• Title/Summary/Keyword: 패턴모델링

Search Result 599, Processing Time 0.028 seconds

An Service oriented XL-BPMN Metamodel and Business Modeling Process (서비스 지향 XL-BPMN 메타모델과 비즈니스 모델링 프로세스)

  • Song, Chee-Yang;Cho, Eun-Sook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.4
    • /
    • pp.227-238
    • /
    • 2013
  • The business based existing BPMN model is a lack of service oriented modeling techniques. Therefore, it requires a layered technique of service oriented business modeling so that can meet the design for a complex application system, developing a system based on SOA. In order to enhance reusability and modularity of BPMN business model, this paper proposes a metamodel and business modeling process based on this metamodel that can hierarchically build a BPMN model. Towards this end, the XL-BPMN metamodel hierarchically established based on MDA and MVS styles are first defined. Then a BPMN service modeling process is constructed based on modeling elements of this metamodel according to the modeling phases. Finally, the result of a case study in which the proposed method is applied to an online shopping mall system is discussed. With the use of well-defined metamodel and modeling process, it is hoped that it can be shown that a service dominated and layered BPMN business model can be established, and that the modularity and reusability of the constructed BPMN business model can be maximized.

Performance Improvement of Infusion Detection System based on Hidden Markov Model through Privilege Flows Modeling (권한이동 모델링을 통한 은닉 마르코프 모델 기반 침입탐지 시스템의 성능 향상)

  • 박혁장;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.674-684
    • /
    • 2002
  • Anomaly detection techniques have teen devised to address the limitations of misuse detection approach for intrusion detection. An HMM is a useful tool to model sequence information whose generation mechanism is not observable and is an optimal modeling technique to minimize false-positive error and to maximize detection rate, However, HMM has the short-coming of login training time. This paper proposes an effective HMM-based IDS that improves the modeling time and performance by only considering the events of privilege flows based on the domain knowledge of attacks. Experimental results show that training with the proposed method is significantly faster than the conventional method trained with all data, as well as no loss of recognition performance.

Customer List Segmentation Using the Combined Response Modeling (결합 리스펀스 모델링을 이용한 고객리스트 세분화)

  • Eui-ho Seo;Kap-chel Noh;Eung-beom Lee
    • Asia Marketing Journal
    • /
    • v.1 no.2
    • /
    • pp.19-35
    • /
    • 1999
  • 데이터베이스 마케팅 전략을 수립하고 집행함에 있어서 고객에게 접근하기 위한 촉진 매체로써 직접우편(Direct Mail)과 텔레 마케팅 등의 직접반응매체를 주요 수단으로 하는 경우 이를 다이렉트 마케팅이라고 한다. 다른 마케팅 전략들과 마찬가지로 다이렉트 마케팅에서도 마케팅 자원이 효과적으로 사용될 수 있도록 고객 데이터베이스를 세분화하는 작업을 수행한다. 리스펀스 모델링(Response Modeling)은 다이렉트 마케팅분야에서 고객리스트를 세분화하고 각 세그멘트별로 고객의 반응(구매행위)을 예측하는 기법을 말하며 RFM(Recency, Frequency, Monetary), 로지스틱, 신경망은 리스펀스 모델링을 위해서 가장 널리 사용되고 있는 기법이다. 과거에 이들 방법은 고객 데이터베이스 전체에 단독 모델로 적용되어 왔으나 이러한 단독 모델을 고객 데이터베이스에 적용하는 것이 정당화 되려면 고객들이 동일한 방식으로 반응한다는 전제가 필요하다. 그러나 일반적으로 고객의 반응방식에는 상당한 이질성이 존재한다. 예컨대 직업, 나이, 소득, 성별 등이 같다고 해서 같은 구매패턴을 보이지는 않는다는 것이다. 즉 고객A의 구매행위는 회귀선에 의해서 잘 설명되는 반면에 고객B는 신경망이나 RFM으로 잘 설명될 수 있는 경우가 존재하는 것이다. 이러한 구매행위의 이질성을 반영하기 위해서 최근에는 두개 이상의 방법을 결합하여 사용하는 결합 리스펀스 모델링 방법도 시도 되어 왔다. 그러나 결합 리스펀스 모델링에 관한 기존 연구들은 상관관계가 낮은 모델들을 결합함으로써 세분화의 효과를 단독 모델을 사용할 때 보다 개선할 수 있다고는 하였으나 구체적으로 어떤 모델들이 서로 낮은 상관관계를 갖는지는 보여주지 못하였다. 본 논문에서는 RFM 방법을 모델 내에서 사용하는 변수와 이를 이용한 모델링 방법상의 차이로 인하여 다른 두 방법(로지스틱, 신경망)과 매우 낮은 상관관계를 갖는 방법으로 제시하고 RFM과 다른 두 방법간의 낮은 상관관계를 이용하여 결합하는 경우 모델의 예측효과를 상당히 개선할 수 있음을 사례분석을 통해서 보이고자 한다.

  • PDF

Markov Chain Model-Based Trainee Behavior Pattern Analysis for Assessment of Information Security Exercise Courses (정보보안 훈련 시스템의 성취도 평가를 위한 마코브 체인 모델 기반의 학습자 행위 패턴 분석)

  • Lee, Taek;Kim, Do-Hoon;Lee, Myong-Rak;In, Hoh Peter
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1264-1268
    • /
    • 2010
  • In this paper, we propose a behavior pattern analysis method for users tasking on hands-on security exercise missions. By analysing and evaluating the observed user behavior data, the proposed method discovers some significant patterns able to contribute mission successes or fails. A Markov chain modeling approach and algorithm is used to automate the whole analysis process. How to apply and understand our proposed method is briefly shown through a case study, "network service configurations for secure web service operation".

GoF design patterns based object-oriented Total Maximum Daily Load software design (GoF 디자인 패턴기반 객체지향 오염총량제 소프트웨어 설계)

  • Kim Hyung-Moo;Kwak Hoon-Seong
    • The KIPS Transactions:PartD
    • /
    • v.12D no.1 s.97
    • /
    • pp.73-80
    • /
    • 2005
  • The purpose of using CBD in the object-oriented modeling is to improve the software capability by reducing iterative time and space complexity. Despites many achievements of CBD, it is needed to study about design patterns and it's standardization for the increment of CBD design reusability. However, it is rather possible that impetuous constructing meta-pattern languages and pattern repositories make adapting patterns to software development more complicate and difficult. By applying GoF design patterns to the design of the TMDL(Total Maximum Daily Load) environmental software discipline, this study suggests a method which specifies Pattern names at class names for retrieving, exploring the adapted patterns on the stage of software design without meta-pattern language which is a redundant abstraction, nor additional pattern repositories. Thus, this study can contribute on the reducing iterations and repetitions that are frequently occurred in the process of the environmental software developments.

Application Analysis of Digital Photogrammetry and Optical Scanning Technique for Cultural Heritages Restoration (문화재 원형복원을 위한 수치사진측량과 광학스캐닝기법의 응용분석)

  • Han, Seung Hee;Bae, Yeon Soung;Bae, Sang Ho
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.5D
    • /
    • pp.869-876
    • /
    • 2006
  • In the case of earthenware cultural heritages that are found in the form of fragments, the major task is quick and precise restoration. The existing method, which follows the rule of trial and error, is not only greatly time consuming but also lacked precision. If this job could be done by three dimensional scanning, matching up pieces could be done with remarkable efficiency. In this study, the original earthenware was modeled through three-dimensional pattern scanning and photogrammetry, and each of the fragments were scanned and modeled. In order to obtain images from the photogrammetry, we calibrated and used a Canon EOS 1DS real size camera. We analyzed the relationship among the sections of the formed model, efficiently compounded them, and analyzed the errors through residual and color error map. Also, we built a web-based three-dimensional simulation environment centering around the users, for the virtual museum.

Modeling for Discovery the Cutoff Point in Standby Power and Implementation of Group Formation Algorithm (대기전력 차단시점 발견을 위한 모델링과 그룹생성 알고리즘 구현)

  • Park, Tae-Jin;Kim, Su-Do;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.1
    • /
    • pp.107-121
    • /
    • 2009
  • First reason for generation of standby power is because starting voltage must pass through from the source of electricity to IC. The second reason is due to current when IC is in operation. Purpose of this abstract is on structures of simple modules that automatically switch on or off through analysis of state on standby power and analysis of cutoff point patterns as well as application of algorithms. To achieve this, this paper is based on analysis of electric signals and modeling. Also, on/off cutoff criteria has been established for reduction of standby power. To find on/off cutoff point, that is executed algorithm of similar group and leading pattern group generation in the standby power state. Therefore, the algorithm was defined as an important parameter of the subtraction value of calculated between $1^{st}$ SCS, $2^{nd}$ SCS, and the median value of sampling coefficient per second from a wall outlet.

  • PDF

Modeling of Received Radar Signals for Scan Pattern Analysis (스캔패턴 분석을 위한 레이더 수신신호 모델링)

  • Kim, Yong-Hee;Kim, Wan-Jin;Song, Kyu-Ha;Lee, Dong-Won;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.73-85
    • /
    • 2010
  • In dense electronic warfare signal environments, the conventional radar identification methods based on the basic parameters such as frequency, pulse width, and pulse repetition interval are confronted by the problem of identification ambiguity. To overcome this critical problem, a new approach introducing scan pattern of radars has been presented. Researches on new identification methods, however, suffer from a practical problem that it is not easy to secure the many radar signals including various scan pattern information and operation parameters. This paper presents a modeling method of radar signals with which we can generate radar signals including various scan pattern types according to the parameters determining the variation pattern of received signal strength. In addition, with the radar signals generated by the proposed model we analyze their characteristics according to the location of an electronic warfare support (ES) system.

Model-based Dithering Using Dot Pattern Selection (도트 패턴 선택을 이용한 모델 기반 디더링)

  • Lee, Chae-Soo;Park, Yang-Woo;Uam, Tae-Uk;Jang, Joo-Seok;Ha, Yeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.3
    • /
    • pp.247-257
    • /
    • 2001
  • New methods are proposed for printing a full resolution image on a limited output device. The proposed algorithm uses a dot-pattern database that models overlapping phenomena among neighbor printing dots. To solve the problem of dot-overlap, the gray levels of dot-pattern sets were calculated using a circular dot-overlap model and then measured by a spectrometer. Thereafter, in order to improve the visual quality of the color dithering, the contrast sensitivity function of the human visual system was used. As a result, the optimal dot-pattern can be selected from the database. Consequently, the proposed algorithm can produce high quality images while using low-cost color devices.

  • PDF

Developing a Material Topic and some Questions with Blackout Game for the Mathematically Gifted Students'' R&E (흑백게임을 활용한 수학영재들의 R&E 연구 소재 개발)

  • Song, Chang-Woo;Song, Yeong-Moo
    • School Mathematics
    • /
    • v.12 no.3
    • /
    • pp.337-351
    • /
    • 2010
  • Blackout game on a certain size of the Go table, which looks simple, involves a variety of mathematical modeling. This study uses a research and education method. While the mathematically gifted students were playing blackout game, the author, as the instructor, observed the ways in which they approached various mathematical models. Based on the data, this study examines the effects of blackout game on the children's cognitive processes. This study further discusses the issues of questions.

  • PDF