• Title/Summary/Keyword: Behavior detection

Search Result 935, Processing Time 0.03 seconds

A Personaliz Customer Retention Procedure For Internet Game Site Based on the Self-Organizing Map and Association Rule Mining.

  • Song Hee Seok;Kim Jae Kyeong;Kim Soung Hie;Chae Kyung Hee
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.306-311
    • /
    • 2002
  • This paper propose a personalized defection detection and prevention procedure based on the observation that potential defectors have tendency to take a couple of months or weeks. For this purpose, possible states of customer behavior are determined from past behavior data using SOM (Self-Organizing Map). For the evaluation of the proposed procedure, a case study has been conducted for a Korean online game site. The result demonstestes that the proposed procedure can assist defection prevention effectively and detect potential defectors without deterioration of prediction accuracy comparison to prediction by MLP. Our procedure can be applied to various service industries that can capture fluent customer behavior data such as telecommunications, internet access services, and content services, too.

  • PDF

Detecting the Direction of Vibration Inspired by Prey Detection Behavior of Sand Scorpions (사막 전갈의 진동 감지 행동을 모델로 한 진원지 방향 추정 기법)

  • Jeong, Eun-Seok;Kim, Dae-Eun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.10
    • /
    • pp.947-954
    • /
    • 2012
  • Sand scorpions are nocturnal animals to mostly use tactile senses to detect their prey. It has been reported that sand scorpions have high vibration sensitivity for their prey-localizing behavior. We tested vibration experiments in the sand with microphone sensors to model the sand scorpion's behavior and a time-difference model was applied to find the direction of a vibration source. Using the information of the arrival time of the vibration signal to reach each leg position, we can find the location of the vibration source.

Electrochemical behavior and Application of Ruthenium-Cupferron Complex (루테늄-쿠페론의 전기화학적 행동 및 응용)

  • Kwon, Young-Soon;Park, So-Young
    • Analytical Science and Technology
    • /
    • v.17 no.6
    • /
    • pp.464-469
    • /
    • 2004
  • Cyclic voltammetry was used for elucidating the electrochemical behavior of Ru-cupferron complex in 1 mM phosphate buffer. The optimal conditions of ruthenium were found to be 1 mM phosphate buffer solution (pH 6.0) containing 0.1 mM cupferron, scan rate of 100 mV/s. By using the plot on the reduction peak currents of linear scan voltammograms vs. ruthenium concentration, the detection limit ($3{\sigma}$) was $1.2{\times}10^{-7}M$.

The Effect of Health Promotion Programs on Health Promoting Behavior and Cardiovascular Risk Factors of Middle-aged Women (건강증진프로그램이 중년기 여성의 건강증진행위와 심혈관계 위험요인에 미치는 영향)

  • Park, Jeong-Sook
    • Korean Journal of Adult Nursing
    • /
    • v.14 no.2
    • /
    • pp.233-243
    • /
    • 2002
  • Purpose: This study is aimed at testing the effect of health promotion program on health promoting behavior and cardiovascular risk factors of middle-aged women. Method: The research design was the nonequivalent control group pre-post test. Twelve middle-aged women were the experimental group and ten were the control group. The 8-week health promotion program was given to the experimental group. There were health promotion theories, flexibility and muscle strength exercise, cardiopulmonary endurance exercise, nutrition, stress management, cancer prevention and early detection, management of menopause and wrap-up in health promotion program for middle-aged women. The measurement tool was Health Promoting Behavior developed by researcher using serum cholesterol, obesity rate, systolic blood pressure, and diastolic blood pressure as cardiovascular risk factors. Result: The experimental group showed a higher score of health promoting behavior than the control group. There were no differences on cardiovascular risk factors(cholesterol, obesity rate, diastolic blood pressure) between the experimental and control groups except systolic blood pressure. Conclusion: Conclusively, this health promotion program for middle-aged women was effective in increasing health promotion behaviors, but wasn't effective in decreasing cardiovascular risk factors except the systolic blood pressure. It seems it's necessary to re-study this using more samples and a longer duration of the program, and smaller mortality rate.

  • PDF

Factors Influencing Cancer Rescreening Intention of Korean Elderly (암검진 수검 노인의 재수검의도에 미치는 요인)

  • Kim, Hee-Jung
    • The Korean Journal of Rehabilitation Nursing
    • /
    • v.18 no.2
    • /
    • pp.118-127
    • /
    • 2015
  • Purpose: This study was conducted to survey the cancer screening status of Korean elderly and to analyze factors influencing cancer rescreening intention. Methods: Participants were 262 elderly aged 65 or older who visited medical examination center at D University hospital located in D city. Data were collected from June 1 to July 31, 2012 using a structured questionnaire which included health behavior and cancer screening related characteristics, theory of planned behavior variables, EQ-5D, and cancer screening satisfaction. The data were analyzed by SPSS/WIN 18.0 program. Results: Factors influencing elderly's cancer rescreening intention were 'satisfaction about the cancer screening', 'attitude toward cancer rescreening behavior', 'subjective norm toward cancer rescreening behavior', and 'previous experience with cancer screening in the past 2 years'. Cancer rescreening intention was higher in participants with satisfied experience of cancer screening, more positive in attitude and higher in subjective norm toward cancer rescreening. Cancer rescreening intention was lower when participants were not screened for cancer in the past 2 years. Conclusion: The study results indicate that customized interventions based on influential factors such as subjective norm, attitude toward cancer screening, and cancer screening satisfaction are necessary in order to promote the consistent cancer screening of Korean elderly.

Context-Awareness Cat Behavior Captioning System (반려묘의 상황인지형 행동 캡셔닝 시스템)

  • Chae, Heechan;Choi, Yoona;Lee, Jonguk;Park, Daihee;Chung, Yongwha
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.21-29
    • /
    • 2021
  • With the recent increase in the number of households raising pets, various engineering studies have been underway for pets. The final purpose of this study is to automatically generate situation-sensitive captions that can express implicit intentions based on the behavior and sound of cats by embedding the already mature behavioral detection technology of pets as basic element technology in the video capturing research. As a pilot project to this end, this paper proposes a high-level capturing system using optical-flow, RGB, and sound information of cat videos. That is, the proposed system uses video datasets collected in an actual breeding environment to extract feature vectors from the video and sound, then through hierarchical LSTM encoder and decoder, to identify the cat's behavior and its implicit intentions, and to perform learning to create context-sensitive captions. The performance of the proposed system was verified experimentally by utilizing video data collected in the environment where actual cats are raised.

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

Detection of Privacy Information Leakage for Android Applications by Analyzing API Inter-Dependency and the Shortest Distance (API간 상호 의존성 및 최단거리 분석을 통한 안드로이드 애플리케이션의 개인정보 유출 탐지 기법)

  • Kim, Dorae;Park, Yongsu
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.707-714
    • /
    • 2014
  • In general, the benign apps transmit privacy information to the external to provide service to users as the malicious app does. In other words, the behavior of benign apps is similar to the one of malicious apps. Thus, the benign app can be easily manipulated for malicious purposes. Therefore, the malicious apps as well as the benign apps should notify the users of the possibility of privacy information leakage before installation to prevent the potential malicious behavior. In this paper, We propose the method to detect leakage of privacy information on the android app by analyzing API inter-dependency and shortest distance. Also, we present LeakDroid which detects leakage of privacy information on Android with the above method. Unlike dynamic approaches, LeakDroid analyzes Android apps on market site. To verify the privacy information leakage detection of LeakDroid, we experimented the well-known 250 malicious apps and the 1700 benign apps collected from Android Third party market. Our evaluation result shows that LeakDroid reached detection rate of 96.4% in the malicious apps and detected 68 true privacy information leakages inside the 1700 benign apps.

Improvement of Dynamic Behavior of Shunt Active Power Filter Using Fuzzy Instantaneous Power Theory

  • Eskandarian, Nasser;Beromi, Yousef Alinejad;Farhangi, Shahrokh
    • Journal of Power Electronics
    • /
    • v.14 no.6
    • /
    • pp.1303-1313
    • /
    • 2014
  • Dynamic behavior of the harmonic detection part of an active power filter (APF) has an essential role in filter compensation performances during transient conditions. Instantaneous power (p-q) theory is extensively used to design harmonic detectors for active filters. Large overshoot of p-q theory method deteriorates filter response at a large and rapid load change. In this study the harmonic estimation of an APF during transient conditions for balanced three-phase nonlinear loads is conducted. A novel fuzzy instantaneous power (FIP) theory is proposed to improve conventional p-q theory dynamic performances during transient conditions to adapt automatically to any random and rapid nonlinear load change. Adding fuzzy rules in p-q theory improves the decomposition of the alternating current components of active and reactive power signals and develops correct reference during rapid and random current variation. Modifying p-q theory internal high-pass filter performance using fuzzy rules without any drawback is a prospect. In the simulated system using MATLAB/SIMULINK, the shunt active filter is connected to a rapidly time-varying nonlinear load. The harmonic detection parts of the shunt active filter are developed for FIP theory-based and p-q theory-based algorithms. The harmonic detector hardware is also developed using the TMS320F28335 digital signal processor and connected to a laboratory nonlinear load. The software is developed for FIP theory-based and p-q theory-based algorithms. The simulation and experimental tests results verify the ability of the new technique in harmonic detection of rapid changing nonlinear loads.

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.