• Title/Summary/Keyword: database systems

Search Result 2,870, Processing Time 0.028 seconds

User Access Patterns Discovery based on Apriori Algorithm under Web Logs (웹 로그에서의 Apriori 알고리즘 기반 사용자 액세스 패턴 발견)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.681-689
    • /
    • 2019
  • Web usage pattern discovery is an advanced means by using web log data, and it's also a specific application of data mining technology in Web log data mining. In education Data Mining (DM) is the application of Data Mining techniques to educational data (such as Web logs of University, e-learning, adaptive hypermedia and intelligent tutoring systems, etc.), and so, its objective is to analyze these types of data in order to resolve educational research issues. In this paper, the Web log data of a university are used as the research object of data mining. With using the database OLAP technology the Web log data are preprocessed into the data format that can be used for data mining, and the processing results are stored into the MSSQL. At the same time the basic data statistics and analysis are completed based on the processed Web log records. In addition, we introduced the Apriori Algorithm of Web usage pattern mining and its implementation process, developed the Apriori Algorithm program in Python development environment, then gave the performance of the Apriori Algorithm and realized the mining of Web user access pattern. The results have important theoretical significance for the application of the patterns in the development of teaching systems. The next research is to explore the improvement of the Apriori Algorithm in the distributed computing environment.

Upper Garment Sizing System for Obese School Boys Based on Somatotype Analysis (학령후기 비만 남아의 체형 분석에 따른 plus-size 남자 아동복 상의 치수 규격 제안)

  • Park, Soon-Jee
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.9
    • /
    • pp.99-112
    • /
    • 2008
  • The increasing rate of obesity in school aged children has become a conspicuous social phenomenon in Korea. This has been linked to greater economic growth, increasingly westernized dietary habits, and a consumer driven society. Given that obesity can lead to social exclusion or unfavorable attention by other students in a school setting, the design of plus-size garments have become important for effective appearance management skills. This research aimed to establish a somatotype database for obese school boys, aged 10 to 12, in order to develop a sizing system for plus-size upper garments. In order to measure somatotype of average and obese school boys, five categories were recorded; height, obesity, length of trunk, thickness of neck and chest. For obese boys, subcutaneous fat thickness and position of B.P/shoulder point factors were recorded. Obesity factor was subdivided into overall and specific ones, and while the deviation of obese body types was severe compared to the average type. Obese body type showed significantly higher measurements in width, girth, thickness. This is linked to the fact that the frequency ratio of obesity increases with age. Stature and chest were chosen as control dimensions for boys' wear. As crosstabulation of stature(5cm interval) and chest girth(2, 3 and 4cm), and stature(5cm interval)/chest girth(3cm interval) sizing system showed, the most effective cover ratio and adaptability to the data distribution $25{\sim}75$ quartile. Based on the findings, 10 sizes were formulated for average body type, while 18 sizes were formulated for obese type, whose size cover ratios were 48% and 62.9%, respectively. The primary ranges of stature were $145cm{\sim}150cm$, while those of chest girth were $79{\sim}82cm$. Each size was declared as "chest-somatotype{A(average)/O(obesity)-stature". This study proposed a plus-size upper garment sizing systems for obese boys, accompanied with reference measurements for suit, casual wear and underwear. The finding showed that the two systems were totally separate and not overlapping, meaning that plus-size sizing system is essential for obese school boys. The obesity type system had more size and wider range specs.

The Efficient Method of Parallel Genetic Algorithm using MapReduce of Big Data (빅 데이터의 MapReduce를 이용한 효율적인 병렬 유전자 알고리즘 기법)

  • Hong, Sung-Sam;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.385-391
    • /
    • 2013
  • Big Data is data of big size which is not processed, collected, stored, searched, analyzed by the existing database management system. The parallel genetic algorithm using the Hadoop for BigData technology is easily realized by implementing GA(Genetic Algorithm) using MapReduce in the Hadoop Distribution System. The previous study that the genetic algorithm using MapReduce is proposed suitable transforming for the GA by MapReduce. However, they did not show good performance because of frequently occurring data input and output. In this paper, we proposed the MRPGA(MapReduce Parallel Genetic Algorithm) using improvement Map and Reduce process and the parallel processing characteristic of MapReduce. The optimal solution can be found by using the topology, migration of parallel genetic algorithm and local search algorithm. The convergence speed of the proposal method is 1.5 times faster than that of the existing MapReduce SGA, and is the optimal solution can be found quickly by the number of sub-generation iteration. In addition, the MRPGA is able to improve the processing and analysis performance of Big Data technology.

Development of Ubiquitous Rice Intake Management Systems for Rice Processing Complex (미곡종합처리장을 위한 유비쿼터스 벼 반입관리 시스템 개발)

  • Lee, Hyo Jai;Kim, Oui Woung;Kim, Hoon;Kim, Byeong-Sam;Han, Jae-Woong;Han, Chung Su;Jung, Jae-Yoon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.175-189
    • /
    • 2013
  • In this paper, an rice intake management system based on ubiquitous computing technology is introduced for rice processing complex (RPC). This system plays an important role in the quality management for rough rices in that the system provides timely and useful information of rice cultivation. The intake management system is developed by utilizing widespread ubiquitous technologies, such as smartphones, GIS and LBS, for the purpose of controling the harvest time and monitoring the quality of paddy. The information for rice production, cultivation and quality management is transmitted and stored in a centralized database via mobile networks, On the basis of these information, the harvest schedule is determined and notified to farmers though smart devices. Hence, the proposed system can help to establish trust among farmers, operators and consumers by providing systematic information based on ubiquitous computing technology.

Traffic Analysis and Simulation System for Korea Highway (대한민국 고속도로를 위한 교통 분석 및 시뮬레이션 시스템)

  • Han, Young Tak;Jeon, Soo Bin;Shin, Se Jeong;Seo, Dong Mahn;Jung, In Bum
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.9
    • /
    • pp.426-440
    • /
    • 2016
  • Developed countries have already applied variable Intelligent Transportation System (ITS) technologies and have solved many transportation problems. Researchers also expect that ITS solutions can solve the transportation problems of Korean roads, when they are applied to Korean roads. However, since the existing ITS solutions applied in other countries are used for Korean roads without calibration, they will incur unexpected problems and high cost maintenance costs. In this paper, to solve the above problem, we propose the Korean Highway Traffic Analysis tool (KHTA). It not only analyzes all highway information in Korea, but also simulates the ITS algorithm implemented by traffic developers for the Korean highway environment. To test the stability, applicability and efficiency of the KHTA, we developed and analyzed the result of the ramp metering algorithm. The results show that the total travel time was reduced by 5 minutes compared to that without ramp metering, and traffic congestion was decreased. Thus, we confirmed that the KHTA can simulate ITS systems and can analyze the traffic environment in Korean highway. We expect that this tool would be very helpful to develop and analyze ITS systems in Korea.

Design of Digit Recognition System Realized with the Aid of Fuzzy RBFNNs and Incremental-PCA (퍼지 RBFNNs와 증분형 주성분 분석법으로 실현된 숫자 인식 시스템의 설계)

  • Kim, Bong-Youn;Oh, Sung-Kwun;Kim, Jin-Yul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.56-63
    • /
    • 2016
  • In this study, we introduce a design of Fuzzy RBFNNs-based digit recognition system using the incremental-PCA in order to recognize the handwritten digits. The Principal Component Analysis (PCA) is a widely-adopted dimensional reduction algorithm, but it needs high computing overhead for feature extraction in case of using high dimensional images or a large amount of training data. To alleviate such problem, the incremental-PCA is proposed for the computationally efficient processing as well as the incremental learning of high dimensional data in the feature extraction stage. The architecture of Fuzzy Radial Basis Function Neural Networks (RBFNN) consists of three functional modules such as condition, conclusion, and inference part. In the condition part, the input space is partitioned with the use of fuzzy clustering realized by means of the Fuzzy C-Means (FCM) algorithm. Also, it is used instead of gaussian function to consider the characteristic of input data. In the conclusion part, connection weights are used as the extended diverse types in polynomial expression such as constant, linear, quadratic and modified quadratic. Experimental results conducted on the benchmarking MNIST handwritten digit database demonstrate the effectiveness and efficiency of the proposed digit recognition system when compared with other studies.

ECG Signal Compression based on Adaptive Multi-level Code (적응적 멀티 레벨 코드 기반의 심전도 신호 압축)

  • Kim, Jungjoon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.6
    • /
    • pp.519-526
    • /
    • 2013
  • ECG signal has the feature that is repeated in a cycle of P, Q, R, S, and T waves and is sampled at a high sampling frequency in general. By using the feature of periodic ECG signals, maximizing compression efficiency while minimizing the loss of important information for diagnosis is required. However, the periodic characteristics of such amplitude and period is not constant by measuring time and patients. Even though measured at the same time, the patient's characteristics display different periodic intervals. In this paper, an adaptive multi-level coding is provided by coding adaptively the dominant and non-dominant signal interval of the ECG signal. The proposed method can maximize the compression efficiency by using a multi-level code that applies different compression ratios considering information loss associated with the dominant signal intervals and non-dominant signal intervals. For the case of long time measurement, this method has a merit of maximizing compression ratio compared with existing compression methods that do not use the periodicity of the ECG signal and for the lossless compression coding of non-dominant signal intervals, the method has an advantage that can be stored without loss of information. The effectiveness of the ECG signal compression is proved throughout the experiment on ECG signal of MIT-BIH arrhythmia database.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

Groundwater Systems in Seoul Area : Analysis of Hydraulic Properties (서울지역 지하수 시스템 조사 : 수리적 특성 분석)

  • 김윤영;이강근;성익환
    • The Journal of Engineering Geology
    • /
    • v.8 no.1
    • /
    • pp.51-73
    • /
    • 1998
  • Hydrogeological systems in a metrnpolitan area can be understood by analyzing the groundwater disturbing factors such as constructions and land applications, the groundwater usage for domestic and industrial purposes, and the groundwater pumpage to lower the groundwater level for the structural safety of subway and underground facilities. This study is part of the study performed to understand the groundwater system in the Seoul area and it is focusing on the hydraulic properties. Groundwater well inventory, barometric efficiency measurements, pumping and slug tests, and long-term groundwater monitoring have been perfonrmed during the last 2 years. The relations between Han River and the groundwater around the river also have been observed. These observations and test data, together with the information on soil distribution, geology, and logging data are used to construct a database and GIS(Geographic Information System) presentation system using ARC/INFO. Barometric efficiencies appeared to have no special trends associated with well depths, which maeans that the degree of confinement of the crystaline rock aquifer of the Seoul area is distributed locally depending on the developrnent of fractures. Hydraulic conductivities exponentialiy decrease with well depth. The stage of Han River fluctuates according to the tidal movement of nearby seawater but the tidal effects attenuate due to the underwater dams. Groundwater levels in the Seoul area seem to have declined for the last two years,but it is not certain that the declination represents the long-term trend.

  • PDF

Development of a Facility Management System for Underground Conduits Using Web Technologies (웹 기술을 이용한 지하 공동구의 시설물 관리 시스템 개발)

  • Ku, Kyong-I;Kim, Ji-Yoon;Ahn, Hyo-Jin;Kim, Joo-Sung;Kang, Jae-Mo;Kim, Youug-Jin;Kim, Yoo-Sung
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.2 s.14
    • /
    • pp.29-38
    • /
    • 2005
  • Even though underground conduits have became important city-infra structures which should be exhaustively and efficiently managed, there is few systems which supports the well-defined facility management standards. Due to the lack of the supporting systems, experts must visit underground conduits scattered several cities over the country to see and check the status of the underground conduits including built-in facilities. This type of management gives us a little bit delayed status information at the end of so much time and money costs. In this paper, to solve this problem and manage the conduit synthetically, we developed a web-based facility management system for underground conduits by using information technologies. The developed management system has a simplified map drawing interface to depict the overall architectures and locations of underground conduits and their built-in facilities into sketch maps. And, the system uses the 3D panorama image technology with zooming functions in addition to still images and video images to give the feeling of a spot inspection. Moreover, since the system accumulates the data of repair/reinforcement, occasional inspections and safety diagnosis, conduit managers can synthetically and effectively manage the facilities within underground conduits and themselves.

  • PDF