• Title/Summary/Keyword: Information analysis system

Search Result 18,913, Processing Time 0.041 seconds

Log Analysis System Design using RTMA

  • Park, Hee-Chang;Myung, Ho-Min
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2004.04a
    • /
    • pp.225-236
    • /
    • 2004
  • Every web server comprises a repository of all actions and events that occur on the server. Server logs can be used to quantify user traffic. Intelligent analysis of this data provides a statistical baseline that can be used to determine server load, failed requests and other events that throw light on site usage patterns. This information provides valuable leads on marketing and site management activities. In this paper, we propose a method of design for log analysis system using RTMA(realtime monitoring and analysis) technique.

  • PDF

Technology Development Strategy of Piggyback Transportation System Using Topic Modeling Based on LDA Algorithm

  • Jun, Sung-Chan;Han, Seong-Ho;Kim, Sang-Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.261-270
    • /
    • 2020
  • In this study, we identify promising technologies for Piggyback transportation system by analyzing the relevant patent information. In order for this, we first develop the patent database by extracting relevant technology keywords from the pioneering research papers for the Piggyback flactcar system. We then employed textmining to identify the frequently referred words from the patent database, and using these words, we applied the LDA (Latent Dirichlet Allocation) algorithm in order to identify "topics" that are corresponding to "key" technologies for the Piggyback system. Finally, we employ the ARIMA model to forecast the trends of these "key" technologies for technology forecasting, and identify the promising technologies for the Piggyback system. with keyword search method the patent analysis. The results show that data-driven integrated management system, operation planning system and special cargo (especially fluid and gas) handling/storage technologies are identified to be the "key" promising technolgies for the future of the Piggyback system, and data reception/analysis techniques must be developed in order to improve the system performance. The proposed procedure and analysis method provides useful insights to develop the R&D strategy and the technology roadmap for the Piggyback system.

Comparative Performance Analysis of Network Security Accelerator based on Queuing System

  • Yun Yeonsang;Lee Seonyoung;Han Seonkyoung;Kim Youngdae;You Younggap
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.269-273
    • /
    • 2004
  • This paper presents a comparative performance analysis of a network accelerator model based on M/M/l queuing system. It assumes the Poisson distribution as its input traffic load. The decoding delay is employed as a performance analysis measure. Simulation results based on the proposed model show only $15\%$ differences with respect to actual measurements on field traffic for BCM5820 accelerator device. The performance analysis model provides with reasonable hardware structure of network servers, and can be used to span design spaces statistically.

  • PDF

Collecting Method and Implementation of Search Management System for R&D Projects in Korean Medicine Field (한의학 연구개발과제 수집 방법 및 검색 관리 시스템 구축)

  • Kim, Sang-Kyun;Jang, Hyun-Chul;Yea, Sang-Jun;Kim, Chul;Eom, Dong-Myung;Song, Mi-Young
    • The Journal of Korean Medicine
    • /
    • v.30 no.4
    • /
    • pp.47-58
    • /
    • 2009
  • Objectives: Several domestic search systems for research projects providing capabilities of searching and managing the research information based on metadata have been completed, although they cannot search projects for specific domains such as the Oriental Medicine field. Therefore, in this paper we propose an effective method for collecting and refining information of research projects in the oriental medicine field. We also design and implement a search management system based on the collected information. Methods: We chose three search elements and defined the collecting process for research projects. The collected information was refined to enhance the quality of results. Then, the search management system was implemented by Adobe Flex. Results: We were able to collect 1,688 research projects in the oriental medicine field. We also implemented the search management system, which provides the functionalities of search and management such as input, update, delete, spreadsheet import/export of R&D projects, user management and access control. Conclusions: The collected information and the search management system will be used in a project analysis system which will be constructed in the future. The project analysis system could help to analyze trends in oriental medicine research as well as construct a technical roadmap.

  • PDF

A Flow Analysis Framework for Traffic Video

  • Bai, Lu-Shuang;Xia, Ying;Lee, Sang-Chul
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.45-53
    • /
    • 2009
  • The fast progress on multimedia data acquisition technologies has enabled collecting vast amount of videos in real time. Although the amount of information gathered from these videos could be high in terms of quantity and quality, the use of the collected data is very limited typically by human-centric monitoring systems. In this paper, we propose a framework for analyzing long traffic video using series of content-based analyses tools. Our framework suggests a method to integrate theses analyses tools to extract highly informative features specific to a traffic video analysis. Our analytical framework provides (1) re-sampling tools for efficient and precise analysis, (2) foreground extraction methods for unbiased traffic flow analysis, (3) frame property analyses tools using variety of frame characteristics including brightness, entropy, Harris corners, and variance of traffic flow, and (4) a visualization tool that summarizes the entire video sequence and automatically highlight a collection of frames based on some metrics defined by semi-automated or fully automated techniques. Based on the proposed framework, we developed an automated traffic flow analysis system, and in our experiments, we show results from two example traffic videos taken from different monitoring angles.

  • PDF

Shunt Damping of HDD Disk-Spindle System Using Piezoelectric Bimorph (압전 바이모프를 이용한 HDD 디스크-스핀들 시스템의 션트 댐핑)

  • Lim S. C.;Choi S. B,;Park Y P.;Park N, C.
    • Transactions of the Society of Information Storage Systems
    • /
    • v.1 no.1
    • /
    • pp.84-92
    • /
    • 2005
  • This work presents the feasibility of shunt damping far vibration suppression of the rotating HDD disk-spindle system using piezoelectric bimorph. A target vibration mode which significantly restricts the recording density increment of the drive is determined through modal analysis and a piezoelectric bimorph is designed to suppress unwanted vibration. After deriving the two-dimensional generalized electromechanical coupling coefficient of the shunted drive, the shunt damping of the system is predicted by simulating the displacement transmissibility using the coefficient. In addition, optimal design process using sensitivity analysis is undertaken in order to improve the shunt damping of the system. The effectiveness of the proposed methodology is verified through experimental implementation by observing the vibration characteristics of the rotating disk-spindle system in frequency domain.

  • PDF

Performance analysis of the B-NT system using simulstor (시뮬레이터를 이용한 B-NT 시스템 성능분석)

  • 이규호;기장근;노승환;최진규;김재근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.6
    • /
    • pp.1503-1513
    • /
    • 1998
  • This paper is related to a performance analysis of B-NT system, which is essential compositional equipment of B-ISDN access network. A simulator enabling performance analysis according to the change of network configuration topology and the change of user traffic is developed in this study. The developed B-NT, system simulator consists of graphic user interface module, simulation program automatic generator module, and B-NT system model library module. As examples of the results of performance analysis using the simulator, end-to-end user cell transmission delay time, queueing delay time in each system, and cell loss rate in the head node switch are presented. The simulator developed in this paper can be utilized in determining the network topology of B-NT system.

  • PDF

Priority Demand Assessment for Overseas Construction Information Using Clustering Method (클러스터링 기법을 활용한 해외건설 필요정보 우선순위 수요 조사 평가)

  • Choi, Wonyoung;Kwak, Seing-Jin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.4
    • /
    • pp.57-68
    • /
    • 2018
  • In a situation when domestic construction market is expected to be stagnant, Overseas Information System for Construction Engineering (OVICE) is operated to support the construction SMEs that advance to the global market. In this study, we aimed to improve the quality of information service by providing direction of information provision, by comparing expert questionnaire with information system user statistics. For statistical analysis of information systems, to improve the efficiency of statistical analysis that is difficult to prioritize, K-means clustering is used for more efficient analysis. As a result, analyzing the difference between the survey results and the information system statistics, we were able to identify improvement point of information provision in the system and important contents that were not highlighted during the survey.

A Study of User′s Perspective and Satisfaction in National Assembly Library Electronic Library System (국회도서관 전자도서관시스템에 대한 이용자의 기대와 만족에 대한 연구)

  • Hong, Ki-Churl
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.2
    • /
    • pp.265-284
    • /
    • 2002
  • The purposes of this study are research for user's perspective and satisfaction, and analyze degree of difference in user's perspective and satisfaction through electronic library system of National Assembly Library. According to analysis of questionnaire, score of the factors that quantity of information, latest of information, quality of information, system of classification, accuracy of information are higher than average in user's perspective. Also score of the factors that speed of response, quality of information, consistency of information, consistency of retrieval, quantity of information, accuracy of information are higher than average in user's satisfaction. Result of analysis show that latest of information, quantity of information, variety of information, system of classification, accuracy of information are higher gap in user's perspective and satisfaction.

A Designing Method of Software Architecture for Information Security Business Model Selection using BMO Technique Base (BMO기법을 활용한 정보보안 비즈모델 평가시스템 소프트웨어 아키텍쳐 설계방법)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.71-77
    • /
    • 2013
  • In our country security industry biz model analysis methodology fragmentary theory exists, but it is hard to find a comprehensive analysis methodology. Biz model analysis IT companies the external factors and internal factors to integrate the information gathered about the comprehensive analysis of the development of an information system are required. Information support system early in the software architecture of the system design decisions early decision as the design, development, testing, maintenance, has a lasting impact on the project as a guideline in the development of a framework of design abstraction. BMO evaluation support information systems architecture designs system purposes. The mission must support the execution. Information system stakeholders to determine the mission and the environment. All information systems architecture shall have architecture. Technology architecture should be documented with each other can be used. Determine the architecture based architecture descriptions are presented.