• Title/Summary/Keyword: Event Manager

Search Result 75, Processing Time 0.024 seconds

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Low-Level Laser Therapy including Laser Acupuncture for Non-Specific Chronic Low Back Pain : Protocol for a Systematic Review

  • Yeum, Hyewon;Nam, Dongwoo
    • Journal of Acupuncture Research
    • /
    • v.36 no.4
    • /
    • pp.251-255
    • /
    • 2019
  • Background: Low-level laser therapy (LLLT) including laser acupuncture (LA) has been widely used to treat chronic low back pain (CLBP), but there is no critically appraised evidence of the potential benefits. The purpose of this protocol for a systematic review was to enable the evaluation of the effectiveness of LLLT including LA for non-specific CLBP to identify the potential benefits. Methods: The electronic databases MEDLINE (PubMed), Embase (Ovid), the Cochrane Central Register of Controlled Trials (CENTRAL), Korean medical databases (KoreaMed, KMBASE, KISS, NDSL, KISTI, OASIS), the Chinese database (CNKI), and Japanese databases (CiNII, J-STAGE) are recommended. Results: Randomized controlled trials in LLLT including LA should be included in the searches. All data synthesis and subgroup analyses should be conducted using a Review Manager software. The Cochrane risk of bias tool can be used to evaluate methodological quality of the studies. A risk ratio or mean difference with a 95% confidence interval will show the effects of LLLT including LA. Conclusion: The primary outcome would be pain intensity and functional status/disability due to low back pain. The secondary outcome would be a global measurement of recovery or improvement, quality of life and adverse event.

Analyzing effect and importance of input predictors for urban streamflow prediction based on a Bayesian tree-based model

  • Nguyen, Duc Hai;Bae, Deg-Hyo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.134-134
    • /
    • 2022
  • Streamflow forecasting plays a crucial role in water resource control, especially in highly urbanized areas that are very vulnerable to flooding during heavy rainfall event. In addition to providing the accurate prediction, the evaluation of effects and importance of the input predictors can contribute to water manager. Recently, machine learning techniques have applied their advantages for modeling complex and nonlinear hydrological processes. However, the techniques have not considered properly the importance and uncertainty of the predictor variables. To address these concerns, we applied the GA-BART, that integrates a genetic algorithm (GA) with the Bayesian additive regression tree (BART) model for hourly streamflow forecasting and analyzing input predictors. The Jungrang urban basin was selected as a case study and a database was established based on 39 heavy rainfall events during 2003 and 2020 from the rain gauges and monitoring stations. For the goal of this study, we used a combination of inputs that included the areal rainfall of the subbasins at current time step and previous time steps and water level and streamflow of the stations at time step for multistep-ahead streamflow predictions. An analysis of multiple datasets including different input predictors was performed to define the optimal set for streamflow forecasting. In addition, the GA-BART model could reasonably determine the relative importance of the input variables. The assessment might help water resource managers improve the accuracy of forecasts and early flood warnings in the basin.

  • PDF

Development of a Remote Multi-Task Debugger for Qplus-T RTOS (Qplus-T RTOS를 위한 원격 멀티 태스크 디버거의 개발)

  • 이광용;김흥남
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.393-409
    • /
    • 2003
  • In this paper, we present a multi-task debugging environment for Qplus-T embedded-system such as internet information appliances. We will propose the structure and functions of a remote multi-task debugging environment supporting environment effective ross-development. And, we are going enhance the communication architecture between the host and target system to provide more efficient cross-development environment. The remote development toolset called Q+Esto consists to several independent support tools: an interactive shell, a remote debugger, a resource monitor, a target manager and a debug agent. Excepting a debug agent, all these support tools reside on the host systems. Using the remote multi-task debugger on the host, the developer can spawn and debug tasks on the target run-time system. It can also be attached to already-running tasks spawned from the application or from interactive shell. Application code can be viewed as C/C++ source, or as assembly-level code. It incorporates a variety of display windows for source, registers, local/global variables, stack frame, memory, event traces and so on. The target manager implements common functions that are shared by Q+Esto tools, e.g., the host-target communication, object file loading, and management of target-resident host tool´s memory pool and target system´s symbol-table, and so on. These functions are called OPEn C APIs and they greatly improve the extensibility of the Q+Esto Toolset. The Q+Esto target manager is responsible for communicating between host and target system. Also, there exist a counterpart on the target system communicating with the host target manager, which is called debug agent. Debug agent is a daemon task on real-time operating systems in the target system. It gets debugging requests from the host tools including debugger via target manager, interprets the requests, executes them and sends the results to the host.

Design of an In-vehicle Intelligent Information System for Remote Management (차량 원격 진단 및 관리를 위한 차량 지능 정보시스템의 설계)

  • Kim, Tae-Hwan;Lee, Seung-Il;Lee, Yong-Doo;Hong, Won-Kee
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1023-1026
    • /
    • 2005
  • In the ubiquitous computing environment, an intelligent vehicle is defined as a sensor node with a capability of intelligence and communication in a wire and wireless network space. To make it real, a lot of problems should be addressed in the aspect of vehicle mobility, in-vehicle communication, common service platform and the connection of heterogeneous networks to provide a driver with several intelligent information services beyond the time and space. In this paper, we present an intelligent information system for managing in-vehicle sensor network and a vehicle gateway for connecting the external networks. The in-vehicle sensor network connected with several sensor nodes is used to collect sensor data and control the vehicle based on CAN protocol. Each sensor node is equipped with a reusable modular node architecture, which contains a common CAN stack, a message manager and an event handler. The vehicle gateway makes vehicle control and diagnosis from a remote host possible by connecting the in-vehicle sensor network with an external network. Specifically, it gives an access to the external mobile communication network such as CDMA. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixed place, 707ms at rural area and 910ms at urban area.

  • PDF

A Policy-driven RFID Device Management Model (정책기반 RFID 장치 관리 모델)

  • Lee, Woo-Sik;Kim, Nam-Gi
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.75-81
    • /
    • 2012
  • Previous RFID systems exclusively manage the tags and readers for each company in individual manner. Thus, RFID system manager should understand and design specifications such as tag events, data format, and etc, based on individual companies. But it is very difficult to know all statements. To resolve theses problems, there has been conceptual research about policy-based RFID service management model that is not restrained from standards of typical RFID systems, including EPCglobal standard, and ISO/IEC standard. However, previous proposed service management model only aimed event management without including device management. Therefore, in this paper, we propose extended device management policy model for giving shape to the proposed policy-based RFID service management model. If the proposing device management policy model is used for device management, we can integrate control management for heterogeneous middleware, diverse RFID devices, and applications for each company. Moreover, we show that the RFID device management policy is translated and processed as an example using the proposing policy model in real-time RFID system.

Importance-Performance Analysis to Evaluate Historic Culture Festival -The Case of The Yeoncheon Jeongok Paleolithic Festival- (역사체험축제의 중요도-실행도 분석에 관한 연구 -연천전곡리 구석기축제를 중심으로-)

  • Park, Sang-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.10
    • /
    • pp.321-329
    • /
    • 2007
  • The form of travel has been changing to dynamic, experience and family. Festivals are popular, specially the historic culture festivals, whose themes are a history event, a time and the people, are preferred to families because they give visitors opportunities of education and experience. Evaluation of festivals is important that it diagnoses the problems and enhancement One of the evaluation methods, Importance-Performance Analysis is useful which it is easy to find priority with visual matrix without complex statistical technique and a technical terminology. This research used IPA to evaluate The Yeoncheon Jeongok Paleolithic Festival which is one of the popular historic culture festivals. From the result 'unique food', 'rest facility', 'other convenience facility', 'hygiene', 'crowding' were included in selected to 'concentrate' territory of the IPA matrix. Therefor the festival manager should put his efforts to develop unique food, build more rest and other convenience facilities, enhance hygiene, and lowered crowding.

The characteristics of the ISP 98 and the comparison of the ISP 98 and the UCP 600 (ISP98의 특성과 UCP600과의 비교연구)

  • Park, Sae-Woon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.41
    • /
    • pp.51-78
    • /
    • 2009
  • The ISP 98 is developed by the American Institute of International Banking Law & Practice in 1998. The ISP98 are also published as ICC Publication No. 590. A detailed commentary on the rules("The Official Commentary on the International Standby Practice") has been written by Professor James E. Byrnes. Presently there is no compelling reason to revise the rules themselves even if ten years is passed since the issuance of ISP98. Insteadthe American Institute of International Banking Law & Practice will provide Model Forms in the early 2009. Special features of the ISP 98 are as the following. Firstly, the ISP 98 is copyrighted by the Institute of International Banking Law and Practice, Inc., and published by the International Chamber of Commerce. Secondly, the ISP 98 differs from UCP in style and approach because it must receive acceptance not only from bankers and merchants, but also from a broader range of those actively involved in standby law and practice corporate treasurees and credit manager, rating agencies, government agencies and regulators, and indenture trustees as well as their counsel. Because standbys are often intended to be available in the event of disputes or applicant insovency, their texts are subject to a degree of scrutiny not encountered in the commercial letter of credit context. Thirdly, the ISP 98 supplement the UCP if the UCP dose not have the relative rule. Lastly, the ISP 98 has the official commentary. In addition, several provision of the ISP 98 would surprise the commercial parties and/or are rather peculiar, while some of them display a certain bias in favor of the banks.

  • PDF

A Study on LMS Using Effective User Interface in Mobile Environment (모바일 환경에서 효과적인 사용자 인터페이스를 이용한 LMS에 관한 연구)

  • Kim, Si-Jung;Cho, Do-Eun
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.76-81
    • /
    • 2012
  • With the spread of the various mobile devices, the studies on the learning management system based on the u-learning are actively proceeding. The u-learning-based learning management system is very convenient in that there are no restrictions on the various access devices as well as the access time and place. However, the judgments on the authentication for the user and whether learning is focused on are difficult. In this paper, the voice and user face capture interface rather than the common user event oriented interface was applied to the learning management system. When a user is accessing the learning management system, user's registered password is input and login as voice, and the user's learning attitude is judged through the response utterance of simple words during the process of learning through contents. As a result of evaluating the proposed learning management system, the user's learning achievement and concentration were improved, thus enabling the manager to monitor the user's abnormal learning attitude.