|
|
|
|
Å°¿öµå : |
|
|
¼Ò°³±Û |
Á¦72ȸ_Á¤º¸°ü¸®±â¼ú»ç |
¿ä¾à |
2004³âµµ ±â¼ú»ç Á¦72ȸ ºÐ¾ß : Á¤º¸Ã³¸® ÀÚ°ÝÁ¾¸ñ : Á¤º¸°ü¸®
<Á¦ 1 ±³ ½Ã>
¡Ø ´ÙÀ½ 13¹®Á¦Áß 10¹®Á¦¸¦ ¼±ÅÃÇÏ¿© ¼³¸íÇϽʽÿÀ. (°¢10Á¡) 1. ¾Æ·¡ÀÇ ½ºÅ°¸¶¿¡¼ µ¿¸íÀÌÀÎÀÌ ¾ø´Ù´Â °¡Á¤ÇÏ¿¡ Å°(Key)ÀÇ Á¾·ù¸¦ ¿¹¸¦ µé¾î¼ ¼³¸íÇϽÿÀ. <»ç ¿ø> <ºÎ ¼> <»ç ¹ø><Áֹεî·Ï ¹ø È£><ÀÌ ¸§><Àü °ø><¼º º°><ºÎ¼ÄÚµå><><ºÎ¼ÄÚµå><ºÎ¼¸í> 2. ÇÔ¼öÀû Á¾¼Ó¼º(Functional Dependency)¿¡ ´ëÇÏ¿© ¼³¸íÇϽÿÀ. 3. ÄÄÆ÷³ÍÆ®(Component)¿Í ¸ðµâ(Module)ÀÇ Â÷ÀÌÁ¡À» ¼³¸íÇϽÿÀ. 4. Actor¿Í Use Case°£ÀÇ °ü°èÁß, Æ÷ÇÔ(Include), È®Àå(Extend), ÀϹÝÈ(Generalization)¿¡ ´ëÇÏ¿© ¼³¸íÇϽÿÀ. 5. S/W(Soft Ware) Çü»ó °ü¸®Áß ±âÁؼ±(Baseline)¿¡ ´ëÇÏ¿© ¼³¸íÇϽÿÀ. 6. ¾ÏÈ£È ¾Ë°í¸®ÁòÀÎ DES(Data Encryption standard)¸¦ ¼³¸íÇϽÿÀ. 7. ÅëÇÕ ÇÁ·Î¼¼½º °ü¸®(Integrated Process Management)¸¦ ¼³¸íÇϽÿÀ. 8. Stream Data Mining(½ºÆ®¸² DM) ¾Ë°í¸®Áò °³¹ß¿¡ »ç¿ëµÇ´Â ±â¹ýÀ» ¼³¸íÇϽÿÀ. 9. ºñ´ëĪÇü ¾ÏÈ£ ¾Ë°í¸®ÁòÀÎ DSA(Digital Signature Algorithm)¿¡ ´ëÇØ ¼³¸íÇϽÿÀ. 10. ³×Æ®¿öÅ©ÀÇ Power(Èû, °¡Ä¡)¸¦ Ç¥½ÃÇÏ´Â ¸äÄ®ÇÁ(Metcalfe)ÀÇ ¹ýÄ¢À» ¼³¸íÇϽÿÀ. 11. ÀÎÅͳݻ󿡼ÀÇ ÇൿÀÎ ½ºÆÔ(Spamming)°ú Ç÷¹¹Ö(Flaming)À» ¼³¸íÇϽÿÀ. 12. PRM(Partner Relationship Management)ÀÇ Æ¯¼ºÀ» ¼³¸íÇϽÿÀ. 13. ÆÛÁöÁýÇÕ(Fuzzy Set)A¿¡ ´ëÇÑ ÁöÁöÁýÇÕ(Support Set) Supp(A)´Â Supp(A)= ¥ö Exl¥ìA(¥ö)>0ÀÌ´Ù. A{1.0/1, 0.2, 0.5/3 |
|
|
|
|
À§ Á¤º¸¹× °Ô½Ã¹° ³»¿ëÀÇ Áø½Ç¼º¿¡ ´ëÇÏ¿© º¸ÁõÇÏÁö ¾Æ´ÏÇϸç, ÇØ´ç Á¤º¸ ¹× °Ô½Ã¹° ÀúÀ۱ǰú ±âŸ ¹ýÀû Ã¥ÀÓÀº ÀÚ·á µî·ÏÀÚ¿¡°Ô ÀÖ½À´Ï´Ù. À§ Á¤º¸¹× °Ô½Ã¹° ³»¿ëÀÇ ºÒ¹ýÀû ÀÌ¿ë, ¹«´ÜÀüÀç¹× ¹èÆ÷´Â ±ÝÁöµÇ¾î ÀÖ½À´Ï´Ù. ÀúÀÛ±ÇħÇØ, ¸í¿¹ÈÑ¼Õ µî ºÐÀï¿ä¼Ò ¹ß°ß½Ã ÇÏ´ÜÀÇ ÀúÀÛ±Ç Ä§ÇØ½Å°í¸¦ ÀÌ¿ëÇØ Áֽñ⠹ٶø´Ï´Ù. |
|