• Title/Summary/Keyword: node attribute

Search Result 50, Processing Time 0.024 seconds

An SML Compiler Generator Using Attribute Grammar and XMLSchema (속성 문법과 XMLSchema를 이용한 XML 컴파일러 생성기)

  • Choi Jong-Myung;Park Ho-Byung
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.9
    • /
    • pp.810-821
    • /
    • 2006
  • As XML is widely used across the computer related fields, and it costs expensive for its compiler, the study on the automatic generation of the compiler is becoming important. In addition, though the XMLSchema became a standard, there have been few works on the automatic compiler generation for XML applications based on the XMLSchema. In this paper, we introduce a method that we can automatically generate a compiler for an XML application based on the XMLSchema. Our XML compiler generator uses data type information in XMLSchema document and semantic information in another file and produces semantic classes and a compiler for the XML application. The compiler parses an XML document, builds a tree in which each node is an instance of semantic class, and processes the document through the traversal of the tree.

Providing survivability for virtual networks against substrate network failure

  • Wang, Ying;Chen, Qingyun;Li, Wenjing;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4023-4043
    • /
    • 2016
  • Network virtualization has been regarded as a core attribute of the Future Internet. In a network virtualization environment (NVE), multiple heterogeneous virtual networks can coexist on a shared substrate network. Thus, a substrate network failure may affect multiple virtual networks. In this case, it is increasingly critical to provide survivability for the virtual networks against the substrate network failures. Previous research focused on mechanisms that ensure the resilience of the virtual network. However, the resource efficiency is still important to make the mapping scheme practical. In this paper, we study the survivable virtual network embedding mechanisms against substrate link and node failure from the perspective of improving the resource efficiency. For substrate link survivability, we propose a load-balancing and re-configuration strategy to improve the acceptance ratio and bandwidth utilization ratio. For substrate node survivability, we develop a minimum cost heuristic based on a divided network model and a backup resource cost model, which can both satisfy the location constraints of virtual node and increase the sharing degree of the backup resources. Simulations are conducted to evaluate the performance of the solutions. The proposed load balancing and re-configuration strategy for substrate link survivability outperforms other approaches in terms of acceptance ratio and bandwidth utilization ratio. And the proposed minimum cost heuristic for substrate node survivability gets a good performance in term of acceptance ratio.

A Path Storing and Number Matching Method for Management of XML Documents using RDBMS (RDBMS를 이용하여 XML 문서 관리를 위한 경로 저장과 숫자 매칭 기법)

  • Vong, Ha-Ik;Hwang, Byung-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.807-816
    • /
    • 2007
  • Since W3C proposed XML in 1996, XML documents have been widely spreaded in many internet documents. Because of this, needs for research related with XML is increasing. Especially, it is being well performed to study XML management system for storage, retrieval, and management with XML Documents. Among these studies, XRel is a representative study for XML management and has been become a comparative study. In this study, we suggest XML documents management system based on Relational DataBase Management System. This system is stored not all possible path expressions such as XRel, but filtered path expression which has text value or attribute value. And by giving each node Node Expression Identifier, we try to match given Node Expression Identifier. Finally, to prove efficiency of the suggested technique, this paper shows the result of experiment that compares XPath query processing performance between suggested study and existing technique, XRel.

  • PDF

Energy conserving routing algorithm based on the direction for Mobile Ad-hoc network (모바일 에드 혹 네트워크에서 노드의 방향성을 고려한 에너지 효율적 라우팅 알고리즘 연구)

  • Oh, Young-Jun;Lee, Kong-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2699-2707
    • /
    • 2013
  • We proposed the context-awareness routing algorithm DDV (Dynamic Direction Vector)-hop algorithm at Mobile Ad-hoc Network(MANET). MANET has problem about dynamic topology, the lack of scalability of the network by mobile of node. By mobile of node, energy consumption rate is different. So it is important choosing routing algorithms for the minium of energy consumption rate. DDV-hop algorithms considers of the attribute of mobile node, create a cluster and maintain. And it provides a path by searching a route more energy efficient. We apply mobile of node by direction and time, the alogorighm of routning path and energy efficiency clustering is provided, it is shown the result of enery consumption that is optimized for the network.

A new security model in p2p network based on Rough set and Bayesian learner

  • Wang, Hai-Sheng;Gui, Xiao-Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2370-2387
    • /
    • 2012
  • A new security management model based on Rough set and Bayesian learner is proposed in the paper. The model focuses on finding out malicious nodes and getting them under control. The degree of dissatisfaction (DoD) is defined as the probability that a node belongs to the malicious node set. Based on transaction history records local DoD (LDoD) is calculated. And recommended DoD (RDoD) is calculated based on feedbacks on recommendations (FBRs). According to the DoD, nodes are classified and controlled. In order to improve computation accuracy and efficiency of the probability, we employ Rough set combined with Bayesian learner. For the reason that in some cases, the corresponding probability result can be determined according to only one or two attribute values, the Rough set module is used; And in other cases, the probability is computed by Bayesian learner. Compared with the existing trust model, the simulation results demonstrate that the model can obtain higher examination rate of malicious nodes and achieve the higher transaction success rate.

Topology-aware Virtual Network Embedding Using Multiple Characteristics

  • Liao, Jianxin;Feng, Min;Li, Tonghong;Wang, Jingyu;Qing, Sude
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.145-164
    • /
    • 2014
  • Network virtualization provides a promising tool to allow multiple heterogeneous virtual networks to run on a shared substrate network simultaneously. A long-standing challenge in network virtualization is the Virtual Network Embedding (VNE) problem: how to embed virtual networks onto specific physical nodes and links in the substrate network effectively. Recent research presents several heuristic algorithms that only consider single topological attribute of networks, which may lead to decreased utilization of resources. In this paper, we introduce six complementary characteristics that reflect different topological attributes, and propose three topology-aware VNE algorithms by leveraging the respective advantages of different characteristics. In addition, a new KS-core decomposition algorithm based on two characteristics is devised to better disentangle the hierarchical topological structure of virtual networks. Due to the overall consideration of topological attributes of substrate and virtual networks by using multiple characteristics, our study better coordinates node and link embedding. Extensive simulations demonstrate that our proposed algorithms improve the long-term average revenue, acceptance ratio, and revenue/cost ratio compared to previous algorithms.

Shortest Path Search Scheme with a Graph of Multiple Attributes

  • Kim, Jongwan;Choi, KwangJin;Oh, Dukshin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.135-144
    • /
    • 2020
  • In graph theory, the least-cost path is discovered by searching the shortest path between a start node and destination node. The least cost is calculated as a one-dimensional value that represents the difference in distance or price between two nodes, and the nodes and edges that comprise the lowest sum of costs between the linked nodes is the shortest path. However, it is difficult to determine the shortest path if each node has multiple attributes because the number of cost types that can appear is equal to the number of attributes. In this paper, a shortest path search scheme is proposed that considers multiple attributes using the Euclidean distance to satisfy various user requirements. In simulation, we discovered that the shortest path calculated using one-dimensional values differs from that calculated using the Euclidean distance for two-dimensional attributes. The user's preferences are reflected in multi attributes and it was different from one-dimensional attribute. Consequently, user requirements could be satisfied simultaneously by considering multiple attributes.

A Selective Protection Scheme for Scalable Video Coding Based on Dependency Graph Model

  • Hendry, Hendry;Kim, Munchurl
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.11a
    • /
    • pp.78-81
    • /
    • 2010
  • In this paper, we propose an efficient and effective selective protection scheme to SVC that exploit the propagation of protection effect by protecting significant frames that can give the maximum visual quality degradation. We model SVC dependency coding structure as a directed acyclic graph which is characterized with an estimated visual quality value as the attribute at each node. The estimated visual quality is calculated by using our model based on the proportions of intra- and inter-predicted MBs, amounts of residual, and estimated visual quality of reference frames. The proposed selective protection scheme traverses the graph to find optimal protection paths that can give maximum visual quality degradation. Experimental results show that the proposed selective protection scheme reduces the required number of frames to be protected by 46.02% compared to the whole protection scheme and 27.56% compared to the layered protection scheme.

  • PDF

Duty Cycle Research for Energy Consumption Efficiency under the IoT Wireless Environment

  • Woo, Eun-Ju;Moon, Yu-Sung;Choi, Ung-Se;Kim, Jung-Won
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1210-1213
    • /
    • 2018
  • In this paper, we propose a method to reduce the amount of current through the Timing Control of the duty cycle and the Report Attribute Control at the MAC Layer in consideration of the Sleep Mode under the IoT wireless environment. The use of a duty cycle is an effective way to reduce energy consumption on wireless sensor networks where the node is placed in sleep mode periodically. In particular, we studied how to control power efficiency through duty rate in Short Transition Time and ACK Time processing while satisfying radio channel limitation criterion. When comparing before and after the improvement considering the delay time constraint, we validated the correlation of the electrical current reduction.

A Study on the Improvement Method for Efficient Service of E-GEN AED using Time and Spatial Data (시·공간 데이터를 활용한 E-GEN AED의 효율적 서비스를 위한 개선방안)

  • Beak, Seong Ryul;Kim, Jun Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.4
    • /
    • pp.253-265
    • /
    • 2019
  • In this study were analyzed the errors on the registration of details information, location of E-GEN (Emergency medical-GEN) AED (Automated External Defibrillator) installation site and the adequacy of spatial arrangement, which suggests an improvement methods of constructing an app or web based on time and space data for efficient operation of considering accessibility and usability. As a result of this study, first, it was not equal to each other for locations of each installation point of AED, that confirmed some area were dense or requiring additional installation. Second, it confirmed the inaccuracies in inputting and registering information about the installed location, such as the actual installation location information and the attribute information of the AED. Third, the main access node and the main address node were connected to a straight line that was found not be connected to the back door, the straight line, the stairs. Also, the opening times of AED installation sites varied according to the week and the season, the entrance was managed by the apartment management office in a separate place, it needs to be established on this information. In conclusion, it proposed a method to improve spatial equity and accessibility, a method to provide accurate distance and time according to actual movement routes in case of emergency, and a possibility of using each facility considering day and time.