• Title/Summary/Keyword: Sequence-based rule

Search Result 93, Processing Time 0.02 seconds

Discovery of Behavior Sequence Pattern using Mining in Smart Home (스마트 홈에서 마이닝을 이용한 행동 순차 패턴 발견)

  • Chung, Kyung-Yong;Kim, Jong-Hun;Kang, Un-Gu;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.19-26
    • /
    • 2008
  • With the development of ubiquitous computing and the construction of infrastructure for one-to-one personalized services, the importance of context-aware services based on user's situation and environment is being spotlighted. The smart home technology connects real space and virtual space, and converts situations in reality into information in a virtual space, and provides user-oriented intelligent services using this information. In this paper, we proposed the discovery of the behavior sequence pattern using the mining in the smart home. We discovered the behavior sequence pattern by using mining to add time variation to the association rule between locations that occur in location transactions. We can predict the path or behavior of user according to the recognized time sequence and provide services accordingly. To evaluate the performance of behavior consequence pattern using mining, we conducted sample t-tests so as to verify usefulness. This evaluation found that the difference of satisfaction by service was statistically meaningful, and showed high satisfaction.

An Intelligent Intrusion Detection Model

  • Han, Myung-Mook
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.224-227
    • /
    • 2003
  • The Intrsuion Detecion Systems(IDS) are required the accuracy, the adaptability, and the expansion in the information society to be changed quickly. Also, it is required the more structured, and intelligent IDS to protect the resource which is important and maintains a secret in the complicated network environment. The research has the purpose to build the model for the intelligent IDS, which creates the intrusion patterns. The intrusion pattern has extracted from the vast amount of data. To manage the large size of data accurately and efficiently, the link analysis and sequence analysis among the data mining techniqes are used to build the model creating the intrusion patterns. The model is consist of "Time based Traffic Model", "Host based Traffic Model", and "Content Model", which is produced the different intrusion patterns with each model. The model can be created the stable patterns efficiently. That is, we can build the intrusion detection model based on the intelligent systems. The rules prodeuced by the model become the rule to be represented the intrusion data, and classify the normal and abnormal users. The data to be used are KDD audit data.

  • PDF

Application of Computer-Aided Process Design System for Axisymmetric Deep Drawing Products (축대칭 디프 드로잉 제품에 대한 공정설계 시스템의 적용)

  • Park, S.B.;Park, Y.;Park, J.C.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.14 no.4
    • /
    • pp.145-150
    • /
    • 1997
  • A computer-aided process design system for axisymmetric deep drawing products has been developed. An approach to the system is based on the knowledge based system. The hypothesized process outline of the deep drawing operations is generated in the geometrical design module of the system. In this paper, the module has been expanded. The rules of process design sechems for complex cup drawings are formulated from handbooks, experimental results and empirical knowhow of the field experts. The input to the system is final sheet-metal objects geometry and the output from the system is process sequence with intermediate objects geometries and process parameters, such as drawing load, blank holding force, clearance and cup-drawing coefficient.

  • PDF

A Study on the Computer-Aided Design System of Axisymmetric Deep Drawing Process(II) (축대칭 디프 드로잉 제품의 공정설계 시스템에 관한 연구(II))

  • Park, S.B.;Choi, Y.;Kim, B.M.;Choi, J.C.;Lee, J.
    • Transactions of Materials Processing
    • /
    • v.5 no.1
    • /
    • pp.61-71
    • /
    • 1996
  • A computer-aided process design system for axisymmetric deep drawing products has been developed. An approach to the system is based on the knowledge based system. Knowledges for the system are formulated from the plasticity theory handbooks experimental results and empirical knowhow of the field experts. the system is composed of four main modules such as geometrical design test & rectification and user modification. The input to the system is final sheet-metal object geometry and the output from the system is process sequence with intermedi-ate objects geometries and process parameters, such as drawing load blank holding force clearance cup-drawing coefficient.

  • PDF

Automatic Generation of Snort Content Rule for Network Traffic Analysis (네트워크 트래픽 분석을 위한 Snort Content 규칙 자동 생성)

  • Shim, Kyu-Seok;Yoon, Sung-Ho;Lee, Su-Kang;Kim, Sung-Min;Jung, Woo-Suk;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.666-677
    • /
    • 2015
  • The importance of application traffic analysis for efficient network management has been emphasized continuously. Snort is a popular traffic analysis system which detects traffic matched to pre-defined signatures and perform various actions based on the rules. However, it is very difficult to get highly accurate signatures to meet various analysis purpose because it is very tedious and time-consuming work to search the entire traffic data manually or semi-automatically. In this paper, we propose a novel method to generate signatures in a fully automatic manner in the form of sort rule from raw packet data captured from network link or end-host. We use a sequence pattern algorithm to generate common substring satisfying the minimum support from traffic flow data. Also, we extract the location and header information of the signature which are the components of snort content rule. When we analyzed the proposed method to several application traffic data, the generated rule could detect more than 97 percentage of the traffic data.

Anti-Reactive Jamming Technology Based on Jamming Utilization

  • Xin Liu;Mingcong Zeng;Yarong Liu;Mei Wang;Xiyu Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2883-2902
    • /
    • 2023
  • Since the existing anti-jamming methods, including intelligent methods, have difficulty against high-speed reactive jamming, we studied a new methodology for jamming utilization instead of avoiding jamming. Different from the existing jamming utilization techniques that harvest energy from the jamming signal as a power supply, our proposed method can take the jamming signal as a favorable factor for frequency detection. Specifically, we design an intelligent differential frequency hopping communication framework (IDFH), which contains two stages of training and communication. We first adopt supervised learning to get the jamming rule during the training stage when the synchronizing sequence is sent. And then, we utilize the jamming rule to improve the frequency detection during the communication stage when the real payload is sent. Simulation results show that the proposed method successfully combated high-speed reactive jamming with different parameters. And the communication performance increases as the power of the jamming signal increase, hence the jamming signal can help users communicate in a low signal-to-noise ratio (SNR) environment.

An Investigation on Expanding Traditional Sequential Analysis Method by Considering the Reversion of Purchase Realization Order (구매의도 생성 순서와 구매실현 순서의 역전 현상을 감안한 확장된 순차분석 방법론)

  • Kim, Minseok;Kim, Namgyu
    • The Journal of Information Systems
    • /
    • v.22 no.3
    • /
    • pp.25-42
    • /
    • 2013
  • Recently various kinds of Information Technology services are created and the quantities of the data flow are increase rapidly. Not only that, but the data patterns that we deal with also slowly becoming diversity. As a result, the demand of discover the meaningful knowledge/information through the various mining analysis such as linkage analysis, sequencing analysis, classification and prediction, has been steadily increasing. However, solving the business problems using data mining analysis does not always concerning, one of the major causes of these limitations is there are some analyzed data can't accurately reflect the real world phenomenon. For example, although the time gap of purchasing the two products is very short, by using the traditional sequencing analysis, the precedence relationship of the two products is clearly reflected. But in the real world, with the very short time interval, the precedence relationship of the two purchases might not be defined. What was worse, the sequence of the purchase intention and the sequence of the purchase realization of the two products might be mutually be reversed. Therefore, in this study, an expanded sequencing analysis methodology has been proposed in order to reflect this situation. In this proposed methodology, the purchases that being made in a very short time interval among the purchase order which might not important will be notice, and the analysis which included the original sequence and reversed sequence will be used to extend the analysis of the data. Also, to some extent a very short time interval can be defined as the time interval, so an experiment were carried out to determine the varying based on the time interval for the actual data.

Recognition of Answer Type for WiseQA (WiseQA를 위한 정답유형 인식)

  • Heo, Jeong;Ryu, Pum Mo;Kim, Hyun Ki;Ock, Cheol Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.7
    • /
    • pp.283-290
    • /
    • 2015
  • In this paper, we propose a hybrid method for the recognition of answer types in the WiseQA system. The answer types are classified into two categories: the lexical answer type (LAT) and the semantic answer type (SAT). This paper proposes two models for the LAT detection. One is a rule-based model using question focuses. The other is a machine learning model based on sequence labeling. We also propose two models for the SAT classification. They are a machine learning model based on multiclass classification and a filtering-rule model based on the lexical answer type. The performance of the LAT detection and the SAT classification shows F1-score of 82.47% and precision of 77.13%, respectively. Compared with IBM Watson for the performance of the LAT, the precision is 1.0% lower and the recall is 7.4% higher.

Decision Tree based Scheduling for Static and Dynamic Flexible Job Shops with Multiple Process Plans (다중 공정계획을 가지는 정적/동적 유연 개별공정에 대한 의사결정 나무 기반 스케줄링)

  • Yu, Jae-Min;Doh, Hyoung-Ho;Kwon, Yong-Ju;Shin, Jeong-Hoon;Kim, Hyung-Won;Nam, Sung-Ho;Lee, Dong-Ho
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.32 no.1
    • /
    • pp.25-37
    • /
    • 2015
  • This paper suggests a decision tree based approach for flexible job shop scheduling with multiple process plans. The problem is to determine the operation/machine pairs and the sequence of the jobs assigned to each machine. Two decision tree based scheduling mechanisms are developed for static and dynamic flexible job shops. In the static case, all jobs are given in advance and the decision tree is used to select a priority dispatching rule to process all the jobs. Also, in the dynamic case, the jobs arrive over time and the decision tree, updated regularly, is used to select a priority rule in real-time according to a rescheduling strategy. The two decision tree based mechanisms were applied to a flexible job shop case with reconfigurable manufacturing cells and a conventional job shop, and the results are reported for various system performance measures.

Setup Planning for Machining processes Using Expert System Approach (전문가 시스템 접근법을 이용한 기계가공용 셋업계획)

  • Jeong, Yeong-Deug
    • IE interfaces
    • /
    • v.6 no.1
    • /
    • pp.31-45
    • /
    • 1993
  • Setup planning for machining processes is a part of fixture planning which is also a part of process planning. A setup of a part is defined as a group of features which are machined while the part is fixtured in one single fixture. Setup planning includes a number of tasks such as the selection of setup, sequence of setups and datum frame for each setup. Setup planning is an important function in fixture planning which must be able to support and to clamp a workpiece to prevent deflections caused by machining and clamping loads. This paper presents setup planning system using expert system approach(SPES) for prismatic parts which can be machined on vertical milling machine. SPES consists of preprocessing module and main processing module. Preprocessing module executes the conversion of feature data to frame type data and the determination of setups, and main processing module executes the determination of datum frame of each setup and sequance of setups. Preprocessing module is coded by C language and main processing module is a rule-based expert system using EXSYS pro. The performance of SPES is evaluated through case studies and the results show successful work except for operation sequence of machining holes. This is due to the limited rules for machining holes.

  • PDF