• Title/Summary/Keyword: Pattern mining

Search Result 624, Processing Time 0.026 seconds

Numerical simulation and experimental investigation of the shear mechanical behaviors of non-persistent joint in new shear test condition

  • Wang, Dandan;Zhang, Guang;Sarfarazi, Vahab;Haeri, Hadi;Naderi, A.A.
    • Computers and Concrete
    • /
    • v.26 no.3
    • /
    • pp.239-255
    • /
    • 2020
  • Experimental and discrete element method were used to investigate the effects of joint number and its angularities on the shear behaviour of joint's bridge area. A new shear test condition was used to model the gypsum cracks under shear loading. Gypsum samples with dimension of 120 mm×100 mm×50 mm were prepared. the length of joints was 2cm. in experimental tests, the joint number is 1, 2 and 3 and its angularities change from 0° to 90° with increment of 45°. Assuming a plane strain condition, special rectangular models are prepared with dimension of 120 mm×100 mm. similar to joints configuration in experimental test, 9 models with different joint number and joint angularities were prepared. This testing show that the failure process is mostly governed by the joint number and joint angularities. The shear strengths of the specimens are related to the fracture pattern and failure mechanism of the discontinuities. The shear behaviour of discontinuities is related to the number of induced tensile cracks which are increased by increasing the rock bridge length. The strength of samples decreases by increasing the joint number and joint angularities. Failure pattern and failure strength are similar in both of the experimental test and numerical simulation.

A Study on Efficient Stock Arrangement of Distribution Center Using MBA Analysis and Simulation in Retail Business (유통업에서 MBA분석과 시뮬레이션을 이용한 물류센타 재고배치 효율화에 관한 연구)

  • Yeo, Sung-Joo;Seong, Kil-Young;Wang, Gi-Nam
    • IE interfaces
    • /
    • v.22 no.3
    • /
    • pp.234-242
    • /
    • 2009
  • It is most important for distribution center in retail business to delivery commodities in a timely manner. Accordingly, many companies try to make distribution center effective using the Warehouse Management System(WMS) integrated legacy system. Also, the Customer Relationship Management(CRM) is the most typical paradigm in management lately. Even though the WMS and CRM are independent system of each other, WMS, coupled with CRM makes customer satisfied more effectively. In this paper, we proposed the methodology for inventory location after analyzing and applying customer buying pattern data in the CRM through the MBA(Market Basket Analysis), which is part of data mining. We used an example modeling a real distribution center in retail through a 3D simulation tool and examined correlation between commodities using customer buying pattern. After that, we applied it to the inventory location system through the MBA in an example. Finally, we identified decrease in the time for picking, which is the majority of distribution center. Besides, we proposed a simulation methodology before applying new methodology. Consequently, it removes potential errors in advance and makes a optimized inventory location system.

The effect of particle size on the edge notched disk (END) using particle flow code in three dimension

  • Haeri, Hadi;Sarfarazi, Vahab;Zhu, Zheming;Marji, Mohammad Fatehi
    • Smart Structures and Systems
    • /
    • v.22 no.6
    • /
    • pp.663-673
    • /
    • 2018
  • In this study, the effect of particle size on the cracks propagation and coalescence or cracking pattern of the edge notched disc specimens are investigated. Firstly, calibration of PFC3D was performed using Brazilian experimental test output. Then micro parameters were used to build edge notched disc specimen. The horizontal wall of the assembly is let to move downward with a standard low speed of 0.016 m/s. The numerical results show that the tensile cracks are dominant failure pattern for the modeled discs. These tensile cracks initiate from the pre-existing notch tip and propagate parallel to the loading direction then interact with the upper boundary of the modeled specimen. As the size of the balls (ball diameter) decrease the number of tensile cracks increase. The tensile fracture toughness of the samples also decreases as the particle size increases. Understanding the crack propagation and crack coalescence phenomena in brittle materials such as concretes and rocks is of paramount importance in the stability analyses for engineering structures such as rock slopes, underground structures and tunneling.

Utilization Pattern Analysis of an Enterprise Information System using Event Log Data (로그 데이터를 이용한 기업 정보 시스템의 사용 패턴 분석)

  • Han, Kwan Hee
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.723-732
    • /
    • 2022
  • The success of enterprise information system(EIS) is crucial to align with corporate strategies and eventually attain corporate goals. Since one of the factors to information system success is system use, managerial efforts to measure the level of EIS utilization is vital. In this paper, the EIS utilization level is analyzed using system access log data. In particular, process sequence patterns and clustering of similar functions are identified in more detail based on a process mining method, in addition to basic access log statistics. The result of this research can be used to improve existing information system design by finding real IS usage sequences and function clusters.

An Efficient Candidate Pattern Tree Structure and Algorithm for Incremental Web Mining (점진적인 웹 마이닝을 위한 효율적인 후보패턴 저장 트리구조 및 알고리즘)

  • Kang, Hee-Seong;Park, Byung-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.1
    • /
    • pp.71-79
    • /
    • 2007
  • Recent advances in the internet infrastructure have resulted in a large number of huge Web sites and portals worldwide. These Web sites are being visited by various types of users in many different ways. Among all the web page access sequences from different users, some of them occur so frequently that may need an attention from those who are interested. We call them frequent access patterns and access sequences that can be frequent the candidate patterns. Since these candidate patterns play an important role in the incremental Web mining, it is important to efficiently generate, add, delete, and search for them. This thesis presents a novel tree structure that can efficiently store the candidate patterns and a related set of algorithms for generating the tree structure, adding new patterns, deleting unnecessary patterns, and searching for the needed ones. The proposed tree structure has a kind of the 3 dimensional link structure and its nodes are layered.

Technique for Indentifying Cyber Crime Using Clue (수사단서를 이용한 동일 사이버범죄 판단기법)

  • Kim, Ju Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.767-780
    • /
    • 2015
  • In recent years, as smart phone penetration rate is growing explosively, new forms of cyber crime data is poured out beyond the limits of management system for cyber crime investigation. These new forms of data are collected and stored in police station but, some of data are not systematically managed. As a result, investigators sometimes miss the hidden data which can be critical for a case. Crime data is usually generated by computer which produces complex and huge data and records many logs automatically, so it is necessary to simplify a collected data and cluster by crime pattern. In this paper, we categorize all kinds of cyber crime and simplify crime database and extract critical clues relative to other cases. Through data mining and network-visualization, we found there is correlation between clues of a case. From this result, we conclude cyber crime data mining helps crime prevention, early blocking and increasing the efficiency of the investigation.

Performance Evaluation of the FP-tree and the DHP Algorithms for Association Rule Mining (FP-tree와 DHP 연관 규칙 탐사 알고리즘의 실험적 성능 비교)

  • Lee, Hyung-Bong;Kim, Jin-Ho
    • Journal of KIISE:Databases
    • /
    • v.35 no.3
    • /
    • pp.199-207
    • /
    • 2008
  • The FP-tree(Frequency Pattern Tree) mining association rules algorithm was proposed to improve mining performance by reducing DB scan overhead dramatically, and it is recognized that the performance of it is better than that of any other algorithms based on different approaches. But the FP-tree algorithm needs a few more memory because it has to store all transactions including frequent itemsets of the DB. This paper implements a FP-tree algorithm on a general purpose UNK system and compares it with the DHP(Direct Hashing and Pruning) algorithm which uses hash tree and direct hash table from the point of memory usage and execution time. The results show surprisingly that the FP-tree algorithm is poor than the DHP algorithm in some cases even if the system memory is sufficient for the FP-tree. The characteristics of the test data are as follows. The site of DB is look, the number of total items is $1K{\sim}7K$, avenrage length of transactions is $5{\sim}10$, avergage size of maximal frequent itemsets is $2{\sim}12$(these are typical attributes of data for large-scale convenience stores).

Sequential Pattern Mining Algorithms with Quantities (정량 정보를 포함한 순차 패턴 마이닝 알고리즘)

  • Kim, Chul-Yun;Lim, Jong-Hwa;Ng Raymond T.;Shim Kyu-Seok
    • Journal of KIISE:Databases
    • /
    • v.33 no.5
    • /
    • pp.453-462
    • /
    • 2006
  • Discovering sequential patterns is an important problem for many applications. Existing algorithms find sequential patterns in the sense that only items are included in the patterns. However, for many applications, such as business and scientific applications, quantitative attributes are often recorded in the data, which are ignored by existing algorithms but can provide useful insight to the users. In this paper, we consider the problem of mining sequential patterns with quantities. We demonstrate that naive extensions to existing algorithms for sequential patterns are inefficient, as they may enumerate the search space blindly. Thus, we propose hash filtering and quantity sampling techniques that significantly improve the performance of the naive extensions. Experimental results confirm that compared with the naive extensions, these schemes not only improve the execution time substantially but also show better scalability for sequential patterns with quantities.

A Structural Analysis of Acupuncture & Moxibustion Points in the NaeGyeong Chapter of DongUiBoGam Using Text Mining (텍스트마이닝을 이용한 동의보감의 질병인식방식과 내경편 침구법 경혈 특성 분석)

  • Lee, Taehyung;Jung, Won-Mo;Lee, In-Seon;Lee, Hyejung;Kim, Namil;Chae, Younbyoung
    • Korean Journal of Acupuncture
    • /
    • v.30 no.4
    • /
    • pp.230-242
    • /
    • 2013
  • Objectives : DongUiBoGam is a representative medical literature in Korea. This research intends to structurally grasp how DongUiBoGam understands the human body and review the methods of acupuncture and moxibustion in the NaeGyeong chapter of it using text mining. Methods : The structure of DongUiBoGam was analyzed with specific parts of the book that described contents, major premises of understanding the human body, and processes of treatment. We analyzed characteristics of each acupoints in a relationship with causes of diseases & symptoms in the NaeGyeong chapter using a Term Frequency - Inverse Document Frequency(TFIDF). Results : Three different categories of pattern identification(PI) were formed after structural analysis of DongUiBoGam. Every causes of diseases & symptoms were transformed according to the three categories of PI. After analyzing the relationship between acupoints and causes of diseases & symptoms, 114 acupoints were visualized with TFIDF values of three PI categories. Conclusions : The selection of acupoints in NaeGyeong chapter of DongUiBoGam were linked to causes of diseases & symptoms based on the three PI categories. Through visualization of bipartite relationships between acupoints and causes of diseases & symptoms, we could easily understand characteristics of each acupoint.

Study of tensile behavior of Y shape non-persistent joint using experimental test and numerical simulation

  • Sarfarazi, V.;Hajiloo, M.;Ghalam, E. Zarrin;Ebneabbasi, P.
    • Computers and Concrete
    • /
    • v.26 no.6
    • /
    • pp.565-576
    • /
    • 2020
  • Experimental and discrete element methods were used to investigate the effects of angle of Y shape non-persistent joint on the tensile behaviour of joint's bridge area under brazilian test. concrete samples with diameter of 100 mm and thikness of 40 mm were prepared. Within the specimen, two Y shape non-persistent notches were provided. The large notch lengths were 6 cm, 4 cm and 2 cm. the small notch lengths were 3 cm, 2 cm and 1 cm. The angle of larger notch related to horizontal axis was 0°, 30°, 60°, 90°. Totally, 12 different configuration systems were prepared for Y shape non-persistent joints. Also, 18 models with different Y shape non-persistent notch angle and notch length were prepared in numerical model. The large notch lengths were 6 cm, 4 cm and 2 cm. the small notch lengths were 3 cm, 2 cm and 1 cm. The angle of larger notch related to horizontal axis was 0, 30, 60, 90, 120 and 150. Tensile strength of model materil was 1 MPa. The axial load was applied to the model by rate of 0.02 mm/sec. This testing showed that the failure process was mostly governed by the Y shape non-persistent joint angle and joint length. The tensile strengths of the specimens were related to the fracture pattern and failure mechanism of the discontinuities. It was shown that the tensile behaviour of discontinuities is related to the number of the induced tensile cracks which are increased by increasing the joint length and joint angle. The minimum tensile strength occurs when the angle of larger joint related to horizontal axis was 60°. Also, the maximum compressive strength occurs when the angle of larger joint related to horizontal axis was 90°. The tensile strength was decreased by increasing the notch length. The failure pattern and failure strength are similar in both methods i.e. the experimental testing and the numerical simulation methods.