• Title/Summary/Keyword: Weakness Rule

Search Result 36, Processing Time 0.022 seconds

Improved Association Rule Mining by Modified Trimming (트리밍 방식 수정을 통한 연관규칙 마이닝 개선)

  • Hwang, Won-Tae;Kim, Dong-Seung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.15-21
    • /
    • 2008
  • This paper presents a new association mining algorithm that uses two phase sampling for shortening the execution time at the cost of precision of the mining result. Previous FAST(Finding Association by Sampling Technique) algorithm has the weakness in that it only considered the frequent 1-itemsets in trimming/growing, thus, it did not have ways of considering mulit-itemsets including 2-itemsets. The new algorithm reflects the multi-itemsets in sampling transactions. It improves the mining results by adjusting the counts of both missing itemsets and false itemsets. Experimentally, on a representative synthetic database, the algorithm produces a sampled subset of results with an increased accuracy in terms of the 2-itemsets while it maintains the same 1uality of the data set.

Vulnerability Analysis and Development of Secure Coding Rules for PHP (PHP 보안 취약점 분석과 시큐어 코딩 규칙 개발)

  • Han, KyungSook;Park, Wooyeol;Yang, Ilgwon;Son, Changhwan;Pyo, Changwoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.11
    • /
    • pp.721-726
    • /
    • 2015
  • This paper shows secure coding rules for PHP programs. Programmers should comply with these rules during development of their programs. The rules are crafted to restrain 28 weaknesses that are composed of 22 corresponding to reported CVEs of PHP, the children of CWE-661 for PHP, and the top 5 weaknesses according to OWASP. The rule set consists of 28 detailed rules under 14 categories. This paper also demonstrates through examples that programs complying with these rules can curb weaknesses. The rules can also serve as a guideline in developing analysis tools for security purposes.

The Effect of Traditional Korean Medicine Treatment and Herbal Network Analysis in Postoperative Hip Fracture Inpatients (고관절 골절 수술 후 한의 입원치료 효과 및 다빈도 처방 약재 네트워크 분석)

  • Oh, Jihong;Lee, Myeong-Jong;Kim, Hojun
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.32 no.3
    • /
    • pp.119-129
    • /
    • 2022
  • Objectives This study aimed to evaluate the effects of Integrative treatment of traditional Korean medicine (TKM) on 7 hospitalized patients after hip fracture surgery, and to identify significant herbs and co-prescribed herbs by using network analysis and association rule mining. Methods A retrospective chart review of the 7 hospitalized patients treated for postoperative hip fractures between January and December 2021 was performed. All TKM treatments for the patients were identified and Wilcoxon signed-rank test was performed to compare hip pain and mobility on admission and discharge. We visualized the network of herbal medicines and complications. By using network analysis, we also identified the significant herbs (high centrality of degree, eigenvector, and sub-graph). Co-prescription patterns for the hip fracture patients were further analyzed by association rule mining. Results We found that TKM treatment significantly relieved hip pain and improved mobility. Accompanying symptoms reported by the patients were general weakness, anorexia, dizziness, delirium, edema, sputum, sore throat, cough, rhinorrhea, and chills. Herbs composed of Sagunja-tang and Samul-tang showed high centralities and high associations with other herbs. In addition, Gupan, Nokyong, Yukjongyong, Useul, and Hyunhosaek were identified as important herbs for postoperative hip fracture patients. Conclusions This study provides evidence for clinical TKM use as an effective postoperative treatment for pain relief and improvement of mobility in patients with hip fractures. In addition, herbs that can be considered in the treatment of patients after hip fracture surgery were identified through network analysis and association rule mining.

Implementation of Distributed Intrusion Detection System based on Protocols (프로토콜 기반 분산 침입탐지시스템 설계 및 구현)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.81-87
    • /
    • 2012
  • Intrusion Detection System that protects system safely is necessary as network technology is developed rapidly and application division is wide. Intrusion Detection System among others can construct system without participation of other severs. But it has weakness that big load in system happens and it has low efficient because every traffics are inspected in case that mass traffic happen. In this study, Distributed Intrusion Detection System based on protocol is proposed to reduce traffic of intrusion detection system and provide stabilized intrusion detection technique even though mass traffic happen. It also copes to attack actively by providing automatic update of using rules to detect intrusion in sub Intrusion Detection System.

pH-Dependent Surface-enhanced Raman Scattering Analysis of Maleimide and Succinimide on Ag Nanocolloidal Surfaces

  • Joo, Sang-Woo
    • Bulletin of the Korean Chemical Society
    • /
    • v.29 no.9
    • /
    • pp.1761-1764
    • /
    • 2008
  • The adsorption structure and binding of maleimide (MI) and succinimide (SI) on silver nanocolloidal surfaces have been comparatively investigated by means of pH-varied surface-enhanced Raman scattering (SERS). The two molecules appeared not to adsorb onto Ag surfaces at pH values below 5. The appearance of a ring ν (CH) band at ~3100 $cm^{-1}$ denoted the standing geometry of MI’s aromatic ring on Ag. The absence or weakness of in-plane vibrational modes of MI and SI also supported a perpendicular orientation of MI and SI on Ag from the electromagnetic selection rule. Density functional theory (DFT) calculations were employed to examine the vibrational frequencies of MI’s and SI’s neutral and anionic states.

A Study on Resolution of Validity in XML Document (XML 문서의 유효성 문제 해결에 관한 연구)

  • Hong, Seong-Pyo;Song, Gi-Beom;Bang, Keug-In;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.564-567
    • /
    • 2003
  • XML has weakness problems on document modulation and elimination of data Because of the XML gives priority to present data format, XML electrical signature, XML cryptography, or XML access control is provided to overcome those weakness problems. However, structured XML efficiency contravention problem occurred from XML encryption and absence of protection from DTD attack are still remains unsolved. In this paper, we provide XML scheme that satisfies both efficiency and encryption. DTD is unnecessary because XML scheme supports formatting(Well-Formed XML) XML documents and it also include meta information. Because of the XML scheme has possibility to generate each XML document dynamically and self efficiency investigator rule, it has an advantage on extendability of DID based encryption of XML documents.

  • PDF

First-year Undergraduate Students' Understanding about Statements (대학 신입생들의 명제에 대한 이해)

  • Kim, Young-Ok
    • School Mathematics
    • /
    • v.11 no.2
    • /
    • pp.261-280
    • /
    • 2009
  • This study was motivated by recognizing the weakness of teaching and learning about the concepts of statements in high school mathematics curriculum. To report the reality of students' understanding about statements, this study investigated the 33 first-year undergraduate students' understanding about the concepts of statements by giving them 22 statement problems. The problems were selected based on the conceptual framework including five types of statement concepts which are considered as the key ideas for understanding mathematical reasoning and proof in college level mathematics. The analysis of the participants' responses to the statement problems found that their understanding about the concepts of prepositions are very limited and extremely based on the instrumental understanding applying an appropriate remembered rule to the solution of a preposition problem without knowing why the rule works. The results from this study will give the information for effective teaching and learning of statements in college level mathematics, and give the direction for the future reforming the unite of statements in high school mathematics curriculum as well.

  • PDF

Effect of Sirikit Dam Operation Improvement on water shortage situations due to the land use and climate changes from the Nan Basin

  • Koontanakulvong, Sucharit;Suthidhummajit, Chokchai
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.232-232
    • /
    • 2015
  • Land use and climate changes are the important factors to determine the runoff and sediment loads from the watershed. The changes also affected to runoff volume/pattern to the dam operation and may cause flood and drought situations in the downstream area. Sirikit Dam is one of the biggest dams in Thailand which cover about 25 % of the runoff into the Central Plain where the Bangkok Capital is located. The study aims to determine the effect of land use change to the runoff/sediment volume pattern and the rainfall-runoff-sediment relationship in the different land use type. Field measurements of the actual rainfall, runoff and sediment in the selected four sub-basins with different type of land use in the Upper Nan Basin were conducted and the runoff ratio coefficients and sediment yield were estimated for each sub-basin. The effect of the land use change (deforestation) towards runoff/sediment will be investigated. The study of the climate change impact on the runoff in the future scenarios was conducted to project the change of runoff volume/pattern into the Sirikit Dam. The improvement of the Sirikit Dam operation rule was conducted to reduce the weakness of the existing operation rules after Floods 2011. The newly proposed dam operation rule improvement will then be evaluated from the water shortage situations in the downstream of Sirikit Dam under various conditions of changes of both land use and climate when compared with the situations based on the existing reservoir operation rules.

  • PDF

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

Comparative Analysis on the 1st Edition and the Revised of the International Standard Archival Authority Record for Corporate Bodies, Personal and Families (국제표준 기록물 전거제어 기술규칙 초판과 개정판의 비교분석 연구)

  • Park, Jin-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.1
    • /
    • pp.341-361
    • /
    • 2007
  • This research aims at the thorough analysis between the first edition and the revised of the International Standard Archival Authority Record for Corporate Bodies, Personal and Families. The focused methods of the study are comparing with each strength and weakness of the first edition and the revised on the needs and the features of archival authority control as well as how to use its description rule. Besides it looks into the elements to be added and complemented as they are made practical use of archives, hereafter when it is established Korean archival authority control rules, this fundamental research can be certainly valuable as its basic materials.

  • PDF