• Title/Summary/Keyword: On-Line Mining

Search Result 129, Processing Time 0.032 seconds

The Development of Design Knowledge Management System Using Data Mining (Data Mining 기법을 활용한 디자인 지식경영 시스템 구축)

  • 양종열;오민권;최경은
    • Archives of design research
    • /
    • v.16 no.2
    • /
    • pp.281-290
    • /
    • 2003
  • In the knowledge and information-based age of today, it would be fair to say that the compatibility of each person, enterprise, and nation can be evaluated by how each of them manages and maintains the knowledge created from data and information. Since the importance and necessity of knowledge management has been acknowledged, there have been studies to create, apply, and evaluate the knowledge concerning design. Previous studies done on this subject can be divided into three main categories - CRM, online statistical research, and eCRM - according to the materials used to create knowledge. These studies are meaningful in that they can create knowledge in their respective fields, although they are somewhat inadequate because the designers can't create as much knowledge as can be applied in business; design-related consumers demand composite knowledge integrating the characteristics of all three fields. In other words, they want to know the ordinary customers'preferences in the previous off-line market in the CRM field, the research results of statistical questionnaires to the various elements of design in statistical research fields, and even the pattern of preference and consumption of many and unspecified persons transcending the time and place in eCRU field. This study proposes to solve the problem related with web-based design knowledge maintenance through the synthetic application of CRM, Statistical Research, and eCRM The information proposed in the solution can De expected to help designers working at design-related enterprises, as well as research institutes, to develop the knowledge necessary to design more consumer-oriented products.

  • PDF

Travel Patterns of Transit Users in the Metropolitan Seoul (서울시 대중교통 이용자의 통행패턴 분석)

  • Lee, Keum-Sook;Park, Jong-Soo
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.9 no.3
    • /
    • pp.379-395
    • /
    • 2006
  • The purpose of this study is to analyze the spatial characteristics of travel patterns and travel behaviors of transit users in the Metropolitan Seoul area. We apply the data mining techniques to explore the travel patterns of transit users from the T-money card database which has been produced over 10,000,000 transaction records per day. The database contains the information of locations and times of origin, transfer, and destination points for each transaction as well as the informations of transit modes taken via the transaction. We develop an data mining algorithm to explore traversal patterns from the enormous information. The algorithm determines the travel sequences of each passenger, and produce the volumes of support on each points (stops) of transportation networks in the Metropolitan Seoul area. In order to visualize the spatial patterns of travel demands for transit systems we apply GIS techniques, and attempt to investigate the spatial characteristics of travel patterns and travel demand. Subway stops located in the Gangnam area appear the highest peak for the travel origin and destination, while the CBD in the Gangbuk stands at the second position. Two or three sub-peaks appear at the densely populated residential areas developed as the high-rise apartment complex. Subway stations located along the Subway Line 2, especially from Guro to Samsung receive heavy travel demand (total support), while bus stops located at the CBD in the Gangbuk stands the highest travel demand by bus.

  • PDF

Analysis of Home Economics Curriculum Using Text Mining Techniques (텍스트 마이닝 기법을 활용한 중학교 가정과 교육과정 분석)

  • Lee, Gi-Sen;Lim, So-Jin;Choi, Yoo-ri;Kim, Eun-Jong;Lee, So-Young;Park, Mi-Jeong
    • Journal of Korean Home Economics Education Association
    • /
    • v.30 no.3
    • /
    • pp.111-127
    • /
    • 2018
  • The purpose of this study was to analysis the home economics education curriculum from the first national curriculum to the 2015 revised curriculum using text mining techniques used in big data analysis. The subjects of the analysis were 10 curriculum texts from the first national curriculum to the 2015 revised curriculum via the National Curriculum Information Center. The major findings of this study were as follows; First, the number of data from the 4th curriculum to the 2015 revised curriculum gradually increased. Second, as a result of extracting core concept of the curriculum, there were core concept words that were changed and maintained according to the curriculum. 'Life' and 'home' were core concepts that persisted regardless of changes in the curriculum, after the 2007 revised curriculum, 'problem', 'ability', 'solution' and 'practice' were emphasized. Third, through core concept network analysis for each curriculum, the relationship between core concepts is represented by nodes and lines in each home economics curriculum. As a result, it was confirmed that the core concepts emphasized by the times are strongly connected with 'life' and 'home'. Based on these results, this study is meaningful in that it provides basic data to form the identity and the existing direction of home economics education.

OLAP4R: A Top-K Recommendation System for OLAP Sessions

  • Yuan, Youwei;Chen, Weixin;Han, Guangjie;Jia, Gangyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2963-2978
    • /
    • 2017
  • The Top-K query is currently played a key role in a wide range of road network, decision making and quantitative financial research. In this paper, a Top-K recommendation algorithm is proposed to solve the cold-start problem and a tag generating method is put forward to enhance the semantic understanding of the OLAP session. In addition, a recommendation system for OLAP sessions called "OLAP4R" is designed using collaborative filtering technique aiming at guiding the user to find the ultimate goals by interactive queries. OLAP4R utilizes a mixed system architecture consisting of multiple functional modules, which have a high extension capability to support additional functions. This system structure allows the user to configure multi-dimensional hierarchies and desirable measures to analyze the specific requirement and gives recommendations with forthright responses. Experimental results show that our method has raised 20% recall of the recommendations comparing the traditional collaborative filtering and a visualization tag of the recommended sessions will be provided with modified changes for the user to understand.

Handwritten Numerals Recognition Using an Ant-Miner Algorithm

  • Phokharatkul, Pisit;Phaiboon, Supachai
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1031-1033
    • /
    • 2005
  • This paper presents a system of handwritten numerals recognition, which is based on Ant-miner algorithm (data mining based on Ant colony optimization). At the beginning, three distinct fractures (also called attributes) of each numeral are extracted. The attributes are Loop zones, End points, and Feature codes. After these data are extracted, the attributes are in the form of attribute = value (eg. End point10 = true). The extraction is started by dividing the numeral into 12 zones. The numbers 1-12 are referenced for each zone. The possible values of Loop zone attribute in each zone are "true" and "false". The meaning of "true" is that the zone contains the loop of the numeral. The Endpoint attribute being "true" means that this zone contains the end point of the numeral. There are 24 attributes now. The Feature code attribute tells us how many lines of a numeral are passed by the referenced line. There are 7 referenced lines used in this experiment. The total attributes are 31. All attributes are used for construction of the classification rules by the Ant-miner algorithm in order to classify 10 numerals. The Ant-miner algorithm is adapted with a little change in this experiment for a better recognition rate. The results showed the system can recognize all of the training set (a thousand items of data from 50 people). When the unseen data is tested from 10 people, the recognition rate is 98 %.

  • PDF

Pseudo seismic and static stability analysis of the Torul Dam

  • Karabulut, Muhammet;Genis, Melih
    • Geomechanics and Engineering
    • /
    • v.17 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • Dams have a great importance on energy and irrigation. Dams must be evaluated statically and dynamically even after construction. For this purpose, Torul dam built between years 2000 and 2007 Harsit River in Gümüşhane province, Turkey, is selected as an application. The Torul dam has 137 m height and 322 GWh annual energy production capacity. Torul dam is a kind of concrete face rock fill dam (CFRD). In this study, static and pseudo seismic stability of Torul dam was investigated using finite element method. Torul dam model is constituted by numerical stress analysis named Phase2 which is based on finite element method. The dam was examined under 11 different water filling levels. Thirteenth stage of the numerical model is corresponding full reservoir condition which water filled up under crest line. Besides, pseudo static coefficients for dynamic condition applied to the dam in fourteenth stage of the model. Stability assessment of the Torul dam has been discussed according to the displacement throughout the dam body. For static and pseudo seismic cases, the displacements in the dam body have been compared. The total displacements of the dam according to its the empty state increase dramatically at the height of the water level of about 70 m and above. Compared to the pseudo-seismic analysis, the displacement of dam at the full reservoir condition is approximately two times as high as static analysis.

Estimation of MineRo's Kinematic Parameters for Underwater Navigation Algorithm (수중항법 알고리즘을 위한 미내로 운동학 파라미터 예측)

  • Yeu, Tae-Kyeong;Yoon, Suk-Min;Park, Soung-Jea;Hong, Sup;Choi, Jong-Su;Kim, Hyung-Woo;Kim, Dae-Won;Lee, Chang-Ho
    • Ocean and Polar Research
    • /
    • v.33 no.1
    • /
    • pp.69-76
    • /
    • 2011
  • A test miner named MineRo was constructed for the purpose of shallow water test of mining performance. In June of 2009, the performance test was conducted in depth of 100 m, 5 km away from Hupo-port (Korean East Sea), to assess if the developed system is able to collect and lift manganese nodules from seafloor. In August of 2010, in-situ test of automatic path tracking control of MineRo was performed in depth of 120 m at the same site. For path tracking control, a localization algorithm determining MineRo's position on seabed is prerequisite. This study proposes an improved underwater navigation algorithm through estimation of MineRo's kinematic parameters. In general, the kinematic parameters such as track slips and slip angle are indirectly calculated using the position data from USBL (Ultra-Short Base Line) system and heading data from gyro sensors. However, the obtained data values are likely to be different from the real values, primarily due to the random noise of position data. The aim of this study is to enhance the reliability of the algorithm by measuring kinematic parameters, track slips and slip angle.

A Validation of Effectiveness for Intrusion Detection Events Using TF-IDF (TF-IDF를 이용한 침입탐지이벤트 유효성 검증 기법)

  • Kim, Hyoseok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1489-1497
    • /
    • 2018
  • Web application services have diversified. At the same time, research on intrusion detection is continuing due to the surge of cyber threats. Also, As a single-defense system evolves into multi-level security, we are responding to specific intrusions by correlating security events that have become vast. However, it is difficult to check the OS, service, web application type and version of the target system in real time, and intrusion detection events occurring in network-based security devices can not confirm vulnerability of the target system and success of the attack A blind spot can occur for threats that are not analyzed for problems and associativity. In this paper, we propose the validation of effectiveness for intrusion detection events using TF-IDF. The proposed scheme extracts the response traffics by mapping the response of the target system corresponding to the attack. Then, Response traffics are divided into lines and weights each line with an TF-IDF weight. we checked the valid intrusion detection events by sequentially examining the lines with high weights.

Fault Detection, Diagnosis, and Optimization of Wafer Manufacturing Processes utilizing Knowledge Creation

  • Bae Hyeon;Kim Sung-Shin;Woo Kwang-Bang;May Gary S.;Lee Duk-Kwon
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.3
    • /
    • pp.372-381
    • /
    • 2006
  • The purpose of this study was to develop a process management system to manage ingot fabrication and improve ingot quality. The ingot is the first manufactured material of wafers. Trace parameters were collected on-line but measurement parameters were measured by sampling inspection. The quality parameters were applied to evaluate the quality. Therefore, preprocessing was necessary to extract useful information from the quality data. First, statistical methods were used for data generation. Then, modeling was performed, using the generated data, to improve the performance of the models. The function of the models is to predict the quality corresponding to control parameters. Secondly, rule extraction was performed to find the relation between the production quality and control conditions. The extracted rules can give important information concerning how to handle the process correctly. The dynamic polynomial neural network (DPNN) and decision tree were applied for data modeling and rule extraction, respectively, from the ingot fabrication data.

The Research Trend and Social Perceptions Related with the Tap Water in South Korea (수돗물 이용에 대한 국내 연구동향과 사회적 인식)

  • Kim, Ji Yoon;Do, Yuno;Joo, Gea-Jae;Kim, Eunhee;Park, Eun-Young;Lee, Sang-Hyup;Baek, Myeong Su
    • Korean Journal of Ecology and Environment
    • /
    • v.49 no.3
    • /
    • pp.208-214
    • /
    • 2016
  • We analyzed research trend and public perception related with tap water to identify major factors affecting low consumption of tap water. 805 research articles were collected for text mining analysis and 1,000 on-line questionnaires were surveyed to find social variables influencing tap water intake. Based on the word network analysis, research topics were divided into 4 major categories, 1) drinking water quality, 2) water fluoridation, 3) residual chlorine, and 4) micro-organism management. Compared with these major research topics, scientific studies of drinking behavior, or social perception were rather limited. 22.4% of total respondents used tap water as drinking water source, and only 1% drank tap water without further treatments (i.e. boiling, filtering). Experience of quality control report (B=0.392, p=0.046) and level of policy trust (B=1.002, p<0.0001) were influential factors on tap water drinking behavior. Age (B=0.020, p=0.002) and gender (B= - 1.843, p<0.0001) also showed significant difference. To increase the frequency of drinking the tap water by social members, the more scientific information of tap water quality and the water policy management should be clearly shared with social members.