• Title/Summary/Keyword: transaction log

Search Result 62, Processing Time 0.025 seconds

Fuzzy Web Usage Mining for User Modeling

  • Jang, Jae-Sung;Jun, Sung-Hae;Oh, Kyung-Whan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.204-209
    • /
    • 2002
  • The interest of data mining in artificial intelligence with fuzzy logic has been increased. Data mining is a process of extracting desirable knowledge and interesting pattern ken large data set. Because of expansion of WWW, web data is more and more huge. Besides mining web contents and web structures, another important task for web mining is web usage mining which mines web log data to discover user access pattern. The goal of web usage mining in this paper is to find interesting user pattern in the web with user feedback. It is very important to find user's characteristic fer e-business environment. In Customer Relationship Management, recommending product and sending e-mail to user by extracted users characteristics are needed. Using our method, we extract user profile from the result of web usage mining. In this research, we concentrate on finding association rules and verify validity of them. The proposed procedure can integrate fuzzy set concept and association rule. Fuzzy association rule uses given server log file and performs several preprocessing tasks. Extracted transaction files are used to find rules by fuzzy web usage mining. To verify the validity of user's feedback, the web log data from our laboratory web server.

Analysis of Web Log for e-CRM on B2B of the Make-To-Order Company (수주생산기업 B2B에서 e-CRM을 위한 웹 로그 분석)

  • Go, Jae-Moon;Seo, Jun-Yong;Kim, Woon-Sik
    • IE interfaces
    • /
    • v.18 no.2
    • /
    • pp.205-220
    • /
    • 2005
  • This study presents a web log analysis model for e-CRM, which combines the on-line customer's purchasing pattern data and transaction data between companies in B2B environment of make-to-order company. With this study, the customer evaluation and the customer subdivision are available. We can forecast the estimate demands with periodical products sales records. Also, the purchasing rate per each product, the purchasing intention rate, and the purchasing rate per companies can be used as the basic data for the strategy for receiving the orders in future. These measures are used to evaluate the business strategy, the quality ability on products, the customer's demands, the benefits of customer and the customer's loyalty. And it is used to evaluate the customer's purchasing patterns, the response analysis, the customer's secession rate, the earning rate, and the customer's needs. With this, we can satisfy various customers' demands, therefore, we can multiply the company's benefits. And we presents case of the 'H' company, which has the make-to-order manufacture environment, in order to verify the effect of the proposal system.

Web Search Behavior Analysis Based on the Self-bundling Query Method (웹검색 행태 연구 - 사용자가 스스로 쿼리를 뭉치는 방법으로 -)

  • Lee, Joong-Seek
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.2
    • /
    • pp.209-228
    • /
    • 2011
  • Web search behavior has evolved. People now search using many diverse information devices in various situations. To monitor these scattered and shifting search patterns, an improved way of learning and analysis are needed. Traditional web search studies relied on the server transaction logs and single query instance analysis. Since people use multiple smart devices and their searching occurs intermittently through a day, a bundled query research could look at the whole context as well as penetrating search needs. To observe and analyze bundled queries, we developed a proprietary research software set including a log catcher, query bundling tool, and bundle monitoring tool. In this system, users' daily search logs are sent to our analytic server, every night the users need to log on our bundling tool to package his/her queries, a built in web survey collects additional data, and our researcher performs deep interviews on a weekly basis. Out of 90 participants in the study, it was found that a normal user generates on average 4.75 query bundles a day, and each bundle contains 2.75 queries. Query bundles were categorized by; Query refinement vs. Topic refinement and 9 different sub-categories.

Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server (Microsoft SQL Server 삭제 이벤트의 데이터 잔존 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.223-232
    • /
    • 2017
  • Previous research on data recovery in Microsoft SQL Server has focused on restoring data based on in the transaction log that might have deleted records exist. However, there was a limit that was not applicable if the related transaction log did not exist or the physical database file was not connected to Server. Since the suspect in the crime scene may delete the data records using a different deletion statements besides "delete", we need to check the remaining data and a recovery possibility of the deleted record. In this paper, we examined the changes "Page Allocation information" of the table, "Unallocation deleted data", "Row Offset Array" in the page according to "delete", "truncate" and "drop" events. Finally it confirmed the possibility of data recovery and availability of management tools in Microsoft SQL Server digital forensic investigation.

Using Cache Access History for Reducing False Conflicts in Signature-Based Eager Hardware Transactional Memory (시그니처 기반 이거 하드웨어 트랜잭셔널 메모리에서의 캐시 접근 이력을 이용한 거짓 충돌 감소)

  • Kang, Jinku;Lee, Inhwan
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.442-450
    • /
    • 2015
  • This paper proposes a method for reducing false conflicts in signature-based eager hardware transactional memory (HTM). The method tracks the information on all cache blocks that are accessed by a transaction. If the information provides evidence that there are no conflicts for a given transactional request from another core, the method prevents the occurrence of a false conflict by forcing the HTM to ignore the decision based on the signature. The method is very effective in reducing false conflicts and the associated unnecessary transaction stalls and aborts, and can be used to improve the performance of the multicore processor that implements the signature-based eager HTM. When running the STAMP benchmark on a 16-core processor that implements the LogTM-SE, the increased speed (decrease in execution time) achieved with the use of the method is 20.6% on average.

Why Should I Ban You! : X-FDS (Explainable FDS) Model Based on Online Game Payment Log (X-FDS : 게임 결제 로그 기반 XAI적용 이상 거래탐지 모델 연구)

  • Lee, Young Hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.25-38
    • /
    • 2022
  • With the diversification of payment methods and games, related financial accidents are causing serious problems for users and game companies. Recently, game companies have introduced an Fraud Detection System (FDS) for game payment systems to prevent financial incident. However, FDS is ineffective and cannot provide major evidence based on judgment results, as it requires constant change of detection patterns. In this paper, we analyze abnormal transactions among payment log data of real game companies to generate related features. One of the unsupervised learning models, Autoencoder, was used to build a model to detect abnormal transactions, which resulted in over 85% accuracy. Using X-FDS (Explainable FDS) with XAI-SHAP, we could understand that the variables with the highest explanation for anomaly detection were the amount of transaction, transaction medium, and the age of users. Based on X-FDS, we derive an improved detection model with an accuracy of 94% was finally derived by fine-tuning the importance of features that adversely affect the proposed model.

A Multimedia Recommender System Using User Playback Time (사용자의 재생 시간을 이용한 멀티미디어 추천 시스템)

  • Kwon, Hyeong-Joon;Chung, Dong-Keun;Hong, Kwang-Seok
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.111-121
    • /
    • 2009
  • In this paper, we propose a multimedia recommender system using user's playback time. Proposed system collects multimedia content which is requested by user and its user‘s playback time, as web log data. The system predicts playback time.based preference level and related contents from collected transaction database by fuzzy association rule mining. Proposed method has a merit which sorts recommendation list according to preference without user’s custom preference data, and prevents a false preference. As an experimental result, we confirm that proposed system discovers useful rules and applies them to recommender system from a transaction which doesn‘t include custom preferences.

  • PDF

Does Loss-Leader Pricing Work in Online Shopping Malls?

  • Yeum Dai-Sung;Chae Myungsin;Kim Ji-Young
    • Management Science and Financial Engineering
    • /
    • v.11 no.3
    • /
    • pp.95-107
    • /
    • 2005
  • As online shopping malls have emerged as a substantial shopping channel, they have used various sales promotion strategies to acquire new customers. Most of these strategies have been applied by offline malls for years. One, loss-leader pricing, is a type of promotional pricing in which stores sell well known products below their marginal cost, in order to attract customers and induce them to purchase more goods through impulse buying. This strategy is based on the expectation that customers will factor transaction costs into their purchasing decisions. However, its application to online malls fails to recognize that transaction costs are lower online, and that customers will behave differently as a result. Our study predicts that loss-leader pricing will not work online because online malls entail lower searching and moving costs than offline malls The study examines the effectiveness of loss-leader pricing with empirical data from a survey as well as log data from a Korean online shopping mall. The results show that while loss-leader pricing does attract customers to online shopping malls, it encourages cherry-picking rather than impulse purchases of regular-price goods.

Design of ALTIBASE(TM) Storage Manager for High Performance and High Availability (고성능 고가용성을 위한 ALTIBASE(TM) 자료저장 관리기의 설계)

  • Jeong, Gwang-Cheol;Lee, Gyu-Ung;Bae, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.949-960
    • /
    • 2003
  • Main memory database systems use the different implementation techniques to sturucture and organize the user dta and system catalogs, since traditional database systems are optimized for the characteristics of disk storage environment. We present, in this paper, the design considerations for our main memory database system $ALTIBASE^{TM}$ that is currently applied to the time-critical applications. We focus on the design issues of storage manager in $ALTIBASE^{TM}$. The major components are introduced, and features and characteristics of transaction management and recovery method are described. We also present the database replication mechanism and its conflict resolution mechanism for high availability and performance. In order to evaluate our transaction performance, we show various experimental reports as measured by the TPS.

Application Performance Evaluation in Main Memory Database System (메인메모리 데이터베이스시스템에서의 어플리케이션 성능 평가)

  • Kim, Hee-Wan;Ahn, Yeon S.
    • Journal of Digital Contents Society
    • /
    • v.15 no.5
    • /
    • pp.631-642
    • /
    • 2014
  • The main memory DBMS is operated which the contents of the table that resides on a disk at the same time as the drive is in the memory. However, because the main memory DBMS stores the data and transaction log file using the disk file system, there are a limit to the speed at which the CPU accesses the memory. In this paper, I evaluated the performance through analysis of the application side difference the technology that has been implemented in Altibase system of main memory DBMS and Sybase of disk-based DBMS. When the application performance of main memory DBMS is in comparison with the disk-based DBMS, the performance of main memory DBMS was outperformed 1.24~3.36 times in the single soccer game, and was outperformed 1.29~7.9 times in the soccer game / special soccer. The result of sale transaction response time showed a fast response time of 1.78 ~ 6.09 times.