• Title/Summary/Keyword: Data Mining Technique

Search Result 638, Processing Time 0.021 seconds

An IDS in MANET with Cross Layer Concept (크로스 층에서의 MANET을 이용한 IDS)

  • Kim, Sang-Eun;Han, Seung-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.41-48
    • /
    • 2010
  • Intrusion detection forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. We have proposed a novel cross layer intrusion detection architecture to discover the malicious nodes. The information available across different layers of protocol stack are exploited in order to improve the accuracy of detection. We have used cooperative and distributive anomaly intrusion detection with data mining technique to enhance the proposed architecture. The simulation of the proposed architecture is done in OPNET simulator and the results are analyzed.

An Analysis of the Characteristics of Companies introducing Smart Factory System Using Data Mining Technique (데이터 마이닝 기법을 활용한 스마트팩토리 도입 기업의 특성 분석)

  • Oh, Jeong-yoon;Choi, Sang-hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.179-189
    • /
    • 2018
  • Currently, research on smart factories is steadily being carried out in terms of implementation strategies and considerations in construction. Various studies have not been conducted on companies that introduced smart factories. This study conducted a questionnaire survey for SMEs applying the basic stage of smart factory. And the cluster analysis was conducted to examine the characteristics of the company. In addition, we conducted Decision Tree and Naive Bay to examine how the characteristics of a company are derived and compare the results. As a result of the cluster analysis, it was confirmed that the group was divided into the high satisfaction group and the low satisfaction group. The decision tree and the Naive Bay analysis showed that the higher satisfaction group has high productivity.

A review of recent research advances on structural health monitoring in Western Australia

  • Li, Jun;Hao, Hong
    • Structural Monitoring and Maintenance
    • /
    • v.3 no.1
    • /
    • pp.33-49
    • /
    • 2016
  • Structural Health Monitoring (SHM) has been attracting numerous research efforts around the world because it targets at monitoring structural conditions and performance to prevent catastrophic failure, and to provide quantitative data for engineers and infrastructure owners to design a reliable and economical asset management strategy. In the past decade, with supports from Australian Research Council (ARC), Cooperative Research Center for Infrastructure and Engineering Asset Management (CIEAM), CSIRO and industry partners, intensive research works have been conducted in the School of Civil, Environmental and Mining Engineering, University of Western Australia and Centre for Infrastructural Monitoring and Protection, Curtin University on various techniques of SHM. The researches include the development of hardware, software and various algorithms, such as various signal processing techniques for operational modal analysis, modal analysis toolbox, non-model based methods for assessing the shear connection in composite bridges and identifying the free spanning and supports conditions of pipelines, vibration based structural damage identification and model updating approaches considering uncertainty and noise effects, structural identification under moving loads, guided wave propagation technique for detecting debonding damage, and relative displacement sensors for SHM in composite and steel truss bridges. This paper aims at summarizing and reviewing the recent research advances on SHM of civil infrastructure in Western Australia.

Movie Recommendation System Based on Users' Personal Information and Movies Rated Using the Method of k-Clique and Normalized Discounted Cumulative Gain

  • Vilakone, Phonexay;Xinchang, Khamphaphone;Park, Doo-Soon
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.494-507
    • /
    • 2020
  • This study proposed the movie recommendation system based on the user's personal information and movies rated using the method of k-clique and normalized discounted cumulative gain. The main idea is to solve the problem of cold-start and to increase the accuracy in the recommendation system further instead of using the basic technique that is commonly based on the behavior information of the users or based on the best-selling product. The personal information of the users and their relationship in the social network will divide into the various community with the help of the k-clique method. Later, the ranking measure method that is widely used in the searching engine will be used to check the top ranking movie and then recommend it to the new users. We strongly believe that this idea will prove to be significant and meaningful in predicting demand for new users. Ultimately, the result of the experiment in this paper serves as a guarantee that the proposed method offers substantial finding in raw data sets by increasing accuracy to 87.28% compared to the three most successful methods used in this experiment, and that it can solve the problem of cold-start.

Anti-Fraud System for Credit Card By Using Hybrid Technique (Hybrid 기법을 적용한 효율적인 신용카드판단시스템)

  • 조문배;박길흠
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.5
    • /
    • pp.25-32
    • /
    • 2004
  • An anti-fraud system that utilizes association rules of fraud as well as AFS (Anti Fraud System) for credit card payments in e-commerce is proposed. The association rules are found by applying the data mining algorithm to millions of transaction records that have been generated as a result of orders on goods through the Internet. When a customer begins to process an order by using transaction components of a secure messaging protocol, the degree of risk for the transaction is assessed by using the found rules. More credit information will be requested or the transaction is rejected if it is interpreted as risky.

Development of fracture face mapping algorithm and its applications to the design of various engineering and environmental works. (토목설계 및 시공분야 지반조사를 위한 절리 단면 영상법 개발 및 그의 응용사례)

  • 김중열;김유성;김기석
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2002.03a
    • /
    • pp.119-126
    • /
    • 2002
  • Fractures, especially faults have most significant influence on the difficulties encountered in various engineering and mining works, because they can give rise to inevitable reductions in shear strength as well as large increase in permeability. Thus, before underground access is possible, it is desirable to estimate the distribution and geometry of fractures in advance, if reliable structural data from e.g. Televiewer tool are available. To this end, fracture face mapping is just the evaluation method used to form a fracture image determined by intersecting of each fracture plane with a selected plane section of a rock mass, assuming that all fractures be planar with fixed-aperture. Although many fractures are geometrically complex and others are altered chemically, according to the abundant experiments in recent years, it would seem that the technique could be applied to benefit the design of numerous engineering works such as slope stability, tunnel excavations, dam foundation and diverse environmental works. This paper presents at first an evaluation algorithm for fracture face mapping and then concludes with various representative examples of applications.

  • PDF

QP-DTW: Upgrading Dynamic Time Warping to Handle Quasi Periodic Time Series Alignment

  • Boulnemour, Imen;Boucheham, Bachir
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.851-876
    • /
    • 2018
  • Dynamic time warping (DTW) is the main algorithms for time series alignment. However, it is unsuitable for quasi-periodic time series. In the current situation, except the recently published the shape exchange algorithm (SEA) method and its derivatives, no other technique is able to handle alignment of this type of very complex time series. In this work, we propose a novel algorithm that combines the advantages of the SEA and the DTW methods. Our main contribution consists in the elevation of the DTW power of alignment from the lowest level (Class A, non-periodic time series) to the highest level (Class C, multiple-periods time series containing different number of periods each), according to the recent classification of time series alignment methods proposed by Boucheham (Int J Mach Learn Cybern, vol. 4, no. 5, pp. 537-550, 2013). The new method (quasi-periodic dynamic time warping [QP-DTW]) was compared to both SEA and DTW methods on electrocardiogram (ECG) time series, selected from the Massachusetts Institute of Technology - Beth Israel Hospital (MIT-BIH) public database and from the PTB Diagnostic ECG Database. Results show that the proposed algorithm is more effective than DTW and SEA in terms of alignment accuracy on both qualitative and quantitative levels. Therefore, QP-DTW would potentially be more suitable for many applications related to time series (e.g., data mining, pattern recognition, search/retrieval, motif discovery, classification, etc.).

Space Charge Behavior of Oil-Impregnated Paper Insulation Aging at AC-DC Combined Voltages

  • Li, Jian;Wang, Yan;Bao, Lianwei
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.635-642
    • /
    • 2014
  • The space charge behaviors of oil-paper insulation affect the stability and security of oil-filled converter transformers of traditional and new energies. This paper presents the results of the electrical aging of oil-impregnated paper under AC-DC combined voltages by the pulsed electro-acoustic technique. Data mining and feature extractions were performed on the influence of electrical aging on charge dynamics based on the experiment results in the first stage. Characteristic parameters such as total charge injection and apparent charge mobility were calculated. The influences of electrical aging on the trap energy distribution of an oil-paper insulation system were analyzed and discussed. Longer electrical aging time would increase the depth and energy density of charge trap, which decelerates the apparent charge mobility and increases the probability of hot electron formation. This mechanism would accelerate damage to the cellulose and the formation of discharge channels, enhance the acceleration of the electric field distortion, and shorten insulation lifetime under AC-DC combined voltages.

A Clustering Technique Using Association Rules for The Library and Information Science Terminology (연관규칙을 이용한 문헌정보학 전문용어 클러스터링 기법에 관한 연구)

  • Seung, Hyon-Woo;Park, Mi-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.2
    • /
    • pp.89-105
    • /
    • 2003
  • In this paper, an effective method for clustering terminologies extracted from text is proposed, in order to develope a search engine to extract relevant information from large web documents. To prevent frequency of the meaningless association rules among general terminologies, only useful association rules among terminologies are produced using database tables which consist of domain-specific terminologies. Such association rules are produced by applying the Apriori algorithm after forming transaction units from groups of association rules in a document. A group of association rules produced from a terminology forms in a cluster.

An Incremental Clustering Technique of XML Documents using Cluster Histograms (클러스터의 히스토그램을 이용한 XML 문서의 점진적 클러스터링 기법)

  • Hwang, Jeong-Hee
    • Journal of KIISE:Databases
    • /
    • v.34 no.3
    • /
    • pp.261-269
    • /
    • 2007
  • As a basic research to integrate and to retrieve XML documents efficiently, this paper proposes a clustering method by structures of XML documents. We apply an algorithm processing the many transaction data to the clustering of XML documents, which is a quite different method from the previous algorithms measuring structure similarity. Our method performs the clustering of XML documents not only using the cluster histograms that represent the distribution of items in clusters but also considering the global cluster cohesion. We compare the proposed method with the existing techniques by performing experiments. Experiments show that our method not only creates good quality clusters but also improves the processing time.