• Title/Summary/Keyword: 규칙식별

Search Result 166, Processing Time 0.023 seconds

Mining of Subspace Contrasting Sample Groups in Microarray Data (마이크로어레이 데이터의 부공간 대조 샘플집단 마이닝)

  • Lee, Kyung-Mi;Lee, Keon-Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.5
    • /
    • pp.569-574
    • /
    • 2011
  • In this paper, we introduce the subspace contrasting group identification problem and propose an algorithm to solve the problem. In order to identify contrasting groups, the algorithm first determines two groups of which attribute values are in one of the contrasting ranges specified by the analyst, and searches for the contrasting groups while increasing the dimension of subspaces with an association rule mining strategy. Because the dimension of microarray data is likely to be tens of thousands, it is burdensome to find all contrasting groups over all possible subspaces by query generation. It is very useful in the sense that the proposed method allows to find those contrasting groups without analyst's involvement.

Navigational Anomaly Detection using a Traffic Network Model (교통 네트워크 모델 기반 이상 운항 선박 식별에 관한 연구)

  • Jaeyong Oh;Hye-Jin Kim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.828-835
    • /
    • 2023
  • Vessel traffic service operators (VTSOs) need to quickly and accurately analyze the maritime traffic situation in the vessel traffic service (VTS) area and provide information to the vessels. However, if traf ic increases rapidly, the workload of VTSOs increases, and they may not be able to provide adequate information. Therefore, it is essential to develop VTSO support technologies that can reduce their workload and provide consistent information. In this paper, we propose a model for automatically detecting abnormal vessels in the VTS area. The proposed model consists of a positional model and a contextual model and is specifically optimized for the traffic characteristics of the target area. The implemented model was tested by using real-world data collected at a test center (Daesan Port VTS). Our experiments confirmed that the model could automatically detect various abnormal situations, and the results were validated through expert evaluation.

The Study on the Directions of KCR4 under the New ICP 2009 (국제목록원칙 2009 제정에 따른 한국목록규칙의 방향성에 관한 연구)

  • Lee, Mi-Hwa
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.261-280
    • /
    • 2012
  • This study seeks to replace PaRIS Principles and find directions of revising KCR4 by analyzing the international Cataloging Principles 2009(ICP 2009) established in the environment of Machine Readable Cataloging. ICP 2009 was reflected in cataloging rules such as RDA and ISBD 2010 as the minimal principles for uniformity in establishing each nation's cataloging rules. In contrary, KCR4 needs to be revised because it has never been changed after 2003, and has only description rules without any rules for the choice and forms of access points. Therefore, this study aims to grasp requirements that should be reflected in KCR4 through analyzing ICP 2009. In first step, it is to grasp the features of ICP 2009 by comparing PaRIS Principle and ICP 2009 and to compare KCR4 in aspects of ICP 2009. The detailed elements for comparison between ICP 2009 and KCR4 are scope, general principles, entitles, attributes, and relationships, objectives and functions of the catalogue, bibliographic description, access points, foundations for search capabilities as the contents of ICP 2009. As a result, this study could give some directions of KCR4 in the future. First, ISBD 2010 and conceptual models should be reflected in KCR4 in description. Second, it should regulate the authority access points in KCR4 based on ICP 2009. Third, it will describe essential access points of work and expression attributes in bibliographic records and authority records to find works and expression. This study will contribute to guide the national cataloging rules.

A Design of DDPT(Dynamic Data Protection Technique) using k-anonymity and ℓ-diversity (k-anonymity와 ℓ-diversity를 이용한 동적 데이터 보호 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.217-224
    • /
    • 2011
  • This paper proposes DDPT(Dynamic Data Protection Technique) which solves the problem of private information exposure occurring in a dynamic database environment. The DDPT in this paper generates the MAG(Multi-Attribute Generalization) rules using multi-attributes generalization algorithm, and the EC(equivalence class) satisfying the k-anonymity according to the MAG rules. Whenever data is changed, it reconstructs the EC according to the MAC rules, and protects the identification exposure which is caused by the EC change. Also, it measures the information loss rates of the EC which satisfies the ${\ell}$-diversity. It keeps data accuracy by selecting the EC which is less than critical value and enhances private information protection.

A Method for Generating Rule-based Fault Diagnosis Knowledge on Smart Home Environment (스마트 홈 환경에서 규칙 기반의 오류 진단 지식 생성 방법)

  • Ryu, Dong-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2741-2749
    • /
    • 2009
  • There have been many researches to detect and recover from faults on smart home environment, because these faults should lower its reliability. while, most of these researches have addressed functional defects of devices or software malfunction, few attempts have been made to deal with faults which may occur due to the inter relationships among devices. In this paper, we define the relationships among devices as rules, and propose a method for generating fault diagnosis knowledge which defines the symptoms and causes of faults. We classify the contexts of devices into two sets, depending on whether it satisfies the rules or not. when this method is applied to smart home environment, it is feasible not only to detect faults that may occur due to the relationships among devices but to identify their causes at real time.

A Study On the Integration Reasoning of Rule-Base and Case-Base Using Rough Set (라프집합을 이용한 규칙베이스와 사례베이스의 통합 추론에 관한 연구)

  • Jin, Sang-Hwa;Chung, Hwan-Mook
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.1
    • /
    • pp.103-110
    • /
    • 1998
  • In case of traditional Rule-Based Reasoning(RBR) and Case-Based Reasoning(CBR), although knowledge is reasoned either by one of them or by the integration of RBR and CBR, there is a problem that much time should be consumed by numerous rules and cases. In order to improve this time-consuming problem, in this paper, a new type of reasoning technique, which is a kind of integration of reduced RB and CB, is to be introduced. Such a new type of reasoning uses Rough Set, by which we can represent multi-meaning and/or random knowledge easily. In Rough Set, solution is to be obtained by its own complementary rules, using the process of RB and CB into equivalence class by the classification and approximation of Rough Set. and then using reduced RB and CB through the integrated reasoning.

  • PDF

The Study on the FRBR Adoption into Cataloging Rule Focused on its Expression Level (표현형 계층을 중심으로 한 FRBR 모형 분석 및 목록 체계 수용에 관한 연구)

  • Cho Jane
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.2
    • /
    • pp.221-239
    • /
    • 2005
  • FRBR, as is new conceptual model of bibliography based on entity-relation model, direct to revision of AACR 3.JSC has progressed work to adopt FRBR conceptual model into cataloging rule, especially for solving the problem of expression level, propose to overall change of uniform title & GMD. This study considers the matters about expression level of FRBR model. And examine possibility of adoption FRBR model to domestic cataloging rule and making out practice.

  • PDF

Validation Test Codes Development of Static Analysis Tool for Secure Software (안전한 소프트웨어 개발을 위한 정적분석 도구 시험코드 개발)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.420-427
    • /
    • 2013
  • Recently, for secure software development, static analysis tools have been used mostly to analyze the source code of the software and identify software weaknesses caused of vulnerabilities. In order to select the optimal static analysis tool, both weaknesses rules and analysis capabilities of the tool are important factors. Therefore, in this paper we propose the test codes developed for evaluating the rules and analysis capabilities of the tools. The test codes to involve 43 weaknesses such as SQL injection etc. can be used to evaluate the adequacy of the rules and analysis capabilities of the tools.

A Study on the Improvement of Bibliographical Description Form of the Date of Publication in the Catalog (목록에서 발행사항의 발행년 기술형식의 개선안 연구)

  • Lee, Myounggyu
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.1
    • /
    • pp.1-21
    • /
    • 2019
  • The purpose of this study is to expand the functions of the catalog by segmenting the information into a systematic cataloging and reflecting it in the search environment when the amount of information is increased and the user's information needs are disaggregated. So, this study presented the need to look at the process of the descriptive change of the date of publication from the existing cataloging rules, look at the description elements through the current online bookstores, and describe the month of publication as well as the year of publication in the sub-elements of the publication area that may help identify and search for data. It also presented cataloging rules for the month of publication and an example of the description of MARC.

First Order Predicate Logic Representation and Management for Information Resource Dictionary (정보자원사전에 대한 서술논리 표현과 관리)

  • 김창화
    • The Journal of Information Technology and Database
    • /
    • v.5 no.1
    • /
    • pp.13-37
    • /
    • 1998
  • 인터넷 등의 컴퓨터 통신 네트워크의 발달로 인하여 분산된 정보자원의 공유를 통한 자원에 대한 재사용성의 필요성이 대두되었다. IRD(Information Resource Dictionary)는 조직 내에서 관련된 모든 정보에 대한 데이터가 논리적으로 중앙화된 정보저장소(repository)이다. IRD 내의 데이터는 다른 데이터를 기술하므로 이른바 메타 데이터라고 하기도 한다. IRD의 사전(dictionary) 요소는 정보자원의 종류, 정보자원의 의미, 정보자원의 논리적 구조, 정보자원의 위치, 그리고 정보자원의 접근방법 등을 기술한다. FIPS ANSI의 IRDS는 이항 관계를 이용하여 무결성 제약조건을 표현하므로 제약조건 규칙의 표현과 일반적인 추론 규칙의 표현이 제한되어 있으며, 다양한 형태의 무결성 제약조건의 표현과 IRD와 관련된 여러 정보의 도출 또는 추론 및 관리에 관한 사항은 IRD 응용 고유의 문제로 간주하여 언급하고 있지 않다. 한편, FIPS IRDS는 사용자가 SQL 및 IRD에 대한 전문적 지식이 없이는 사용자 질의 작성이 어려운 점등에 대한 문제점을 안고 있다. 본 논문은 FIPS IRDS의 기본모델에서 정보자원 표현, 정보자원들간의 관계, 정보자원의 관리 정보 구분을 명확히 하기 위해 정보자원 모델을 정보자원 표현요소와 정보자원 관리요소의 두 부류로 나누어 구분하고, 각 부류에 대한 자격 질의(competency question)를 통하여 유추된 요소들을 FIPS ANSI IRDS 기본 모델의 스키마 기술 레벨과 스키마 레벨에 첨가함으로써 그 기본 모델을 확장한다. 그리고, FIPS ANSI IRDS가 제공하는 IRD 기술과 관리 기능을 그대로 포함하면서 앞에서 문제점으로 지적된 제약조건 표현과 추론규칙 표현을 위하여 확장된 기본 모델을 중심으로 각 레벨의 구성 요소들의 형식적 의미(formal semantics)와 레벨 내 혹은 레벨 구성요소들간의 관계성(relationship), 그리고 제약조건의 표현과 질의 추론 규칙들을 식별하여 FOPL(First Order Predicate Logic)로 표현한다. 또한, 본 논문은 FOPL로 표현된 predicate들과 규칙들을 구현하기 위하여 Prolog로 변환하기 위한 이론적 방법론을 제시하고 정보자원 관리를 위한 기본 함수들과 스키마 진화(schema evolution)를 위한 방법론을 제안한다.

  • PDF