• Title/Summary/Keyword: Information Centric

Search Result 731, Processing Time 0.029 seconds

XED: Model-based XML Editor Generator for Data-Centric XML Documents (XED: 데이타 중심 XML문서를 위한 모델 기반의 XML 편집기 생성 도구)

  • 최종명;유재우
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.10
    • /
    • pp.894-903
    • /
    • 2003
  • Though XML is widely used, it is still hard for end users to write XML documents. A lot of XML documents are data-centric documents which have formal data format. Even novices can easily write the data-centric XML documents if they use form-based GUIs. In this paper, we introduce a new method for generating form-based XML editor for data-centric XML documents automatically and an XML editor generator called XED. The DTD consists of sequence, choice, and repetition, and this structure can be represented with Document Decomposition Graph(DDG). XED allows users to generate an XML editor by applying the presentation rules to DDG. It also permits users to modify generated editor through changing editor`s GUI properties with direct manipulation.

Dynamic Data Distribution for Multi-dimensional Range Queries in Data-Centric Sensor Networks (데이타 기반 센서 네트워크에서 다차원 영역 질의를 위한 동적 데이타 분산)

  • Lim, Yong-Hun;Chung, Yon-Dohn;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.32-41
    • /
    • 2006
  • In data-centric networks, various data items, such as temperature, humidity, etc. are sensed and stored in sensor nodes. As these attributes are mostly scalar values and inter-related, multi-dimensional range queries are useful. To process multi-dimensional range queries efficiently in data-centric storage, data addressing is essential. The Previous work focused on efficient query processing without considering overall network lifetime. To prolong network lifetime and support multi-dimensional range queries, we propose a dynamic data distribution method for multi-dimensional data, where data space is divided into equal-sized regions and linearized by using Hilbert space filling curve.

A study on the Convergence Type of Smart City between Device/Technology and Artifact (스마트시티 디바이스/기술과 아티팩트의 융합유형에 관한 연구)

  • Han, Ju-Hyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.601-613
    • /
    • 2018
  • This study aims to find out the types of convergence types between devices/technology and artifact in smart city space. The main contents of the research are in-depth analysis on the convergence change of ET, IT, and ET+IT in a smart city. First, the devices/technology and artifacts through 31 cases study are found out below. There are 92 artifacts and 134 devices/technologies (ET:83, IT:51). Second, the convergence change between devices/technology and artifacts is evolved by 7 types. Type 1, the Evolutionary ET type of ET-centric, is Period 1 (Separation fusion between ET and IT), Period 2 (ET-centric fusion), and Period 3 (Growth IT and ET+IT fusion of ET-centric). Type 2, the Advanced ET type of ET+IT-centric, is Period 1 (ET+IT fusion), Period 2 (Advanced ET of ET+IT-centric), and Period 3 (Hyper-advanced ET of ET+IT-centric). Type 3, the All-in-One type of ET+IT, is Period 1 (Separation fusion between ET and IT), Period 2 (Mixed fusion between ET and IT), and Period 3 (All-in-One fusion of ET and IT). Type 4, the Advanced type of IT-centric, is Period 1 (Development of IT-centric), Period 2 (Advanced IT-centric), and Period 3 (Hyper-advanced IT-centric). Types 5 and 6, the Advanced together type of ET+IT, is Period 1 (Developed IT of ET+IT-centric), Period 2 (Advanced IT of ET+IT-centric), and Period 3 (Hyper-advanced IT of ET+IT-centric). Type 7, the Advanced IT type of ET+IT-centric, is Period 1 (ET+IT fusion), Period 2 (Sub-fusion of ET, Advanced IT), and Period 3 (Sub-fusion of ET, Hyper-advanced IT). This study results are going to expect making new types of convergence through further study.

A Study on Giving a Consistent XML View to Applications (응용 프로그램을 위한 일관된 XML 뷰 제공에 관한 연구)

  • Nam, Chul-Ki;Kim, Hye-Kyung;Bae, Jae-Hak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1105-1108
    • /
    • 2001
  • 점차로 이종의 데이터와 문서가 XML 로 통합되는 것이 요구된다. 현재 데이타베이스 기반의 응용프로그램들은 데이터들이 대부분 테이블에 저장되어 있기 때문에 SQL 을 이용하여 데이터처리를 하고 있다. 한편 현 정보기술 발전 추세는 응용 프로그램에서 처리하고자 하는 단위가 데이터(data-centric)에서 점차 문서(document-centric)로 바뀌어 가고 있다. XML 은 이런 패러다임에에 적합한 해결책이 될 수 있다. 본고에서는 일반적인 데이터에 대한 뷰(view)를 테이블 뷰가 아닌 XML 뷰를 응용 프로그램 개발자에게 제시하는 방법론을 보임으로써, 일관되고 유연한 문서처리 시스템 설계를 하는데 있어 대단히 유용한 또다른 한 방법론을 제공하고자 한다.

  • PDF

Optimization Model on the World Wide Web Organization with respect to Content Centric Measures (월드와이드웹의 내용기반 구조최적화)

  • Lee Wookey;Kim Seung;Kim Hando;Kang Sukho
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.30 no.1
    • /
    • pp.187-198
    • /
    • 2005
  • The structure of a Web site can prevent the search robots or crawling agents from confusion in the midst of huge forest of the Web pages. We formalize the view on the World Wide Web and generalize it as a hierarchy of Web objects such as the Web as a set of Web sites, and a Web site as a directed graph with Web nodes and Web edges. Our approach results in the optimal hierarchical structure that can maximize the weight, tf-idf (term frequency and inverse document frequency), that is one of the most widely accepted content centric measures in the information retrieval community, so that the measure can be used to embody the semantics of search query. The experimental results represent that the optimization model is an effective alternative in the dynamically changing Web environment by replacing conventional heuristic approaches.

A study of the educational effects in SNS-utilized instruction (소셜 네트워크 서비스 활용 수업에서의 교육적 효과 고찰)

  • Kwon, Myung-Soon;Kan, Jin-Sook;Kim, Jin-Whan
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.135-146
    • /
    • 2014
  • The study has compared the effects in SNS-utilized instruction that each of self centric activities and social interaction added social activities affected self initiative, attitudes and self efficacy to information technology respectively. The research methods utilized the pre experimental design as nonequivalent experimental group. The data was analyzed by paired t-test and content analysis. The results showed that the SNS class utilized self-centric activities were effective in self-initiative and attitudes toward information technology, while social interaction added social activities were effective in not only self-initiative and the attitudes of information technology but also self efficacy of information technology. And content analysis of the effects of the education showed that information sharing, instancy and accessibility were advantageous but information security and privacy issues were problematic. That is, it was confirmed that when self-centric activities and social interaction activities were practised simultaneously in SNS-utilized instruction, the self initiative which learners planed and executed by themselves, the attitudes and self efficacy of information technology which were able to enhance learning ability and to show satisfaction to individual learning were improved.

  • PDF

Patent Analysis of Information Security Technology for Network-Centric Warfare (네트워크 중심전을 위한 정보보호기술의 특허동향 분석)

  • Kim, Do-Hoe;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.355-364
    • /
    • 2007
  • The paradigm of war is basically changed by development of information and communication technologies. One of the paradigms in future war is NCW(Network-Centric Warfare) that is purposed of achievement in information-superiority. In this future war, the level of menace and fragility is rapidly increased in information-security according to the massive information and complex system. Therefore the Korean army is developing the information-security technologies for NCW. But, until now patent analysis concerning NCW has not performed. In this paper, we suggest a meaningful data for efficient R&D through patent analysis of information-security technologies on NCW.

A Study on Building Structures and Processes for Intelligent Web Document Classification (지능적인 웹문서 분류를 위한 구조 및 프로세스 설계 연구)

  • Jang, Young-Cheol
    • Journal of Digital Convergence
    • /
    • v.6 no.4
    • /
    • pp.177-183
    • /
    • 2008
  • This paper aims to offer a solution based on intelligent document classification to create a user-centric information retrieval system allowing user-centric linguistic expression. So, structures expressing user intention and fine document classifying process using EBL, similarity, knowledge base, user intention, are proposed. To overcome the problem requiring huge and exact semantic information, a hybrid process is designed integrating keyword, thesaurus, probability and user intention information. User intention tree hierarchy is build and a method of extracting group intention between key words and user intentions is proposed. These structures and processes are implemented in HDCI(Hybrid Document Classification with Intention) system. HDCI consists of analyzing user intention and classifying web documents stages. Classifying stage is composed of knowledge base process, similarity process and hybrid coordinating process. With the help of user intention related structures and hybrid coordinating process, HDCI can efficiently categorize web documents in according to user's complex linguistic expression with small priori information.

  • PDF

An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction

  • Im, Hyeonseung;Kim, Dohyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2904-2918
    • /
    • 2020
  • With a huge demand for replicated content on the Internet, a new networking paradigm called information-centric networking (ICN) has been introduced for efficient content dissemination. In ICN, named content is distributed over the network cache and it is accessed by name instead of a location identifier. These aspects allow users to retrieve content from any of the nodes having replicas, and consequently 1) network resources are more efficiently utilized by avoiding redundant transmission and 2) more scalable services are provided by distributing server loads. However, in-network caching in ICN brings about a new type of security issues, called content poisoning attacks, where fabricated content is located in the network cache and interferes with the normal behavior of the system. In this paper, we look into the problems of content poisoning in ICN and discuss security architectures against them. In particular, we reconsider the state-of-the-art schemes from the perspective of feasibility, and propose a practical security architecture.

Comparison and Analysis of Name-Based Routing Protocols for Information-Centric Network (정보 중심 네트워크를 위한 이름 기반 라우팅 프로토콜의 비교 및 분석)

  • Kim, Jung-Jae;Ryu, Min-Woo;Cha, Si-Ho;Cho, Kuk-Huyn
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1969-1975
    • /
    • 2013
  • ICN (Information-Centric Network) is a next generation Internet communication technology for converting existing Internet communication paradigm to information-based communication paradigm to efficiently use a large amount of information that exists on the Internet. Therefore, unlike existing Internet communication technologies focused on the process of communication using the host address, ICN focuses on the purpose of communication for each information by defining the information of everything that exists on the Internet. For this purpose, ICN uses NbR (Name-based Routing) methods that assign a name to each piece of information, all routers participating in ICN have the physical storage so that they are able to share information with each other. NbR methods on ICN are divided into one-phase routing and two-phase routing depending on how to reach at the storage of each router. However, currently proposed NbR methods cause many problems because they do not reflect the unique characteristics of ICN. Therefore, this paper looked at various NbR issues from caching, access time, distribution, mobility, scaliability, and dissemination of information for an efficient NbR method, and analyzed existing methods proposed for ICN. This paper also proposed a research direction to study the efficient NbR for ICN based on the analysis information.