• Title/Summary/Keyword: event processing

Search Result 692, Processing Time 0.03 seconds

A Novel Approach for Deriving Test Scenarios and Test Cases from Events

  • Singh, Sandeep K.;Sabharwal, Sangeeta;Gupta, J.P.
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.213-240
    • /
    • 2012
  • Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test ma Safety critic Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test manually. In order to cut down on costs, save time, and increase reliability, the model based testing approach is the best solution. Such an approach does not require applications or codes prior to generating test cases, so it leads to the early detection of faults, which helps in reducing the development time. Several model-based testing approaches have used different UML models but very few works have been reported to show the generation of test cases that use events. Test cases that use events are an apt choice for these types of systems. However, these works have considered events that happen at a user interface level in a system while other events that happen in a system are not considered. Such works have limited applications in testing the GUI of a system. In this paper, a novel model-based testing approach is presented using business events, state events, and control events that have been captured directly from requirement specifications. The proposed approach documents events in event templates and then builds an event-flow model and a fault model for a system. Test coverage criterion and an algorithm are designed using these models to generate event sequence based test scenarios and test cases. Unlike other event based approaches, our approach is able to detect the proposed faults in a system. A prototype tool is developed to automate and evaluate the applicability of the entire process. Results have shown that the proposed approach and supportive tool is able to successfully derive test scenarios and test cases from the requirement specifications of safety critical systems, real time systems, and event based systems.

PML schema design for XML-based on electronic tag information processing (XML 기반 전자태그 정보처리를 위한 PML 스키마 설계)

  • Kim, Chang-Su;Chang, Jung-Soo;Kim, Jin-Su;Hur, Chang-Wu;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.511-514
    • /
    • 2005
  • The application service to use recently an electronic tag have been activated. Therefore research about a data processing of an electronic tag have been processed widely. Therefore, object information to be collected efficiently from various former tag for requesting a data processing of XML based on used widely in Web. For this EPCIS defined the standard interface to share EPC relation data. Currently, Core Event Type of EPCIS defined the Core Type to need in EPC network currently and Types about a business context do not define according to Apply field. We apply to EPC network to a specific business We need the type about the information which defines with Core Event Type. in this paper. We are defining an reusable object type which is used often in a business area. in this way design the schema based to an object information data model of a marine logistics apply to the object type to define in this way and Core Event Type to define EPCIS Specnt.

  • PDF

Development of Network Event Audit Module Using Data Mining (데이터 마이닝을 통한 네트워크 이벤트 감사 모듈 개발)

  • Han, Seak-Jae;Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.1-8
    • /
    • 2005
  • Network event analysis gives useful information on the network status that helps protect attacks. It involves finding sets of frequently used packet information such as IP addresses and requires real-time processing by its nature. Apriori algorithm used for data mining can be applied to find frequent item sets, but is not suitable for analyzing network events on real-time due to the high usage of CPU and memory and thus low processing speed. This paper develops a network event audit module by applying association rules to network events using a new algorithm instead of Apriori algorithm. Test results show that the application of the new algorithm gives drastically low usage of both CPU and memory for network event analysis compared with existing Apriori algorithm.

  • PDF

A New Approach for Multiple Object Tracking ? Discrete Event based Multiple Object Tracking (DEMOT)

  • Kim, Chi-Ho;You, Bum-Jae;Kim, Hag-Bae;Oh, Sang-Rok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1134-1139
    • /
    • 2003
  • Tracking is a fundamental technique which is able to be applied to gesture recognition, visual surveillance, tangible agent and so forth. Especially, multiple object tracking has been extensively studied in recent years in order to perform many and more complicated tasks. In this paper, we propose a new approach of multiple object tracking which is based on discrete event. We call this system the DEMOT (Discrete Event based Multiple Object Tracking). This approach is based on the fact that a multiple object tracking can have just four situations - initiation, continuation, termination, and overlapping. Here, initiation, continuation, termination, and overlapping constitute a primary event set and this is based on the change of the number of extracted objects between a previous frame and a current frame. This system reduces computational costs and holds down the identity of all targets. We make experiments for this system with respect to the number of targets, each event, and processing period. We describe experimental results that show the successful multiple object tracking by using our approach.

  • PDF

Real-time Event Processing Role Management System for IFTTT Service (IFTTT 서비스를 위한 실시간 이벤트 처리 룰 관리 시스템)

  • Kim, KyeYoung;Lee, HyunDong;Cho, Dae-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1379-1386
    • /
    • 2017
  • As the Internet of Things evolves, various IoT services are provided. IFTTT is an abbreviation for If This Then That and refers to a service that links different web-based services. This paper proposes a system that generates and manages rules that combine the possibility of IFTTT service and the real-time event processing according to the concept of IoT service. Conventional database-based data processing methods are burdened to process a lot of data of IoT devices coming in real-time. The IoT device's data can be classified into formal data such as the amount of power, temperature value and position information, and informal data such as video or image data. Thus, this system classifies the data stream of IoT devices coming in real-time using the CEP engine Esper into a file signature table, classifies the formal/informal data, and shows the condition of the device data defined by the user and the service to be provided by applying the service.

A Study on Virtual Factory System Modeling for the Continuous Process by Applying Descrete Event Algorithm (연속공정 가상설비 모델링 시스템을 위한 이산사건 알고리즘 적용에 관한 연구)

  • Song, Ho-Seop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.992-994
    • /
    • 2013
  • 철강공정 가상공장 시스템은 조립공정과는 달리 연속공정의 특징을 가지며 공정과 자원의 배치가 아닌 공정을 구성하는 설비의 특성에 따라 제품이 결정되는 방식이다. 여러가지 설비의 모델들이 시뮬레이션 하며 서로 영향을 미치는데 이는 다중계층의 복잡한 모델 구조를 가지게 된다. 본 연구에서는 이의 해결을 위해 Descrete Event System 의 수학적 명세 방법론을 적용하여 복잡하고 계층구조적인 설비의 모델링을 쉽게 해결하기 위한 방법을 제시한다.

An Efficient Complex Event Detection Algorithm based on NFA_HTS for Massive RFID Event Stream

  • Wang, Jianhua;Liu, Jun;Lan, Yubin;Cheng, Lianglun
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.989-997
    • /
    • 2018
  • Massive event stream brings us great challenges in its volume, velocity, variety, value and veracity. Picking up some valuable information from it often faces with long detection time, high memory consumption and low detection efficiency. Aiming to solve the problems above, an efficient complex event detection method based on NFA_HTS (Nondeterministic Finite Automaton_Hash Table Structure) is proposed in this paper. The achievement of this paper lies that we successfully use NFA_HTS to realize the detection of complex event from massive RFID event stream. Specially, in our scheme, after using NFA to capture the related RFID primitive events, we use HTS to store and process the large matched results, as a result, our scheme can effectively solve the problems above existed in current methods by reducing lots of search, storage and computation operations on the basis of taking advantage of the quick classification and storage technologies of hash table structure. The simulation results show that our proposed NFA_HTS scheme in this paper outperforms some general processing methods in reducing detection time, lowering memory consumption and improving event throughput.

A Method for Mining Interval Event Association Rules from a Set of Events Having Time Property (시간 속성을 갖는 이벤트 집합에서 인터벌 연관 규칙 마이닝 기법)

  • Han, Dae-Young;Kim, Dae-In;Kim, Jae-In;Na, Chol-Su;Hwang, Bu-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.185-190
    • /
    • 2009
  • The event sequence of the same type from a set of events having time property can be summarized in one event. But if the event sequence having an interval, It is reasonable to be summarized more than one in independent sub event sequence of each other. In this paper, we suggest a method of temporal data mining that summarizes the interval events based on Allen's interval algebra and finds out interval event association rule from interval events. It provides better knowledge than others by using concept of an independent sub sequence and finding interval event association rules.

Abuse Pattern Monitoring Method based on CEP in On-line Game (CEP 기반 온라인 게임 악용 패턴 모니터링 방법)

  • Roh, Chang-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.114-121
    • /
    • 2010
  • Based on a complex event processing technique, an abuse pattern monitoring method is developed to provide an real-time detection. CEP is a technique to find complex event pattern in a massive information system. In this study, the events occurred by game-play are observed to be against the rules using CEP. User abuse patterns are pre-registered in CEP engine. And CEP engine monitors user abuse after aggregating the game data transferred by game logging server.

Characteristics of local events occured in and around the Korean Peninsula in 2002 (한반도 일원에서 발생한 Event 특성)

  • 전정수;제일영;지헌철;박윤경
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2003.03a
    • /
    • pp.12-15
    • /
    • 2003
  • Korea Institute of Geoscience and Mineral Resources(KIGAM) is operating Wonju Korea Seismic Research Station(KSRS), 29 regional seismic research stations and 5 Korea-China joint seismic stations in China. Also KIGAM is operating Korea Earthquake Monitoring System (KEMS) to archive the real-time data stream and to determine event parameters (epicenter, origin time, and magnitude) by the automatic processing and analyst review. To do this, KEMS used KIGAM's regional seismic network and other institute's network in a near real-time base. From Dec. 1, 2001 to Nov. 30, 2002, 3,827 seismic events were analyzed in a automatic processing procedure and finally 3,437 events were analyzed by analyst and archived. But problem is this event catalog includes not only natural earthquake, but also artificial events produced by the blast. More than 80 % events were concentrated in daytime and many events were concentrated in the confirmed blast sites, Pyeongyang, Pocheon, Yeongjong-do, Donghae city, etc. Because these artificial events are a major potential cause of error when estimating the seismicity of a specific region, discrimination procedure has to be developed in the first place.

  • PDF