• Title/Summary/Keyword: 발생 가능한 규칙의 수

Search Result 174, Processing Time 0.027 seconds

Design of JESS-based Inference Rule for the Monitoring of Harmful Gas (유해가스 모니터링을 위한 JESS 기반 추론규칙의 설계)

  • Ahn, yoon-ae
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.396-398
    • /
    • 2010
  • 밀폐된 공간으로 이루어진 작업장은 여러 가지 유해가스가 많이 발생된다. 이로 인해 환기가 불충분한 작업공간에서는 산소결핍 및 유해가스로 인한 건강장해와 인화성 물질에 의한 화재, 폭발 등의 위험이 존재한다. 따라서 유해가스 정보를 작업장 내의 센서를 통해서 실시간으로 모니터링하고, 위험으로부터 작업자의 안전을 보장할 수 있는 모니터링 시스템이 필요하다. 특히, 상황에 맞는 의사결정이 가능하도록 하기 위해 상황인식 시스템의 도입이 필요하다. 이 논문에서는 작업장의 유해가스 정보를 모니터링하기 위한 추론 규칙을 JESS를 기반으로 설계한다.

  • PDF

A Study on WT-Algorithm for Effective Reduction of Association Rules (효율적인 연관규칙 감축을 위한 WT-알고리즘에 관한 연구)

  • Park, Jin-Hee;Pi, Su-Young
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.5
    • /
    • pp.61-69
    • /
    • 2015
  • We are in overload status of information not just in a flood of information due to the data pouring from various kinds of mobile devices, online and Social Network Service(SNS) every day. While there are many existing information already created, lots of new information has been created from moment to moment. Linkage analysis has the shortcoming in that it is difficult to find the information we want since the number of rules increases geometrically as the number of item increases with the method of finding out frequent item set where the frequency of item is bigger than minimum support in this information. In this regard, this thesis proposes WT-algorithm that represents the transaction data set as Boolean variable item and grants weight to each item by making algorithm with Quine-McKluskey used to simplify the logical function. The proposed algorithm can improve efficiency of data mining by reducing the unnecessary rules due to the advantage of simplification regardless of number of items.

A study of Cluster Tool Scheduler Algorithm which is Support Various Transfer Patterns and Improved Productivity (반도체 생산 성능 향상 및 다양한 이송패턴을 수행할 수 있는 범용 스케줄러 알고리즘에 관한 연구)

  • Song, Min-Gi;Jung, Chan-Ho;Chi, Sung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.99-109
    • /
    • 2010
  • Existing research about automated wafer transport management strategy for semiconductor manufacturing equipment was mainly focused on dispatching rules which is optimized to specific system layout, process environment or transfer patterns. But these methods can cause problem as like requiring additional rules or changing whole transport management strategy when applied to new type of process or system. In addition, a lack of consideration for interconnectedness of the added rules can cause unexpected deadlock. In this study, in order to improve these problems, propose dynamic priority based transfer job decision making algorithm which is applicable with regardless of system lay out and transfer patterns. Also, extra rule handling part proposed to support special transfer requirement which is available without damage to generality for maintaining a consistent scheduling policies and minimize loss of stability due to expansion and lead to improve productivity at the same time. Simulation environment of Twin-slot type semiconductor equipment was built In order to measure performance and examine validity about proposed wafer scheduling algorithm.

Approximation of Frequent Itemsets with Maximum Size by One-scan for Association Rule Mining Application (연관 규칙 탐사 응용을 위한 한 번 읽기에 의한 최대 크기 빈발항목 추정기법)

  • Han, Gab-Soo
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.475-484
    • /
    • 2008
  • Nowadays, lots of data mining applications based on continuous and online real time are increasing by the rapid growth of the data processing technique. In order to do association rule mining in that application, we have to use new techniques to find the frequent itemsets. Most of the existing techniques to find the frequent itemsets should scan the total database repeatedly. But in the application based on the continuous and online real time, it is impossible to scan the total database repeatedly. We have to find the frequent itemsets with only one scan of the data interval for that kind of application. So in this paper we propose an approximation technique which finds the maximum size of the frequent itemsets and items included in the maximum size of the frequent itemsets for the processing of association rule mining.

ICT EXPERT INTERVIEW - 재난통신(PS-LTE)

  • 한국정보통신기술협회
    • TTA Journal
    • /
    • s.156
    • /
    • pp.6-13
    • /
    • 2014
  • 재난안전은 아무리 강조해도 지나치지 않고 재난 발생은 그 끝이 없습니다. 그래서 항상 재난에 대비하고 관련 규칙을 철저히 준수해야 합니다. 설마 하는 방심이 누적되어 불시에 대형 참사가 발생하며 이러한 재난이 발생하고 난 후에 책임공방과 과실을 따져봐야 이미 발생한 재난의 시련은 이미 돌이킬 수 없습니다. 그동안 발생한 대형 참사를 통하여 배운 교훈은 일사불란한 통합지휘체계에 의한 재난 관리 및 재난 대응 시스템이 절실히 필요하다는 사실입니다. 그러나 아직까지도 한반도의 산간오지 및 도서 지역을 커버하는 음성 그룹통신 기반의 재난안전통신망이 제대로 구축되어 있지 않으며, 이러한 상황에서 정부는 음성과 영상 그룹통신이 가능한 멀티미디어 방식의 PSLTE 구축을 3년 내에 전국을 커버하는 재난안전통신망으로 구축할 계획을 발표하였지만 이에 대한 기술표준과 상용화 장비 등이 구현되어 있지 않아 3년 내 전국망 구축이 쉽지 않다는 전망이 나오고 있습니다. 객관적 입장에서 PS-LTE 재난망의 개념, 표준화 방향과 추진 일정, 재난안전통신망의 문제점, 시장선점을 위한 원천기술, 국내시장 활성화 방안 그리고 기타 재난 경보방송 서비스에 대하여 살펴보겠습니다. 이번만큼은 어떠한 재난이 발생하더라도 신속하고 정확하게 그리고 일사불란하게 국가재난에 대응하는 현존 최고의 재난안전통신망 구축이 완벽하게 이루어지기를 간절히 바랍니다.

  • PDF

Intrusion Detection Learning Algorithm using Adaptive Anomaly Detector (적응형 변형 인식부를 이용한 침입 탐지 학습알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Kim, Young-Soo;Lee, Se-Yul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.451-456
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn't make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.

A study on the relatively causal strength measures in a viewpoint of interestingness measure (흥미도 측도 관점에서 상대적 인과 강도의 고찰)

  • Park, Hee Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.1
    • /
    • pp.49-56
    • /
    • 2017
  • Among the techniques for analyzing big data, the association rule mining is a technique for searching for relationship between some items using various relevance evaluation criteria. This associative rule scheme is based on the direction of rule creation, and there are positive, negative, and inverse association rules. The purpose of this paper is to investigate the applicability of various types of relatively causal strength measures to the types of association rules from the point of view of interestingness measure. We also clarify the relationship between various types of confidence measures. As a result, if the rate of occurrence of the posterior item is more than 0.5, the first measure ($RCS_{IJ1}$) proposed by Good (1961) is more preferable to the first measure ($RCS_{LR1}$) proposed by Lewis (1986) because the variation of the value is larger than that of $RCS_{LR1}$, and if the ratio is less than 0.5, $RCS_{LR1}$ is more preferable to $RCS_{IJ1}$.

Adaptive Intrusion Detection Algorithm based on Learning Algorithm (학습 알고리즘 기반의 적응형 침입 탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.1
    • /
    • pp.75-81
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn`t make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.

A Method for Predicting Effect based on the Causal relations of Interval Events (인터벌이벤트의 인과관계에 기초한 영향력 예측 기법)

  • Song, Myung-Jin;Kim, Dae-In;Hwang, Bu-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.793-794
    • /
    • 2009
  • 이벤트 사이에 존재하는 연관 정보를 탐사함으로서 발생 가능한 이벤트를 예측할 수 있다. 그러나 기존의 시간 데이터마이닝 기법은 어느 정도 영향을 주고받았는지에 대한 영향력은 예측할 수 없다. 본 논문에서는 인터벌이벤트 사이에 존재하는 연관 정보를 탐사하고 탐사된 규칙에 대한 영향력을 측정할 수 있는 방법을 제안한다. 제안 방법은 이벤트 지속성을 고려하여 인터벌이벤트를 구성하고 빈발 이벤트 사이에 존재하는 연관 정보에 대한 영향력 정도를 측정한다. 그리고 이벤트 발생에 대한 주요한 원인이벤트를 탐사함으로서 이벤트 인과관계에 대한 다양한 정보를 제공할 수 있다.

Kripke vs. Wittgenstein on the Notion of Rule-Following and Semantic Contextualism (규칙 따르기에 관한 크립키와 비트겐슈타인의 상반된 견해와 맥락주의적 의미론)

  • Oh, Onyoung
    • Korean Journal of Logic
    • /
    • v.19 no.1
    • /
    • pp.49-82
    • /
    • 2016
  • In this paper, I argue that it is Kripke's Tractarian notion of rule-following that prevents him from giving a non-skeptical (straight) solution to Wittgenstein's paradox. I characterize the Tractarian notion of rule-following as the 'determinate/infinistic' notion of rule-following. The later Wittgenstein, however, advocates an opposite notion of rule-following: the 'indeterminate/finistic' notion. Considering the later Wittgenstein's context-sensitive, pragmatics-oriented approach to meaning and rule-following, the later Wittgenstein could not have endorsed the determinate/infinistic notion of rule-following. To the contrary, a motive behind Wittgenstein's skeptical paradox was to blame the Tractarian notion of rule-following as the major culprit giving rise to the paradox. At the end, I argue that Kripke's adherence to the Tractarian-correspondence theory of truth also contributes to his failure to offer a non-skeptical solution to the paradox. If Kripke had noticed that the later Wittgenstein was a deflationist about truth, he could have avoided his skeptical conclusion.

  • PDF