• Title/Summary/Keyword: 다중프로세스

Search Result 218, Processing Time 0.028 seconds

Fault Diagnosis Method of Complex System by Hierarchical Structure Approach (계층구조 접근에 의한 복합시스템 고장진단 기법)

  • Bae, Yong-Hwan;Lee, Seok-Hee
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.14 no.11
    • /
    • pp.135-146
    • /
    • 1997
  • This paper describes fault diagnosis method in complex system with hierachical structure similar to human body structure. Complex system is divided into unit, item and component. For diagnosing this hierarchical complex system, it is necessary to implement special neural network. Fault diagnosis system can forecast faults in a system and decide from current machine state signal information. Comparing with other diagnosis system for single fault, the developed system deals with multiple fault diagnosis comprising Hierarchical Neural Network(HNN). HNN consists of four level neural network, first level for item fault symptom classification, second level for item fault diagnosis, third level for component symptom classification, forth level for component fault diagnosis. UNIX IPC(Inter Process Communication) is used for implementing HNN wiht multitasking and message transfer between processes in SUN workstation with X-Windows(Motif). We tested HNN at four units, seven items per unit, seven components per item in a complex system. Each one neural newtork operate as a separate process in HNN. The message queue take charge of information exdhange and cooperation between each neural network.

  • PDF

Multi-dynamic Decision Support System for Multi Decision Problems for Highly Ill.structured Problem in Ubiquitous Computing (유비쿼터스 환경에서 다중 동적 의사결정지원시스템(UMD-DSS) : 비구조적 문제 중심으로)

  • Lee, Hyun-Jung;Lee, Kun-Chang
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.83-102
    • /
    • 2008
  • Ubiquitous computing requires timely supply of contextual information in order to upgrade decision quality. In this sense, this study is aimed at proposing a multi-dynamic decision support system for highly ill-structured problems. Especially, it is very important for decision makers in the ubiquitous computing to coordinate conflicts among local goals and global goal harmoniously. The proposed Multi-Dynamic Decision Support System (MDDSS) is basically composed of both central structure and distributed structure, in which central structure supports multi objects decision making and distributed structure supports individual decision making. Its hybrid architecture consists of decision processor, multi-agent controller and intelligent knowledge management processor. Decision processor provides decision support using contexts which come from individual agents. Multi-agent controller coordinates tension among multi agents to resolve conflicts among them. Meanwhile, intelligent knowledge management processor manages knowledge to support decision making such as rules, knowledge, cases and so on. To prove the validity of the proposed MDDSS, we applied it to an u-fulfillment problem system in which many kinds of decision makers exist trying to satisfy their own objectives, and timely adjustment of action strategy is required. Therefore, the u-fulfillment problem is a highly ill-structured problem. We proved its effectiveness with the aid of multi-agent simulation comprising 60 customers and 10 vehicles under three experimental modes.

  • PDF

Speech Signal Processing using Pitch Synchronous Multi-Spectra and DSP System Design in Cochlear Implant (피치동기 다중 스펙트럼을 이용한 청각보철장치의 음성신호처리 및 DSP 시스템 설계)

  • Shin, J. I.;Park, S. J.;Shin, D. K.;Lee, J. H.;Park, S. H.
    • Journal of Biomedical Engineering Research
    • /
    • v.20 no.4
    • /
    • pp.495-502
    • /
    • 1999
  • We propose efficient speech signal processing algorithms and a system for cochlear implant in this paper. The outer and the middle car which perform amplifying, lowpass filtering and AGC, are modeled by an analog system, and the inner ear acting as a time-delayed multi filter and the transducer is implemented by the DSP circuit which enables real-time processing. Especially, the basilar membrane characteristic of the inner ear is modeled by a nonlinear filter bank, and then tonotopy and periodicity of the auditory system is satisfied by using a pitch-synchronous multi-spectra(PSMS) method. Moreover, most of the speech processing is performed by S/W so the system can be easily modified. And as our program is written in C-language, it can be easily transplanted to the system using other processors.

  • PDF

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.

Automatic Analysis of Gamma Ray Spectra for Surveillance of the Nuclear Fuel Integrity (핵연료 건전성 점검을 위한 감마선 스펙트럼의 자동 분석)

  • Cho, Joo-Hyun;Yu, Sung-Sik;Kim, Seong-Rae;Hah, Yung-Joon
    • Nuclear Engineering and Technology
    • /
    • v.26 no.4
    • /
    • pp.555-561
    • /
    • 1994
  • The program of performing a fast and automatic analysis of gamma ray spectra obtained by a Multi-Channel Analyzer (MCA) is developed for the surveillance of the nuclear fuel integrity. The integrity of the nuclear fuel is confirmed by the measurement of the radiation level of the reactor coolant through the real time monitoring and the periodic sampling analysis. In Yonggwang nuclear power plane 3 and 4, the Process Radiation Monitoring System (PRMS), which is a real time monitoring system, provides a measure of the fuel integrity. Currently, its spectrometer channel can identify only one radionuclide at a time since the signal processing unit of the spectrometer channel is a Single Channel Analyzer (SCA). To improve the PRMS, it is necessary to substitute the MCA for the SCA The program is operated in a real time mode and an on-demand mode, and automatically performed for all procedures. The test results by using the National Bureau of Standards (NBS) mixed standard source are in good agreement with those from Canberra System 100 which is a commercial MCA Consequently, the developed program seems to be employed for automatic monitoring of gamma rays in nuclear power plants.

  • PDF

Three Steps Polyalphabetic Substitution Cipher Practice Model using Vigenere Table for Encryption (Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델)

  • Nguyen Huu Hoa;Dang Quach Gia Binh;Do Yeong Kim;Young Namgoong;Si Choon Noh
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.33-39
    • /
    • 2022
  • Recently, cyberattacks on infrastructure have been continuously occurring with the starting of neutralizing the user authentication function of information systems. Accordingly, the vulnerabilities of system are increasing day by day, such as the increase in the vulnerabilities of the encryption system. In this paper, an alternative technique for the symmetric key algorithm has been developed in order to build the encryption algorithm that is not easy for beginners to understand and apply. Vigenere Cipher is a method of encrypting alphabetic text and it uses a simple form of polyalphabetic substitution. The encryption application system proposed in this study uses the simple form of polyalphabetic substitution method to present an application model that integrates the three steps of encryption table creation, encryption and decryption as a framework. The encryption of the original text is done using the Vigenère square or Vigenère table. When applying to the automatic generation of secret keys on the information system this model is expected that integrated authentication work, and analysis will be possible on target system. ubstitution alphabets[3].

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

A Study on Selection Process of Web Services Based on the Multi-Attributes Decision Making (다중 속성 의사결정에 의한 웹 서비스 선정 프로세스에 관한 연구)

  • Seo Young-Jun;Song Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.603-612
    • /
    • 2006
  • Recently the web service area is rapidly growing as the next generation IT paradigm because of increase of concern about SOA(Services-Oriented Architecture) and growth of B2B market. Since a service discovery through UDDI(Universal Description, Discovery and Integration) is limited to a functional requirement, it is not considered an effect on frequency of service using and reliability of mutual relation. That is, a quality as nonfunctional aspect of web service is regarded as important factor for a success between consumer and provider. Therefore, the web service selection method with considering the quality is necessary. This paper suggests the agent-based quality broker architecture and selection process which helps to find a service providing the optimum quality that the consumer needs in a position of service consumer. A theory of agent is accepted widely and suitable for proposed system architecture in the circumstance of distributed and heterogeneous environment like web service. In this paper, we considered the QoS and CoS in the evaluation process to solve the problem of existing researches related to the web service selection and used PROMETHEE(Preference Ranking Organization MeTHod for Enrichment Evaluations) as an evaluation method which is most suitable for the web service selection among MCDM approaches. PROMETHEE has advantages that solve the problem that a pair-wise comparison should be performed again when comparative services are added or deleted. This paper suggested a case study with the service composition scenario in order to verify the selection process. In this case study, the decision making problem was described on the basis of evaluated values for qualities from a consumer's point of view and the defined service level.

A Load Balancing Technique for a Massively Multiplayer Online Game Server (대용량 온라인 게임 서버를 위한 부하 평형 기법)

  • 손민규;성영락;오하령;안현식;김정윤
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1339-1342
    • /
    • 2003
  • 클라이언트-서버 구조의 온라인 게임에서 서버의 역할은 매우 중요하다. 그러나 서버에 너무 많은 사용자가 동시에 접속할 경우에는 과도한 부하로 인하여 안정적인 서비스를 제공하지 못하는 경우가 발생할 수 있다. 이러한 문제를 해결하기 위하여 여러 대의 분산 서버를 활용한 방법이 사용되고 있다 분산 서버 구조에서는 부하가 특정 서버로 집중되는 것을 막는 것이 전체 시스템의 성능 향상을 위하여 필요하다. 이를 위하여 부하 평형 기법을 사용하고 있으며 관련 연구도 활발히 진행 중이다. 본 논문에서는 분산 서버를 이용한 온라인 게임 서버의 구조를 설계하고, 대량 사용자의 제약을 극복하기 위한 하나의 방안으로 다중 서버 시스템에서 실행되는 게임 서버 프로세스들에 대한 부하 평형 기법을 제시한다. 제안된 기법에서는 전체 게임을 소규모의 여러 게임 세상(Game World)으로 나누고 서비스가 진행되는 상황에서 게임 세상을 게임 서버들 사이에서 이동시킨다.

  • PDF

Modificated Intrusion Pattern Classification Technique based on Bayesian Network (베이지안 네트워크 기반의 변형된 침입 패턴 분류 기법)

  • Cha Byung-Rae;Park Kyoung-Woo;Seo Jae-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.4 no.2
    • /
    • pp.69-80
    • /
    • 2003
  • Program Behavior Intrusion Detection Technique analyses system calls that called by daemon program or root authority, constructs profiles, and detectes modificated anomaly intrusions effectively. In this paper, the relation among system calls of processes is represented by bayesian network and Multiple Sequence Alignment. Program behavior profiling by Bayesian Network classifies modified anomaly intrusion behaviors, and detects anomaly behaviors. we had simulation by proposed normal behavior profiling technique using UNM data.

  • PDF