• Title/Summary/Keyword: 행위패턴

Search Result 381, Processing Time 0.022 seconds

Analysis of Customer Behavior and Trend of Manufacture (제조업분야의 고객 성향 및 추이 분석)

  • Lee, Byoung-Yup;Yim, Seung-Bin;Park, Yong-Hoon;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.6
    • /
    • pp.336-343
    • /
    • 2009
  • Companies often use database for performing task more efficiently and data mining for marketing and production efficiency through analyzing of the stored database. The use of the knowledge through the data mining maintains and provides a direction of development for the company. It could be as an additional competitive power for the company when decision making is necessary. This study is designing a model that predicts a rating of existing customer and consumption pattern with using actual data of the manufacturer and data mining methodology. The objective of this model is to improve profits for the company and brand value through connecting the marketing with identifying the customer's rating and consumer behavior.

Autonomous Mobile Robot System based on a Fuzzy Artificial Immune System (퍼지 인공 면역망 시스템을 이용한 자율이동로봇 시스템)

  • Lee, Dong-Je;Choi, Young-Kiu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2083-2089
    • /
    • 2007
  • In this paper addresses the low-level behavior of fuzzy control and the high-level behavior selector for Autonomous Mobile Robots(AMRs) based on a Fuzzy Artificial Immune Network. The sensing information that comes from ultrasonic sensors is the antigen it, and stimulates antibodies. There are many possible combinations of actions between action-patterns and external situations. The question is how to handle the situations to decide the proper action. We propose a fuzzy artificial immune network to solve the above problem. and the computer simulation for an AMR action selector shows the usefulness of the proposed action selector.

Network Anomaly Detection using Association Rule Mining in Network Packets (네트워크 패킷에 대한 연관 마이닝 기법을 적용한 네트워크 비정상 행위 탐지)

  • Oh, Sang-Hyun;Chang, Joong-Hyuk
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.22-29
    • /
    • 2009
  • In previous work, anomaly-based intrusion detection techniques have been widely used to effectively detect various intrusions into a computer. This is because the anomaly-based detection techniques can effectively handle previously unknown intrusion methods. However, most of the previous work assumed that the normal network connections are fixed. For this reason, a new network connection may be regarded as an anomalous event. This paper proposes a new anomaly detection method based on an association-mining algorithm. The proposed method is composed of two phases: intra-packet association mining and inter-packet association mining. The performances of the proposed method are comparatively verified with JAM, which is a conventional representative intrusion detection method.

A Study on the Application of the Pattern Language in 'Standard Rural-Houses Design' (농촌표준주택의 패턴언어 적용 관계성에 관한 연구)

  • Hwang, Yong-Woon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.1
    • /
    • pp.208-216
    • /
    • 2019
  • Rural houses are losing their original shape as they mimic the spatial composition of urban houses. Therefore, the purpose of this study was to extract the design elements needed for rural housing by applying Christopher Alexander's "A PATTERN LANGUAGE" to Standard Rural-House Design (SRHD). The scope and method of research was to compare and analyze the standard designs (SD) produced and distributed by the 'Korea Rural Community Corporation' from 2009 to 2014. The research result is summarized as follows. 1) The housing layout in the SD ignored the site conditions of various rural areas. 2) Most of the houses were not actively planned, considering that they contain various activities of rural life. 3) There was no room for children and the kitchen was planned to integrate the interior into a flexible space in the form of L.D.K. 4) There was no space plan that could be used as both a leasable annex and office space for the farming community. 5) Many small area plans were made because of the SD plan for couples only in 2014. Although the rural environment and living patterns were ignored in the SD, the diverse pattern language provided by the pattern language was developed as a SD element for rural houses, which is the most suitable housing plan for the farmers' livelihood pattern.

Mutilateralism vs. Bilateralism in Chinese Resource Diplomacy : Comparative Analysis on Chinese Foreign Policy toward Central Asia and Africa (중국 자원외교의 다자주의와 양자주의: 중앙아시아 및 아프리카에 대한 중국 자원외교 비교)

  • Kim, Ki-jung;Chun, Ja-hyun
    • Journal of International Area Studies (JIAS)
    • /
    • v.13 no.1
    • /
    • pp.107-133
    • /
    • 2009
  • International relations in the 21st century is featured by boundless competition among nations to secure sufficient energy resources for achieving economic development. Resource diplomacy, therefore, is competitive in its nature, which is derived from the fact that resources of the globe are limited. Chinese recent economic growth has been possible mainly due to its success in resource diplomacy. The Chinese resource diplomacy has shown two different patterns according to target regions. On the one hand, China has pursued multilateral approach to Central Asia region, by which China aimed to secure energy with joint exploration method in the region. Chinese resource diplomacy toward Africa, on the other hand, has been based on bilateral approach combined with unit-centered economic aid to African nations. This difference in Chinese foreign policy pattern seems to be derived from three factors: namely, Chinese strategic considerations on geopolitical condition, regional security sensitivity, and legacies of Chinese long-time non-alignment diplomacy since the 1950s. Whether China is able to maintain the current pattern of resource diplomacy will be depended on how wisely China pursue its relations with two other global powers: Russia in the Central Asia and the U.S. in Africa. In this regard, the Chinese resource diplomacy is expected to work as determining factor of shaping a pattern of tri-lateral strategic relations among the U.S., Russia, and China. Chinese resource diplomacy thus will determine the future direction of the global politics in terms of strategic arrangement.

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF

Goods Recommendation Sysrem using a Customer’s Preference Features Information (고객의 선호 특성 정보를 이용한 상품 추천 시스템)

  • Sung, Kyung-Sang;Park, Yeon-Chool;Ahn, Jae-Myung;Oh, Hae-Seok
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1205-1212
    • /
    • 2004
  • As electronic commerce systems have been widely used, the necessity of adaptive e-commerce agent systems has been increased. These kinds of adaptive e-commerce agents can monitor customer's behaviors and cluster thou in similar categories, and include user's preference from each category. In order to implement our adaptive e-commerce agent system, in this paper, we propose an adaptive e-commerce agent systems consider customer's information of interest and goodwill ratio about preference goods. Proposed system build user's profile more accurately to get adaptability for user's behavior of buying and provide useful product information without inefficient searching based on such user's profile. The proposed system composed with three parts , Monitor Agent which grasps user's intension using monitoring, similarity reference Agent which refers to similar group of behavior pattern after teamed behavior pattern of user, Interest Analyzing Agent which personalized behavior DB as a change of user's behavior.

Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups (공격그룹 분류 및 예측을 위한 네트워크 행위기반 악성코드 분류에 관한 연구)

  • Lim, Hyo-young;Kim, Wan-ju;Noh, Hong-jun;Lim, Jae-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.193-204
    • /
    • 2017
  • The security of Internet systems critically depends on the capability to keep anti-virus (AV) software up-to-date and maintain high detection accuracy against new malware. However, malware variants evolve so quickly they cannot be detected by conventional signature-based detection. In this paper, we proposed a malware classification method based on sequence patterns generated from the network flow of malware samples. We evaluated our method with 766 malware samples and obtained a classification accuracy of approximately 40.4%. In this study, malicious codes were classified only by network behavior of malicious codes, excluding codes and other characteristics. Therefore, this study is expected to be further developed in the future. Also, we can predict the attack groups and additional attacks can be prevented.

An Empirical Study of Customer's Repeat Visit Frequency on the Internet (인터넷 이용자들의 웹사이트 재방문 빈도에 관한 실증적 연구)

  • Lee, Suke-Kyu
    • Journal of Global Scholars of Marketing Science
    • /
    • v.11
    • /
    • pp.129-146
    • /
    • 2003
  • This study explores whether a NBD type of model can be applied to characterize the underlying frequency distribution of online consumer's visit behavior. In this study, the following two research questions are addressed: (1) How can we characterize the underlying distribution pattern(s) of the number of repeat i i visits to a site? (2) How can consumer's Internet usages and his/her demographics affect the average number of visits to the site? Through the empirical investigation, this study found that NBD models are directly applicable to characterize the underlying distribution of visit frequency on the Internet. Furthermore, this study addresses some managerial implications for understanding how site visits are determined. Especially this study highlights the relationship between repeated visits and the visitors' Internet Usages and demographics. The proposed models are estimated and validated by online panel data that covers more than 1000 different sites and has 800,000 observations.

  • PDF