• Title/Summary/Keyword: usage patterns

Search Result 665, Processing Time 0.027 seconds

Detection of Potential Invalid Function Pointer Access Error based on Assembly Codes (어셈블리어 코드 기반의 Invalid Function Pointer Access Error 가능성 검출)

  • Kim, Hyun-Soo;Kim, Byeong-Man
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.938-941
    • /
    • 2010
  • Though a compiler checks memory errors, it is difficult for the compiler to detect function pointer errors in code level. Thus, in this paper, we propose a method for effectively detecting Invalid function pointer access errors, by analyzing assembly codes that are obtained by disassembling an executable file. To detect the errors, assembly codes in disassembled files are checked out based on the instruction transition diagrams which are constructed through analyzing normal usage patterns of function pointer access. When applying the proposed method to various programs having no compilation error, a total of about 500 potential errors including the ones of well-known open source programs such as Apache web server and PHP script interpreter are detected among 1 million lines of assembly codes corresponding to a total of about 10 thousand functions.

  • PDF

Credit Card Bad Debt Prediction Model based on Support Vector Machine (신용카드 대손회원 예측을 위한 SVM 모형)

  • Kim, Jin Woo;Jhee, Won Chul
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.233-250
    • /
    • 2012
  • In this paper, credit card delinquency means the possibility of occurring bad debt within the certain near future from the normal accounts that have no debt and the problem is to predict, on the monthly basis, the occurrence of delinquency 3 months in advance. This prediction is typical binary classification problem but suffers from the issue of data imbalance that means the instances of target class is very few. For the effective prediction of bad debt occurrence, Support Vector Machine (SVM) with kernel trick is adopted using credit card usage and payment patterns as its inputs. SVM is widely accepted in the data mining society because of its prediction accuracy and no fear of overfitting. However, it is known that SVM has the limitation in its ability to processing the large-scale data. To resolve the difficulties in applying SVM to bad debt occurrence prediction, two stage clustering is suggested as an effective data reduction method and ensembles of SVM models are also adopted to mitigate the difficulty due to data imbalance intrinsic to the target problem of this paper. In the experiments with the real world data from one of the major domestic credit card companies, the suggested approach reveals the superior prediction accuracy to the traditional data mining approaches that use neural networks, decision trees or logistics regressions. SVM ensemble model learned from T2 training set shows the best prediction results among the alternatives considered and it is noteworthy that the performance of neural networks with T2 is better than that of SVM with T1. These results prove that the suggested approach is very effective for both SVM training and the classification problem of data imbalance.

Distributed REID Information Service Architecture for Ubiquitous Logistics (유비쿼터스 물류를 위한 분산형 RFID 정보서비스 구조)

  • Lee, Jae-Won;Lee, Young-Koo
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.105-121
    • /
    • 2005
  • To realize a ubiquitous logistics management system using the smart object of Electronic Product Code(EPC) enabled RFID tag, the design and management of RFID Information Service is very important. RFID Information Service searches, transfers and responds to the other's PML request, but Physical Markup Language (PML) data management between trading system elements has issues of standardization of PML data description and processing, and problems of data traffic and communication time overload because of the innate distributed characteristics. As a complementary study, this research analyzes the usage patterns and data types of PML. On that analysis we provide a design of the distributed RFID Information Service architecture of PML data management that is using DB middleware. Standalone and Integrated type of RFID IS were proposed.

  • PDF

Technology Sourcing Strategies and Cooperative Patterns in Vertical Cooperative R&D Projects (공동연구수행체제 및 참여기업의 기술획득전략-유형별 기업화성과 분석-)

  • 이철원;배종태
    • Journal of Technology Innovation
    • /
    • v.3 no.1
    • /
    • pp.1-34
    • /
    • 1995
  • Since 1982, the government of Korea has actively promoted vertical cooperative R&D programs between government-sponsored research institutes (GRIs) and private firms. A number of firms participated in the programs because cooperative R&D could lower the risk and could contribute to rapid commercialization of many technologies. This paper examines the effectiveness of vertical cooperative R&D projects by the modes of cooperation between GRIs and industrial firms, and analyzes the performance of participating firms' technology sourcing strategies for commercial utilization of cooperative R&D results at the project performed from 1982 to 1989 under the Government-Industry Cooperative R&D Program sponsored by the Ministry of Science and Technology(MOST) in Korea. The cooperative R&D projects are classified into 4 groups by two criteria, i.e., the level of participation of firms, and the breadth of cooperation. The findings suggest that firms should actively participate in cooperative R&D projects. In addition, in order to enhance commercial success, cooperation between GRIs and industrial firms should not be limited to R&D stage only. The breadth of cooperation should be extended to commercialization stage. Small- and medium-sized firms participating in vertical cooperative R&D projects in Korea usually lack internal technological capabilities that are needed to commercialize the results of cooperative R&D. Three different technology sourcing strategies - exclusive cooperative R&D strategy, in-house development augmented cooperative R&D strategy, and licensing-in supplemented cooperative R&D strategy - are empirically derived through cluster analysis of the relative usage rates cooperative R&D and of other supplementary technology acquisition methods. The findings suggest that the firms participating in vertical cooperative R&D projects should try to utilize other supplementary technology acquisition methods in order to achieve commercial utilization of the vertical cooperative R&D results.

  • PDF

An Exploratory Study on Buyer-Supplier Relationship in B2B with Internet (기업간 인터넷 전자상거래에서 구매자와 공급자간의 관계 형성에 관한 탐색적 연구: 건설부문 사례를 중심으로)

  • Kim, Hyo-Gun;Cho, Hyung-Seung;Choi, In-Young
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.169-182
    • /
    • 2003
  • The growth of electronic commerce make business to business electronic commerce market grow dramatically due to dramatic decrease of transaction cost and increase of productivity. It also influences the way of building transaction relationship between buyers and suppliers. This study tends to prove electronic market theory for Internet based 13213 commerce. We observe and analyze the implementation and usage patterns of procurement system of I company. The result shows that even through Internet enable many buyers and suppliers to participate and transact each other, the transaction pattern is different according to asset specificity and uncertainty as follows. First, with adoption of internet, the product with the higher asset specificity rather than lower asset specificity can be easily purchased. Second, Internet doesn't make any significant influence on the transaction of the product with higher uncertainty. But, organization's pre-audit process can indirectly influence on the decrease of the transaction uncertainty.

Investigation into Industrial Application of Creative Knowledge Creation Model Using Whole Brain Theory and Creative Thinking Tools (전뇌 이론과 창의적 사고 도구를 활용한 창의적 지식 창출 모형의 산업적 적용에 관한 연구)

  • Jo, JooHyung;Yang, DongYol;Choi, ByoungKyu
    • Knowledge Management Research
    • /
    • v.6 no.2
    • /
    • pp.1-22
    • /
    • 2005
  • Knowledge is recognized as the most important asset among enterprises. Therefore, the necessity of knowledge management is ever on the increase nowadays. While many people have endeavored to develop knowledge storage, sharing and usage, knowledge creation is not sufficiently investigated for practical application, because knowledge creation is largely related to creativity and difficult to establish a systematic methodology. In order to overcome such problems, the creative knowledge creation model is proposed by using the whole brain theory and creative thinking tools. First of all, the creative knowledge creation model is based on the Nonaka's knowledge creation model integrated with the whole brain theory. The whole brain theory is then used as a standard to organize a whole brain team that is composed of members who have diverse thinking patterns. For creative thinking tools, the mandal-art and the contradiction matrix of TRIZ are used for a knowledge conversion. Each process of the creative knowledge creation model is sequentially suggested and several terms are defined. In order to verify the effectiveness of the creative knowledge creation model, the proposed model is applied to the development of a dishwasher with a new concept. According to the order of the proposed method, the model is applied twice in the cycle of spiral evolution. Three kinds of dish-washing methods have been developed using the proposed model. The results of the application are then analyzed and presented.

  • PDF

Project Work and Asynchronous Voice Communication (프로젝트 작업과 비실시간 음성 커뮤니케이션)

  • Kim Min-Kyung;Kim Hee-Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.681-690
    • /
    • 2006
  • With the rapid development of network and multimedia technologies, computer mediated communication has been realized and there has been a great potential to use and research on asynchronous voice communication systems. This paper reports a case study where 6 groups(3 for documentation work, 3 for software development) of 24 people who used voice mail when carrying out their projects. The purpose of this study is to obtain an overall understanding of usability of voice mail which is a typical example of asynchronous voice communication systems, under a particular situation where project works are performed. Through the study, we came to understand general purposes of usage of voice mail, patterns of using it revealed during the project process, different ways of using it according to different types of projects, and reasons why people are currently not likely to use voice mail. The results hopefully provide systems developers with a guideline to understand the nature of voice mail from users' perspectives.

  • PDF

A Research on the Format for Romanization of Korean Personal Name (한국인명의 로마자표기 형식에 대한 연구)

  • Kim, Sung-Won;Kim, Jeong-Woo
    • Journal of Information Management
    • /
    • v.43 no.2
    • /
    • pp.199-222
    • /
    • 2012
  • Due to the increase of international business and activities, Koreans nowadays have higher needs to present their personal identity to the foreigners. In this process, the first requirement is to exchange personal names with foreigners. Therefore, the phonetic translation of Korean names into Roman alphabetic notation is frequently required, in order to deliver Korean personal names to the people who do not understand Korean alphabet. However, some confusions have been witnessed in the way of transforming Korean names into Roman (English) alphabet notation, due to the fact that there are many different ways to put Korean pronunciation into Roman (English) alphabet. This study examines different formats of Romanization of Korean personal names to find and suggest an optimal one. It first examines structures of and differences between Korean and Western personal names and usage patterns, reviews the issues surrounding Romanization of Korean personal names, and patternizes diverse Romanization formats currently used. Based on these examinations and consequent findings, I would like to suggest a format for the Romanization of Korean personal names which is considered to be the best.

Wavelet-based Electronic Watermarking Algorithm for Digital Holography Interference Patterns (디지털 홀로그래피 간섭패턴을 위한 웨이블릿 기반의 전자적인 워터마킹 알고리듬)

  • Choi, Hyun-Jun;Seo, Young-Ho;Wi, Sung-Min;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1751-1758
    • /
    • 2008
  • Digital holography interference pattern generated by a computer calculation (CGH) is one of the most expensive contents and its usage is being expanded. Thus, it is highly necessary to protect the ownership of digital hologram. In this paper a hologram-domain and a frequency-domain electronic watermarking schemes were proposed. The hologram-domain scheme was only to compare the results to the ones from frequency-domain scheme and the frequence-domain scheme used 2-dimensional against the attaks. Especially the MDWT-domain scheme was very high robustness such that th error ratio at the worst case was only 3%. Thus, we expect that it is used as a good watermarking scheme of digital hologram with high performance.

Health Risk Behaviors Associated with Smoking Experiences in Adolescence (일부지역 청소년들의 흡연실태 및 흡연관련 건강위험행위)

  • Kim, Jae-Hee
    • Journal of the Korean Society of School Health
    • /
    • v.20 no.1
    • /
    • pp.77-90
    • /
    • 2007
  • Purpose : This study identified the patterns of smoking of students attending middle schools and high schools, and analyzed its related health risk behaviors. Methods: The data was based on the survey of 1,517 middle students and 911 high students residing in Kyung-Gi district. Results: The current smoking rates of male and female middle students are 5.3%, and 3.1% respectively. The rates of experiences in smoking are 21.4% and 16.0%(male/female). The current smoking rates of male and female high students are 17.9% and 8.5%, whereas the rates of experiences in smoking are 34.2% and 23.3% respectively. On the other hands, 14.1% of middle students and 12.0% of high students were exposed to smoking for at least 2 hours per day. The majority of middle and high school smokers started smoking when they were in middle or high school. And the most popular places to smoke were children's playgrounds, public open area., parks, and so on. Whether having a smoker as a friend or not and students' own perception towards smoking influenced the decisions to smoke for middle and high students. Both middle and high students, regardless of their gender, who have higher rates of drinking experiences and the hours of computer usage were found to have higher rates of smoking experiences. Meanwhile, the sleeping hours is in reverse proportion to the rate of smoking experiences. There was statistically significant difference in smoking experiences related to the degree of obesity only in the female high students: underweight and overweight students showed higher rates of smoking experiences than those falling in the normal weight range. Conclusion: For the effective prevention of adolescence smoking, it is necessary to adopt a comprehensive approach, which classifies the target population according to their age and sex and cover all health risk behaviors.