• Title/Summary/Keyword: fully distributed

Search Result 295, Processing Time 0.033 seconds

ICT and the Changing Nature of Work: Work Fragmentation (ICT와 업무의 변화 - 일의 파편화 관점에서 -)

  • Lee, Seyoon;Park, Jun-Gi;Lee, Jungwoo
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.35-56
    • /
    • 2014
  • Information and communication technologies(ICT) allow and force people to work anywhere, anytime using remote databases and application systems available in real-time twenty four hours a day and seven days a week. With the real time nature of ICT, individual work is becoming more and more fragmented. Instead of working on a similar task repeatedly, individuals are required to respond to e-mails and inquiries through social networks, work on planning documents, work on presentation documents, work on spreadsheets, input necessary data on company databases, generate necessary reports from the database, run teleconference, etc., all maybe in a day's work. Work fragmentation may impact negatively on productivity as the flow is interrupted, but it may increase the productivity by allowing people to handle multiple tasks in a shorter time period. This study explores the types of work fragmentation and their characteristics. An online survey was administered to collect data about work fragmentation and work characteristics including autonomy, complexity, flexibility, usage of ICT, etc. 300 cases were used in the analysis. Analysis of k-mean cluster indicated four different types of work fragmentation: concentrated, temporally distributed, spatially distributed, and fully fragmented.

A Study on the status and the necessity of Space Configuration and Exhibit Method for Safety Experience Hall - Focused on Citizen Safety Experience Hall for the adult education center - (안전체험관 공간구성과 전시매체의 현황조사 및 필요성에 관한 연구 - 시민안전체험관의 성인 교육을 중심으로 -)

  • Li, Ying-Hua;Han, Hae-Ryon
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.3
    • /
    • pp.144-153
    • /
    • 2012
  • This study analyzed and investigated problems of local safety experience halls' spatial structure and media status. Improvements would be suggested after comprehending the need to execute safety education based on citizen's satisfaction and requests. Contents of safety experience space concept, display characteristics and types applied to local institution were analyzed. Safety experience centers with systemized protocols that opened after 2003 and were bigger than $5,000m^2$ were selected. We had three candidates and they were Seoul Gwangnaru Safety Experience Center, Boramea Safety Experience Center and Daegu Safety Theme Park. Going through checklists and interviewing official institutions that were in charge of safety hall educations helped comprehension of sample space status and detailed experimental presentation media. A survey was created based on this study and was distributed to users and non-users of safety experience halls. The survey consisted of general questions covering situations, awareness, level of interests, frequency and satisfaction level. The results were extracted with SPSS 18.0 through frequency analysis and cross tabulations. This research improvements through synthesized contemplation. For the resuits First, various experimental programs need to be supplemented in order to prevent accidents. Second, vivid experimental spaces need to be planned for active participation and users should be fully aware of safety hazard through education. Third, there weren't enough institutions compared to the education needs. Promoting and building more safety experience halls are dire. Finally, these suggestions of the results will be distributed in the planning of the exhibit hall.

  • PDF

Achieving and Reasoning about Common Beliefs based on Social Networking Services: on the Group Chatting Model of KakaoTalk (소셜 네트워크에서 공통믿음의 형성과 추론: 카카오톡 채팅방을 중심으로)

  • Kim, Koono
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.27 no.1
    • /
    • pp.7-14
    • /
    • 2017
  • Theoretically, it is known that common beliefs and/or common knowledge cannot be attained in asynchronously distributed multiagent environments, however, it show that some propositions with deadlines can be attained as common beliefs among a set of fully trusted agents even when they communicate to each other asynchronously. Generally, in the multiagent environment, the attainment of common beliefs is approached as a problem of communication, and for the common beliefs paradox that the common beliefs is not attained on a system without communication time restriction is applied to loose coarser granularity and it prove that forming common beliefs is possible by relaxing necessary requirements through the KakaoTalk chatting model. I also experimented with the reasoning function that confirms the common beliefs by inquiring about the common belief generated by implementing the inference function in each agent of the KakaoTalk chatting model. Through utilizing metalogic programming, a formalization of the presentation and reasoning of common beliefs has been achieved, and the group chatting model of KakaoTalk was adopted in experiments to show that common beliefs can be formed among distributed agents using asynchronous communication.

Verification of failover effects from distributed control system communication networks in digitalized nuclear power plants

  • Min, Moon-Gi;Lee, Jae-Ki;Lee, Kwang-Hyun;Lee, Dongil;Lim, Hee-Taek
    • Nuclear Engineering and Technology
    • /
    • v.49 no.5
    • /
    • pp.989-995
    • /
    • 2017
  • Distributed Control System (DCS) communication networks, which use Fast Ethernet with redundant networks for the transmission of information, have been installed in digitalized nuclear power plants. Normally, failover tests are performed to verify the reliability of redundant networks during design and manufacturing phases; however, systematic integrity tests of DCS networks cannot be fully performed during these phases because all relevant equipment is not installed completely during these two phases. In additions, practical verification tests are insufficient, and there is a need to test the actual failover function of DCS redundant networks in the target environment. The purpose of this study is to verify that the failover functions works correctly in certain abnormal conditions during installation and commissioning phase and identify the influence of network failover on the entire DCS. To quantify the effects of network failover in the DCS, the packets (Protocol Data Units) must be collected and resource usage of the system has to be monitored and analyzed. This study introduces the use of a new methodology for verification of DCS network failover during the installation and commissioning phases. This study is expected to provide insight into verification methodology and the failover effects from DCS redundant networks. It also provides test results of network performance from DCS network failover in digitalized domestic nuclear power plants (NPPs).

A Study on the Gating System and Simulation for Gravity Casting of ZnDC1 Worm Gear (아연 합금 웜기어의 중력 주조 공정을 위한 주조 방안 설계 및 해석에 관한 연구)

  • Lee, Un-Gil;Kim, Jae-Hyun;Jin, Chul-Kyu;Chun, Hyeon-Uk
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.5
    • /
    • pp.589-596
    • /
    • 2021
  • In this study, the optimum gating system was designed, and the two zinc alloy worm gears were manufactured in single process by applying a symmetrical gating system with 2 runners. The SRG ratio is set to 1 : 0.9 : 0.6, and the cross-sectional shapes such as sprue, runner and gate are designed. In order to determine whether the design of the gating system is appropriate, casting analysis was carried out. It takes 4.380 s to charge the casting 100%, 0.55 to 0.6 m/s at the gates and solidification begins after the casting is fully charged. The amount of air entrapment is 2% in the left gear and 6% in the right gear. Hot spots occurred in the center hole of the gear, and pores were found to occur around the upper part of the hole. Therefore, the design of the casting method is suitable for worm gears. CT analysis showed that all parts of worm gear were distributed with fine pores and some coarse pores were distributed around the central hole of worm gear. The yield strength and tensile strength were 220 MPa, 285 MPa, and the elongation rate was 8%. Vickers hardness is 82 HV.

Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications

  • Okafor, Kennedy Chinedu;Longe, Omowunmi Mary
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2257-2285
    • /
    • 2022
  • Cyber-physical systems (CPS) have been growing exponentially due to improved cloud-datacenter infrastructure-as-a-service (CDIaaS). Incremental expandability (scalability), Quality of Service (QoS) performance, and reliability are currently the automation focus on healthy Tier 4 CDIaaS. However, stable QoS is yet to be fully addressed in Cyber-physical data centers (CP-DCS). Also, balanced agility and flexibility for the application workloads need urgent attention. There is a need for a resilient and fault-tolerance scheme in terms of CPS routing service including Pod cluster reliability analytics that meets QoS requirements. Motivated by these concerns, our contributions are fourfold. First, a Distributed Non-Recursive Cloud Model (DNRCM) is proposed to support cyber-physical workloads for remote lab activities. Second, an efficient QoS stability model with Routh-Hurwitz criteria is established. Third, an evaluation of the CDIaaS DCN topology is validated for handling large-scale, traffic workloads. Network Function Virtualization (NFV) with Floodlight SDN controllers was adopted for the implementation of DNRCM with embedded rule-base in Open vSwitch engines. Fourth, QoS evaluation is carried out experimentally. Considering the non-recursive queuing delays with SDN isolation (logical), a lower queuing delay (19.65%) is observed. Without logical isolation, the average queuing delay is 80.34%. Without logical resource isolation, the fault tolerance yields 33.55%, while with logical isolation, it yields 66.44%. In terms of throughput, DNRCM, recursive BCube, and DCell offered 38.30%, 36.37%, and 25.53% respectively. Similarly, the DNRCM had an improved incremental scalability profile of 40.00%, while BCube and Recursive DCell had 33.33%, and 26.67% respectively. In terms of service availability, the DNRCM offered 52.10% compared with recursive BCube and DCell which yielded 34.72% and 13.18% respectively. The average delays obtained for DNRCM, recursive BCube, and DCell are 32.81%, 33.44%, and 33.75% respectively. Finally, workload utilization for DNRCM, recursive BCube, and DCell yielded 50.28%, 27.93%, and 21.79% respectively.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

Bayesian Analysis for Categorical Data with Missing Traits Under a Multivariate Threshold Animal Model (다형질 Threshold 개체모형에서 Missing 기록을 포함한 이산형 자료에 대한 Bayesian 분석)

  • Lee, Deuk-Hwan
    • Journal of Animal Science and Technology
    • /
    • v.44 no.2
    • /
    • pp.151-164
    • /
    • 2002
  • Genetic variance and covariance components of the linear traits and the ordered categorical traits, that are usually observed as dichotomous or polychotomous outcomes, were simultaneously estimated in a multivariate threshold animal model with concepts of arbitrary underlying liability scales with Bayesian inference via Gibbs sampling algorithms. A multivariate threshold animal model in this study can be allowed in any combination of missing traits with assuming correlation among the traits considered. Gibbs sampling algorithms as a hierarchical Bayesian inference were used to get reliable point estimates to which marginal posterior means of parameters were assumed. Main point of this study is that the underlying values for the observations on the categorical traits sampled at previous round of iteration and the observations on the continuous traits can be considered to sample the underlying values for categorical data and continuous data with missing at current cycle (see appendix). This study also showed that the underlying variables for missing categorical data should be generated with taking into account for the correlated traits to satisfy the fully conditional posterior distributions of parameters although some of papers (Wang et al., 1997; VanTassell et al., 1998) presented that only the residual effects of missing traits were generated in same situation. In present study, Gibbs samplers for making the fully Bayesian inferences for unknown parameters of interests are played rolls with methodologies to enable the any combinations of the linear and categorical traits with missing observations. Moreover, two kinds of constraints to guarantee identifiability for the arbitrary underlying variables are shown with keeping the fully conditional posterior distributions of those parameters. Numerical example for a threshold animal model included the maternal and permanent environmental effects on a multiple ordered categorical trait as calving ease, a binary trait as non-return rate, and the other normally distributed trait, birth weight, is provided with simulation study.

Development of a Synthetic Multi-Agent System;The KMITL Cadence 2003 Robotic Soccer Simulation Team, Intelligent and AI Based Control

  • Chitipalungsri, Thunyawat;Jirawatsiwaporn, Chawit;Tangchupong, Thanapon;Kittitornkun, Surin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.879-884
    • /
    • 2004
  • This paper describes the development of a synthetic multi-agent called KMITL Cadence 2003. KMITL Cadence 2003 is a robotic soccer simulation team consisting of eleven autonomous software agents. Each agent operates in a physical soccer simulation model called Robocup Soccer Server which provides fully distributed and real-time multi-agent system environment. All teammates have to cooperate to achieve the common goal of winning the game. The simulation models many aspects of the football field such as noise in ball movements, noisy sensors, unreliable communication channel between teammates and actuators, limited physical abilities and restricted communication. This paper addresses the algorithm to develop the soccer agents to perform basic actions which are scoring, passing ball and blocking the opponents effectively. The result of this development is satisfactory because the successful scoring attempts is increased from 11.1% to 33.3%, successful passing ball attempts is increased from 22.08% to 63.64%, and also, successful intercepting attempts is increased from 88% to 97.73%.

  • PDF

A study of the Consumer's Satisfaction and the Marketing Strategies of a General Hospital (일 종합병원의 소비자 만족과 마케팅 전략에 관한 연구)

  • Lee, Mi-Aie
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.7 no.1
    • /
    • pp.25-40
    • /
    • 2001
  • As the medical market has gradually changed from supplier-centered market to consumer-centered one, it makes hospital managers seek the consumer's satisfaction and the various marketing strategies for survival. Under the these changes, this study was accomplished to measure the consumer's satisfaction about the medial services which a general hospital provided, to identify the marketing strategies that a general hospital could establish for survival. For these purposes, a questionnaire was developed and distributed to 200 patients in general units and 100 patients in oriental units of a general hospital in Seoul. Among them, 163 reponses in general units and 71 reponses in oriental units were turned out to be useful. they were used for final analysis. The results of the survey were as follows : First, among all items of medical services which the hospital provided, patients were most satisfied by nursing services. Second, to Improve the hospital's medical service quality, it was very important for hospital staffs to be courtesy and to explain about a process of treatment or care sufficiently. Third, to decrease cost of medical service, it was very important to develop the various items and premiums of medical insurance especially in field of oriental medicine. Fourth, to make people come to the hospital easy, it was very important of fully utilize the public transportation such as subway. Fifth, to make hospital's image good, it was very important to develop well-prepared public relationship and to continuously provide the diverse medical service in the community.

  • PDF