• Title/Summary/Keyword: 룰

Search Result 571, Processing Time 0.026 seconds

The Creation of Organizational Agility Through BRE Introduction: A case of "W" Investment and Securities Co., Ltd. (BRE 활용을 통한 조직민첩성 창출: "W" 투자증권 사례를 중심으로)

  • Ok, Jung-Bong;Lee, Jeong-Min;Cha, Sang-Min;Gexi, Gexi;Kwahk, Kee-Young
    • Information Systems Review
    • /
    • v.12 no.1
    • /
    • pp.131-144
    • /
    • 2010
  • To survive in the rapidly changing business environment, it is very important for companies to respond to the changing environment effectively as well as agilely. As an approach to appropriately respond to the changing environment, companies have developed and exploited various business rules and related knowledge and attempted to implement them through information systems. However, most of legacy information systems used in companies have suffered from the limitations that do not properly utilize and systematically organize the business rules. This study proposes an introduction of BRE (business rule engine) as a solution to cope with the limitations and explores its effect on organizational agility based the case analysis of "W" Investment and securities Co., Ltd.

Design and Implementation of Advanced Web Log Preprocess Algorithm for Rule based Web IDS (룰 기반 웹 IDS 시스템을 위한 효율적인 웹 로그 전처리 기법 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.5
    • /
    • pp.23-34
    • /
    • 2008
  • The number of web service user is increasing steadily as web-based service is offered in various form. But, web service has a vulnerability such as SQL Injection, Parameter Injection and DoS attack. Therefore, it is required for us to develop Web IDS system and additionally to offer Rule-base intrusion detection/response mechanism against those attacks. However, existing Web IDS system didn't correspond properly on recent web attack mechanism because they didn't including suitable pre-processing procedure on huge web log data. Therfore, we propose an efficient web log pre-processing mechanism for enhancing rule based detection and improving the performance of web IDS base attack response system. Proposed algorithm provides both a field unit parsing and a duplicated string elimination procedure on web log data. And it is also possible for us to construct improved web IDS system.

  • PDF

Feature Subset Selection in the Induction Algorithm using Sensitivity Analysis of Neural Networks (신경망의 민감도 분석을 이용한 귀납적 학습기법의 변수 부분집합 선정)

  • 강부식;박상찬
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.51-63
    • /
    • 2001
  • In supervised machine learning, an induction algorithm, which is able to extract rules from data with learning capability, provides a useful tool for data mining. Practical induction algorithms are known to degrade in prediction accuracy and generate complex rules unnecessarily when trained on data containing superfluous features. Thus it needs feature subset selection for better performance of them. In feature subset selection on the induction algorithm, wrapper method is repeatedly run it on the dataset using various feature subsets. But it is impractical to search the whole space exhaustively unless the features are small. This study proposes a heuristic method that uses sensitivity analysis of neural networks to the wrapper method for generating rules with higher possible accuracy. First it gives priority to all features using sensitivity analysis of neural networks. And it uses the wrapper method that searches the ordered feature space. In experiments to three datasets, we show that the suggested method is capable of selecting a feature subset that improves the performance of the induction algorithm within certain iteration.

  • PDF

Analysis of Essential Proteins in Protein-Protein Interaction Networks (단백질 상호작용 네트워크에서 필수 단백질의 견고성 분석)

  • Ryu, Jae-Woon;Kang, Tae-Ho;Yoo, Jae-Soo;Kim, Hak-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.74-81
    • /
    • 2008
  • Protein interaction network contains a small number of highly connected protein, denoted hub and many destitutely connected proteins. Recently, several studies described that a hub protein is more likely to be essential than a non-hub protein. This phenomenon called as a centrality-lethality rule. This nile is widely credited to exhibit the importance of hub proteins in the complex network and the significance of network architecture as well. To confirm whether the rule is accurate, we Investigated all protein interaction DBs of yeast in the public sites such as Uetz, Ito, MIPS, DIP, SGB, and BioGRID. Interestingly, the protein network shows that the rule is correct in lower scale DBs (e.g., Uetz, Ito, and DIP) but is not correct in higher scale DBs (e.g., SGD and BioGRID). We are now analyzing the features of networks obtained from the SGD and BioGRD and comparing those of network from the DIP.

Packet Classification Using Two-Dimensional Binary Search on Length (길이에 대한 2차원 이진검색을 이용한 패킷분류 구조)

  • Mun, Ju-Hyoung;Lim, Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9B
    • /
    • pp.577-588
    • /
    • 2007
  • The rapid growth of the Internet has stimulated the development of various new applications and services, and the service providers and the Internet users now require different levels of service qualities rather than current best-effort service which treats all incoming packet equally. Therefore, next generation routers should provide the various levels of services. In order to provide the quality of services, incoming packets should be classified into flows according to pre-defined rules, and this should be performed for all incoming packets in wire-speed. Packet classification not only involves multi-dimensional search but also finds the highest priority rule among all matching rules. Area-based quad-trie is a very good algorithm that constructs a two-dimensional trie using source and destination prefix fields. However, it performs the linear search for the prefix length, and hence it does not show very good search performance. In this paper, we propose to apply binary search on length to the area-based quad-trie algorithm. In improving the search performance, we also propose two new algorithms considering the priority of rules in building the trie.

IV ECM Threshold Cointegration Tests and Nonlinear Monetary Policy in Korea (분계점 공적분 검정법을 사용한 한국의 비선형 테일러 통화정책 검증)

  • Enders, Walter;Lee, Junsoo;Strazicich, Mark C.
    • KDI Journal of Economic Policy
    • /
    • v.29 no.2
    • /
    • pp.135-157
    • /
    • 2007
  • The goal of this paper is to examine the validity of nonlinear Taylor rules in Korea. To perform our tests, we utilize new IV ECM threshold cointegration tests that are invariant to nuisance parameters. The new tests have a standard chi-square distribution and the same critical values can be used throughout. This is in contrast to OLS ECM threshold cointegration tests, which depend on nuisance parameters and have nonstandard distributions. After finding significant support for nonlinear cointegration, we find that the Bank of Korea raises the call rate of interest only when inflation is above a threshold rate. We additionally find that the Bank of Korea increases the call rate of interest to possibly counter domestic currency deprecation only when the rate of currency deprecation exceeds a threshold.

  • PDF

The Protocol on WS-ECA Framework (WS-ECA 프레임워크 프로토콜)

  • Lee, Won-Suk;Park, Jong-Hun;Lee, Kyu-Chul
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.55-73
    • /
    • 2007
  • Importance of coordination among heterogeneous devices is significantly increasing to meet the challenges presented by the evolvement of the ubiquitous computing environment. The web services technology is going up as a promising solution to support the inter-operability between such heterogeneous devices via well-defined protocol. Currently, ECA(Event-Condition-Action) rule based framework for coordinating devices is proposed, it is called as WS-ECA(Web Services-ECA) framework. This framework was basically based on the web services and proposed the ECA based rule language, And this also proposed the framework that could enable the device coordination based on proposed rule language. In this paper, we propose the protocol among the components of WS-ECA framework to support dynamic feature for ubiquitous environment, and we also propose WSDL extension to support service and event descriptions these are provided in components of this framework.

  • PDF

Developing Scenario for Implementation of Counseling Chatbot and Verifying Usefulness (상담 챗봇 구현을 위한 시나리오 개발 및 유용성 검증)

  • Lee, Ji-Won;Yang, Hyunjung;Kim, Ji-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.12-29
    • /
    • 2019
  • The purpose of this study is to develop the scenario for implementation of the rule-based counseling chatbot and to verify its usefulness. For this purpose, counseling scenario for exploring problems triggering depression and establishing early counseling relationships was built and user evaluations for the rule-base counseling chatbot were conducted on 10 counseling psychologists. As a result, clear counseling structuring, appropriate use of selective and narrative responses, and active listening were identified as important components of counseling chatbot. To the next step, the usefulness of counseling chatbot developed in the previous step was examined with 78 college students. As a result, active listening was found to be an important factor in improving user satisfaction and positive mood change. In addition, through qualitative analysis of user evaluation, the unique advantages of counseling chatbot were identified and the limitations of counseling chatbot that should be overcome were identified. Based on the results of the study, the implications of the study and suggestions for future research were discussed.