• Title/Summary/Keyword: event-based

Search Result 3,179, Processing Time 0.052 seconds

Debugging of communication Events Based on the RPC Event Model (RPC 이벤트 모델에 기반한 통신 이벤트의 디버깅)

  • Seo, Yeong-Ae;Jo, Yeong-Uk;Lee, Gong-Seon;Park, Chang-Sun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.225-233
    • /
    • 1999
  • One of the reasons that debugging distributed programs is much more difficult than sequential programs is the communication among processes. Even though there are many debuggers constructed on distributed system environment, no available debugger provides an efficient way to debug communication events.. In this paper, we show the way to debug RPC communication, which is regarded as one of the most popular communication protocol in distributed system development. This paper presents the implementation of the RPC event trace function based on the RPC event model, which is proposed to accommodate communication events into debugging objects. Analyzing conventional RPC protocols, we formalized library function calls as corresponding actions to sending and receiving of messages. B recognizing the locations of library calls the debugger can detect all occurrences of communication events, This RPC event trace function is implemented on the on-line distributed debugger UniVIEW system.

  • PDF

Concurrency Control Method Based on Scalable on Prediction for Multi-platform Games (멀티플랫폼 게임을 위한 예측기반 동시성 제어방식)

  • Lee, Sung-Ug
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1322-1331
    • /
    • 2006
  • Concurrency control is one of the important factors to maintain consistent conditions of a game because most participants of the game should be shared information to play the game through a distributed network system. replay delay times should establish in every event and the received event should be saved and performed simultaneously for Concurrency Control. However, it is not easy to practice the event with same speed in environment having various moving speed. Therefore, expansion have to be provided. In other words, one of the most important factors of a game's efficiency is the process of bandwidth and delay. the process of concurrency control method based on scalable prediction for Multi-platform games would minimize the loss rate of a event and then would improve the interaction capacity of a game. It also might get reliability between clients. This paper analyzes some problems in terms of a layout of a game that integrates a cable and a wireless system. In addition, this paper provides methods to expand bandwidth and delay that might be an obstacle of a On-line game and to ensure reliability between a server and a client.

  • PDF

RREM : Multi-hop Information Based Real-Time Routing Protocol to Support Event Mobility in Wireless Sensor Networks (무선 센서 망에서 실시간 응용의 이벤트 이동성을 지원하기 위한 라우팅 기법)

  • Lee, Soyeon;Lee, Jeongcheol;Park, Hosung;Kong, Jonguk;Kim, Sangha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.688-696
    • /
    • 2013
  • In wireless sensor networks, real-time applications have to ensure the timely delivery of real-time data. Recently, OMLRP (On-demand Multi-hop Look-ahead Routing Protocol) has been proposed to improve the timeliness of wireless sensor networks. The protocol needs initialization time to establish multi-hop information based routing path because it performs incremental look-ahead of the information. Consequently, the protocol deteriorates DDSR (Deadline Delivery Success Ratio) as an event moves because it takes little consideration of event mobility. In this paper, we proposed a Real-time Routing for Events Mobility (RREM) which exploits a data redirection in order to improve the DDSR of moving events. Instead of recollecting muti-hop look-ahead information, the RREM redirects the data to a sensor node holding the information collected in a previous round. We verify the timeliness and energy efficiency of RREM using various MatLab simulations.

Energy Saving Smart Illuminating System Implementation Based on Obstacle Environment Presetting (장애환경설정 기반의 에너지절약 지능형 조명시스템 구현)

  • Kim, Young Bin;Ryu, Conan K.R.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2786-2791
    • /
    • 2014
  • This paper describes the smart illuminating system based on the obstacle environmental presetting to improve the user convenience to easy lighting and energy conservation. Obstacle environment has trouble controlling the illuminating equipment using manual buttons in certain circumstances, which requires a smart remote controller. The smart remote controller is operated by the smart phone, motion sensor and timer to turn on and off the lamps. The event sensor module transmits the signals of the event occurrence to equipment on the remote place when smart phone and motion sensor detect an event, and the illuminator received the event turn on or off the lamp. The system results in energy saving by simple on/off control and manipulating the operating time with controlling the illuminating system preset by user's obstacle or preference circumstances. The proposed system implementation is experimented to figure out the energy saving about13.5w/h and the optimized convenience control.

Container-Friendly File System Event Detection System for PaaS Cloud Computing (PaaS 클라우드 컴퓨팅을 위한 컨테이너 친화적인 파일 시스템 이벤트 탐지 시스템)

  • Jeon, Woo-Jin;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.1
    • /
    • pp.86-98
    • /
    • 2019
  • Recently, the trend of building container-based PaaS (Platform-as-a-Service) is expanding. Container-based platform technology has been a core technology for realizing a PaaS. Containers have lower operating overhead than virtual machines, so hundreds or thousands of containers can be run on a single physical machine. However, recording and monitoring the storage logs for a large number of containers running in cloud computing environment occurs significant overhead. This work has identified two problems that occur when detecting a file system change event of a container running in a cloud computing environment. This work also proposes a system for container file system event detection in the environment by solving the problem. In the performance evaluation, this work performed three experiments on the performance of the proposed system. It has been experimentally proved that the proposed monitoring system has only a very small effect on the CPU, memory read and write, and disk read and write speeds of the container.

The Truth of the Photograph and its Representation of Observer Appeared in the Painting of History (역사그림에 나타난 사진의 진실과 관찰자적 재현)

  • Lee, Kyung-Ryul
    • Cross-Cultural Studies
    • /
    • v.29
    • /
    • pp.25-53
    • /
    • 2012
  • The attitude of observer in the painting of history is to exclude a prejudice and a subjective view of an artist and to introduce a photograph, which is a record of objectivity, in the process of painting. Its ultimate intent is to redescribe the fact of an event's image intactly without any prejudice and to represent the event as a proven evidence that it was. The representation of history based on fact had already been conceived in imagination of renowned artists such as Francisco Goya or $Th{\acute{e}}odore$ $G{\acute{e}}ricault$ even before cameras were invented. What they portrayed was their own truth of reality which is gained through their observation, not a history that have corresponded to political ideologies, for all reliance on a limited tool of representation, painting. Furthermore, history was necessary for 19th century impressionism artists to be represented under proven fact in a neutral perspective excluding all subjective prejudice, not based on the representation with imagination. Edouard Manet in particular reconstited an instant moment on the basis of real proof of photograph without personal prejudice or opinion as if today's photojournalism. The catastrophic series by Andy Warhol and the photographic painting by Gerhard Richter show another role of painting in the realm of art, each of them implying information distortion and abuse by current media and intentional deformation toward history as Manet's painting of history. Today, the representation of an historical event that we experience in the era of the Internet and social networks having a great deal of information already came to be the exclusive property of the cutting edge mass media. Nevertheless, the attitude of observer which is realistic and contemplative in the realm of art is the crucial point in terms of artists' act as ever.

Defining and Discovering Cardinalities of the Temporal Workcases from XES-based Workflow Logs

  • Yun, Jaeyoung;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.77-84
    • /
    • 2019
  • Workflow management system is a system that manages the workflow model which defines the process of work in reality. We can define the workflow process by sequencing jobs which is performed by the performers. Using the workflow management system, we can also analyze the flow of the process and revise it more efficiently. Many researches are focused on how to make the workflow process model more efficiently and manage it more easily. Recently, many researches use the workflow log files which are the execution history of the workflow process model performed by the workflow management system. Ourresearch group has many interests in making useful knowledge from the workflow event logs. In this paper we use XES log files because there are many data using this format. This papersuggests what are the cardinalities of the temporal workcases and how to get them from the workflow event logs. Cardinalities of the temporal workcases are the occurrence pattern of critical elements in the workflow process. We discover instance cardinalities, activity cardinalities and organizational resource cardinalities from several XES-based workflow event logs and visualize them. The instance cardinality defines the occurrence of the workflow process instances, the activity cardinality defines the occurrence of the activities and the organizational cardinality defines the occurrence of the organizational resources. From them, we expect to get many useful knowledge such as a patterns of the control flow of the process, frequently executed events, frequently working performer and etc. In further, we even expect to predict the original process model by only using the workflow event logs.

Recognition of Events by Human Motion for Context-aware Computing (상황인식 컴퓨팅을 위한 사람 움직임 이벤트 인식)

  • Cui, Yao-Huan;Shin, Seong-Yoon;Lee, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.47-57
    • /
    • 2009
  • Event detection and recognition is an active and challenging topic recent in Computer Vision. This paper describes a new method for recognizing events caused by human motion from video sequences in an office environment. The proposed approach analyzes human motions using Motion History Image (MHI) sequences, and is invariant to body shapes. types or colors of clothes and positions of target objects. The proposed method has two advantages; one is thant the proposed method is less sensitive to illumination changes comparing with the method using color information of objects of interest, and the other is scale invariance comparing with the method using a prior knowledge like appearances or shapes of objects of interest. Combined with edge detection, geometrical characteristics of the human shape in the MHI sequences are considered as the features. An advantage of the proposed method is that the event detection framework is easy to extend by inserting the descriptions of events. In addition, the proposed method is the core technology for event detection systems based on context-aware computing as well as surveillance systems based on computer vision techniques.

Feasibility Study on the Fault Tree Analysis Approach for the Management of the Faults in Running PCR Analysis (PCR 과정의 오류 관리를 위한 Fault Tree Analysis 적용에 관한 시범적 연구)

  • Lim, Ji-Su;Park, Ae-Ri;Lee, Seung-Ju;Hong, Kwang-Won
    • Applied Biological Chemistry
    • /
    • v.50 no.4
    • /
    • pp.245-252
    • /
    • 2007
  • FTA (fault tree analysis), an analytical method for system failure management, was employed in the management of faults in running PCR analysis. PCR is executed through several processes, in which the process of PCR machine operation was selected for the analysis by FTA. The reason for choosing the simplest process in the PCR analysis was to adopt it as a first trial to test a feasibility of the FTA approach. First, fault events-top event, intermediate event, basic events-were identified by survey on expert knowledge of PCR. Then those events were correlated deductively to build a fault tree in hierarchical structure. The fault tree was evaluated qualitatively and quantitatively, yielding minimal cut sets, structural importance, common cause vulnerability, simulation of probability of occurrence of top event, cut set importance, item importance and sensitivity. The top event was 'errors in the step of PCR machine operation in running PCR analysis'. The major intermediate events were 'failures in instrument' and 'errors in actions in experiment'. The basic events were four events, one event and one event based on human errors, instrument failure and energy source failure, respectively. Those events were combined with Boolean logic gates-AND or OR, constructing a fault tree. In the qualitative evaluation of the tree, the basic events-'errors in preparing the reaction mixture', 'errors in setting temperature and time of PCR machine', 'failure of electrical power during running PCR machine', 'errors in selecting adequate PCR machine'-proved the most critical in the occurrence of the fault of the top event. In the quantitative evaluation, the list of the critical events were not the same as that from the qualitative evaluation. It was because the probability value of PCR machine failure, not on the list above though, increased with used time, and the probability of the events of electricity failure and defective of PCR machine were given zero due to rare likelihood of the events in general. It was concluded that this feasibility study is worth being a means to introduce the novel technique, FTA, to the management of faults in running PCR analysis.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.