• Title/Summary/Keyword: Rule File

Search Result 45, Processing Time 0.023 seconds

A rule based file management tool for facility log files integration in disaster environments

  • Lee, Young-Geol;Lee, Younlae;Kim, Hyunah;Jang, Yeonyi;Park, Minjae
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.73-82
    • /
    • 2018
  • We often experience complex presence of files within the compute environment. It could be an end-user's desktop environment or a professional part of file management. We would like to suggest one way to manage these different cases of duplicate files. It is a rule-based file management tool, and we want to use it as a tool to consolidate facility management log files. In this paper, we will describe the rule-based file management tools and show examples of how files are managed using them. We are interested in the management of the disaster environment and would like to apply this method to the management of log data related to facilities to be considered in the event of a disaster.

Rule based CAD/CAM integration for turning (Rule base방법에 의한 선반가공의 CAD/CAM integration)

  • 임종혁;박지형;이교일
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.290-295
    • /
    • 1989
  • This paper proposes a Expert CAPP System for integrating CAD/CAM of rotational work-part by rule based approach. The CAD/CAPP integration is performed by the recognition of machined features from the 2-D CAD data (IGES) file. Selecting functions of the process planning are performed in modularized rule base by forward chaining inference, and operation sequences are determined by means of heuristic search algorithm. For CAPP/CAM integration, post-processor generates NC code from route sheet file. This system coded in OPS5 and C language on PC/AT, and EMCO CNC lathe interfaced with PC through DNC and RS-232C.

  • PDF

A study on 3D data exchange between IGES and STL format (IGES와 SRL format 사이의 3차원 정보교고한에 관한 연구)

  • 오도근;최홍태;이석희
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.10a
    • /
    • pp.965-969
    • /
    • 1995
  • This paper deals with effective using the IGES file for flexible data exchange among the other CAD/CAM system. If a data exchange between STL file and the neutral IGES file in Stereolithography system is available, a product design becomes more flexible. THere can be many restrictions and difficulties intranslating these data. First, an STL file follows two rules, such as right-hand rule, and vertex-to-vertex rule, thus requires a structural verification. Second, translation should be performed with minmal errors. It becomes very important to translate IGES file of limited kinds of entities fot the purpose of geometric information into STL file with minor data manipulation. The developed system suggests a good approach of translating the sampled B-spline surface of IGES and shows a potential linkage between IGES and STL format file.

  • PDF

A Study on the Importer Security Filing and Additional Carrier Requirements(10+2 rule) in U.S. (미국 관세청의 선적전 추가 보안관련 정보 제출법안(10+2 Rule)에 관한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.395-416
    • /
    • 2008
  • The advance information for oceangoing cargoes destined to th United States enable CBP to evaluate the potential risk of smuggling WMD and to facilitate the prompt release of legitimate cargo following its arrival in the Unites States. On January 1, 2008, CBP promulgate regulations, also known as 10+2 rule, to require the electronic transmission of additional data elements for improved high-risk targeting, including appropriate security elements of entry data for cargo destined to the United States by vessel prior to loading of such cargo on vessels at foreign seaports. The potential impact to an importer's international supply chain will be as follows ; Firstly, importers will take incremental supply chain costs and filing costs. Secondly, anticipate delay in shipment of containerized cargo. Thirdly, importers could be charged fines if they fail to file and file inaccurate or missing data. Companies exporting to the United States should be interested in 10+2 rule, analyze their current processes and procedures to ensure that they are prepared to handle the additional filing requirements of 10+2 rule. And they should focus on how 10+2 impacts their supply chain in terms of costs and sourcing. They will be necessary to revise service legal agreements with their forwarders, customs brokers or carriers in order to meet filing requirements of 10+2 rule.

  • PDF

A Study on the Data Fusion Method using Decision Rule for Data Enrichment (의사결정 규칙을 이용한 데이터 통합에 관한 연구)

  • Kim S.Y.;Chung S.S.
    • The Korean Journal of Applied Statistics
    • /
    • v.19 no.2
    • /
    • pp.291-303
    • /
    • 2006
  • Data mining is the work to extract information from existing data file. So, the one of best important thing in data mining process is the quality of data to be used. In this thesis, we propose the data fusion technique using decision rule for data enrichment that one phase to improve data quality in KDD process. Simulations were performed to compare the proposed data fusion technique with the existing techniques. As a result, our data fusion technique using decision rule is characterized with low MSE or misclassification rate in fusion variables.

A Study on the Operation and Personal Information Management of Public and Private Kindergarten Homepages (공·사립 유치원 홈페이지의 운영 및 개인정보 관리 실태 연구)

  • Kim, Jong Min;Chun, Hui Young;Choi, Eun A
    • Korean Journal of Child Studies
    • /
    • v.37 no.6
    • /
    • pp.119-132
    • /
    • 2016
  • Objective: The purpose of this study was to analyze the operation and personal information management of public and private kindergarten homepages. Methods: A total of 2,846 kindergartens were selected from the I-Sarang portal service for analyzing operation, and 217 self-operating homepages were selected for evaluating management. Seven evaluation items from three domains (information gathering procedures and scope, information security, and management of file exposure protection) were used. Wireshark and Google were used for analyzing some evaluation items. Results: The operating ratio of kindergarten homepages was low and most of the kindergartens self-operated their homepages. The evaluation of the information gathering procedures and scope showed that the rule of consent process was not rigidly followed but that the rule of legality for information gathering was followed. Items related to information security were followed at very low levels. As for the management of file exposure protection, the evaluation of items related to the prevention of attachment disclosure showed that the rule of protecting personal information included in an attached file was followed but that the notice regarding information protection was not. Across all evaluation items, the level of personal information management was higher in public (vs. private) kindergartens. Conclusion: These results indicate methods to more securely and effectively manage personal information on kindergarten homepages.

Detection of Malicious Code using Association Rule Mining and Naive Bayes classification (연관규칙 마이닝과 나이브베이즈 분류를 이용한 악성코드 탐지)

  • Ju, Yeongji;Kim, Byeongsik;Shin, Juhyun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1759-1767
    • /
    • 2017
  • Although Open API has been invigorated by advancements in the software industry, diverse types of malicious code have also increased. Thus, many studies have been carried out to discriminate the behaviors of malicious code based on API data, and to determine whether malicious code is included in a specific executable file. Existing methods detect malicious code by analyzing signature data, which requires a long time to detect mutated malicious code and has a high false detection rate. Accordingly, in this paper, we propose a method that analyzes and detects malicious code using association rule mining and an Naive Bayes classification. The proposed method reduces the false detection rate by mining the rules of malicious and normal code APIs in the PE file and grouping patterns using the DHP(Direct Hashing and Pruning) algorithm, and classifies malicious and normal files using the Naive Bayes.

Analysis of Network Traffic using Classification and Association Rule (데이터 마이닝의 분류화와 연관 규칙을 이용한 네트워크 트래픽 분석)

  • 이창언;김응모
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.4
    • /
    • pp.15-23
    • /
    • 2002
  • As recently the network environment and application services have been more complex and diverse, there has. In this paper we introduce a scheme the extract useful information for network management by analyzing traffic data in user login file. For this purpose we use classification and association rule based on episode concept in data mining. Since login data has inherently time series characterization, convertible data mining algorithms cannot directly applied. We generate virtual transaction, classify transactions above threshold value in time window, and simulate the classification algorithm.

  • PDF

PC-KIMMO-based Description of Mongolian Morphology

  • Jaimai, Purev;Zundui, Tsolmon;Chagnaa, Altangerel;Ock, Cheol-Young
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.41-48
    • /
    • 2005
  • This paper presents the development of a morphological processor for the Mongolian language, based on the two-level morphological model which was introduced by Koskenniemi. The aim of the study is to provide Mongolian syntactic parsers with more effective information on word structure of Mongolian words. First hand written rules that are the core of this model are compiled into finite-state transducers by a rule tool. Output of the compiler was edited to clarity by hand whenever necessary. The rules file and lexicon presented in the paper describe the morphology of Mongolian nouns, adjectives and verbs. Although the rules illustrated are not sufficient for accounting all the processes of Mongolian lexical phonology, other necessary rules can be easily added when new words are supplemented to the lexicon file. The theoretical consideration of the paper is concluded in representation of the morphological phenomena of Mongolian by the general, language-independent framework of the two-level morphological model.

PC-DRC : Design Rule Check for Integrated Circuit Using PC (PC-DRC : PC를 이용한 집적회로 layout 설계 규칙 검사)

  • Park, In-Cheol;Eo, Kil-Soo;Kyung, Chong-Min
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1547-1550
    • /
    • 1987
  • This paper describes a new design rule checking system, PC-DRC, for CIF mask layout, which was written in C language on IBM PC/AT under DOS 3.0 environment. H/W devices and S/W utilities for PC-DRC is identical to that for PC-LADY[6], which makes PC-DRC an ideal post-processing routine for CIF file generated by PC-LADY. Various spurious errors were eliminated by ORing the input ClF data for each layer and the design rule errors were checked by edge based method on rectilinear polygon form. The detected errors are stored in CIF and displayed on CRT simultaneously.

  • PDF