• Title/Summary/Keyword: usage rule

Search Result 129, Processing Time 0.023 seconds

A Study on Use Behaviors of Books through Circulation Data Analysis in an Academic Library (대학도서관 대출데이터분석을 통한 장서 이용행태 및 특성에 관한 연구)

  • Yang, Ji-Ann
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.2
    • /
    • pp.263-293
    • /
    • 2017
  • The purpose of this study is to analyze user behaviors of books in detail based on circulation data in an academic library. It analyzes circulation patterns of books for ten years from 2006 to 2015, which are surprisingly similar every year. Each pattern follows 'Loan books 20/50 rule' that 20% core collection occupies 50% of its circulation every year. This clarifies users' circulation patterns are highly consistent and very expectable. Also, using the cumulative distribution of book age, it defines the half-life of books and suggests the mathematical formula to measure it. Circulation patterns of the whole loan book and core collection for ten years are very different in terms of subjects, user groups, and divisions. This indicates that core collection plays a significant role in analyzing circulation statistics and usage patterns for the efficient collection development in the future.

Analysis of D2D Utility Function with the Interference Majorization

  • Oh, Changyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.75-83
    • /
    • 2020
  • We consider the D2D utility optimization problem in the cellular system. More specifically, we develop a concave function decision rule which reduces the complexity of non-convex optimization problem. Typically, utility function, which is a function of the signal and the interference, is non-convex. In this paper, we analyze the utility function from the interference perspective. We introduce the 'relative interference' and the 'interference majorization'. The relative interference captures the level of interference at D2D receiver's perspective. The interference majorization approximates the interference by applying the major interference. Accordingly, we propose a concave function decision rule, and the corresponding convex optimization solution. Simulation results show that the utility function is concave when the relative interference is less than 0.1, which is a typical D2D usage scenario. We also show that the proposed convex optimization solution can be applied for such relative interference cases.

Service-centric Object Fragmentation Model for Efficient Retrieval and Management of Huge XML Documents (대용량 XML 문서의 효율적인 검색과 관리를 위한 SCOF 모델)

  • Jeong, Chang-Hoo;Choi, Yun-Soo;Jin, Du-Seok;Kim, Jin-Suk;Yoon, Hwa-Mook
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.103-113
    • /
    • 2008
  • Vast amount of XML documents raise interests in how they will be used and how far their usage can be expanded, This paper has two central goals: 1) easy and fast retrieval of XML documents or relevant elements; and 2) efficient and stable management of large-size XML documents, The keys to develop such a practical system are how to segment a large XML document to smaller fragments and how to store them. In order to achieve these goals, we designed SCOF(Service-centric Object Fragmentation) model, which is a semi-decomposition method based on conversion rules provided by XML database managers. Keyword-based search using SCOF model then retrieves the specific elements or attributes of XML documents, just as typical XML query language does. Even though this approach needs the wisdom of managers in XML document collection, SCOF model makes it efficient both retrieval and management of massive XML documents.

  • PDF

A Study for Rule Integration in Vulnerability Assessment and Intrusion Detection using Meaning Based Vulnerability Identification Method (의미기반 취약점 식별자 부여 기법을 사용한 취약점 점검 및 공격 탐지 규칙 통합 방법 연구)

  • Kim, Hyung-Jong;Jung, Tae-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.121-129
    • /
    • 2008
  • This paper presents vulnerability identification method based on meaning which is making use of the concept of atomic vulnerability. Also, we are making use of decomposition and specialization processes which were used in DEVS/SES to get identifiers. This vulnerability representation method is useful for managing and removing vulnerability in organized way. It is helpful to make a relation between vulnerability assessing and intrusion detection rules in lower level. The relation enables security manager to response more quickly and conveniently. Especially, this paper shows a mapping between Nessus plugins and Snort rules using meaning based vulnerability identification method and lists usages based on three goals that security officer keeps in mind about vulnerability. The contribution of this work is in suggestion of meaning based vulnerability identification method and showing the cases of its usage for the rule integration of vulnerability assessment and intrusion detection.

An Improvement of the Guideline of Secure Software Development for Korea E-Government (대한민국 전자정부 소프트웨어 개발보안 가이드 개선 방안 연구)

  • Han, Kyung Sook;Kim, Taehwan;Han, Ki Young;Lim, Jae Myung;Pyo, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1179-1189
    • /
    • 2012
  • We propose an improvement on the Guideline of Secure Software Development for Korea e-Government that is under revision by the Ministry of Public Administration and Security in 2012. We adopted a rule-oriented organization instead shifting from the current weakness-oriented one. The correspondence between the weakness and coding rules is identified. Also, added is the coverage of diagnostic tools over the rules to facilitate the usage by programmers during coding period When the proposed guideline is applied to secure software development, the weakness would be controlled indirectly by enforcing coding rules. Programmers responsibility would be limited to the compliance of the rules, while the current version implies that it is programmers responsibility to guarantee being free from the weakness, which is hard to achieve at reasonable cost.

Analyzing fashion item purchase patterns and channel transition patterns using association rules and brand loyalty in big data (빅데이터의 연관규칙과 브랜드 충성도를 활용한 패션품목 구매패턴과 구매채널 전환패턴 분석)

  • Ki Yong Kwon
    • The Research Journal of the Costume Culture
    • /
    • v.32 no.2
    • /
    • pp.199-214
    • /
    • 2024
  • Until now, research on consumers' purchasing behavior has primarily focused on psychological aspects or depended on consumer surveys. However, there may be a gap between consumers' self-reported perceptions and their observable actions. In response, this study aimed to investigate consumer purchasing behavior utilizing a big data approach. To this end, this study investigated the purchasing patterns of fashion items, both online and in retail stores, from a data-driven perspective. We also investigated whether individual consumers switched between online websites and retail establishments for making purchases. Data on 516,474 purchases were obtained from fashion companies. We used association rule analysis and K-means clustering to identify purchase patterns that were influenced by customer loyalty. Furthermore, sequential pattern analysis was applied to investigate the usage patterns of online and offline channels by consumers. The results showed that high-loyalty consumers mainly purchased infrequently bought items in the brand line, as well as high-priced items, and that these purchase patterns were similar both online and in stores. In contrast, the low-loyalty group showed different purchasing behaviors for online versus in-store purchases. In physical environments, the low-loyalty consumers tended to purchase less popular or more expensive items from the brand line, whereas in online environments, their purchases centered around items with relatively high sales volumes. Finally, we found that both high and low loyalty groups exclusively used a single preferred channel, either online or in-store. The findings help companies better understand consumer purchase patterns and build future marketing strategies around items with high brand centrality.

The Applicability of he UNIDROIT Principles in Interactional Commercial Arbitration (국제상사중재(國際商事仲裁)에서 UNIDROIT 원칙(原則)의 적용가능성(適用可能性))

  • Oh, Won Suk
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.161-182
    • /
    • 1999
  • The purpose of this paper is to examine the applicability of the UNIDROIT Principle in international commercial arbitration. For this purpose, I have studies the basic two characters of this Principles: One is of general rule(principle); Another is of international and commercial character. According to CISG, questions concerning matters governed by the CISG which are not expressly settled in it are to be settled in conformity with the general principles, so this Principles will cover many questions which are not expressly settled in the applicable law, by gap-filing, analogy or usage. In the preamble of this Principles, there are five cases in which the Principles shall be applied or may be applied. If the disputes are submitted to the any national court, the application of this Principles would be restricted because of the mandatory rules of national, international or supranational origin. But the disputes are submitted to arbitration, the arbitrator would have more discretional powers to apply the Principles than the judge. The reason is that in the arbitration, the arbitrators do not bear obligation to act in conformity with the law applicable by virtue of the rules of rules of private international law. I also examined the applicability of the Principles in cases which there are no mentions in preamble: When the international arbitrators choose the Principles; When the arbitrators decide ex aequo et bono; When the both parties have not chosen the governing law; When there are gaps in domestic law chosen by the parties; When the applicable domestic law is insufficient. In all these cases, the Principles may be applied more easily and conveniently in arbitration than in litigation. Thus to envisage the application of this Principle in international arbitration, first both parties in international commercial contracts should incorporate this Principle as a governing law in their contracts, and second, the arbitrators should try to apply this Principles in their arbitrations by choice, analogy, general principles or usage.

  • PDF

Dynamic Data Cubes Over Data Streams (데이타 스트림에서 동적 데이타 큐브)

  • Seo, Dae-Hong;Yang, Woo-Sock;Lee, Won-Suk
    • Journal of KIISE:Databases
    • /
    • v.35 no.4
    • /
    • pp.319-332
    • /
    • 2008
  • Data cube, which is multi-dimensional data model, have been successfully applied in many cases of multi-dimensional data analysis, and is still being researched to be applied in data stream analysis. Data stream is being generated in real-time, incessant, immense, and volatile manner. The distribution characteristics of data arc changing rapidly due to those characteristics, so the primary rule of handling data stream is to check once and dispose it. For those characteristics, users are more interested in high support attribute values observed rather than the entire attribute values over data streams. This paper propose dynamic data cube for applying data cube to data stream environment. Dynamic data cube specify user's interested area by the support ratio of attribute value, and dynamically manage the attribute values by grouping each other. By doing this it reduce the memory usage and process time. And it can efficiently shows or emphasize user's interested area by increasing the granularity for attributes that have higher support. We perform experiments to verify how efficiently dynamic data cube works in limited memory usage.

An Implementation of a Lightweight Spacing-Error Correction System for Korean (한국어 경량형 띄어쓰기 교정 시스템의 구현)

  • Song, Yeong-Kil;Kim, Hark-Soo
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.2
    • /
    • pp.87-96
    • /
    • 2009
  • We propose a Korean spacing-error correction system that requires small memory usage although the proposed method is a mixture of rule-based and statistical methods. In addition, to train the proposed model to be robust in mobile colloquial sentences in which spelling errors and omissions of functional words are frequently occurred, we propose a method to automatically transform typical colloquial corpus to mobile colloquial corpus. The proposed system uses statistical information of syllable uni-grams in order to increase coverages on new syllable patterns. Then, the proposed system uses error correction rules of two or more grams of syllables in order to increase accuracies. In the experiments on fake mobile colloquial sentences, the proposed system showed relatively high accuracy of 92.10% (93.80% in typical colloquial corpus, 94.07% in typical balanced corpus) spite of small memory usage of about 1MB.

  • PDF

Machine Learning Approach for Pattern Analysis of Energy Consumption in Factory (머신러닝 기법을 활용한 공장 에너지 사용량 데이터 분석)

  • Sung, Jong Hoon;Cho, Yeong Sik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.4
    • /
    • pp.87-92
    • /
    • 2019
  • This paper describes the pattern analysis for data of the factory energy consumption by using machine learning method. While usual statistical methods or approaches require specific equations to represent the physical characteristics of the plant, machine learning based approach uses historical data and calculate the result effectively. Although rule-based approach calculates energy usage with the physical equations, it is hard to identify the exact equations that represent the factory's characteristics and hidden variables affecting the results. Whereas the machine learning approach is relatively useful to find the relations quickly between the data. The factory has several components directly affecting to the electricity consumption which are machines, light, computers and indoor systems like HVAC (heating, ventilation and air conditioning). The energy loads from those components are generated in real-time and these data can be shown in time-series. The various sensors were installed in the factory to construct the database by collecting the energy usage data from the components. After preliminary statistical analysis for data mining, time-series clustering techniques are applied to extract the energy load pattern. This research can attributes to develop Factory Energy Management System (FEMS).