• Title/Summary/Keyword: Event-based Service

Search Result 367, Processing Time 0.024 seconds

Software Architecture of IEEE1394 Based Home Network for Guaranteeing Real-Time Characteristics of Isochronous Service and Event (IEEE1394 기반의 홈 네트웍에서 이벤트와 등시성 서비스의 실시간성 보장을 위한 소프트웨어 구조)

  • Park, Dong-Hwan;O, Bong-Jin;Gang, Sun-Ju
    • The KIPS Transactions:PartA
    • /
    • v.9A no.2
    • /
    • pp.181-190
    • /
    • 2002
  • IEEE1394 is a de facto standard for the home network interfaces of digital multimedia home devices including digital A/V systems, digital camcorders, and PCs. Recently, it has been used in applications to guarantee the real-time characteristics such as home automation system and IICP (Instrument and Industrial Control Protocol). In order to guarantee real-time requirements in these IEEE1394-based real-time applications, this thesis proposes the software architecture of an IEEE1394 based home network that supports the guarantee for service's react-time characteristics. The proposed architecture has a real-time IEEE1394 device driver and event service architecture for guarantee real-time characteristics. The real-time device driver supports priority-based queueing of packets and mechanism to reduce the interrupt latency time in ISR. The event service architecture supports a real-time events delivery based on home network service using real-time event channel. This architecture can accommodate the real-time requirements of various applications and services such as digital multimedia services with QoS guarantees. home automation system required real-tine characteristics.

A Case Study on the Implementation of Context-aware based on Home Robot Service (상황인식 기반 홈 로봇 서비스의 구현사례)

  • Kim, Hyoung-Sun
    • Journal of Service Research and Studies
    • /
    • v.4 no.1
    • /
    • pp.49-59
    • /
    • 2014
  • Context-aware computing is an emerging paradigm to achieve ubiquitous computing environments by enabling computer systems to understand their situational contexts. A context-aware system uses context to provide relevant information and services to the user depending on the user's task. In this paper, we propose an ontology-based context-aware modeling methodology that transmits low-level contexts acquired by directly accessing various sensors in the physical environments to high-level contexts. With these high-level contexts, context-aware application can provides proactive and intelligent services using ECA (Event-Condition-Action) rules. We implemented a home robot service in smart office environment.

  • PDF

Efficient Class Identification based on Event (이벤트 기반의 효율적인 클래스 식별)

  • Choi, Mi-Sook;Lee, Jong-Suk
    • Journal of Digital Contents Society
    • /
    • v.9 no.2
    • /
    • pp.165-175
    • /
    • 2008
  • Currently, software development methods have been advanced to service-oriented from component-oriented, to component-oriented from object-oriented. The component-oriented and service-oriented software development methods are analyzed by object-oriented UML model. So, the efficient analysis method for object-oriented UML model needs. In this paper, we suggest the analysis guideline and process based on event using Input Data-Process-Output Data Table for identifying use cases and classes efficiently. And the suggested method complements the problems depending the developer's perspective and experience.

  • PDF

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process

  • Preethi, G.A.;Chandrasekar, C.
    • Journal of Information Processing Systems
    • /
    • v.11 no.4
    • /
    • pp.616-629
    • /
    • 2015
  • A mobile terminal will expect a number of handoffs within its call duration. In the event of a mobile call, when a mobile node moves from one cell to another, it should connect to another access point within its range. In case there is a lack of support of its own network, it must changeover to another base station. In the event of moving on to another network, quality of service parameters need to be considered. In our study we have used the Markov decision process approach for a seamless handoff as it gives the optimum results for selecting a network when compared to other multiple attribute decision making processes. We have used the network cost function for selecting the network for handoff and the connection reward function, which is based on the values of the quality of service parameters. We have also examined the constant bit rate and transmission control protocol packet delivery ratio. We used the policy iteration algorithm for determining the optimal policy. Our enhanced handoff algorithm outperforms other previous multiple attribute decision making methods.

Visitors' Satisfaction on the Gwangju Kimchi Festival Publicity and Event Programs (광주김치대축제 방문객의 홍보 및 행사 만족도에 관한 연구)

  • Jeung, Gang-Hoan;Roh, Yong-Ho;Kim, Hyun-Duk
    • Journal of the Korean Society of Food Culture
    • /
    • v.20 no.3
    • /
    • pp.374-383
    • /
    • 2005
  • The purpose of this study was to investigate the satisfaction on the Gwangju Kimchi Festival. The results of this study were as follows: In terms of satisfaction on 'pre event publicity of the Festival', the satisfaction of '03 was high. It was founded that Publicity through TV was successful. The visitors' satisfaction on understanding regional cultures was low. It was consecutively low for three years. There should be strategic development plans to increase satisfaction about understanding regional cultures. It was found that TV was the major pre event information resource for the residents. Also word of mouth was the most important pre event information resource for domestic tourists. The satisfaction on access to festival was increased consecutively. Providing free shuttle buses to the festival place and placing festival placard influenced positively. There should be expansion of service facilities. There should be more strengthening of festival information services and guiding facilities. More professional interpretation systems and interpretation education are necessary. Visitors satisfied about festival products and quality of the products. Visitors satisfied with festival events programs and hands on experience based programs including making diverse Kimchi.

A Study on Development of Private Security Service: -Focused on event security service- (민간경비업무의 발전방안 연구: 이벤트 경비업무를 중심으로)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.157-176
    • /
    • 2018
  • The purpose of this study is to explore the development methods of private security services based on the problems that field experts in charge of event security are currently aware of. In order to accomplish the purpose of this study, we conducted interviews with 4 professors in relevant fields and 6 field experts with more than 10 years experience and analyzed the data. They suggested the development of private security services as follows. First, education that is related to event security work is necessary. Second, training should be conducted in response to audience and audience complaints. Third, service-related training is required. Fourth, in the Security Law, the provisions of the collective complaints field should be adjusted to the reality. Fifth, improving poor working conditions. Sixth, it is necessary to educate to develop responsibility and sense of mission.

Design and Implementation of Notification Service Based on the uniORB (uniORB 상에서의 Notification Service 설계 및 구현)

  • 윤교철;박성우;황선태;김영만;이동길;백의현;장종현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.229-231
    • /
    • 2002
  • 본 논문에서는 실시간 시스템인 전화 교환기에서 운영되는 C언어 기반 분산 처리시스템인 uniORB 상에서 이벤트 전송을 담당하는 서비스인 Event Service의 기능을 보완하고 다양한 이벤트의 타입과 필터링 기능, QoS를 제공하는 Notification Service에 대한 실시간 버전의 설계 및 구현을 하였다.

  • PDF

An Active Network Execution Environment for on Demand Customization of Communication Protocols and Services (맞춤형 통신 프로토콜과 서비스를 위한 액티브 네트워크 실행환경)

  • Lee Hwa Young;Kang Bo-young;Lim Kyungshik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.937-950
    • /
    • 2004
  • In this paper, we present the design and implementation of new execution environment named Customizable Architecture for Flexible Execution Environment(CAFEs) that supports the mechanism of protocol customization and service referencing. We introduce a new concept as micro protocols and active services to enhance software reusability. Micro protocol represents a specific algorithm or functionality of existing network protocol and the active service is in charge of binding legacy application and releasing the active network oriented services. The pro-posed active network execution environment is made up of three parts, virtual network system, protocol and service manager, event engine. First, the virtual network system is used to connect each active nodes using virtual network channels which are based on multiple existing protocol layers. Second, the protocol and service manager is responsible for composing micro protocols and active services to develop new network proto-col and service easily. Finally, the event engine is used to detect the automatic transition of system components using event delegation model. To verify the CAFTs, we have an experiment about the delivery of web contents which are suitable for the user's terminals in the wireless Internet environment. As a result. we are able to obtain the availability of developed execution environment.

Intrusion Detection on IoT Services using Event Network Correlation (이벤트 네트워크 상관분석을 이용한 IoT 서비스에서의 침입탐지)

  • Park, Boseok;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.24-30
    • /
    • 2020
  • As the number of internet-connected appliances and the variety of IoT services are rapidly increasing, it is hard to protect IT assets with traditional network security techniques. Most traditional network log analysis systems use rule based mechanisms to reduce the raw logs. But using predefined rules can't detect new attack patterns. So, there is a need for a mechanism to reduce congested raw logs and detect new attack patterns. This paper suggests enterprise security management for IoT services using graph and network measures. We model an event network based on a graph of interconnected logs between network devices and IoT gateways. And we suggest a network clustering algorithm that estimates the attack probability of log clusters and detects new attack patterns.

Evaluation Model of Service Reliability Using a Service Blueprint and FTA (서비스 블루프린트와 FTA를 이용한 서비스 신뢰도 평가모델)

  • Yoo, Jung-Sang;Oh, Hyung-Sool
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.4
    • /
    • pp.194-201
    • /
    • 2012
  • Because the difference between products and services are getting less and less, service and manufacturing companies' efforts are increasingly focused on utilizing services to satisfy customers' needs under today's competitive market environment. The value of services depends on service reliability that is identified by satisfaction derived from the relationship between customer needs and service providers. In this paper, we extend concepts from the fault tree analysis for reliability analysis of tangible systems to services. We use an event-based process model to facilitate service design and represent the relationships between functions and failures in a service. The objective of this research is to propose a method for evaluating service reliability based on service processes using service blueprint and FTA. We can identify the failure mode of service in a service delivery process with a service blueprint. The fuzzy membership function is used to characterize the probability of failure based on linguistic terms. FTA is employed to estimate the reliability of service delivery processes with risk factors that are represented as potential failure causes. To demonstrate implementation of the proposed method, we use a case study involving a typical automotive service operation.