The ordering of interface mapping rules in German object fronting

2020 ◽  
pp. 159-188
Keyword(s):  
2013 ◽  
Vol 770 ◽  
pp. 361-365
Author(s):  
Yu Peng Xin ◽  
Xi Tian Tian ◽  
Li Jiang Huang ◽  
Jun Hao Geng

In order to improve the efficiency of NC machining programming, and realize the rapid establishment of blank model or middle blank model, a geometrical modeling method of process driven by typical process model was put forward. This method is based on the typical process for the establishment of typical process model, to establish a mapping between modeling operation and machining process ontology, and format model mapping rules. In the process geometrical modeling of the high similarity parts, by calling the typical process model mapping rules, can generate process models automatically. A enterprise disc type parts typical process as an example is used to verify the proposed method.


2013 ◽  
Vol 670 ◽  
pp. 208-215
Author(s):  
Ying Che ◽  
G. Wang ◽  
M. Lv ◽  
B.Y. Ren

The model transformation from Computation Independent Model (CIM) to Platform Independent Model (PIM) level is one of the crucial and difficult points in the implementation process of model-driven Enterprise Resource Planning (ERP) system. For achieving the semantic conforming transformation between these two abstract modeling levels in Model Driven Architecture (MDA), a model transformation method based on ontology technology was proposed, which was a semi-automatic and general method. Firstly, the existing problems of model transformation from CIM level to PIM level in current studies were analyzed. Then, a model transformation framework based on ontology was built, the basic concepts relating to ontology were defined, and the whole architecture was described. After that, the transformation method was researched from two parts, the discovering of mapping rules and the occurrence of model transformation, which included the discovering technology of mapping rules based on similarity and the working principles of model transformation generator. Finally, a model transformation example was provided for validating the practicability and feasibility of proposed theories.


Author(s):  
Nuogang Sun ◽  
Youyun Zhang ◽  
Xuesong Mei

Faithfully obtaining design specifications from customer requirements is essential for successful designs. The natural lingual, inexact, incomplete and vague attributes of customer requirements make it very difficult to map customer requirements to design specifications. In general design process, the design specifications are determined by designers based on their experience and intuition, and often a certain target value is set for a specification. However, it is on one hand very difficult, on the other hand unreasonable, so a suitable limit range rather than a certain value is preferred at the beginning of design, especially at the concept design process. In this paper, a simplified systematic approach of transforming customer requirements to design specifications is proposed. First, a two-stepped clustering approach for grouping customer requirements and design specifications based on HOQ matrix is presented, by which the mapping is limited to within each group. To further simplify the inference mapping rules of customer requirements and design specifications, the minimal condition inference mapping rules for each design specification are extracted based on rough set theory. In the end, a suitable value range is determined for a specification by applying the fuzzy rule matrix.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5242
Author(s):  
Mingyuan Cao ◽  
Lihua Tian ◽  
Chen Li

Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the research about mapping rules and distortion functions while ignoring the fact that adaptive steganography may not be suitable for video steganography based on the intra-prediction mode; this is because the adaptive steganography algorithm must first calculate the loss of all cover before the first secret message is embedded. However, the modification of an IPM may change the pixel values of the current block and adjacent blocks, which will lead to the change of the loss of the following blocks. In order to avoid this problem, a new secure video steganography based on a novel embedding strategy is proposed in this paper. Video steganography is combined with video encoding. Firstly, the frame is encoded by an original encoder and all the relevant information is saved. The candidate block is found according to the relevant information and mapping rules. Then every qualified block is analyzed, and a one-bit message is embedded during intra-prediction encoding. At last, if the IPM of this block is changed, the values of the residual are modified in order to keep the optimality of the modified IPM. Experimental results indicate that our algorithm has good security performance and little impact on video quality.


Author(s):  
Peretz Shoval

This chapter first explains the need to map a class diagram to a relational schema. Then, most of the chapter is dedicated to presenting and demonstrating the mapping rules based on which a relational schema (made of normalized relations) is created. The mapping process is demonstrated with several comprehensive examples.


Sign in / Sign up

Export Citation Format

Share Document