• Title/Summary/Keyword: 문제 발견 패턴

Search Result 110, Processing Time 0.033 seconds

Pattern-Oriented Software Development Process using Incremental Composition for Design Patterns (디자인 패턴의 점진적 통합을 이용한 패턴지향 소프트웨어 개발 방법)

  • Kim, Woon-Yong;Choi, Young-Keun
    • The KIPS Transactions:PartD
    • /
    • v.10D no.5
    • /
    • pp.763-772
    • /
    • 2003
  • Design patterns are known widely by the techniques to improve software qualify. The design patterns are efficient solutions for problems occurring frequently in software development. Recently there are wide researches for design patterns to find them and to verify usability for them. But there are very few researches to define systematic development approaches about constructing application using design patterns. In this paper, we propose an approach for the pattern-oriented software development process using incremental composition for design patterns. For this proposal, first we define a development process using design patterns, propose technique for incremental composition for design patterns and view ports for software in the process. Also we deal with the problem of efficient traceability and maintenance to design patterns in the software system. And we use a feedback framework system as an illustrative example to show how the process can be used to develop the pattern-oriented software. In the development of software, the systematic development approach and usage increase efficiency to develop the system by using design experience and technique early in the development lifecycle. Therefore the system will assure the high stability and reusability and offer the low cost and time for development.

An Efficient Algorithm for Mining Interactive Communication Sequence Patterns (대화형 통신 순서열 패턴의 마이닝을 위한 효율적인 알고리즘)

  • Haam, Deok-Min;Song, Ji-Hwan;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.169-179
    • /
    • 2009
  • Communication log data consist of communication events such as sending and receiving e-mail or instance message and visiting web sites, etc. Many countries including USA and EU enforce the retention of these data on the communication service providers for the purpose of investigating or detecting criminals through the Internet. Because size of the retained data is very large, the efficient method for extracting valuable information from the data is needed for Law Enforcement Authorities to use the retained data. This paper defines the Interactive Communication Sequence Patterns(ICSPs) that is the important information when each communication event in communication log data consists of sender, receiver, and timestamp of this event. We also define a Mining(FDICSP) problem to discover such patterns and propose a method called Fast Discovering Interactive Communication Sequence Pattern(FDICSP) to solve this problem. FDICSP focuses on the characteristics of ICS to reduce the search space when it finds longer sequences by using shorter sequences. Thus, FDICSP can find Interactive Communication Sequence Patterns efficiently.

Attention and Attention Shifts of 5th General and Mathematically Gifted Students Based on the Types of Mathematical Patterns (수학 패턴 유형에 따른 5학년 일반학생과 수학영재학생의 주의집중과 주의전환)

  • Yi, Seulgi;Lee, Kwangho
    • Education of Primary School Mathematics
    • /
    • v.22 no.1
    • /
    • pp.1-12
    • /
    • 2019
  • This study examined the attention and attention shift of general students and mathematically gifted students about pattern by the types of mathematical patterns. For this purpose, we analyzed eye movements during the problem solving process of 5th general and mathematically gifted students using eye tracker. The results were as follows: first, there was no significant difference in attentional style between the two groups. Second, there was no significant difference in attention according to the generation method between the two groups. The diversion was more frequent in the incremental strain generation method in both groups. Third, general students focused more on the comparison between non-contiguous terms in both attributes. Unlike general students, mathematically gifted students showed more diversion from geometric attributes. In order to effectively guide the various types of mathematical patterns, we must consider the distinction between attention and attention shift between the two groups.

User Access Patterns Discovery based on Apriori Algorithm under Web Logs (웹 로그에서의 Apriori 알고리즘 기반 사용자 액세스 패턴 발견)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.681-689
    • /
    • 2019
  • Web usage pattern discovery is an advanced means by using web log data, and it's also a specific application of data mining technology in Web log data mining. In education Data Mining (DM) is the application of Data Mining techniques to educational data (such as Web logs of University, e-learning, adaptive hypermedia and intelligent tutoring systems, etc.), and so, its objective is to analyze these types of data in order to resolve educational research issues. In this paper, the Web log data of a university are used as the research object of data mining. With using the database OLAP technology the Web log data are preprocessed into the data format that can be used for data mining, and the processing results are stored into the MSSQL. At the same time the basic data statistics and analysis are completed based on the processed Web log records. In addition, we introduced the Apriori Algorithm of Web usage pattern mining and its implementation process, developed the Apriori Algorithm program in Python development environment, then gave the performance of the Apriori Algorithm and realized the mining of Web user access pattern. The results have important theoretical significance for the application of the patterns in the development of teaching systems. The next research is to explore the improvement of the Apriori Algorithm in the distributed computing environment.

Washington on a New Watershed in Denuclearization on the Korean Peninsula: Rethinking Its Strategies toward North Korea's Nuclear Development (한반도 비핵화의 분수령에 선 미국 : 미 대북핵 정책에 대한 재고(再考))

  • Lim, Jiyoung
    • Strategy21
    • /
    • s.43
    • /
    • pp.273-302
    • /
    • 2018
  • 1980년대 북 핵개발을 처음 발견 이후, 미국은 북한의 비핵화라는 정책목적달성을 위해 다양한 정책을 사용해 왔지만 현재까지 실패하였다. 미국의 대북 정책 실패의 결과는 북핵 문제의 고착화 속에서, 평양의 핵무기 개발 가속화 야기로 한반도 및 미국을 핵위협 속에 놓이게 하였다. 특히, 지난 해, 북미간의 가열된 공격적 수사와 행동에 의한 한반도 위기설은 절정에 달하였다. 해결의 실마리가 보이지 않던 한반도의 갈등 및 위기는, 지난 4월에 열린 남북 정상회담을 통해 25년간의 핵위협의 굴레를 벗어날 기회를 다시 한번 맞이하게 되었다. 남북 정상회담 이후 이어질 북미 정상회담 등 향후 미국의 정책은 한반도 비핵화를 위한 중요한 분수령에 다시 한번 서있다. 하지만, 과거의 25년간의 역사는 다시 맞이한 '한반도의 봄'에 대한 낙관적 희망만을 주지 않는다. 과거, 양자적, 다자적 협상을 이룸에도 불구하고, 북핵 문제는 다시 위기에 접어드는 반복된 패턴과 사이클 속에 악화 되어 왔기 때문이다. 비핵화의 분수령에 있는 미 정부는 다시 한번 과거의 정책을 뒤돌아 보고, 남북 정상회담을 통해 어렵게 맞이한 기회를 결실로 이룰 수 있도록 어느 때 보다 신중한 노력이 필요하다. 최근 몇 달간 북핵 문제는 경이로운 속도로 진전을 보였지만, 한순간의 정책의 실패는 최근 보여진 진전의 속도 이상의 속도로 문제를 악화 시킬 수 있으며, 그 결과는 작년 여름과 겨울의 위기보다 더욱 심각 할 수 있음을 명심해야 한다. 이러한 점에서 이 보고서는 과거의 역사 및 이론적 분석을 통해 과거 미국의 북핵정책 실패 원인을 분석하고 정책을 제언하는데 그 목적이 있다. 과거 미 북핵 실패의 원인은 크게 3가지로 보인다. 먼저, 포괄적인 그리고 북한 정권의 특성에서 비롯된 북핵 개발의 모티브를 정확히 이해하는데 실패하여, 북한의 정책적 계산을 변화 시키는데 실패 하였다. 둘째, 북한 문제를 둘러싼 외부적 복잡성이 미북핵 정책실패를 야기하였다. 한반도 문제는 과거부터 다양한 국가들의 이해관계에 둘러 싸여 왔다. 북핵 문제도 남북 및 미국을 비롯 중국 등 주변국의 복잡성이 불확실성을 가중시켜 문제를 더욱 복잡하게 하였으며, 미국의 대북 협상의 영향력을 약화 시켰다. 셋째, 과거 누적된 두 국가간의 불신은 협상 이후 상대의 신뢰 있는 이행에 대한 불신을 야기하여 미국의 정책의 효과성을 저해하였다. 미국은 북핵 개발 모티브에 대한 포괄적 이해와 한국 및 중국과의 다자외교로 과거의 실패를 극복하고 25년간의 북핵문제의 고리를 끊어야 할 것이다.

Workflow Process-Aware Data Cubes and Analysis (워크플로우 프로세스 기반 데이터 큐브 및 분석)

  • Jin, Min-hyuck;Kim, Kwang-hoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.83-89
    • /
    • 2018
  • In workflow process intelligence and systems, workflow process mining and analysis issues are becoming increasingly important. In order to improve the quality of workflow process intelligence, it is essential for an efficient and effective data center storing workflow enactment event logs to be provisioned in carrying out the workflow process mining and analytics. In this paper, we propose a three-dimensional process-aware datacube for organizing workflow enterprise data centers to efficiently as well as effectively store the workflow process enactment event logs in the XES format. As a validation step, we carry out an experimental process mining to show how much perfectly the process-aware datacubes are suitable for discovering workflow process patterns and its analytical knowledge, like enacted proportions and enacted work transferences, from the workflow process enactment event histories. Finally, we confirmed that it is feasible to discover the fundamental control-flow patterns of workflow processes through the implemented workflow process mining system based on the process-aware data cube.

Gameplay Experience as A Problem Solving - Towards The New Rule Spaces - (문제해결로서의 게임플레이 경험 - 새로운 법칙공간을 중심으로 -)

  • Song, Seung-Keun
    • Journal of Korea Game Society
    • /
    • v.9 no.5
    • /
    • pp.25-41
    • /
    • 2009
  • The objective of this study is to develop an analytic framework to code systematically the gamer's behaviour in MMO(Massively Multi-player Online) gameplay experience, to explore their gameplay as a problem solving procedure empirically. Previous studies about model human processor, content based protocol, and procedure based protocol are reviewed in order to build the outline of the analytic framework related to MMO gameplay. The specific gameplay actions and contents were derived by using concurrent protocol analysis method through the empirical experiment executed in MMORPG gameplay. Consequently, gameplay are divided into six actions : kinematics, perception, function, representation, simulation, and rule (heuristics, following, and transcedence). The analytic framework suitable for MMO gameplay was built. As a result of this study, we found three rule spaces in the problem solving domain of gameplay that are an heuristics, a following of the rule, and a transcendence of the rule. 'Heuristics' denotes the rule action that discovers the rule of game through trial-and-error. 'Following' indicates the rule action that follows the rule of game embedded in game by game designers. 'Transcendence' presents the rule action that transcends that. The new discovered rule spaces where 'Following' and 'Transcendence' actions occur and the gameplay pattern in them is provided with the key basis to determine the level design elements of MMO game, such as terrain feature, monster attribute, item, and skill et cetera. Therefore, this study is concludes with key implications to support game design to improve the quality of MMO game product.

  • PDF

A Study on the User's Internet Addiction Diagnosis by Analyzing Internet Main Activities (인터넷 주활동 분석을 통한 사용자의 인터넷 중독진단에 관한 연구)

  • Kim, Hee-Jae;Kim, Jong-Wan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.3
    • /
    • pp.35-45
    • /
    • 2011
  • Due to people's internet use growth and proliferation of ubiquitous technology, the internet addiction is becoming a social issue. However, the current adults' self-diagnosis measure about internet addiction, the K-scale, is a normal diagnostic method, which it does not consider user characteristics. In this research, we will propose a new internet addiction diagnostic method based on users' non-duty internet activities by using some questionnaire items to collect users' basic internet patterns used on duty related or non-duty related web sites. Since we simply ask for the basic internet usage pattern to each user who does not like to check frankly questionnaire items in the K-scale, the proposed method can find some hidden internet addicts compared to the K-scale with the SPSS statistical analysis tool.

Anomaly Detection using Temporal Association Rules and Classification (시간연관규칙과 분류규칙을 이용한 비정상행위 탐지 기법)

  • Lee, Hohn-Gyu;Lee, Yang-Woo;Kim, Lyong;Seo, Sung-Bo;Ryu, Keun-Ho;Park, Jin-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1579-1582
    • /
    • 2003
  • 점차 네트워크상의 침입 시도가 증가되고 다변화되어 침입탐지에 많은 어려움을 주고 있다. 시스템에 새로운 침입에 대한 탐지능력과 다량의 감사데이터의 효율적인 분석을 위해 데이터마이닝 기법이 적용된다. 침입탐지 방법 중 비정상행위 탐지는 모델링된 정상행위에서 벗어나는 행위들을 공격행위로 간주하는 기법이다. 비정상행위 탐지에서 정상행위 모델링을 하기 위해 연관규칙이나 빈발에피소드가 적용되었다. 그러나 이러한 기법들에서는 시간요소를 배제하거나 패턴들의 발생순서만을 다루기 때문에 정확하고 유용한 정보를 제공할 수 없다. 따라서 이 논문에서는 이 문제를 해결할 수 있는 시간연관규칙과 분류규칙을 이용한 비정상행위 탐지 모델을 제안하였다. 즉, 발생되는 패턴의 주기성과 달력표현을 이용, 유용한 시간지식표현을 갖는 시간연관규칙을 이용해 정상행위 프로파일을 생성하였고 이 프로파일에 의해 비정상행위로 간주되는 규칙들을 발견하고 보다 정확한 비정상행위 판별 여부를 결정하기 위해서 분류기법을 적용하였다.

  • PDF

Computing Method for The Number of The Interaction Strength Based on Software Whitebox Testing (소프트웨어 화이트박스 테스트의 교호 강도 수 기반 테스트 방법)

  • Choi, Hyeong-Seob;Park, Hong-Seong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.29-36
    • /
    • 2009
  • Cost and Time for software test is gradually increasing as the software complexity increases. To cope with this problem, it is very important to reduce the number of test cases used in the software test. The interaction strength number is especially important in decision of the number of test cases for the unit test, where the interaction strength number means the number of arguments which affect the results of a function by the analysis of their combination used in source code of the function. This paper proposes the algorithm that computes the number of the interaction strength, where analyzes the patterns used in the source code of a function and increase its number when the pattern matches one of the specified patterns. The proposed algorithm is validated by some experiments finding coverage and the number of fault detection.