• Title/Summary/Keyword: Database Algorithm

Search Result 1,655, Processing Time 0.032 seconds

An Algorithm for Updating Discovered Association Rules in Data Mining (데이타 마이닝에서 기존의 연관 규칙을 갱신하는 앨고리듬 개발)

  • 이동명;지영근;황종원;강맹규
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.43
    • /
    • pp.265-276
    • /
    • 1997
  • There have been many studies on efficient discovery of association rules in large databases. However, it is nontrivial to maintain such discovered rules in large databases because a database may allow frequent or occasional updates and such updates may not only invalidate some existing strong association rules but also turn some weak rules into strong ones. The major idea of updating algorithm is to resuse the information of the old large itemsets and to integrate the support information of the new large itemsets in order to substantially reduce the pool of candidate sets to be re-exmained. In this paper, an updating algorithm is proposed for efficient maintenance of discovered assocation rules when new transaction data are added to a transaction database. And superiority of the proposed updating algorithm will be shown by comparing with FUP algorithm that was already proposed.

  • PDF

File Database and Search Algorithm for Efficient Search of Car Number (차량번호의 효율적 탐색을 위한 파일 데이터베이스와 탐색 알고리즘)

  • Sim, Chul Jun;Yoo, Sang Hyun;Kim, Won Il
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.10
    • /
    • pp.391-396
    • /
    • 2019
  • Researches for image processing have been actively progress due to the development of various hardware. For example, in order to prevent various types of crime by a vehicle, there is a method of detecting the location of a criminal vehicle using the existing CCTV in real time. However, certain types of systems and high-performance system requirements make it difficult to apply to existing equipment. In this paper proposes a search algorithm that construct a file database of Korean standard license plate information so that specific vehicles can be quickly searched using existing equipment. In order to evaluate the performance of the file database and the search algorithm proposed in this paper, we set up the search targets at various locations and the results showed that the search algorithm could always check the information by searching the vehicle within a certain time.

Design of serializability Algorithm for Concurrency Control of Multi Transaction in Database (데이터베이스에서 다중 트랜잭션의 동시성 제어를 위한 직렬성 알고리즘 설계)

  • 김홍진;오상엽;김영선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.1-7
    • /
    • 2001
  • The database development is in need or transaction management composed of operations about data, efficiency database management and security of information data in necessity of as well as the new thinking about data security. When users approach data, transaction concurrency is controlled by the users security authentication and security level of data. So, existing secure algorithm occurred the problems which don't satisfy serializability of high level transaction which is delayed high level transaction repeatedly by the low level transaction, because existing secure algorithm is focused on the part which removes the security channel. Therefore this proposed algorithm which prevents waste of resource from the high level transaction reexecution and delay by stopping serializability offense problem by the increase of efficiency of concurrency control.

Algorithm mining Association Rules by considering Weight Support (중요지지도를 고려한 연관규칙 탐사 알고리즘)

  • Kim, Keun-Hyung;Whang, Byung-Woong;Kim, Min-Chul
    • The KIPS Transactions:PartD
    • /
    • v.11D no.3
    • /
    • pp.545-552
    • /
    • 2004
  • Association rules mining, which is one of data mining technologies, searches data among which are frequent and related to each other in database. But, although the data are not of frequent and rare in database, they have the enough worth of business information if the data ares important and strongly related to each other, In this paper, we propose the algorithm discovering association rules that consist of data, which are rare but, important and strongly related to each other in database. The proposed algorithm was evaluated through simulation. We found that the proposed algorithm discovered efficiently association rules among data, which are not frequent but, important.

A Study on the Development of Causal Knowledge Base Based on Data Mining and Fuzzy Cognitive Map (데이터 마이닝과 퍼지인식도 기반의 인과관계 지식베이스 구축에 관한 연구)

  • Kim, Jin-Sung
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.05a
    • /
    • pp.247-250
    • /
    • 2003
  • Due to the increasing use of very large databases, mining useful information and implicit knowledge from databases is evolving. However, most conventional data mining algorithms identify the relationship among features using binary values (TRUE/FALSE or 0/1) and find simple If-THEN rules at a single concept level. Therefore, implicit knowledge and causal relationships among features are commonly seen in real-world database and applications. In this paper, we thus introduce the mechanism of mining fuzzy association rules and constructing causal knowledge base form database. Acausal knowledge base construction algorithm based on Fuzzy Cognitive Map(FCM) and Srikant and Agrawal's association rule extraction method were proposed for extracting implicit causal knowledge from database. Fuzzy association rules are well suited for the thinking of human subjects and will help to increase the flexibility for supporting users in making decisions or designing the fuzzy systems. It integrates fuzzy set concept and causal knowledge-based data mining technologies to achieve this purpose. The proposed mechanism consists of three phases: First, adaptation of the fuzzy membership function to the database. Second, extraction of the fuzzy association rules using fuzzy input values. Third, building the causal knowledge base. A credit example is presented to illustrate a detailed process for finding the fuzzy association rules from a specified database, demonstration the effectiveness of the proposed algorithm.

  • PDF

Implementation of the Authorization Model for the Database Server of BADA-III system (바다-III 시스템의 데이타베이스 서버를 위한 권한부여 모델의 구현)

  • Kim, Young-Kyun;Cho, Ok-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.41-56
    • /
    • 1996
  • Database servers that are used to provide multimedia information services in World Wide Web(WWW) environment have to support the access control mechanism that allows authorized users to access the constructed databases. In this paper, we define an authorization model as well as authorization policies to enforce the proper access control on databases in the BADA-III object-oriented database server and propose an access evaluation algorithm. Also we implement this model and the algorithm in the BADA-III database server. Considering the service environment of the WWW, we expect that database service providers can simply and effectively protect their data using the proposed model.

Bead Visualization Using Spline Algorithm (스플라인 알고리즘을 이용한 비드 가시화)

  • Koo, Chang-Dae;Yang, Hyeong-Seok;Kim, Maeng-Nam
    • Journal of Welding and Joining
    • /
    • v.34 no.1
    • /
    • pp.54-58
    • /
    • 2016
  • In this research paper, suggest method of generate same bead as an actual measurement data in virtual welding conditions, exploit morphology information of the bead that acquired through robot welding. It has many multiple risk factors to Beginners welding training, by we make possible to train welding in virtual reality, we can reduce welding training risk and welding material to exploit bead visualization algorithm that we suggest so it will be expected to achieve educational, environmental and economical effect. The proposed method is acquire data to each case performing robot welding by set the voltage, current, working angle, process angle, speed and arc length of welding condition value. As Welding condition value is most important thing in decide bead form, we would selected one of baseline each item and then acquired metal followed another factors change. Welding type is FCAW, SMAW and TIG. When welding trainee perform the training, it's difficult to save all of changed information into database likewise working angle, process angle, speed and arc length. So not saving data into database are applying the method to infer the form of bead using a neural network algorithm. The way of bead's visualization is applying the spline algorithm. To accurately represent Morphological information of the bead, requires much of morphological information, so it can occur problem to save into database that is why we using the spline algorithm. By applying the spline algorithm, it can make simplified data and generate accurate bead shape. Through the research paper, the shape of bead generated by the virtual reality was able to improve the accuracy when compared using the form of bead generated by the robot welding to using the morphological information of the bead generated through the robot welding. By express the accurate shape of bead and so can reduce the difference of the actual welding training and virtual welding, it was confirmed that it can be performed safety and high effective virtual welding education.

CLUSTERING DNA MICROARRAY DATA BY STOCHASTIC ALGORITHM

  • Shon, Ho-Sun;Kim, Sun-Shin;Wang, Ling;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.438-441
    • /
    • 2007
  • Recently, due to molecular biology and engineering technology, DNA microarray makes people watch thousands of genes and the state of variation from the tissue samples of living body. With DNA Microarray, it is possible to construct a genetic group that has similar expression patterns and grasp the progress and variation of gene. This paper practices Cluster Analysis which purposes the discovery of biological subgroup or class by using gene expression information. Hence, the purpose of this paper is to predict a new class which is unknown, open leukaemia data are used for the experiment, and MCL (Markov CLustering) algorithm is applied as an analysis method. The MCL algorithm is based on probability and graph flow theory. MCL simulates random walks on a graph using Markov matrices to determine the transition probabilities among nodes of the graph. If you look at closely to the method, first, MCL algorithm should be applied after getting the distance by using Euclidean distance, then inflation and diagonal factors which are tuning modulus should be tuned, and finally the threshold using the average of each column should be gotten to distinguish one class from another class. Our method has improved the accuracy through using the threshold, namely the average of each column. Our experimental result shows about 70% of accuracy in average compared to the class that is known before. Also, for the comparison evaluation to other algorithm, the proposed method compared to and analyzed SOM (Self-Organizing Map) clustering algorithm which is divided into neural network and hierarchical clustering. The method shows the better result when compared to hierarchical clustering. In further study, it should be studied whether there will be a similar result when the parameter of inflation gotten from our experiment is applied to other gene expression data. We are also trying to make a systematic method to improve the accuracy by regulating the factors mentioned above.

  • PDF

Design of Data Encoding Algorithm for a Two Dimensional Bar Code (2차원 바코드를 위한 데이터 부호화 알고리즘 설계)

  • Jeon, Seong-Goo;Kim, Il-Hwan
    • Journal of Industrial Technology
    • /
    • v.25 no.B
    • /
    • pp.171-174
    • /
    • 2005
  • In this paper, we propose a new data encoding algorithm for a two-dimensional bar code system. In general, the one-dimensional bar code is just a key which can access detailed information to the host computer database. But the two-dimensional bar code is a new technology which can obtain high density information without access to the host computer database. We implemented the encoding algorithm for Data Matrix bar code which is the most widely used among the many kinds of two-dimensional bar codes in the field of marking using Digital Signal Processor (TMS320C31). The performance of the proposed algorithm is verified by comparing the imprinted symbols on the steel surfaces with the codes which are decoded by a bar code reader.

  • PDF

Continuous Location Tracking Algorithm for Moving Position Data

  • Ahn, Yoon-Ae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.3
    • /
    • pp.979-994
    • /
    • 2008
  • Moving objects are spatio-temporal data that change their location or shape continuously over time. Generally, if continuously moving objects are managed by a conventional database management system, the system cannot properly process the past and future location which is not stored in the database. Up to now, for the purpose of location tracking which is not stored, the linear interpolation to estimate the past location has been usually used. It is suitable for the moving objects on linear route, not curved route. In this paper, we propose a past location tracking algorithm for a moving object on curved routes, and also suggest a future location tracking algorithm using some past location information. We found that the proposed location tracking algorithm has higher accuracy than the linear interpolation function.

  • PDF