• Title/Summary/Keyword: performance monitoring events

Search Result 79, Processing Time 0.024 seconds

Power Prediction of Mobile Processors based on Statistical Analysis of Performance Monitoring Events (성능 모니터링 이벤트들의 통계적 분석에 기반한 모바일 프로세서의 전력 예측)

  • Yun, Hee-Sung;Lee, Sang-Jeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.7
    • /
    • pp.469-477
    • /
    • 2009
  • In mobile systems, energy efficiency is critical to extend battery life. Therefore, power consumption should be taken into account to develop software in addition to performance, Efficient software design in power and performance is possible if accurate power prediction is accomplished during the execution of software, In this paper, power estimation model is developed using statistical analysis, The proposed model analyzes processor behavior Quantitatively using the data of performance monitoring events and power consumption collected by executing various benchmark programs, And then representative hardware events on power consumption are selected using hierarchical clustering, The power prediction model is established by regression analysis in which the selected events are independent variables and power is a response variable, The proposed model is applied to a PXA320 mobile processor based on Intel XScale architecture and shows average estimation error within 4% of the actual measured power consumption of the processor.

Approach to diagnosing multiple abnormal events with single-event training data

  • Ji Hyeon Shin;Seung Gyu Cho;Seo Ryong Koo;Seung Jun Lee
    • Nuclear Engineering and Technology
    • /
    • v.56 no.2
    • /
    • pp.558-567
    • /
    • 2024
  • Diagnostic support systems are being researched to assist operators in identifying and responding to abnormal events in a nuclear power plant. Most studies to date have considered single abnormal events only, for which it is relatively straightforward to obtain data to train the deep learning model of the diagnostic support system. However, cases in which multiple abnormal events occur must also be considered, for which obtaining training data becomes difficult due to the large number of combinations of possible abnormal events. This study proposes an approach to maintain diagnostic performance for multiple abnormal events by training a deep learning model with data on single abnormal events only. The proposed approach is applied to an existing algorithm that can perform feature selection and multi-label classification. We choose an extremely randomized trees classifier to select dedicated monitoring parameters for target abnormal events. In diagnosing each event occurrence independently, two-channel convolutional neural networks are employed as sub-models. The algorithm was tested in a case study with various scenarios, including single and multiple abnormal events. Results demonstrated that the proposed approach maintained diagnostic performance for 15 single abnormal events and significantly improved performance for 105 multiple abnormal events compared to the base model.

Stochastic Estimation of Voltage Sags Based on Voltage Monitoring (전압 모니터링에 기반한 순간전압강하 확률적 추계 방법)

  • Son, Jeongdae;Park, Chang-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.10
    • /
    • pp.1271-1277
    • /
    • 2018
  • This paper deals with a voltage sag assessment based on a voltage monitoring program. The voltage sag performance at a specific site can be evaluated by analyzing voltage monitoring data recorded for a long time period. Although an assessment based on voltage monitoring is an effective way to understand voltage sag performance at a measurement site, the statistical confidence of voltage sag frequency estimation heavily depends on the length of monitoring period and the number of recorded events. Short monitoring period and insufficient recorded data can not provide a reliable assessment result. This paper proposes a compensation assessment method by combining a computer simulation approach for in case that monitoring period and data are not enough for a valid assessment.

An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response (보안관제 효율성 제고를 위한 실증적 분석 기반 보안이벤트 자동검증 방법)

  • Kim, Kyu-Il;Park, Hark-Soo;Choi, Ji-Yeon;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.507-522
    • /
    • 2014
  • Domestic CERTs are carrying out monitoring and response against cyber attacks using security devices(e.g., IDS, TMS, etc) based on signatures. Particularly, in case of public and research institutes, about 30 security monitoring and response centers are being operated under National Cyber Security Center(NCSC) of National Intelligence Service(NIS). They are mainly using Threat Management System(TMS) for providing security monitoring and response service. Since TMS raises a large amount of security events and most of them are not related to real cyber attacks, security analyst who carries out the security monitoring and response suffers from analyzing all the TMS events and finding out real cyber attacks from them. Also, since the security monitoring and response tasks depend on security analyst's know-how, there is a fatal problem in that they tend to focus on analyzing specific security events, so that it is unable to analyze and respond unknown cyber attacks. Therefore, we propose automated verification method of security events based on their empirical analysis to improve performance of security monitoring and response.

Structural monitoring and identification of civil infrastructure in the United States

  • Nagarajaiah, Satish;Erazo, Kalil
    • Structural Monitoring and Maintenance
    • /
    • v.3 no.1
    • /
    • pp.51-69
    • /
    • 2016
  • Monitoring the performance and estimating the remaining useful life of aging civil infrastructure in the United States has been identified as a major objective in the civil engineering community. Structural health monitoring has emerged as a central tool to fulfill this objective. This paper presents a review of the major structural monitoring programs that have been recently implemented in the United States, focusing on the integrity and performance assessment of large-scale structural systems. Applications where response data from a monitoring program have been used to detect and correct structural deficiencies are highlighted. These applications include (but are not limited to): i) Post-earthquake damage assessment of buildings and bridges; ii) Monitoring of cables vibration in cable-stayed bridges; iii) Evaluation of the effectiveness of technologies for retrofit and seismic protection, such as base isolation systems; and iv) Structural damage assessment of bridges after impact loads resulting from ship collisions. These and many other applications show that a structural health monitoring program is a powerful tool for structural damage and condition assessment, that can be used as part of a comprehensive decision-making process about possible actions that can be undertaken in a large-scale civil infrastructure system after potentially damaging events.

Performance Analysis of an On-line Game Abuse Pattern Monitoring Method (온라인 게임 악용 패턴 모니터링 방법의 성능 분석)

  • Roh, Chang-Hyun;Son, Han-Seong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.71-77
    • /
    • 2011
  • CEP(Complex Event Processing) is a technique to find complex event pattern in a massive information system. Based on CEP technique, an abuse pattern monitoring method has been developed to provide an real-time detection. In the method, the events occurred by game-play are observed to be against the rules using CEP. User abuse patterns are pre-registered in CEP engine. And CEP engine monitors user abuse after aggregating the game data transferred by game logging server. This article provides the performance analysis results of the abuse pattern monitoring method using real game DB. We results that the method proposed in previous study is effective to monitor abusing users.

Japan's experience on long-span bridges monitoring

  • Fujino, Yozo;Siringoringo, Dionysius M.;Abe, Masato
    • Structural Monitoring and Maintenance
    • /
    • v.3 no.3
    • /
    • pp.233-257
    • /
    • 2016
  • This paper provides an overview on development of long-span bridges monitoring in Japan, with emphasis on monitoring strategies, types of monitoring system, and effective utilization of monitoring data. Because of severe environment condition such as high seismic activity and strong wind, bridge monitoring systems in Japan historically put more emphasis on structural evaluation against extreme events. Monitoring data were used to verify design assumptions, update specifications, and facilitate the efficacy of vibration control system. These were among the first objectives of instrumentation of long-span bridges in a framework of monitoring system in Japan. Later, monitoring systems were also utilized to evaluate structural performance under various environment and loading conditions, and to detect the possible structural deterioration over the age of structures. Monitoring systems are also employed as the basis of investigation and decision making for structural repair and/or retrofit when required. More recent interest has been to further extend application of monitoring to facilitate operation and maintenance, through rationalization of risk and asset management by utilizing monitoring data. The paper describes strategies and several examples of monitoring system and lessons learned from structural monitoring of long-span bridges in Japan.

Web-based Real Environment Monitoring Using Wireless Sensor Networks

  • Lee, Gil-Jae;Kong, Jong-Uk;Kim, Min-Ah;Byeon, Ok-Hwan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.207-210
    • /
    • 2005
  • Ubiquitous computing is one of the key technology areas in the "Project on Development of Ubiquitous computing and network technology" promoted by the Ministry of Science and Technology as a frontier business of the $21^{st}$ century in Korea, which is based on the new concept merging physical space and computer-based cyber space. With recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low-power consumption wireless micro sensor nodes have been available. Using these smart sensor nodes, there are many activities to monitor real world, for example, habitat monitoring, earthquake monitoring and so on. In this paper, we introduce web-based real environment monitoring system incorporating wireless sensor nodes. It collects sensing data produced by some wireless sensor nodes and stores them into a database system to analyze. Our environment monitoring system is composed of a networked camera and environmental sensor nodes, which are called Mica2 and developed by University of California at Berkeley. We have modified and ported network protocols over TinyOS and developed a monitoring application program using the MTS310 and MTS420 sensors that are able to observe temperature, relative humidity, light and accelerator. The sensed data can be accessed user-friendly because our environment monitoring system supports web-based user interface. Moreover, in this system, we can setup threshold values so the system supports a function to inform some anomalous events to administrators. Especially, the system shows two useful pre-processed data as a kind of practical uses: a discomfort index and a septicity index. To make both index values, the system restores related data from the database system and calculates them according to each equation relatively. We can do enormous works using wireless sensor technologies, but just environment monitoring. In this paper, we show just one of the plentiful applications using sensor technologies.

  • PDF

Detection of TrustZone Rootkits Using ARM PMU Events (ARM PMU 이벤트를 활용한 TrustZone 루트킷 탐지에 대한 연구)

  • Jimin Choi;Youngjoo Shin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.929-938
    • /
    • 2023
  • ARM processors, utilized in mobile devices, have integrated the hardware isolation framework, TrustZone technology, to implement two execution environments: the trusted domain "Secure World" and the untrusted domain "Normal World". Rootkit is a type of malicious software that gains administrative access and hide its presence to create backdoors. Detecting the presence of a rootkit in a Secure World is difficult since processes running within the Secure World have no memory access restrictions and are isolated. This paper proposes a technique that leverages the hardware based PMU(Performance Monitoring Unit) to measure events of the Secure World rootkit and to detect the rootkit using deep learning.

Operational modal analysis of a long-span suspension bridge under different earthquake events

  • Ni, Yi-Qing;Zhang, Feng-Liang;Xia, Yun-Xia;Au, Siu-Kui
    • Earthquakes and Structures
    • /
    • v.8 no.4
    • /
    • pp.859-887
    • /
    • 2015
  • Structural health monitoring (SHM) has gained in popularity in recent years since it can assess the performance and condition of instrumented structures in real time and provide valuable information to the asset's manager and owner. Operational modal analysis plays an important role in SHM and it involves the determination of natural frequencies, damping ratios and mode shapes of a constructed structure based on measured dynamic data. This paper presents the operational modal analysis and seismic response characterization of the Tsing Ma Suspension Bridge of 2,160 m long subjected to different earthquake events. Three kinds of events, i.e., short-distance, middle-distance and long-distance earthquakes are taken into account. A fast Bayesian modal identification method is used to carry out the operational modal analysis. The modal properties of the bridge are identified and compared by use of the field monitoring data acquired before and after the earthquake for each type of the events. Research emphasis is given on identifying the predominant modes of the seismic responses in the deck during short-distance, middle-distance and long-distance earthquakes, respectively, and characterizing the response pattern of various structural portions (deck, towers, main cables, etc.) under different types of earthquakes. Since the bridge is over 2,000 m long, the seismic wave would arrive at the tower/anchorage basements of the two side spans at different time instants. The behaviors of structural dynamic responses on the Tsing Yi side span and on the Ma Wan side span under each type of the earthquake events are compared. The results obtained from this study would be beneficial to the seismic design of future long-span bridges to be built around Hong Kong (e.g., the Hong Kong-Zhuhai-Macau Bridge).