• Title/Summary/Keyword: rule-based design

Search Result 824, Processing Time 0.026 seconds

Datamining: Roadmap to Extract Inference Rules and Design Data Models from Process Data of Industrial Applications

  • Bae Hyeon;Kim Youn-Tae;Kim Sung-Shin;Vachtsevanos George J.
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.3
    • /
    • pp.200-205
    • /
    • 2005
  • The objectives of this study were to introduce the easiest and most proper applications of datamining in industrial processes. Applying datamining in manufacturing is very different from applying it in marketing. Misapplication of datamining in manufacturing system results in significant problems. Therefore, it is very important to determine the best procedure and technique in advance. In previous studies, related literature has been introduced, but there has not been much description of datamining applications. Research has not often referred to descriptions of particular examples dealing with application problems in manufacturing. In this study, a datamining roadmap was proposed to support datamining applications for industrial processes. The roadmap was classified into three stages, and each stage was categorized into reasonable classes according to the datamining purposed. Each category includes representative techniques for datamining that have been broadly applied over decades. Those techniques differ according to developers and application purposes; however, in this paper, exemplary methods are described. Based on the datamining roadmap, nonexperts can determine procedures and techniques for datamining in their applications.

The Design of Scene Modeler Component for 3D GIS Software (3차원 GIS 소프트웨어를 위한 장면 모델러 컴포넌트 설계)

  • Kim, Sung-Soo;Choe, Seung-Keol;Lee, Jong-Hun;Yang, Young-Kyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.81-84
    • /
    • 2001
  • 3 차원 GIS 소프트웨어를 개발하기 위한 기술로는 공간데이터처리 및 공간분석기술, 컴퓨터그래픽스 및 가상현실 기술에 이르기까지 다양한 연구가 요구된다. 지리정보 가시화(Visualization)에 관한 연구는 여러 GIS 응용분야에서 주요한 부분이 된다. 현재 2 차원 기 구축된 데이터를 이용하여 3차원으로 가시화 및 분석을 수행할 수 있다는 것은 데이터와 소프트웨어 재사용 및 비용측면에서 중요한 의미를 가진다. 본 논문에서는 2차원 데이터와 최소한의 3차원 부가정보(빌딩높이, 도로폭등)를 이용하여 규칙기반 모델링(Rule-Based Modeling)을 통해 3 차원으로 모델링 해 낼 수 있는 3 차원 장면 모델러 컴포넌트 설계 방법을 제안한다. 시설물의 다양한 상세도 제어가 가능한 LOD(level-of detail) 모델러와 3 차원 장면을 효율적으로 관리하기 위한 장면 그래프(scene graph) 컴포넌트 설계 기술을 소개한다. 장면 모델러 컴포넌트 분석을 위해 처리하는 입력 데이터, 수작업 3 차원 모델링 여부, 소프트웨어 재사용성, 상호운용성, 구축 비용 등을 기준으로 분석하였다.

  • PDF

A Study on the Visual System of Object - Oriented Based on Abstract Information (객체지향을 기반으로한 추상화 정보의 시각화 시스템에 대한 연구)

  • Kim, Haeng-Kon;Han, Eun-Ju;Chung, Youn-Ki
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2434-2444
    • /
    • 1997
  • As software industry progresses, the necessity of visual information have increased more than text-oriented information. So, automatic tools are required to satisfy a user's desire for visual design representation of various source information in the real-world. In this paper, we discuss the methodology and tools for parsing abstract information through semantic analysis and extracting visual information through visual mapping. Namely, as to abstract informations are represented as relational structure and then mapped into visual structure using regular rule, user can obtain visual information. We suggest VOLS(Visual Object Layout System) to transform a abstract information to visual information. It can improve user understandability and assist a maintenance for existing source code.

  • PDF

Implementation of abnormal behavior detection Algorithm and Optimizing the performance of Algorithm (비정상행위 탐지 알고리즘 구현 및 성능 최적화 방안)

  • Shin, Dae-Cheol;Kim, Hong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4553-4562
    • /
    • 2010
  • With developing networks, information security is going to be important and therefore lots of intrusion detection system has been developed. Intrusion detection system has abilities to detect abnormal behavior and unknown intrusions also it can detect intrusions by using patterns studied from various penetration methods. Various algorithms are studying now such as the statistical method for detecting abnormal behavior, extracting abnormal behavior, and developing patterns that can be expected. Etc. This study using clustering of data mining and association rule analyzes detecting areas based on two models and helps design detection system which detecting abnormal behavior, unknown attack, misuse attack in a large network.

Adaptive Object Classification using DWT and FI (이산웨이블릿 변환과 퍼지추론을 이용한 적응적 물체 분류)

  • Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.3
    • /
    • pp.219-225
    • /
    • 2006
  • This paper presents a method of object classification based on discrete wavelet transform (DWT) and fuzzy inference(FI). It concentrated not only on the design of fuzzy inference algorithm which is suitable for low speed uninhabited transportation such as, conveyor but also on the minimize the number of fuzzy rule. In the preprocess of feature extracting, feature parameters are extracted by using characteristics of the coefficients matrix of DWT. Such feature parameters as area, perimeter and a/p ratio are used obtained from DWT coefficients blocks. Secondly, fuzzy if - then rules that can be able to adapt the variety of surroundings are developed. In order to verify the performance of proposed scheme, In the middle of fuzzy inference, the Mamdani's and the Larsen 's implication operators are utilized. Experimental results showed that proposed scheme can be applied to the variety of surroundings.

  • PDF

A Study on Documentary Letter of Credit Transaction based on Import & Export Procedure

  • LEE, Jae-Sung
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.9 no.3
    • /
    • pp.15-28
    • /
    • 2021
  • Purpose -In the credit transaction, the issuing bank must examine the documents to pay the credit amount. In order to smoothly execute the credit transaction, document review is a key element, so the 5th revised credit unification rule specifically defines the document review procedure. Research design, data, and methodology - The document review procedure specified in the UCP Rules can be largely divided into the document review period and the rejection procedure for inconsistent documents. First of all, confusion was caused by the ambiguous regulation.. Result - With regard to the document review period, in the actual credit transaction, the issuing bank often negotiates with the issuing client about the waiver of the document inconsistency. Next, in the process of notifying the rejection of inconsistent documents, the issuing bank shall send the rejection notice. Conclusion - This study suggests that the requirement to list all inconsistencies makes it impossible for the issuing bank to further notify the refusal, thereby limiting the right to defend against inconsistencies not listed in the first refusal notice and consequently having the effect of matching them. In addition, the issuing bank's rejection notice is closely related to the beneficiary's exercise of the right to replenish documents.

Design of a Rule-Based Correlation Analyzer through Reducing Intrusion Alerts (침입경보 축약을 통한 규칙기반 연관관계 분석기 설계)

  • Lee, Seong-Ho;Kim, Min-Soo;Noh, Bong-Nam;Seo, Jung-Taek;Choi, Dae-Sik;Park, Eung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1091-1094
    • /
    • 2004
  • 전통적인 호스트 기반 침입탐지시스템과 네트워크 기반 침입탐지시스템은 각각 로그 데이터나 패킷 정보에서 단일 공격을 탐지하고 침입경보를 생성한다. 그러므로, 기존의 침입탐지시스템들은 침입경보간의 상호 연관성에 대한 정보가 부족하게 되고, 다수의 거짓 침입경보를 발생시킨다. 이를 해결하기 위해, 본 논문에서는 추론 규칙을 이용하는 침입경보 연관관계 시스템을 제안한다. 제안한 시스템은 침입경보 수집기, 침입경보 전처리기, 침입경보 연관관계 분석기로 구성되어 있다. 침입경보 수집기는 각 침입탐지시스템으로부터 필터링 과정을 거쳐 전송된 침입경보를 받아 침입경보 데이터베이스에 저장한다. 침입경보 전처리기는 불필요한 침입경보를 줄임으로써 침입경보 연관관계 분석의 효율성을 높인다. 마지막으로, 침입경보 연관관계 분석기는 추론 규칙을 이용하여 침입경보간의 상호연관성을 파악한다.

  • PDF

Design and Implementation of the Logistics Information synchronization Algorithm Based on Business Rule Engine (비즈니스 룰엔진 기반 물류정보 동기화 알고리즘 설계 및 구현)

  • Yeom, Hwa-Jin;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.385-388
    • /
    • 2013
  • 물류 고도화를 통한 기업 생산성 확보 및 생존 경쟁력 강화를 위해 기존의 공급망 관리(SCM) 기술에 RFID 기술을 융합함으로써 물품자동 인식, 물류정보 교환 및 추적 등의 지능화 서비스를 온라인상에서 실시간으로 제공할 수 있는 기술이 적용되고 있다. 하지만 물류정보 동기화 기술 개발 측면에서는 물류정보의 단순 가시화 시스템 개발 수준에 머물고 있는 것이 현실이고, 본격적인 확산을 위해 수집된 데이터 오류 검출 및 보정이라는 물류정보 동기화 기술 개발로 물류 시스템 운용 비용을 절감할 수 있다면 그 파급 효과가 매우 클 것이다. 지금까지는 RFID 인프라 기술 개발에 집중해 왔기에 물류정보 동기화 기술은 아직 초기 연구 단계에 머무르고 있다. 본 논문은 RFID 기반 공급망 상에서 발생할 수 있는 물류정보 동기 오류를 검출하고 보정할 수 있는 물류정보 동기화 알고리즘을 설계하고, 향후 공급망의 변화 및 확장 등의 이유로 알고리즘을 효율적으로 수정 보완할 수 있는 비즈니스 룰엔진 기반의 아키텍처를 구현하여 글로벌 물류 기업에 적용하고, 그 결과를 분석하여 물류정보 동기화 알고리즘과 구현 아키텍처의 효율성을 증명하였다.

Design of Efficient Intrusion Detection System using Man-Machine (Man-Mchine에 의한 효율적인 침입 탐지 시스템 설계)

  • Shin, Jang-Koon;Ra, Min-Young;Park, Byung-Ho;Choi, Byung-Kab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.39-52
    • /
    • 1996
  • Networking revolution provides users with data and resources sharing, distributed processing, and computer communication in cyberspace. However, users may use computers as a way of unauthorized access, system destruction, and leakage of the stored data. In recent trend, incresing of hacking instances which are from domestic as well as abroad reaches to the level of seriousness. It, therefore, is required to develop a secure system for the National Depense computing resources and deploy in practice in the working field as soon as possible. In this paper, we focuss on finding the security requirements of a network and designing Intrusion Detection System using statical intrusion detection and rule-based intrusion detection analysis through accumulating audit data.

Assessment of Korea's FTAs: Focusing on Trade Remedies Rules

  • Sohn, Ki-Youn
    • Journal of Korea Trade
    • /
    • v.24 no.7
    • /
    • pp.107-124
    • /
    • 2020
  • Purpose - We assess the trade remedies rules in a host of Korea's FTAs to explore the trade policies for the effective implementation of FTA trade remedies rules. Also we develop the strategies of the future FTA negotiations of trade remedies rules. Design/methodology - After we review the key features of FTA trade remedies rules, we examine whether the rules are WTO-consistent or not. Next, we touch upon the WTO-plus characteristics of some provisions. Our main methodology is to compare the trade remedies rules in the numerous Korea's FTAs. Another methodology is to link those rules to the relevant WTO agreements and WTO dispute cases with a view to drawing lessons for trade policies and FTA negotiations. Findings - We find that most of the trade remedies rules are WTO-consistent. Moreover, we find that notification and consultation requirment, mandatory lesser duty rule, explicit prohibition of zeroing method, and public interest clause are WTO-plus. We also find that there are limitiations in the application of some global safeguard exclusion rules because of their non-mandatory nature. Originality/value - While most of previous studies focus mainly on the unique aspects of specific FTAs, our study analyzes comprehensively the trade remedies rules in the various Korea's FTAs. Based on the comprehensive analysis, we figure out the areas to be clarified and improved for the effective implementation of FTAs and the strategies for the future FTA trade remedies negotiations. As a consequence, our paper is expected to contribute to the academic research on FTA policies as well as the national economy.