• Title/Summary/Keyword: Semantic constraints

Search Result 83, Processing Time 0.026 seconds

A Transformation Technique for Constraints-preserving of XML Data (XML 데이터의 제약조건 보존을 위한 변환 기법)

  • Cho, Jung-Gil;Keum, Young-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.1-9
    • /
    • 2009
  • Many techniques have been proposed to store efficiently and query XML data. One way achieving this goal is using relational database by transforming XML data into relational format. But most researches only transformed content and structure of XML schema. Although they transformed semantic constrainment of XML schema, they did not all of semantics. In this paper, we propose a systematic technique for extracting semantic constrainment from XML schema and storing method when the extracting result is transformed into relational schema without any lost of semantic constrainment. The transforming algorithm is used for extracting and storing semantic constrainment from XML schema and it shows how extracted information is stored according to schema notation. Also it provides semantic knowledges that are needed to be confirmed during the transformation to ensure a correct relation schema. The technique can reduce storage redundancy and can keep up content and structure with integrity constraints.

An Access Control Method considering Semantic Context for Privacy-preserving (개인정보 보호를 위한 의미적 상황을 반영하는 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2015
  • To conform to new emerging computing paradigm, various researches and challenges are being done. New information technologies make easy to access and acquire information in various ways. In other side, however, it also makes illegal access more powerful and various threat to system security. In this paper, we suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules, based on their semantic information. New method is to derive security policy rules using context tree structure and to control the exceed granting of privileges through the degree of the semantic discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.

Constraints and Type Hierarchies for Korean Serial Verb Constructions - An Analytic Study within the HPSG Framework -

  • Song, Sang-Houn
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2007.11a
    • /
    • pp.440-449
    • /
    • 2007
  • This paper provides a fine-grained analysis of Korean serial verb constructions within the HPSG framework, and covers major descriptive characteristics of the phenomena. This paper discusses constraints on serial verb constructions in terms of four aspects; transitivity, argument structure, semantic properties, and complementizers. As a result, 17 constraints have been built, which support the type hierarchies for Korean serial verb constructions. This paper also presents a sample derivation on the basis of on the constraints and the type hierarchies.

  • PDF

A Framework of Internet Shopping Decision Making Based on Semantic Web Constraint Language (의미망 제약식언어를 기반으로 한 인터넷 쇼핑 의사결정 틀)

  • Lee, Myung-Jin;Kim, Hak-Jin;Kim, Woo-Ju
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.33 no.3
    • /
    • pp.29-42
    • /
    • 2008
  • Semantic Web society initially focused only on data but has gradually moved toward knowledge. Recently rule beyond ontology has emerged as a key element of the Semantic Web. All of these activities are obviously aiming at making data and knowledge on the Web sharable and reusable between various entities around the world. If one of ultimate visions of the Semantic Web is to increase human's decision making quality assisted by machines, there is a missing but important part to be shared and reused. It is knowledge about constraints on data and concepts represented by ontology which should be emphasized more. In this paper, we propose Semantic Web Constraint Language (SWCL) based on OWL and show how effective SWCL can be in representing and solving an internet shopper's decision making problem by an implementation of a shopping agent in the Semantic Web environment.

Spatio-temporal Semantic Features for Human Action Recognition

  • Liu, Jia;Wang, Xiaonian;Li, Tianyu;Yang, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2632-2649
    • /
    • 2012
  • Most approaches to human action recognition is limited due to the use of simple action datasets under controlled environments or focus on excessively localized features without sufficiently exploring the spatio-temporal information. This paper proposed a framework for recognizing realistic human actions. Specifically, a new action representation is proposed based on computing a rich set of descriptors from keypoint trajectories. To obtain efficient and compact representations for actions, we develop a feature fusion method to combine spatial-temporal local motion descriptors by the movement of the camera which is detected by the distribution of spatio-temporal interest points in the clips. A new topic model called Markov Semantic Model is proposed for semantic feature selection which relies on the different kinds of dependencies between words produced by "syntactic " and "semantic" constraints. The informative features are selected collaboratively based on the different types of dependencies between words produced by short range and long range constraints. Building on the nonlinear SVMs, we validate this proposed hierarchical framework on several realistic action datasets.

Proto-Role Theory and the Accusative Case Marker ul/lul in Korean

  • Lee, Sun-Hee
    • Language and Information
    • /
    • v.2 no.2
    • /
    • pp.81-120
    • /
    • 1998
  • The case marking phenomenon in Korean is closely related to semantic entailment and should be studied as an interface between syntax and semantics. Assuming a direct mapping between syntactic realization and semantic information, this study investigates the role of the accusative marker ul/lul in Korean, and explores the semantic constraints working on the argument realization on the basis of proto-roles hypothesis. Specifically, I will study various types of case alternations in Korean and clarify the role of the accusative marker ul/lul, which manifests the distinction between direct object NPs and oblique NPs.

  • PDF

An Efficient Privacy Preserving Method based on Semantic Security Policy Enforcement (의미적 보안정책 집행에 의한 효율적 개인정보보호 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2013
  • New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. To challenge these threats, various extended access control methods are being studied. We suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules via their semantic relationship. New our approach derives semantic implications using tree hierarchy structure and coordinates the exceed privileges using semantic gap factor calculating the degree of the discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.

A Comparative Study on Korean Connective Morpheme '-myenseo' to the Chinese expression - based on Korean-Chinese parallel corpus (한국어 연결어미 '-면서'와 중국어 대응표현의 대조연구 -한·중 병렬 말뭉치를 기반으로)

  • YI, CHAO
    • Cross-Cultural Studies
    • /
    • v.37
    • /
    • pp.309-334
    • /
    • 2014
  • This study is based on the Korean-Chinese parallel corpus, utilizing the Korean connective morpheme '-myenseo' and contrasting with the Chinese expression. Korean learners often struggle with the use of Korean Connective Morpheme especially when there is a lexical gap between their mother language. '-myenseo' is of the most use Korean Connective Morpheme, it usually contrast to the Chinese coordinating conjunction. But according to the corpus, the contrastive Chinese expression to '-myenseo' is more than coordinating conjunction. So through this study, can help the Chinese Korean language learners learn easier while studying '-myenseo', because the variety Chinese expression are found from the parallel corpus that related to '-myenseo'. In this study, firstly discussed the semantic features and syntactic characteristics of '-myenseo'. The significant semantic features of '-myenseo' are 'simultaneous' and 'conflict'. So in this chapter the study use examples of usage to analyse the specific usage of '-myenseo'. And then this study analyse syntactic characteristics of '-myenseo' through the subject constraint, predicate constraints, temporal constraints, mood constraints, negatives constraints. then summarize them into a table. And the most important part of this study is Chapter 4. In this chapter, it contrasted the Korean connective morpheme '-myenseo' to the Chinese expression by analysing the Korean-Chinese parallel corpus. As a result of the analysis, the frequency of the Chinese expression that contrasted to '-myenseo' is summarized into

    . It can see from the table that the most common Chinese expression comparative to '-myenseo' is non-marker patterns. That means the connection of sentence in Korean can use connective morpheme what is a clarifying linguistic marker, but in Chinese it often connect the sentence by their intrinsic logical relationships. So the conclusion of this chapter is that '-myenseo' can be comparative to Chinese conjunction, expression, non-marker patterns and liberal translation patterns, which are more than Chinese conjunction that discovered before. In the last Chapter, as the conclusion part of this study, it summarized and suggest the limitations and the future research direction.

  • On Deriving Constraints on Bound Anaphora

    • Lee, Hyun-Oo
      • Language and Information
      • /
      • v.2 no.1
      • /
      • pp.214-255
      • /
      • 1998
    • Close examination of previous constraints on bound anaphora that are designed to directly constrain the distribution of referentially dependent(RD) items shows that no universal structural relation may exist that relates RD items to their antecedents. As an alternative to these constraints, this paper proposes an axiom of semantic interpretation, called the Principle of Referential Autonomy, which dispenses with any pretheoretical notion of grammatical functions or configurational notion like c-command. Together with certain English-specific facts, this principle enables us to infer the ungrammaticality of core examples of strong and weak crossover.

    • PDF

    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.