• Title/Summary/Keyword: event control process

Search Result 176, Processing Time 0.026 seconds

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process

  • Preethi, G.A.;Chandrasekar, C.
    • Journal of Information Processing Systems
    • /
    • v.11 no.4
    • /
    • pp.616-629
    • /
    • 2015
  • A mobile terminal will expect a number of handoffs within its call duration. In the event of a mobile call, when a mobile node moves from one cell to another, it should connect to another access point within its range. In case there is a lack of support of its own network, it must changeover to another base station. In the event of moving on to another network, quality of service parameters need to be considered. In our study we have used the Markov decision process approach for a seamless handoff as it gives the optimum results for selecting a network when compared to other multiple attribute decision making processes. We have used the network cost function for selecting the network for handoff and the connection reward function, which is based on the values of the quality of service parameters. We have also examined the constant bit rate and transmission control protocol packet delivery ratio. We used the policy iteration algorithm for determining the optimal policy. Our enhanced handoff algorithm outperforms other previous multiple attribute decision making methods.

Control-Path Driven Process-Group Discovery Framework and its Experimental Validation for Process Mining and Reengineering (프로세스 마이닝과 리엔지니어링을 위한 제어경로 기반 프로세스 그룹 발견 프레임워크와 실험적 검증)

  • Thanh Hai Nguyen;Kwanghoon Pio Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.51-66
    • /
    • 2023
  • In this paper, we propose a new type of process discovery framework, which is named as control-path-driven process group discovery framework, to be used for process mining and process reengineering in supporting life-cycle management of business process models. In addition, we develop a process mining system based on the proposed framework and perform experimental verification through it. The process execution event logs applied to the experimental effectiveness and verification are specially defined as Process BIG-Logs, and we use it as the input datasets for the proposed discovery framework. As an eventual goal of this paper, we design and implement a control path-driven process group discovery algorithm and framework that is improved from the ρ-algorithm, and we try to verify the functional correctness of the proposed algorithm and framework by using the implemented system with a BIG-Log dataset. Note that all the process mining algorithm, framework, and system developed in this paper are based on the structural information control net process modeling methodology.

Study on threat analysis about national important facility and control process (국가중요시설에 대한 위협분석과 처리절차에 관한 연구 - 인천국제공항을 중심으로 -)

  • Hwang, Ho-Won;Lee, Ki-Hun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.31-40
    • /
    • 2009
  • South Korea opened Incheon international airport(IIA) in march 29, 2001, with high expectations of becoming the distribution hub of Northeast Asia and aiming at a world best air hub. IIA compares quite well with any other leading airports in the world in it's facilities for the movement of people and vehicles. However, with the sequence of events following the September, 2001. terrorist attack and the war in Iraq, South Korea, an ally of the US, cannot be considered a safe haven from terrorism. At a point in time when national security is given utmost importance, it is necessary to reevaluate the security of airports, because international terrorism can only occur via air and seaports. Nowadays all the countries of the world have entered into competition for their national interests and innovation of their images. with the increasing role of international airports also comes an increased likelihood as a terrorist target, because it can affect so many people and countries. From the condition of current international terrorism, we can realize that our IIA is not completely safe from a terrorist attack. The major part of counterterrorism is event control process. It's very important for quickly saves an accident and rescues a life of person, In addition for the normalization which the airport operation is prompt. In conclusion, we should secure the legal responsibility and establish and establish a system under which we can work actively in order to implement counter terror activities from being taken an airport.

  • PDF

Disjunctive Process Patterns Refinement and Probability Extraction from Workflow Logs

  • Kim, Kyoungsook;Ham, Seonghun;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.85-92
    • /
    • 2019
  • In this paper, we extract the quantitative relation data of activities from the workflow event log file recorded in the XES standard format and connect them to rediscover the workflow process model. Extract the workflow process patterns and proportions with the rediscovered model. There are four types of control-flow elements that should be used to extract workflow process patterns and portions with log files: linear (sequential) routing, disjunctive (selective) routing, conjunctive (parallel) routing, and iterative routing patterns. In this paper, we focus on four of the factors, disjunctive routing, and conjunctive path. A framework implemented by the authors' research group extracts and arranges the activity data from the log and converts the iteration of duplicate relationships into a quantitative value. Also, for accurate analysis, a parallel process is recorded in the log file based on execution time, and algorithms for finding and eliminating information distortion are designed and implemented. With these refined data, we rediscover the workflow process model following the relationship between the activities. This series of experiments are conducted using the Large Bank Transaction Process Model provided by 4TU and visualizes the experiment process and results.

생산제어시스템의 시뮬레이션모델 자동생성

  • 이상훈;조현보;정무영
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.631-634
    • /
    • 1996
  • This paper describes an intelligent user interface to define simulation models from the process and resource models. It also explains an automatic program generator of discrete event simulation model for shop floor control in a flexible manufacturing system. Especially, the paper is focused on the design and development of methodology to automate simulation modeling from the system description. Describing a shop floor control system in simulation is not an easy task since it must resolve various decision problems such as deadlock resolution, part dispatching, resource conflict resolution, etc. The program generator should be capable of constructing a complete discrete simulation models for a multi-product and multi-stage flow shop containing the above mentioned problems.

  • PDF

A Study on the Safety Plan for a Train Control System (열차제어시스템의 안전계획 수립에 관한 연구)

  • Kim Jong-Ki;Shin Duc-Ko;Lee Key-Seo
    • Journal of the Korean Society for Railway
    • /
    • v.9 no.3 s.34
    • /
    • pp.264-270
    • /
    • 2006
  • In this paper we present a safety plan to be applied to the development of the TCS(Train Control System). The safety plan that can be applied to the life cycle of a system, from the conceptual design to the dismantlement, shows the whole process of the paper work in detail through the establishment of a goal, analysis and assessment, the verification. In this paper we study about the making a plan, the preliminary hazard analysis, the hazard identification and analysis to guarantee the safety of the TCS. The process far the verification of the system safety is divided into several steps based on the target system and the approaching method. The guarantee of the system safety and the improvement of the system reliability is fellowed by the recommendation of the international standards.

A Conceptual Approach for Discovering Proportions of Disjunctive Routing Patterns in a Business Process Model

  • Kim, Kyoungsook;Yeon, Moonsuk;Jeong, Byeongsoo;Kim, Kwanghoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1148-1161
    • /
    • 2017
  • The success of a business process management system stands or falls on the quality of the business processes. Many experiments therefore have been devoting considerable attention to the modeling and analysis of business processes in process-centered organizations. One of those experiments is to apply the probabilistic theories to the analytical evaluations of business process models in order to improve their qualities. In this paper, we excogitate a conceptual way of applying a probability theory of proportions into modeling business processes. There are three types of routing patterns such as sequential, disjunctive, conjunctive and iterative routing patterns in modeling business processes, into which the proportion theory is applicable. This paper focuses on applying the proportion theory to the disjunctive routing patterns, in particular, and formally named proportional information control net that is the formal representation of a corresponding business process model. In this paper, we propose a conceptual approach to discover a proportional information control net from the enactment event histories of the corresponding business process, and describe the details of a series of procedural frameworks and operational mechanisms formally and graphically supporting the proposed approach. We strongly believe that the conceptual approach with the proportional information control net ought to be very useful to improve the quality of business processes by adapting to the reengineering and redesigning the corresponding business processes.

Study of Analysis of Brain-Computer Interface System Performance using Independent Component Algorithm (독립성분분석 방법을 이용한 뇌-컴퓨터 접속 시스템 신호 분석)

  • Song, Jung-Wha;Lee, Hyun-Joo;Cho, Bung-Oak;Park, Soo-Young;Shin, Hyung-Cheul;Lee, Un-Joo;Song, Seong-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.9
    • /
    • pp.838-842
    • /
    • 2007
  • A brain-computer interface(BCI) system is a communication channel which transforms a subject's thought process into command signals to control various devices. These systems use electroencephalographic signals or the neuronal activity of many single neurons. The presented study deals with an efficient analysis method of neuronal signals from a BCI System using an independent component analysis(ICA) algorithm. The BCI system was implemented to generate event signals coding movement information of the subject. To apply the ICA algorithm, we obtained the perievent histograms of neuronal signals recorded from prefrontal cortex(PFC) region during target-to-goal(TG) task trials in the BCI system. The neuronal signals were then smoothed over 5ms intervals by low-pass filtering. The matrix of smoothed signals was then rearranged such that each signal was represented as a column and each bin as a row. Each column was also normalized to have a unit variance. As a result, we verified that different patterns of the neuronal signals are dependent on the target position and predefined event signals.

A Real Time Quadrotor Autonomous Navigation and Remote Control Method (실시간 쿼드로터 자율주행과 원격제어 기법)

  • Son, Byung-Rak;Kang, Seok-Min;Lee, Hyun;Lee, Dong-Ha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.4
    • /
    • pp.205-212
    • /
    • 2013
  • In recent, the demand of Unmanned Aerial Vehicles (UAVs) that can autonomous navigation and remote control has been increased in military, civil and commercial field. Particularly, existing researches focused on autonomous navigation method based on vanish point and remote control method based on event processing in indoor environments. However, the existing methods have some problems. For instance, a detected vanish point in intersection point has too much detection errors. In addition, the delay is increased in existing remote control system for processing images in real time. Thus, we propose improved vanish point algorithm by removing detection errors in intersection point. We also develop a remote control system with android platform by separating flying control and image process. Finally, we compare the proposed methods with existing methods to show the improvement of our approaches.

Reconfiguration method for Supervisor Control in Deadlock status Using FSSTP(Forbidden Sequence of State Transition Problem) (순차상태전이금지(FSSTP)를 이용한 교착상태 관리제어를 위한 재구성 방법)

  • Song, Yu-Jin;Lee, Eun-Joo;Lee, Jong-Kun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.3
    • /
    • pp.213-220
    • /
    • 2008
  • The object of this paper is to propose a method to deal with the problem of modeling user specifications in approaches based on supervisory control and Petri nets. However, most of Petri Net approaches are based on forbidden states specifications, and these specifications are suitable the use of tool such as the reachability graph. But these methods were not able to show the user specification easily and these formalisms are generally limited by the combinatorial explosion that occurs when attempting to model complex systems. Herein, we propose a new efficient method using FSSTP (Forbidden Sequences of State-Transitions Problem) and theory of region. Also, to detect and avoid the deadlock problem in control process, we use DAPN method (Deadlock Avoidance Petri nets) for solving this problem in control model.