• Title/Summary/Keyword: Pattern list

Search Result 158, Processing Time 0.023 seconds

A Study on the Measurement of Korean Hand - Focusing on Glove & Hand Dimension - (한국인을 위한 장갑 패턴 고찰 (1) - 업체 조사를 통한 손계측 항목을 중심으로 -)

  • Ryu, Kyoung-Ok
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.5
    • /
    • pp.866-877
    • /
    • 2009
  • The purpose of this study was to develop the dimension of hand pattern-making for Korean glove. The glove pattern-making has difficult problem in combination of anthropometric and engineering aspects. In addition, existing dimension data are not enough for glove pattern-making. Therefore, to develop the dimension for glove this study comprehensive list of candidate hand data was reviewed and the manufacturers(career over the 15 years) were interviewed on the method of glove. The result of comparing between the structures in hand and existing glove pattern, there draw deduction from follows. Pattern-making for glove need size of hand length, thumb length, index finger length, middle finger length, ring finger length, hand circumference, thumb-ring finger circumference and maximum hand thickness.

  • PDF

A Study of Authorized Stockage List Selection using Market Basket Analysis (장바구니 분석을 활용한 ASL 선정 연구)

  • Choi, Myoung-Jin
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.2
    • /
    • pp.163-172
    • /
    • 2012
  • In this study, It is assumed that customers are both usage unit of spare parts and stores of displaying and selling the goods that are installation unit of having the spare parts. The demand pattern through the effective order of spare parts and issue list in installation unit is investigated based on the assumption. Current ASL (Authorized Stockage List) selection of the army has been conducted in the way of using the analysis result of real usage experiences on spare parts used during the Korea War. For this study, ASL selection criteria and procedures based on army regulations and field manuals are specified. Since the traditional method does not presents the association analysis on spare parts used for the current equipment operating and does not have the clear criterion and analysis system about the ASL selection, in order to solve these problems, it was carried out that the association rule is employed for analyzing relationship between the effective order and issue list of the spare parts in point of the spare parts between usage unit and occurring month about purchase spare parts based on the star-schema table. Finally the new ASL selection way using the analysis result is proposed.

Development of a Food Exchange Table and Food Pattern for Nutritionally Balanced Menu Planning (영양균형식단 작성을 위한 식품교환표와 식사구성안 개발)

  • Ahn, Yun;Yeo, Ikhyun;Lee, Sangyun;Nam, Kisun
    • Korean Journal of Community Nutrition
    • /
    • v.23 no.5
    • /
    • pp.411-423
    • /
    • 2018
  • Objectives: The purpose of this study was to develop new meal planning tools for a nutritionally balanced diet. Methods: Based on the food exchange list for diabetes, we adjusted the food group classification system to reflect the suggested nutritional factors for chronic disease prevention and health promotion. We developed a nutritionally balanced dietary profile for adults and compared it with the dietary reference intakes for Koreans (KDRIs) and the food pattern recommended by the Korean Diabetes Association. Results: The newly developed menu planning tools are the LOHAS food exchange table and the LOHAS food pattern. Our recommended daily 1,800 kcal dietary composition for adults is as follows: The carbohydrate food group consists of 4 'whole grains', 3 'refined grains', 2 'sugars', 9 'vegetables', 3 'starchy vegetables', 2 'fruits' and 1 'high sugar fruits'. The protein food group includes 3 'plant protein foods', 3 'animal protein foods (low-fat)', and 1 'animal protein foods (high-fat)'. The fat food group consists of 2 'oils and nuts' and 1 'solid fats'. The total number of calories is estimated at 1,840 kcal and the energy ratio is 62% carbohydrate, 18% protein, 20% fat, 6.8% saturated fat and 13.2% sugars. Using the LOHAS food exchange table, it is possible to estimate values of saturated fat, unsaturated fat, dietary fiber, and sugars besides carbohydrate, protein and fat. It is also possible to compose a dietary design considering carbohydrate, sugars, saturated fat and dietary fiber. The LOHAS food pattern provides benefits for the management of both institutional food services and individual meals, as it can help reduce the levels of saturated fat and sugar intake and help develop healthy meals rich in unsaturated fats and dietary fiber. Conclusions: The LOHAS food exchange table and LOHAS food pattern are expected to be practical tools for designing and evaluating nutritionally balanced diets.

A Study on the Pattern-making for Korean Glove - Focusing on Pattern-making for Glove - (한국인을 위한 장갑 패턴 고찰 (2) - 장갑 원형 설계를 중심으로 -)

  • Ryu, Kyoung-Ok
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.6
    • /
    • pp.981-991
    • /
    • 2009
  • The purpose of this study was to develop the pattern-making for Korean glove. To develop the pattern-making for glove this study comprehensive list of candidate hand data was reviewed and the manufacturers(career over th 15 years) were interviewed on the method of glove. The results of regression analysis(hand data) were as follows (unit: cm): wrist thumb tip length = middle finger length + 3.22, hand bread = 1.25 $\times$ middle finger length + 2.18, middle finger breadth at dist = 0.23 $\times$ index finger circumference + 0.4, maximum hand circumference = 3.15 $\times$ index finger circumference + 4.13, middle finger circumference = 0.91 $\times$ index finger circumference + 0.47, maximum hand thickness = 0.69 $\times$ index finger circumference -0.02. Hand measurements for glove pattern-making were developed: There were palmar hand length, hand circumference, index finger circumference and middle finger length.

  • PDF

A Call Recommendation Algorithm Design and Verification with ESM (통화 상대 추천 알고리즘 디자인 및 ESM을 통한 평가)

  • Lee, Seung-Hwan;Seo, Jung-Suk;Lee, Gee-Hyuk
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.357-362
    • /
    • 2009
  • We propose a method to recommend most likely people to call based on call log of mobile phone user. Call logs of an user can reflect calling pattern of the user include regular calling behavior. When user got a list of people to call with a click of 'send' button on the phone, the time and effort to search a person with several typing or to select a person from the list can be definitely reduced. This paper presents the design process of an algorithm to find most likely people to call at a certain moment and the verification process with recorded call log and Experience Sampling Method(ESM) on mobile phone.

  • PDF

HAS-Analyzer: Detecting HTTP-based C&C based on the Analysis of HTTP Activity Sets

  • Kim, Sung-Jin;Lee, Sungryoul;Bae, Byungchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1801-1816
    • /
    • 2014
  • Because HTTP-related ports are allowed through firewalls, they are an obvious point for launching cyber attacks. In particular, malware uses HTTP protocols to communicate with their master servers. We call this an HTTP-based command and control (C&C) server. Most previous studies concentrated on the behavioral pattern of C&Cs. However, these approaches need a well-defined white list to reduce the false positive rate because there are many benign applications, such as automatic update checks and web refreshes, that have a periodic access pattern. In this paper, we focus on finding new discriminative features of HTTP-based C&Cs by analyzing HTTP activity sets. First, a C&C shows a few connections at a time (low density). Second, the content of a request or a response is changed frequently among consecutive C&Cs (high content variability). Based on these two features, we propose a novel C&C analysis mechanism that detects the HTTP-based C&C. The HAS-Analyzer can classify the HTTP-based C&C with an accuracy of more than 96% and a false positive rate of 1.3% without using any white list.

Effective Internal Pattern Expression Using 3D Vector Data (3D 벡터 데이터를 이용한 효과적인 내부문양 표현)

  • Park, Sung-Jun;Cho, Jin-Soo;WhangBo, Taeg-Keun
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.645-646
    • /
    • 2008
  • Silhouette extraction is widely used in many computer graphics applications. In this paper, we proposed a method for extracting 3D silhouette and internal pattern from 3D vector data. To do this, we first make an edge-list, secondly define the silhouette, and finally remove hidden lines. After getting the silhouette, we extract internal pattern using adjacent edge's dihedral. The proposed method not only effectively improves the performance of extracting 3D silhouette and internal pattern from 3D vector data but also reduces the computational complexity.

  • PDF

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

A Query Expansion Technique using Query Patterns in QA systems (QA 시스템에서 질의 패턴을 이용한 질의 확장 기법)

  • Kim, Hea-Jung;Bu, Ki-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2007
  • When confronted with a query, question answering systems endeavor to extract the most exact answers possible by determining the answer type that fits with the key terms used in the query. However, the efficacy of such systems is limited by the fact that the terms used in a query may be in a syntactic form different to that of the same words in a document. In this paper, we present an efficient semantic query expansion methodology based on query patterns in a question category concept list comprised of terms that are semantically close to terms used in a query. The proposed system first constructs a concept list for each question type and then builds the concept list for each question category using a learning algorithm. The results of the present experiments suggest the promise of the proposed method.

  • PDF

Location Area List Generation for Profile Based Location Management in Cellular Networks (셀룰러 망에서 프로파일 기반 위치관리를 위한 위치영역 리스트 생성)

  • Cho, Hyunjoon
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.6
    • /
    • pp.123-132
    • /
    • 2005
  • There are many research results for the location update cost minimization of location management in cellular networks. For minimizing the location update cost, we have to take in consideration of each users' mobility pattern. This paper suggests location area list generation and a 3-step paging method based on users' movement history with the users' profiles. Users' mobility has not only geographical regular patterns but also time-related regularity. So, the method extracts users' movement regularities in both geography and time from their movement history, and generate location area list considering the regularities. For the performance analysis of the suggested method, we have executed a simulation for suggested method with user's mobility model. The results of the simulation show that suggested algorithm has some merits in the location management cost.

  • PDF