• Title/Summary/Keyword: 식별방법

Search Result 2,325, Processing Time 0.025 seconds

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

Generating Rank-Comparison Decision Rules with Variable Number of Genes for Cancer Classification (순위 비교를 기반으로 하는 다양한 유전자 개수로 이루어진 암 분류 결정 규칙의 생성)

  • Yoon, Young-Mi;Bien, Sang-Jay;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.767-776
    • /
    • 2008
  • Microarray technology is extensively being used in experimental molecular biology field. Microarray experiments generate quantitative expression measurements for thousands of genes simultaneously, which is useful for the phenotype classification of many diseases. One of the two major problems in microarray data classification is that the number of genes exceeds the number of tissue samples. The other problem is that current methods generate classifiers that are accurate but difficult to interpret. Our paper addresses these two problems. We performed a direct integration of individual microarrays with same biological objectives by transforming an expression value into a rank value within a sample and generated rank-comparison decision rules with variable number of genes for cancer classification. Our classifier is an ensemble method which has k top scoring decision rules. Each rule contains a number of genes, a relationship among involved genes, and a class label. Current classifiers which are also ensemble methods consist of k top scoring decision rules. However these classifiers fix the number of genes in each rule as a pair or a triple. In this paper we generalized the number of genes involved in each rule. The number of genes in each rule is in the range of 2 to N respectively. Generalizing the number of genes increases the robustness and the reliability of the classifier for the class prediction of an independent sample. Also our classifier is readily interpretable, accurate with small number of genes, and shed a possibility of the use in a clinical setting.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

A Study on GIS Component Classification considering Functional/Non-Functional Elements (기능적/비기능적 요소를 고려한 GIS 컴포넌트 분류에 관한 연구)

  • Jo, Yun-Won;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.3
    • /
    • pp.77-86
    • /
    • 2002
  • Recently software industry in GIS(geographic information system) becomes an interesting issue by performing a large scale of national GIS application development as well as even small unit of FMS(facility management system). Also, there exist many cases to combine GIS with various business domains such as MIS(marketing information system), CNS(car navigation system) and ITS(intelligent transportation system). In this situation, in order to develop an efficient and useful GIS application for a short term, there must be a deep consideration of not only developing GIS component but also managing GIS component. In fact, even though there exist many certain components having high reusability, excellent interoperability and good quality, their reusability may be reduced because of their difficulty to access in a certain repository. Therefore, it is important to classify components having common characteristic based on their particular rule with reflecting their functionality and non-functionality before cataloging them. Here, there are two non-functional classification categories discussed such as GIS content-dependent metadata and GIS content-independent metadata. This cataloged components will help application developers to select easily their desired components. Moreover, new components may be easily producted by modifying and combining previous components. Finally, the original goal of all this effort can be defined through obtaining high reusability and interoperability of GIS component.

  • PDF

Household Patterns in Early 18th - Century Korea -A Study Based on the Triinnial Household Register Data of Danseong-Hyon, Kyongsang Province, 1720- (1720년도 단성현 호적대장자료를 통한 이조중기 가구형태 분석)

  • 이흥탁
    • Korea journal of population studies
    • /
    • v.13 no.2
    • /
    • pp.19-47
    • /
    • 1990
  • 1720년 경상도 단성진 진내면 소재의 390가구를 대상으로 1970년대 초 케임브리지 대학의 역사인구학 연구소에서 개발한 Laslett-Hammel가구 형태 분석법을 적용하여 본 결과 표9에서 제시된바와 같이 전체가구의 48.9%가 핵가족의 형태이며, 42.1 퍼센트가 대가족으로 밝혀지고 있다. 물론 도표3에서 지적되고 있듯이 5세이하의 인구에 대한 자료가 미비한 상태라 호적 자료만으로 당시의 가구 형태에 대한 정확한 분석이 어렵다고 하드라도 이제까지 일반적으로 믿어져 왔던 대가족 형태의 이조 중기의 종가제도나 일반 서민들의 가구 형태 및 유아가구에 대한 보다 구체적인 연구가 호적 자료에 대한 면밀한 분석으로 가능해질것으로 믿어진다. 역촌, 즉 하류계층의 사람들이 주로 많이 주거하였던 단성진 진내면의 전체 조사 대상 가구의 절반이 핵가족의 형태로 보이고 있는것은 당연한 것으로 받아질수 있겠으나 표6에서 나타내고 있듯이 상류계층에 속하는 양소계층의 경우도 평균 가구 규격 16명중에서 약 13명이 율거유아로 실제 가구의 크기는 가족 구성원수 4명을 넘지않는 핵가족의 형태였을 가능성이 짙음을 알수 있다. 한가지 특이할만한 사항은 상류,중류,그리고 하류 계층 다같이 평균 가족 구성원수가 4명을 넘지 않는다는 점이다. 단성진이 독촌들로 구성되어 있는 만큼 앞으로 상류계층이 밀집되어 있었던 경북 월성군의 양동 지역 향방 자료나 호적 초안자료를 단성진의 자료와 비교 분석함으로써 이조 중기의 가구 형태에 대한 보다 신뢰성 있는 결과를 도출해 낼수 이ㅛ는것이다. 단성진의 자료는 이조 중기의 유아 인구와 유아 가구 형태에 대한 연구에는 귀중한 자료로 앞으로 역사인구학의 방법론 개발에 큰 기여를 할것으로 기대된다.의 핑거를 식별, 추적할 수 있었다.는 경도방향의 해구수가 많았으며, 특히 8월은 1년중 경도방향의 분산이 가장 컸고, 어장중심은 5월에는 3888해구, 6월에는 3884해구, 7월에는 4078해구, 8월에는 4154해구, 9월에는 4146해구, 10월에는 4044해구였다. 3. 어획수온과 어획적수온은 5월에는 $14.0~18.5^{\circ}C,$ $15.0~16.0^{\circ}C,$ 6월에는 $13.5~18.5^{\circ}C,$ $14.5~16.0^{\circ}C,$ 7월에는 $14.0~20.0^{\circ}C,$ $14.5^{\circ}C,$ $19.0^{\circ}C,$ 8월에는 $16.0~21.5^{\circ}C,$ $18.0~20.0^{\circ}C,$ 9월에는 $14.5~22.0^{\circ}C,$ $17.0~18.5^{\circ}C,$ 10월 $14.0~18.0^{\circ}C,$ $16.0~17.0^{\circ}C였다.$ 4. 평균CPUE는 5월에는 3.2kg/sheet, 6월에는 4.5kg/sheet, 7월에는 4.3kg/sheet, 8월에는 5.1kg/sheet, 9월에는 6.4kg/sheet, 10월에는 5.8kg/sheet였다. 5. 한국정부의 1990년 북태평양 오징어 어업감시계획과 실제의 어장형성범위를 비교하면 5월에는 어장이 형성된 21개 해구 가운데 12개, 6월에는 24개 가운데 7개, 7월에는 25개 가운데 4개 해구에서

  • PDF

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Fire Mechanism in Power Connection Points of Outlets and Suggestion of a New Identification Method (콘센트 전원 접속구 화재 발생 메커니즘 고찰과 새로운 감식 방법 제시)

  • Park, Jin-Young;Bang, Sun-Bae;Eun, Hee-Rim;Oh, Se-Hyeok;Lee, Yoo-Bin;Ko, Young-Ho
    • Fire Science and Engineering
    • /
    • v.34 no.3
    • /
    • pp.76-84
    • /
    • 2020
  • Most outlet fires occur around plug pins and plug pin receivers. However, no research has been conducted on ignitions at power connection points. This study confirms the possibility of ignition after incomplete connection, using a stranded wire, to the power connection point of an outlet. The experiment was divided into basic and reproducing experiments. The basic experiment confirmed the possibility of ignition according to the number of wire strands connected to the power connection point, and it identified the characteristics of the residue after the fire. In the reproducing experiment, lamps, vacuum cleaners, and heaters were connected to an outlet to check if the ignition at the connection advanced into a fire. The fire advanced due to the heat and arc generated at the connection point, and partial losses were identified in the U-type holder and clip. Accordingly, the results demonstrate that a fire may occur when the stranded wire is incompletely connected to the outlet. Moreover, it was confirmed that the cause of a fire can be determined based on the characteristics of the residue.

Possible Methods of Identifying Underground Cavities Using Seismic Waves (지진파를 이용한 지하 공동의 탐지 방법)

  • 김소구;마상윤;김지수
    • The Journal of Engineering Geology
    • /
    • v.6 no.3
    • /
    • pp.137-153
    • /
    • 1996
  • The purpose of this study is to investigate the possibilities of identifying and detecting underground cavities using seismic waves recorded by the fixed and mobile stations. During 18 months of field work we recorded chemical explosions near the Bongdarn station. Seismic Stations were installed on the free surface and underground inside the Samba mine. The seismograms at the fixed(lorg-term) seismic station show abrupt change of polarization characteristics which can he associated with the appearance of P-to-S converted phase(PS) at 150 ~ 200 msec after the first P arrival. This result indicates that converted phases are generated very near to the Bongdarn station at a depth of 190m. Shear-wave splitting phenomena have also been observeci The time delay between fast shear(fS) and slow shear(sS) waves ranges between 30 and 60 msec(average is 42 msec). However, exact time delay between the fast and the slow shear waves can not be accurately measured because of the very short time delay and limitation of sampling rate. Chemical explosion experiments were recorded at stations along various paths to contrast the seismic response of areas with and without cavities. The seismograms recorded at the stations installed at cavity areas show an abrupt change of polarization characteristics but not on the other stations. Seismic waves propagating through the cavity are characterized by the attenuation of high frequency waves and predominantly low frequency seismic waves after the S wave arrivals.

  • PDF

Application of Breed-specific DNA Markers for the use of Identifying Major Pure Pig Breeds Maintained in Korea (대한민국내 주요 돼지 품종의 순종 식별을 위한 품종특이 DNA marker의 활용)

  • Seo, B.Y.;Kim, J.H.;Park, E.W.;Lim, H.T.;Cho, I.C.;Kim, B.W.;Oh, S.J.;Cheong, I.C.;Lee, J.G.;Jeon, J.T.
    • Journal of Animal Science and Technology
    • /
    • v.46 no.5
    • /
    • pp.735-742
    • /
    • 2004
  • This study was conducted for the identification of pure Landrace, Large White and Duroc breeds which are mainly maintained in Korea using DNA markers. We used known KIT and MC1R mutations, which were related coat color in pigs, and pig mitochondrial DNA variations. The KIT mutation was used to distinguish white and colored animals. Duroc breed could be discriminated from other colored breeds using the MC1R mutation N121D. Discriminating Landrace and Large White was possible using the l l-bp duplication of D-Ioop region and alternative initiation codon of ND2. In conclusion, identification of Landrace, Large White and Duroc breeds was might be possible using the procedure designed in this study.

MPEG-21 Terminal (MPEG-21 터미널)

  • 손유미;박성준;김문철;김종남;박근수
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.410-426
    • /
    • 2003
  • MPEG-21 defines a digital item as an atomic unit lot creation, delivery and consumption in order to provide an integrated multimedia framework in networked environments. It is expected that MPEG-21 standardization makes it Possible for users to universally access user's preferred contents in their own way they want. In order to achieve this goal, MPEG-21 has standardized the specifications for the Digital Item Declaration (DID). Digital Identification (DII), Rights Expression Language (REL), Right Data Dictionary (RDD) and Digital Item Adaptation (DIA), and is standardizing the specifications for the Digital Item Processing (DIP), Persistent Association Technology (PAT) and Intellectual Property Management and Protection (IPMP) tot transparent and secured usage of multimedia. In this paper, we design an MPEG-21 terminal architecture based one the MPEG-21 standard with DID, DIA and DIP, and implement with the MPEG-21 terminal. We make a video summarization service scenario in order to validate ow proposed MPEG-21 terminal for the feasibility to of DID, DIA and DIP. Then we present a series of experimental results that digital items are processed as a specific form after adaptation fit for the characteristics of MPEG-21 terminal and are consumed with interoperability based on a PC and a PDA platform. It is believed that this paper has n important significance in the sense that we, for the first time, implement an MPEG-21 terminal which allows for a video summarization service application in an interoperable way for digital item adaptation and processing nth experimental results.