• Title/Summary/Keyword: Data Analyze

Search Result 18,922, Processing Time 0.042 seconds

An XPDL-Based Workflow Control-Structure and Data-Sequence Analyzer

  • Kim, Kwanghoon Pio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1702-1721
    • /
    • 2019
  • A workflow process (or business process) management system helps to define, execute, monitor and manage workflow models deployed on a workflow-supported enterprise, and the system is compartmentalized into a modeling subsystem and an enacting subsystem, in general. The modeling subsystem's functionality is to discover and analyze workflow models via a theoretical modeling methodology like ICN, to graphically define them via a graphical representation notation like BPMN, and to systematically deploy those graphically defined models onto the enacting subsystem by transforming into their textual models represented by a standardized workflow process definition language like XPDL. Before deploying those defined workflow models, it is very important to inspect its syntactical correctness as well as its structural properness to minimize the loss of effectiveness and the depreciation of efficiency in managing the corresponding workflow models. In this paper, we are particularly interested in verifying very large-scale and massively parallel workflow models, and so we need a sophisticated analyzer to automatically analyze those specialized and complex styles of workflow models. One of the sophisticated analyzers devised in this paper is able to analyze not only the structural complexity but also the data-sequence complexity, especially. The structural complexity is based upon combinational usages of those control-structure constructs such as subprocesses, exclusive-OR, parallel-AND and iterative-LOOP primitives with preserving matched pairing and proper nesting properties, whereas the data-sequence complexity is based upon combinational usages of those relevant data repositories such as data definition sequences and data use sequences. Through the devised and implemented analyzer in this paper, we are able eventually to achieve the systematic verifications of the syntactical correctness as well as the effective validation of the structural properness on those complicate and large-scale styles of workflow models. As an experimental study, we apply the implemented analyzer to an exemplary large-scale and massively parallel workflow process model, the Large Bank Transaction Workflow Process Model, and show the structural complexity analysis results via a series of operational screens captured from the implemented analyzer.

Big Data-based Medical Clinical Results Analysis (빅데이터 기반 의료 임상 결과 분석)

  • Hwang, Seung-Yeon;Park, Ji-Hun;Youn, Ha-Young;Kwak, Kwang-Jin;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.187-195
    • /
    • 2019
  • Recently, it has become possible to collect, store, process, and analyze data generated in various fields by the development of the technology related to the big data. These big data technologies are used for clinical results analysis and the optimization of clinical trial design will reduce the costs associated with health care. Therefore, in this paper, we are going to analyze clinical results and present guidelines that can reduce the period and cost of clinical trials. First, we use Sqoop to collect clinical results data from relational databases and store in HDFS, and use Hive, a processing tool based on Hadoop, to process data. Finally we use R, a big data analysis tool that is widely used in various fields such as public sector or business, to analyze associations.

Framework for False Alarm Pattern Analysis of Intrusion Detection System using Incremental Association Rule Mining

  • Chon Won Yang;Kim Eun Hee;Shin Moon Sun;Ryu Keun Ho
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.716-718
    • /
    • 2004
  • The false alarm data in intrusion detection systems are divided into false positive and false negative. The false positive makes bad effects on the performance of intrusion detection system. And the false negative makes bad effects on the efficiency of intrusion detection system. Recently, the most of works have been studied the data mining technique for analysis of alert data. However, the false alarm data not only increase data volume but also change patterns of alert data along the time line. Therefore, we need a tool that can analyze patterns that change characteristics when we look for new patterns. In this paper, we focus on the false positives and present a framework for analysis of false alarm pattern from the alert data. In this work, we also apply incremental data mining techniques to analyze patterns of false alarms among alert data that are incremental over the time. Finally, we achieved flexibility by using dynamic support threshold, because the volume of alert data as well as included false alarms increases irregular.

  • PDF

Use of Lèvy distribution to analyze longitudinal data with asymmetric distribution and presence of left censored data

  • Achcar, Jorge A.;Coelho-Barros, Emilio A.;Cuevas, Jose Rafael Tovar;Mazucheli, Josmar
    • Communications for Statistical Applications and Methods
    • /
    • v.25 no.1
    • /
    • pp.43-60
    • /
    • 2018
  • This paper considers the use of classical and Bayesian inference methods to analyze data generated by variables whose natural behavior can be modeled using asymmetric distributions in the presence of left censoring. Our approach used a $L{\grave{e}}vy$ distribution in the presence of left censored data and covariates. This distribution could be a good alternative to model data with asymmetric behavior in many applications as lifetime data for instance, especially in engineering applications and health research, when some observations are large in comparison to other ones and standard distributions commonly used to model asymmetry data like the exponential, Weibull or log-logistic are not appropriate to be fitted by the data. Inferences for the parameters of the proposed model under a classical inference approach are obtained using a maximum likelihood estimators (MLEs) approach and usual asymptotical normality for MLEs based on the Fisher information measure. Under a Bayesian approach, the posterior summaries of interest are obtained using standard Markov chain Monte Carlo simulation methods and available software like SAS. A numerical illustration is presented considering data of thyroglobulin levels present in a group of individuals with differentiated cancer of thyroid.

Analysis of the urban flood pattern using rainfall data and measurement flood data (강우사상과 침수 실측자료를 이용한 도시침수 양상 관계분석)

  • Moon, Hye Jin;Cho, Jae Woong;Kang, Ho Seon;Lee, Han Seung;Hwang, Jeong Geun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.95-95
    • /
    • 2020
  • Urban flooding occurs in the form of internal-water inundation on roads and lowlands due to heavy rainfall. Unlike in the case of rivers, inundation in urban areas there is lacking in research on predicting and warning through measurement data. In order to analyze urban flood patterns and prevent damage, it is necessary to analyze flooding measurement data for various rainfalls. In this study, the pattern of urban flooding caused by rainfall was analyzed by utilizing the urban flooding measuring sensor, which is being test-run in the flood prone zone for urban flooding management. For analysis, 2019 rainfall data, surface water depth data, and water level data of a street inlet (storm water pipeline) were used. The analysis showed that the amount of rainfall that causes flooding in the target area was identified, and the timing of inundation varies depending on the rainfall pattern. The results of the analysis can be used as verification data for the urban inundation limit rainfall under development. In addition, by using rainfall intensity and rainfall patterns that affect the flooding, it can be used as data for establishing rainfall criteria of urban flooding and predicting that may occur in the future.

  • PDF

Design of Infrastructure to Analyze Big Data (빅데이터 분석을 위한 인프라 설계)

  • Park, Sungbum;Lee, Sangwon;Ahn, Hyunsup;Jung, In-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.202-204
    • /
    • 2013
  • Nowadays, owing to the development of hardware, most of enterprises should operate and manage bigger amount of data than they used to do in the past. For this reason, the enterprises ceaselessly and urgently need systemized tools, platforms, and analysis methodologies in order to collect, store, and handle explosively increasing data. In this paper, we firstly understand key elements of Big Data, and secondly define critical factors for Big Data application with these elements. Thirdly, we research on various analysis techniques for Big Data analysis. Lastly, we propose an infrastructure to analyze bid data.

  • PDF

A Proposal on Data Modification Detection System using SHA-256 in Digital Forensics (디지털 포렌식을 위한 SHA-256 활용 데이터 수정 감지시스템 제안)

  • Jang, Eun-Jin;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.9-13
    • /
    • 2021
  • With the development of communication technology, various forms of digital crime are increasing, and the need for digital forensics is increasing. Moreover, if a textual document containing sensitive data is deliberately deleted or modified by a particular person, it could be important data to prove its connection to a particular person and crime through a system that checks for data modification detection. This paper proposes a data modification detection system that can analyze the hash data, file size, file creation date, file modification date, file access date, etc. of SHA-256, one of the encryption techniques, focusing on text files, to compare whether the target text file is modified or not.

A Study on How to Nurture New Players using Data Analysis (데이터 분석을 활용한 신인급 선수 육성 방안 연구)

  • You, Kangsoo
    • Journal of Industrial Convergence
    • /
    • v.19 no.4
    • /
    • pp.17-21
    • /
    • 2021
  • Recently, in the field of sports, the use of data in conducting games, planning seasons, and operating teams has increased significantly. Also, in order to develop better players, it has become necessary to use data to accurately analyze their performance. Therefore, in this study, various data about rookie players was collected and pre-processed in order to analyze and visualize their performance. Additionally, an analysis was conducted to determine at least how many opportunities should be given to foster rookie players. Then, a data analysis method was presented for nurturing athletes by using data in the field of sports. It is expected that this study will contribute to fostering rookie players by utilizing data.

A Spatial Regression for Hospital Data

  • Choi, Yong-Seok;Kang, Chang-Wan;Choi, Seung-Bae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.17 no.4
    • /
    • pp.1271-1278
    • /
    • 2006
  • Recently, a profit analysis in hospital management is considered as an important marketing concept. When spatial variability is presented, we must analyze the hospital data with spatial statistical methods. In this study, we present a regression model using spatial covariance for adjustment. And we compare the nonspatial model with spatial model.

  • PDF

Data Broadcasting systems for Digital Television (DTV를 위한 데이터방송 시스템)

  • 황재정;정동훈
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.507-510
    • /
    • 1999
  • Data broadcasting service is essential for the widespread deployment of the emerging DTV which can provide various new services, especially program related, computer-like data services. We analyze DVB and ATSC efforts and propose a data broadcasting model which is supposed to be included in Korea DTV specification.

  • PDF