987
  • The equality relation is very important in mechanical theorem proving procedures. A proposed inference rule called RHU-resolution is intended to extend the hyperparamodulation[23, 9] by introducing a bidirectional proof search that simultaneously employs a forward reasoning and a backward reasoning, and generalize it by incorporating beneflts of extended hyper steps with a preprocessing process, that includes a subsumption check in an equality graph and a high level planning. The forward reasoning in RHU-resolution may replace the role of the function substitution link.[9] That is, RHU-deduction without the function substitution link gets a proof. In order to control explosive generation of positive equalities by the forward reasoning, we haue put some restrictions on input clauses and k-pd links, and also have included a control strategy for a positive-positive linkage, like the set-of-support concept, A linking path between two end terms can be found by simple checking of linked unifiability using the concept of a linked unification. We tried to prevent redundant resolvents from generating by preprocessing using a subsumption check in the subsumption based eauality graph(SPD-Graph)so that the search space for possible RHU-resolution may be reduced.

  • PDF

Analysis of the dynamic characteristics for the change of design parameters of an underwater vehicle using sensitivity analysis

  • Jeon, Myungjun;Yoon, Hyeon Kyu;Hwang, Junho;Cho, Hyeon Jin
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.10 no.4
    • /
    • pp.508-519
    • /
    • 2018
  • In order to design the hull form of an underwater vehicle in the conceptual design phase, the dynamic characteristics depending on the hull form parameters should be identified. Course-keeping stability, turning ability, yaw-checking ability, and mission competence are set to be the indices of the dynamic characteristics, and the geometric parameters for the bare hull and rudder are set to be the hull form design parameters. The total sensitivity of the dynamic characteristics with respect to the hull form parameters is calculated by the chain rule of the partial sensitivity of the dynamic characteristics with respect to the hydrodynamic coefficients, and the partial sensitivity of the hydrodynamic coefficients with respect to the hull form parameters. Based on the sensitivity analysis, important hull form parameters are selected, and those optimal values to satisfy the required intercept time of mission competence of a specific underwater vehicle and turning rate are estimated.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

An Ontological and Rule-based Reasoning for Music Recommendation using Musical Moods (음악 무드를 이용한 온톨로지 기반 음악 추천)

  • Song, Se-Heon;Rho, Seung-Min;Hwang, Een-Jun;Kim, Min-Koo
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.108-118
    • /
    • 2010
  • In this paper, we propose Context-based Music Recommendation (COMUS) ontology for modeling user's musical preferences and context and for supporting reasoning about the user's desired emotion and preferences. The COMUS provides an upper Music Ontology that captures concepts about the general properties of music such as title, artists and genre and also provides extensibility for adding domain-specific ontologies, such as Mood and Situation, in a hierarchical manner. The COMUS is music dedicated ontology in OWL constructed by incorporating domain specific classes for music recommendation into the Music Ontology. Using this context ontology, we believe that the use of logical reasoning by checking the consistency of context information, and reasoning over the high-level, implicit context from the low-level, explicit information. As a novelty, our ontology can express detailed and complicated relations among the music, moods and situations, enabling users to find appropriate music for the application. We present some of the experiments we performed as a case-study for music recommendation.

Context-sensitive Spelling Error Correction using Eojeol N-gram (어절 N-gram을 이용한 문맥의존 철자오류 교정)

  • Kim, Minho;Kwon, Hyuk-Chul;Choi, Sungki
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1081-1089
    • /
    • 2014
  • Context-sensitive spelling-error correction methods are largely classified into rule-based methods and statistical data-based methods, the latter of which is often preferred in research. Statistical error correction methods consider context-sensitive spelling error problems as word-sense disambiguation problems. The method divides a vocabulary pair, for correction, which consists of a correction target vocabulary and a replacement candidate vocabulary, according to the context. The present paper proposes a method that integrates a word-phrase n-gram model into a conventional model in order to improve the performance of the probability model by using a correction vocabulary pair, which was a result of a previous study performed by this research team. The integrated model suggested in this paper includes a method used to interpolate the probability of a sentence calculated through each model and a method used to apply the models, when both methods are sequentially applied. Both aforementioned types of integrated models exhibit relatively high accuracy and reproducibility when compared to conventional models or to a model that uses only an n-gram.

The Opinion and Attitude of Hospital Managers toward Hospital Evaluation Program (1주기 의료기관 평가에 대한 평가대상 기관 실무자들의 인식과 태도 조사)

  • Lee, Sun Hee;Kim, Hyun Mi;Ha, Gwi Yeom;Jo, Heui Sug;Chae, Yoo Mi
    • Quality Improvement in Health Care
    • /
    • v.14 no.1
    • /
    • pp.77-91
    • /
    • 2008
  • Objectives : The purpose of this study was to survey the opinion and attitude of hospital managers toward the hospital evaluation program. Method : Managers of 157 hospitals which had participated in the hospital evaluation program were requested to respond to structured self-administered questionnaire. The questionnaire was composed with five categories: the preparation for the hospital evaluation program, the expertise levels of surveyors, the process and contents of the hospital evaluation program, the applying strategies for the result of the hospital evaluation to manager's work at their hospitals, and the main points to improve the hospital evaluation program. Result : 135 out of the 157 subjects completed the questionnaire, and the overall response rate was 86%. The hospital managers answered that they didn't have enough information such as the scoring rule of the standards, the process of the evaluation, and how to ask and get an answer to prepare the hospital evaluation. Furthermore, they estimated that the surveyors weren't specialized enough and didn't give a chance of checking over the result of the evaluation. In addition, they experienced that the result and feedback of the evaluation weren't enough information to be used as a guideline to improve in hospital management. Managers of the hospitals responded that the standards and method of survey in the hospital evaluation system should be reformed. Conclusion : Most of the responded managers seemed to have negative opinion on the hospital evaluation system, even though they were pushed up for interest in quality. Further studies and extensive evaluation of the hospital evaluation program are needed to bring up various information such as receptiveness and effectiveness.

  • PDF

An Approach to the BIM-enabled Assessment of Building Circulation using Quantitative Data and its Weight (동선관련 정성적 요구사항 평가를 위한 가중치를 적용한 BIM기반 정량데이터 활용방안에 관한 연구)

  • Shin, Jaeyoung;Lee, Jin-Kook
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.335-343
    • /
    • 2015
  • This paper describes a quantitative approach to the BIM-enabled assessment of building circulation by using quantitative data and applying its weight. Assessment of building circulation plays an important role before construction stage because of related requirements regulated by design guide, building codes, etc. and design decision making as well. In this paper, Qualitative issue is mainly dealt with that are usually excluded from rule checking objects due to their implicit definition such as 'comfortable circulation'. A weighting framework is suggested using weighted data of circulation properties such as 1) metric distance, 2) number of passing spaces, 3) number of turning spaces, 4) window area of passing space, etc.

A Time and Space Efficient Algorithm for VLSI Geometrical Rule Checking (시간 및 공간복잡도가 개선된 VLSI 설계규칙 검증 알고리듬)

  • Jeong, Ja-Choon;Shin, Sung-Yong;Lee, Hyun-Chan;Lee, Chul-Dong;Yu, Young-Uk
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.5
    • /
    • pp.137-144
    • /
    • 1989
  • A new algorithm is presented which efficiently reports minimum width/space violation in a geometric mask pattern. The proposed algorithm solves a sequence of range search problems by employing a plane sweep method. The algorithm runs in O(n log n) time, where n is the number of edges in a mask pattern. Since a lower bound in time conplexity for reporting all minimum width/space violations is ${\Omega}$ (n log n), this algorithm is theoretically optimal within a constant multiplicaive factor. It requires O($n^{0.5}$) space which is very efficient in practice. Moreover, this algorithm, we believe, is easy to implement and practically fast (116.7 seconds for a rectilinear region with 250000 vertices ar VAX 8650.)

  • PDF