• Title/Summary/Keyword: Transformation rule

Search Result 115, Processing Time 0.024 seconds

A Program Transformational Approach for Rule-Based Hangul Automatic Programming (규칙기반 한글 자동 프로그램을 위한 프로그램 변형기법)

  • Hong, Seong-Su;Lee, Sang-Rak;Sim, Jae-Hong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.1
    • /
    • pp.114-128
    • /
    • 1994
  • It is very difficult for a nonprofessional programmer in Koera to write a program with very High Level Language such as, V,REFINE, GIST, and SETL, because the semantic primitives of these languages are based on predicate calculus, set, mapping, or testricted natural language. And it takes time to be familiar with these language. In this paper, we suggest a method to reduce such difficulties by programming with the declarative, procedural constructs, and aggregate constructs. And we design and implement an experimental knowledge-based automatic programming system. called HAPS(Hangul Automatic Program System). HAPS, whose input is specification such as Hangul abstract algorithm and datatype or Hangul procedural constructs, and whose output is C program. The method of operation is based on rule-based and program transformation technique, and the problem transformation technique. The problem area is general problem. The control structure of HAPS accepts the program specification, transforms this specification according to the proper rule in the rule-base, and stores the transformed program specification on the global data base. HAPS repeats these procedures until the target C program is fully constructed.

  • PDF

Transformation from Data Flow Diagram to SysML Diagram (데이터흐름도(DFD)의 SysML 다이어그램으로의 변환에 관한 연구)

  • Yoon, Seok-In;Wang, Ji-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5827-5833
    • /
    • 2013
  • Due to science and technology evolutions, modern systems are becoming larger and more complex. In developing complex systems, Model-Based Systems Engineering (MBSE), which is approach to reduce complexity, is being introduced and applied to various system domains. However, because of the modeling being made through a variety of languages, there is a problem with communication within the stakeholders and a lack of consistency in the models. In this paper, by investigating the rule explaining the transformation of one of the only traditional diagrams, DFD, to SysML and reusing the formerly built models, we attempt to implement by SysML. Analyzing each diagram's Metamodel and validating the connection of each component through bipartite graph especially suggest an effective transformation rule. Also, by applying to naval-combat system, we confirm efficiency of this study. Establishing the results of this study as basis for conducting further study, we will be able to transform other previous models gained from formerly built system to SysML. In this way, the stakeholder's communication can be improved and we anticipate that the application of SysML will be beneficial to the much efficient MBSE.

Study on Intelligence (AI) Detection Model about Telecommunication Finance Fraud Accident (전기통신금융사기 사고에 대한 이상징후 지능화(AI) 탐지 모델 연구)

  • Jeong, Eui-seok;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.149-164
    • /
    • 2019
  • Digital Transformation and the Fourth Industrial Revolution, electronic financial services should be provided safely in accordance with rapidly changing technology changes in the times of change. However, telecommunication finance fraud (voice phishing) accidents are currently ongoing, and various efforts are being made to eradicate accidents such as legal amendment and improvement of policy system in order to cope with continuous increase, intelligence and advancement of accidents. In addition, financial institutions are trying to prevent fraudulent accidents by improving and upgrading the abnormal financial transaction detection system, but the results are not very clear. Despite these efforts, telecommunications and financial fraud incidents have evolved to evolve against countermeasures. In this paper, we propose an intelligent over - the - counter financial transaction system modeled through scenario - based Rule model and artificial intelligence algorithm to prevent financial transaction accidents by voice phishing. We propose an implementation model of artificial intelligence abnormal financial transaction detection system and an optimized countermeasure model that can block and respond to analysis and detection results.

A Study on the evolution theory of digital game rules (디지털 게임 규칙의 진화론에 관한 연구)

  • Chon, Suk;Yoon, Joon-Sung
    • Journal of Korea Game Society
    • /
    • v.9 no.1
    • /
    • pp.21-31
    • /
    • 2009
  • This research is to classify game rules which are important factors for the game, and to define the basis of the each level of rules and concepts. In terms of these definitions, the process of transformation in the game rule is analyzed, and examined the development related to evolution. The rule of digital game is analogous to the biological evolution. From this point of view, This research presents the structural similarities between the game rules and biological evolution. It is for the investigation of the development using new perspective and for the conceptualization of the process. Moreover it makes us rediscover the game as a scholastic research subject.

  • PDF

Exhibition Monitoring System using USN/RFID based on ECA (USN/RFID를 이용한 ECA기반 전시물 정보 모니터링 시스템)

  • Kim, Gang-Seok;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.95-100
    • /
    • 2009
  • Nowadays there are many studies and there's huge development about USN/RFID which have great developmental potential to many kinds of applications. More and more real time application apply USN/RFID technology to identify data collect and locate objects. Wide deployment of USN/RFID will generate an unprecedented volume of primitive data in a short time. Duplication and redundancy of primitive data will affect real time performance of application. Thus, security applications must filter primitive data and correlate them for complex pattern detection and transform them to events that provide meaningful, actionable information to end application. In this paper, we design a ECA Rule system for security monitoring of exhibition. This system will process USN/RFID primitive data and event and perform data transformation. It's had applied each now in exhibition hall through this study and efficient data transmission and management forecast that is possible.

  • PDF

Dynamic Characteristics of a Finite Beam Subjected to an Axial Force and Moving Loads with Constant Acceleration (일정가속도(一定加速度)의 이동하중(移動荷重)과 축하중(軸荷重)이 작용(作用)하는 유한(有限)보의 동특성(動特性))

  • Hong, Dong Pyo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.2 no.3
    • /
    • pp.67-74
    • /
    • 1982
  • The dynamic behaviour of an elastically supported finite beam subjected to an axial force and moving loads with acceleration is investigated. Within the Euler beam theory the solutions are obtained by using finite Fourier and Laplace transformation methods with respect to space and time variable. Integrations involved in the theoretical results are carried out by Simpson's rule. From the results of the theoretical analysis, it is evident that dynamic behaviour of the beam are affected remarkably by acceleration and axial force.

  • PDF

An Analysis on T-shirts Design (티셔츠 디자인에 대한 분석)

  • Choi Jung-Hwa
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.29 no.11
    • /
    • pp.1410-1420
    • /
    • 2005
  • The purpose of this study was to analyze characteristics of effective expression on T-shirts pattern by peirce's semiotic theory. The methods of this study was to analyze 721 T-shirts patterns in designer's collection from 2000 to 2004. The results of this study were as follows: First of all, iconic expression showed high frequency after 2000. Characteristics of effective expression were as follows: In geometric expression, repetition was presented as a symbolic sign by regular proportion and rule of dot, line, plane, irregularity, mixture of irregular dot, line, plane. Mixed expression was presented as a iconic and symbolic sign by collage, mixture of dot, line, plane, icon and letter. In iconic expression, simplification of iconic sigrl was presented as a iconic sign by simplification of form, color, texture, realistic expression using digital as a iconic sign, and symbolic face, body as a symbolic sign. Pop art's expression was presented as a iconic sign by a cartoon and commercial character and illusion was presented as a iconic sign. In letter's expression, brand logo was presented as a symbolic sign by transformation of letter's design, a symbolic sign of numeral by transformation of size, thickness, form, color. Symbolic message phrase was presented by slogan, fashion trend, brand image, descriptive indication message as a index sign by using icon or singleness. In conclusion, characteristics of effective expression on T-shirts pattern will present not only the theoretical foundation to raise the value added, but also the information about beauty sense of times, political and social value.

The extension of the largest generalized-eigenvalue based distance metric Dij1) in arbitrary feature spaces to classify composite data points

  • Daoud, Mosaab
    • Genomics & Informatics
    • /
    • v.17 no.4
    • /
    • pp.39.1-39.20
    • /
    • 2019
  • Analyzing patterns in data points embedded in linear and non-linear feature spaces is considered as one of the common research problems among different research areas, for example: data mining, machine learning, pattern recognition, and multivariate analysis. In this paper, data points are heterogeneous sets of biosequences (composite data points). A composite data point is a set of ordinary data points (e.g., set of feature vectors). We theoretically extend the derivation of the largest generalized eigenvalue-based distance metric Dij1) in any linear and non-linear feature spaces. We prove that Dij1) is a metric under any linear and non-linear feature transformation function. We show the sufficiency and efficiency of using the decision rule $\bar{{\delta}}_{{\Xi}i}$(i.e., mean of Dij1)) in classification of heterogeneous sets of biosequences compared with the decision rules min𝚵iand median𝚵i. We analyze the impact of linear and non-linear transformation functions on classifying/clustering collections of heterogeneous sets of biosequences. The impact of the length of a sequence in a heterogeneous sequence-set generated by simulation on the classification and clustering results in linear and non-linear feature spaces is empirically shown in this paper. We propose a new concept: the limiting dispersion map of the existing clusters in heterogeneous sets of biosequences embedded in linear and nonlinear feature spaces, which is based on the limiting distribution of nucleotide compositions estimated from real data sets. Finally, the empirical conclusions and the scientific evidences are deduced from the experiments to support the theoretical side stated in this paper.

CDISC Transformer: a metadata-based transformation tool for clinical trial and research data into CDISC standards

  • Park, Yu-Rang;Kim, Hye-Hyeon;Seo, Hwa-Jeong;Kim, Ju-Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1830-1840
    • /
    • 2011
  • CDISC (Clinical Data Interchanging Standards Consortium) standards are to support the acquisition, exchange, submission and archival of clinical trial and research data. SDTM (Study Data Tabulation Model) for Case Report Forms (CRFs) was recommended for U.S. Food and Drug Administration (FDA) regulatory submissions since 2004. Although the SDTM Implementation Guide gives a standardized and predefined collection of submission metadata 'domains' containing extensive variable collections, transforming CRFs to SDTM files for FDA submission is still a very hard and time-consuming task. For addressing this issue, we developed metadata based SDTM mapping rules. Using these mapping rules, we also developed a semi-automatic tool, named CDISC Transformer, for transforming clinical trial data to CDISC standard compliant data. The performance of CDISC Transformer with or without MDR support was evaluated using CDISC blank CRF as the 'gold standard'. Both MDR and user inquiry-supported transformation substantially improved the accuracy of our transformation rules. CDISC Transformer will greatly reduce the workloads and enhance standardized data entry and integration for clinical trial and research in various healthcare domains.

Progression of a persisting mesenchymal hamartoma to intrahepatic cholangiocarcinoma 24 years after the initial diagnosis: A case report

  • Sujin Gang;YoungRok Choi;Sola Lee;Su young Hong;Sanggyun Suh;Eui Soo Han;Suk Kyun Hong;Nam-Joon Yi;Kwang-Woong Lee;Kyung-Suk Suh
    • Annals of Hepato-Biliary-Pancreatic Surgery
    • /
    • v.26 no.4
    • /
    • pp.407-411
    • /
    • 2022
  • Mesenchymal hamartoma of the liver (MHL) is a rare benign tumor that often presents in early childhood, and it rarely occurs in adulthood. Aberrant development of the portal tract is a known cause of MHL. Although limited information is available on the natural course of MHL, malignant transformation has been reported in a few cases. Here, we report a case of a 26-year-old female with intrahepatic cholangiocarcinoma secondary to unresected MHL. The patient underwent resection of the hepatic mass, which was diagnosed as MHL at 2 years of age, due to an increase in mass size and a suspicion of malignant transformation during work-up. Histopathology confirmed intrahepatic adenosquamous carcinoma in the background of MHL, with a T2N0M0 pathological stage (stage II). The surgical margin was free from tumor cells. The patient fully recovered postoperatively and started receiving adjuvant chemotherapy. Previous case reports have only reported about the development of undifferentiated embryonal sarcoma or angiosarcoma as malignant transformation of MHL. Cases of other malignancies have not been published; however, it is difficult to rule out the occurrence of various malignancies related to the portal tract when considering the pathogenesis of the disease. To the best of our knowledge, this is the first case report of adenocarcinoma of bile duct origin secondary to MHL. This case report suggests that aggressive surgical management should be considered after the initial diagnosis of MHL.