• Title/Summary/Keyword: 이벤트패턴

Search Result 148, Processing Time 0.022 seconds

Biomedical Event Extraction based on Co-training wi th Co-occurrence Informal ion and Patterns (공기정보와 패턴 정보의 Co-training에 의한 바이오 이벤트 추출)

  • Chun, Hong-Woo;Hwang, Young-Sook;Rim, Hae-Chang
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2003.10a
    • /
    • pp.53-60
    • /
    • 2003
  • 생명과학 관련 문서에서의 이벤트 추출은 관련 연구자들의 연구에 많은 도움을 줄 수 있다. 기존의 연구에서는 주로 이벤트 동사에 대해 패턴을 정의한 후에 정의된 패턴에 의해서만 이벤트를 추출하고자하였다. 그러나 모든 패턴을 수동으로 정의하는 것은 너무 많은 비용이 들기 때문에 패턴을 자동 추출 또는 확장하는 방법이 필요하다. 또한 학습을 하기 위해서는 상당수의 학습 말뭉치가 있어야 하는데 그것 또한 충분하지 않은 실정이다. 본 논문에서는 초기 패턴에 의해 생성된 소량의 정답 이벤트로부터 학습한 후 공기정보와 패턴정보를 이용한 Co-training방법으로 패턴 확장 및 이벤트 추출을 시도하였다. 실험 결과, 이벤트 동사의 패턴 정보가 유용한 정보라는 것을 확인할 수 있었고, 후보 이벤트 내의 개체간 공기정보와 문법관계정보 또한 매우 중요한 정보라는 것을 새롭게 보일 수 있었다. GENIA 말뭉치에서 162개의 이벤트 동사에 대해 실험한 결과, 88.02%의 정확률, 79.25%의 재현율을 얻었다.

  • PDF

Efficient Sequence Pattern Mining Technique for the Removal of Ambiguity in the Interval Patterns Mining (인터벌 패턴 마이닝에서 모호성 제거를 위한 효율적인 순차 패턴 마이닝 기법)

  • Kim, Hwan;Choi, Pilsun;Kim, Daein;Hwang, Buhyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.565-570
    • /
    • 2013
  • Previous researches on mining sequential patterns mainly focused on discovering patterns from the point-based event. Interval events with a time interval occur in the real world that have the start and end point. Existing interval pattern mining methods that discover relationships among interval events based on the Allen operators have some problems. These are that interval patterns having three or more interval events can be interpreted as several meanings. In this paper, we propose the I_TPrefixSpan algorithm, which is an efficient sequence pattern mining technique for removing ambiguity in the Interval Patterns Mining. The proposed algorithm generates event sequences that have no ambiguity. Therefore, the size of generated candidate set can be minimized by searching sequential pattern mining entries that exist only in the event sequence. The performance evaluation shows that the proposed method is more efficient than existing methods.

Business Activity Monitoring Using Process-based Event Analysis (프로세스 기반 이벤트 분석을 이용한 비즈니스 활동 모니터링)

  • Son, Sung-Ho;Jung, Jae-Yoon;Kang, Suk-Ho;Cho, Nam-Wook
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.2
    • /
    • pp.219-231
    • /
    • 2007
  • Based on a complex event processing technique, an event analysis method for Business Activity Monitoring(BAM) is developed to provide an early warning for on-going events so that process managers effectively detect and monitor potential risks prior to the completion of the events. In this study, process-based event monitoring procedures to extract events with significant risks are presented; Complex event patterns are defined from historical event log data and risks of events are evaluated based on the patterns. A process-based event monitoring architecture for BAM is also presented. The proposed method has been applied to a service process of a home shopping company.

  • PDF

Automatic Event Extraction from the Yeast Literature by Pattern Matching (패턴 정보를 이용한 효모 관련 문서에서의 이벤트 자동 추출)

  • 전홍우;황영숙;임해창
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.464-466
    • /
    • 2003
  • 생명과학 관련 문서에서 자동으로 이벤트를 추출하는 것은 관련 연구자들의 연구에 많은 도움을 줄 수 있다. 본 논문에서는 생명과학 관련 문서 중 특히 효모와 관련된 문서를 대상으로 간단한 자연언어 처리 기술을 적용하여 유의미한 정보를 추출한 결과를 제시하고자 한다. 실험은 효모 관련 문서에서 고빈도의 이벤트 표현 동사에 대한 패턴 정보를 조사한 후, 패턴 정보에 의거하여 이벤트를 추출하였다. 평가 결과, 비교적 간단한 자연언어 처리 기술 안으로도 유의미한 정보들을 추출할 수 있었다.

  • PDF

Detection of Complex Event Patterns over Interval-based Events (기간기반 복합 이벤트 패턴 검출)

  • Kang, Man-Mo;Park, Sang-Mu;Kim, Sank-Rak;Kim, Kang-Hyun;Lee, Dong-Hyeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.201-209
    • /
    • 2012
  • The point-based complex event processing handled an instantaneous event by using one time stamp in each event. However, the activity period of the event plays the important role in the field which is the same as the finance, multimedia, medicine, and meteorology. The point-based event is insufficient for expressing the complex temporal relationship in this field. In the application field of the real-time world, the event has the period. The events more than two kinds can be temporally overlapped. In addition, one event can include the other event. The relation about the events of kind of these can not be successive like the point-based event. This thesis designs and implements the method detecting the patterns of the complex event by using the interval-based events. The interval-based events can express the overlapping relation between events. Furthermore, it can include the others. By using the end point of beginning and end point of the termination, the operator of interval-based events shows the interval-based events. It expresses the sequence of the interval-based events and can detect the complex event patterns. This thesis proposes the algorithm using the active instance stack in order to raise efficiency of detection of the complex event patterns. When comprising the event sequence, this thesis applies the window push down technique in order to reduce the number of intermediate results. It raises the utility factor of the running time and memory.

Abuse Pattern Monitoring Method based on CEP in On-line Game (CEP 기반 온라인 게임 악용 패턴 모니터링 방법)

  • Roh, Chang-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.114-121
    • /
    • 2010
  • Based on a complex event processing technique, an abuse pattern monitoring method is developed to provide an real-time detection. CEP is a technique to find complex event pattern in a massive information system. In this study, the events occurred by game-play are observed to be against the rules using CEP. User abuse patterns are pre-registered in CEP engine. And CEP engine monitors user abuse after aggregating the game data transferred by game logging server.

A Study of Spatio-temporal Complex Event Processing System (시공간 복합 이벤트 처리 시스템에 대한 연구)

  • Kim, Tae-Gyu;Baek, Sung-Ha;Chung, Warn-Ill;Bae, Hae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.83-86
    • /
    • 2010
  • 본 논문에서는 시공간 데이터 스트림에서 관심 이벤트를 검출할 수 있고 복잡한 공간 패턴을 감지할 수 있는 시공간 복합 이벤트 처리 시스템을 제안한다. 제안 시스템은 이동 객체 및 정적 객체에서 발생하는 시공간 데이터 스트림에서 스트림 발생시각, 위치 정보와 같은 시공간 정보를 데이터베이스와의 조인을 통해 얻은 관련 속성 정보를 활용하여 이벤트를 검출할 수 있다. 또한, 시공간 정보가 포함된 복잡한 패턴을 처리하기 위해 공간 패턴 연산자를 사용하여 시공간 복합 이벤트를 처리할 수 있다.

Modeling of Events caused by Burning for Virtual Reality Simulation (가상현실 시뮬레이션을 위한 BURN에 의해 발생하는 이벤트 모델링)

  • Kong, Young-Ho;Park, Jong-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10b
    • /
    • pp.336-339
    • /
    • 2006
  • 가상현실에서 에이전트에게 많은 영향을 주지 않는 객체의 움직임은 일정한 패턴을 가지고 동작하거나 시각적인 것에 중점을 두고 모델링을 한다. 가상현실에서 불을 현실세계와 유사하게 구현하기 위해서는 가상현실 내에 존재하는 환경과 상호작용을 하며 일정한 패턴을 가지지 않는 다양한 이벤트들이 전개되어야 한다. 그러기 위해서 인과관계에 의한 이벤트 전개 방식을 사용한다. 인과관계에 의한 이벤트전개를 위해서 이벤트를 전제조건, 절차, 결과로 나누어 설계하고 이벤트의 결과와 다른 이벤트 사이에 인관관계를 정의한다. 본 논문에서는 가상현실 내에서 burn에 의한 발생하는 이벤트가 현실세계에서 burn과 유사하게 모델링하기 위한 방법을 제시한다.

  • PDF

Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction (안드로이드 모바일 정상 및 악성 앱 시스템 콜 이벤트 패턴 분석을 통한 유사도 추출 기법)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.125-139
    • /
    • 2013
  • Distribution of malicious applications developed by attackers is increasing along with general normal applications due to the openness of the Android-based open market. Mechanism that allows more accurate ways to distinguish normal apps and malicious apps for common mobile devices should be developed in order to reduce the damage caused by the rampant malicious applications. This paper analysed the normal event pattern from the most highly used game apps in the Android open market to analyse the event pattern from normal apps and malicious apps of mobile devices that are based on the Android platform, and analysed the malicious event pattern from the malicious apps and the disguising malicious apps in the form of a game app among 1260 malware samples distributed by Android MalGenome Project. As described, experiment that extracts normal app and malicious app events was performed using Strace, the Linux-based system call extraction tool, targeting normal apps and malicious apps on Android-based mobile devices. Relevance analysis for each event set was performed on collected events that occurred when normal apps and malicious apps were running. This paper successfully extracted event similarity through this process of analyzing the event occurrence characteristics, pattern and distribution on each set of normal apps and malicious apps, and lastly suggested a mechanism that determines whether any given app is malicious.

Integration of Blackboard Architecture into Multi-Agent Architecture (블랙보드 구조와 다중 에이전트 구조의 통합)

  • Chang, Hai-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.355-363
    • /
    • 2012
  • The Integration of multi-agent architecture and blackboard architecture may lead to a new architecture to cope with new application areas which need some good and strong points of both the architectures. This paper suggests an integrated architecture of blackboard architecture and multi-agent architecture by using event-based implicit invocation pattern and a blackboard event detection mechanism based on Rete network. From the viewpoints of weak couplings of system components and flexible control of knowledge source agents, it is desirable to use the event-based implicit invocation pattern in the integrated architecture. But the pattern itself does not concern the performance of the architecture, and it is very critical to the performance of the integrated architecture to detect efficiently the blackboard events which can activate knowledge source agents which can contribute to the problem-solving processes of the integrated architecture. The integrated architecture suggested in this paper uses a blackboard event detection mechanism based on Rete network to detect efficiently blackboard events which can activate knowledge source agents.