• Title/Summary/Keyword: event-based

Search Result 3,163, Processing Time 0.031 seconds

BSM framework using Event-Sourcing and CQRS pattern in V2X environment

  • Han, Sangkon;Goo, EunHee;Choi, Jung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.169-176
    • /
    • 2022
  • With the continuous development of technologies related to 5G, artificial intelligence, and autonomous vehicle systems, standards and services for V2X and C-ITS environments are being studied a lot. BSM (basic safety message) was adopted as a standard for exchanging data between vehicles based on data collected and generated by vehicle systems in a V2V environment. In this paper, we propose a framework that can safely store BSM messages and effectively check the stored messages using Event-Sourcing and CQRS patterns. The proposed framework can securely store and manage BSM messages using hash functions. And it has the advantage of being able to check the stored BSM data in real time based on the time series and to reproduce the state.

Intrusion Detection on IoT Services using Event Network Correlation (이벤트 네트워크 상관분석을 이용한 IoT 서비스에서의 침입탐지)

  • Park, Boseok;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.24-30
    • /
    • 2020
  • As the number of internet-connected appliances and the variety of IoT services are rapidly increasing, it is hard to protect IT assets with traditional network security techniques. Most traditional network log analysis systems use rule based mechanisms to reduce the raw logs. But using predefined rules can't detect new attack patterns. So, there is a need for a mechanism to reduce congested raw logs and detect new attack patterns. This paper suggests enterprise security management for IoT services using graph and network measures. We model an event network based on a graph of interconnected logs between network devices and IoT gateways. And we suggest a network clustering algorithm that estimates the attack probability of log clusters and detects new attack patterns.

An event-based temporal reasoning method (사건 기반 시간 추론 기법)

  • 이종현;이민석;우영운;박충식;김재희
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.5
    • /
    • pp.93-102
    • /
    • 1997
  • Conventional expert systems have difficulties in the inference on time-varing situations because they don't have the structure for processing time related informations and rule representation method to describe time explicitely. Some expert systems capable of temporal reasoning are not applicable to the domain in which state changes happen by unpredictble events that cannot be represented by periodic changes of data. In this paper, an event based temporal reasoning method is proposed. It is capable of processing te unpredictable events, representing the knowledge related to event and time, and infering by that knowledge as well as infering by periodically time-varing data. The NEO/temporal, an temporal inference engine, is implemented by applying the proposed temporal reasoning situation assessment and decision supporting system is implemented to show the benefits of the proposed temporal information processing model.

  • PDF

Development of Risk Evaluation Models for Railway Casualty Accidents (철도사상 사고위험도 평가 모델 개발에 관한 연구)

  • Park, Chan-Woo;Kim, Min-Su;Wang, Jong-Bae;Choi, Don-Bum
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1499-1504
    • /
    • 2008
  • This study shows risk-based evaluation results of casualty accidents for passengers, railway staffs and MOP(Member of public) on the national railway in South Korea. To evaluate risk of these accidents, the hazardous events and the hazardous factors were identified by the review of the accident history and engineering interpretation of the accident behavior. A probability evaluation model for each hazardous event which was based on the accident appearance scenario was developed by using the Fault Tree Analysis (FTA) technique. The probability for each hazardous event was evaluated from the historical data and structured expert judgment. In addition, the severity assessment model utilized by the Event Tree Analysis (ETA) technique was composed of the accident progress scenarios. And the severity for the hazardous events was estimated using fatalities and weighted injuries. The risk assessment model developed can be effectively utilized in defining the risk reduction measures in connection with the option analysis.

  • PDF

Event recognition of entering and exiting (출입 이벤트 인식)

  • Cui, Yaohuan;Lee, Chang-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.199-204
    • /
    • 2008
  • Visual surveillance is an active topic recently in Computer Vision. Event detection and recognition is one important and useful application of visual surveillance system. In this paper, we propose a new method to recognize the entering and exiting events based on the human's movement feature and the door's state. Without sensors, the proposed approach is based on novel and simple vision method as a combination of edge detection, motion history image and geometrical characteristic of the human shape. The proposed method includes several applications such as access control in visual surveillance and computer vision fields.

  • PDF

Abuse Pattern Monitoring Method based on CEP in On-line Game (CEP 기반 온라인 게임 악용 패턴 모니터링 방법)

  • Roh, Chang-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.114-121
    • /
    • 2010
  • Based on a complex event processing technique, an abuse pattern monitoring method is developed to provide an real-time detection. CEP is a technique to find complex event pattern in a massive information system. In this study, the events occurred by game-play are observed to be against the rules using CEP. User abuse patterns are pre-registered in CEP engine. And CEP engine monitors user abuse after aggregating the game data transferred by game logging server.

Joint HGLM approach for repeated measures and survival data

  • Ha, Il Do
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.4
    • /
    • pp.1083-1090
    • /
    • 2016
  • In clinical studies, different types of outcomes (e.g. repeated measures data and time-to-event data) for the same subject tend to be observed, and these data can be correlated. For example, a response variable of interest can be measured repeatedly over time on the same subject and at the same time, an event time representing a terminating event is also obtained. Joint modelling using a shared random effect is useful for analyzing these data. Inferences based on marginal likelihood may involve the evaluation of analytically intractable integrations over the random-effect distributions. In this paper we propose a joint HGLM approach for analyzing such outcomes using the HGLM (hierarchical generalized linear model) method based on h-likelihood (i.e. hierarchical likelihood), which avoids these integration itself. The proposed method has been demonstrated using various numerical studies.

Design and Implementation of the USN kernel with Event-based Preemption (USN 위한 이벤트 중심의 선점형 커널의 디자인과 구현)

  • Han, Sang-Woo;Han, Sang-Eun;Kim, Joong-Heon
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.499-500
    • /
    • 2007
  • The various sensor nodes operating in Ubiquitous Sensor Network environment require the tiny Operating System different from the existing pc-type operating system because of their characteristics. Also Sensor Network operating system needs to support the rapid event handling which sensor node must implement. In this paper, we overcome the drawbacks of the existing sensor network operating system and propose the new kernel which is designed to assist developer to construct event-central operating system entirely. We also evaluate the performance of the super tiny sensor network operating system based on proposed kernel, comparing with that of the existing sensor network operating system.

  • PDF

Business Process Analysis Based on Event-driven Process Chain Model (EPC 모델 기반의 비즈니스 프로세스 분석)

  • Kang, Jun-Gyu;Lim, Seung-Kil
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.36 no.3
    • /
    • pp.34-42
    • /
    • 2013
  • In this study, we develop a method for analyzing business process based on the event-driven process chain (EPC) model. The method consists of five stages such as identifying abnormal events, finding causes for the abnormal events and problems caused by the abnormal events, making cause-and-effect chains, drawing root-cause map, and defining improvement areas. We illustrate how to apply the method with some examples for the domestic registered mail delivery process.

Toward a Structural and Semantic Metadata Framework for Efficient Browsing and Searching of Web Videos

  • Kim, Hyun-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.51 no.1
    • /
    • pp.227-243
    • /
    • 2017
  • This study proposed a structural and semantic framework for the characterization of events and segments in Web videos that permits content-based searches and dynamic video summarization. Although MPEG-7 supports multimedia structural and semantic descriptions, it is not currently suitable for describing multimedia content on the Web. Thus, the proposed metadata framework that was designed considering Web environments provides a thorough yet simple way to describe Web video contents. Precisely, the metadata framework was constructed on the basis of Chatman's narrative theory, three multimedia metadata formats (PBCore, MPEG-7, and TV-Anytime), and social metadata. It consists of event information, eventGroup information, segment information, and video (program) information. This study also discusses how to automatically extract metadata elements including structural and semantic metadata elements from Web videos.