• Title/Summary/Keyword: User-defined Model

Search Result 410, Processing Time 0.024 seconds

On knowledge-based modeler for network analysis (네트워크 분석을 위한 지식기반형 모형기 개발)

  • 이호창
    • Korean Management Science Review
    • /
    • v.12 no.3
    • /
    • pp.135-161
    • /
    • 1995
  • This paper is concerned with a conceptual design of a knowledge-based modeler for network analysis. The "knowledge-based modeler" approach is suggested as a method for incorporating the user's qualitative knowledge and subjective decison in the course of the mathematical modeling and the subsequent solution procedure. The submodules of the proposed modeler such as database, model/algorithm base and functional knowledge bases are identified and the flows of information between the submodules are sequentially defined. A prototype system is implemented for experimental purpose by using the application software GURU.ware GURU.

  • PDF

Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌)

  • Nam Seung-Jwa;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2005
  • Traditional access control models like role-based access control model are insufficient in security needs in ubiquitous computing environment because they take no thought of access control based on user's context or environment condition. In these days, although researches on context-aware access control using user's context or environment conditions based on role-based access control are emerged, they are on the primary stage. We present context definitions md an access control model to provide more flexible and dynamic context-aware access control based on role-based access control. Specially, we describe the conflict problems occurred in the middle of making an access decision. After classifying the conflict problems, we show some resolutions to solve them. In conclusion, we will lay the foundations of the development of security policy and model assuring right user of right object(or resource) and application service through pre-defined context and context classification in ubiquitous computing environments. Beyond the simplicity of access to objects by authorized users, we assure that user can access to the object, resource, or service anywhere and anytime according to right context.

A Query Processing Model based on the XML View in Relational Databases (관계형 데이터베이스에서 XML 뷰 기반의 질의 처리 모델)

  • Jung, Chai-Young;Choi, Kyu-Won;Kim, Young-Ok;Kim, Young-Kyun;Kang, Hyun-Syug;Bae, Jong-Min
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.221-232
    • /
    • 2003
  • This paper addresses the query processing component of a wrapper system for a relational database model based on the XML view in integrating databases. The schema of a relational database is represented as XML Schema that is proposed by W3C. Users submit a query using the XML query language XQuery over the XML Schema. The wrapper system to be developed supports an user-defined XML view. XQuery is also used as the view definition language. In this environment, this paper suggests a new XML query processing model. We propose the composition algorithm of an XML view with an user query, the translation algorithm of XQuery into SQL, and the XML template construction algorithm for generating XML documents.

Replacement Model Following the Expiration of Free RRNMW (무료 재생교체-비재생수리보증이 종료된 이후의 교체모형)

  • Jung, Ki-Mun
    • Communications for Statistical Applications and Methods
    • /
    • v.18 no.6
    • /
    • pp.697-705
    • /
    • 2011
  • This paper proposes an optimal replacement policy following the expiration of a free renewing replacement-non-renewing minimal repair warranty. To do so, the free renewing replacement-non-renewing minimal repair warranty is defined and then the maintenance model following the expiration of free renewing replacement-non-renewing minimal repair warranty from the user's point of view is studied. As the criteria to determine the optimality of the maintenance policy, we consider the expected cost rate per unit time from the user's perspective. We derive the expressions for the expected cycle length and the expected total cost to obtain the expected cost rate per unit time. Finally, the numerical examples are presented for illustrative purposes.

An XML Query Processing Model based on XML View Tree (XML 뷰 트리 기반의 XML 질의 처리 모델)

  • Jung, Chai-Young;Kim, Hyun-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.19-27
    • /
    • 2006
  • This paper presents a query processing model in a wrapper based on the XML view tree. The query processing in a wrapper requires view composition, query translation into local sources, and generation of XML documents from local query results. We present a query processing model based on the view tree, where the XML views and the XML query is represented by the view tree. Since the view tree keeps the structure of a virtual XML document, it is easy to navigate the path expression. The view tree is also used as a template for schema generation and XML document generation as a query result. Moreover this conceptual uniform abstraction for the XML view and the user query makes it easy to support a multi-level XML view and to implement our composition mechanism.

  • PDF

A Multi-category Task for Bitrate Interval Prediction with the Target Perceptual Quality

  • Yang, Zhenwei;Shen, Liquan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4476-4491
    • /
    • 2021
  • Video service providers tend to face user network problems in the process of transmitting video streams. They strive to provide user with superior video quality in a limited bitrate environment. It is necessary to accurately determine the target bitrate range of the video under different quality requirements. Recently, several schemes have been proposed to meet this requirement. However, they do not take the impact of visual influence into account. In this paper, we propose a new multi-category model to accurately predict the target bitrate range with target visual quality by machine learning. Firstly, a dataset is constructed to generate multi-category models by machine learning. The quality score ladders and the corresponding bitrate-interval categories are defined in the dataset. Secondly, several types of spatial-temporal features related to VMAF evaluation metrics and visual factors are extracted and processed statistically for classification. Finally, bitrate prediction models trained on the dataset by RandomForest classifier can be used to accurately predict the target bitrate of the input videos with target video quality. The classification prediction accuracy of the model reaches 0.705 and the encoded video which is compressed by the bitrate predicted by the model can achieve the target perceptual quality.

Design Patterns for Building Context-Aware Transactional Services in PaaS-Enabled Systems

  • Ettazi Widad;Riane Driss;Nassar Mahmoud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.91-100
    • /
    • 2023
  • Pervasive computing is characterized by a key characteristic that affects the operating environment of services and users. It places more emphasis on dynamic environments where available resources continuously vary without prior knowledge of their availability, while in static environments the services provided to users are determined in advance. At the same time, Cloud computing paradigm introduced flexibility of use according to the user's profile and needs. In this paper, we aimed to provide Context-Aware Transactional Service applications with solutions so that it can be integrated and invoked like any service in the digital ecosystem. Being able to compose is not enough, each service and application must be able to offer a well-defined behavior. This behavior must be controlled to meet the dynamicity and adaptability necessary for the new user's requirements. The motivation in this paper is to offer design patterns that will provide a maximum of automatism in order to guarantee short reaction times and minimal human intervention. Our proposal includes a cloud service model by developing a PaaS service that allows CATS adaptation. A new specification for the validation of CATS model has been also introduced using the ACTA formalism.

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization

  • Chen, Lu;Tang, Hongbo;Zhao, Yu;You, Wei;Wang, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2490-2506
    • /
    • 2022
  • In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.

3-D Facial Motion Estimation using Extended Kalman Filter (확장 칼만 필터를 이용한 얼굴의 3차원 움직임량 추정)

  • 한승철;박강령김재희
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.883-886
    • /
    • 1998
  • In order to detect the user's gaze position on a monitor by computer vision, the accurate estimations of 3D positions and 3D motion of facial features are required. In this paper, we apply a EKF(Extended Kalman Filter) to estimate 3D motion estimates and assumes that its motion is "smooth" in the sense of being represented as constant velocity translational and rotational model. Rotational motion is defined about the orgin of an face-centered coordinate system, while translational motion is defined about that of a camera centered coordinate system. For the experiments, we use the 3D facial motion data generated by computer simulation. Experiment results show that the simulation data andthe estimation results of EKF are similar.e similar.

  • PDF

The Effects of Combustion Parameters on the Characteristics of a Steam-Methane Reformer (연소 변수가 수증기-메탄 개질기의 특성에 미치는 영향)

  • Lee, Jae-Seong;Kim, Ho-Young
    • 한국연소학회:학술대회논문집
    • /
    • 2012.04a
    • /
    • pp.29-31
    • /
    • 2012
  • The effects of combustion parameters on the characteristics of a steam-methane reformer. The reformer system was numerically simulated using a simplified two-dimensional axisymmetric model domain with an appropriate user-defined function. The fuel ratio, defined as the ratio of methane flow rate in the combustor to that in the reactor, was varied from 20 to 80%. The equivalence ratio was changed from 0.5 to 1.0. The results indicated that as the fuel ratio increased, the production rates of hydrogen and carbon monoxide increased, although their rates of increase diminished. In fact, at the highest heat supply rates, hydrogen production was actually slightly decreased. Simulations showed that equivalence ratio of 0.7 yielded the highest steam-methane mixture temperature despite a 43% higher air flow rate than the stoichiometric flow rate. This means that the production of hydrogen and carbon monoxide can be increased by adjusting the equivalence ratio, especially when the heat supply is insufficient.

  • PDF