• Title/Summary/Keyword: 결함 관리 기법

Search Result 2,857, Processing Time 0.032 seconds

Proposition of causal association rule thresholds (인과적 연관성 규칙 평가 기준의 제안)

  • Park, Hee Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.6
    • /
    • pp.1189-1197
    • /
    • 2013
  • Data mining is the process of analyzing a huge database from different perspectives and summarizing it into useful information. One of the well-studied problems in data mining is association rule generation. Association rule mining finds the relationship among several items in massive volume database using the interestingness measures such as support, confidence, lift, etc. Typical applications for this technique include retail market basket analysis, item recommendation systems, cross-selling, customer relationship management, etc. But these interestingness measures cannot be used to establish a causality relationship between antecedent and consequent item sets. This paper propose causal association thresholds to compensate for this problem, and then check the three conditions of interestingness measures. The comparative studies with basic and causal association thresholds are shown by numerical example. The results show that causal association thresholds are better than basic association thresholds.

A Recursive Procedure for Mining Continuous Change of Customer Purchase Behavior (고객 구매행태의 지속적 변화 파악을 위한 재귀적 변화발견 방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Choi, Ju-Cheol;Song, Hee-Seok;Cho, Yeong-Bin
    • Information Systems Review
    • /
    • v.8 no.2
    • /
    • pp.119-138
    • /
    • 2006
  • Association Rule Mining has been successfully used for mining knowledge in static environment but it provides limited features to discovery time-dependent knowledge from multi-point data set. The aim of this paper is to develop a methodology which detects changes of customer behavior automatically from customer profiles and sales data at different multi-point snapshots. This paper proposes a procedure named 'Recursive Change Mining' for detecting continuous change of customer purchase behavior. The Recursive Change Mining Procedure is basically extended association rule mining and it assures to discover continuous and repetitive changes from data sets which collected at multi-periods. A case study on L department store is also provided.

Numerical simulation of VOC decomposition in an arc plasma reactor (수치해석 기법을 이용한 아크 플라즈마 반응기의 VOCs 분해성능 평가연구)

  • Park, Mi-jeong;Jo, Young-min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.1-7
    • /
    • 2016
  • A range of techniques have been being developed to remove the volatile organic compounds from paining processes. High temperature decomposition of harmful VOCs using arc plasma has recently been proposed, and this work analyzed the extreme hot process by computer-aided fluid dynamics prior to the reactor design. Numerical simulations utilized the conservation equations of mass and momentum. The simulation showed that the fluid flowed down along the inner surface of the centrifugal reactor by forming intensive spiral trajectories. Although the high temperature gas generated by plasma influences the bottom of the reactor, no heat transfer in radial direction appeared. The decomposition efficiency of a typical VOCs, toluene, was found to be a maximum of 67% across the reactor, which was similar to the value (approximately 70%) for the lab-scale test.

The Study of Software Reliability Model from the Perspective of Learning Effects for Burr Distribution (Burr분포 학습 효과 특성을 적용한 소프트웨어 신뢰도 모형에 관한 연구)

  • Kim, Dae-Soung;Kim, Hee-Cheul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4543-4549
    • /
    • 2011
  • In this study, software products developed in the course of testing, software managers in the process of testing software test and test tools for effective learning effects perspective has been studied using the NHPP software. The Burr distribution applied to distribution was based on finite failure NHPP. Software error detection techniques known in advance, but influencing factors for considering the errors found automatically and learning factors, by prior experience, to find precisely the error factor setting up the testing manager are presented comparing the problem. As a result, the learning factor is greater than automatic error that is generally efficient model could be confirmed. This paper, a numerical example of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection were efficient using the mean square error and $R^2$.

A Study on Online Detection Schemes of Earthquake Induced Shifts in Coordinate Time Series of GNSS Continuous Operation Reference Station by Kalman Filtering (칼만필터에 기반한 GNSS 상시관측소 좌표 시계열의 지진에 따른 편의검출 기법에 관한 연구)

  • Lee, Hungkyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.662-671
    • /
    • 2020
  • It is crucial to manage and maintain the geodetic reference coordinates of GNSS continuously operating reference stations (CORSs) in consideration of their fundamental roles in geodetic control and positioning navigation infrastructure. Earthquake-induced crustal displacement directly impacts the reference coordinates, so such events should be promptly detected, and appropriate action should be made to maintain the target accuracy, including update of the geodetic coordinates. To this end, this paper deals with online schemes for the detection of persistent shifts in the coordinate time-series produced by an automatic GNSS processing system. Algorithms were implemented to test filtered results, such as hypothesis tests of the innovation sequence of a Kalman filter and a cumulative sum (CUSUM) test. The results were assessed by the time-series of coordinates of 14 CORS for two years, including the 2011 Tohoku earthquake. The results show that the global hypothesis test is practical for detecting abrupt jumps, whereas CUSUM is effective for identifying persistent shifts.

Influence Analysis on the Lung Function due to Smoking Using Image Processing Techniques (영상 처리 기법을 이용한 흡연이 폐 기능에 미치는 영향 분석)

  • Kim, Bong-Hyun;Cho, Dong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7C
    • /
    • pp.610-618
    • /
    • 2012
  • In this paper, using a image processing techniques to develop an color analysis program to apply the influence analysis by smoking were analyzed. So, this study was conducted to analyze is based on oriental medicine diagnosis theory, especially ocular inspection, of the right cheek area of the lung and lung function and weakness associated with it closer to white by applying IT image processing techniques based on smoking to compare the change in color according to the face. From this, 15 patients with 20 male subjects before and after smoking extract the color of the area on the right cheek, a values and b values in Lab digital color system were analyzed by smoking how to analyze what is changing. Also, health care system based on this variation reflects the individual, personalized will be constructed. Experimental results on the right cheek area approach to the color white according to the amounts of smoking, this is by smoking adversely affects lungs function that can be analyzed.

A Handoff Improvement Method for AP Choose Guarantee Network Performance of Mobile Node in Wireless LAN Systems (무선랜 시스템에서 모바일 노드의 네트워크 성능을 보장하는 AP 선택을 위한 핸드오프 개선기법)

  • Kim, Dong-Geun;Kim, Sang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.55-63
    • /
    • 2010
  • On Handoff, existing AP search has chosen one of various APs according to signal strength. However IEEE 802.11 uses Medium Access method with CSMA/CA(Carrier Sensing Multiple Access /Collision Avoidance) that competes to obtain a channel by sharing common medium. For that reason, network performance is heavily affected by the number of nodes and network congestion aside from signal strength. Consequently, in this paper we propose the method that choose one AP which ensures more improved network performance and set up a link, reflecting AP network information in Handoff area, on Handoff in the process of AP selection. We also demonstrate through simulation that it gets maximum performance even in the wireless network which many users concurrently access to, and it has considerable effects on aspects of resources and network management by distribution of users.

Dynamic Voltage and Frequency Scaling based on Buffer Memory Access Information (버퍼 메모리 접근 정보를 활용한 동적 전압 주파수 변환 기법)

  • Kwak, Jong-Wook;Kim, Ju-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.1-10
    • /
    • 2010
  • As processor platforms are continuously moving toward wireless mobile systems, embedded mobile processors are expected to perform more and more powerful, and therefore the development of an efficient power management algorithm for these battery-operated mobile and handheld systems has become a critical challenge. It is well known that a memory system is a main performance limiter in the processor point of view. Although many DVFS studies have been considered for the efficient utilization of limited battery resources, recent works do not explicitly show the interaction between the processor and the memory. In this research, to properly reflect short/long-term memory access patterns of the embedded workloads in wireless mobile processors, we propose a memory buffer utilization as a new index of DVFS level prediction. The simulation results show that our solution provides 5.86% energy saving compared to the existing DVFS policy in case of memory intensive applications, and it provides 3.60% energy saving on average.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Analysis of Power Consumption for Embedded Software using UML State Machine Diagram (UML 상태 기계를 이용한 임베디드 소프트웨어의 소모 전력 분석)

  • Lee, Jae-Wuk;Hong, Jang-Eui
    • The KIPS Transactions:PartD
    • /
    • v.19D no.4
    • /
    • pp.281-292
    • /
    • 2012
  • A wide variety of smartphone applications is increasing the usage time of smartphone. Due to the increased time, it becomes difficult to providing stable services to users with limited battery capacity. The past works have been performed the power management of mobile device toward long-lasting battery development or low-power electric devices. However as the complexity of software embedded into system are increased, the research interests of the software power analysis is also increased. Among these studies on the software power analysis, model-based analysis technique is one of major interests because it can be able to analyze the power consumption before the development of source codes, then the analysis result can be used in the development of the software system, This paper suggests a model-based power analysis technique using UML state machine diagram. Our proposed technique estimates the power consumption by the simulation of Perti-net which is transformed from the state machine diagram.