• Title/Summary/Keyword: application log

Search Result 438, Processing Time 0.026 seconds

Web log analysis and application for managing participants under e-SCM environment (e-SCM 환경에서 업체관리를 위한 웹 로그 분석 및 활용 방안)

  • 서준용;김운식;고재문
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.293-297
    • /
    • 2003
  • 최근 공급사슬관리(SCM)는 인터넷을 기반으로 하는 e-SCM 환경으로 발달하고 있다. e-SCM은 웹을 통한 기업의 원자재 조달에서부터 최종제품이 고객에 이르는 전 과정에 관련된 많은 업무를 효율적으로 관리하는 것으로 공급사슬에 있는 많은 기업의 참여가 요구된다. 본 연구에서는 수주생산기업의 e-SCM 구매시스템에서 구매의도를 지닌 참여기업의 웹 로그 데이터를 분석 및 활용하는 방안을 제시하여 참여기업의 충성도와 수주전략 수립을 위한 방안을 제시하고자 한다.

  • PDF

A Study on the Analysis of Data Using Association Rule (연관규칙을 이용한 데이터 분석에 관한 연구)

  • 임영문;최영두
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.61
    • /
    • pp.115-126
    • /
    • 2000
  • In General, data mining is defined as the knowledge discovery or extracting hidden necessary information from large databases. Its technique can be applied into decision making, prediction, and information analysis through analyzing of relationship and pattern among data. One of the most important works is to find association rules in data mining. Association Rule is mainly being used in basket analysis. In addition, it has been used in the analysis of web-log and user-pattern. This paper provides the application method in the field of marketing through the analysis of data using association rule as a technique of data mining.

  • PDF

Application of Molecular Descriptor for Prediction and Analysis of the Affinity between Alkyl Substituted Super Hydrophobic Dyes and Polypropylene Fibers (폴리프로필렌 섬유용 알킬치환 초소수성 염료의 친화력 분석과 예측을 위한 Molecular Descriptor의 활용)

  • Jang, Gyeong-Jin;Jeong, Jong-Seok;Kim, Tae-Gyeong
    • Proceedings of the Korean Society of Dyers and Finishers Conference
    • /
    • 2008.10a
    • /
    • pp.77-78
    • /
    • 2008
  • Affinity between alkyl substituted super hydrophobic dyes and polypropylene fiber has been analyzed by using the molecular descriptor as a method to predict chemical and physical characteristics of compounds. Hydrophobicity of synthesized dyes calculated by LogP which is one of molecular descriptors was increased continuously as the length of alkyl substituents increased.

  • PDF

A simple zero inflated bivariate negative binomial regression model with different dispersion parameters

  • Kim, Dongseok
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.4
    • /
    • pp.895-900
    • /
    • 2013
  • In this research, we propose a simple bivariate zero inflated negative binomial regression model with different dispersion for bivariate count data with excess zeros. An application to the demand for health services shows that the proposed model is better than existing models in terms of log-likelihood and AIC.

A Simple Approach to the Ionic-covalent Bond Based on the Electronegativity and Acid Strength of Cations. Part Two:Application to the Description of the Electronic Properties of Oxides

  • Josik Portier;Guy Campet
    • Journal of the Korean Chemical Society
    • /
    • v.41 no.8
    • /
    • pp.437-441
    • /
    • 1997
  • The acid strngth of cations, determined with ICP (Ionic Covalent Parameter): ICP=log(P)-1.38x+2.07 where P is the polarizing power and X its electronegativity expresses the competition between the covalent and ionic forces. This concept, together with electronegativity, is used to describe the properties of oxides with various electronic properties (insulators, metals, degenerate semiconductors, superconductors).

  • PDF

Biological Control of Japanese Pine Sawyer, Monochamus alternatus (Coleoptera: Cerambycidae) using Korean Entomopathogenic Nematode Isolates (한국산 곤충병원성선충을 이용한 솔수염하늘소(Monochamus alternatus)의 생물적 방제)

  • Yu, Hwang Bin;Jung, Young Hak;Lee, Sang Myeong;Choo, Ho Yul;Lee, Dong Woon
    • The Korean Journal of Pesticide Science
    • /
    • v.20 no.4
    • /
    • pp.361-368
    • /
    • 2016
  • Japanese pine sawyer (JPS), Monochamus alternatus is a vector insect of pine wood nematode, Bersaphlenchus xylophilus in Korea and Japanese pine forest. This study was to evaluate the possibility of biological control of JPS with Korean entomopathogenic nematodes (EPNs). Korean EPNs (Heterorhabditis sp. Gyeongsan, Steinernema carpocapsae GSN1, S. glaseri Dongrae and S. longicaudum Nonsan strain) were infested bate insect, Galleria mellonella in log of dead pine tree. Result showed that, S. carpocapsae GSN1 strain has the highest pathogenicity. Heterorhabditis sp. Gyeongsan and S. carpocapsae GSN1 had infested bate insect, which located in 7.5 cm depth of pine log. EPN has pathogenicity against larva and adult of JPS. Spray application of EPNs against adult of JPS, Heterorhabditis sp. Gyeongsan strain showed higher pathogenicity than S. carpocapsae GSN1 strain. EPN infested larva of JPS was detected on bark spray treatment with S. carpocapsae GSN1 strain in dead pine log that naturally infested larva of JPS however, no EPN infested JPS was detected on soaking of pine log with suspension of S. carpocapsae GSN1 strain. Though EPN had found with low efficacy against JPS but still possible to apply to control the boring insect pest as they can control log dwelling insect.

Settlement Characteristics of Large Drilled Shafts Embedded in Bed Rocks (암반에 근입된 대구경 현장타설말뚝의 침하특성)

  • Hong Won-Pyo;Yea Geu-Guwen;Nam Jung-Man;Lee Jae-Ho
    • Journal of the Korean Geotechnical Society
    • /
    • v.21 no.5
    • /
    • pp.111-122
    • /
    • 2005
  • The data on the pile load tests performed on 35 large drilled shafts are analyzed to investigate the load-settlement characteristics of large drilled shafts embedded in bed rocks. Generally, the settlement of large drilled shafts embedded in bed rocks is too small to determine the ultimated load with application of the regulation in design code for either the total settlement or the residual settlement. Therefore, to determine the yield load of large drilled shafts embedded in bed rocks, p(load)-logS (settlement) curve method, which has been proposed originally for the driven pile, was applied to the investigation on the data of the pile load tests. This technique shows that the yield load can be determined accurately and easily rather than other conventional techniques such as P-S, logp-logS, S-logt, and P-S curve methods. An empirical equation is proposed to represent the relationship between pile load and settlement before the yield loading condition. And the settlement of piles was related with the depth embedded in rock as well as rock properties. Based on the investigation on the data of pile load tests, the resonable regulations f3r both the total settlement and the residual settlement are proposed to determine the yield load of large drilled shafts embedded in bed rocks.

DDoS Attack Application Detection Method with Android Logging System (안드로이드 로깅 시스템을 이용한 DDoS 공격 애플리케이션 탐지 기법)

  • Choi, Seul-Ki;Hong, Min;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1215-1224
    • /
    • 2014
  • Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

Digilog Book Interaction Design Using Augmented Reality(AR) (Focused on Children's Books) (증강현실(AR)을 활용한 디지로그 북 인터랙션디자인 연구 (아동 서적물 중심으로))

  • Jung, Yong-Won;Ju, Min-Kyung;Kim, Yong-Ho
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.425-433
    • /
    • 2020
  • Digilog book using augmented reality is a form that augmented reality is implemented by illuminating the camera embedded in the mobile image on the page registered as an image marker after downloading the application, which shows a fragmentary limitation in the content implementation method. Therefore, in this study, we proposed a pop-up multi-tracking method that enables two-way interaction in a digit log book using augmented reality technology. Through this, we commissioned an authorized agency to test the technical differentiation of augmented reality content for two prototypes of existing book-type Digilog Book and Pop-up-type Digilog Book. A test report was issued. The pop-up type digit log book suggested in this study enables the user to implement the interactive contents according to the user's action (movement). This can induce the interaction between the virtual image and the printed picture book and give the learner an interest and immersion, so that it is possible to express the interaction of the digital log book.