• Title/Summary/Keyword: Rule mining

Search Result 479, Processing Time 0.022 seconds

Dynamic analysis of viscoelastic concrete plates containing nanoparticle subjected to low velocity impact load

  • Luo, Jijun;Lv, Meng;Hou, Suxia;Nasihatgozar, Mohsen;Behshad, Amir
    • Advances in nano research
    • /
    • v.13 no.4
    • /
    • pp.369-378
    • /
    • 2022
  • Dynamic study of concrete plates under impact load is presented in this article. The main objective of this work is presenting a mathematical model for the concrete plates under the impact load. The concrete plate is reinforced by carbon nanoparticles which the effective material proprieties are obtained by mixture's rule. Impacts are assumed to occur normally over the top layer of the plate and the interaction between the impactor and the structure is simulated using a new equivalent three-degree-of-freedom (TDOF) spring-mass-damper (SMD) model. The structure is assumed viscoelastic based on Kelvin-Voigt model. Based on the classical plate theory (CPT), energy method and Hamilton's principle, the motion equations are derived. Applying DQM, the dynamic deflection and contact force of the structure are calculated numerically so that the effects of mass, velocity and height of the impactor, volume percent of nanoparticles, structural damping and geometrical parameters of structure are shown on the dynamic deflection and contact force. Results show that considering structural damping leads to lower dynamic deflection and contact force. In addition, increasing the volume percent of nanoparticles yields to decreases in the deflection.

Natural frequency analysis of joined conical-cylindrical-conical shells made of graphene platelet reinforced composite resting on Winkler elastic foundation

  • Xiangling Wang;Xiaofeng Guo;Masoud Babaei;Rasoul Fili;Hossein Farahani
    • Advances in nano research
    • /
    • v.15 no.4
    • /
    • pp.367-384
    • /
    • 2023
  • Natural frequency behavior of graphene platelets reinforced composite (GPL-RC) joined truncated conical-cylindrical- conical shells resting on Winkler-type elastic foundation is presented in this paper for the first time. The rule of mixture and the modified Halpin-Tsai approach are applied to achieve the mechanical properties of the structure. Four different graphene platelets patterns are considered along the thickness of the structure such as GPLA, GPLO, GPLX, GPLUD. Finite element procedure according to Rayleigh-Ritz formulation has been used to solve 2D-axisymmetric elasticity equations. Application of 2D axisymmetric elasticity theory allows thickness stretching unlike simple shell theories, and this gives more accurate results, especially for thick shells. An efficient parametric investigation is also presented to show the effects of various geometric variables, three different boundary conditions, stiffness of elastic foundation, dispersion pattern and weight fraction of GPLs nanofillers on the natural frequencies of the joined shell. Results show that GPLO and BC3 provide the most rigidity that cause the most natural frequencies among different BCs and GPL patterns. Also, by increasing the weigh fraction of nanofillers, the natural frequencies will increase up to 200%.

Development of Intelligent Internet Shopping Mall Supporting Tool Based on Software Agents and Knowledge Discovery Technology (소프트웨어 에이전트 및 지식탐사기술 기반 지능형 인터넷 쇼핑몰 지원도구의 개발)

  • 김재경;김우주;조윤호;김제란
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.153-177
    • /
    • 2001
  • Nowadays, product recommendation is one of the important issues regarding both CRM and Internet shopping mall. Generally, a recommendation system tracks past actions of a group of users to make a recommendation to individual members of the group. The computer-mediated marketing and commerce have grown rapidly and thereby automatic recommendation methodologies have got great attentions. But the researches and commercial tools for product recommendation so far, still have many aspects that merit further considerations. To supplement those aspects, we devise a recommendation methodology by which we can get further recommendation effectiveness when applied to Internet shopping mall. The suggested methodology is based on web log information, product taxonomy, association rule mining, and decision tree learning. To implement this we also design and intelligent Internet shopping mall support system based on agent technology and develop it as a prototype system. We applied this methodology and the prototype system to a leading Korean Internet shopping mall and provide some experimental results. Through the experiment, we found that the suggested methodology can perform recommendation tasks both effectively and efficiently in real world problems. Its systematic validity issues are also discussed.

  • PDF

The development of symmetrically and attributably pure confidence in association rule mining (연관성 규칙에서 활용 가능한 대칭적 기여 순수 신뢰도의 개발)

  • Park, Hee Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.3
    • /
    • pp.601-609
    • /
    • 2014
  • The most widely used data mining technique for big data analysis is to generate meaningful association rules. This method has been used to find the relationship between set of items based on the association criteria such as support, confidence, lift, etc. Among them, confidence is the most frequently used, but it has the drawback that we can not know the direction of association by it. The attributably pure confidence was developed to compensate for this drawback, but the value was changed by the position of two item sets. In this paper, we propose four symmetrically and attributably pure confidence measures to compensate the shortcomings of confidence and the attributably pure confidence. And then we prove three conditions of interestingness measure by Piatetsky-Shapiro, and comparative studies with confidence, attributably pure confidence, and four symmetrically and attributably pure confidence measures are shown by numerical examples. The results show that the symmetrically and attributably pure confidence measures are better than confidence and the attributably pure confidence. Also the measure NSAPis found to be the best among these four symmetrically and attributably pure confidence measures.

A Dynamic Recommendation System Using User Log Analysis and Document Similarity in Clusters (사용자 로그 분석과 클러스터 내의 문서 유사도를 이용한 동적 추천 시스템)

  • 김진수;김태용;최준혁;임기욱;이정현
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.586-594
    • /
    • 2004
  • Because web documents become creation and disappearance rapidly, users require the recommend system that offers users to browse the web document conveniently and correctly. One largely untapped source of knowledge about large data collections is contained in the cumulative experiences of individuals finding useful information in the collection. Recommendation systems attempt to extract such useful information by capturing and mining one or more measures of the usefulness of the data. The existing Information Filtering system has the shortcoming that it must have user's profile. And Collaborative Filtering system has the shortcoming that users have to rate each web document first and in high-quantity, low-quality environments, users may cover only a tiny percentage of documents available. And dynamic recommendation system using the user browsing pattern also provides users with unrelated web documents. This paper classifies these web documents using the similarity between the web documents under the web document type and extracts the user browsing sequential pattern DB using the users' session information based on the web server log file. When user approaches the web document, the proposed Dynamic recommendation system recommends Top N-associated web documents set that has high similarity between current web document and other web documents and recommends set that has sequential specificity using the extracted informations and users' session information.

An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining (베이지안 확률 및 폐쇄 순차패턴 마이닝 방식을 이용한 설명가능한 로그 이상탐지 시스템)

  • Yun, Jiyoung;Shin, Gun-Yoon;Kim, Dong-Wook;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.77-87
    • /
    • 2021
  • With the development of the Internet and personal computers, various and complex attacks begin to emerge. As the attacks become more complex, signature-based detection become difficult. It leads to the research on behavior-based log anomaly detection. Recent work utilizes deep learning to learn the order and it shows good performance. Despite its good performance, it does not provide any explanation for prediction. The lack of explanation can occur difficulty of finding contamination of data or the vulnerability of the model itself. As a result, the users lose their reliability of the model. To address this problem, this work proposes an explainable log anomaly detection system. In this study, log parsing is the first to proceed. Afterward, sequential rules are extracted by Bayesian posterior probability. As a result, the "If condition then results, post-probability" type rule set is extracted. If the sample is matched to the ruleset, it is normal, otherwise, it is an anomaly. We utilize HDFS datasets for the experiment, resulting in F1score 92.7% in test dataset.

A Study on Management of Student Retention Rate Using Association Rule Mining (연관관계 규칙을 이용한 학생 유지율 관리 방안 연구)

  • Kim, Jong-Man;Lee, Dong-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.6
    • /
    • pp.67-77
    • /
    • 2018
  • Currently, there are many problems due to the decline in school-age population. Moreover, Korea has the largest number of universities compared to the population, and the university enrollment rate is also the highest in the world. As a result, the minimum student retention rate required for the survival of each university is becoming increasingly important. The purpose of this study was to examine the effects of reducing the number of graduates of education and the social climate that prioritizes employment. And to determine what the basic direction is for students to manage the student retention rate, which can be maintained from admission to graduation, to determine the optimal input variables, Based on the input parameters, we will make associative analysis using apriori algorithm to collect training data that is most suitable for maintenance rate management and make base data for development of the most efficient Deep Learning module based on it. The accuracy of Deep Learning was 75%, which is a measure of graduation using decision trees. In decision tree, factors that determine whether to graduate are graduated from general high school and students who are female and high in residence in urban area have high probability of graduation. As a result, the Deep Learning module developed rather than the decision tree was identified as a model for evaluating the graduation of students more efficiently.

An Investigation of a Role of Affective factors in Users' Coping with Privacy Risk from Location-based Services (위치기반 서비스(Location-based Service)의 프라이버시 위험 대응에 있어 사용자 감정(Affect)의 역할)

  • Park, Jonghwa;Jung, Yoonhyuk
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.201-213
    • /
    • 2020
  • Despite empirical research that the response to human risk is significantly influenced affective factors, the role of affective factors has been unexplored in information privacy research. This study aims to explore the privacy behaviors of location-based service (LBS) users from an affective point of view. Specifically, the study explored the relationship between three types of privacy threats (collection, hacking, secondary use), two affects (worry, anger), and a coping behavior (continuous use intentions). The structured survey was conducted with 552 users. In order to analyze the effect of the combination of perception of particular privacy threats and particular affects on the intention of continuous use, association rules, one of the data mining techniques, was employed. As a result, there was a difference in the intention to use according to the combination of the perception of risk and affect responses, and the most significant influence on the intention is when the second use of personal information was combined with anger. This study has significant theoretical contribution in that it includes affective factors in the research of information privacy users, complementing the biases of existing cognition-oriented approaches and providing a comprehensive understanding of privacy response behavior.

Research on the support of larger broken gateway based on the combined arch theory

  • Yang, Hongyun;Liu, Yanbao;Li, Yong;Pan, Ruikai;Wang, Hui;Luo, Feng;Wang, Haiyang;Cao, Shugang
    • Geomechanics and Engineering
    • /
    • v.23 no.2
    • /
    • pp.93-102
    • /
    • 2020
  • The excavation broken zones (EBZ) of gateways is a significant factor in determining the stability of man-made opening. The EBZ of 55 gateways with variety geological conditions were measured using Ground Penetrating Radar (GPR). The results found that the greatly depth of EBZ, the smallest is 1.5 m and the deepest is 3.5 m. Experimental investigations were carried out in the laboratory and in the coal mine fields for applying the combined arch support theory to large EBZ. The studies found that resin bolts with high tensile strength and good bond force could provide high pretension force with bolt extensible anchorage method in the field. Furthermore, the recently invented torque amplifier could greatly improve the bolt pretension force in poor lithology. The FLAC3D numerical simulation found that the main diffusion sphere of pretension force was only in the free segment zone of the surrounding rock. Further analysis found that the initial load-bearing zone thickness of the combined arch structure in large EBZ could be expressed by the free segment length of bolt. The using of high mechanical property bolts and steel with high pretension force will clearly putting forward the bolt length selection rule based on the combined arch support theory.

Bounds of PIM-based similarity measures with partially marginal proportion (부분적 주변 비율에 의한 확률적 흥미도 측도 기반 유사성 측도의 상한 및 하한의 설정)

  • Park, Hee Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.4
    • /
    • pp.857-864
    • /
    • 2015
  • By Wikipedia, data mining is the computational process of discovering patterns in huge data sets involving methods at the intersection of association rule, decision tree, clustering, artificial intelligence, machine learning. Clustering or cluster analysis is the task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups. The similarity measures being used in the clustering may be classified into various types depending on the characteristics of data. In this paper, we computed bounds for similarity measures based on the probabilistic interestingness measure with partially marginal probability such as Peirce I, Peirce II, Cole I, Cole II, Loevinger, Park I, and Park II measure. We confirmed the absolute value of Loevinger measure wasthe upper limit of the absolute value of any other existing measures. Ordering of other measures is determined by the size of concurrence proportion, non-simultaneous occurrence proportion, and mismatch proportion.