• Title/Summary/Keyword: Classification rule

Search Result 544, Processing Time 0.027 seconds

An Analysis on the San-Sul-Kwa Textbook under the Rule of Japanese Imperialism(1909~1945) (일제강점기 산술과 분석)

  • 김민경;김경자
    • Journal for History of Mathematics
    • /
    • v.17 no.3
    • /
    • pp.43-60
    • /
    • 2004
  • The aims of the study were to analyze the San-Sul-Kwa textbook under the rule of Japanese Imperialism(1909~1945). It was analyzed that the contents of San-Sul-Kwa were selected for the purpose of national interests of Japanese as a ruling country through four times of amendment of education and many kinds of drill and practice in terms of number and operations were emphasized toward entire grades. However, some parts of textbook over the period seem to have had significant affects on mathematics education of Korea since the period.

  • PDF

Intrusion Detection System using Pattern Classification with Hashing Technique (패턴분류와 해싱기법을 이용한 침입탐지 시스템)

  • 윤은준;김현성;부기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.75-82
    • /
    • 2003
  • Computer and network security has recently become a popular subject due to the explosive growth of the Internet Especially, attacks based on malformed packet are difficult to detect because these attacks use the skill of bypassing the intrusion detection system and Firewall. This paper designs and implements a network-based intrusion detection system (NIDS) which detects intrusions with malformed-packets in real-time. First, signatures, rules in NIDS like Snouts rule files, are classified using similar properties between signatures NIDS creates a rule tree applying hashing technique based on the classification. As a result the system can efficiently perform intrusion detection.

  • PDF

Guitar Tab Digit Recognition and Play using Prototype based Classification

  • Baek, Byung-Hyun;Lee, Hyun-Jong;Hwang, Doosung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.19-25
    • /
    • 2016
  • This paper is to recognize and play tab chords from guitar musical sheets. The musical chord area of an input image is segmented by changing the image in saturation and applying the Grabcut algorithm. Based on a template matching, our approach detects tab starting sections on a segmented musical area. The virtual block method is introduced to search blanks over chord lines and extract tab fret segments, which doesn't cause the computation loss to remove tab lines. In the experimental tests, the prototype based classification outperforms Bayesian method and the nearest neighbor rule with the whole set of training data and its performance is similar to that of the support vector machine. The experimental result shows that the prediction rate is about 99.0% and the number of selected prototypes is below 3.0%.

A methodology for Internet Customer segmentation using Decision Trees

  • Cho, Y.B.;Kim, S.H.
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2003.05a
    • /
    • pp.206-213
    • /
    • 2003
  • Application of existing decision tree algorithms for Internet retail customer classification is apt to construct a bushy tree due to imprecise source data. Even excessive analysis may not guarantee the effectiveness of the business although the results are derived from fully detailed segments. Thus, it is necessary to determine the appropriate number of segments with a certain level of abstraction. In this study, we developed a stopping rule that considers the total amount of information gained while generating a rule tree. In addition to forwarding from root to intermediate nodes with a certain level of abstraction, the decision tree is investigated by the backtracking pruning method with misclassification loss information.

  • PDF

Nearest Neighbor Based Prototype Classification Preserving Class Regions

  • Hwang, Doosung;Kim, Daewon
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1345-1357
    • /
    • 2017
  • A prototype selection method chooses a small set of training points from a whole set of class data. As the data size increases, the selected prototypes play a significant role in covering class regions and learning a discriminate rule. This paper discusses the methods for selecting prototypes in a classification framework. We formulate a prototype selection problem into a set covering optimization problem in which the sets are composed with distance metric and predefined classes. The formulation of our problem makes us draw attention only to prototypes per class, not considering the other class points. A training point becomes a prototype by checking the number of neighbors and whether it is preselected. In this setting, we propose a greedy algorithm which chooses the most relevant points for preserving the class dominant regions. The proposed method is simple to implement, does not have parameters to adapt, and achieves better or comparable results on both artificial and real-world problems.

TrAdaBoost-based Flow Rule Classification Technique in SDN Environment (SDN 환경에서의 TrAdaBoost 기반 Flow 규칙 구분 기법)

  • Kim, Min-Woo;Lim, Hwan-Hee;Lee, Byung-Jun;Kim, Kyung-Tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.149-150
    • /
    • 2019
  • 기존의 Flow 규칙 구분을 위해 연구되었던 기법들은 적응적 또는 사전 처리의 접근법이 제안되었으나 각각의 장단점을 기반으로 효율적인 접근법이 연구되어야한다. 본 연구에서는 Flow 규칙을 삽입하기 전에, 스위치의 계산 작업을 완화하기 위하여 전이 학습 기법인 TrAdaBoost를 이용함으로써 Flow 규칙들을 구분하는 접근법을 제안한다.

  • PDF

TCAM Partitioning for High-Performance Packet Classification (고성능 패킷 분류를 위한 TCAM 분할)

  • Kim Kyu-Ho;Kang Seok-Min;Song Il-Seop;Kwon Teack-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2B
    • /
    • pp.91-97
    • /
    • 2006
  • As increasing the network bandwidth, the threat of a network also increases with emerging various new services. For a high-performance network security, It is generally used that high-speed packet classification methods which employ hardware like TCAM. There needs an method using these devices efficiently because they are expensive and their capacity is not sufficient. In this paper, we propose an efficient packet classification using a Ternary-CAM(TCAM) which is widely used device for high-speed packet classification in which we have applied Snort rule set for the well-known intrusion detection system. In order to save the size of an expensive TCAM, we have eliminated duplicated IP addresses and port numbers in the rule according to the partitioning of a table in the TCAM, and we have represented negation and range rules with reduced TCAM size. We also keep advantages of low TCAM capacity consumption and reduce the number of TCAM lookups by decreasing the TCAM partitioning using combining port numbers. According to simulation results on our TCAM partitioning, the size of a TCAM can be reduced by upto 98$\%$ and the performance does not degrade significantly for high-speed packet classification with a large amount of rules.

Standardization Study of Font Shape Classification for Hangul Font Registration System (한글 글꼴 등록 시스템을 위한 글꼴 모양 분류체계 표준화 연구)

  • Kim, Hyun-Young;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.3
    • /
    • pp.571-580
    • /
    • 2017
  • Recently, there are many communication softwares based on text on various smart devices. Unlike traditional print publishing, mobile publishing and SNS tools tends to utilize more decorative or more emotional fonts so that users can pass some feelings from contents. So font providers have released new fonts which deal with the requirements of the market. Nevertheless being released lots of new fonts, general users have not used them because they searched only by font name or font provider's name. It means that there is no way for users to know and find new things. In this study, we suggest font shape classification rules for font registration system based on font design features. We proved the validity of classification standard study through some experiments with 50 commercial fonts. Also the result of this study was provided for Korea Telecommunication Technology Association and adopted by the Korea industrial standard.

A Knowledge Based Physical Activity Evaluation Model Using Associative Classification Mining Approach (연관 분류 마이닝 기법을 활용한 지식기반 신체활동 평가 모델)

  • Son, Chang-Sik;Choi, Rock-Hyun;Kang, Won-Seok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.4
    • /
    • pp.215-223
    • /
    • 2018
  • Recently, as interest of wearable devices has increased, commercially available smart wristbands and applications have been used as a tool for personal healthy management. However most previous studies have focused on evaluating the accuracy and reliability of the technical problems of wearable devices, especially step counts, walking distance, and energy consumption measured from the smart wristbands. In this study, we propose a physical activity evaluation model using classification rules, induced from the associative classification mining approach. These rules associated with five physical activities were generated by considering activities and walking times in target heart rate zones such as 'Out-of Zone', 'Fat Burn Zone', 'Cardio Zone', and 'Peak Zone'. In the experiment, we evaluated the prediction power of classification rules and verified its effectiveness by comparing classification accuracies between the proposed model and support vector machine.

A Three-Step Preprocessing Algorithm for Enhanced Classification of E-Mail Recommendation System (이메일 추천 시스템의 분류 향상을 위한 3단계 전처리 알고리즘)

  • Jeong Ok-Ran;Cho Dong-Sub
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.4
    • /
    • pp.251-258
    • /
    • 2005
  • Automatic document classification may differ significantly according to the characteristics of documents that are subject to classification, as well as classifier's performance. This research identifies e-mail document's characteristics to apply a three-step preprocessing algorithm that can minimize e-mail document's atypical characteristics. In the first 5go, uncertain based sampling algorithm that used Mean Absolute Deviation(MAD), is used to address the question of selection learning document for the rule generation at the time of classification. In the subsequent stage, Weighted vlaue assigning method by attribute is applied to increase the discriminating capability of the terms that appear on the title on the e-mail document characteristic level. in the third and last stage, accuracy level during classification by each category is increased by using Naive Bayesian Presumptive Algorithm's Dynamic Threshold. And, we implemented an E-Mail Recommendtion System using a three-step preprocessing algorithm the enable users for direct and optimal classification with the recommendation of the applicable category when a mail arrives.