• Title/Summary/Keyword: execution process

Search Result 1,015, Processing Time 0.026 seconds

Rollback Dependency Detection and Management with Data Consistency in Collaborative Transactional Workflows (협력 트랜잭셔널 워크플로우에서 데이터 일관성을 고려한 철회 종속성 감지 및 관리)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.197-208
    • /
    • 2003
  • Abstract Workflow is not appropriately applied to coordinated execution of applications(steps) that comprise business process such as a collaborative series of tasks because of the lacks of network infra, standard of information exchange and data consistency management with conflict mode of shared data. Particularly we have not mentioned the problem which can be occurred by shared data with conflict mode. In this paper, to handle data consistency in the process of rollback for failure handling or recovery policy, we have classified rollback dependency into three types such as implicit rollback dependency in a transactional workflow, implicit rollback dependency in collaborative transactional workflows and explicit rollback dependency in collaborative transactional workflows. Also, we have proposed the rollback dependency compiler that determines above three types of rollback dependency. A workflow designer specifies the workflow schema and the resources accessed by the steps from a global database of resources. The rollback dependency compiler generates the enhanced workflow schema with the rollback dependency specification. The run-time system interprets this specification and executes the rollback policy with data consistency if failure of steps is occurred. After all, this paper can offer better correctness and performance than state-of-the-art WFMSs.

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.

Development of a Framework for Anti-Collision System of Moving Drilling Machines on a Drill Floor (시추 작업장의 이동식 시추 장비 충돌 방지 시스템을 위한 프레임워크 개발)

  • Lee, Jaeyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.4
    • /
    • pp.330-336
    • /
    • 2020
  • An anti-collision system between equipment is essential on a drill floor where multiple moving machines are operated simultaneously. This is to prevent accidents by halting the machines when required, by inspecting possibility of a collision based on the relative position data sent by the equipment. In this paper, we propose a framework for an Anti-Collision System (ACS) by considering expandability of the number of machines and computational speed, to promote development of drilling machines and corresponding ACS software. Each drilling equipment is represented as an object in the software with its own message format, and the message is constructed with serialization/deserialization to manage any additional equipment or data. The data handling process receives the current status of machines from the drilling control network, and relays a collision related message (including bypass signal) back to the machines. A commercial visualization software shows the bounding boxes moving with the equipment and indicates probable collision. It has been determined that the proposed system maintains total execution time below 5ms to process data from the network and relay the information hence, the system has no effect on the machine control systems having 100ms control cycle.

Judgment on the Criminal Responsibility of Perpetrators with Mental Disorders and Their Mental Examination (정신장애 범죄인의 책임능력 판단과 정신감정)

  • Choi, Min-Young
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.2
    • /
    • pp.83-107
    • /
    • 2019
  • This article focuses on §10 of Criminal Act of the Republic of Korea to discuss how to determine criminal responsibility of a perpetrator suffering from mental disorders, while reviewing existing process and standards of mental examination at each stage of the criminal procedure as well as exploring suggestions regarding how they should be complied. The determination of the sanity or criminal responsibility of the mentally ill as defined in the §10 of Criminal Act, by its nature, cannot be approached with a traditional, clear-cut dichotomy of biology by medical practitioner and psychology·normative science by lawyer. Looking into the actual procedure of determining mental and physical disorder with special consideration of mental illness reveals the inevitability of collaboration between lawyers and psychiatrists. In the meantime, the process and standards of mental examination at each stage of the criminal procedure must be definitive and clear. First of all, during the investigation stage, examination prior to prosecution should be more actively encouraged, considering that judging sanity of the perpetrator at the time of committing a criminal act is important. During the trial stage, the mandatory examination must be conducted depending on the sensitivity and gravity of the case. Next, medical examination to determine criminal responsibility and the one to order treatment and custody must be separately conducted in order to properly execute medical treatment and custody. Obligatory mental examination could be considered both during the stage of request for and execution of the treatment and custody. Lastly, the procedure of examination and format of examination documents need to be standardized for better objectivity and reliability.

Building an SNS Crawling System Using Python (Python을 이용한 SNS 크롤링 시스템 구축)

  • Lee, Jong-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.5
    • /
    • pp.61-76
    • /
    • 2018
  • Everything is coming into the world of network where modern people are living. The Internet of Things that attach sensors to objects allows real-time data transfer to and from the network. Mobile devices, essential for modern humans, play an important role in keeping all traces of everyday life in real time. Through the social network services, information acquisition activities and communication activities are left in a huge network in real time. From the business point of view, customer needs analysis begins with SNS data. In this research, we want to build an automatic collection system of SNS contents of web environment in real time using Python. We want to help customers' needs analysis through the typical data collection system of Instagram, Twitter, and YouTube, which has a large number of users worldwide. It is stored in database through the exploitation process and NLP process by using the virtual web browser in the Python web server environment. According to the results of this study, we want to conduct service through the site, the desired data is automatically collected by the search function and the netizen's response can be confirmed in real time. Through time series data analysis. Also, since the search was performed within 5 seconds of the execution result, the advantage of the proposed algorithm is confirmed.

Project Risk Assessment Through Construction Sequence Analyses for Industrial Plant Construction Projects (산업플랜트 건설 프로젝트의 주요 공정 시퀀스 분석을 통한 리스크 평가)

  • Lee, Kyusung;Choi, Jaehyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.4
    • /
    • pp.140-151
    • /
    • 2013
  • In 2011 and 2012, Korean construction firms awarded around $ 64.5. Billion each year from the overseas market in 2011. This contract value accounted for overwhelming portion of total overseas construction contract values, and this growth is expected to continue for the next decade. However, contract scopes awarded to the Korean construction firms mainly involve detailed design and construction phases due to their competitiveness for the construction techniques. In other words, front-end-engineering-design and construction project management are not considered part of core business due to the lack of project management skills and experience. The researchers focused on development of construction sequence model required to improve construction planning and scheduling skills for the Korean construction firms. The model identifies critical work items and the sequence throughout project execution process. In addition, the researchers developed a risk evaluation method by applying fuzzy theory to the critical construction activities for the industrial plant construction projects. Developed methodology will help project practitioners to develop project schedule in a timely and effe ctive manner and evaluate project risks associated with scheduling process for the industrial plant construction projects.

Railway Governance and Power Structure in China

  • Lee, Jinjing
    • International Journal of Railway
    • /
    • v.1 no.4
    • /
    • pp.129-133
    • /
    • 2008
  • Over the last $15{\sim}20$years, many countries have adopted policies of railway privatization to keep up with increasing competition from road and air transport. Although each country and case has its own history, market characteristics, political context as well as administrative process, railway privatizations (including railway restructure, concession etc.) in the west usually are accompanied with the establishment of new regulatory regimes. Therefore, railway governance has been innovating towards an interaction of government, regulator, industry bodies, user groups, trade unions and other interested groups within the regulatory framework. However, it is not the case in China. Although China had seen a partial privatization in some branch lines and is experiencing a much larger-scale privatization by establishing joint-ventures to build and operate high-speed passenger lines and implementing an asset-based securitization program, administrative control still occupies absolutely dominant position in the railway governance in China. Ministry of Railway (MOR) acts as the administrator, operator as well as regulator. There is no national policy that clearly positions railway in the transportation network and clarifies the role of government in railway development. There is also little participation from interested groups in the railway policy making, pricing, service standard or safety matter. Railway in China is solely governed by the mere executive agency. Efficiency-focused economic perspective explanation is far from satisfaction. A wider research perspective from political and social regime is of great potential to better explain and solve the problem. In the west, separation and constrains of power had long been established as a fundamental rule. In addition to internal separation of political power(legislation, execution and jurisdiction), rise of corporation in the 19th century and association revolution in the 20th century greatly fostered the growth of economic and social power. Therefore, political, social and economic organizations cooperate and compete with each other, which leads to a balanced and resonable power structure. While in China, political power, mainly party-controlled administrative power has been keeping a dominated position since the time of plan economy. Although the economic reform promoted the growth of economic power of enterprises, it is still not strong enough to compete with political power. Furthermore, under rigid political control, social organizations usually are affiliated to government, independent social power is still too weak to function. So, duo to the limited and slow reform in political and social regime in China, there is an unbalanced power structure within which political power is dominant, economic power expanding while social power still absent. Totally different power structure in China determines the fundamental institutional environment of her railway privatization and governance. It is expected that the exploration of who act behind railway governance and their acting strength (a power theory) will present us a better picture of railway governance as a relevant transportation mode. The paper first examines the railway governance in China and preliminarily establishes a linkage between railway governance and its fundamental institutional environment, i.e. power structure in a specific country. Secondly, the reason why there is no national policy in China is explored in the view of political power. In China, legislative power is more symbolic while party-controlled administrative power dominates political process and plays a fundamental role in Chinese railway governance. And then, in the part three railway finance reform is analyzed in the view of economic power, esp. the relationship of political power and economic power.

  • PDF

An Analysis of Concentrate Competency in Bidding Process for Overseas Project of Domestic Construction Companies (국내건설기업의 해외 프로젝트 입찰단계 우선집중역량 분석)

  • Kim, Ji Hyung;Kim, Yea Sang
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.3
    • /
    • pp.23-30
    • /
    • 2014
  • Overseas construction orders of domestic companies had been increased significantly in a short period from $10.9 billion in 2005 to $64.9 billion in 2012. However experts are concerned that quality of growth will not support quantitative growth. This study suggest concentrate competencies for not only winning in bid but also successful execution of domestic companies. 4 Steps which are Pre-Marketing, Bid-Preparation, Bidding, Contract Phase are defined for competency assessment. After drawing specific tasks by phase, survey asking importance and capability of the tasks to the person in charge of bidding and site was conducted by utilizing Likert 7 point scale. According to the result of IPA analysis, domestic construction companies need to ensure internal competencies; Project risk review, Bid team organization, and external competencies; Client needs grasp, Localization strategy, Cooperation establishment. Hearafter domestic construction companies will be able to utilize the result of the study for setting bidding strategy for winning in bid and improving earning rate.

ICFGO : UI Concealing and Dummy Flow Insertion Method for Inter-Procedural Control Flow Graph Obfuscation (ICFGO : Inter-Procedural Control Flow Graph 난독화를 위한 UI 은닉 및 Dummy Flow 삽입 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.493-501
    • /
    • 2020
  • For the obfuscation of Flow Analysis on the Android operating system, the size of the Flow Graph can be large enough to make analysis difficult. To this end, a library in the form of aar was implemented so that it could be inserted into the application in the form of an external library. The library is designed to have up to five child nodes from the entry point in the dummy code, and for each depth has 2n+1 numbers of methods from 100 to 900 for each node, so it consists of a total of 2,500 entry points. In addition, entry points consist of a total of 150 views in XML, each of which is connected via asynchronous interface. Thus, the process of creating a Inter-procedural Control Flow Graph has a maximum of 14,175E+11 additional cases. As a result of applying this to application, the Inter Procedure Control Flow Analysis too generates an average of 10,931 edges and 3,015 nodes with an average graph size increase of 36.64%. In addition, in the APK analyzing process showed that up to average 76.33MB of overhead, but only 0.88MB of execution overhead in the user's ART environment.

Visual Representation of Temporal Properties in Formal Specification and Analysis using a Spatial Process Algebra (공간 프로세스 대수를 이용한 정형 명세와 분석에서의 시간속성의 시각화)

  • On, Jin-Ho;Choi, Jung-Rhan;Lee, Moon-Kun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.339-352
    • /
    • 2009
  • There are a number of formal methods for distributed real-time systems in ubiquitous computing to analyze and verify the behavioral, temporal and the spatial properties of the systems. However most of the methods reveal structural and fundamental limitations of complexity due to mixture of spatial and behavioral representations. Further temporal specification makes the complexity more complicate. In order to overcome the limitations, this paper presents a new formal method, called Timed Calculus of Abstract Real-Time Distribution, Mobility and Interaction(t-CARDMI). t-CARDMI separates spatial representation from behavioral representation to simplify the complexity. Further temporal specification is permitted only in the behavioral representation to make the complexity less complicate. The distinctive features of the temporal properties in t-CARDMI include waiting time, execution time, deadline, timeout action, periodic action, etc. both in movement and interaction behaviors. For analysis and verification of spatial and temporal properties of the systems in specification, t-CARDMI presents Timed Action Graph (TAG), where the spatial and temporal properties are visually represented in a two-dimensional diagram with the pictorial distribution of movements and interactions. t-CARDMI can be considered to be one of the most innovative formal methods in distributed real-time systems in ubiquitous computing to specify, analyze and verify the spatial, behavioral and the temporal properties of the systems very efficiently and effectively. The paper presents the formal syntax and semantics of t-CARDMI with a tool, called SAVE, for a ubiquitous healthcare application.