• 제목/요약/키워드: Information Mining

Search Result 3,350, Processing Time 0.032 seconds

A Medium Access Control Mechanism for Distributed In-band Full-Duplex Wireless Networks

  • Zuo, Haiwei;Sun, Yanjing;Li, Song;Ni, Qiang;Wang, Xiaolin;Zhang, Xiaoguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5338-5359
    • /
    • 2017
  • In-band full-duplex (IBFD) wireless communication supports symmetric dual transmission between two nodes and asymmetric dual transmission among three nodes, which allows improved throughput for distributed IBFD wireless networks. However, inter-node interference (INI) can affect desired packet reception in the downlink of three-node topology. The current Half-duplex (HD) medium access control (MAC) mechanism RTS/CTS is unable to establish an asymmetric dual link and consequently to suppress INI. In this paper, we propose a medium access control mechanism for use in distributed IBFD wireless networks, FD-DMAC (Full-Duplex Distributed MAC). In this approach, communication nodes only require single channel access to establish symmetric or asymmetric dual link, and we fully consider the two transmission modes of asymmetric dual link. Through FD-DMAC medium access, the neighbors of communication nodes can clearly know network transmission status, which will provide other opportunities of asymmetric IBFD dual communication and solve hidden node problem. Additionally, we leverage FD-DMAC to transmit received power information. This approach can assist communication nodes to adjust transmit powers and suppress INI. Finally, we give a theoretical analysis of network performance using a discrete-time Markov model. The numerical results show that FD-DMAC achieves a significant improvement over RTS/CTS in terms of throughput and delay.

Dectection of Insurance Fraud using Visualization Data Mining Tool (Visualization Data Mining Tool을 활용한 보험사기 적발)

  • Sung, Tae-Kyung
    • Information Systems Review
    • /
    • v.5 no.1
    • /
    • pp.49-60
    • /
    • 2003
  • The purpose of this study is to empirically and practically verify the applicability of visualization data mining tool in detecting real-word insurance frauds that are now emerged as one of the most serious problems socially and economically. For the verification, Analyst's Notebook by i2, which has been known as the most effective visualization data mining tool, was adopted. With Analyst's Notebook, fraud-probable insurance transactions from a very large insurance claims are selected and then substantiation for insurance frauds are attempted. The results show that Analyst's Notebook not only detects insurance fraud transactions from a vast number of insurance claims, but is also able to pinpoint organized crime group by associating one fraud transaction to another fraud transaction. Therefore, it is safe to conclude that visualization data mining is very effective in detecting false transactions and crime behaviors including insurance fraud.

A Framework for Web Log Analysis Using Process Mining Techniques (프로세스 마이닝을 이용한 웹 로그 분석 프레임워크)

  • Ahn, Yunha;Oh, Kyuhyup;Kim, Sang-Kuk;Jung, Jae-Yoon
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.25-32
    • /
    • 2014
  • Web mining techniques are often used to discover useful patterns from data log generated by Web servers for the purpose of web usage analysis. Yet traditional Web mining techniques do not reflect sufficiently sequential properties of Web log data. To address such weakness, we introduce a framework for analyzing Web access log data by using process mining techniques. To illustrate the proposed framework, we show the analysis of Web access log in a campus information system based on the framework and discuss the implication of the analysis result.

A Multivariate Decision Tree using Support Vector Machines (지지 벡터 머신을 이용한 다변수 결정 트리)

  • Kang, Sung-Gu;Lee, B.W.;Na, Y.C.;Jo, H.S.;Yoon, C.M.;Yang, Ji-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10b
    • /
    • pp.278-283
    • /
    • 2006
  • 결정 트리는 큰 가설 공간을 가지고 있어 유연하고 강인한 성능을 지닐 수 있다. 하지만 결정트리가 학습 데이터에 지나치게 적응되는 경향이 있다. 학습데이터에 과도하게 적응되는 경향을 없애기 위해 몇몇 가지치기 알고리즘이 개발되었다. 하지만, 데이터가 속성 축에 평행하지 않아서 오는 공간 낭비의 문제는 이러한 방법으로 해결할 수 없다. 따라서 본 논문에서는 다변수 노드를 사용한 선형 분류기를 이용하여 이러한 문제점을 해결하는 방법을 제시하였으며, 결정트리의 성능을 높이고자 지지 벡터 머신을 도입하였다(SVMDT). 본 논문에서 제시한 알고리즘은 세 가지 부분으로 이루어졌다. 첫째로, 각 노드에서 사용할 속성을 선택하는 부분과 둘째로, ID3를 이 목적에 맞게 바꾼 알고리즘과 마지막으로 기본적인 형태의 가지치기 알고리즘을 개발하였다. UCI 데이터 셋을 이용하여 OC1, C4.5, SVM과 비교한 결과, SVMDT는 개선된 결과를 보였다.

  • PDF

Studying Factors Affecting Environmental Accounting Implementation in Mining Enterprises in Vietnam

  • NGUYEN, Thi Kim Tuyen
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.5
    • /
    • pp.131-144
    • /
    • 2020
  • The study investigates the impact of factors on environmental accounting implementation in mining enterprises in Binh Dinh province, Vietnam. The survey was carried out in three phases: 1) a draft survey form; 2) in-depth interviews with experts; 3) design questionnaire. The survey respondents were people who had knowledge of environmental information in mining enterprises in Binh Dinh province, including: accountant, chief accountant, financial deputy director or director. The questionnaire was is sent directly or through Google Form tool. The author received 162 responses votes from the survey respondent, out of which 13 were unusable due to missing data. Thus, 149 valid responses votes were used. This study employs Cronbach's alpha analysis, exploratory factor analysis and multivariate regression analysis. The results showed the influence of five different factors on environmental accounting implementation in mining enterprises in Binh Dinh province: stakeholders pressure, corporate characteristics, coercive pressure of government agencies, environmental awareness of senior managers and accountant qualifications of environmental accounting. While the pressure of stakeholders has a negligible influence, the remaining four factors (coercive pressure of government agencies, environmental awareness of senior executives, business characteristics, accountant qualifications of environmental accounting) have significant effect on environmental accounting implementation in mining enterprises in Binh Dinh province, Vietnam.

Using Genetic Rule-Based Classifier System for Data Mining (유전자 알고리즘을 이용한 데이터 마이닝의 분류 시스템에 관한 연구)

  • Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.1 no.1
    • /
    • pp.63-72
    • /
    • 2000
  • Data mining means a process of nontrivial extraction of hidden knowledge or potentially useful information from data in large databases. Data mining algorithm is a multi-disciplinary field of research; machine learning, statistics, and computer science all make a contribution. Different classification schemes can be used to categorize data mining methods based on the kinds of tasks to be implemented and the kinds of application classes to be utilized, and classification has been identified as an important task in the emerging field of data mining. Since classification is the basic element of human's way of thinking, it is a well-studied problem in a wide varietyof application. In this paper, we propose a classifier system based on genetic algorithm with robust property, and the proposed system is evaluated by applying it to nDmC problem related to classification task in data mining.

  • PDF

PROCL:A Process Log Clustering System (PROCL:프로세스 로그 클러스터링 시스템)

  • Jung, Jae-Yoon
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.181-194
    • /
    • 2008
  • Process mining aims at extracting useful information from system log of business process execution. As process-aware information systems, such as BPMS, ERP, and SCM, spread, researches on process mining get more significance. In this paper, we propose the methodology of clustering process log before process mining and also present the prototype system. The proposed methodology can be used in accompany with the existing process mining algorithms to improve their performance. The process log clustering system PROCLE, presented in this paper, supports to classify the process instances in the system log in order to extract the appropriate level of process model according to the users' need. The proposed methodology was implemented on the open platform for process mining, ProM.

  • PDF

Multi-Sized cumulative Summary Structure Driven Light Weight in Frequent Closed Itemset Mining to Increase High Utility

  • Siva S;Shilpa Chaudhari
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.2
    • /
    • pp.117-129
    • /
    • 2023
  • High-utility itemset mining (HIUM) has emerged as a key data-mining paradigm for object-of-interest identification and recommendation systems that serve as frequent itemset identification tools, product or service recommendation systems, etc. Recently, it has gained widespread attention owing to its increasing role in business intelligence, top-N recommendation, and other enterprise solutions. Despite the increasing significance and the inability to provide swift and more accurate predictions, most at-hand solutions, including frequent itemset mining, HUIM, and high average- and fast high-utility itemset mining, are limited to coping with real-time enterprise demands. Moreover, complex computations and high memory exhaustion limit their scalability as enterprise solutions. To address these limitations, this study proposes a model to extract high-utility frequent closed itemsets based on an improved cumulative summary list structure (CSLFC-HUIM) to reduce an optimal set of candidate items in the search space. Moreover, it employs the lift score as the minimum threshold, called the cumulative utility threshold, to prune the search space optimal set of itemsets in a nested-list structure that improves computational time, costs, and memory exhaustion. Simulations over different datasets revealed that the proposed CSLFC-HUIM model outperforms other existing methods, such as closed- and frequent closed-HUIM variants, in terms of execution time and memory consumption, making it suitable for different mined items and allied intelligence of business goals.

Improved approach of calculating the same shape in graph mining (그래프 마이닝에서 그래프 동형판단연산의 향상기법)

  • No, Young-Sang;Yun, Un-Il;Kim, Myung-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.251-258
    • /
    • 2009
  • Data mining is a method that extract useful knowledges from huge size of data. Recently, a focussing research part of data mining is to find interesting patterns in graph databases. More efficient methods have been proposed in graph mining. However, graph analysis methods are in NP-hard problem. Graph pattern mining based on pattern growth method is to find complete set of patterns satisfying certain property through extending graph pattern edge by edge with avoiding generation of duplicated patterns. This paper suggests an efficient approach of reducing computing time of pattern growth method through pattern growth's property that similar patterns cause similar tasks. we suggest pruning methods which reduce search space. Based on extensive performance study, we discuss the results and the future works.

Merchandise Management Using Web Mining in Business To Customer Electronic Commerce (기업과 소비자간 전자상거래에서의 웹 마이닝을 이용한 상품관리)

  • 임광혁;홍한국;박상찬
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.1
    • /
    • pp.97-121
    • /
    • 2001
  • Until now, we have believed that one of advantages of cyber market is that it can virtually display and sell goods because it does not necessary maintain expensive physical shops and inventories. But, in a highly competitive environment, business model that does away with goods in stock must be modified. As we know in the case of AMAZON, leading companies already consider merchandise management as a critical success factor in their business model. That is, a solution to compete against one's competitors in a highly competitive environment is merchandise management as in the traditional retail market. Cyber market has not only past sales data but also web log data before sales data that contains information of path that customer search and purchase on cyber market as compared with traditional retail market. So if we can correctly analyze the characteristics of before sales patterns using web log data, we can better prepare for the potential customers and effectively manage inventories and merchandises. We introduce a systematic analysis method to extract useful data for merchandise management - demand forecasting, evaluating & selecting - using web mining that is the application of data mining techniques to the World Wide Web. We use various techniques of web mining such as clustering, mining association rules, mining sequential patterns.

  • PDF