• 제목/요약/키워드: Event approach

검색결과 703건 처리시간 0.032초

C-DEVS형식론을 이용한 실시간 이산사건 제어시스템의 논리 해석 기법 (Logical Analysis of Real-time Discrete Event Control Systems Using Communicating DEVS Formalism)

  • 송해상;김탁곤
    • 한국시뮬레이션학회논문지
    • /
    • 제21권4호
    • /
    • pp.35-46
    • /
    • 2012
  • 실시간 시스템의 복잡도가 증가함에 따라 임시방편적 시스템 해석 방법은 시스템 동작 영역 전체를 완전하게 분석하는 데는 한계가 있다. 모델링을 기반으로 한 정형 기법은 그러한 한계점을 극복 할 수 있다. 본 논문은 모델 기반 정형 기법을 이용하여 실시간 시스템의 안전성 및 필연성 등과 같은 논리적 타당성을 이산 사건 모델 수준에서 분석하는 방법을 제안한다. 먼저, 분석 대상 실시간 시스템은 이산사건 수준에서 계층적으로 모듈화하여 모델을 명세하는 수학적 형식론인 DEVS (Discrete Event Systems Specification) 형식론으로 기술된다. 다음으로, 기술된 DEVS 모델은 시간 명세가 포함된 전역 상태 공간을 표현하는 C-DEVS (Communicating DEVS) 형식론으로 표현한 후 C-DEVS 형식론의 해석 알고리즘을 통해 시스템 동작을 분석된다. 제안된 C-DEVS 형식론 및 해석 알고리즘은 주어진 시스템의 동작 특성을 분석하는 과정에서 시스템의 상태 공간을 완전하게 빠짐없이 탐색하는 것을 보장한다. 간단한 건널목 제어 시스템의 안전성 분석 사례 연구를 통하여 제안된 모델 기반 해석 기법의 효율성을 예시 하였다.

IoT 기반 간헐적 이벤트 로깅 응용에 최적화된 효율적 플래시 메모리 전력 소모 감소기법 (Efficient Flash Memory Access Power Reduction Techniques for IoT-Driven Rare-Event Logging Application)

  • 권지수;조정훈;박대진
    • 대한임베디드공학회논문지
    • /
    • 제14권2호
    • /
    • pp.87-96
    • /
    • 2019
  • Low power issue is one of the most critical problems in the Internet of Things (IoT), which are powered by battery. To solve this problem, various approaches have been presented so far. In this paper, we propose a method to reduce the power consumption by reducing the numbers of accesses into the flash memory consuming a large amount of power for on-chip software execution. Our approach is based on using cooperative logging structure to distribute the sampling overhead in single sensor node to adjacent nodes in case of rare-event applications. The proposed algorithm to identify event occurrence is newly introduced with negative feedback method by observing difference between past data and recent data coming from the sensor. When an event with need of flash access is determined, the proposed approach only allows access to write the sampled data in flash memory. The proposed event detection algorithm (EDA) result in 30% reduction of power consumption compared to the conventional flash write scheme for all cases of event. The sampled data from the sensor is first traced into the random access memory (RAM), and write access to the flash memory is delayed until the page buffer of the on-chip flash memory controller in the micro controller unit (MCU) is full of the numbers of the traced data, thereby reducing the frequency of accessing flash memory. This technique additionally reduces power consumption by 40% compared to flash-write all data. By sharing the sampling information via LoRa channel, the overhead in sampling data is distributed, to reduce the sampling load on each node, so that the 66% reduction of total power consumption is achieved in several IoT edge nodes by removing the sampling operation of duplicated data.

이산사건 시스템 제어 및 모니터링을 위한 퍼지 패트리네트 응용 (Application of fuzzy Petri nets for discrete event system control and monitoring)

  • 노명균;홍상은
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1997년도 한국자동제어학술회의논문집; 한국전력공사 서울연수원; 17-18 Oct. 1997
    • /
    • pp.403-406
    • /
    • 1997
  • This paper presents a Petri net approach for the control and monitoring of discrete event system. The proposed model is fuzzy Petri nets based on the fuzzy logic with Petri nets and the hierarchy concept. Fuzzy Petri nets have been used to model the imprecise situations which can arise within automated manufacturing system, and also the hierarchy concept allow to handle the refinement of places and transition in Petri nets model. These will form the foundation of a simulator-tool with manipulation interface for application of fuzzy Petri nets.

  • PDF

Identification of Chinese Event Types Based on Local Feature Selection and Explicit Positive & Negative Feature Combination

  • Tan, Hongye;Zhao, Tiejun;Wang, Haochang;Hong, Wan-Pyo
    • Journal of information and communication convergence engineering
    • /
    • 제5권3호
    • /
    • pp.233-238
    • /
    • 2007
  • An approach to identify Chinese event types is proposed in this paper which combines a good feature selection policy and a Maximum Entropy (ME) model. The approach not only effectively alleviates the problem that classifier performs poorly on the small and difficult types, but improve overall performance. Experiments on the ACE2005 corpus show that performance is satisfying with the 83.5% macro - average F measure. The main characters and ideas of the approach are: (1) Optimal feature set is built for each type according to local feature selection, which fully ensures the performance of each type. (2) Positive and negative features are explicitly discriminated and combined by using one - sided metrics, which makes use of both features' advantages. (3) Wrapper methods are used to search new features and evaluate the various feature subsets to obtain the optimal feature subset.

Advanced Reactor Passive System Reliability Demonstration Analysis for an External Event

  • Bucknor, Matthew;Grabaskas, David;Brunett, Acacia J.;Grelle, Austin
    • Nuclear Engineering and Technology
    • /
    • 제49권2호
    • /
    • pp.360-372
    • /
    • 2017
  • Many advanced reactor designs rely on passive systems to fulfill safety functions during accident sequences. These systems depend heavily on boundary conditions to induce a motive force, meaning the system can fail to operate as intended because of deviations in boundary conditions, rather than as the result of physical failures. Furthermore, passive systems may operate in intermediate or degraded modes. These factors make passive system operation difficult to characterize within a traditional probabilistic framework that only recognizes discrete operating modes and does not allow for the explicit consideration of time-dependent boundary conditions. Argonne National Laboratory has been examining various methodologies for assessing passive system reliability within a probabilistic risk assessment for a station blackout event at an advanced small modular reactor. This paper provides an overview of a passive system reliability demonstration analysis for an external event. Considering an earthquake with the possibility of site flooding, the analysis focuses on the behavior of the passive Reactor Cavity Cooling System following potential physical damage and system flooding. The assessment approach seeks to combine mechanistic and simulation-based methods to leverage the benefits of the simulation-based approach without the need to substantially deviate from conventional probabilistic risk assessment techniques. Although this study is presented as only an example analysis, the results appear to demonstrate a high level of reliability of the Reactor Cavity Cooling System (and the reactor system in general) for the postulated transient event.

Discovering Redo-Activities and Performers' Involvements from XES-Formatted Workflow Process Enactment Event Logs

  • Pham, Dinh-Lam;Ahn, Hyun;Kim, Kwanghoon Pio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권8호
    • /
    • pp.4108-4122
    • /
    • 2019
  • Workflow process mining is becoming a more and more valuable activity in workflow-supported enterprises, and through which it is possible to achieve the high levels of qualitative business goals in terms of improving the effectiveness and efficiency of the workflow-supported information systems, increasing their operational performances, reducing their completion times with minimizing redundancy times, and saving their managerial costs. One of the critical challenges in the workflow process mining activity is to devise a reasonable approach to discover and recognize the bottleneck points of workflow process models from their enactment event histories. We have intuitively realized the fact that the iterative process pattern of redo-activities ought to have the high possibility of becoming a bottleneck point of a workflow process model. Hence, we, in this paper, propose an algorithmic approach and its implementation to discover the redo-activities and their performers' involvements patterns from workflow process enactment event logs. Additionally, we carry out a series of experimental analyses by applying the implemented algorithm to four datasets of workflow process enactment event logs released from the BPI Challenges. Finally, those discovered redo-activities and their performers' involvements patterns are visualized in a graphical form of information control nets as well as a tabular form of the involvement percentages, respectively.

시뮬레이션 기법을 이용한 운영리스크 평가 (Simulation-Based Operational Risk Assessment)

  • 황명수;이영재
    • 한국IT서비스학회지
    • /
    • 제4권1호
    • /
    • pp.129-139
    • /
    • 2005
  • This paper proposes a framework of Operational Risk-based Business Continuity System(ORBCS), and develops protection system for operational risk through operational risk assessment and loss distribution approach based on risk management guideline announced in the basel II. In order to find out financial operational risk, business processes of domestic bank are assorted by seven event factors and eight business activities so that we can construct the system. After we find out KRI(Key Risk Indicator) index, tasks and risks, we calculated risk possibility and expected cost by analyzing quantitative data, questionnaire and qualitative approach for AHP model from the past events. Furthermore, we can assume unexpected cost loss by using loss distribution approach presented in the basel II. Each bank can also assume expected loss distributions of operational risk by seven event factors and eight business activities. In this research, we choose loss distribution approach so that we can calculate operational risk. In order to explain number of case happened, we choose poisson distribution, log-normal distribution for loss cost, and estimate model for Monte-Carlo simulation. Through this process which is measured by operational risk. of ABC bank, we find out that loss distribution approach explains closer unexpected cost directly compared than internal measurement approach, and makes less unexpected cost loss.

영아의 도움 행동과 방해 행동의 의도 이해 (Infants' understanding of intentions underlying agents' helping and hindering actions)

  • 이영은;송현주
    • 인지과학
    • /
    • 제25권2호
    • /
    • pp.135-157
    • /
    • 2014
  • 본 연구는 6개월 및 12개월 영아들이 행위자(agent)의 사회적인 선호를 추론할 때, 이전에 있었던 사회적 상호작용 내의 행동 의도 정보를 고려할 수 있는지 살펴보았다. 친숙화 시행에서 12개월(실험 1), 6개월(실험 2) 영아들은 한 도형(세모 또는 네모)이 동그라미를 밀어 올려서 동그라미가 언덕을 오를 수 있도록 돕는 장면과 다른 도형이 동그라미를 아래쪽으로 밀어서 언덕을 오를 수 없도록 방해하는 장면을 보았다. 이 때, 도움 행동과 방해 행동의 의도만 제시하고, 행동의 결과, 즉 목표 달성의 성공 또는 실패는 명확하게 보여주지 않았다. 검사 시행에서 영아들은 동그라미가 도움자 도형에게 접근하는 장면(도움자 접근 조건)을 보거나 방해자 도형에게 접근하는 장면(방해자 접근 조건)을 보았다. 그 결과, 두 연령 집단 모두 방해자 접근 조건일 때보다 도움자 접근 조건일 때, 검사 시행을 유의미하게 더 오래 보았다. 이는 6-12개월 영아가 행위자의 의도를 고려해서 도움자와 방해자를 구별할 수 있으며 이러한 정보를 바탕으로 행위자의 사회적 선호를 추론할 수 있음을 보여준다. 본 연구 결과는 영아들이 돕기와 같은 도덕 관련 행동의 의도를 고려할 수 있고, 이를 통해 행위자의 사회적 선호를 추론할 수 있는 능력이 생후 1년 이내에 존재할 수 있음을 보여준다.

비즈니스 프로세스 수행자들의 Social Network Mining에 대한 연구 (Mining Social Networks from business process log)

  • 송민석;;최인준
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 2004년도 춘계공동학술대회 논문집
    • /
    • pp.544-547
    • /
    • 2004
  • Current increasingly information systems log historic information in a systematic way. Not only workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called 'event log'. Unfortunately, the information in these event logs is rarely used to analyze the underlying processes. Process mining aims at improving this problem by providing techniques and tools for discovering process, control, data, organizational, and social structures from event logs. This paper focuses on the mining social networks. This is possible because event logs typically record information about the users executing the activities recorded in the log. To do this we combine concepts from workflow management and social network analysis. This paper introduces the approach and presents a tool to mine social networks from event logs.

  • PDF

A New Approach to Determine the Direction and Cause of Voltage Sag

  • Ahn, Seon-Ju;Won, Dong-Jun;Chung, Il-Yop;Moon, Seung-Il
    • Journal of Electrical Engineering and Technology
    • /
    • 제3권3호
    • /
    • pp.300-307
    • /
    • 2008
  • Event source locating is very important to improving the power quality level. This paper presents a method to determine the relative location of the voltage sag source according to the cause. For this, the concept of the relative location of the source is defined first. Then, the main causes of voltage sag are classified and their characteristics are discussed. From these investigations, the rules to determine the relative location of event source are proposed for each type and the overall algorithm to identify the relative location and the kind of event source is presented. Finally, the proposed method is applied to the IEEE 13-bus test system and it is verified that the method can help to pinpoint the accurate location of the event source.