• Title/Summary/Keyword: Entity-based

Search Result 755, Processing Time 0.027 seconds

A Persistence Framework Based SQL (SQL 기반 퍼시스턴스 프레임워크)

  • Cho, Dongil-Il;Rhew, Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.549-556
    • /
    • 2008
  • Web-based Enterprise Intranet System is developed Object-oriented programming language and data management is constructed using RDBMS. Between Object-oriented programming language and RDBMS bring about "Object-Relational Impedance Mismatch" due to heterogeneous paradigm. To solve this kinds of problems commonly use the ORM Framework that it is converting data between incompatible type systems in databases and object-oriented programming languages, uses complex mapping metadata. It causes difficult to develop and maintain because of inflexible in changes. This paper proposed persistence framework that solve the existing complexity of ORM framework and has more flexible in evolution of database table. This persistence framework is unnecessary meta information that connecting with entity of database table and the objects, it offers users convenience of maintenance and it allows far more flexible and affordable systems to be built because of automatically code generation. The result of testing based on the proposed persistence framework with Hibernate, iBATIS, It is similar response time with iBATIS and it has more about three times faster than Hibernate. But iBATIS has problems of mass data processing.

IFC-based Representation Method of Part Information in Superstructure Module of Modular Steel Bridge with Assembly System (모듈러 강교량 상부모듈의 조립체계 정의를 통한 IFC 기반의 부품정보 표현방법)

  • An, Hyun Jung;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.25 no.4
    • /
    • pp.307-314
    • /
    • 2012
  • IFC-based representation method of part library for superstructure module of modular steel bridge is proposed. The library is capable of efficiently offering and exchanging part information in process of manufacture, assembly, design, and construction of modular steel bridge. Entities, representing physical part information in IFC model, are matched semantically with parts of the superstructure module for representation of part information with IFC model. Either types of matched entities are applied in order to verify the role of each part, or new types are defined as a user-defined types. In addition, assembly system has been classified and defined into 4 levels of LoD(Level of Detail) to provide appropriate part information efficiently from the part library in each step of the process. Then, new property is defined for representing the LoD information with IFC Model. Finally, IFC-based test library of modular steel bridge is generated by applying the matched entities and entity types to the actual the superstructure module of modular steel bridge.

Web-based Distributed Experimental Frame for Discrete Event Simulation System (이산사건 시뮬레이션 시스템을 위한 웹 기반 분산 실험 틀)

  • Jung, Inho;Choi, Jaewoong;Choi, Changbeom
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.9-17
    • /
    • 2017
  • The problem of social phenomenon is getting more complicated than past decades, and the simulation engineers need more computation power to solve the problem. Therefore, the needs of the computational resources of the modeling and simulation environment are increasing. In the perspective of the simulation, it is necessary to allocate computational resources flexibly so that the simulation can be performed per the available budget range. As an alternative to the simulation environment to accommodate these requirements, cloud service has emerged as an environment in which computing resources can be used flexibly. This paper proposes a web-based simulation framework which consists of a front-end that reconstructs the simulation model using the web, and a back-end that executes the discrete event simulation. This paper also carried out a case study which shows web-based simulation framework has better overall runtime than standalone simulation framework.

A Study on Body Painting according to Physical Types (신체적 유형에 따른 바디페인팅 연구)

  • Park, Jeongshin
    • Journal of Fashion Business
    • /
    • v.19 no.5
    • /
    • pp.175-187
    • /
    • 2015
  • Body painting according to physical types is a method to express the body as it exists in nature or as an active element of nature. There is a need to research physical formation that applies the trend of contemporary naturalism to the types of nature art by emphasizing the artistic value of body painting with natural environmental overtones. Importantly, body painting according to physical types attempts an intact reproduction of natural objects and the reflection of the beauty of natural objects in body painting. Thus, the purpose of this study was to analyze body painting according to physical types based on the types of nature art. The methodology of the study included theoretical and empirical review. Theoretical review examined the characteristics of physical formation in nature art and relevant nature art works and body painting of physical types through previous research and literature. The empirical review applied analyses to works extracted from web sites of body painting. The study included physical type cases extracted from body painting works from 2005 to 2015 in foreign web sites(www.ilovebodyart.com and www.angel cakebodyart.com). Body painting works were based on the characteristics of physical types. As a result, the body painting of physical types based on nature art is as follows. First, organic continuity with nature art through the artists'thoughts and beliefs. Second, the specificity of place that respects the natural phenomenon itself. Third, the creative diversity of formative shapes for the body. Fourth, the social implications of body painting with human empathy. Fifth, immediacy to embody the artistic will of the artist. Finally, the application of physical types according to affinity with nature, as well as an independent artistic entity.

Development of a CAD Based Tool for the Analysis of Landscape Visibility and Sensitivity (수치지형 해석에 의한 가시성 및 시인성의 경관정보화 연구 - CAD 기반의 분석 도구 개발을 중심으로 -)

  • 조동범
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.26 no.3
    • /
    • pp.78-78
    • /
    • 1998
  • The purpose of this research is to develop a CAD-based program for data analysis of digital elevation model(DEM) on the aspect of landscape assessment. When handling DEM data as a visual simulation of topographic landscape, it is basic interest to analyze visible area and visualize visual sensitivity distributions. In reference with landscape assessment, more intuitive and interactive visualizing tools are needed, specially in area of visual approach. For adaptability to landscape assessment, algorithmic approaches to visibility analysis and concepts for visual sensitivity calculation in this study were based on processing techniques of entity data control functions used in AutoCAD drawing database. Also, for the purpose of quantitative analysis, grid-type 3DFACE entities were adopted as mesh unit of DEM structure. Developed programs are composed of main part named VSI written in AutoLISP and two of interface modules written in dialog control language(DCL0 for user-oriented interactive usage. Definitions of camera points(view points) and target points(or observed area) are available alternatively in combined methods of representing scenic landscape, scenery, and sequential landscape. In the case of scene landscape(single camera to fixed target point), only visibility analysis in available. And total visibility, frequency of cumulative visibility, and visual sensitivity analysis are available in other cases. Visual sensitivity was thought as view angle(3 dimensional observed visual area) and the strengths were classified in user defined level referring to statistical characteristics of distribution. Visibility analysis routine of the VSI was proved to be more effective in the accuracy and time comparing with similar modules of existing AutoCAD third utility.

LVLN : A Landmark-Based Deep Neural Network Model for Vision-and-Language Navigation (LVLN: 시각-언어 이동을 위한 랜드마크 기반의 심층 신경망 모델)

  • Hwang, Jisu;Kim, Incheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.9
    • /
    • pp.379-390
    • /
    • 2019
  • In this paper, we propose a novel deep neural network model for Vision-and-Language Navigation (VLN) named LVLN (Landmark-based VLN). In addition to both visual features extracted from input images and linguistic features extracted from the natural language instructions, this model makes use of information about places and landmark objects detected from images. The model also applies a context-based attention mechanism in order to associate each entity mentioned in the instruction, the corresponding region of interest (ROI) in the image, and the corresponding place and landmark object detected from the image with each other. Moreover, in order to improve the success rate of arriving the target goal, the model adopts a progress monitor module for checking substantial approach to the target goal. Conducting experiments with the Matterport3D simulator and the Room-to-Room (R2R) benchmark dataset, we demonstrate high performance of the proposed model.

Collaborative Workspaces for IoT Smart Agents Based on the Ethereum Blockchain (IoT 환경의 스마트 에이전트를 위한 이더리움 블록체인 기반의 협업 워크스페이스)

  • Jin, Jae-Hwan;Eom, Hyun-Min;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.8
    • /
    • pp.845-854
    • /
    • 2019
  • In IoT environment, an intelligent agent is an autonomous entity with computing power that interacts with various things for specific purposes without human intervention. Recently, as the development of Internet technology has increased the size of resources and services that intelligent agents can utilize, an environment where intelligent agents can collaborate with each other is needed. To effectively support these changes, a method is needed to provide workspaces where intelligent agents can form various groups and collaborate on them. In this paper, we present TSpace which is an Ethereum-based group workspace for effective collaboration among intelligent agents. In TSpace, intelligent agents in IoT environment can use group service based on the Ethereum blockchain through the developed CoAP/RESTful web service. TSpace also introduces a new mechanism for managing Ethereum wallets of agents accessing group services and for creating Ethereum transactions using them.

A Study on Cybersecurity Regulation for Financial Sector: Policy Suggestion based on New York's Cybersecurity Regulation (23 NYCRR 500) (국내 금융 사이버보안 규제의 국제경쟁력 제고를 위한 연구: 미(美) 뉴욕 주 금융 사이버보안 규정 (23 NYCRR 500)을 중심으로)

  • Kim, Docheol;Kim, Inseok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.87-107
    • /
    • 2018
  • In March 2017, the State of New York became the first state to implement regulation specific to cybersecurity for financial institutions. Unlike previous regulations regarding information security, it has set a minimum requirements to establish cybersecurity program based on risk assessment results, protect Nonpublic Information, designate of CISO, and report to regulatory entity. This paper presents a need for a new cybersecurity policy in Korea by examining newly adopted cybersecurity regulation in the United States. Finally, the paper identify policy suggestions based on the United States's approach as they have successfully implemented the program.

A Study on the Housing as Medium between the Self-establishment and the Selection - Focused on Narrative Structure of 'Online-housewarming' - (선택행위를 통한 자아확립의 매개로서 현대주거에 관한 연구 - '온라인집들이'의 서사구조 분석을 중심으로 -)

  • Hur, Eun-Seok;Zo, Hangman
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.5
    • /
    • pp.41-50
    • /
    • 2019
  • In this study, we analyzed the process of the housing reflecting the self, based on the qualitative data that people describe their thoughts about their housing in social media 'online-housewarming'. Especially, based on the precedent study that modern self is established on continuous selection behavior, we focused on the selection behavior of the self and the role of the housing that affected it through the narrative. Each narrative component corresponds to the self-establishment process of modern people, identified through precedent study. We can confirm the existing internal criteria changing into new internal criteria through accumulation, interaction and nonverbal communication of selection by housing. Housing has been involved in the selection behavior of self throughout the narrative. From this, it can be seen that the thought of the self and housing are identified in three ways. In 'Online-Housewarming', (1) Housing equates with the self, in the sense that housing is a physical entity in which one's own choices are accumulated (2) People perceive the change of choice caused by the realistic constraints of housing as their interaction with housing. (3) People relate the opinions of others about housing with the opinions about their own self. In contemporary society, house reforming process is a process of mediating the self and the external world based on the selection behavior and affects the establishment of self.

ID-based Proxy Signature Scheme from the Bilinear Map (Bilinear 함수를 이용한 ID 기반 대리서명 기법)

  • 이정연;천정희;김태성;진승헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.3-11
    • /
    • 2003
  • Proxy signatures are signature schemes in which an original signer delegates her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper we propose the ID-based proxy signature schemes using a bilinear map. In the previous R-based proxy signature scheme, the proxy signer can misuse the right of the signing capacity and the public key directory is required. However, by inserting the warrant information such as the identity of the proxy signer and the limit of the signing capacity to the proxy signature, our scheme can prevent the misuse of the proxy key pair by the proxy signer and does not require a public key certificate. Furthermore, our scheme dose not need a secure channel to deliver the warrant. Consequently, the proposed scheme is more efficient and useful than the previous proxy signature schemes.