• Title/Summary/Keyword: Storage Strategy

Search Result 439, Processing Time 0.021 seconds

Transformation from XML DTD to ORDB Schema using Object Model (객체모델을 이용한, XML DTD의 ORDB 스키마로의 변환)

  • 이상태;주경수
    • The Journal of Information Technology and Database
    • /
    • v.8 no.1
    • /
    • pp.105-116
    • /
    • 2001
  • XML is a standard markup language for exchange and storage of formed or well-formed information in World Wide Web. Because the source data of XML message for exchange of information in World Wide Web is stored in legacy database, it is necessary for the easy connection between XML application and database system. In Oracle8i, 9i, Informix and SQL2000, DBMS vendors make upgrade to DBMS for using XML. This method of upgrade between XML application and database system is Platform-dependent and DBMS-dependent. Also It is necessary for the method of the platform- and DBMS-independent connection between XML application and database system. The methods for the connection between XML DTD and RDB schema are studied for the easy connection between XML application and database system. But the study for the easy connection between XML DTD and ORDB schema is a little. For multimedia application, we use the extended DBMS from RDBMS. It is necessary for the study to the transformation from XML DTD to ORDB schema. In this paper, for easier connection between XML application and database system, we propose the method of the transformation from XML DTD to ORDB schema using Object Model.

  • PDF

A Strategy Study on Sensitive Information Filtering for Personal Information Protect in Big Data Analyze

  • Koo, Gun-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.101-108
    • /
    • 2017
  • The study proposed a system that filters the data that is entered when analyzing big data such as SNS and BLOG. Personal information includes impersonal personal information, but there is also personal information that distinguishes it from personal information, such as religious institution, personal feelings, thoughts, or beliefs. Define these personally identifiable information as sensitive information. In order to prevent this, Article 23 of the Privacy Act has clauses on the collection and utilization of the information. The proposed system structure is divided into two stages, including Big Data Processing Processes and Sensitive Information Filtering Processes, and Big Data processing is analyzed and applied in Big Data collection in four stages. Big Data Processing Processes include data collection and storage, vocabulary analysis and parsing and semantics. Sensitive Information Filtering Processes includes sensitive information questionnaires, establishing sensitive information DB, qualifying information, filtering sensitive information, and reliability analysis. As a result, the number of Big Data performed in the experiment was carried out at 84.13%, until 7553 of 8978 was produced to create the Ontology Generation. There is considerable significan ce to the point that Performing a sensitive information cut phase was carried out by 98%.

Perceptions of Mandu and Usage Behaviors by Mandu Type (만두에 대한 소비자들의 인식과 만두 유형별 이용 행동)

  • Kim, Ju-Yeon;Kim, Ki-Bbeum;Park, In-Su
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.19 no.5
    • /
    • pp.690-702
    • /
    • 2009
  • Mandu has become more increasingly essential and popular. Various types of Mandu are on saleavailable for purchase and are receiving good response from customers. This study explored the buyers' perceptions and their usage behaviors regarding to Mandu. The results showed the followings: 1) The respondents considered Mandu a snack rather than a meal. 2) The perceptions of a meal were different by gender, age, annual income, and number of children. 3) Respondents frequently have consumed frozen Mandu more than handmade Mandu and the type of Mandu consumed differed by age, marriage, occupation and annual income. 4) Respondents generally preferred meat to vegetable for as the stuffing in Mandu and favorite stuffings differed by gender and age. 5) The 'snack factor' was the highest purchasing motive among three factors including 'meal', 'economy' and 'snack' factor. 6) The derived factors for Mandu purchasing attributes were 'safety', 'loyalty/practicality' and 'storage' factor. 'Loyalty/practicality' represented the highest among them and each purchasing attribute differed according to gender, marriage and annual income.

  • PDF

Risk Assessment Strategy for Decommissioning of Fukushima Daiichi Nuclear Power Station

  • Yamaguchi, Akira;Jang, Sunghyon;Hida, Kazuki;Yamanaka, Yasunori;Narumiya, Yoshiyuki
    • Nuclear Engineering and Technology
    • /
    • v.49 no.2
    • /
    • pp.442-449
    • /
    • 2017
  • Risk management of the Fukushima Daiichi Nuclear Power Station decommissioning is a great challenge. In the present study, a risk management framework has been developed for the decommissioning work. It is applied to fuel assembly retrieval from Unit 3 spent fuel pool. Whole retrieval work is divided into three phases: preparation, retrieval, and transportation and storage. First of all, the end point has been established and the success path has been developed. Then, possible threats, which are internal/external and technical/societal/management, are identified and selected. "What can go wrong?" is a question about the failure scenario. The likelihoods and consequences for each scenario are roughly estimated. The whole decommissioning project will continue for several decades, i.e., long-term perspective is important. What should be emphasized is that we do not always have enough knowledge and experience of this kind. It is expected that the decommissioning can make steady and good progress in support of the proposed risk management framework. Thus, risk assessment and management are required, and the process needs to be updated in accordance with the most recent information and knowledge on the decommissioning works.

A Multi-Objective Differential Evolution for Just-In-Time Door Assignment and Truck Scheduling in Multi-door Cross Docking Problems

  • Wisittipanich, Warisa;Hengmeechai, Piya
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.3
    • /
    • pp.299-311
    • /
    • 2015
  • Nowadays, the distribution centres aim to reduce costs by reducing inventory and timely shipment. Cross docking is a logistics strategy in which products delivered to a distribution centre by inbound trucks are directly unloaded and transferred to outbound trucks with minimum warehouse storage. Moreover, on-time delivery in a distribution network becomes very crucial especially when several distribution centres and customers are involved. Therefore, an efficient truck scheduling is needed to synchronize the delivery throughout the network in order to satisfy all stake-holders. This paper presents a mathematical model of a mixed integer programming for door assignment and truck scheduling in a multiple inbound and outbound doors cross docking problem according to Just-In-Time concept. The objective is to find the schedule of transhipment operations to simultaneously minimize the total earliness and total tardiness of trucks. Then, a multi-objective differential evolution (MODE) is proposed with an encoding scheme and four decoding strategies, called ITSH, ITDD, OTSH and OTDD, to find a Pareto frontier for the multi-door cross docking problems. The performances of MODE are evaluated using 15 generated instances. The numerical experiments demonstrate that the proposed algorithm is capable of finding a set of diverse and high quality non-dominated solutions.

Immobilization of the Antarctic Bacillus sp. LX-1 α-Galactosidase on Eudragit L-100 for the Production of a Functional Feed Additive

  • Lee, Jaekoo;Park, Inkyung;Cho, Jaiesoon
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.26 no.4
    • /
    • pp.552-557
    • /
    • 2013
  • Partially purified ${\alpha}$-galactosidase from Bacillus sp. LX-1 was non-covalently immobilized on a reversibly soluble-insoluble polymer, Eudragit L-100, and an immobilization efficiency of 0.93 was obtained. The optimum pH of the free and immobilized enzyme was 6.5 to 7.0 and 7.0, respectively, while there was no change in optimum temperature between the free and immobilized ${\alpha}$-galactosidase. The immobilized ${\alpha}$-galactosidase was reutilized six times without significant loss in activity. The immobilized enzyme showed good storage stability at $37^{\circ}C$, retaining about 50% of its initial activity even after 18 d at this temperature, while the free enzyme was completely inactivated. The immobilization of ${\alpha}$-galactosidase from Bacillus sp. LX-1 on Eudragit L-100 may be a promising strategy for removal of ${\alpha}$-galacto-oligosaccharides such as raffinose and stachyose from soybean meal and other legume in feed industry.

Practical and Verifiable C++ Dynamic Cast for Hard Real-Time Systems

  • Dechev, Damian;Mahapatra, Rabi;Stroustrup, Bjarne
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.4
    • /
    • pp.375-393
    • /
    • 2008
  • The dynamic cast operation allows flexibility in the design and use of data management facilities in object-oriented programs. Dynamic cast has an important role in the implementation of the Data Management Services (DMS) of the Mission Data System Project (MDS), the Jet Propulsion Laboratory's experimental work for providing a state-based and goal-oriented unified architecture for testing and development of mission software. DMS is responsible for the storage and transport of control and scientific data in a remote autonomous spacecraft. Like similar operators in other languages, the C++ dynamic cast operator does not provide the timing guarantees needed for hard real-time embedded systems. In a recent study, Gibbs and Stroustrup (G&S) devised a dynamic cast implementation strategy that guarantees fast constant-time performance. This paper presents the definition and application of a cosimulation framework to formally verify and evaluate the G&S fast dynamic casting scheme and its applicability in the Mission Data System DMS application. We describe the systematic process of model-based simulation and analysis that has led to performance improvement of the G&S algorithm's heuristics by about a factor of 2. In this work we introduce and apply a library for extracting semantic information from C++ source code that helps us deliver a practical and verifiable implementation of the fast dynamic casting algorithm.

A Comparative Study of Reservoir Operations for Flood Control of the Chungju Dam (홍수시 충주댐 운영방안의 비교검토)

  • 이길성;정동국
    • Water for future
    • /
    • v.18 no.3
    • /
    • pp.225-233
    • /
    • 1985
  • To develop a simulation strategy of multi-reservoir operation in flood season, the single dam operations methed for the Chungju dam are investigated in the Han river basin. Thus, spillway rule curve, rigid ROM, and linear decision rules are applied for control operations, subject to the restrictions imposed by the river and the reservoir characteristics. The storage and release and control/utility efficiencies for several floods are calculated. The variation of control coefficients with respect to the return period are also examined. As the results of this comparative study, the optimal operation method can be selected in terms of the magnitude of flood. With inflow forecasting, the flood control operation can be greatly improved by variable coefficients rigid ROM and linear decision rules.

  • PDF

Effects of Exercise Treatment on Obesity: What Community Nutritionists Need to Know

  • Lee Kyoung-Young
    • Journal of Community Nutrition
    • /
    • v.8 no.2
    • /
    • pp.76-89
    • /
    • 2006
  • By improving body composition, such as fat, lean body mass and total body weight, an exercise program can be an effective treatment of obesity. The effects of exercise on obesity have been confirmed via various approaches such as type, intensity, duration, frequency, and combination with diet. Combined exercise and diet is the most efficient strategy for weight loss, and exercise alone could improve metabolism irrespective of weight loss. In addition, physical activity, including exercise, is emphasized to avoid a 'yo-yo' phenomenon. Exercise increases lipolysis stimulated by such factors as catecholamine, growth hormone (GH), and hormone sensitive lipase (HSL). Moreover, changes in insulin and cortisol through exercise affect adipose tissue, which is known as not only an energy storage locale, but also as an endocrine organ. Adipocytokines secreted by adipose tissue respond to signals that modulate metabolism and inflammation. Exercise has generally shown positive effects on adipocytokines, and these effects increase in conjunction with a hypocaloric diet. However, a long duration and a high intensity of exercise could induce an inflammatory response. This review summarizes the effects of exercise on obesity treatment, which contributes to the exercise and nutritional fields, particularly of community nutritionists. (J Community Nutrition 8(2): 76-89, 2006)

A Priority Based Transmission Control Scheme Considering Remaining Energy for Body Sensor Network

  • Encarnacion, Nico;Yang, Hyunho
    • Smart Media Journal
    • /
    • v.4 no.1
    • /
    • pp.25-32
    • /
    • 2015
  • Powering wireless sensors with energy harvested from the environment is coming of age due to the increasing power densities of both storage and harvesting devices and the electronics performing energy efficient energy conversion. In order to maximize the functionality of the wireless sensor network, minimize missing packets, minimize latency and prevent the waste of energy, problems like congestion and inefficient energy usage must be addressed. Many sleep-awake protocols and efficient message priority techniques have been developed to properly manage the energy of the nodes and to minimize congestion. For a WSN that is operating in a strictly energy constrained environment, an energy-efficient transmission strategy is necessary. In this paper, we present a novel transmission priority decision scheme for a heterogeneous body sensor network composed of normal nodes and an energy harvesting node that acts as a cluster head. The energy harvesting node's decision whether or not to clear a normal node for sending is based on a set of metrics which includes the energy harvesting node's remaining energy, the total harvested energy, the type of message in a normal node's queue and finally, the implementation context of the wireless sensor network.