• Title/Summary/Keyword: 탐색패턴

Search Result 643, Processing Time 0.025 seconds

Fuzzy Cluster Based Diagnosis System for Classifying Computer Viruses (컴퓨터 바이러스 분류를 위한 퍼지 클러스터 기반 진단시스템)

  • Rhee, Hyun-Sook
    • The KIPS Transactions:PartB
    • /
    • v.14B no.1 s.111
    • /
    • pp.59-64
    • /
    • 2007
  • In these days, malicious codes have become reality and evolved significantly to become one of the greatest threats to the modern society where important information is stored, processed, and accessed through the internet and the computers. Computer virus is a common type of malicious codes. The standard techniques in anti-virus industry is still based on signatures matching. The detection mechanism searches for a signature pattern that identifies a particular virus or stain of viruses. Though more accurate in detecting known viruses, the technique falls short for detecting new or unknown viruses for which no identifying patterns present. To cope with this problem, anti-virus software has to incorporate the learning mechanism and heuristic. In this paper, we propose a fuzzy diagnosis system(FDS) using fuzzy c-means algorithm(FCM) for the cluster analysis and a decision status measure for giving a diagnosis. We compare proposed system FDS to three well known classifiers-KNN, RF, SVM. Experimental results show that the proposed approach can detect unknown viruses effectively.

The Effects of Environmental Adaptation Patterns in the Railway Public Enterprises on Marketing Capabilities and Organizational Performance: Focused on the Market Orientation of Korail and Subway Firms (철도공기업의 환경적응패턴이 마케팅역량과 조직성과에 미치는 영향: 코레일과 지하철 조직의 시장지향성을 중심으로)

  • Shin, Tack-Hyun;Kim, Sung-Ho
    • Journal of the Korean Society for Railway
    • /
    • v.15 no.1
    • /
    • pp.71-79
    • /
    • 2012
  • The main purpose of this study is to depict the causal relationship among Market Orientation(MO), Marketing Capabilities(MC), and Organizational Performance(OP) with the moderating effect of Environmental Turbulence(ET), especially comparatively highlighting the differences between Korail and Subway firms. Findings show that there partly existed significant interactions effects between ET and MO in case of subway firms, whereas Korail did not reveal any significant results. When considering the strong relationship between MO and MC shown in the subway firms' case, it can be inferred that subway firms continuously have attempted to adapt to the external environment facing them more flexibly and actively over their counterpart, by which the degree of their MC became positively enhanced over Korail. These results give us some implication that MO should be internalized and also MC should get a higher consideration than ever throughout the railway public enterprises in order to strengthen their performance.

The Comparative Study for Software Reliability Model Based on Finite and Infinite Failure Property using Rayleigh Distribution (레일리분포를 이용한 유한고장과 무한고장 소프트웨어 신뢰성 모형에 대한 비교연구)

  • Kim, Kyung-Soo;Kim, Hee-Cheul
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.277-284
    • /
    • 2014
  • The NHPP software reliability models for failure analysis can have, in the literature, exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. In this paper, finite failure NHPP models that assuming the expected value of the defect and infinite failures NHPP models that repairing software failure point in time reflects the situation, were presented for comparing property. Commonly used in the field of software reliability based on Rayleigh distribution software reliability model finite failures and infinite failures were presented for comparison problem. As a result, infinite fault model is effectively finite fault models, respectively. The parameters estimation using maximum likelihood estimation was conducted. In this research, can be able to help software developers for considering software failure property some extent.

Audio Texture Synthesis using EM Optimization (EM 최적화를 이용한 오디오 텍스처 합성)

  • Roe, Chang-Hwan;Yoo, Min-Joon;Lee, In-Kwon
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.274-280
    • /
    • 2007
  • 오디오 텍스처 합성은 주어진 짧은 오디오 클립으로부터 임의의 길이를 갖는 새로운 오디오 클립을 생성하는 방법이다. 이는 애니메이션이나 영화에서 비디오와 정확한 동기화를 이루는 사운드 효과를, 혹은 임의의 길이를 갖는 배경 음악을 효율적으로 만들 수 있는 방법이다. 최근 Lie Lu는 주어진 예제 오디오 클립을 여러 조각으로 나눈 후, 이 조각들을 그래프 형태로 연결하고, 생성된 그래프를 탐색하면서 임의의 길이를 가지는 오디오 클립을 합성하는 방법을 제안하였다. 비교적 간단한 방법으로도 원본 오디오 클립과 비슷한 느낌의 오디오 클립을 만들어낸다는 장점이 있지만, 이는 원본 내의 여러 오디오 조각들이 단지 지속적으로 연결되는 형태로 합성되기 때문에 종종 반복되는 느낌을 받는다는 단점이 있다. 본 논문에서는 Lie Lu의 방법과는 달리 주어진 예제 오디오 클립을 직접 합성함으로써 반복성을 줄이면서도 원본과 비슷한 느낌을 갖는 결과 오디오 클립을 생성할 수 있는 방법을 제안한다. 특히 본 논문에서는 정확한 합성을 위하여 EM 최적화 방법을 사용한다. 본 논문에서 제안하는 합성 방법은 먼저 예제 오디오 클립을 일정 단위로 나누고 이렇게 나눠진 부분들을 일정 길이만큼 서로 겹쳐지게 합성하여 임의의 길이의 오디오 클립을 만든다. 그 후 만들어진 오디오 클립을 예제 오디오 클립과 부분 부분을 비교하여 확장된 오디오 클립과 최대한 비슷한 부분을 예제 오디오 클립에서 찾는다. 그 다음 찾아진 결과를 결과 오디오에 다시 합성하여 오디오 클립을 만든다. 이런 과정을 반복하여 최적화된 가장 적절한 결과값을 구한다. 이 결과는 분할된 부분들이 가장 자연스럽게 이어지는 결과가 된다. 본 논문에서는 최적화를 사용하여 오디오를 합성하기 때문에 합성 결과를 쉽게 조정할 수 있다는 장점이 있다. 최적화 문제에 특정 제약 조건을 넣음으로써 사용자가 원하는 부분의 음악이 결과 사운드의 특정 부분에 위치 할 수 있게 하고 이로써 특정 흐름을 만들어낼 수 있으며, 일부가 손실된 사운드 데이터의 복구를 가능하게 하는 등의 결과를 생성할 수 있다. EM 최적화를 사용한 오디오 텍스처 합성 방법은 기존의 합성 방법에 비해 질적인 측면에서 보다 좋은 결과를 생성할 수 있고, 비교적 반복이 덜한 패턴들을 만들어 낼 수 있다. 이를 입증하기 위해 이에 대한 사용자 설문 조사 결과가 제시된다.

  • PDF

An Exploratory Analysis on the User Response Pattern and Quality Characteristics of Marketing Contents in the SNS of Regional Government (지역마케팅 콘텐츠의 사용자 반응패턴과 품질특성에 관한 탐색적 분석: 지방자치단체가 운영하는 SNS를 중심으로)

  • Jeong, Yeon-Su;Jeong, Dae-Yul
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.419-442
    • /
    • 2017
  • Purpose The purpose of this study is to explore the pattern of user response and it's duration time through social media content response analysis. We also analyze the characteristics of content quality factors which are associate with the user response pattern. The analysis results will provide some implications to develop strategies and schematic plans for the operator of regional marketing on the SNS. Design/methodology/approach This study used mixed methods to verify the effects and responses of social media contents on the users who have concerns about regional events such as local festival, cultural events, and city tours etc. Big data analysis was conducted with the quantitative data from regional government SNSs. The data was collected through web crawling in order to analyze the social media contents. We especially analyzed the contents duration time and peak level time. This study also analyzed the characteristics of contents quality factors using expert evaluation data on the social media contents. Finally, we verify the relationship between the contents quality factors and user response types by cross correlation analysis. Findings According to the big data analysis, we could find some content life cycle which can be explained through empirical distribution with peak time pattern and left skewed long tail. The user response patterns are dependent on time and contents quality. In addition, this study confirms that the level of quality of social media content is closely relate to user interaction and response pattern. As a result of the contents response pattern analysis, it is necessary to develop high quality contents design strategy and content posting and propagation tactics. The SNS operators need to develop high quality contents using rich-media technology and active response contents that induce opinion leader on the SNS.

Monitoring Network Security Situation Based on Flow Visualization (플로우 시각화 기반의 네트워크 보안 상황 감시)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper we propose a new method of security visualization, VisFlow, using traffic flows to solve the problems of existing traffic flows based visualization techniques that were a loss of end-to-end semantics of communication, reflection problem by symmetrical address coordinates space, and intuitive loss problem in mass of traffic. VisFlow, a simple and effective security visualization interface, can do a real-time analysis and monitoring the situation in the managed network with visualizing a variety of network behavior not seen in the individual traffic data that can be shaped into patterns. This is a way to increase the intuitiveness and usability by identifying the role of nodes and by visualizing the highlighted or simplified information based on their importance in 2D/3D space. In addition, it monitor the network security situation as a way to increase the informational effectively using the asymmetrical connecting line based on IP addresses between pairs of nodes. Administrator can do a real-time analysis and monitoring the situation in the managed network using VisFlow, it makes to effectively investigate the massive traffic data and is easy to intuitively understand the entire network situation.

Study on Research Trends in Airline Industry using Keyword Network Analysis: Focused on the Journal Articles in Scopus (키워드 네트워크를 이용한 항공관련 글로벌 연구동향 분석: 스코퍼스(Scopus)게재 논문을 중심으로)

  • Lee, Ju-Yang;Jang, Phil-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.5
    • /
    • pp.169-178
    • /
    • 2017
  • In various research fields, it is important to identify the trends and meaningful patterns in large volumes of text data. We examined the research trends and patterns in global journal articles related to aviation and airlines from 1997 to 2016 using keyword network analysis. Keyword network models were constructed, and centrality (degree and betweenness) analysis was performed using 25,959 articles from the Scopus database. The results suggested that the recent research trends in aviation and airlines could be quantitatively described through keyword network analysis. The engineering and social science fields were the most relevant fields with keywords related to aviation and airlines. In addition, it was shown that betweenness centrality increased with the degree centrality of keywords. The results of this study could be applied to establish policies and suggest further research topics in the field of aviation and airlines based on empirical data.

Sub-Pixel Rendering Algorithm Using Adaptive 2D FIR Filters (적응적 2차원 FIR 필터를 이용한 부화소 렌더링 기법)

  • Nam, Yeon Oh;Choi, Ik Hyun;Song, Byung Cheol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.113-121
    • /
    • 2013
  • In this paper, we propose a sub-pixel rendering algorithm using learning-based 2D FIR filters. The proposed algorithm consists of two stages: the learning and synthesis stages. At the learning stage, we produce the low-resolution synthesis information derived from a sufficient number of high/low resolution block pairs, and store the synthesis information into a so-called dictionary. At the synthesis stage, the best candidate block corresponding to each input high-resolution block is found in the dictionary. Next, we can finally obtain the low-resolution image by synthesizing the low-resolution block using the selected 2D FIR filter on a sub-pixel basis. On the other hand, we additionally enhance the sharpness of the output image by using pre-emphasis considering RGB stripe pattern of display. The simulation results show that the proposed algorithm can provide significantly sharper results than conventional down-sampling methods, without blur effects and aliasing.

A Time and Space Efficient Algorithm for VLSI Geometrical Rule Checking (시간 및 공간복잡도가 개선된 VLSI 설계규칙 검증 알고리듬)

  • Jeong, Ja-Choon;Shin, Sung-Yong;Lee, Hyun-Chan;Lee, Chul-Dong;Yu, Young-Uk
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.5
    • /
    • pp.137-144
    • /
    • 1989
  • A new algorithm is presented which efficiently reports minimum width/space violation in a geometric mask pattern. The proposed algorithm solves a sequence of range search problems by employing a plane sweep method. The algorithm runs in O(n log n) time, where n is the number of edges in a mask pattern. Since a lower bound in time conplexity for reporting all minimum width/space violations is ${\Omega}$ (n log n), this algorithm is theoretically optimal within a constant multiplicaive factor. It requires O($n^{0.5}$) space which is very efficient in practice. Moreover, this algorithm, we believe, is easy to implement and practically fast (116.7 seconds for a rectilinear region with 250000 vertices ar VAX 8650.)

  • PDF

Data Mining Analysis of Educational and Research Achievements of Korean Universities Using Public Open Data Services (정보공시 자료를 이용한 교육/연구성과 영향요인 추출 및 대학의 군집 분석)

  • Shin, Sun Mi;Kim, Hyeon Cheol
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.1
    • /
    • pp.117-130
    • /
    • 2014
  • The purpose of this study is to provide useful knowledge for improving indicators that represent competitiveness and educational competency of the university by deriving a new pattern or the meaningful results from the data of information disclosure of universities using statistical analysis and data mining techniques. To achieve this, a model of decision tree was made and various factors that affect education/research performance such as employment rate, the number of technology transfer and papers per full-time faculty were explored. In addition to this, the cluster analysis of universities was conducted using attributes related to evaluation of university. According to the analysis, common factors affecting higher education/research performance are following indicators ; incoming student recruitment rate, enrollment rate, and the number of students per full-time faculty. In the cluster analysis, when performed by the entire university, the size, location of the university respectively, clusters are mainly formed by well-known universities, art physical non-science and engineering religious leaders training universities, and others. The main influencing factors of this cluster are higher education/research performance indicators such as employment rate and the number of technology transfer.

  • PDF