• Title/Summary/Keyword: PROV Model

Search Result 12, Processing Time 0.02 seconds

A Study on Developing a Provenance Conceptual Model for Data-driven Electronic Records Based on Extending W3C PROV (PROV의 확장에 기초한 데이터형 전자기록의 출처 모델 연구)

  • Hyun, Moonsoo
    • The Korean Journal of Archival Studies
    • /
    • no.80
    • /
    • pp.5-41
    • /
    • 2024
  • This study was conducted to develop a provenance representation model for data-type electronic records. It supports the distinction between provenance and context for the creation and management of data-type electronic records. To express both, it aims to design an extensible provenance model. For this purpose, W3C PROV is utilized as a basic model, with P-Plan and ProvONE for designing prospective provenance area. Afterward, the provenance model was extended by mapping the record management requirements. The provenance model proposed in this study is designed to represent and connect both retrospective and prospective provenance of data-type electronic records. Based on this study, it is expected to discussing the concept of provenance in the records management and archival studies area and to extending the model in the future.

Trust Evaluation Scheme of Web Data Based on Provenance in Social Semantic Web Environments (소셜 시맨틱 웹 환경에서 프로버넌스 기반의 웹 데이터 신뢰도 평가 기법)

  • Yoon, Sangwon;Choi, Kitae;Park, Jaeyeol;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • Journal of KIISE
    • /
    • v.43 no.1
    • /
    • pp.106-118
    • /
    • 2016
  • Recently, as the generation and sharing of web data have increased, the importance of a social semantic web that combines the semantic web and the social web has also been increasing. In this paper, we propose a trust evaluation scheme based on provenance by extending the PROV model in the social semantic web environment. The proposed scheme manages the provenance of web data and adds the necessary elements for trust evaluation in the PROV model of W3C. The extended PROV model supports data management and provenance tracing. The proposed trust evaluation scheme considers various parameters such as user trust, original data trust, and user evaluation. The evaluated trust is managed as provenance. When processing a query, the proposed scheme generates a result by considering the trust. Therefore, the proposed scheme can manage the provenance of web data and compute data trust correctly by using such various parameters. The evaluated trust becomes a criterion to determine whether the query result can be trusted or not. In order to show the validity of the proposed scheme, we verify its performance using SPARQL queries.

Provenance Compression Scheme Considering RDF Graph Patterns (RDF 그래프 패턴을 고려한 프로버넌스 압축 기법)

  • Bok, kyoungsoo;Han, Jieun;Noh, Yeonwoo;Yook, Misun;Lim, Jongtae;Lee, Seok-Hee;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.374-386
    • /
    • 2016
  • Provenance means the meta data that represents the history or lineage of a data in collaboration storage environments. Therefore, as provenance has been accruing over time, it takes several ten times as large as the original data. The schemes for effciently compressing huge amounts of provenance are required. In this paper, we propose a provenance compression scheme considering the RDF graph patterns. The proposed scheme represents provenance based on a standard PROV model and encodes provenance in numeric data through the text encoding. We compress provenance and RDF data using the graph patterns. Unlike conventional provenance compression techniques, we compress provenance by considering RDF documents on the semantic web. In order to show the superiority of the proposed scheme, we compare it with the existing scheme in terms of compression ratio and the processing time.

Beams affected by corrosion influence of reinforcement placement in the cracking

  • Ortega, Nestor F.;Rivas, Irene E.;Aveldano, Raquel R.;Peralta, Maria H.
    • Structural Engineering and Mechanics
    • /
    • v.37 no.2
    • /
    • pp.163-175
    • /
    • 2011
  • The results of experimental and numerical investigations on reinforced concrete beams, with different longitudinal rebars affected by corrosive processes are presented in this paper. Different diameters and/or different distributions of longitudinal rebars were employed keeping constant the total section in each analyzed case, (maintaining a constant stirrup diameter and distribution). The rebars were subjected to accelerated corrosion in the experimental study. Electrochemical monitoring of the process, periodic measuring of the cover cracking and gravimetry of the rebars were performed through the test. Some building recommendations are obtained in order to be considered by designers of concrete structures. The numerical simulation was carried out through the application of the Finite Element Method (FEM), employing plane models, and using linear-elastic material model. The cracking process was associated with the evolution of the tensile stresses that were originated. This numerical methodology allows the monitoring of the mechanical behavior until the beginning of the cracking.

Application of Rainfall-Runoff Models and Provision of Radar Rainfall Data during Flood in Imjin River Basin (임진강 유역의 홍수기 강우-유출모형 적용 및 레이더강우 자료의 활용방안)

  • Kim Seong-joon;Park Roh-hyuk;Maeng Sung-jin
    • KCID journal
    • /
    • v.5 no.1
    • /
    • pp.47-62
    • /
    • 1998
  • The purpose of this study is to evaluate storm runoff models of Imjin river basin(8,117.5$km^2$) for the provision of radar rainfall situation. Two lumped models, Storage Function Model(SFM) and HEC-1 model which are now in use broadly and prov

  • PDF

A comparative study on the characteristics of the evaluation techniques for industrial design proposals (산업 디자인 평가방법의 특성 비교연구)

  • 우흥룡
    • Archives of design research
    • /
    • no.16
    • /
    • pp.17-25
    • /
    • 1996
  • , \l!ernatives in multi dimensional decision prohlems generally possess numerous attrihutes by which they can be describ('d and compared, The ('\';dllation factors include all attributes that have Ic\'(']s specified by quantitative and qualitativc objectil'l'S, Howev'('f since qualitative factors arc difficul! to quantify as num('ral estimates, these factors have tended to bl' ignored without regard for their importance to human contrnl. In this study, the author adapted :j ('va]uation methods with critrria which have qualitative and qualitative attributes: the Intuitive Evaluation ~1cthods the Accumulativc' Evaluation Model the Benchmarking Evaluation Methods, and studied the corrC'iation between them, The results show that Ill(' :j Mrthods have reciprocal relationships under reliability (r=O, (XX)]] In order to removl' obstacles of desi!;n ev'aluation ( lots of timl' l'llnsumption, constr;lints of placc" difficulties of hu!;!' data procc'ssin!;), it is necessary to be developed a new ('va]uation syst('rn which could prov'idc' effective rat in!; of desi!;n v'alm's 10 make value judw'rnents, , \l!ernatives in multi dimensional decision prohlems generally possess numerous attrihutes by which they can be describ('d and compared, The ('\';dllation factors include all attributes that have Ic\'(']s specified by quantitative and qualitativc objectil'l'S, Howev'('f since qualitative factors arc difficul! to quantify as num('ral estimates, these factors have tended to bl' ignored without regard for their importance to human contrnl. In this study, the author adapted :j ('va]uation methods with critrria which have qualitative and qualitative attributes: the Intuitive Evaluation ~1cthods the Accumulativc' Evaluation Model the Benchmarking Evaluation Methods, and studied the corrC'iation between them, The results show that Ill(' :j Mrthods have reciprocal relationships under reliability (r=O, (XX)]] In order to removl' obstacles of desi!;n ev'aluation ( lots of timl' l'llnsumption, constr;lints of placc" difficulties of hu!;!' data procc'ssin!;), it is necessary to be developed a new ('va]uation syst('rn which could prov'idc' effective rat in!; of desi!;n v'alm's 10 make value judw'rnents,alm's 10 make value judw'rnents,

  • PDF

Environmental Modeling and Thermal Comfort in Buildings in Hot and Humid Tropical Climates

  • Muhammad Awaluddin Hamdy;Baharuddin Hamzah;Ria Wikantari;Rosady Mulyadi
    • Architectural research
    • /
    • v.25 no.4
    • /
    • pp.73-84
    • /
    • 2023
  • Indoor thermal conditions greatly affect the health and comfort of humans who occupy the space in it. The purpose of this research is to analyze the influence of water and vegetation elements as a microclimate modifier in buildings to obtain thermal comfort through the study of thermal environment models. This research covers two objects, namely public buildings and housing in Makassar City, South Sulawesi Prov-ince - Indonesia. Quantitative methods through field surveys and measurements based on thermal and personal variables. Data analysis based on ASHRAE 55 2020 standard. The data was processed with a parametric statistical approach and then simulated with the Computational Fluid Dynamics (CFD) simulation method to find a thermal prediction model. The model was made by increasing the ventilation area by 2.0 m2, adding 10% vegetation with shade plant characteristics, moving water features in the form of fountains and increasing the pool area by 15% to obtain PMV + 0.23, PPD + 8%, TSV-1 - +0, Ta_25.7℃, and relative humidity 63.5 - 66%. The evaluation shows that the operating temperature can analyze the visitor's comfort temperature range of >80% and comply with the ASHRAE 55-2020 standard. It is concluded that water elements and indoor vegetation can be microclimate modifiers in buildings to create desired comfort conditions and adaptive con-trols in buildings such as the arrangement of water elements and vegetation and ventilation systems to provide passive cooling effects in buildings.

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.

Development of Vehicle LDW Application Service using AUTOSAR Platform on Multi-Core MCU (멀티코어 상의 AUTOSAR 플랫폼을 활용한 차량용 LDW 응용 서비스 개발)

  • Park, Mi-Ryong;Kim, Dongwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.113-120
    • /
    • 2014
  • In this paper, we examine Asymmetric Multi-Processing Environment to provide LDW service. Asymmetric Multi-Processing Environment consists of high-speed MCU to support rapid image processing and low-speed MCU for controlling with other ECU at the control domain. Also we designed rapid image process application and LDW application Software Component(SW-C) according to the development process rule of AUTOSAR. To communicate between two MCUs, timer based polling based IPC was designed. Also to communicate with other ECUs(Electronic Control Units), we designed CAN messages to provide alarm information and receiving CAN message to catch the Turn signal. We confirm the possibility of the various ADAS development using an Asymmetric Multi-Processing Environment and AUTOSAR platform. We also expect providing ISO 26262 functional safety.

A Study on Application of Time-Triggered Ethernet for Vehicle Network (타임-트리거드 이더넷의 차량네트워크 적용 연구)

  • Park, Mi-Ryong;Yoon, Mihee;Na, Ke-Yeol;Kim, Dongwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.79-88
    • /
    • 2015
  • In this paper, we examine Ethernet based vehicle network which is recently emerging technology. Current MOST for entertainment will be soon replaced with the emerging Ethernet based vehicle network. Although legacy standard Ethernet has several advantages it is not suitable for vehicle backbone network without any modification. As a result, many researches are happening on extending and modification of the Ethernet function for realtime and reliability. Time-triggered Ethernet, one of many trials known as AS6802, is investigated on the architecture and functionalities. We design the traffic model on Time-triggered Ethernet and analyse the latency of the network. We also consider the QoS requirement and environment of operating configuration for vehicle network.