• Title/Summary/Keyword: Data Driven Control

Search Result 253, Processing Time 0.031 seconds

Modeling, Discovering, and Visualizing Workflow Performer-Role Affiliation Networking Knowledge

  • Kim, Haksung;Ahn, Hyun;Kim, Kwanghoon Pio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.691-708
    • /
    • 2014
  • This paper formalizes a special type of social networking knowledge, which is called "workflow performer-role affiliation networking knowledge." A workflow model specifies execution sequences of the associated activities and their affiliated relationships with roles, performers, invoked-applications, and relevant data. In Particular, these affiliated relationships exhibit a stream of organizational work-sharing knowledge and utilize business process intelligence to explore resources allotting and planning knowledge concealed in the corresponding workflow model. In this paper, we particularly focus on the performer-role affiliation relationships and their implications as organizational and business process intelligence in workflow-driven organizations. We elaborate a series of theoretical formalisms and practical implementation for modeling, discovering, and visualizing workflow performer-role affiliation networking knowledge, and practical details as workflow performer-role affiliation knowledge representation, discovery, and visualization techniques. These theoretical concepts and practical algorithms are based upon information control net methodology for formally describing workflow models, and the affiliated knowledge eventually represents the various degrees of involvements and participations between a group of performers and a group of roles in a corresponding workflow model. Finally, we summarily describe the implications of the proposed affiliation networking knowledge as business process intelligence, and how worthwhile it is in discovering and visualizing the knowledge in workflow-driven organizations and enterprises that produce massively parallel interactions and large-scaled operational data collections through deploying and enacting massively parallel and large-scale workflow models.

Development of Message Broker-Based Real-Time Control Method for Road Traffic Safety Facilities Equipment and Devices Integrated Management System

  • JeongHo Kho;Eum Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.195-209
    • /
    • 2024
  • The current road traffic signal controller developed in the 1990s has limitations in flexibility and scalability due to power supply problems, various communication methods, and hierarchical black box structures for various equipment and devices installed to improve traffic safety for road users and autonomous cooperative driving. In this paper, we designed a road traffic safety facilities equipment and devices integrated management system that can cope with the rapidly changing future traffic environment by solving the using direct current(DC) and power supply problem through the power over ethernet(PoE) technology and centralized data-driven control through message broker technology. In addition, a data-driven real-time control method for road traffic safety facilities equipment and devices operating based on time series data was implemented and verified.

Receiver-driven Cooperation-based Concurrent Multipath Transfer over Heterogeneous Wireless Networks

  • Cao, Yuanlong;Liu, Qinghua;Zuo, Yi;Huang, Minghe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2354-2370
    • /
    • 2015
  • The advantages of employing SCTP-based Concurrent Multipath Transfer (CMT) have been demonstrated to be very useful for data delivery over multi-homed wireless networks. However, there is still significant ongoing work addressing some remaining limitations and challenges. The most important concern when applying CMT to data delivery is related to handling packet reordering and buffer blocking. Another concern on this topic is that current sender-based CMT solutions seldom consider balancing the overhead and sharing the load between the sender and receiver. This paper proposes a novel Receiver-driven Cooperation-based Concurrent Multipath Transfer solution (CMT-Rev) with the following aims: (i) to balance overhead and share load between the sender and receiver, by moving some functions including congestion and flow control from the sender onto receiver; (ii) to mitigate the data reordering and buffer blocking problems, by using an adaptive receiver-cooperative path aggregation model, (iii) to adaptively transmit packets over multiple paths according to their receiver-inspired sending rate values, by employing a new receiver-aware data distribution scheduler. Simulation results show that CMT-Rev outperforms the existing CMT solutions in terms of data delivery performance.

CDOWatcher: Systematic, Data-driven Platform for Early Detection of Contagious Diseases Outbreaks

  • Albarrak, Abdullah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.77-86
    • /
    • 2022
  • The destructive impact of contagious diseases outbreaks on all life facets necessitates developing effective solutions to control these diseases outbreaks. This research proposes an end-to-end, data-driven platform which consists of multiple modules that are working in harmony to achieve a concrete goal: early detection of contagious diseases outbreaks (i.e., epidemic diseases detection). Achieving that goal enables decision makers and people in power to act promptly, resulting in robust prevention management of contagious diseases. It must be clear that the goal of this proposed platform is not to predict or forecast the spread of contagious diseases, rather, its goal is to promptly detect contagious diseases outbreaks as they happen. The front end of the proposed platform is a web-based dashboard that visualizes diseases outbreaks in real-time on a real map. These outbreaks are detected via another component of the platform which utilizes data mining techniques and algorithms on gathered datasets. Those gathered datasets are managed by yet another component. Specifically, a mobile application will be the main source of data to the platform. Being a vital component of the platform, the datasets are managed by a DBMS that is specifically tailored for this platform. Preliminary results are presented to showcase the performance of a prototype of the proposed platform.

Auto Regulated Data Provisioning Scheme with Adaptive Buffer Resilience Control on Federated Clouds

  • Kim, Byungsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5271-5289
    • /
    • 2016
  • On large-scale data analysis platforms deployed on cloud infrastructures over the Internet, the instability of the data transfer time and the dynamics of the processing rate require a more sophisticated data distribution scheme which maximizes parallel efficiency by achieving the balanced load among participated computing elements and by eliminating the idle time of each computing element. In particular, under the constraints that have the real-time and limited data buffer (in-memory storage) are given, it needs more controllable mechanism to prevent both the overflow and the underflow of the finite buffer. In this paper, we propose an auto regulated data provisioning model based on receiver-driven data pull model. On this model, we provide a synchronized data replenishment mechanism that implicitly avoids the data buffer overflow as well as explicitly regulates the data buffer underflow by adequately adjusting the buffer resilience. To estimate the optimal size of buffer resilience, we exploits an adaptive buffer resilience control scheme that minimizes both data buffer space and idle time of the processing elements based on directly measured sample path analysis. The simulation results show that the proposed scheme provides allowable approximation compared to the numerical results. Also, it is suitably efficient to apply for such a dynamic environment that cannot postulate the stochastic characteristic for the data transfer time, the data processing rate, or even an environment where the fluctuation of the both is presented.

A Rate Control Scheme Considering Congestion Patterns in Wireless Sensor Networks (무선 센서 네트워크에서 혼잡 패턴을 고려한 전송률 조절 기법)

  • Kang, Kyung-Hyun;Chung, Kwang-Sue
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1229-1233
    • /
    • 2010
  • In event-driven wireless sensor networks, network congestion occurs when event data, which have higher transmission rates than periodic sensing data, arc forwarded to bottleneck links. As the congestion continues, congestion collapse is triggered, so most of packets from source nodes are failed to transmit to a sink node. Rate control schemes can be a solution for preventing the congestion collapse problem. In this paper, a rate control scheme that each node controls child node's data rate based on congestion patterns is proposed. Experiments show that the proposed scheme effectively controls network congestion and successfully transmits more event data packets to a sink node than existing rate control schemes.

An Overview of Fault Diagnosis and Fault Tolerant Control Technologies for Industrial Systems (산업 시스템을 위한 고장 진단 및 고장 허용 제어 기술)

  • Bae, Junhyung
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.548-555
    • /
    • 2021
  • This paper outlines the basic concepts, approaches and research trends of fault diagnosis and fault tolerant control applied to industrial processes, facilities, and motor drives. The main role of fault diagnosis for industrial processes is to create effective indicators to determine the defect status of the process and then take appropriate measures against failures or hazadous accidents. The technologies of fault detection and diagnosis have been developed to determine whether a process has a trend or pattern, or whether a particular process variable is functioning normally. Firstly, data-driven based and model-based techniques were described. Secondly, fault detection and diagnosis techniques for industrial processes are described. Thirdly, passive and active fault tolerant control techniques are considered. Finally, major faults occurring in AC motor drives were listed, described their characteristics and fault diagnosis and fault tolerant control techniques are outlined for this purpose.

Anomaly Detection in Sensor Data

  • Kim, Jong-Min;Baik, Jaiwook
    • Journal of Applied Reliability
    • /
    • v.18 no.1
    • /
    • pp.20-32
    • /
    • 2018
  • Purpose: The purpose of this study is to set up an anomaly detection criteria for sensor data coming from a motorcycle. Methods: Five sensor values for accelerator pedal, engine rpm, transmission rpm, gear and speed are obtained every 0.02 second from a motorcycle. Exploratory data analysis is used to find any pattern in the data. Traditional process control methods such as X control chart and time series models are fitted to find any anomaly behavior in the data. Finally unsupervised learning algorithm such as k-means clustering is used to find any anomaly spot in the sensor data. Results: According to exploratory data analysis, the distribution of accelerator pedal sensor values is very much skewed to the left. The motorcycle seemed to have been driven in a city at speed less than 45 kilometers per hour. Traditional process control charts such as X control chart fail due to severe autocorrelation in each sensor data. However, ARIMA model found three abnormal points where they are beyond 2 sigma limits in the control chart. We applied a copula based Markov chain to perform statistical process control for correlated observations. Copula based Markov model found anomaly behavior in the similar places as ARIMA model. In an unsupervised learning algorithm, large sensor values get subdivided into two, three, and four disjoint regions. So extreme sensor values are the ones that need to be tracked down for any sign of anomaly behavior in the sensor values. Conclusion: Exploratory data analysis is useful to find any pattern in the sensor data. Process control chart using ARIMA and Joe's copula based Markov model also give warnings near similar places in the data. Unsupervised learning algorithm shows us that the extreme sensor values are the ones that need to be tracked down for any sign of anomaly behavior.

A Sophistication Framework for a Mother Company-Driven Global Manufacturing Network (모기업 주도적 글로벌 생산 네트워크를 위한 조정 프레임웍)

  • Park, Kwang-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.65-85
    • /
    • 2009
  • The main purpose of this paper is to propose a sophistication framework for a global manufacturing network (GMN) driven by a mother company to autonomously propagate and coordinate transaction data that are exchanged among manufacturing partners. The framework is based on conceptual fundamentals of previous research that provide a step toward ultimate successful collaboration in the supply chain and employs mobile agents for the coordination and propagation of transaction data. Maintaining the integrity of transaction data linked to a huge information web is difficult. With the sophistication functionalities of this framework, it becomes easy to effectively control the overall GMN operations and to accomplish the intended goals. The current level of sophistication focuses on the transaction data propagation. The sophistication level may be expanded up to business intelligence in the future.

  • PDF

A basic research for knowledge-based management of feature recognition rules (형상인식 규칙의 지식 베이스 운용에 관한 연구)

  • 박재홍;반갑수;이석희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.715-719
    • /
    • 1991
  • In manufacturing process, usually 2-dimensional part drawing is used as a basic data. If a designer wants to recognize 2-dimensional drawing and formulate 3-dimensional shape, a proper feature recognition rule is required as a prerequisite step. These rules are converted Into knowledge base, should be ed separately in the recognition program and can be referenced In similar way of database application. In this paper, basic feature recognition rules are addressed in structure type knowledge base, and the application system is formulated which can be operated separately with existing data driven program.

  • PDF