• Title/Summary/Keyword: Rule File

Search Result 45, Processing Time 0.02 seconds

A rule based file management tool for facility log files integration in disaster environments

  • Lee, Young-Geol;Lee, Younlae;Kim, Hyunah;Jang, Yeonyi;Park, Minjae
    • 인터넷정보학회논문지
    • /
    • 제19권6호
    • /
    • pp.73-82
    • /
    • 2018
  • We often experience complex presence of files within the compute environment. It could be an end-user's desktop environment or a professional part of file management. We would like to suggest one way to manage these different cases of duplicate files. It is a rule-based file management tool, and we want to use it as a tool to consolidate facility management log files. In this paper, we will describe the rule-based file management tools and show examples of how files are managed using them. We are interested in the management of the disaster environment and would like to apply this method to the management of log data related to facilities to be considered in the event of a disaster.

Rule base방법에 의한 선반가공의 CAD/CAM integration (Rule based CAD/CAM integration for turning)

  • 임종혁;박지형;이교일
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1989년도 한국자동제어학술회의논문집; Seoul, Korea; 27-28 Oct. 1989
    • /
    • pp.290-295
    • /
    • 1989
  • This paper proposes a Expert CAPP System for integrating CAD/CAM of rotational work-part by rule based approach. The CAD/CAPP integration is performed by the recognition of machined features from the 2-D CAD data (IGES) file. Selecting functions of the process planning are performed in modularized rule base by forward chaining inference, and operation sequences are determined by means of heuristic search algorithm. For CAPP/CAM integration, post-processor generates NC code from route sheet file. This system coded in OPS5 and C language on PC/AT, and EMCO CNC lathe interfaced with PC through DNC and RS-232C.

  • PDF

IGES와 SRL format 사이의 3차원 정보교고한에 관한 연구 (A study on 3D data exchange between IGES and STL format)

  • 오도근;최홍태;이석희
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1995년도 추계학술대회 논문집
    • /
    • pp.965-969
    • /
    • 1995
  • This paper deals with effective using the IGES file for flexible data exchange among the other CAD/CAM system. If a data exchange between STL file and the neutral IGES file in Stereolithography system is available, a product design becomes more flexible. THere can be many restrictions and difficulties intranslating these data. First, an STL file follows two rules, such as right-hand rule, and vertex-to-vertex rule, thus requires a structural verification. Second, translation should be performed with minmal errors. It becomes very important to translate IGES file of limited kinds of entities fot the purpose of geometric information into STL file with minor data manipulation. The developed system suggests a good approach of translating the sampled B-spline surface of IGES and shows a potential linkage between IGES and STL format file.

  • PDF

미국 관세청의 선적전 추가 보안관련 정보 제출법안(10+2 Rule)에 관한 연구 (A Study on the Importer Security Filing and Additional Carrier Requirements(10+2 rule) in U.S.)

  • 송선욱
    • 통상정보연구
    • /
    • 제10권4호
    • /
    • pp.395-416
    • /
    • 2008
  • The advance information for oceangoing cargoes destined to th United States enable CBP to evaluate the potential risk of smuggling WMD and to facilitate the prompt release of legitimate cargo following its arrival in the Unites States. On January 1, 2008, CBP promulgate regulations, also known as 10+2 rule, to require the electronic transmission of additional data elements for improved high-risk targeting, including appropriate security elements of entry data for cargo destined to the United States by vessel prior to loading of such cargo on vessels at foreign seaports. The potential impact to an importer's international supply chain will be as follows ; Firstly, importers will take incremental supply chain costs and filing costs. Secondly, anticipate delay in shipment of containerized cargo. Thirdly, importers could be charged fines if they fail to file and file inaccurate or missing data. Companies exporting to the United States should be interested in 10+2 rule, analyze their current processes and procedures to ensure that they are prepared to handle the additional filing requirements of 10+2 rule. And they should focus on how 10+2 impacts their supply chain in terms of costs and sourcing. They will be necessary to revise service legal agreements with their forwarders, customs brokers or carriers in order to meet filing requirements of 10+2 rule.

  • PDF

의사결정 규칙을 이용한 데이터 통합에 관한 연구 (A Study on the Data Fusion Method using Decision Rule for Data Enrichment)

  • 김순영;정성석
    • 응용통계연구
    • /
    • 제19권2호
    • /
    • pp.291-303
    • /
    • 2006
  • 대용량의 데이터로부터 의미있는 지식을 찾는 과정에서 데이터의 질은 무엇보다도 중요하다. 본 연구에서는 데이터의 충실도를 높이기 위한 방법으로 여러 경로로부터 수집된 데이터의 정보를 활용하기 위해 데이터 마이닝 알고리즘인 의사결정 규칙을 이용한 데이터 통합 기법을 제안하고, 실제 데이터를 이용하여 모의실험을 통해 제안된 알고리즘의 효율성을 비교하였다. 실험결과 제안된 알고리즘이 데이터 통합의 성능을 향상시킴을 알 수 있었다.

공·사립 유치원 홈페이지의 운영 및 개인정보 관리 실태 연구 (A Study on the Operation and Personal Information Management of Public and Private Kindergarten Homepages)

  • 김종민;천희영;최은아
    • 아동학회지
    • /
    • 제37권6호
    • /
    • pp.119-132
    • /
    • 2016
  • Objective: The purpose of this study was to analyze the operation and personal information management of public and private kindergarten homepages. Methods: A total of 2,846 kindergartens were selected from the I-Sarang portal service for analyzing operation, and 217 self-operating homepages were selected for evaluating management. Seven evaluation items from three domains (information gathering procedures and scope, information security, and management of file exposure protection) were used. Wireshark and Google were used for analyzing some evaluation items. Results: The operating ratio of kindergarten homepages was low and most of the kindergartens self-operated their homepages. The evaluation of the information gathering procedures and scope showed that the rule of consent process was not rigidly followed but that the rule of legality for information gathering was followed. Items related to information security were followed at very low levels. As for the management of file exposure protection, the evaluation of items related to the prevention of attachment disclosure showed that the rule of protecting personal information included in an attached file was followed but that the notice regarding information protection was not. Across all evaluation items, the level of personal information management was higher in public (vs. private) kindergartens. Conclusion: These results indicate methods to more securely and effectively manage personal information on kindergarten homepages.

연관규칙 마이닝과 나이브베이즈 분류를 이용한 악성코드 탐지 (Detection of Malicious Code using Association Rule Mining and Naive Bayes classification)

  • 주영지;김병식;신주현
    • 한국멀티미디어학회논문지
    • /
    • 제20권11호
    • /
    • pp.1759-1767
    • /
    • 2017
  • Although Open API has been invigorated by advancements in the software industry, diverse types of malicious code have also increased. Thus, many studies have been carried out to discriminate the behaviors of malicious code based on API data, and to determine whether malicious code is included in a specific executable file. Existing methods detect malicious code by analyzing signature data, which requires a long time to detect mutated malicious code and has a high false detection rate. Accordingly, in this paper, we propose a method that analyzes and detects malicious code using association rule mining and an Naive Bayes classification. The proposed method reduces the false detection rate by mining the rules of malicious and normal code APIs in the PE file and grouping patterns using the DHP(Direct Hashing and Pruning) algorithm, and classifies malicious and normal files using the Naive Bayes.

데이터 마이닝의 분류화와 연관 규칙을 이용한 네트워크 트래픽 분석 (Analysis of Network Traffic using Classification and Association Rule)

  • 이창언;김응모
    • 한국시뮬레이션학회논문지
    • /
    • 제11권4호
    • /
    • pp.15-23
    • /
    • 2002
  • As recently the network environment and application services have been more complex and diverse, there has. In this paper we introduce a scheme the extract useful information for network management by analyzing traffic data in user login file. For this purpose we use classification and association rule based on episode concept in data mining. Since login data has inherently time series characterization, convertible data mining algorithms cannot directly applied. We generate virtual transaction, classify transactions above threshold value in time window, and simulate the classification algorithm.

  • PDF

PC-KIMMO-based Description of Mongolian Morphology

  • Jaimai, Purev;Zundui, Tsolmon;Chagnaa, Altangerel;Ock, Cheol-Young
    • Journal of Information Processing Systems
    • /
    • 제1권1호
    • /
    • pp.41-48
    • /
    • 2005
  • This paper presents the development of a morphological processor for the Mongolian language, based on the two-level morphological model which was introduced by Koskenniemi. The aim of the study is to provide Mongolian syntactic parsers with more effective information on word structure of Mongolian words. First hand written rules that are the core of this model are compiled into finite-state transducers by a rule tool. Output of the compiler was edited to clarity by hand whenever necessary. The rules file and lexicon presented in the paper describe the morphology of Mongolian nouns, adjectives and verbs. Although the rules illustrated are not sufficient for accounting all the processes of Mongolian lexical phonology, other necessary rules can be easily added when new words are supplemented to the lexicon file. The theoretical consideration of the paper is concluded in representation of the morphological phenomena of Mongolian by the general, language-independent framework of the two-level morphological model.

PC-DRC : PC를 이용한 집적회로 layout 설계 규칙 검사 (PC-DRC : Design Rule Check for Integrated Circuit Using PC)

  • 박인철;어길수;경종민
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1987년도 전기.전자공학 학술대회 논문집(II)
    • /
    • pp.1547-1550
    • /
    • 1987
  • This paper describes a new design rule checking system, PC-DRC, for CIF mask layout, which was written in C language on IBM PC/AT under DOS 3.0 environment. H/W devices and S/W utilities for PC-DRC is identical to that for PC-LADY[6], which makes PC-DRC an ideal post-processing routine for CIF file generated by PC-LADY. Various spurious errors were eliminated by ORing the input ClF data for each layer and the design rule errors were checked by edge based method on rectilinear polygon form. The detected errors are stored in CIF and displayed on CRT simultaneously.

  • PDF