• Title/Summary/Keyword: Class association rule

Search Result 36, Processing Time 0.02 seconds

Exploring Convergence Fields of Safety Technology Using ARM-Based Patent Co-Classification Analysis (공통특허분류 분석을 활용한 안전기술융합분야 탐색 : Association Rule Mining(ARM) 접근법)

  • Suh, Yongyoon
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.5
    • /
    • pp.88-95
    • /
    • 2017
  • As the safety fields are expanding to a variety of industrial fields, safety technology has been developed by convergence between industrial safety fields such as mechanics, ergonomics, electronics, chemistry, construction, and information science. As the technology convergence is facilitating recently advanced safety technology, it is important to explore the trends of safety technology for understanding which industrial technologies have been integrated thus far. For studying the trends of technology, the patent is considered one of the useful sources that has provided the ample information of new technology. The patent has been also used to identify the patterns of technology convergence through various quantitative methods. In this respect, this study aims to identify the convergence patterns and fields of safety technology using association rule mining(ARM)-based patent co-classification(co-class) analysis. The patent co-class data is especially useful for constructing convergence network between technological fields. Through linkages between technological fields, the core and hub classes of convergence network are explored to provide insight into the fields of safety technology. As the representative method for analyzing patent co-class network, the ARM is used to find the likelihood of co-occurrence of patent classes and the ARM network is presented to visualize the convergence network of safety technology. As a result, we find three major convergence fields of safety technology: working safety, medical safety, and vehicle safety.

A Case Study in Relation to the Class Arbitration under Voyage Charter -Focused on the Asbatankvoy Form- (항해용선계약상 집단대표중재관련의 사례분석 -Asbatankvoy 서식을 중심으로-)

  • Han, Nak-Hyun
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.1
    • /
    • pp.55-73
    • /
    • 2011
  • The purpose of this study aims to analyse the effect of class arbitration under voyage charter with Asbatankvoy form. This study analyses the Stolt-Nielsen case as a data. In this case, One Class Rule requires an arbitrator to determine whether an arbitration clause permits class arbitration. The parties selected an arbitration panel, designated New York City as the arbitration site, and stipulated that their arbitration clause was silent on the class arbitration issue. The panel determined that the arbitration clause allowed for class arbitration, but the District Court vacated the award. But the Second Circuit reversed, holding that because petitioners had cited no authority applying a maritime rule of customs and usage against class arbitration, the arbitrators' decision was not in manifest disregard of maritime law; and that the arbitrators had not manifestly disregarded New York law, which had not established a rule against class arbitration. However, the Supreme Court held, imposing class arbitration on parties who have not agreed to authorize class arbitration is inconsistent with the Federal Arbitration Act.

A New Association Rule Mining based on Coverage and Exclusion for Network Intrusion Detection (네트워크 침입 탐지를 위한 Coverage와 Exclusion 기반의 새로운 연관 규칙 마이닝)

  • Tae Yeon Kim;KyungHyun Han;Seong Oun Hwang
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.77-87
    • /
    • 2023
  • Applying various association rule mining algorithms to the network intrusion detection task involves two critical issues: too large size of generated rule set which is hard to be utilized for IoT systems and hardness of control of false negative/positive rates. In this research, we propose an association rule mining algorithm based on the newly defined measures called coverage and exclusion. Coverage shows how frequently a pattern is discovered among the transactions of a class and exclusion does how frequently a pattern is not discovered in the transactions of the other classes. We compare our algorithm experimentally with the Apriori algorithm which is the most famous algorithm using the public dataset called KDDcup99. Compared to Apriori, the proposed algorithm reduces the resulting rule set size by up to 93.2 percent while keeping accuracy completely. The proposed algorithm also controls perfectly the false negative/positive rates of the generated rules by parameters. Therefore, network analysts can effectively apply the proposed association rule mining to the network intrusion detection task by solving two issues.

Class Code Generation method for Component model Construction (컴포넌트 모델구축을 위한 클래스 코드 자동생성 방법)

  • Lim, Keun;Lee, Ki-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.69-76
    • /
    • 2008
  • In this thesis, we implemented the prototype system for the class code generator based on consistent code generation process and standard type, the class to be component unit. Particularly, we proposed relationship rule to solve the difficult problem by the object-oriented language to association and aggregation between classes based on component, through this method we can make to consistent code generation standard. Also it is adopted to component model construction which is generated code using code generation, and it can be basic assembly and deployment of business components to reusable target in developing application system.

  • PDF

A Rule-driven Automatic Learner Grouping System Supporting Various Class Types (다양한 수업 유형을 지원하는 규칙 기반 학습자 자동 그룹핑 시스템)

  • Kim, Eun-Hee;Park, Jong-Hyun;Kang, Ji-Hoon
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.3
    • /
    • pp.291-300
    • /
    • 2010
  • Group-based learning is known to be an effective means to improve scholastic achievement in online learning. Therefore, there are some previous researches for the group-based learning. A lot of previous researches define factors for grouping from the characteristics of classes, teacher's decision and students' preferences and then generate a group based on the defined factors. However, many algorithms proposed by previous researches depend on a specific class and is not a general approach since there exist several differences in terms of the need of courses, learners, and teachers. Moreover it is hard to find a automatic system for group generation. This paper proposes a grouping system which automatically generate a learner group according to characteristics of various classes. the proposed system automatically generates a learner group by using basic information for a class or additional factors inputted from a user. The proposed system defines a set of rules for learner grouping which enables automatic selection of a learner grouping algorithm tailored to the characteristics of a given class. This rule based approach allows the proposed system to accommodate various learner grouping algorithms for a later use. Also we show the usability of our system by serviceability evaluation.

  • PDF

A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection (알려지지 않은 위협 탐지를 위한 CBA와 OCSVM 기반 하이브리드 침입 탐지 시스템)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Yun, Jiyoung;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.27-35
    • /
    • 2021
  • With the development of the Internet, various IT technologies such as IoT, Cloud, etc. have been developed, and various systems have been built in countries and companies. Because these systems generate and share vast amounts of data, they needed a variety of systems that could detect threats to protect the critical data contained in the system, which has been actively studied to date. Typical techniques include anomaly detection and misuse detection, and these techniques detect threats that are known or exhibit behavior different from normal. However, as IT technology advances, so do technologies that threaten systems, and these methods of detection. Advanced Persistent Threat (APT) attacks national or companies systems to steal important information and perform attacks such as system down. These threats apply previously unknown malware and attack technologies. Therefore, in this paper, we propose a hybrid intrusion detection system that combines anomaly detection and misuse detection to detect unknown threats. Two detection techniques have been applied to enable the detection of known and unknown threats, and by applying machine learning, more accurate threat detection is possible. In misuse detection, we applied Classification based on Association Rule(CBA) to generate rules for known threats, and in anomaly detection, we used One-Class SVM(OCSVM) to detect unknown threats. Experiments show that unknown threat detection accuracy is about 94%, and we confirm that unknown threats can be detected.

Review of the KCAB International Arbitration Rules, Recently Revised, in Comparison with the Revised ICC Arbitration Rules (대한상사중재원 국제중재규칙의 개정 동향 - ICC 중재규칙의 개정과 비교하여 -)

  • Park, Won-Hyung
    • Journal of Arbitration Studies
    • /
    • v.22 no.2
    • /
    • pp.159-176
    • /
    • 2012
  • The Korean Commercial Arbitration Board (KCAB) recently revised its International Arbitration Rules in a way that reflects its efforts to advance its procedures, leading directly to improved competitiveness as an arbitration institute. Apart from certain limitations, the KCAB's international arbitration rule revision introduced several new arbitration mechanisms, including fast-track arbitration and an empowered administrative office. The International Chamber of Commerce (ICC) released a revised set of arbitration rules (ICC Arbitration Rules), which have been said to be probably the most consulted-on arbitration rules ever. Even though the changes codify existing ICC court practice and add to the 1998 rules only provisions felt necessary in light of input from the users of arbitration, some of the changes will have huge implications for future aspects of arbitration mechanisms, especially those of KCAB. Although it remains to be seen what impact the ICC Arbitration Rules will have in practice, the new rules have been well received by the arbitration community and represent a modern set of provisions consistent with the current needs of the users of international arbitration. That is why, here in the Korean arbitration environment, further research is needed on the possibilities of introducing several elements of the revised ICC Arbitration Rules to improve the speed and cost efficiency of international arbitration.

  • PDF

Korean High School Students' Perceptions of English Extensive Reading and Development of an ER Class Model (고등학생의 영어 다독 인식 및 다독 수업 모형 개발)

  • Jeon, Young-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.462-469
    • /
    • 2020
  • This study investigated high school students' perception of English extensive reading (ER) after introducing ER to general high school students in a metropolitan area. In addition, as the free semester system was expanded in high schools as well as middle schools, we developed a class model for English extensive reading. 91.4 percent of the students who participated in the study said that they wanted to try using the English extensive reading method. Also 35 high school students who experienced English extensive reading chose the 'Five Finger rule' and 'Graded Readers' Series' as the most helpful factors in their extensive reading experiences. In interviews with English teachers, teachers expressed their demand for the development of a model of English extensive reading suitable for free semesters in general high schools. This study proposes an English extensive reading class model utilizing library resources that can be used in the free semester system as well as a performance assessment-oriented English extensive reading class model.

A Study on System Applications of e-CRM to Enforcement of consumer Service (e-Commerce 쇼핑몰의 소비자 서비스 강화를 위한 활용연구)

  • Kim Yeonjeong
    • Journal of the Korean Home Economics Association
    • /
    • v.43 no.3 s.205
    • /
    • pp.1-10
    • /
    • 2005
  • The purpose of this study was to investigate the enforcement strategy for Consumer Service marketing of an e-Commerce shopping mall. An e-CRM for a Cosmetic e-Commerce shopping mall, Data Warehousing(DW) component, analysis of data mining of the DW, and web applications and strategies had to developed for marketing of consumer service satisfaction. The major findings were as follows: An RFM analysis was used for consumer classification, which is a fundamental process of e-CRM application. The components of the DW were web sales data and consumer data fields. The visual process of consumer segmentations (superior consumer class) for e-CRM solutions is presented. The association analysis algorithm of data mining to up-selling and cross-selling indicates an association rule. These e-CRM results apply web DB marketing and operating principles to a shopping mall. Therefore, the system applications of e-CRM to Consumer services indicate a marketing strategy for consumer-oriented management.

An Associative Class Set Generation Method for supporting Location-based Services (위치 기반 서비스 지원을 위한 연관 클래스 집합 생성 기법)

  • 김호숙;용환승
    • Journal of KIISE:Databases
    • /
    • v.31 no.3
    • /
    • pp.287-296
    • /
    • 2004
  • Recently, various location-based services are becoming very popular in mobile environments. In this paper, we propose a new concept of a frequent item set, called “associative class set”, for supporting the location-based service which uses a large quantity of a spatial database in mobile computing environments, and then present a new method for efficiently generating the associative class set. The associative class set is generated with considering the temporal relation of queries, the spatial distance of required objects, and access patterns of users. The result of our research can play a fundamental role in efficiently supporting location-based services and in overcoming the limitation of mobile environments. The associative class set can be applied by a recommendation system of a geographic information system in mobile computing environments, mobile advertisement, city development planning, and client cache police of mobile users.