• Title/Summary/Keyword: 접근제어 모델

Search Result 520, Processing Time 0.029 seconds

The Control Model and The Authentication Model for a Virtual Computing Environment (가상환경을 위한 제어모델과 인증모델)

  • Yoo, Jin-Ho;Lee, Byoung-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.5107-5112
    • /
    • 2010
  • This paper is related to the access to the control platform who manages their resources on the virtual environment. The computing performance of hardware supersedes the computing performance human demands. In this case, making the platform on the virtual computing environment has been developed for the usage of computing resource's residues which is available. This virtual computing environment is quite similar with the real environment in aspect of some functions but is quite different with that in aspect of the real configurations. This paper found that the virtual computing environment has another problems besides the problems the real computer might be happening. This paper found that the virtual environment needs the proper control platform. This paper will suggest a control platform for managing the virtual computing environment properly.

Control-Path Driven Process-Group Discovery Framework and its Experimental Validation for Process Mining and Reengineering (프로세스 마이닝과 리엔지니어링을 위한 제어경로 기반 프로세스 그룹 발견 프레임워크와 실험적 검증)

  • Thanh Hai Nguyen;Kwanghoon Pio Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.51-66
    • /
    • 2023
  • In this paper, we propose a new type of process discovery framework, which is named as control-path-driven process group discovery framework, to be used for process mining and process reengineering in supporting life-cycle management of business process models. In addition, we develop a process mining system based on the proposed framework and perform experimental verification through it. The process execution event logs applied to the experimental effectiveness and verification are specially defined as Process BIG-Logs, and we use it as the input datasets for the proposed discovery framework. As an eventual goal of this paper, we design and implement a control path-driven process group discovery algorithm and framework that is improved from the ρ-algorithm, and we try to verify the functional correctness of the proposed algorithm and framework by using the implemented system with a BIG-Log dataset. Note that all the process mining algorithm, framework, and system developed in this paper are based on the structural information control net process modeling methodology.

Missing Value Estimation and Sensor Fault Identification using Multivariate Statistical Analysis (다변량 통계 분석을 이용한 결측 데이터의 예측과 센서이상 확인)

  • Lee, Changkyu;Lee, In-Beum
    • Korean Chemical Engineering Research
    • /
    • v.45 no.1
    • /
    • pp.87-92
    • /
    • 2007
  • Recently, developments of process monitoring system in order to detect and diagnose process abnormalities has got the spotlight in process systems engineering. Normal data obtained from processes provide available information of process characteristics to be used for modeling, monitoring, and control. Since modern chemical and environmental processes have high dimensionality, strong correlation, severe dynamics and nonlinearity, it is not easy to analyze a process through model-based approach. To overcome limitations of model-based approach, lots of system engineers and academic researchers have focused on statistical approach combined with multivariable analysis such as principal component analysis (PCA), partial least squares (PLS), and so on. Several multivariate analysis methods have been modified to apply it to a chemical process with specific characteristics such as dynamics, nonlinearity, and so on.This paper discusses about missing value estimation and sensor fault identification based on process variable reconstruction using dynamic PCA and canonical variate analysis.

Mobile Transaction Processing in Hybrid Broadcasting Environment (복합 브로드캐스팅 환경에서 이동 트랜잭션 처리)

  • 김성석;양순옥
    • Journal of KIISE:Databases
    • /
    • v.31 no.4
    • /
    • pp.422-431
    • /
    • 2004
  • In recent years, different models in data delivery have been explored in mobile computing systems. Particularly, there were a lot of research efforts in the periodic push model where the server repetitively disseminates information without explicit request. However, average waiting time per data operation highly depends on the length of a broadcast cycle and different access pattern among clients may deteriorate the response time considerably. In this case, clients are preferably willing to send a data request to the server explicitly through backchannel in order to obtain optimal response time. We call the broadcast model supporting backchannel as hybrid broadcast. In this paper, we devise a new transaction processing algorithm(O-PreH) in hybrid broadcast environments. The data objects which the server maintains are divided into Push_Data for periodic broadcasting and Pull_Data for on-demand processing. Clients tune in broadcast channel or demand the data of interests according to the data type. Periodic invalidation reports from the server support maintaining transactional consistency. If one or more conflicts are found, conflict orders are determined not to violate the consistency(pre-reordering) and then the remaining operations have to be executed pessimistically. Through extensive simulations, we demonstrate the improved throughput of the proposed algorithm.

Robust Trajectory Tracking Control of a Mobile Robot Based on Weighted Integral PDC and T-S Fuzzy Disturbance Observer (하중 적분 PDC와 T-S 퍼지 외란 관측기를 이용한 이동 로봇의 강인 궤도 추적 제어)

  • Baek, Du-san;Yoon, Tae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.265-276
    • /
    • 2017
  • In this paper, a robust and more accurate trajectory tracking control method for a mobile robot is proposed using WIPDC(Weighted Integral Parallel Distributed Compensation) and T-S Fuzzy disturbance observer. WIPDC reduces the steady state error by adding weighted integral term to PDC. And, T-S Fuzzy disturbance observer makes it possible to estimate and cancel disturbances for a T-S fuzzy model system. As a result, the trajectory tracking controller based on T-S Fuzzy disturbance observer shows robust tracking performance. When the initial postures of a mobile robot and the reference trajectory are different, the initial control inputs to the mobile robot become too large to apply them practically. In this study, also, the problem is solved by designing an initial approach path using a path planning method which employs $B\acute{e}zier$ curve with acceleration limits. Performances of the proposed method are proved from the simulation results.

Internet-Based Real-Time Collaborative Design System (인터넷 기반의 실시간 협업 설계 시스템)

  • Cha, Joo-Heon;Lee, Sun-Ho
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.35 no.7
    • /
    • pp.701-707
    • /
    • 2011
  • The aim of this paper is to develop a collaborative design system that can facilitate remote modification and control of a 3D solid model through the Internet. It enables the users to resolve conflicting viewpoints about an issue and collaborate to design a tangible object within a given set of constraints. In order to optimize the collaborative design system, we focus on the results obtained by using the collaborative design method for the real-time modification of a 3D solid model in a distributed environment. It also provides the method of managing the consistency between design entities. The efficiency of the system is verified by implementing it in a distributed environment.

A Model-Driven Approach for Converting UML Model to OWL-S Ontology (UML 모델을 OWL-S 온톨로지로 변환하기 위한 모델지향접근방식)

  • Kim, Il-Woong;Lee, Kyong-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.3
    • /
    • pp.179-192
    • /
    • 2007
  • Based on ontologies, semantic Web services enable the discovery, selection, and composition. OWL-S is a do facto standard ontology for describing semantics of Web services. Due to the difficulty of the OWL-S grammar, the teaming curve for constructing OWL-S description manually can be steep. This paper presents an efficient method for generating OWL-S descriptions from UML diagrams, which are widely used for software design and development. The proposed method is based on UML profiles to generate an OWL-S ontology from sequence or activity diagrams, which represent the behavior of a business process. Specifically, an XMI file extracted from UML diagrams is transformed into an OWL-S description via an XSLT script. Experimental results with a large volume of UML diagrams show that the proposed method deals with the control flow of complex processes and is superior to previous methods.

Opportunistic Spectrum Access Using Optimal Control Policy in RF Energy Harvesting Cognitive Radio Networks (무선 에너지 하비스팅 인지 무선 네트워크에서 최적화 제어 정책을 이용한 선택적 스펙트럼 접근)

  • Jung, Jun Hee;Hwang, Yu Min;Cha, Gyeong Hyeon;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.6-10
    • /
    • 2015
  • RF energy harvesting technology is a promising technology for generating the electrical power from ambient RF signal to operate low-power consumption devices(eg. sensor) in wireless communication networks. This paper, motivated by this and building upon existing CR(Cognitive Radio) network model, proposes a optimal control policy for RF energy harvesting CR networks model where secondary users that have low power consumption harvest ambient RF energy from transmission by nearby active primary users, while periodically sensing and opportunistically accessing the licensed spectrum to the primary user's network. We consider that primary users and secondary users are distributed as Poisson point processes and contact with their intended receivers at fixed distances. Finally we can derive the optimal frame duration, transmission power and density of secondary user from the proposed model that can maximize the secondary users's throughput under the given several conditions and suggest future directions of research.

User Privacy management model using multiple group factor based on Block chain (블록 체인 기반의 다중 그룹 요소를 이용한 사용자 프라이버시 관리 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.107-113
    • /
    • 2018
  • With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF