• Title/Summary/Keyword: Meta Rule

Search Result 56, Processing Time 0.023 seconds

Optimal solution search method by using modified local updating rule in ACS-subpath algorithm (부경로를 이용한 ACS 탐색에서 수정된 지역갱신규칙을 이용한 최적해 탐색 기법)

  • Hong, SeokMi;Lee, Seung-Gwan
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.443-448
    • /
    • 2013
  • Ant Colony System(ACS) is a meta heuristic approach based on biology in order to solve combinatorial optimization problem. It is based on the tracing action of real ants which accumulate pheromone on the passed path and uses as communication medium. In order to search the optimal path, ACS requires to explore various edges. In existing ACS, the local updating rule assigns the same pheromone to visited edge. In this paper, our local updating rule gives the pheromone according to the total frequency of visits of the currently selected node in the previous iteration. I used the ACS algoritm using subpath for search. Our approach can have less local optima than existing ACS and find better solution by taking advantage of more informations during searching.

Rule Acquisition Using Ontology Based on Graph Search (그래프 탐색을 이용한 웹으로부터의 온톨로지 기반 규칙습득)

  • Park, Sangun;Lee, Jae Kyu;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.95-110
    • /
    • 2006
  • To enhance the rule-based reasoning capability of Semantic Web, the XRML (eXtensible Rule Markup Language) approach embraces the meta-information necessary for the extraction of explicit rules from Web pages and its maintenance. To effectuate the automatic identification of rules from unstructured texts, this research develops a framework of using rule ontology. The ontology can be acquired from a similar site first, and then can be used for multiple sites in the same domain. The procedure of ontology-based rule identification is regarded as a graph search problem with incomplete nodes, and an A* algorithm is devised to solve the problem. The procedure is demonstrated with the domain of shipping rates and return policy comparison portal, which needs rule based reasoning capability to answer the customer's inquiries. An example ontology is created from Amazon.com, and is applied to the many online retailers in the same domain. The experimental result shows a high performance of this approach.

  • PDF

Design and Implementation of the Active Multi-Agent Middleware for the Sensor Network Application (센서 네트워크 응용을 위한 능동적 다중 에이전트 미들웨어 설계 및 구현)

  • Lee, Yon-Sik;Jang, Min-Seok
    • The KIPS Transactions:PartA
    • /
    • v.18A no.4
    • /
    • pp.159-164
    • /
    • 2011
  • In this paper, we suggest the active multi-agent middleware for the sensor network application. For this, firstly we design and implement the active rule based mobile agent middleware. The mobile agent in the proposed system visits the destination sensor nodes according to the migration list offered by the meta table in the name space of the naming agent, acquires and transmits sensor data according to the purpose and needs through the active rules, and directly executes the actions corresponding to the optional events(changed sensor data and/or time etc.). And then, we show the potential applicability of the active rule based mobile agent middleware in various active sensor networks through the interaction with the rule base system and context database system.

Meta-Validation for Consistency between UML Structural Diagram and Behavioral Diagram (UML 구조 다이어그램과 행위 다이어그램의 일관성 메타검증)

  • 하일규;강병욱
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1158-1171
    • /
    • 2003
  • The UML is a widely accepted standard in object-oriented modeling. As the UML is semantically rich, we can describe in detail the system that will be developed, but we cannot guarantee the correctness and consistency of the designed model. Therefore, it is important to minimize the error by verifying user models in an early stage. In this paper, we propose a method for verifying the consistency of UML structural diagrams and behavioral diagrams using OCL verification rules and meta-metamodel. The consistency is a nature for checking whether the structural diagrams and behavioral diagrams are coherently designed according to a specific requirement. First we build meta-metamodels of the structural diagram and behavioral diagram that are described with the UML diagrams and the related elements, we derive rules for verifying the consistency from each meta-metamodels, and then formally specify with the language such as OCL for automatic verification. Finally, we verify the usefulness of the rule through a case study.

A Study on the Insider Behavior Analysis Framework for Detecting Information Leakage Using Network Traffic Collection and Restoration (네트워크 트래픽 수집 및 복원을 통한 내부자 행위 분석 프레임워크 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.125-139
    • /
    • 2017
  • In this paper, we developed a framework to detect and predict insider information leakage by collecting and restoring network traffic. For automated behavior analysis, many meta information and behavior information obtained using network traffic collection are used as machine learning features. By these features, we created and learned behavior model, network model and protocol-specific models. In addition, the ensemble model was developed by digitizing and summing the results of various models. We developed a function to present information leakage candidates and view meta information and behavior information from various perspectives using the visual analysis. This supports to rule-based threat detection and machine learning based threat detection. In the future, we plan to make an ensemble model that applies a regression model to the results of the models, and plan to develop a model with deep learning technology.

[$^{13}C-NMR$ of the Phenolic Compounds

  • Ahn, Byung-Zun
    • Korean Journal of Pharmacognosy
    • /
    • v.11 no.3_4 s.43
    • /
    • pp.153-162
    • /
    • 1980
  • 1) The hydroxy-substitution in the simple phenolic compounds follows an additivity rule in the chemical shifts of their aromatic carbon atoms. In para-and ortho-effects is a good agreement between calculated and measured values, but the meta-effect is not certain. 2) The additivity rule was applied to assign the chemical shifts of catechins. 3) The nuclear overhauser effect was applied to assign the chemical shifts of C-8 and C-6 atoms of catechins and their polymer. The signal of C-8 is lower in intensity and appear in lower field than C-6. 4) The results of the NOE were applied to determine the bonding positions of catechin units in the catechin dimer and trimer. The bonding positions are C-8a and C-8b atoms of the second and third catechin units. 5) It was tried to determine the conformation of the catechin dimer and trimer by analysing the signal shapes of C-3' and C-4' atoms in the catechol moieties. The catechol moieties lie in opposite side in the dimer and trimer structure. A combined analysis of $^{13}C-and\;^1H-NMR$ results lead to the suggestion that such a catechin polymer is a zigzag planar form.

  • PDF

Design and Implementation of Rule-based Routing Configuration Fault Management System (규칙 기반 라우팅 구성 장애 관리 시스템의 설계 및 구현)

  • 황태인;황태인;안성진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1085-1095
    • /
    • 2000
  • In this paper, we have defined the rules and the algorithm for diagnosis and recovery of routing configuration fault on a system. By using them, we have implemented the Java-based system that can manage routing configuration fault automatically. To manage routing configuration fault, the production rule for network configuration management, the production rule for routing configuration fault diagnosis, and the production rule for routing configuration fault recovery have been proposed. Rule-based routing configuration fault management system has been implemented on the basis of backward chaining algorithm and applied for meta rules for the purpose of interconnecting the production rules. We have derived the experimental result from transition process of the rules, the Blackboard, the goals based on scenarios. Through the implementation of dynamically applicable system in heterogeneous and rapidly changing network environments, we have proposed the methodology for network configuration fault management. Also, we expect that network configuration manager can reduce time and cost wasted for routing configuration fault management.

  • PDF

Short-Distance Gate Subtree Algorithm for Capacitated Minimum Spanning Tree Problem (능력한정 최소신장트리 문제의 근거리 게이트 서브트리 알고리즘)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.33-41
    • /
    • 2021
  • This paper proposes heuristic greedy algorithm that can be find the solution within polynomial time with solution finding rule for the capacitated minimum spanning tree(CMST) problem, known as NP-hard. The CMST problem can be solved by computer-aided meta-heuristic because of the Esau-Williams heuristic polynomial time algorithm has a poor performance. Nevertheless the meta-heuristic methods has a limit performance that can't find optimal solution. This paper suggests visual by handed solution-finding rule for CMST. The proposed algorithm firstly construct MST, and initial feasible solution of CMST from MST, then optimizes the CMST with the subtree gates more adjacent to root node. As a result of total 30 cases of OR-LIB 10 data, Q=3,5,10, the proposed algorithm gets the best performance.

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

A Study on the Naming Rules of Metadata based on Ontology (온톨로지 기반 메타데이터 명명 규칙에 관한 연구)

  • Ko, Young-Man;Seo, Tae-Sul
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.4 s.58
    • /
    • pp.97-109
    • /
    • 2005
  • To build the consistency among different metadata systems and to increase the interoperability of that systems even among different domains, naming rules and glossaries for the data elements are necessary. This study provides discussion of naming and identification of the data element concept, data element, conceptual domain, value domain, and its meta model. This study also describes example naming conventions based on ontology derived from the combination with object, properties, and representation of data elements. The naming principles and rules described in this study use I-R analysis, DC metadata set, and SHOE 1.0 as an example of the scientific documents. This study would be a guideline to build the naming rules of metadata based on ontology in various domains.