• Title/Summary/Keyword: 행위패턴

Search Result 381, Processing Time 0.029 seconds

Location Trigger System for the Application of Context-Awareness based Location services

  • Lee, Yon-Sik;Jang, Min-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.149-157
    • /
    • 2019
  • Recent research has been actively carried out on systems that want to optimize resource utilization by analyzing the intended behavior and pattern of behavior of objects (users, consumers). A service system that applies information about an object's location or behavior must include a location trigger processing system for tracking an object's real-time location. In this paper, we analyze design problems for the implementation of a context-awareness based location trigger system, and present system models based on analysis details. For this purpose, this paper introduces the concept of location trigger for intelligent location tracking techniques about moving situations of objects, and suggests a mobile agent system with active rules that can perform monitoring and appropriate actions based on sensing information and location context information, and uses them to design and implement the location trigger system for context-awareness based location services. The proposed system is verified by implementing location trigger processing scenarios and trigger service and action service protocols. In addition, through experiments on mobile agents with active rules, it is suggested that the proposed system can optimize the role and function of the application system by using rules appropriate to the service characteristics and that it is scalable and effective for location-based service systems. This paper is a preliminary study for the establishment of an optimization system for utilizing resources (equipment, power, manpower, etc.) through the active characteristics of systems such as real-time remote autonomous control and exception handling over consumption patterns and behavior changes of power users. The proposed system can be used in system configurations that induce optimization of resource utilization through intelligent warning and action based on location of objects, and can be effectively applied to the development of various location service systems.

Fandom-Persona Design based on Social Network Analysis (소셜 네트워크 분석을 이용한 팬덤 페르소나 디자인)

  • Sul, Sanghun;Seong, Kihun
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.87-94
    • /
    • 2019
  • In this paper, the method of analyzing the unformatted data of consumers accumulated on social networks in the era of the Fourth Industrial Revolution by utilizing data from the service design and social psychology aspects was proposed. First, the fandom phenomenon, which shows subjective and collective behavior in a space on a social network rather than physical space, was defined from a data service perspective. The fandom model has been transformed into a collective level of customer Persona that has been analyzed at a personal level in traditional service design, and social network analysis that analyzes consumers' big data has been presented as an efficient way to pattern and visually analyze it. Consumer data collected through social leasing were pre-processed by column based on correlation, stability, missing, and ID-ness. Based on the above data, the company's brand strategy was divided into active and passive interventions and the effect of this strategic attitude on the growth direction of the consumer's fandom community was analyzed. To this end, the fandom model of consumers was proposed by dividing it into four strategies that the brand strategy had: stand-alone, decentralized, integrated and centralized, and the fandom shape of consumers was proposed as a growth model analysis technique that analyzes changes over time.

The Relationship among Leisure Experience, Exercise flow Adherence of Senior in Fitness Center (스포츠센터 노인 운동 프로그램 참여자의 여가경험과 여가몰입 및 운동만족의 관계)

  • Lee, Seung-Bum
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.2
    • /
    • pp.159-167
    • /
    • 2021
  • The main purpose of this study is to closely investigate the constructive relationship between leisure satisfaction, leisure ability, exercise satisfaction, and consistent motor behavior patterns of the elderly's participation in leisure life sports. In order to achieve this, we surveyed and utilized the sampling of conveniences that selected Yongin and Seongnam city in Gyeonggi-do sports clubs, and accumulated samples of the elderly in living sports. The sample size was 239 elderly people. Based on this, according to the purpose of the study, statistical techniques, spss 23.0, and amos programs were used for analysis. The satisfaction analysis used in the research for a data analysis includes frequency analysis, exploatory factor analysis, confirmatory facor analysis, reliability analysis, correnlation analysis and structure equation model analysis. The research has drawn the following conclusions, based on the above mentioned research method and its procedures: First, it affects the satisfaction of the leisure satisfaction movement. Second, leisure ability affects exercise satisfaction. Third, exercise satisfaction affects the consistent exercise persistence and immersion satisfaction of exercise. As a result, it can be seen that the leisure immersion according to the experience of leisure competence has an effect on the satisfaction of the exercise. As a result, and the continuation of the exercise.

Comparative Study of Anomaly Detection Accuracy of Intrusion Detection Systems Based on Various Data Preprocessing Techniques (다양한 데이터 전처리 기법 기반 침입탐지 시스템의 이상탐지 정확도 비교 연구)

  • Park, Kyungseon;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.11
    • /
    • pp.449-456
    • /
    • 2021
  • An intrusion detection system is a technology that detects abnormal behaviors that violate security, and detects abnormal operations and prevents system attacks. Existing intrusion detection systems have been designed using statistical analysis or anomaly detection techniques for traffic patterns, but modern systems generate a variety of traffic different from existing systems due to rapidly growing technologies, so the existing methods have limitations. In order to overcome this limitation, study on intrusion detection methods applying various machine learning techniques is being actively conducted. In this study, a comparative study was conducted on data preprocessing techniques that can improve the accuracy of anomaly detection using NGIDS-DS (Next Generation IDS Database) generated by simulation equipment for traffic in various network environments. Padding and sliding window were used as data preprocessing, and an oversampling technique with Adversarial Auto-Encoder (AAE) was applied to solve the problem of imbalance between the normal data rate and the abnormal data rate. In addition, the performance improvement of detection accuracy was confirmed by using Skip-gram among the Word2Vec techniques that can extract feature vectors of preprocessed sequence data. PCA-SVM and GRU were used as models for comparative experiments, and the experimental results showed better performance when sliding window, skip-gram, AAE, and GRU were applied.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.

Fraud Detection System Model Using Generative Adversarial Networks and Deep Learning (생성적 적대 신경망과 딥러닝을 활용한 이상거래탐지 시스템 모형)

  • Ye Won Kim;Ye Lim Yu;Hong Yong Choi
    • Information Systems Review
    • /
    • v.22 no.1
    • /
    • pp.59-72
    • /
    • 2020
  • Artificial Intelligence is establishing itself as a familiar tool from an intractable concept. In this trend, financial sector is also looking to improve the problem of existing system which includes Fraud Detection System (FDS). It is being difficult to detect sophisticated cyber financial fraud using original rule-based FDS. This is because diversification of payment environment and increasing number of electronic financial transactions has been emerged. In order to overcome present FDS, this paper suggests 3 types of artificial intelligence models, Generative Adversarial Network (GAN), Deep Neural Network (DNN), and Convolutional Neural Network (CNN). GAN proves how data imbalance problem can be developed while DNN and CNN show how abnormal financial trading patterns can be precisely detected. In conclusion, among the experiments on this paper, WGAN has the highest improvement effects on data imbalance problem. DNN model reflects more effects on fraud classification comparatively.

A Study on Causal Relationship About the Reparations Range (손해배상범위에 관한 인과관계의 연구)

  • Choi Hwan-Seok;Park Jong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.4
    • /
    • pp.146-157
    • /
    • 2006
  • Causal relationship means what relations the result occurred have with a fact as a reason. In general, a formular that no result exists without reasons is used for the method to confirm existence and inexistence of causal relationship. Problematic causal relationships in Private Law are reparations (Article No. 393 of Private Law) due to debt nonfulfillment and reparation due to tort (Application of Article No. 393 by Article No. 750, and No. 763 of Private Law). The purpose pursued by reparation system in private law is to promote equal burden of damages, and the range of reparation at this time is decided by the range of damage and the range of damage is decided by the principle of causal relationship. That the causal relationship theory fairly causes confusion by treating one problem and the other problem as the same thing, instead of dividing them according to the purpose of protection presented by the law is a reason of the criticism from different views.

  • PDF

Membership Fluidity and Knowledge Collaboration in Virtual Communities: A Multilateral Approach to Membership Fluidity (가상 커뮤니티의 멤버 유동성과 지식 협업: 멤버 유동성에 대한 다각적 접근)

  • Park, Hyun-jung;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.19-47
    • /
    • 2015
  • In this era of knowledge economy, a variety of virtual communities are proliferating for the purpose of knowledge creation and utilization. Since the voluntary contributions of members are the essential source of knowledge, member turnover can have significant implications on the survival and success of virtual communities. However, there is a dearth of research on the effect of membership turnover and even the method of measurement for membership turnover is left unclear in virtual communities. In a traditional context, membership turnover is calculated as the ratio of the number of departing members to the average number of members for a given time period. In virtual communities, while the influx of newcomers can be clearly measured, the magnitude of departure is elusive since explicit withdrawals are seldom executed. In addition, there doesn't exist a common way to determine the average number of community members who return and contribute intermittently at will. This study initially examines the limitations in applying the concept of traditional turnover to virtual communities, and proposes five membership fluidity measures based on a preliminary analysis of editing behaviors of 2,978 featured articles in English Wikipedia. Subsequently, this work investigates the relationships between three selected membership fluidity measures and group collaboration performance, reflecting a moderating effect dependent on work characteristic. We obtained the following results: First, membership turnover relates to collaboration efficiency in a right-shortened U-shaped manner, with a moderating effect from work characteristic; given the same turnover rate, the promotion likelihood for a more professional task is lower than that for a less professional task, and the likelihood difference diminishes as the turnover rate increases. Second, contribution period relates to collaboration efficiency in a left-shortened U-shaped manner, with a moderating effect from work characteristic; the marginal performance change per unit change of contribution period is greater for a less professional task. Third, the number of new participants per month relates to collaboration efficiency in a left-shortened reversed U-shaped manner, for which the moderating effect from work characteristic appears to be insignificant.

On the Problem of Virtue in Confucian and Neoconfucian Philosophy (유학 및 신유학 철학에서의 덕의 문제)

  • Gabriel, Werner
    • (The)Study of the Eastern Classic
    • /
    • no.50
    • /
    • pp.89-120
    • /
    • 2013
  • The concept of virtue seems to be one of the rare cases where the European and the Chinese traditions coincide. The meaning of the Latin word virtus and of Greek $aret{\acute{e}}$ seems to be similar to the Chinese $d{\acute{e}}$德. Most striking in virtue is that it is a capacity for self-realisation through action which is unique to man. On the other hand, there is something physical about it. It is the strength to do something. This strength overcomes the resistance of what is naturally given, it transforms the world, turns the natural world into a human one. In the Chinese tradition, $d{\acute{e}}$ 德, i.e. virtue, is therefore always connected with $da{\grave{o}}$ 道, the totality of natural forces. In the Chinese tradition, as opposed to the European one, virtue is itself considered to be a natural force that is present in man. This force sustains man's connectedness, unity and harmony with the surrounding world. Things exist through the unity of principle理 and ether氣. But the knowledge of this unity is due to principle. Moral and legal norms are shifted totally to the sphere of principle. Therefore their have found the final dissolution from a heroic models. Above all the classical Confucians, but also the other schools, would reply to this that there is nothing more precise than a concrete successful action. Its result fits the world perfectly. The difference is due to the differing interest of ethical thought. In the case of the Confucians the path is more direct. The actor establishes a precise pattern for other actions. Education therefore lies in detailed knowledge about forms of behaviour, not so much in conceptual differentiation. It is quite possible that generalisation may be a methodical prerequisite for success in this endeavour. That problem, too, is discussed. But the success of conceptualisation lies in the successful performance of individual actions, not in shaping actions in accordance with normative concepts.

The Analysis of Visiting Patterns for the Top of Seoseokdae in Mudeungsan National Park (무등산국립공원 서석대 정상부의 탐방패턴 분석)

  • Shim, Seok-Yeong;Park, Seok-Gon
    • Korean Journal of Environment and Ecology
    • /
    • v.31 no.2
    • /
    • pp.266-274
    • /
    • 2017
  • The purpose of this study was to analyze the number of visitors to the top of Seoseokdae in Mudeungsan National Park, in which visitors are concentrated, and their visiting patterns, thereby suggesting measures to manage the visitors. The number of annual visitors and the numbers of regional and seasonal visitors to Mudeungsan National Park, which affect the concentration of visits to Seoseokdae were analyzed using the data produced by an automatic digitizing device. A field study was conducted to examine the number of seasonal and periodic visitors to Seoseokdae and their visiting patterns. In 2015, the number of visitors was 2,563,651 and 83.9% of the visitors visited via the Jeungsimsa and Wonhyosa area that is near Gwangju City. This area is close to the Seoseokdae area and it is easy to hike between the areas. Therefore, there was an influx of most visitors to Seoseokdae into the Jeungsimsa and Wonhyosa area. In terms of seasonal visitors, the largest number of visitors came in the fall, followed by the summer, spring, and winter in order. However, the seasonal differences were not notable. There was no statistically significant correlation between the number of visitors and meteorological factors. This result may have been because Gwangju citizens frequently visit Mudeungsan regardless of period and weather. Visitors can get to Seoseokdae via the trails into Wonhyosa and Jangbuljae. A slightly larger number of visitors used the trail into Jangbuljae in the fall and winter, whereas a larger number of visitors used the trail into Wonhyosa in the summer. In general, there is a large influx of visitors into Jangbuljae, a strategic visiting point. However, a slightly larger number of visitors may have chosen the trail into Wonhyosa in the summer because they could hike under the shade of trees. In the summer, visitors stayed in Seoseokdae for a short time with a low level of crowdedness. On the other hand, in the fall and winter, visitors stayed in the area longer because they had lunch and rested. During the time, the number of momentary maximum visitors peaked, causing extreme crowdedness. Therefore, some visitors showed the visiting pattern of entering the grassland outside the designate zone. Because this behavior can damage the grassland on the top of Seoseokdae, which can lead to soil erosion, intensive visitor management may be necessary.