• Title/Summary/Keyword: Performance Information Use

Search Result 5,694, Processing Time 0.038 seconds

Data Mining Algorithm Based on Fuzzy Decision Tree for Pattern Classification (퍼지 결정트리를 이용한 패턴분류를 위한 데이터 마이닝 알고리즘)

  • Lee, Jung-Geun;Kim, Myeong-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.11
    • /
    • pp.1314-1323
    • /
    • 1999
  • 컴퓨터의 사용이 일반화됨에 따라 데이타를 생성하고 수집하는 것이 용이해졌다. 이에 따라 데이타로부터 자동적으로 유용한 지식을 얻는 기술이 필요하게 되었다. 데이타 마이닝에서 얻어진 지식은 정확성과 이해성을 충족해야 한다. 본 논문에서는 데이타 마이닝을 위하여 퍼지 결정트리에 기반한 효율적인 퍼지 규칙을 생성하는 알고리즘을 제안한다. 퍼지 결정트리는 ID3와 C4.5의 이해성과 퍼지이론의 추론과 표현력을 결합한 방법이다. 특히, 퍼지 규칙은 속성 축에 평행하게 판단 경계선을 결정하는 방법으로는 어려운 속성 축에 평행하지 않는 경계선을 갖는 패턴을 효율적으로 분류한다. 제안된 알고리즘은 첫째, 각 속성 데이타의 히스토그램 분석을 통해 적절한 소속함수를 생성한다. 둘째, 주어진 소속함수를 바탕으로 ID3와 C4.5와 유사한 방법으로 퍼지 결정트리를 생성한다. 또한, 유전자 알고리즘을 이용하여 소속함수를 조율한다. IRIS 데이타, Wisconsin breast cancer 데이타, credit screening 데이타 등 벤치마크 데이타들에 대한 실험 결과 제안된 방법이 C4.5 방법을 포함한 다른 방법보다 성능과 규칙의 이해성에서 보다 효율적임을 보인다.Abstract With an extended use of computers, we can easily generate and collect data. There is a need to acquire useful knowledge from data automatically. In data mining the acquired knowledge needs to be both accurate and comprehensible. In this paper, we propose an efficient fuzzy rule generation algorithm based on fuzzy decision tree for data mining. We combine the comprehensibility of rules generated based on decision tree such as ID3 and C4.5 and the expressive power of fuzzy sets. Particularly, fuzzy rules allow us to effectively classify patterns of non-axis-parallel decision boundaries, which are difficult to do using attribute-based classification methods.In our algorithm we first determine an appropriate set of membership functions for each attribute of data using histogram analysis. Given a set of membership functions then we construct a fuzzy decision tree in a similar way to that of ID3 and C4.5. We also apply genetic algorithm to tune the initial set of membership functions. We have experimented our algorithm with several benchmark data sets including the IRIS data, the Wisconsin breast cancer data, and the credit screening data. The experiment results show that our method is more efficient in performance and comprehensibility of rules compared with other methods including C4.5.

An Energy-Efficient Concurrency Control Method for Mobile Transactions with Skewed Data Access Patterns in Wireless Broadcast Environments (무선 브로드캐스트 환경에서 편향된 엑세스 패턴을 가진 모바일 트랜잭션을 위한 효과적인 동시성 제어 기법)

  • Jung, Sung-Won;Park, Sung-Geun;Choi, Keun-Ha
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.69-85
    • /
    • 2006
  • Broadcast has been often used to disseminate the frequently requested data efficiently to a large volume of mobile clients over a single or multiple channels. Conventional concurrency control protocols for mobile transactions are not suitable for the wireless broadcast environments due to the limited bandwidth of the up-link communication channel. In wireless broadcast environments, the server often broadcast different data items with different frequency to incorporate the data access patterns of mobile transactions. The previously proposed concurrency control protocols for mobile transactions in wireless broadcast environments are focused on the mobile transactions with uniform data access patterns. However, these protocols perform poorly when the data access pattern of update mobile transaction are not uniform but skewed. The update mobile transactions with skewed data access patterns will be frequently aborted and restarted due 4o the update conflict of the same data items with a high access frequency. In this paper, we propose an energy-efficient concurrence control protocol for mobile transactions with skewed data access as well as uniform data access patterns. Our protocol use a random back-off technique to avoid the frequent abort and restart of update mobile transactions. We present in-depth experimental analysis of our method by comparing it with existing concurrency control protocols. Our performance analysis show that it significantly decrease the average response time, the amount of upstream and downstream bandwidth usage over existing protocols.

Area Efficient FPGA Implementation of Block Cipher Algorithm SEED (블록 암호알고리즘 SEED의 면적 효율성을 고려한 FPGA 구현)

  • Kim, Jong-Hyeon;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.4
    • /
    • pp.372-381
    • /
    • 2001
  • In this paper SEED, the Korea Standard 128-bit block cipher algorithm is implemented with VHDL and mapped into one FPGA. SEED consists of round key generation block, F function block, G function block, round processing block, control block and I/O block. The designed SEED is realized in an FPGA but we design it technology-independently so that ASIC or core-based implementation is possible. SEED requires many hardware resources which may be impossible to realize in one FPGA. So it is necessary to minimize hardware resources. In this paper only one G function is implemented and is used for both the F function block and the round key block. That is, by using one G function sequentially, we can realize all the SEED components in one FPGA. The used cell rate after synthesis is 80% in Altem FLEXI0KlOO. The resulted design has 28Mhz clock speed and 14.9Mbps performance. The SEED hardware is technology-independent and no other external component is needed. Thus, it can be applied to other SEED implementations and cipher systems which use SEED.

  • PDF

The Use of Reinforcement Learning and The Reference Page Selection Method to improve Web Spidering Performance (웹 탐색 성능 향상을 위한 강화학습 이용과 기준 페이지 선택 기법)

  • 이기철;이선애
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.3
    • /
    • pp.331-340
    • /
    • 2002
  • The web world is getting so huge and untractable that without an intelligent information extractor we would get more and more helpless. Conventional web spidering techniques for general purpose search engine may be too slow for the specific search engines, which concentrate only on specific areas or keywords. In this paper a new model for improving web spidering capabilities is suggested and experimented. How to select adequate reference web pages from the initial web Page set relevant to a given specific area (or keywords) can be very important to reduce the spidering speed. Our reference web page selection method DOPS dynamically and orthogonally selects web pages, and it can also decide the appropriate number of reference pages, using a newly defined measure. Even for a very specific area, this method worked comparably well almost at the level of experts. If we consider that experts cannot work on a huge initial page set, and they still have difficulty in deciding the optimal number of the reference web pages, this method seems to be very promising. We also applied reinforcement learning to web environment, and DOPS-based reinforcement learning experiments shows that our method works quite favorably in terms of both the number of hyper links and time.

  • PDF

Counterfeit Money Detection Algorithm using Non-Local Mean Value and Support Vector Machine Classifier (비지역적 특징값과 서포트 벡터 머신 분류기를 이용한 위변조 지폐 판별 알고리즘)

  • Ji, Sang-Keun;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.1
    • /
    • pp.55-64
    • /
    • 2013
  • Due to the popularization of digital high-performance capturing equipments and the emergence of powerful image-editing softwares, it is easy for anyone to make a high-quality counterfeit money. However, the probability of detecting a counterfeit money to the general public is extremely low. In this paper, we propose a counterfeit money detection algorithm using a general purpose scanner. This algorithm determines counterfeit money based on the different features in the printing process. After the non-local mean value is used to analyze the noises from each money, we extract statistical features from these noises by calculating a gray level co-occurrence matrix. Then, these features are applied to train and test the support vector machine classifier for identifying either original or counterfeit money. In the experiment, we use total 324 images of original money and counterfeit money. Also, we compare with noise features from previous researches using wiener filter and discrete wavelet transform. The accuracy of the algorithm for identifying counterfeit money was over 94%. Also, the accuracy for identifying the printing source was over 93%. The presented algorithm performs better than previous researches.

A Practical TCP-friendly Rate Control Scheme for SVC Video Transport (SVC 비디오 전송을 위한 실용적인 TCP 친화적 전송률 제어 기법)

  • Seo, Kwang-Deok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.2
    • /
    • pp.114-124
    • /
    • 2009
  • In this paper, we propose a practical TCP friendly rate control scheme that considers the minimum channel bandwidth of the network when transporting SVC (scalable video coding) video over IP netowrks such as Internet. RTP and RTCP is mainly designed for use with UDP (User Datagram Protocol) for real-time video transport over the Internet. TCP-friendly rate control was proposed to satisfy the demands of multimedia applications while being reasonably fair when competing for bandwidth with conventional TCP applications. However the rate control model of the conventional TCP-friendly rate control scheme does not consider the minimum channel bandwidth of the network. Thus the estimated channel bandwidth by the conventional rate control model might be quite different from the real channel bandwidth when the packet loss ratio of the network is very large. In this paper, we propose a modified TCP-friendly rate control scheme that considers the minimum channel bandwidth of the network. Based on the modified TCP-friendly rate control, we assign the minimum channel bandwidth to the base layer bitstream of SVC video, and remaining available bandwidth is allocated to the enhancement layer of SVC video for the TCP friendly scalable video transmission. It is shown by simulations that the modified TCP-friendly rate control scheme can be effectively used for a wider range of controlled bit rates depending on the packet loss ratio than the conventional TCP-friendly control scheme. Furthermore, the effectiveness of the proposed scheme in terms of objective video quality is proved by comparing PSNR performance with the conventional scheme.

PMS : Prefetching Strategy for Multi-level Storage System (PMS : 다단계 저장장치를 고려한 효율적인 선반입 정책)

  • Lee, Kyu-Hyung;Lee, Hyo-Jeong;Noh, Sam-Hyuk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.1
    • /
    • pp.26-32
    • /
    • 2009
  • The multi-level storage architecture has been widely adopted in servers and data centers. However, while prefetching has been shown as a crucial technique to exploit sequentiality in accesses common for such systems and hide the increasing relative cost of disk I/O, existing multi-level storage studies have focused mostly on cache replacement strategies. In this paper, we show that prefetching algorithms designed for single-level systems may have their limitations magnified when applied to multi-level systems. Overly conservative prefetching will not be able to effectively use the lower-level cache space, while overly aggressive prefetching will be compounded across levels and generate large amounts of wasted prefetch. We design and implement a hierarchy-aware lower-level prefetching strategy called PMS(Prefetching strategy for Multi-level Storage system) that applicable to any upper level prefetching algorithms. PMS does not require any application hints, a priori knowledge from the application or modification to the va interface. Instead, it monitors the upper-level access patterns as well as the lower-level cache status, and dynamically adjusts the aggressiveness of the lower-level prefetching activities. We evaluated the PMS through extensive simulation studies using a verified multi-level storage simulator, an accurate disk simulator, and access traces with different access patterns. Our results indicate that PMS dynamically controls aggressiveness of lower-level prefetching in reaction to multiple system and workload parameters, improving the overall system performance in all 32 test cases. Working with four well-known existing prefetching algorithms adopted in real systems, PMS obtains an improvement of up to 35% for the average request response time, with an average improvement of 16.56% over all cases.

The effect of creativity, absorptive capacity and strategic orientation on the distribution strategy of foreign market entry : Focused on Game Industry (해외시장 진입전략에서 창의성과 흡수역량, 전략적 지향성이 미치는 효과에 대한 연구: 게임산업을 중심으로)

  • Park, Young-Eun
    • Review of Culture and Economy
    • /
    • v.17 no.2
    • /
    • pp.29-62
    • /
    • 2014
  • Game industry, one of cultural-content industry which is considered as a typical knowledge-based industry and creative industry, is not like the overseas expansion of traditional manufacture, and has different strategy and performance of export expansion through product or project-based strategy. Therefore, it should be approached by each content unit, and necessary to look at the factors that make their decision makings of foreign market entry vary. This study focuses on discovering creativity, absorptive capacity and strategic orientation(market orientation and innovation orientation) which affect the difference of distribution's decision making of entry into foreign market in game industry This paper examined 252 cases of online games in order to investigate creativity, absorptive capacity and strategic orientations for each foreign market and what entry type(among licensing, joint distribution, exclusive distribution) they chose according to the products developed in team level. This helps us analyze the factors affecting market orientation and innovation orientation in the perspectives of creativity and absorptive capacity in comprehensive way, and notice the phenomena which use different foreign distribution strategy though there are company incorporated abroad and their results. This study supplements the limit of the existing Resource-Based View, Resource-Dependent View, and traditional international business theories such as Transaction Cost Theory or OLI Paradigm(Eclectic Framework), and proves how company could reduce asymmetry of uncertainty and information in creative industry and whether they accomplish successful overseas expansion according to strategic orientations.

Design and Fabrication of WLAN / UWB Antenna for Marine High Speed Communication Network System (해양 초고속 통신망 시스템을 위한 WLAN(Wireless Local Area Network) / UWB(Ultra Wide Band)용 안테나 설계 및 제작)

  • Hong, Yong-Pyo;Kang, Sung-Woon;Kim, Kab-Ki
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.4
    • /
    • pp.489-495
    • /
    • 2018
  • In this paper, we designed and fabricated WLAN / UWB communication antennas operating at 3.3 [GHz] and 5 [GHz] bands in order to effectively use the high-speed communication network system that improved antenna miniaturization, gain and radiation pattern. Microstrip patch antennas were chosen to improve the bandwidth. The slot width, length, and transmission line width were calculated using the theoretical formula for each step. Simulation results show that the return loss is -14.053 [dB] at 3.3 [GHz] and -13.118 [dB] at 5 [GHz]. The gain showed a value of 2.479 [dBi] at 3.3 [GHz] and a value of 3.317 [dBi] at 5 [GHz]. After optimizing it with the CST Microwave Studio 2014 program, which can be 3D-designed, Based on these results, we investigated the performance of antennas by measuring their characteristics. In recent years, WLAN, which is a variety of wireless technologies that are continuously developing, and UWB, which is a communication technology which is increasing in frequency band due to an increase in demand of the technology users, is used for a high speed wireless communication system. Communication seems to be possible.

Discussions on the Reconstruction of Visual Illusion in Dynamic Images - Take of Paul Sermon as an example (다이나믹 이미지 예술 중 착시의 재구성에 관한 연구 - 폴 셔먼의 을 중심으로)

  • GAO, XIAOYA;Paik, Joonki
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.189-201
    • /
    • 2021
  • The art of dynamic images has experienced three development stages, including experimental films, recording art, and new media image. By introducing all kinds of new materials, new media to the art, and the art of dynamic images has created more freedom for art creation. With the development of digital information technology, dynamic image works have put forward an increasingly high requirement of visual art. The combination of dynamic images and visual illusion can give rise to different forms and expression methods, thus endowing artworks with more vigor. This paper provides an overview by sorting out the lineage and development of dynamic images in the background, as well as understanding the application and performance of contrasted visual illusion. Based on the understanding of the characteristics of visual illusion, we discuss the new characteristics of applying the theory of visual illusion to new media dynamic images in relation to the technical approach of dynamic images. Through the analysis of specific works of Telematic Vision, we search for its reasonable combination and find the appropriate technical means of implementation. We discuss how to use digital multimedia technology and spatial optical illusion to make the design more novel and impactful, and consider how the combination of digital dynamic image technology and visual illusion should be interpreted and applied.