• Title/Summary/Keyword: sequential pattern analysis

Search Result 113, Processing Time 0.029 seconds

Adapted Sequential Pattern Mining Algorithms for Business Service Identification (비즈니스 서비스 식별을 위한 변형 순차패턴 마이닝 알고리즘)

  • Lee, Jung-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.87-99
    • /
    • 2009
  • The top-down method for SOA delivery is recommended as a best way to take advantage of SOA. The core step of SOA delivery is the step of service modeling including service analysis and design based on ontology. Most enterprises know that the top-down approach is the best but they are hesitant to employ it because it requires them to invest a great deal of time and money without it showing any immediate results, particularly because they use well-defined component based systems. In this paper, we propose a service identification method to use a well-defined components maximally as a bottom-up approach. We assume that user's inputs generates events on a GUI and the approximate business process can be obtained from concatenating the event paths. We first find the core GUIs which have many outgoing event calls and form event paths by concatenating the event calls between the GUIs. Next, we adapt sequential pattern mining algorithms to find the maximal frequent event paths. As an experiment, we obtained business services with various granularity by applying a cohesion metric to extracted frequent event paths.

Sequential movement of the caisson on soft clays in the construction of the port (연약 지반 지역의 항만 시공 단계에 따른 케이슨 변위 거동)

  • Choo, Yoon-Sik;Jung, Young-Hoon;Hwang, Se-Hwan;Chung, Choong-Ki
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.03a
    • /
    • pp.199-209
    • /
    • 2009
  • The movement of the caisson used to construct a wharf front can affect functional performance of the port. Sequential movement of caissons at each stage of the construction is essential in the overall design as well as the stability of the port. It is common that back-analysis using the previous measurement is performed to predict the caisson movement, while there is no intensive study on sequential movement of the caissons according to the construction stage. In the study, we analyzed the pattern of the movement of caissons as a port is constructed. To simulate the construction of the port, the finite element method (FEM) is employed. The computed result shows that the caisson moves differently at each construction stage. When the caisson is being installed, the displacement of the caisson takes place mainly in vertical direction. In next stage of filling rocks behind the caisson, the top of the caisson move toward shore, while the bottom moves toward sea, thus rotating the caisson. The maximum rotation of the caisson takes place in the stage of filling rocks behind the caisson.

  • PDF

Determination of Object Similarity Closure Using Shared Neighborhood Connectivity

  • Radhakrishnan, Palanikumar;Arokiasamy, Clementking
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.41-44
    • /
    • 2014
  • Sequential object analysis are playing vital role in real time application in computer vision and object detections.Measuring the similarity in two images are very important issue any authentication activities with how best to compare two independent images. Identification of similarities of two or more sequential images is also the important in respect to moving of neighborhoods pixels. In our study we introduce the morphological and shared near neighborhoods concept which produces a sufficient results of comparing the two images with objects. Considering the each pixel compare with 8-connectivity pixels of second image. For consider the pixels we expect the noise removed images are to be considered, so we apply the morphological transformations such as opening, closing with erosion and dilations. RGB of pixel values are compared for the two sequential images if it is similar we include the pixels in the resultant image otherwise ignore the pixels. All un-similar pixels are identified and ignored which produces the similarity of two independent images. The results are produced from the images with objects and gray levels. It produces the expected results from our process.

Design and Implementation of a USN Middleware for Context-Aware and Sensor Stream Mining

  • Jin, Cheng-Hao;Lee, Yang-Koo;Lee, Seong-Ho;Yun, Un-il;Ryu, Keun-Ho
    • Spatial Information Research
    • /
    • v.19 no.1
    • /
    • pp.127-133
    • /
    • 2011
  • Recently, with the advances in sensor techniques and net work computing, Ubiquitous Sensor Network (USN) has been received a lot of attentions from various communities. The sensor nodes distributed in the sensor network tend to continuously generate a large amount of data, which is called stream data. Sensor stream data arrives in an online manner so that it is characterized as high-speed, real-time and unbounded and it requires fast data processing to get the up-to-date results. The data stream has many application domains such as traffic analysis, physical distribution, U-healthcare and so on. Therefore, there is an overwhelming need of a USN middleware for processing such online stream data to provide corresponding services to diverse applications. In this paper, we propose a novel USN middleware which can provide users both context-aware service and meaningful sequential patterns. Our proposed USN middleware is mainly focused on location based applications which use stream location data. We also show the implementation of our proposed USN middleware. By using the proposed USN middleware, we can save the developing cost of providing context aware services and stream sequential patterns mainly in location based applications.

Biped robot gait pattern generation using frequency feature of human's gait torque analysis (인간의 보행 회전력의 주파수 특징 분석을 이용한 이족로봇의 적응적 보행 패턴 생성)

  • Ha, Seung-Suk;Han, Young-Joon;Hahn, Hern-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.100-108
    • /
    • 2008
  • This paper proposes a method of adaptively generating a gait pattern of biped robot. The gait synthesis is based on human's gait pattern analysis. The proposed method can easily be applied to generate the natural and stable gait pattern of any biped robot. To analyze the human's gait pattern, sequential images of the human's gait on the sagittal plane are acquired from which the gait control values are extracted. The gait pattern of biped robot on the sagittal plane is adaptively generated by a genetic algorithm using the human's gait control values. However, galt trajectories of the biped robot on the sagittal Plane are not enough to construct the complete gait pattern because the bided robot moves on 3-dimension space. Therefore, the gait pattern on the frontal plane, generated from Zero Moment Point (ZMP), is added to the gait one acquired on the sagittal plane. Consequently, the natural and stable walking pattern for the biped robot is obtained.

The Process of Modernization of the Site Plan and Plan of Conventional Rural Houses - Based on the Houses in SamGa Village, YongIn County Kying-gi Province - (주택의 배치 및 평면의 변화를 중심으로 본 재래식 농촌주택의 근대화 과정에 관한 연구 - 경기도 용인군 용인읍 삼가 1,3리 마을 주택을 중심으로 -)

  • Kim, Sung Woo;Lee, You Mee
    • Journal of architectural history
    • /
    • v.4 no.1
    • /
    • pp.79-92
    • /
    • 1995
  • The study is about the process of modernization of conventional rural houses in Kyung-gi province. It alms to identify the pattern of change, particularly focusing on the changes of the site plan and plan. The site of study is Samga Village, in YongIn County, near Seoul. The study discusses the process of modernization during the three decades from 1960 to 1980. The basic information was obtained through field research and site analysis, and the study relies predominatly on observational and statistical analysis. Four developmental stages can be clearly identified which are ; (1) Traditional type, (2)Modified-traditional type, (3) Saemaul type, and (4) The type of urban houses. The analysis was done through identification of changing site plan and plan. It is interesting to note that the changes of these elements show a certain pattern of sequential steps which also can be classified according to the four developmental stages mentioned above. The pattern of site design was consistantly maintained while plan and building system became very different However, the process of modernization of Korean rural houses was the process of producing a certain type of architecture that is not universal but uniquely Korean.

  • PDF

Performance analysis tool for reinforced concrete members

  • Esmaeily, Asad;Peterman, Robert J.
    • Computers and Concrete
    • /
    • v.4 no.5
    • /
    • pp.331-346
    • /
    • 2007
  • A computer program was developed to analyze the non-linear, cyclic flexural performance of reinforced concrete structural members under various types of loading paths including non-sequential variations in axial load. This performance is significantly affected by the loading history. Different monotonic material models as well as hysteresis rules for confined and unconfined concrete and steel, some developed and calibrated against test results on material samples, were implemented in a fiber-based moment-curvature and in turn force-deflection analysis. One of the assumptions on curvature distribution along the member was based on a method developed to address the variation of the plastic hinge length as a result of loading pattern. Functionality of the program was verified by reproduction of analytical results obtained by others for several cases, and accuracy of the analytical process and the implemented models were evaluated against the experimental results from large-scale reinforced concrete columns tested under the analyzed loading cases. While the program can be used to predict the response of a member under a certain loading pattern, it can also be used to examine various analytical models and methods or refine a custom material model against test data.

Analysis of Traffic Card Big Data by Hadoop and Sequential Mining Technique (하둡과 순차패턴 마이닝 기술을 통한 교통카드 빅데이터 분석)

  • Kim, Woosaeng;Kim, Yong Hoon;Park, Hee-Sung;Park, Jin-Kyu
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.4
    • /
    • pp.187-196
    • /
    • 2017
  • It is urgent to prepare countermeasures for traffic congestion problems of Korea's metropolitan area where central functions such as economic, social, cultural, and education are excessively concentrated. Most users of public transportation in metropolitan areas including Seoul use the traffic cards. If various information is extracted from traffic big data produced by the traffic cards, they can provide basic data for transport policies, land usages, or facility plans. Therefore, in this study, we extract valuable information such as the subway passengers' frequent travel patterns from the big traffic data provided by the Seoul Metropolitan Government Big Data Campus. For this, we use a Hadoop (High-Availability Distributed Object-Oriented Platform) to preprocess the big data and store it into a Mongo database in order to analyze it by a sequential pattern data mining technique. Since we analysis the actual big data, that is, the traffic cards' data provided by the Seoul Metropolitan Government Big Data Campus, the analyzed results can be used as an important referenced data when the Seoul government makes a plan about the metropolitan traffic policies.

Identification of Unknown Cryptographic Communication Protocol and Packet Analysis Using Machine Learning (머신러닝을 활용한 알려지지 않은 암호통신 프로토콜 식별 및 패킷 분류)

  • Koo, Dongyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.193-200
    • /
    • 2022
  • Unknown cryptographic communication protocols may have advantage of guaranteeing personal and data privacy, but when used for malicious purposes, it is almost impossible to identify and respond to using existing network security equipment. In particular, there is a limit to manually analyzing a huge amount of traffic in real time. Therefore, in this paper, we attempt to identify packets of unknown cryptographic communication protocols and separate fields comprising a packet by using machine learning techniques. Using sequential patterns analysis, hierarchical clustering, and Pearson's correlation coefficient, we found that the structure of packets can be automatically analyzed even for an unknown cryptographic communication protocol.

A Clinical Analysis of Atherosclerosis Obliterance in the Lower Extremity (폐쇄성 하지 동맥 경화증의 임상적 고찰)

  • 김종만
    • Journal of Chest Surgery
    • /
    • v.23 no.2
    • /
    • pp.333-341
    • /
    • 1990
  • aortoiliac pattern, Group II; femoropopliteal pattern and Group g; tibioperoneal pattern. A majority of patients belonged to group I [27 cases], 8 patients came under group II .and none in group g. Thirty patients underwent bypass operation with autogenous saphenous vein or synthetic graft with or without concomitant lumbar sympathectomy. Remaining 5 patients were operated on with sympathectomy only, Bypass procedures were anatomic bypass in 22 cases: aortoiliac artery bypass in 11 cases, femoropopliteal artery bypass in 10 cases, sequential femoropopliteal artery bypass in one case and extra-anatomic bypass in 8 cases, axillary-bifemoral artery bypass in one case and femorofemoral artery bypass in 7 cases. Postoperative complications which mainly composed of superficial wound infection[5 cases] which were treated without any significant sequel in all cases and thrombosis[2 cases]. Three patients died whose causes of death were acute renal failure in 2 cases and myocardial infarction in other, The overall patency, rate was 70Zo in 5 years. In conclusion, the clinical pattern and operative outcome were similar to he western pattern and all cases of death did not related to operative procedures and ischemic symptoms were relieved by bypass operations except several cases. I think and recommend that all patients suffering chronic arterial insufficiency by atherosclerosis obliterans ought to be managed with urgent and adequate operative procedure.

  • PDF