• Title/Summary/Keyword: 순차패턴 분석

Search Result 118, Processing Time 0.031 seconds

Question Selection Component for WBI (WBI를 위한 문제추출 컴포넌트)

  • 정화영;송영재
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.565-567
    • /
    • 2003
  • 웹 기반 학습(WBI)은 인터넷의 빠르게 확산되어 가고 있다. 또한, 학습자의 학습효과를 높이기 위한 많은 연구와 기술들이 적용되었다. 그러나, 대부분의 웹 기반 학습 시스템은 문제은행에서 반복적인 학습내용의 제공이나 학습의 패턴을 주는 학습자료 제공자 측면에서의 일방적인 학습방법을 택하고 있다. 시스템의 개발방법에서도 웹 기반 학습시스템은 전통적인 순차적 프로세스 개발방법에 따라 구현됨으로서 개발의 비효율성 밀 재사용, 유지보수등이 어려웠다. 본 연구에서는 문제은행에서 사용되는 문제추출 컴포넌트를 설계 및 구현하였다. 문제추출은 학습자의 학습효과를 높이기 위하여 문항난이도를 분석하여 학습자에게 적절한 문제가 출제될 수 있도록 하였다. 또한, 본 연구의 시스템에서 중요한 비즈니스 로직이 되는 난이도 분석 및 적용부분은 EJB컴포넌트로 구현함으로서 구현로직의 분리 및 재사용성, 유지보수성을 높였다.

  • PDF

XML Document Analysis based on Similarity (유사성 기반 XML 문서 분석 기법)

  • Lee, Jung-Won;Lee, Ki-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.6
    • /
    • pp.367-376
    • /
    • 2002
  • XML allows users to define elements using arbitrary words and organize them in a nested structure. These features of XML offer both challenges and opportunities in information retrieval and document management. In this paper, we propose a new methodology for computing similarity considering XML semantics - meanings of the elements and nested structures of XML documents. We generate extended-element vectors, using thesaurus, to normalize synonyms, compound words, and abbreviations and build similarity matrix using them. And then we compute similarity between XML elements. We also discover and minimize XML structure using automata(NFA(Nondeterministic Finite Automata) and DFA(Deterministic Finite automata). We compute similarity between XML structures using similarity matrix between elements and minimized XML structures. Our methodology considering XML semantics shows 100% accuracy in identifying the category of real documents from on-line bookstore.

A Framework for Web Log Analysis Using Process Mining Techniques (프로세스 마이닝을 이용한 웹 로그 분석 프레임워크)

  • Ahn, Yunha;Oh, Kyuhyup;Kim, Sang-Kuk;Jung, Jae-Yoon
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.25-32
    • /
    • 2014
  • Web mining techniques are often used to discover useful patterns from data log generated by Web servers for the purpose of web usage analysis. Yet traditional Web mining techniques do not reflect sufficiently sequential properties of Web log data. To address such weakness, we introduce a framework for analyzing Web access log data by using process mining techniques. To illustrate the proposed framework, we show the analysis of Web access log in a campus information system based on the framework and discuss the implication of the analysis result.

Web Mining for Discovering Interesting Information using Effective Clustering (효율적인 클러스터링을 이용한 관심 정보 추출을 위한 웹 마이닝)

  • Kim, Sung-Hark;Ahn, Byeong-Tae
    • Journal of Digital Contents Society
    • /
    • v.9 no.2
    • /
    • pp.251-260
    • /
    • 2008
  • In internet being a repository of massive information, we easily may not find our desired information, this issue also exists in e-commerce which gets rapid growth. In most of e-commerce sites, the methods furnishing information have been made use of statistical analysis or simple process by category-oriented, but these can't represent diverse correlation among products information and also hardly reflect users' purchasing patterns precisely. In this thesis, we propose more efficient web mining ways for discovering interesting information using effective clustering in e-commerce, which get achieved more suitable relationship among products information using both sequential patterns and association rules in category-independent, and experiments show the efficiency of our proposed methods. And we propose search using effective clustering rapidly.

  • PDF

An Integrated Expert System for Automated Data Reduction in High-speed Holographic Interferometry (고속 홀로그래픽 간섭 계측기를 이용한 자동데이터 처리 통합전문가 시스템)

  • 주원종
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.11 no.2
    • /
    • pp.120-133
    • /
    • 1994
  • 홀로그래픽 간섭계측기로터 나오는 영상 데이터를 해석하는 전문가시스템에 대하여 기술하였다. 그동안 간섭 띠무늬(fringe)를 해석하는 방법들이 어느 정도의 자동화를 이룩하며 개발되어왔다. 그러나, 복잡한 간섭 띠무늬 패턴(fringe pattern)및 심한 잡음이 생기게 되는 고속도 항공공학 분야 또는 실험기계공학 분야에서는 신뢰할 만한 자동화를 이룩하기가 매우 힘들었다. 현재 사용가능한 방법중에는 간섭띠무늬 추적, 위상전이, 푸리에 변환, 회귀분석 등이 있는데, 이들은 소음제거나 데이터 수정을 하는데 있어서 극히 국부적인 정보에만 의존하였다. 결과적으로, 특별히 심한 소음이 있는 경우, 부정확한 위상중첩이나 간섭띠무늬 순차배열문제에 부딪히게 되고 따라서 작업자의 수작업이 심각하게 필요하게 된다. 본 논문에서는 간섭띠무늬 추적방법의 자동화 를 위한 새롭고 포괄적인, 규칙기반 전문가시스템에 대하여 기술하였다. 새로 개발된 전문가 시스템은 간섭띠무늬 패턴에 대한 전체적인 또는 지연적인 정보를 추출해 내고 또 전문가가 가지고 있는 지식을 이용한다. 이 전문가 시스템은 저수준 및 고수준 처리를 동시에 할 수 있도록 상호연결기구를 채택하여 간섭띠무늬를 해석하는 적절한 해결책을 마련하였다. 또한 위상전이나 푸리에 변환 방법에서 문제가 되는 자동위상 중첩에 대해 개발된 전문가 시스템의 응용의 가능성에 대해서도 기술하였다.

  • PDF

Tonal Characteristics Based on Intonation Pattern of the Korean Emotion Words (감정단어 발화 시 억양 패턴을 반영한 멜로디 특성)

  • Yi, Soo Yon;Oh, Jeahyuk;Chong, Hyun Ju
    • Journal of Music and Human Behavior
    • /
    • v.13 no.2
    • /
    • pp.67-83
    • /
    • 2016
  • This study investigated the tonal characteristics in Korean emotion words by analyzing the pitch patterns transformed from word utterance. Participants were 30 women, ages 19-23. Each participant was instructed to talk about their emotional experiences using 4-syllable target words. A total of 180 utterances were analyzed in terms of the frequency of each syllable using the Praat. The data were transformed into meantones based on the semi-tone scale. When emotion words were used in the middle of a sentence, the pitch pattern was transformed to A3-A3-G3-G3 for '즐거워서(joyful)', C4-D4-B3-A3 for '행복해서(happy)', G3-A3-G3-G3 for '억울해서(resentful)', A3-A3-G3-A3 for '불안해서(anxious)', and C4-C4-A3-G3 for '침울해서(frustrated)'. When the emotion words were used at the end of a sentence, the pitch pattern was transformed to G4-G4-F4-F4 for '즐거워요(joyful)', D4-D4-A3-G3 for '행복해요(happy)', G3-G3-G3-A3 and F3-G3-E3-D3 for '억울해요(resentful)', A3-G3-F3-F3 for '불안해요(anxious)', and A3-A3-F3-F3 for '침울해요(frustrated)'. These results indicate the differences in pitch patterns depending on the conveyed emotions and the position of words in a sentence. This study presents the baseline data on the tonal characteristics of emotion words, thereby suggesting how pitch patterns could be utilized when creating a melody during songwriting for emotional expression.

위성탑재장비 장착패턴을 고려한 제작 오차 분석

  • Kim, Kyung-Won;Kim, Jin-Hee;Kim, Sung-Hoon;Lee, Ju-Hun;Hwang, Do-Soon
    • Aerospace Engineering and Technology
    • /
    • v.3 no.2
    • /
    • pp.20-24
    • /
    • 2004
  • In this paper, a pattern/position tolerance analysis is visited on the insert to mount spacecraft electronic equipment. SQP(Sequential Quadratic Programming) is used to obtain the position tolerance. For examples, the cases of RDU(Remote Drive Unit) and OBC(On Board Computer) in the KOMPSAT-2 STM(Structure and Thermal Model) are analyzed.

  • PDF

Development of GIS-based Advertizing Postal System Using Temporal and Spatial Mining Techniques (시간 및 공간마이닝 기술을 이용한 GIS기반의 홍보우편 시스템 개발)

  • Lee, Heon-Gyu;Na, Dong-Gil;Choi, Yong-Hoon;Jung, Hoon;Park, Jong-Heung
    • Spatial Information Research
    • /
    • v.19 no.2
    • /
    • pp.65-70
    • /
    • 2011
  • Advertizing postal system combined with GIS and temporal/spatial mining techniques has been developed to activate advertizing service and conduct marketing campaign efficiently. In order to select customers accurately, this system provide purchase propensity information using sequential, cyclicpatterns and lifesytle information through RFM analysis and clustering technique. It is possible for corporate mailer to do customer oriented marketing campaign with the advertizing postal system as well as 'one-stop' service including target customer selection, mail production, and delivery request.

Interactivity within large-scale brain network recruited for retrieval of temporally organized events (시간적 일화기억인출에 관여하는 뇌기능연결성 연구)

  • Nah, Yoonjin;Lee, Jonghyun;Han, Sanghoon
    • Korean Journal of Cognitive Science
    • /
    • v.29 no.3
    • /
    • pp.161-192
    • /
    • 2018
  • Retrieving temporal information of encoded events is one of the core control processes in episodic memory. Despite much prior neuroimaging research on episodic retrieval, little is known about how large-scale connectivity patterns are involved in the retrieval of sequentially organized episodes. Task-related functional connectivity multivariate pattern analysis was used to distinguish the different sequential retrieval. In this study, participants performed temporal episodic memory tasks in which they were required to retrieve the encoded items in either the forward or backward direction. While separately parsed local networks did not yield substantial efficiency in classification performance, the large-scale patterns of interactivity across the cortical and sub-cortical brain regions implicated in both the cognitive control of memory and goal-directed cognitive processes encompassing lateral and medial prefrontal regions, inferior parietal lobules, middle temporal gyrus, and caudate yielded high discriminative power in classification of temporal retrieval processes. These findings demonstrate that mnemonic control processes across cortical and subcortical regions are recruited to re-experience temporally-linked series of memoranda in episodic memory and are mirrored in the qualitatively distinct global network patterns of functional connectivity.

Detecting Meltdown and Spectre Malware through Binary Pattern Analysis (바이너리 패턴 분석을 이용한 멜트다운, 스펙터 악성코드 탐지 방법)

  • Kim, Moon-sun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1365-1373
    • /
    • 2019
  • Meltdown and Spectre are vulnerabilities that exploit out-of-order execution and speculative execution techniques to read memory regions that are not accessible with user privileges. OS patches were released to prevent this attack, but older systems without appropriate patches are still vulnerable. Currently, there are some research to detect Meltdown and Spectre attacks, but most of them proposed dynamic analysis methods. Therefore, this paper proposes a binary signature that can be used to detect Meltdown and Spectre malware without executing them. For this, we collected 13 malicious codes from GitHub and performed binary pattern analysis. Based on this, we proposed a static detection method for Meltdown and Spectre malware. Our results showed that the method identified all the 19 attack files with 0.94% false positive rate when applied to 2,317 normal files.