• Title/Summary/Keyword: Distributed Server

Search Result 848, Processing Time 0.031 seconds

Development of a Synthetic Multi-Agent System;The KMITL Cadence 2003 Robotic Soccer Simulation Team, Intelligent and AI Based Control

  • Chitipalungsri, Thunyawat;Jirawatsiwaporn, Chawit;Tangchupong, Thanapon;Kittitornkun, Surin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.879-884
    • /
    • 2004
  • This paper describes the development of a synthetic multi-agent called KMITL Cadence 2003. KMITL Cadence 2003 is a robotic soccer simulation team consisting of eleven autonomous software agents. Each agent operates in a physical soccer simulation model called Robocup Soccer Server which provides fully distributed and real-time multi-agent system environment. All teammates have to cooperate to achieve the common goal of winning the game. The simulation models many aspects of the football field such as noise in ball movements, noisy sensors, unreliable communication channel between teammates and actuators, limited physical abilities and restricted communication. This paper addresses the algorithm to develop the soccer agents to perform basic actions which are scoring, passing ball and blocking the opponents effectively. The result of this development is satisfactory because the successful scoring attempts is increased from 11.1% to 33.3%, successful passing ball attempts is increased from 22.08% to 63.64%, and also, successful intercepting attempts is increased from 88% to 97.73%.

  • PDF

A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge

  • Nirmala, E.;Muthurajkumar, S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3870-3884
    • /
    • 2020
  • The proposed framework of Four Layer Robust Storage in Cloud (FLRSC) architecture involves host server, local host and edge devices in addition to Virtual Machine Monitoring (VMM). The goal is to protect the privacy of stored data at edge devices. The computational intelligence (CI) part of our algorithm distributes blocks of data to three different layers by partially encoded and forwarded for decoding to the next layer using hash and greed Solomon algorithms. VMM monitoring uses snapshot algorithm to detect intrusion. The proposed system is compared with Tiang Wang method to validate efficiency of data transfer with security. Hence, security is proven against the indexed efficiency. It is an important study to integrate communication between local host software and nearer edge devices through different channels by verifying snapshot using lamport mechanism to ensure integrity and security at software level thereby reducing the latency. It also provides thorough knowledge and understanding about data communication at software level with VMM. The performance evaluation and feasibility study of security in FLRSC against three-layered approach is proven over 232 blocks of data with 98% accuracy. Practical implications and contributions to the growing knowledge base are highlighted along with directions for further research.

Simulation Modeling Methodology and Simulation Framework for a Construction of a Digital Shipyard (디지털 조선소 구축 및 활용을 위한 모델링 및 시뮬레이션 프레임워크 구축 방법론)

  • Woo, Jong-Hun;Oh, Dae-Kyun;Kwon, Young-Dae;Shin, Jong-Eye;Sur, Joo-No
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.42 no.4 s.142
    • /
    • pp.411-420
    • /
    • 2005
  • World leading company and research centers have invested much cost and effort into a PLM and digital manufacturing field to obtain their own competitiveness. We have been trying to apply a digital manufacturing, especially simulation to ship production process as a part of PLM implementation for a shipyard. A shipbuilding production system and processes have a complexity and a peculiarity different from other kinds of production systems. So, new analysis and modeling methodology is required to implement digital shipyard. which is a digital manufacturing system for a shipbuilding company. This paper suggests an analysis and simulation modeling methodologies for an implementation of a digital shipyard. New methodologies such as a database-merged simulation, a distributed simulation, a modular simulation with a model library and a 3-tire simulation framework are developed.

Combing data representation by Sparse Autoencoder and the well-known load balancing algorithm, ProGReGA-KF (Sparse Autoencoder의 데이터 특징 추출과 ProGReGA-KF를 결합한 새로운 부하 분산 알고리즘)

  • Kim, Chayoung;Park, Jung-min;Kim, Hye-young
    • Journal of Korea Game Society
    • /
    • v.17 no.5
    • /
    • pp.103-112
    • /
    • 2017
  • In recent years, expansions and advances of the Internet of Things (IoTs) in a distributed MMOGs (massively multiplayer online games) architecture have resulted in massive growth of data in terms of server workloads. We propose a combing Sparse Autoencoder and one of platforms in MMOGs, ProGReGA. In the process of Sparse Autoencoder, data representation with respect to enhancing the feature is excluded from this set of data. In the process of load balance, the graceful degradation of ProGReGA can exploit the most relevant and less redundant feature of the data representation. We find out that the proposed algorithm have become more stable.

A Design and Analysis on Network Architecture for Interactive VOD Services (대화형 VOD 서비스 구축을 위한 네트워크 구조 설계 및 분석)

  • 정승욱;정수환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1080-1087
    • /
    • 1999
  • High-speed network resources and large storage devices on video servers are necessary to Provide interactive VOD services to subscribers, therefore, building networks for VOD services requires a huge amount of cost. A number of studies on network hierarchy for distributed tree architecture, on optimized server allocation with a given network topology, and on program caching etc, are currently in progress. In this study, given specific network resources, a cost effective network architecture including the optimal number of tree levels and the optimal number of branches at a node are designed by modeling cost functions, and some restrictions on network design are discussed. The results of this study are expected to be applied to network architecture design for interactive VOD services

  • PDF

A Distributed Communication Architecture Based on the Peer-to-Peer Model for Enhancing Distribution Automation System Services (배전자동화 시스템의 서비스 향상을 위한 P2P 기반의 분산형 통신망 구조)

  • Lim, Il-Hyung;Hong, Sug-Won;Choi, Myeon-Song;Lee, Seung-Jae;Ha, Bok-Nam
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.3
    • /
    • pp.443-450
    • /
    • 2007
  • We overview the current distribution automation system in Korea and point out the limitations of the distribution services which can be provided by the current system. In this paper we propose a new distribution system architecture which is based on the peer-to-peer communication model. In this decentralized architecture the intelligent FRTUS can initiate data transmission without any interruption of a central server, and can exchange data with other FRTUS as peers. In order to support the peer-based distribution system, we specify the requirements for new communication network and suggest a way of improving the current distribution network where we adapt an intelligent module for protection and restoration, called MASX, and utilize the open communication network protocols. We also show how the new architecture can enhance major distribution services such as protection, automatic restoration, and equipment management.

Solution for Distributed User's Privacy Under Web Environment (웹 환경에서의 분산형 개인정보보호를 위한 솔루션)

  • Kim, Daeyu;Kim, Jung Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.317-322
    • /
    • 2013
  • Personal information is defined information related to users' privacy data. It can be verified information through social security number, image, and means relating to individual can verify. Such personal information is in accordance with the privacy act in law for the collection and usage in enterprises and institutions. However, it can be induced privacy problem when it is exposed information without attention. This user's inadvertent disclosure of personal information has occurred due to social engineering and intelligent cyber-crime occurred in order to solve these problems. A variety of protection solutions for personal information have been developed. Web privacy filtering firewall and solutions related with server have been developed among developed many solutions, web privacy filtering and firewall solutions is proposed in this paper.

A study on online shared cataloging gateway implementation using Z39.50(information retrieval protocol) (Z39.50(정보검색프로토콜)을 응용한 공동편목 게이트웨이 구축방안 연구)

  • 오정훈;정준민
    • Journal of the Korean Society for information Management
    • /
    • v.14 no.1
    • /
    • pp.183-206
    • /
    • 1997
  • The information Retrieval Protocol, Z39.50 is applied to the shared cataloging gateway. The history and functions of the Z39.50 are reviewed and the characteristics and the database update service of Z39.50 are taken into account in the notion of the shared cataloging. And for the test, one of the domestic on-line shared cataloging systems is adopted and newly remodelled using Z39.50 protocol. Two kinds of Z39.50 shared cataloging gateway models (th centralized shared cataloging gateway model and the distributed shared cataloging gateway model) are operated in Web server.

  • PDF

An EJB-Based Database Agent for Workflow Definition (EJB 기반의 워크플로우 정의 데이터베이스 에이전트 설계 및 구현)

  • 오동근;김광훈
    • Journal of Internet Computing and Services
    • /
    • v.2 no.5
    • /
    • pp.41-47
    • /
    • 2001
  • This paper deals with an EJB-based database agent(component) used to define workflow processes, which is a core function of the e-Chautauqua workflow management system that is an on-going research product. We describe about how to design and implement the EJB-based DB agent that is deployed on EJB server as a component. The agent is located between the build-time clients and the database system, and manages database accesses, such as retrieves and stores, from the workflow definition components. Through the EJB technology, we are able to accomplish a stable database agent that can be characterized by the distributed object management, reliable recovery mechanism from system failovers, reliable large-scale transaction management, and the security functions.

  • PDF

Formal Analysis of Authentication System based on Password using Smart Card (스마트카드를 이용한 패스워드 기반 인증시스템 정형분석)

  • Kim, Hyun-Seok;Kim, Ju-Bae;Jeong, Yeon-Oh;Han, Keun-Hee;Chai, Jin-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.4
    • /
    • pp.304-310
    • /
    • 2009
  • Due to widely use of internet, a lot of users frequently access into remote server in distributed computing environment. However, transmitting the information using vulnerable channel without authentication security system can be exposed to replay attack, offline password attack, and impersonation attack. According to this possibility, there is research about authentication protocol to prevent these hostile attacks using smart card. In this paper, we analyze vulnerability of user authentication system based on password and propose modified user authentication system.