• Title/Summary/Keyword: Event Management

Search Result 1,550, Processing Time 0.034 seconds

An event-based timeout policy to decrease the overhead of session managements in network systems (네트워크 시스템의 세션 관리 부하를 감쇄하기 위한 사건 기반 타임아웃 정책)

  • Yim, Kang-bin;Choi, Chang-seok;Moon, Jong-wook;Jung, Gi-hyun;Choi, Kyung-hee
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.143-148
    • /
    • 2004
  • The session management overhead on the network systems like firewalls or intrusion detection systems is getting grown as the session table is glowing. In this paper. we propose the event-based timeout management policy to increase packet processing throughput on network systems by decreasing the system's timeout management overhead that is comparable to the existing time-based timeout management policies. Through some empirical studies using a session management system implemented in this paper we probed that the proposed policy provides better packet processing throughput than the existing policies.

Real-time Event Processing Role Management System for IFTTT Service (IFTTT 서비스를 위한 실시간 이벤트 처리 룰 관리 시스템)

  • Kim, KyeYoung;Lee, HyunDong;Cho, Dae-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1379-1386
    • /
    • 2017
  • As the Internet of Things evolves, various IoT services are provided. IFTTT is an abbreviation for If This Then That and refers to a service that links different web-based services. This paper proposes a system that generates and manages rules that combine the possibility of IFTTT service and the real-time event processing according to the concept of IoT service. Conventional database-based data processing methods are burdened to process a lot of data of IoT devices coming in real-time. The IoT device's data can be classified into formal data such as the amount of power, temperature value and position information, and informal data such as video or image data. Thus, this system classifies the data stream of IoT devices coming in real-time using the CEP engine Esper into a file signature table, classifies the formal/informal data, and shows the condition of the device data defined by the user and the service to be provided by applying the service.

A Model of Operational Situation Analysis with Functional Safety for ASIL Determination (ASIL 결정을 위한 기능안전 운전상황 분석 모형)

  • Baek, Myoung-Sig;Jang, Hyeon Ae;Kwon, Hyuck Moo
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.4
    • /
    • pp.160-167
    • /
    • 2014
  • To determine a proper ASIL for each hazardous event with a proper safety goal, the right classes should first be determined for the three properties of the hazardous event; (i) severity of harm from the resultant accident, (ii) exposure to the relevant operational situation, and (iii) controllability to avoid the induced risks. ASIL can be clearly determined with right classes of these three properties. But no specific methodologies or processes for their classification can be found in ISO 26262, except only a rough guideline with a simplified set of illustrative tables. In this paper, we try to present a systematic model for classifying the three properties of the hazardous event and suggest a refined procedure of ASIL determination. The proposed model provides a specific method to get a more objective ASIL compared with that in the standard. Scrutinizing the current methodology, we develop a refined method and also provide an illustrative example.

Differential effects on the MICE sustainability and customer loyalty perceived by domestic and international attendees (내·외국인이 인식한 MICE 분야 지속가능성과 고객 충성도에 대한 차별적 효과에 관한 연구)

  • Cheng, Xiao Xi;Kim, Chul Won
    • Korea Science and Art Forum
    • /
    • v.30
    • /
    • pp.427-440
    • /
    • 2017
  • The objective of this study is to explore differential effects of the sustainability perceived by domestic and international participants in the MICE (Meetings, Incentive Travel, Convention, and Exhibition) held in the Republic of Korea and to examine the relationship between customer loyalty and perception of the sustainable MICE. In this study, 30 sustainability variables for the MICE were extracted and tested by the factor analysis, representing four underlying dimensions: economic sustainability, social sustainability, environmental sustainability and event sustainability. The results revealed that significant differences in these four dimensions of the sustainable MICE were perceived by domestic and international participants. The largest difference were perceived by domestic and international participants with respect to the environmental sustainability factor. The mean scores indicated that international participants tended to give higher evaluations than domestic participants. Second, there were statistically significant relationships among economic, environmental, and event sustainability factors and customer loyalty from the perspective of international participants. For domestic participants, only event sustainability had a vital relationship with customer loyalty. The study implied how policy makers and the MICE managers should adopt four dimensions of sustainability to establish a harmonious and sustainable MICE practices.

A Web-based System for Business Process Discovery: Leveraging the SICN-Oriented Process Mining Algorithm with Django, Cytoscape, and Graphviz

  • Thanh-Hai Nguyen;Kyoung-Sook Kim;Dinh-Lam Pham;Kwanghoon Pio Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2316-2332
    • /
    • 2024
  • In this paper, we introduce a web-based system that leverages the capabilities of the ρ(rho)-algorithm, which is a Structure Information Control Net (SICN)-oriented process mining algorithm, with open-source platforms, including Django, Graphviz, and Cytoscape, to facilitate the rediscovery and visualization of business process models. Our approach involves discovering SICN-oriented process models from process instances from the IEEE XESformatted process enactment event logs dataset. This discovering process is facilitated by the ρ-algorithm, and visualization output is transformed into either a JSON or DOT formatted file, catering to the compatibility requirements of Cytoscape or Graphviz, respectively. The proposed system utilizes the robust Django platform, which enables the creation of a userfriendly web interface. This interface offers a clear, concise, modern, and interactive visualization of the rediscovered business processes, fostering an intuitive exploration experience. The experiment conducted on our proposed web-based process discovery system demonstrates its ability and efficiency showing that the system is a valuable tool for discovering business process models from process event logs. Its development not only contributes to the advancement of process mining but also serves as an educational resource. Readers, students, and practitioners interested in process mining can leverage this system as a completely free process miner to gain hands-on experience in rediscovering and visualizing process models from event logs.

Correlation Analysis of Event Logs for System Fault Detection (시스템 결함 분석을 위한 이벤트 로그 연관성에 관한 연구)

  • Park, Ju-Won;Kim, Eunhye;Yeom, Jaekeun;Kim, Sungho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.129-137
    • /
    • 2016
  • To identify the cause of the error and maintain the health of system, an administrator usually analyzes event log data since it contains useful information to infer the cause of the error. However, because today's systems are huge and complex, it is almost impossible for administrators to manually analyze event log files to identify the cause of an error. In particular, as OpenStack, which is being widely used as cloud management system, operates with various service modules being linked to multiple servers, it is hard to access each node and analyze event log messages for each service module in the case of an error. For this, in this paper, we propose a novel message-based log analysis method that enables the administrator to find the cause of an error quickly. Specifically, the proposed method 1) consolidates event log data generated from system level and application service level, 2) clusters the consolidated data based on messages, and 3) analyzes interrelations among message groups in order to promptly identify the cause of a system error. This study has great significance in the following three aspects. First, the root cause of the error can be identified by collecting event logs of both system level and application service level and analyzing interrelations among the logs. Second, administrators do not need to classify messages for training since unsupervised learning of event log messages is applied. Third, using Dynamic Time Warping, an algorithm for measuring similarity of dynamic patterns over time increases accuracy of analysis on patterns generated from distributed system in which time synchronization is not exactly consistent.

Development of simultaneous multi-channel data acquisition system for large-area Compton camera (LACC)

  • Junyoung Lee;Youngmo Ku;Sehoon Choi;Goeun Lee ;Taehyeon Eom ;Hyun Su Lee ;Jae Hyeon Kim ;Chan Hyeong Kim
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3822-3830
    • /
    • 2023
  • The large-area Compton camera (LACC), featuring significantly high detection sensitivity, was developed for high-speed localization of gamma-ray sources. Due to the high gamma-ray interaction event rate induced by the high sensitivity, however, the multiplexer-based data acquisition system (DAQ) rapidly saturated, leading to deteriorated energy and imaging resolution at event rates higher than 4.7 × 103 s-1. In the present study, a new simultaneous multi-channel DAQ was developed to improve the energy and imaging resolution of the LACC even under high event rate conditions (104-106 s-1). The performance of the DAQ was evaluated with several point sources under different event rate conditions. The results indicated that the new DAQ offers significantly better performance than the existing DAQ over the entire energy and event rate ranges. Especially, the new DAQ showed high energy resolution under very high event rate conditions, i.e., 6.9% and 8.6% (for 662 keV) at 1.3 × 105 and 1.2 × 106 s-1, respectively. Furthermore, the new DAQ successfully acquired Compton images under those event rates, i.e., imaging resolutions of 13.8° and 19.3° at 8.7 × 104 and 106 s-1, which correspond to 1.8 and 73 μSv/hr or about 18 and 730 times the background level, respectively.

An FMI-based Time Management Scheme for Real-time Co-Simulation (실시간 Co-Simulation을 위한 FMI 기반 시간관리 기법)

  • Kyung, Dong-Gu;Joe, Inwhee;Kim, Wontae
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.426-434
    • /
    • 2020
  • FMI is being researched as a standard for linking large-scale simulation of CPS. In order to guarantee the reliability of the results in large-scale simulations using FMI, event handling through time management techniques is required. This paper aims to guarantee real-time performance and accuracy in large-scale co-simulation environments such as CPS. Synchronize the wallclock time and simulation time to ensure real time. Also, to ensure the accuracy, before the simulation, the event is checked and the simulation is performed with the smallest step size while maintaining the real time until the event occurrence time. As a result, the events occurring in the co-simulation environment are processed immediately and sequentially, ensuring the real-time performance and minimizing the numerical integration error by maximizing the simulation resolution. In the experiment, the proposed method was processed immediately, and it was confirmed that the numerical integration error is reduced by about 1/5 unlike the existing time management method which does not guarantee the resolution.

A NESTING APPROACH IN DISCRETE EVENT SIMULATION FOR INTEGRATING CONSTRUCTION OPERATION AND SCHEDULE MODELS

  • Chang-Yong Yi;Chan-Sik Park;Doo-Jin Lee;Dong-Eun Lee
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.400-408
    • /
    • 2009
  • Simulation applications for analyzing the productivity of construction operations at operation level and project schedules at project level are crucial methods in project management. The application at two different levels should be very tightly linked to each other in practice. However, appropriate integration at the levels is not achieved in that existing systems do not support to integrate operation models into a schedule model. This paper presents a new approach named to Discrete Event Simulation-Nesting modeling approach, which supports not only productivity analysis at operation level but also schedule management at a project level. The system developed by the authors allows creating operation models at the operation level, maintaining them in operation model library, executing sensitivity analysis to find the behaviors of the operation models when different combination of resources are used as existing DES systems do. On top of the conventional functions, the new system facilitates to find the optimum solution of resource combinations which satisfy the user's interest by computing the hourly productivity and the hourly cost of the operation. By drag-and-dropping an operation model kept in the operation model library, the operation models are integrated into an activity of the schedule model. When a complete schedule model is established by nesting operation models into the schedule model, stochastic simulation based scheduling is executed. A case study is presented to demonstrate the new simulation system and verify the validity of the system.

  • PDF

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.