• Title/Summary/Keyword: large-scale systems

Search Result 1,879, Processing Time 0.033 seconds

Performance Analysis of Location-Aware System based on Active Tags (능동태그 기반 위치인식 시스템의 성능 분석)

  • So, Sun-Sup;Eun, Seong-Bae;Kim, Jin-Chun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.422-429
    • /
    • 2007
  • Location awareness is one of the key functionalities to build an U-city. Recently, many of works of the location-aware systems are emerging to commercially apply to on-going large-scale apartment complex based on U-city. As dwellers or cars being attached with active tags are moving in the U-city complex, the active tags periodically broadcast their own identifiers and receivers fixed along the street or in building use those information to calculate location of them. There are several issues to be considered for such an environment. The first is that the number of active tags operating in the same region are large as much as tens of thousands, and the second is that the active tags should be alive without change of batteries more than a year, hence low power consumption is very important. In this paper we propose i) a new architecture for location-aware system considering such issues, ii) technical issues to implement it using active tags, and iii) a mathematical analytic model to investigate overall performance and verify it by comparing with actual experimental results. Through the analysis we can show the theoretical boundary of the lowest packet loss rate and the maximum number of tags with acceptable performance for the systems based on active tags. The results can be applied to practical design of location-based systems of U-City projects.

Enhancing Throughput and Reducing Network Load in Central Bank Digital Currency Systems using Reinforcement Learning (강화학습 기반의 CBDC 처리량 및 네트워크 부하 문제 해결 기술)

  • Yeon Joo Lee;Hobin Jang;Sujung Jo;GyeHyun Jang;Geontae Noh;Ik Rae Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.129-141
    • /
    • 2024
  • Amidst the acceleration of digital transformation across various sectors, the financial market is increasingly focusing on the development of digital and electronic payment methods, including currency. Among these, Central Bank Digital Currencies (CBDC) are emerging as future digital currencies that could replace physical cash. They are stable, not subject to value fluctuation, and can be exchanged one-to-one with existing physical currencies. Recently, both domestic and international efforts are underway in researching and developing CBDCs. However, current CBDC systems face scalability issues such as delays in processing large transactions, response times, and network congestion. To build a universal CBDC system, it is crucial to resolve these scalability issues, including the low throughput and network overload problems inherent in existing blockchain technologies. Therefore, this study proposes a solution based on reinforcement learning for handling large-scale data in a CBDC environment, aiming to improve throughput and reduce network congestion. The proposed technology can increase throughput by more than 64 times and reduce network congestion by over 20% compared to existing systems.

Object Tracking Based on Exactly Reweighted Online Total-Error-Rate Minimization (정확히 재가중되는 온라인 전체 에러율 최소화 기반의 객체 추적)

  • JANG, Se-In;PARK, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.53-65
    • /
    • 2019
  • Object tracking is one of important steps to achieve video-based surveillance systems. Object tracking is considered as an essential task similar to object detection and recognition. In order to perform object tracking, various machine learning methods (e.g., least-squares, perceptron and support vector machine) can be applied for different designs of tracking systems. In general, generative methods (e.g., principal component analysis) were utilized due to its simplicity and effectiveness. However, the generative methods were only focused on modeling the target object. Due to this limitation, discriminative methods (e.g., binary classification) were adopted to distinguish the target object and the background. Among the machine learning methods for binary classification, total error rate minimization can be used as one of successful machine learning methods for binary classification. The total error rate minimization can achieve a global minimum due to a quadratic approximation to a step function while other methods (e.g., support vector machine) seek local minima using nonlinear functions (e.g., hinge loss function). Due to this quadratic approximation, the total error rate minimization could obtain appropriate properties in solving optimization problems for binary classification. However, this total error rate minimization was based on a batch mode setting. The batch mode setting can be limited to several applications under offline learning. Due to limited computing resources, offline learning could not handle large scale data sets. Compared to offline learning, online learning can update its solution without storing all training samples in learning process. Due to increment of large scale data sets, online learning becomes one of essential properties for various applications. Since object tracking needs to handle data samples in real time, online learning based total error rate minimization methods are necessary to efficiently address object tracking problems. Due to the need of the online learning, an online learning based total error rate minimization method was developed. However, an approximately reweighted technique was developed. Although the approximation technique is utilized, this online version of the total error rate minimization could achieve good performances in biometric applications. However, this method is assumed that the total error rate minimization can be asymptotically achieved when only the number of training samples is infinite. Although there is the assumption to achieve the total error rate minimization, the approximation issue can continuously accumulate learning errors according to increment of training samples. Due to this reason, the approximated online learning solution can then lead a wrong solution. The wrong solution can make significant errors when it is applied to surveillance systems. In this paper, we propose an exactly reweighted technique to recursively update the solution of the total error rate minimization in online learning manner. Compared to the approximately reweighted online total error rate minimization, an exactly reweighted online total error rate minimization is achieved. The proposed exact online learning method based on the total error rate minimization is then applied to object tracking problems. In our object tracking system, particle filtering is adopted. In particle filtering, our observation model is consisted of both generative and discriminative methods to leverage the advantages between generative and discriminative properties. In our experiments, our proposed object tracking system achieves promising performances on 8 public video sequences over competing object tracking systems. The paired t-test is also reported to evaluate its quality of the results. Our proposed online learning method can be extended under the deep learning architecture which can cover the shallow and deep networks. Moreover, online learning methods, that need the exact reweighting process, can use our proposed reweighting technique. In addition to object tracking, the proposed online learning method can be easily applied to object detection and recognition. Therefore, our proposed methods can contribute to online learning community and object tracking, detection and recognition communities.

The Comparative Study for NHPP of Truncated Pareto Software Reliability Growth Model (절단고정시간에 근거한 파레토 NHPP 소프트웨어 신뢰성장모형에 관한 비교 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2012
  • Due to the large scale application of software systems, software reliability plays an important role in software developments. In this paper, a software reliability growth model (SRGM) is proposed for testing time. The testing time on the right is truncated in this model. The intensity function, mean-value function, reliability of the software, estimation of parameters and the special applications of Pareto NHPP model are discussed. This paper, a numerical example of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection, depended on difference between predictions and actual values, were efficient using the mean square error and $R_{SQ}$.

Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets

  • Wang, Tian-Zuo;Wang, Huai-Min;Liu, Bo;Ding, Bo;Zhang, Jing;Shi, Pei-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2731-2749
    • /
    • 2012
  • Sybil attack has been proved effective in mitigating the P2P botnet, but the impacts of some important parameters were not studied, and no model to estimate the effectiveness was proposed. In this paper, taking Kademlia-based botnets as the example, the model which has the upper and lower bound to estimate the mitigating performance of the Sybil attack is proposed. Through simulation, how three important factors affect the performance of the Sybil attack is analyzed, which is proved consistent with the model. The simulation results not only confirm that for P2P botnets in large scale, the Sybil attack is an effective countermeasure, but also imply that the model can give suggestions for the deployment of Sybil nodes to get the ideal performance in mitigating the P2P botnet.

Trends in standardization of IoT based electrical safety technology (사물인터넷 기반 전기안전 기술 및 표준화 동향)

  • An, Y.Y.;Kim, S.H.;Jeong, S.J.;Kang, H.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.1
    • /
    • pp.49-59
    • /
    • 2020
  • This paper describes an IoT-based electrical safety management system for managing the electrical power distribution systems in factories or buildings and for managing private electrical devices in apartment complex. The IoT-based electrical safety management system collects IoT data from the electrical facilities or devices to provide various electrical safety services. In some cases, it uses an IoT adaptor to collect data from legacy facilities. By monitoring and analyzing the IoT data, it is possible to provide protection from and prevent electrical hazards. In addition, an IoT-based electrical safety management system can benefit from using the IoT identification system and standardized data model of the electrical facilities and devices. An IoT identification system is used to increase manageability of large-scale electrical facilities which consists of numerous IoT devices. A standardized data model is used to support interoperability. This paper also explores some international and Korean standards related to IoT-based electrical safety management.

Development of a irradiation strategy within a closed loop control system for the laser adjustment of deformation

  • Hutterer, A.;Hagenah, H.;Geiger, M.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2313-2318
    • /
    • 2003
  • By means of flexible forming processes in sheet metal manufacturing it is possible to produce parts of complex geometry within short manufacturing time. These procedures are suitable especially for prototyping or adjustment of deformation. Here formative procedures like laser forming are increasingly important, because they make the large-scale-like production of the prototypes with the required materials possible. High accuracy and reproducibility of the products is the precondition of the production. Due to the lack of a forming tool, complex geometries can hardly be manufactured within tolerances. To overcome this problem an automatic closed loop control system for the adjustment of deformations has been developed. An important element of the closed loop control system is the definition of a suitable irradiation strategy for laser forming. For the determination of the irradiation strategy a lot of influences must be taken into consideration from the field of material, geometry and laser. In this paper the improved closed loop control system and the development of an irradiation strategy for 4 mm deep buckles in an ALMgSi1 sheet will be represented. This system can be used e.g. in the automated adjustment of hail damage in car bodies or deformation by heat treatment.

  • PDF

Nurses' Perception of Barriers to Research Utilization (간호사가 인지하는 연구결과 이용의 장애요인)

  • Lee, Eun-Hyeon;Kim, Hye-Suk
    • Journal of Korean Academy of Nursing
    • /
    • v.30 no.5
    • /
    • pp.1347-1356
    • /
    • 2000
  • The present study is a descriptive study to investigate nurses’perception of barriers to research utilization. A total of 274 participants in this study consisted of registered nurses working in a large, urban and academic medical center. A questionnaire packet containing the Barriers Scale, and a demographic profile was distributed to nurses and they were asked to return the packet to a return-box in the Nursing Office after completion. The greatest barrier was insufficient time on the job to implement new ideas. Next was ‘implications for practice are not made clear'. Also the item of the English language in research articles was considered to be the ninth barrier. The greatest mean score of each of the sub-scales was the communication factor. The were followed by the organization, research, and nurse factors. Compared with the means from other studies, the mean scores of the communication and research factors were higher in this study. Nurses who had not taken a class of research methods found the communication and research factors as a higher barrier than those who did. Also, nurses who did not participate in a conference last year perceived the research factor as higher than those who did. It is recommended that English and research classes should be strengthened in educational nursing programs. The researchers should also describe the section of implication for practice as more detail and clearer for the understanding of nurses; Lastly journals in a libraries or online journal systems should be easily accessible.

  • PDF

Individual Roles for Small-sized Web Application Development (소규모의 웹 응용 개발을 위한 역할 분담)

  • 이우진;조용선;정기원
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.3
    • /
    • pp.209-225
    • /
    • 2001
  • This paper Proposes the individual roles for developing small web application systems based on the Client/Server architecture with the activities and artifacts of each role and cooperation. The roles of Web Server part (i.e. User Interface Designer, Web Designer, HTML Writer), the roles of Application Server part (i.e. Domain Expert, Application Developer, Tester) and the roles of DB Server part (i.e. Database Administrator, Data Designer) are described. Furthermore, the role of the Development Leader that participates in development and manages all works in project and finds the solutions of problems in project, is also discussed. The Domain Expert analyzes the domain of the application in order to send the artifacts to the Application Developer. Then the Application Developer analyzes, designs and implements the application based on the artifacts of the Domain Expert and integrates the implemented program modules. Roles are related each other in this way, and cooperate until the application development is completed. Finally, we analyzed and compared these roles with the roles of RUP(Rational Unified process) and web wave. Suggested roles in this paper turned out to be efficient compared to the roles of the existing large-scale methodology.

  • PDF

An Anomaly Detection Framework Based on ICA and Bayesian Classification for IaaS Platforms

  • Wang, GuiPing;Yang, JianXi;Li, Ren
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3865-3883
    • /
    • 2016
  • Infrastructure as a Service (IaaS) encapsulates computer hardware into a large amount of virtual and manageable instances mainly in the form of virtual machine (VM), and provides rental service for users. Currently, VM anomaly incidents occasionally occur, which leads to performance issues and even downtime. This paper aims at detecting anomalous VMs based on performance metrics data of VMs. Due to the dynamic nature and increasing scale of IaaS, detecting anomalous VMs from voluminous correlated and non-Gaussian monitored performance data is a challenging task. This paper designs an anomaly detection framework to solve this challenge. First, it collects 53 performance metrics to reflect the running state of each VM. The collected performance metrics are testified not to follow the Gaussian distribution. Then, it employs independent components analysis (ICA) instead of principal component analysis (PCA) to extract independent components from collected non-Gaussian performance metric data. For anomaly detection, it employs multi-class Bayesian classification to determine the current state of each VM. To evaluate the performance of the designed detection framework, four types of anomalies are separately or jointly injected into randomly selected VMs in a campus-wide testbed. The experimental results show that ICA-based detection mechanism outperforms PCA-based and LDA-based detection mechanisms in terms of sensitivity and specificity.