• Title/Summary/Keyword: SimpleKMeans Algorithm

Search Result 2, Processing Time 0.018 seconds

Analysis of Radioactive Contamination Normal Level of Numerical Isotope using Clustering Methods (클러스터링 방법을 이용한 방사능 정상수치의 동위원소별 오염 분석)

  • Jung, Yong-Gyu;Choi, Jung-Ah;Cha, Byung-Heun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.41-46
    • /
    • 2014
  • As the radioactive-related incidents have been occurred frequently such as Fukushima nuclear exposure incident, it is always considered radioactivity normal levels in radiation exposure as a most risk components at several government agencies. In this paper, the data were analyzed by information in the data beyond range of the attributes. The clustering analysis method is used by EM and SimpleKMeans algorithm. The experimental results about US Radioactive associated data is depending on the method of data analysis. It can be seen that the method of the algorithm is different depending on local value of the normal range. The governments need to pay attention to increase the investigation frequency.

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.