• Title/Summary/Keyword: event-based

Search Result 3,163, Processing Time 0.03 seconds

Application of fuzzy Petri nets for discrete event system control and monitoring (이산사건 시스템 제어 및 모니터링을 위한 퍼지 패트리네트 응용)

  • 노명균;홍상은
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.403-406
    • /
    • 1997
  • This paper presents a Petri net approach for the control and monitoring of discrete event system. The proposed model is fuzzy Petri nets based on the fuzzy logic with Petri nets and the hierarchy concept. Fuzzy Petri nets have been used to model the imprecise situations which can arise within automated manufacturing system, and also the hierarchy concept allow to handle the refinement of places and transition in Petri nets model. These will form the foundation of a simulator-tool with manipulation interface for application of fuzzy Petri nets.

  • PDF

Implementation of Event Service and Design of Notification Service Based on the uniORB (uniORB 상에서의 Event Service 구현 및 Notification Service 설계)

  • 윤교철;박성우;황선태;김영만;이동길;김영만
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.553-555
    • /
    • 2001
  • 본 논문에서는 실시간 시스템인 전화 교환기에서 운영되는 C 언어 기반 분산 처리 시스템인 uniORB 상에서 이벤트 전송을 담당하는 서비스인 Event Service를 구현하였으며 다양한 이벤트의 타입과 필터링기능, QoS를 제공하는 Notification Service에 대한 실시간 버전의 설계를 하였다.

  • PDF

ECA Rule-Based Timely Collaboration of Web-Based Distributed Business Systems (웹기반 분산 기업 시스템을 위한 ECA 규칙 기반 적기 협력방법)

  • Lee, Dong-Woo;Lee, Seong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.345-354
    • /
    • 2005
  • In this paper collaboration of web-based distributed business systems is analyzed and the need of timely collaboration is derived and described in terms of inter-organizational contracts. A method of event-condition-action (ECA) rule based timely collaboration to meet the need and an active functionality component (AFC) to provide the method are proposed. The proposed method supports high level rule programming and event-based immediate processing so that system administrators and programmers can easily maintain the timely collaboration independently to the application logic. The proposed AFC uses HTTP protocol to be applied through firewalls. It is implemented using basic trigger facilities of a commercial DBMS for practical purpose.

  • PDF

The Case Study on a Documentation of Mega Sports Event (메가 스포츠이벤트의 기록화를 위한 사례연구)

  • Cheon, Ho Jun
    • The Korean Journal of Archival Studies
    • /
    • no.42
    • /
    • pp.37-71
    • /
    • 2014
  • The purpose of this study was to analyze developed case of archiving on Mega Sport Event for searching effective method on a documentation of Mega Sport Event. In order to conduct this study, literature review method was using about book, thesis and data of internet homepage for exploring the stage on Mega Sports Event and case of Mega Sports Event record management. The field study was conducted about institute related to Olympic record management institution for analysing Mega Sports Event record management. The result of this study is following: Firstly, 2012London Organizing Committee of the Olympic Games's case(The People's Record Project) is useful to ex-ante event phase. Secondly, 2000Sydney Organizing Committee of the Olympic Games's case(Olympic Games Knowledge Management Project) is useful to event operation phase. Thirdly. LA84Foundation's case(Olympic Oral History Project) is useful to ex-post event. The significance of this study which came up with the study result above can be presented as follows. Based on the result of this study, it is assumed that three case for documentation about Mega Sports Event. Lastly, the result of this study was useful to Mega Sports Event record management institution. For the more, it will be conducted to study law of Mega Sport Event record management, humane and Material resource and method related to record management of the Mega Sports Event organizing committee.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

A study on the efficient early warning method using complex event processing (CEP) technique (복합 이벤트 처리기술을 적용한 효율적 재해경보 전파에 관한 연구)

  • Kim, Hyung-Woo;Kim, Goo-Soo;Chang, Sung-Bong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.157-161
    • /
    • 2009
  • In recent years, there is a remarkable progress in ICTs (Information and Communication Technologies), and then many attempts to apply ICTs to other industries are being made. In the field of disaster managements, ICTs such as RFID (Radio Frequency IDentification) and USN (Ubiquitous Sensor Network) are used to provide safe environments. Actually, various types of early warning systems using USN are now widely used to monitor natural disasters such as floods, landslides and earthquakes, and also to detect human-caused disasters such as fires, explosions and collapses. These early warning systems issue alarms rapidly when a disaster is detected or an event exceeds prescribed thresholds, and furthermore deliver alarm messages to disaster managers and citizens. In general, these systems consist of a number of various sensors and measure real-time stream data, which requires an efficient and rapid data processing technique. In this study, an event-driven architecture (EDA) is presented to collect event effectively and to provide an alert rapidly. A publish/subscribe event processing method to process simple event is introduced. Additionally, a complex event processing (CEP) technique is introduced to process complex data from various sensors and to provide prompt and reasonable decision supports when many disasters happen simultaneously. A basic concept of CEP technique is presented and the advantages of the technique in disaster management are also discussed. Then, how the main processing methods of CEP such as aggregation, correlation, and filtering can be applied to disaster management is considered. Finally, an example of flood forecasting and early alarm system in which CEP is incorporated is presented It is found that the CEP based on the EDA will provide an efficient early warning method when disaster happens.

  • PDF

Mining Association Rule for the Abnormal Event in Data Stream Systems (데이터 스트림 시스템에서 이상 이벤트에 대한 연관 규칙 마이닝)

  • Kim, Dae-In;Park, Joon;Hwang, Bu-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.14D no.5
    • /
    • pp.483-490
    • /
    • 2007
  • Recently mining techniques that analyze the data stream to discover potential information, have been widely studied. However, most of the researches based on the support are concerned with the frequent event, but ignore the infrequent event even if it is crucial. In this paper, we propose SM-AF method discovering association rules to an abnormal event. In considering the window that an abnormal event is sensed, SM-AF method can discover the association rules to the critical event, even if it is occurred infrequently. Also, SM-AF method can discover the significant rare itemsets associated with abnormal event and periodic event itemsets. Through analysis and experiments, we show that SM-AF method is superior to the previous methods of mining association rules.

Efficient Successive Transmission Technique in Event Based OS for Sensor Network (센서네트워크를 위한 이벤트 기반 운영체제에서 효율적인 연속적 전송 기법)

  • Lee, Joa-Hyoung;Lim, Hwa-Jung;Seon, Ju-Ho;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.205-214
    • /
    • 2008
  • To transfer large amount of packets fast in sensor network, it is necessary that the delay between successive packet transmissions should be minimized as possible. In Sensor network, since the Operating Systems are worked on the event driven, the Timer Event is used to transfer packets successively. However, since the transferring time of packet completely is varies very much, it is very hard to set appropriate interval. If interval is too long, delay also becomes too long but if interval is too short, the fail of transfer request would increase. In this paper, we propose ESTEO which reduces the delay between successive packet transmissions by using SendDone Event which informs that a packet transmission has been completed. In ESTEO, the delay between successive packet transmissions is shortened very much since the transmission of next Packet starts at the time when the transmission of previous packet has completed, irrespective of the transmission time. Therefore ESTEO could provide high packet transmission rate given large amount of packets.

Overlapping Sound Event Detection Using NMF with K-SVD Based Dictionary Learning (K-SVD 기반 사전 훈련과 비음수 행렬 분해 기법을 이용한 중첩음향이벤트 검출)

  • Choi, Hyeonsik;Keum, Minseok;Ko, Hanseok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.3
    • /
    • pp.234-239
    • /
    • 2015
  • Non-Negative Matrix Factorization (NMF) is a method for updating dictionary and gain in alternating manner. Due to ease of implementation and intuitive interpretation, NMF is widely used to detect and separate overlapping sound events. However, NMF that utilizes non-negativity constraints generates parts-based representation and this distinct property leads to a dictionary containing fragmented acoustic events. As a result, the presence of shared basis results in performance degradation in both separation and detection tasks of overlapping sound events. In this paper, we propose a new method that utilizes K-Singular Value Decomposition (K-SVD) based dictionary to address and mitigate the part-based representation issue during the dictionary learning step. Subsequently, we calculate the gain using NMF in sound event detection step. We evaluate and confirm that overlapping sound event detection performance of the proposed method is better than the conventional method that utilizes NMF based dictionary.

Design and Implementation of Geo-Social Information based Personalized Warning Notification System

  • Duc, Tiep Vu;Nguyen-Van, Quyet;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.5 no.2
    • /
    • pp.42-50
    • /
    • 2016
  • In case of a emergency situation or a natural disaster, a warning notification system is an essential tool to notify at-risk people in advance and provide them useful information to survive the event. Although some systems have been proposed such as emergency alert system using android, SMS, or P2P overlay network, these works mainly focus on a reliable message distribution methods. In this paper, we proposed a novel design and implementation of a personalized warning notification system to help inform not only the at-risk people but also their family and friends about the coming disaster as well as escape plan and survival information. The system consists of three main modules: the user selection module, the knowledge based message generator, and message distribution modules. The user selection module collects the list of people involved in the event and sorts them based on their level of involvement (their location, working position and social relationships). The knowledge based message generator provides each person with a personalized message that is concise and contains only the necessary information for the particular person based on their working position and their involvement in the event. The message distribution module will then find a best path for sending the personalized messages based on trustiness of locations since network failures may exist in a disaster event. Additionally, the system also have a comprehensive database and an interactive web interface for both user and system administrator. For evaluation, the system was implemented and demonstrated successfully with a building on fire scenario.