• Title/Summary/Keyword: 패턴 지도 방안

Search Result 376, Processing Time 0.034 seconds

A Study on the Usage Patterns of Electronic Commerce Web System (수용도 향상을 위한 소비자의 쇼핑몰 사용패턴특성 분류 및 분석)

  • 곽효연;손일문
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.149-157
    • /
    • 2002
  • Todays, electronic commerce(EC) results to the revolution and new paradigm of business, more and more Web-based EC applications have emerged. But, it's web systems should be satisfied by customers and it should be successful to buying some goods in virtual stores with easy to use. The usability and acceptance of the EC web system is one of the key factors in the successful construction of EC system. In this paper, we considered the characteristics of information search and decision making process in the design of EC web system to be used easily and to be more acceptable to customers. On the basis of these characteristics, we could classified with the activities of the process of buying in the domestic web systems. And, the log files of experimental tasks were analyzed by the statistical method of data mining. As the these results, the important factors of the process of buying could be summarized, 5 user groups could be seen in EC customers, and the usage patterns of these groups were described. These results could be very useful to design user-oriented EC web system.

  • PDF

Array Configuration Analysis of Ka-Band Phase Array Antenna (Ka-대역 위상배열안테나 배열 구조 분석)

  • Kim, Youngwan;Kwon, Junbeom;Kang, Yeonduk;Park, Jongkuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.141-147
    • /
    • 2019
  • In this paper, a beam pattern performance analysis was performed according to number of array elements and spacing of the phase array antenna. The distance between array elements in an array structure design was reduced due to the electrical length of Ka-band, which increases the number of array elements in applying the aperture. If the number of elements reduce by widening the array distance, the grating lobes of the same size as the main beam will occur in visible region. If the number of array elements should be applied to a system where the number of array elements should be minimized, the analysis was performed on a plan to reduce the number of array elements and minimize degradation of performance, such as beam width and side lobe level.

A study on the Filtering of Spam E-mail using n-Gram indexing and Support Vector Machine (n-Gram 색인화와 Support Vector Machine을 사용한 스팸메일 필터링에 대한 연구)

  • 서정우;손태식;서정택;문종섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.23-33
    • /
    • 2004
  • Because of a rapid growth of internet environment, it is also fast increasing to exchange message using e-mail. But, despite the convenience of e-mail, it is rising a currently bi9 issue to waste their time and cost due to the spam mail in an individual or enterprise. Many kinds of solutions have been studied to solve harmful effects of spam mail. Such typical methods are as follows; pattern matching using the keyword with representative method and method using the probability like Naive Bayesian. In this paper, we propose a classification method of spam mails from normal mails using Support Vector Machine, which has excellent performance in pattern classification problems, to compensate for the problems of existing research. Especially, the proposed method practices efficiently a teaming procedure with a word dictionary including a generated index by the n-Gram. In the conclusion, we verified the proposed method through the accuracy comparison of spm mail separation between an existing research and proposed scheme.

Carving deleted voice data in mobile (삭제된 휴대폰 음성 데이터 복원 방법론)

  • Kim, Sang-Dae;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.57-65
    • /
    • 2012
  • People leave voicemails or record phone conversations in their daily cell phone use. Sometimes important voice data is deleted by the user accidently, or purposely to cover up criminal activity. In these cases, deleted voice data must be able to be recovered for forensics, since the voice data can be used as evidence in a criminal case. Because cell phones store data that is easily fragmented in flash memory, voice data recovery is very difficult. However, if there are identifiable patterns for the deleted voice data, we can recover a significant amount of it by researching images of it. There are several types of voice data, such as QCP, AMR, MP4, etc.. This study researches the data recovery solutions for EVRC codec and AMR codec in QCP file, Qualcumm's voice data format in cell phone.

A Method to Enhance the Recognition Rate of Marker Images in Augmented Reality (증강현실 마커 이미지의 인식률 개선 방안)

  • Park, Chan;Lee, Wan-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • As augmented reality technology becomes more common and prevelant, marker-based AR contents are applied in various ways. However AR contents are still hardly utilized due to the low recognition rate of marker images. In order to increase the recognition rate of AR marker images, this paper experiment and analyzed how much the recognition rate of markers could be improved when image correction and design changes was applied. The experimental result shows that the image correction task could significantly improve the number of image characteristics and the recognition grade if the image was modified in a way its saturation value is increased. Moreover, the recognition rate was improved even more when regular pattern design was added to the original marker image. In conclusion, it was possible to make the marker well recognized through proper correction of the image and additional process of pattern design in the process of producing the marker image.

Daily Behavior Pattern Extraction using Time-Series Behavioral Data of Dairy Cows and k-Means Clustering (행동 시계열 데이터와 k-평균 군집화를 통한 젖소의 일일 행동패턴 검출)

  • Lee, Seonghun;Park, Gicheol;Park, Jaehwa
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.83-92
    • /
    • 2021
  • There are continuous and tremendous attempts to apply various sensor systems and ICTs into the dairy science for data accumulation and improvement of dairy productivity. However, these only concerns the fields which directly affect to the dairy productivity such as the number of individuals and the milk production amount, while researches on the physiology aspects of dairy cows are not enough which are fundamentally involved in the dairy productivity. This paper proposes the basic approach for extraction of daily behavior pattern from hourly behavioral data of dairy cows to identify the health status and stress. Total four clusters were grouped by k-means clustering and the reasonability was proved by visualization of the data in each groups and the representatives of each groups. We hope that provided results should lead to the further researches on catching abnormalities and disease signs of dairy cows.

A design of FACE-compliant IOS and TS segments architecture based on ARINC653 in avionics system (항공전자 시스템에서 ARINC653 기반의 FACE를 준수하는 IOS 및 TS 세그먼트 구조 설계 )

  • Doo-Hwan Lee;Young-Uk Nam;Kyeong-Yeon Cho;Ji-Yong Yoon
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.4
    • /
    • pp.429-435
    • /
    • 2023
  • The increasing complexity of avionics systems has emphasized the portability and reusability of software components. In this paper, a structural design method for IOSS (Input Output Service Segment) and TSS (Transport Service Segment) complying with the FACE (The Future Airborne Capability Environment) standard in the VxWorks 653 operating environment that satisfies ARINC 653 requirements is described. IOSS and TSS operate independently in different partitions to minimize time/space separation and the influence of other software, and to increase portability and reusability, strategy patterns among design patterns are applied. In addition, IOSS provides external interface service by applying distributed IO service structure, and among external interfaces, the ARINC 664 P7 interface of FACE-compliant equipment is placed in TSS to optimize the data movement path.

A Secure Routing Protocol in MANET based on Malicious behavior Pattern of Node and Trust Level (노드의 악의적 행위패턴 및 신뢰수준 기반의 MANET Secure 라무팅 방안)

  • Park, Seong-Seung;Park, Gun-Woo;Ryu, Keun-Ho;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.103-117
    • /
    • 2009
  • In MANET(Mobile Ad-Hoc Network), providing security to routing has been a significant issue recently. Existing studies, however, focused on either of secure routing or packet itself where malicious operations occur. In this paper, we propose SRPPnT(A Secure Routing Protocol in MANET based on Malicious Pattern of Node and Trust Level) that consider both malicious behavior on packet and secure routing. SRPPnT is identify the node where malicious activities occur for a specific time to compose trust levels for each node, and then to set up a routing path according to the trust level obtained. Therefore, SRPPnT is able to make efficient countermeasures against malicious operations. SRPPnT is based on AODV(Ad-Hoc On-Demand Distance Vector Routing). The proposed SRPPnT, from results of the NS-2 network simulation. shows a more prompt and accurate finding of malicious nodes than previous protocols did, under the condition of decreased load of networks and route more securely.

Verification of Airborne Radar's Search Pattern Stabilization Capability Using SIL Environment (시스템 통합 시험 환경을 이용한 항공기 탑재 레이다의 탐색 패턴 안정화 기능 검증)

  • Ji-Eun Roh;Yong-Kil Kwak;Jin-Ju Won;Won-Jin Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.2
    • /
    • pp.178-184
    • /
    • 2024
  • The radar installed on an aircraft has various operating modes depending on tactical purposes, allowing for the configuration of search areas according to each mode's operational objectives. active electronically scanned array (AESA) radar emits search beams sequentially according to a predefined search beam grid within the designated search area specified by the pilot to detect targets within it. It is crucial that the radar can stably search the area designated by the pilot for target detection, even as the aircraft's attitude changes. This paper focuses on stabilizing the search pattern in the air-to-air operational mode of aircraft-mounted radar to ensure stable target detection during roll and pitch maneuvers of the aircraft. The paper demonstrates its performance by simulating aircraft maneuvers and targets in a system integration laboratory (SIL) test environment.

Designing A De-identified Municipal CCTV Of Live Video Service For Citizens (비식별 처리된 지방자치단체 CCTV 실시간 영상 대시민 제공 서비스의 설계)

  • Dong-Hyun Lim;Dea-Woo Park
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.5
    • /
    • pp.951-958
    • /
    • 2024
  • The public is requesting to view and receive copies of local government CCTV footage in order to deal with unauthorized dumping, loss, and other inconveniences related to their lives, and to confirm whether an incident or accident has occurred. However, due to the difficulty of identification and the privacy of others in the video, local governments cannot provide the original CCTV footage to the public, so they provide the footage after manual masking. As a result, the public is demanding local governments to resolve distrust and dissatisfaction, and secondary users of video information, such as police, fire, and courts, are demanding quick and efficient ways to improve video utilization. In this paper, we study how to make local government CCTV video information available to the public. To this end, we de-personalize the entire video by mosaicking it into a certain size. We automate and simplify the process of viewing and creating replicas. We apply artificial intelligence pattern technology to design measures against video misuse. If the government reflects these results in its policies, the public's right-to-know needs will be met, public trusted in the government will increase, and the government's administrative efficiency will be improved.