• 제목/요약/키워드: Key Tree

검색결과 417건 처리시간 0.028초

Knowledge Extractions, Visualizations, and Inference from the big Data in Healthcare and Medical

  • Kim, Jin Sung
    • 한국지능시스템학회논문지
    • /
    • 제23권5호
    • /
    • pp.400-405
    • /
    • 2013
  • The purpose of this study is to develop a composite platform for knowledge extractions, visualizations, and inference. Generally, the big data sets were frequently used in the healthcare and medical area. To help the knowledge managers/users working in the field, this study is focused on knowledge management (KM) based on Data Mining (DM), Knowledge Distribution Map (KDM), Decision Tree (DT), RDBMS, and SQL-inference. The proposed mechanism is composed of five key processes. Firstly, in Knowledge Parsing, it extracts logical rules from a big data set by using DM technology. Then it transforms the rules into RDB tables. Secondly, through Knowledge Maintenance, it refines and manages the knowledge to be ready for the computing of knowledge distributions. Thirdly, in Knowledge Distribution process, we can see the knowledge distributions by using the DT mechanism.Fourthly, in Knowledge Hierarchy, the platform shows the hierarchy of the knowledge. Finally, in Inference, it deduce the conclusions by using the given facts and data.This approach presents the advantages of diversity in knowledge representations and inference to improve the quality of computer-based medical diagnosis.

RocksDB에서 SST 파일에 따른 WAF 감소에 관한 연구 (A Study on WAF reduction and SST file size on RocksDB)

  • 조민수;최원기;박상현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2017년도 추계학술발표대회
    • /
    • pp.709-712
    • /
    • 2017
  • RocksDB는 Facebook에서 LevelDB를 기반으로 개발한 임베디드 key-value 스토리지 엔진이다. Log structured tree(LSM-tree)를 기본구조로 사용하는 RocksDB는 데이터를 레벨단위로 저장한다. 지속적인 데이터 입력으로 인하여 레벨의 크기를 초과하게 되면 하위 레벨의 SST 파일과 병합을 통해 하위레벨로 내려 보낸다. 이 과정에서 디바이스의 부가적인 쓰기가 발생한다. 본 논문에서는 RocksDB의 디스크영역에 있는 SST 파일의 크기가 디바이스의 쓰기 증폭에 미치는 영향을 분석하였다. SST 파일크기변화에 따른 디바이스의 쓰기 증폭과 성능변화를 측정하고 비교하였다. 실험결과를 통해 SST의 크기가 작을수록 쓰기 증폭이 줄었지만 디바이스의 쓰기와 읽기 성능이 감소하는 것을 확인하였다. 결과적으로 쓰기 증폭을 줄이고 성능을 최대화 하기 위해서는 이 둘의 트레이드오프를 파악하고 분석하여 시스템에 맞는 최적의 SST 파일 크기를 찾아야한다.

Let-List로 부터 Schematic Diagram 자동 생성기의 배치 알고리즘 (Placement Algorithm for Automatic Generator of Schematic Diagram Using Net-List)

  • 김환석;이천희
    • 대한전자공학회논문지
    • /
    • 제26권12호
    • /
    • pp.2039-2045
    • /
    • 1989
  • In this paper, we developed placement algorithm for drafting logic schmeatics. The algorithm of this system is to base placement on signal flow as opposed to connectivity. The key idea of this algorithm is that by dividing the schematic into simpler acyclic, uni-directional graphs, called tree. Then the components of tree and their interconnections have the characteristics that they can be laid out symmetrically without any crossovers. The interconnectivity between the trees are analyzed and a placement scheme is determined for them. Also, the trees are expended into their respective components. This algorithm is divided into four main phases: Initiate, Divide, Merge, Placement.

  • PDF

군분류 기술과 룰베이스를 이용한 공정계획 시스템 개발 (A Process Planning System Using Group Technology and Rule Base)

  • 이교일;이홍희;노상도;심영보;조현수
    • 산업공학
    • /
    • 제8권3호
    • /
    • pp.221-230
    • /
    • 1995
  • Computer Aided Process Planning(CAPP) has been emerged as playing a key role in Computer Integrated Manufacturing(CIM) as the most critical link to integrate CAD and CAM, and therefore much effort has been dedicated to the structure and creation of CAPP system. In this research, a modified variant CAPP system based on process planning rule base is developed, which generates process plans for parts automatically where GT code data are provided as input. In order to execute process planning, rules are constructed in the form of Decision Tree and this system has the inference engine that extracts the results of process planning on the basis of tree-structured rules which are concerned with manufacturing processes.

  • PDF

최대키 값을 이용한 CST-트리 인덱스의 빠른 재구축 (Fast Construction of CST-Tree Indexs Using Max-Key Values)

  • 이재원;이익훈;이상구
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 한국컴퓨터종합학술대회 논문집 Vol.32 No.1 (B)
    • /
    • pp.85-87
    • /
    • 2005
  • 메인 메모리 데이터베이스 시스템은 디스크 기반 데이터베이스 시스템에 비해 디스크 접근을 줄임으로써, 좀 더 빠른 트랜잭션 처리를 보여주고 있다. 그러나 전원 차단과 같은 장애 발생 시, 메모리의 휘발성으로 인한 데이터 손실에 항상 대비를 해야 한다. 증권, 통신사와 같이 실시간 서비스가 이루어지고, 시스템 장애가 큰 손실로 이어지는 곳에서는 장애 발생 시 데이터의 빠른 복구를 필요로 하게 된다. 본 논문은 메인 메모리 데이터베이스 시스템에서 백업 시에 인덱스의 최대키 값을 따로 저장하는 추가 작업을 통하여, 병렬처리가 가능한 CST-트리(Cache Sensitive T-tree)의 인덱스 복구 알고리즘을 제안한다.

  • PDF

FIRE WATER SYSTEM RELIABILITY IN INDUSTRIAL APPLICATIONS

  • James M. Dewey;Kim, Yong-Dal
    • 한국화재소방학회:학술대회논문집
    • /
    • 한국화재소방학회 1997년도 International Symposium on Fire Science and Technology
    • /
    • pp.526-533
    • /
    • 1997
  • Reliability of fire protection systems is often discussed, written about, and even put into codes and standards. However, reliability is seldom considered for the fire protection system as a whole. Why does this happen and why should the designer consider the system as a whole\ulcorner Existing codes and standards incorporate the concept of reliability usually In the form of key component redundancy for some parts of a system. The "Fire Safety Concepts Tree" presented in the National Fire Protection Association Guide 550, Guide to the Fire Safety Concepts Tree, provides a starting point for considering the performance of a water based fire suppression system. Considering fire protection objectives for water based fire suppression systems, means of evaluating system reliability can be developed. This development requires identification of system components that are significant to the overall system reliability.

  • PDF

철도차량의 효과적 RCM 적용을 위한 LTA로직 개발 (The Development of Logic of LTA(Logic Tree Analysis) for an Effective RCM Application of Rolling stock)

  • 송기태;김민호;백영구;신건영;이기서
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2008년도 추계학술대회 논문집
    • /
    • pp.1562-1569
    • /
    • 2008
  • In this paper, the study on development of an applicable logic on the characteristics of Rolling stocks will be proposed. In general, this logic which means decision logic or LTA(Logic Tree Analysis) is used to analyze how the failure mode have an effects on the system. The effect would be categorized as safety, operational, economical, etc. To do this, based on the typical logics which have been applied to other industries, such as plants, aero, etc. This paper emphasizes two crucial parameters that is one cost the other customer service, that have an important role in railway system operation. In conclusion, as mentioned above as the logic for which could be effectively applied for the railway system(RST) would be developed.

  • PDF

멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP (Authenticated IGMP for Controlling Access to Multicast Distribution Tree)

  • 박창섭;강현선
    • 정보보호학회논문지
    • /
    • 제17권2호
    • /
    • pp.3-17
    • /
    • 2007
  • 본 논문에서는 IGMP(Internet group management protocol)를 부당하게 사용함으로써 발생하는 DoS(Denial-of Service) 공격으로부터 멀티캐스트 분배트리를 보호하기 위해 IGMP의 보안관련 기능을 확장시킴으로써 수신자 접근제어기법을 제안하였다. IP 멀티캐스트 애플리케이션의 상업적인 적용을 위해 채택된 특정 네트워크와 비즈니스 모델을 기반으로, CP(Content Provider), NSP(Network Service Provider), 그룹멤버(group member)에 대한 회계 및 청구와 함께 제안 접근제어기법의 부트스트래핑(bootstrapping)을 위해 키 관리기법 또한 제시하였다.

A Research on IoT Security Technology based on Blockchain and Lightweight Cryptographic Algorithms

  • Sun-Jib Kim
    • International Journal of Advanced Culture Technology
    • /
    • 제11권1호
    • /
    • pp.343-348
    • /
    • 2023
  • As the IoT market continues to grow, security threats to IoT devices with limited resources are also increasing. However, the application of security technology to the existing system to IoT devices with limited resources is impossible due to the inherent characteristics of IoT devices. Various methods for solving related problems have been studied in existing studies to solve this problem. Therefore, this study analyzes the characteristics of domestic IoT authentication standards and existing research to propose an algorithm that applies blockchain-based authentication and lightweight encryption algorithms to IoT equipment with limited resources. In this study, a key generation method was applied using a Lamport hash-chain and data integrity between IoT devices were provided using a Merkle Tree, and an LEA encryption algorithm was applied using confidentiality in data communication. In the experiment, it was verified that the efficiency is high when the LEA encryption algorithm, which is a lightweight encryption algorithm, is applied to IoT devices with limited resources.

Complete Mitochondrial Genome of the Chagas Disease Vector, Triatoma rubrofasciata

  • Dong, Li;Ma, Xiaoling;Wang, Mengfei;Zhu, Dan;Feng, Yuebiao;Zhang, Yi;Wang, Jingwen
    • Parasites, Hosts and Diseases
    • /
    • 제56권5호
    • /
    • pp.515-519
    • /
    • 2018
  • Triatoma rubrofasciata is a wide-spread vector of Chagas disease in Americas. In this study, we completed the mitochondrial genome sequencing of T. rubrofasciata. The total length of T. rubrofasciata mitochondrial genome was 17,150 bp with the base composition of 40.4% A, 11.6% G, 29.4% T and 18.6% C. It included 13 protein-coding genes, 22 tRNA genes, 2 rRNA genes and one control region. We constructed a phylogenetic tree on the 13 protein-coding genes of T. rubrofasciata and other 13 closely related species to show their phylogenic relationship. The determination of T. rubrofasciata mitogenome would play an important role in understanding the genetic diversity and evolution of triatomine bugs.