• Title/Summary/Keyword: 로그 생성

Search Result 333, Processing Time 0.027 seconds

An Extended Dynamic Web Page Recommendation Algorithm Based on Mining Frequent Traversal Patterns (빈발 순회패턴 탐사에 기반한 확장된 동적 웹페이지 추천 알고리즘)

  • Lee KeunSoo;Lee Chang Hoon;Yoon Sun-Hee;Lee Sang Moon;Seo Jeong Min
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1163-1176
    • /
    • 2005
  • The Web is the largest distributed information space but, the individual's capacity to read and digest contents is essentially fixed. In these Web environments, mining traversal patterns is an important problem in Web mining with a host of application domains including system design and information services. Conventional traversal pattern mining systems use the inter-pages association in sessions with only a very restricted mechanism (based on vector or matrix) for generating frequent K-Pagesets. We extend a family of novel algorithms (termed WebPR - Web Page Recommend) for mining frequent traversal patterns and then pageset to recommend. We add a WebPR(A) algorithm into a family of WebPR algorithms, and propose a new winWebPR(T) algorithm introducing a window concept on WebPR(T). Including two extended algorithms, our experimentation with two real data sets, including LadyAsiana and KBS media server site, clearly validates that our method outperforms conventional methods.

  • PDF

A Monte Carlo Comparison of the Small Sample Behavior of Disparity Measures (소표본에서 차이측도 통계량의 비교연구)

  • 홍종선;정동빈;박용석
    • The Korean Journal of Applied Statistics
    • /
    • v.16 no.2
    • /
    • pp.455-467
    • /
    • 2003
  • There has been a long debate on the applicability of the chi-square approximation to statistics based on small sample size. Extending comparison results among Pearson chi-square Χ$^2$, generalized likelihood .ratio G$^2$, and the power divergence Ι(2/3) statistics suggested by Rudas(1986), recently developed disparity statistics (BWHD(1/9), BWCS(1/3), NED(4/3)) we compared and analyzed in this paper. By Monte Carlo studies about the independence model of two dimension contingency tables, the conditional model and one variable independence model of three dimensional tables, simulated 90 and 95 percentage points and approximate 95% confidence intervals for the true percentage points are obtained. It is found that the Χ$^2$, Ι(2/3), BWHD(1/9) test statistics have very similar behavior and there seem to be applcable for small sample sizes than others.

Design and Evaluation of a User Tag-based Retrieval Model for Electronic Journals within Electronic Resource Management Systems (전자자원관리시스템의 이용자 태그 기반의 전자저널 검색 모형 설계 및 평가에 관한 연구)

  • Kang, Jeong-Won;Kim, Hyun-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.4
    • /
    • pp.241-264
    • /
    • 2009
  • The study proposed an electronic journal retrieval model to be used to improve the retrieval efficiency of e-journals. To do this, firstly, we reviewed the literature on users' information behavior and on ERM (Electronic Resource Management) systems. Secondly, we conducted an e-mail survey of 96 participants (professors and graduate students) to find out about their information behavior on how to access, use and evaluate electronic resources as well as scientific information. Thirdly, we administered case studies on two ERMSs, Ex Libris' Verde and Innovative's Millennium. The proposed model will be operated within ERM systems and it enables to the supply of both system- and user-based services by combining taxonomy-based ERM systems with tag folksonomy. The model is unique in that it includes not only the automatic tagging functions that can be performed using log files but also the tag management functions including grouping similar or related tags.

A Control Path Analysis Mechanism for Workflow Mining (워크플로우 마이닝을 위한 제어 경로 분석 메커니즘)

  • Min Jun-Ki;Kim Kwang-Hoon;Chung Jung-Su
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.91-99
    • /
    • 2006
  • This paper proposes a control path analysis mechanism to be used in the workflow mining framework maximizing the workflow traceability and re discoverability by analyzing the total sequences of the control path perspective of a workflow model and by rediscovering their runtime enactment history from the workflow log information. The mechanism has two components One is to generate the total sequences of the control paths from a workflow mode by transforming it to a control path decision tree, and the other is to rediscover the runtime enactment history of each control path out of the total sequences from the corresponding workflow's execution logs. Eventually, these rediscovered knowledge and execution history of a workflow model make up a control path oriented intelligence of the workflow model. which ought to be an essential ingredient for maintaining and reengineering the qualify of the workflow model. Based upon the workflow intelligence, it is possible for the workflow model to be gradually refined and finally maximize its qualify by repeatedly redesigning and reengineering during its whole life long time period.

  • PDF

Convenient User Authentication Mechanism Using only User Identification (사용자 ID만을 활용한 간편한 사용자 인증 방안)

  • Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.501-508
    • /
    • 2015
  • Most web sites, information systems use the ID/Password technique to identify and authenticate users. But ID/Password technique is vulnerable to security. The user must remember the ID/Password and, the password should include alphabets, numbers, and special characters, not to be predicted easily. User also needs to change your password periodically. In this paper, we propose the user authentication method that the user authentication information stored in the external storage to authenticate a user. If another person knows the ID/Password, he can't log in a system without the external storage. Whenever a user logs in a system, authentication information is generated, and is stored in the external storage. Therefore, the proposed user authentication method is the traditional ID/Password security technique, but it enhances security and, increases user convenience.

Effect of ZrO2 Addition on the Microstructure and Electrical Properties of Ni-Mn Oxide NTC Thermistors (Ni-Mn 산화물 NTC 서미스터의 미세구조와 전기적 특성에 미치는 ZrO2첨가의 효과)

  • 박경순;방대영;윤성진;최병현
    • Journal of the Korean Ceramic Society
    • /
    • v.40 no.1
    • /
    • pp.11-17
    • /
    • 2003
  • The effect of$ZrO_2$addition on the microstructure and electrical properties of Ni-Mn oxide NTC thermistors was studied. Major phases present in the sintered bodies of $Ni_{1.0}Mn_{2-x}Zr_xO_4$ were the solid solutions of Ni-Mn-Zr oxides with a cubic spinel structure and the $ZrO_2$ with a tetragonal structure. The $ZrO_2$ was formed by the partial decomposition or incomplete formation of the Ni-Mn-Zr oxides during sintering. With increasing the amount of added $ZrO_2$, the $ZrO_2$ phase increased. The relationship between log resistivity (log p) and the reciprocal of absolute temperature (1/T) of the NTC thermistors prepared was linear, indicative of NTC characteristics. The resistivity, B constant and activation energy of the thermistors increased with increasing $ZrO_2$ content.

An Agent System for Efficient VOD Services on Web (효율적 웹 기반 VOD 서비스를 위한 에이전트 시스템)

  • Lee Kyung-Hee;Han Jeong-Hye;Kim Dong-Ho
    • Journal of Digital Contents Society
    • /
    • v.2 no.1
    • /
    • pp.73-79
    • /
    • 2001
  • Most of the existing algorithms try to disseminate the multimedia contents of internet service provider(ISP), without taking into account the needs and characteristics of specific websites including e-learning systems with web-based .educational contents. Sometimes the client must select the best one among the replicated repositories. However, this is a less reliable approach because clients' selections are made without prior information on server load capacity. In this paper we propose an agent system inspired by the need of improving QoS of delivering web-based educational multimedia contents without incurring long access delays. This agent system consists of three components, Analyzer, Knowledge Base, and Automaton embedded the capacity algorithm. It analyzes and investigates traffic information collected from individual replicated server by learners' requests, and selects a server which is available and is expected to provide the fastest latency time and the lowest loaded capacity, and achieves high performance by dynamic replicating web resources among multiple repositories.

  • PDF

Design of Real-Time Ground Motion Monitoring System using MMA data (MMA 데이터를 이용한 실시간 지진동 감시 시스템 설계)

  • Lim, In-Seub;Song, Myung-Won;Jung, Soon-Key
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.29-37
    • /
    • 2007
  • In this paper, we propose a new real-time ground motion monitoring system using MMA data which can be gathered more earlier than generic seismic data transmission method. Proposed system receives maximum, minimum and average data based on 20sps which is sent from station on every second continuously. And it calculates a PGA as a quantity of ground motion then visualizes that data to monitor the ground motion around whole country. To verify PGA data from MMA data, we checked Mu-dan-jang earthquake data of China on 2002/6/29. The proposed system was inspected by using log file of Oh-dae-san earthquake data on 2007/1/20. As results of experiment, the proposed system is proven to detect the event(earthquake) faster then existing method and to produce a useful quantitative information.

  • PDF

Selection of extra support points for polynomial regression (다항회귀모형에서의 추가받힘점 선택)

  • Kim, Young-Il;Jang, Dae-Heung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.6
    • /
    • pp.1491-1498
    • /
    • 2014
  • The major criticism of optimal experimental design is that it depends heavily on the model and its accompanying assumption that often leads the number of support points equal to the number of parameters in the model. Often in the past, a polynomial model of higher degree is assumed to handle the experimental design for the polynomial regression of lower degree. In this paper we searched the possible set of designs which are robust to the departure of the assumed model. The designs are categorized with respect to D-efficiency. The approach by O'Brien (1995) was discussed in univariate polynomial regression model setting.

Discovering Temporal Relation Rules from Temporal Interval Data (시간간격을 고려한 시간관계 규칙 탐사 기법)

  • Lee, Yong-Joon;Seo, Sung-Bo;Ryu, Keun-Ho;Kim, Hye-Kyu
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.301-314
    • /
    • 2001
  • Data mining refers to a set of techniques for discovering implicit and useful knowledge from large database. Many studies on data mining have been pursued and some of them have involved issues of temporal data mining for discovering knowledge from temporal database, such as sequential pattern, similar time sequence, cyclic and temporal association rules, etc. However, all of the works treat problems for discovering temporal pattern from data which are stamped with time points and do not consider problems for discovering knowledge from temporal interval data. For example, there are many examples of temporal interval data that it can discover useful knowledge from. These include patient histories, purchaser histories, web log, and so on. Allen introduces relationships between intervals and operators for reasoning about relations between intervals. We present a new data mining technique that can discover temporal relation rules in temporal interval data by using the Allen's theory. In this paper, we present two new algorithms for discovering algorithm for generating temporal relation rules, discovers rules from temporal interval data. This technique can discover more useful knowledge in compared with conventional data mining techniques.

  • PDF