• Title/Summary/Keyword: Profiling Model

Search Result 149, Processing Time 0.026 seconds

A Wide-Window Superscalar Microprocessor Profiling Performance Model Using Multiple Branch Prediction (대형 윈도우에서 다중 분기 예측법을 이용하는 수퍼스칼라 프로세서의 프로화일링 성능 모델)

  • Lee, Jong-Bok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.7
    • /
    • pp.1443-1449
    • /
    • 2009
  • This paper presents a profiling model of a wide-window superscalar microprocessor using multiple branch prediction. The key idea is to apply statistical profiling technique to the superscalar microprocessor with a wide instruction window and a multiple branch predictor. The statistical profiling data are used to obtain a synthetical instruction trace, and the consecutive multiple branch prediction rates are utilized for running trace-driven simulation on the synthesized instruction trace. We describe our design and evaluate it with the SPEC 2000 integer benchmarks. Our performance model can achieve accuracy of 8.5 % on the average.

Design of an Effective Deep Learning-Based Non-Profiling Side-Channel Analysis Model (효과적인 딥러닝 기반 비프로파일링 부채널 분석 모델 설계방안)

  • Han, JaeSeung;Sim, Bo-Yeon;Lim, Han-Seop;Kim, Ju-Hwan;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1291-1300
    • /
    • 2020
  • Recently, a deep learning-based non-profiling side-channel analysis was proposed. The deep learning-based non-profiling analysis is a technique that trains a neural network model for all guessed keys and then finds the correct secret key through the difference in the training metrics. As the performance of non-profiling analysis varies greatly depending on the neural network training model design, a correct model design criterion is required. This paper describes the two types of loss functions and eight labeling methods used in the training model design. It predicts the analysis performance of each labeling method in terms of non-profiling analysis and power consumption model. Considering the characteristics of non-profiling analysis and the HW (Hamming Weight) power consumption model is assumed, we predict that the learning model applying the HW label without One-hot encoding and the Correlation Optimization (CO) loss will have the best analysis performance. And we performed actual analysis on three data sets that are Subbytes operation part of AES-128 1 round. We verified our prediction by non-profiling analyzing two data sets with a total 16 of MLP-based model, which we describe.

Customer Behavior Based Customer Profiling Technique for Personalized Products Recommendation (개인화된 제품 추천을 위한 고객 행동 기반 고객 프로파일링 기법)

  • Park, You-Jin;Jung, Eau-Jin;Chang, Kun-Nyeong
    • Korean Management Science Review
    • /
    • v.23 no.3
    • /
    • pp.183-194
    • /
    • 2006
  • In this paper, we propose a customer profiling technique based on customer behavior for personalized products recommendation in Internet shopping mall. The proposed technique defines customer profile model based on customer behavior Information such as click data, buying data, market basket data, and interest categories. We also implement CBCPT(customer behavior based customer profiling technique) and perform extensive experiments. The experimental results show that CBCPT has higher MAE, precision, recall, and F1 than the existing other customer profiling technique.

Designing SMS Phishing Profiling Model (스미싱 범죄 프로파일링 모델 설계)

  • Jeong, Youngho;Lee, Kukheon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.293-302
    • /
    • 2015
  • With the attack information collected during SMS phishing investigation, this paper will propose SMS phishing profiling model applying criminal profiling. Law enforcement agencies have used signature analysis by apk file hash and analysis of C&C IP address inserted in the malware. However, recently law enforcement agencies are facing the challenges such as signature diversification or code obfuscation. In order to overcome these problems, this paper examined 169 criminal cases and found out that 89% of serial number in cert.rsa and 80% of permission file was reused in different cases. Therefore, the proposed SMS phishing profiling model is mainly based on signature serial number and permission file hash. In addition, this model complements the conventional file hash clustering method and uses code similarity verification to ensure reliability.

Genomic approaches for the understanding of aging in model organisms

  • Park, Sang-Kyu
    • BMB Reports
    • /
    • v.44 no.5
    • /
    • pp.291-297
    • /
    • 2011
  • Aging is one of the most complicated biological processes in all species. A number of different model organisms from yeast to monkeys have been studied to understand the aging process. Until recently, many different age-related genes and age-regulating cellular pathways, such as insulin/IGF-1-like signal, mitochondrial dysfunction, Sir2 pathway, have been identified through classical genetic studies. Parallel to genetic approaches, genome-wide approaches have provided valuable insights for the understanding of molecular mechanisms occurring during aging. Gene expression profiling analysis can measure the transcriptional alteration of multiple genes in a genome simultaneously and is widely used to elucidate the mechanisms of complex biological pathways. Here, current global gene expression profiling studies on normal aging and age-related genetic/environmental interventions in widely-used model organisms are briefly reviewed.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

Static and Dynamic Analysis of Efficiency of Korean Regional Public Hospitals (지방의료원의 효율성에 대한 정태적 및 동태적 분석)

  • Kim, Jong-Ki;Jeon, Jinh-Wan
    • Korea Journal of Hospital Management
    • /
    • v.15 no.1
    • /
    • pp.27-48
    • /
    • 2010
  • The purpose of this paper is to analyze the efficiency change and its determinants of the regional public hospitals. We utilize 34 regional public hospital's panel data for 6 years from 2003 to 2008. We use DEA(Data Envelopment Analysis)-CCR, BCC model, DEA/Window model, and DEA Profiling. The empirical results show the following findings. First, technical efficiency shows that approximately 3.6% of inefficiency exists on the regional public hospitals and it reveals that the cause for technical inefficiency is due to scale inefficiency. Second, DEA/Window results show that the stable dissimilarity by standard deviation, LDP of CCR. Third, the results of partial efficiency by DEA Profiling show that increase efficiency depends on the number of beds, doctors, and nurses.

  • PDF

An Empirical Study of Profiling Model for the SMEs with High Demand for Standards Using Data Mining (데이터마이닝을 이용한 표준정책 수요 중소기업의 프로파일링 연구: R&D 동기와 사업화 지원 정책을 중심으로)

  • Jun, Seung-pyo;Jung, JaeOong;Choi, San
    • Journal of Korea Technology Innovation Society
    • /
    • v.19 no.3
    • /
    • pp.511-544
    • /
    • 2016
  • Standards boost technological innovation by promoting information sharing, compatibility, stability and quality. Identifying groups of companies that particularly benefit from these functions of standards in their technological innovation and commercialization helps to customize planning and implementation of standards-related policies for demand groups. For this purpose, this study engages in profiling of SMEs whose R&D objective is to respond to standards as well as those who need to implement standards system for technological commercialization. Then it suggests a prediction model that can distinguish such companies from others. To this end, decision tree analysis is conducted for profiling of characteristics of subject SMEs through data mining. Subject SMEs include (1) those that engage in R&D to respond to standards (Group1) or (2) those in need of product standard or technological certification policies for commercialization purposes (Group 2). Then the study proposes a prediction model that can distinguish Groups 1 and 2 from others based on several variables by adopting discriminant analysis. The practicality of discriminant formula is statistically verified. The study suggests that Group 1 companies are distinguished in variables such as time spent on R&D planning, KoreanStandardIndustryClassification (KSIC) category, number of employees and novelty of technologies. Profiling result of Group 2 companies suggests that they are differentiated in variables such as KSIC category, major clients of the companies, time spent on R&D and ability to test and verify their technologies. The prediction model proposed herein is designed based on the outcomes of profiling and discriminant analysis. Its purpose is to serve in the planning or implementation processes of standards-related policies through providing objective information on companies in need of relevant support and thereby to enhance overall success rate of standards-related projects.

A Study on Empirical Model for the Prevention and Protection of Technology Leakage through SME Profiling Analysis (중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구)

  • Yoo, In-Jin;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.171-191
    • /
    • 2018
  • Purpose Corporate technology leakage is not only monetary loss, but also has a negative impact on the corporate image and further deteriorates sustainable growth. In particular, since SMEs are highly dependent on core technologies compared to large corporations, loss of technology leakage threatens corporate survival. Therefore, it is important for SMEs to "prevent and protect technology leakage". With the recent development of data analysis technology and the opening of public data, it has become possible to discover and proactively detect companies with a high probability of technology leakage based on actual company data. In this study, we try to construct profiles of enterprises with and without technology leakage experience through profiling analysis using data mining techniques. Furthermore, based on this, we propose a classification model that distinguishes companies that are likely to leak technology. Design/methodology/approach This study tries to develop the empirical model for prevention and protection of technology leakage through profiling method which analyzes each SME from the viewpoint of individual. Based on the previous research, we tried to classify many characteristics of SMEs into six categories and to identify the factors influencing the technology leakage of SMEs from the enterprise point of view. Specifically, we divided the 29 SME characteristics into the following six categories: 'firm characteristics', 'organizational characteristics', 'technical characteristics', 'relational characteristics', 'financial characteristics', and 'enterprise core competencies'. Each characteristic was extracted from the questionnaire data of 'Survey of Small and Medium Enterprises Technology' carried out annually by the Government of the Republic of Korea. Since the number of SMEs with experience of technology leakage in questionnaire data was significantly smaller than the other, we made a 1: 1 correspondence with each sample through mixed sampling. We conducted profiling of companies with and without technology leakage experience using decision-tree technique for research data, and derived meaningful variables that can distinguish the two. Then, empirical model for prevention and protection of technology leakage was developed through discriminant analysis and logistic regression analysis. Findings Profiling analysis shows that technology novelty, enterprise technology group, number of intellectual property registrations, product life cycle, technology development infrastructure level(absence of dedicated organization), enterprise core competency(design) and enterprise core competency(process design) help us find SME's technology leakage. We developed the two empirical model for prevention and protection of technology leakage in SMEs using discriminant analysis and logistic regression analysis, and each hit ratio is 65%(discriminant analysis) and 67%(logistic regression analysis).

The Effect of Investigators' Perception of the Importance of Investigative Elements on Their Intention to Use Profiling: Mediating Effect of Attitude toward Profiling (수사관의 수사요소 중요도 인식이 프로파일링 활용 의도에 미치는 영향: 프로파일링에 대한 태도의 매개효과)

  • Shin, Sangwha;Yoon, Sangyeon
    • Korean Journal of Forensic Psychology
    • /
    • v.13 no.1
    • /
    • pp.75-97
    • /
    • 2022
  • Profiling is recognized as a representative application area of domestic criminal psychology, and the National Police Agency profiler is firmly established as a profession. However, compared to the social awareness, the recognition and utilization within the police is not high. In this study, we tried to identify factors affecting the intention to use profiling by identifying the perception of investigators who request and use profiling from a profiler when a violent incident occurs. To this end, the relationship between the perception of the importance of factors considered by investigators in the criminal investigation process and the attitude toward profiling on the intention to use profiling was verified through the path model. As a result of a survey of 340 police investigators, the investigator's perception of the importance of investigation elements was divided into two factors: the importance of normative investigative elements (evidence collection and legal judgment, etc.) and factual investigative elements (criminal analysis, criminal information system analysis, etc.). Among them, the importance of factual investigative elements were found to have a positive effect on the intention to use it by mediating the attitude toward profiling. On the other hand, in the case of the importance of normative investigative elements, it was found to have a negative effect on the attitude toward profiling. These results suggest that the perception that investigators have about investigation, which is their main work area, plays a role in determining whether to request profiling as well as attitude towards profiling. Based on the research results, strategies necessary to activate the use of profiling were discussed.