• Title/Summary/Keyword: Access Monitoring System

Search Result 393, Processing Time 0.033 seconds

MLOps workflow language and platform for time series data anomaly detection

  • Sohn, Jung-Mo;Kim, Su-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.19-27
    • /
    • 2022
  • In this study, we propose a language and platform to describe and manage the MLOps(Machine Learning Operations) workflow for time series data anomaly detection. Time series data is collected in many fields, such as IoT sensors, system performance indicators, and user access. In addition, it is used in many applications such as system monitoring and anomaly detection. In order to perform prediction and anomaly detection of time series data, the MLOps platform that can quickly and flexibly apply the analyzed model to the production environment is required. Thus, we developed Python-based AI/ML Modeling Language (AMML) to easily configure and execute MLOps workflows. Python is widely used in data analysis. The proposed MLOps platform can extract and preprocess time series data from various data sources (R-DB, NoSql DB, Log File, etc.) using AMML and predict it through a deep learning model. To verify the applicability of AMML, the workflow for generating a transformer oil temperature prediction deep learning model was configured with AMML and it was confirmed that the training was performed normally.

Transient Overloads Control Mechanism for Virtual Memory System (가상 메모리 시스템의 일시적인 과부하 완화 기법)

  • Go, Young-Woong;Lee, Jae-Yong;Hong, Cheol-Ho;Yu, Hyukc
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.319-330
    • /
    • 2001
  • In virtual memory system, when a process attempts to access a page that is not resident in memory, the system generates and handles a page fault that causes unpredictable delay. So virtual memory system is not appropriate for the real-time system, because it can increase the deadline miss ratio of real-time task. In multimedia system, virtual memory system may degrade the QoS(quality of service) of multimedia application. Furthermore, in general-purpose operating system, whenever a new task is dynamically loaded, virtual memory system suffers from extensive page fault that cause transient overloading state. In this paper, we present efficient overloading control mechanism called RBPFH (Rate-Based Page Fault Handling). A significant feature of the RBPFH algorithm is page fault dispersion that keeps page fault ratio from exceeding available bound by monitoring current system resources. Furthermore, whenever the amount of available system resource is changed, the RBPFH algorithm dynamically adjusts the page fault handling rate. The RBPFH algorithm is implemented in the Linux operating system and its performance measured. The results demonstrate RBPFH\`s superior performance in supporting multimedia applications. Experiment result shows that RBPFH could achieve 10%∼20% reduction in deadline miss ratio and 50%∼60% reduction in average delay.

  • PDF

Technical Analysis of an MRV System in Relation to the Implementation of a Data Collection System by the International Maritime Organization (국제해사기구 데이터수집시스템 도입에 따른 MRV 지원시스템의 기술적 분석)

  • Kang, Nam-seon;Lee, Jung-yup;Hong, Yeon-jeong;Byeon, Sang-su;Kim, Jin-yhyung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.1
    • /
    • pp.122-129
    • /
    • 2017
  • This study presents the results from a technical analysis of a portal system that is compatible with MRV regulations and utilized to examine energy efficiency in international shipping, in relation to the implementation of a mandatory data collection system by the International Maritime Organization. The details of the SEEMP guidelines, including the data collection system and methods for collecting data on fuel use, were reviewed. Strategies for domestic shipping companies toward MRV have been recommended by identifying differences with the EU MRV, and the technical adequacy of the MRV system was assessed. The MRV system enhances cost and work efficiency by managing emissions data from the early stage to the final stage. It is capable of collecting and reporting emissions data while adhering to the reporting procedures of shipping companies. By granting different access privileges to users, the system supports shipping companies in their data collection and reporting, and also supports verifiers in their data verification activities. Moreover, it makes possible the submission of reports in electronic from, thereby enabling shipping companies to adopt an integrated response to international MRV regulations.

Analysis of a Cross-cutting Issue, 'Access to Genetic Resources and Benefit-sharing' of the Conference of the Parties to the Convention on Biological Diversity (생물다양성협약 당사국회의의 핵심논제인 '유전자원에 대한 접근과 이익의 공유'에 관한 고찰)

  • Park, Yong-Ha
    • Journal of Environmental Policy
    • /
    • v.6 no.1
    • /
    • pp.41-60
    • /
    • 2007
  • Attempts were made to define the elements of debates, impact of decisions of the Access to Genetic Resources and Benefit-sharing(ABS) of the Conference of the Parties(COP) to the Convention on Biological Diversity(CBD) In Korea. Providing policy suggestions to cope with ABS, a cross-cutting issue of the meetings of the COP, was also undertaken. Meetings concerning ABS deal with several key matters such as an international regime, which is a legally binding implementation tool of the Bonn Guidelines, an international certificate of genetic resources' origin/source/legal provenance, and disclosure of origin of genetic resources, compliance measures with prior informed consent of the Contracting Parties providing such resources and with mutually agreed terms on which access was granted. Developing countries, rich in biodiversity and genetic resources, use the CBD as a major tool to maximize their national profits. They demand for national sovereign rights for the genetic resources and indigenous communities providing associated traditional knowledge. At the meetings of the COP, in addition, they requested that developed countries should transfer technologies and provide a financial mechanism for resource conservation to them. On the contrary, the developed countries argue that facilitating access to genetic resources is essential for scientific research and development, and that both Intellectual Property Rights and biotechnology using genetic resources should be protected to maximize their national benefits. Decisions of the COP concerning the Bonn Guidelines and compliance measures with ABS will affect on various socioeconomic fields of Korea, a country which is short of genetic resources. Especially, the importation of genetic resources and land development which might damage genetic resources will be limited seriously. Consequently, overall expenses will increase for the securing genetic resources from the foreign countries and developing biotechnology for conservation and sustainable uses of genetic resources. To minimize the adverse impacts, we endeavor to establish our clear standpoint and to lead the international trends, which are favorable for us. In order to achieve these objectives, government needs i) to proceed researches to lead the international ABS debates actively and to prepare the expected decisions of the future meetings of the COP, ii) to establish a national implementation plan to cope with the ABS and its related decisions, iii) to examine and improve the efficiencies of the national implementation plan with a proper monitoring system, and iv) cope with the other international meetings including the meetings of Trade Related Intellectual Properly Rights and International Treaty on Plant Genetic Resources for Food and Agriculture actively.

  • PDF

Development of Real-time Oceanographic Information System using Platforms of Aquaculture Farms (양식장 플랫폼을 활용한 실시간 해양환경 정보제공시스템 개발연구)

  • Yang, Joon-Yong;Suh, Young-Sang;Choi, Yong-Kyu;Jung, Kyu-Kui;Jeong, Hee-Dong;Park, Jong-Soo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.10 no.2
    • /
    • pp.47-57
    • /
    • 2007
  • Real-time oceanographic information system was developed using platforms of aquaculture farms to examine causes of mass mortality of hatchery fishes, and to reduce the damage of mass mortality which has been occurred frequently off coast by abnormal change of ocean conditions. The system had the advantages of direct data distribution to fishermen at the farm and instant maintenance of equipments due to easy access to the farms and residents at the farms in comparison with offshore mooring buoy system. To avoid discontinued measurement of the system, repairs caused by malfunction of equipments, bimonthly preventive maintenances and daily monitoring of measured data were systematized. Confidence intervals calculated by a statistical method using accumulated data were applied to data management. Such activities could minimize discontinuance of measurement and keep information more trustful. In addition, the system has various ways of data distribution. Through homepage and e-mail in the internet, information was provided to public. Display units which were connected to equipments at the farm gave the measured data directly to fishermen, which guided them to run their farm scientifically. Finally large display unit was installed at a fish market and showed the measured data at the nearest station with tide and weather information. Proper region for aquaculture and wintering region were studied using temperature data obtained by the system in 2006. The system will contribute to reduce economic damage of coastal fishery and to understand coastal marine environment.

  • PDF

Smart City Energy Inclusion, Towards Becoming a Better Place to Live

  • Cha, Sang-Ryong
    • World Technopolis Review
    • /
    • v.8 no.1
    • /
    • pp.59-70
    • /
    • 2019
  • Where is a better place to live? In the coming era, this should be more than simply a livable place. It should be an adaptable place that has a flexible system adaptable to any new situation in terms of diversity. Customization and real-time operation are needed in order to realize this technologically. We expect a smart city to have a flexible system that applies technologies of self-monitoring and self-response, thereby being a promising city model towards being a better place to live. Energy demand and supply is a crucial issue concerning our expectations for the flexible system of a smart city because it is indispensable to comfortable living, especially city living. Although it may seem that energy diversification, such as the energy mix of a country, is a matter of overriding concern, the central point is the scale of place to build grids for realizing sustainable urban energy systems. A traditional hard energy path supported by huge centralized energy systems based on fossil and nuclear fuels on a national scale has already faced difficult problems, particularly in terms of energy flexibility/resilience. On the other hand, an alternative soft energy path consisting of small diversified energy systems based on renewable energy sources on a local scale has limitations regarding stability, variability, and supply potential despite the relatively light economic/technological burden that must be assumed to realize it. As another alternative, we can adopt a holonic path incorporating an alternative soft energy path with a traditional hard energy path complimentarily based on load management. This has a high affinity with the flexible system of a smart city. At a system level, the purpose of all of the paths mentioned above is not energy itself but the service it provides. If the expected energy service is fixed, the conclusive factor in choosing a more appropriate system is accessibility to the energy service. Accessibility refers to reliability and affordability; the former encompasses the level of energy self-sufficiency, and the latter encompasses the extent of energy saving. From this point of view, it seems that the small diversified energy systems of a soft energy path have a clear advantage over the huge centralized energy systems of a hard energy path. However, some insuperable limitations still remain, so it is reasonable to consider both energy systems continuing to coexist in a multiplexing energy system employing a holonic path to create and maintain reliable and affordable access to energy services that cover households'/enterprises' basic energy needs. If this is embodied in a smart city concept, this is nothing else but smart energy inclusion. In Japan, following the Fukushima nuclear accident in 2011, a trend towards small diversified energy systems of a soft energy path intensified in order to realize a nuclear-free society. As a result, the Government of Japan proclaimed in its Fifth Strategic Energy Plan that renewable energy must be the main source of power in Japan by 2050. Accordingly, Sony vowed that all the energy it uses would come from renewable sources by 2040. In this situation, it is expected that smart energy inclusion will be achieved by the Japanese version of a smart grid based on the concept of a minimum cost scheme and demand response.

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

The Literature Review of Music Therapy in the United States (음악요법에 관한 연구)

  • Lee, Won-Yu
    • Research in Community and Public Health Nursing
    • /
    • v.11 no.1
    • /
    • pp.245-261
    • /
    • 2000
  • Based on the literature, status and role the music therapist in America was reviewed for this study. The process of developing a music therapy program in America suggests to us many things: In America, music therapists have sustained a mutually beneficial status with their clients for, over fifty years. Excellence in academic education and clinical training enable music therapists to continue to provide quality music therapy. The magnitude of change in to music therapy in the United States, however creates the challenge of providing real access to music therapy continues in the future. Music therapy is the use of music in the accomplishment of therapeutic aims: the restoration, maintenance, and improvement of mental and physical health. Music therapists work with individuals of all ages who require special services due to behavioral. social. learning, or physical disabilities. Employment may be in hospitals, clinics, day care facilities, schools, community mental health centers, substance abuse facilities, nursing homes, hospices, rehabilitation centers, correctional facilities, or private practices. The American Music Therapy Association (AMTA) was founded in 1998 as a result of a union between the American Association for Music Therapy (founded in 1971) and the National Association for Music Therapy(founded in 1950). Music therapists are highly qualified professionals who have completed approved degree programs and had clinical training in order to receive Board Certification(MT-BC), with the designation of Registered, Certified, or Advanced Certified Music Therapist(RMT. CMT - or ACMT). AMTA provides several mechanism for monitoring the quality of music therapy programs: Standards of Practice. a Code of Ethics, a system for Peer Review, a Judical Review Board, and an Ethics Board. According to the results of this study, the suggestions were as follows: 1. It is concluded that music therapy as a nursing intervention can be effective for the clients. 2. It is a great challenge to develope a music therapy program for nursing intervention however, it is also task and responsibility to further the development of nursing.

  • PDF