• Title/Summary/Keyword: 이벤트패턴

Search Result 148, Processing Time 0.022 seconds

Index-based Searching on Timestamped Event Sequences (타임스탬프를 갖는 이벤트 시퀀스의 인덱스 기반 검색)

  • 박상현;원정임;윤지희;김상욱
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.468-478
    • /
    • 2004
  • It is essential in various application areas of data mining and bioinformatics to effectively retrieve the occurrences of interesting patterns from sequence databases. For example, let's consider a network event management system that records the types and timestamp values of events occurred in a specific network component(ex. router). The typical query to find out the temporal casual relationships among the network events is as fellows: 'Find all occurrences of CiscoDCDLinkUp that are fellowed by MLMStatusUP that are subsequently followed by TCPConnectionClose, under the constraint that the interval between the first two events is not larger than 20 seconds, and the interval between the first and third events is not larger than 40 secondsTCPConnectionClose. This paper proposes an indexing method that enables to efficiently answer such a query. Unlike the previous methods that rely on inefficient sequential scan methods or data structures not easily supported by DBMSs, the proposed method uses a multi-dimensional spatial index, which is proven to be efficient both in storage and search, to find the answers quickly without false dismissals. Given a sliding window W, the input to a multi-dimensional spatial index is a n-dimensional vector whose i-th element is the interval between the first event of W and the first occurrence of the event type Ei in W. Here, n is the number of event types that can be occurred in the system of interest. The problem of‘dimensionality curse’may happen when n is large. Therefore, we use the dimension selection or event type grouping to avoid this problem. The experimental results reveal that our proposed technique can be a few orders of magnitude faster than the sequential scan and ISO-Depth index methods.hods.

A Variable Business Component Development and Case Study Using a Rule Based Analysis Pattern and UML Components (규칙기반 분석 패턴과 UML Components을 사용한 가변적인 비즈니스 컴포넌트 개발과 적용 사례)

  • Lee, Yong-Hwan;Min, Dug-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.947-958
    • /
    • 2006
  • In order to increase extensibility and reusability of business components, the variable things need to be analyzed from the analysis phase and identified as components. In this paper, we propose a rule-based analysis pattern, which can effectively extract object-based main concepts from a variable business process in the analysis phase and identify a variable business component by applying the pattern to the UML Components development process. It can make analysis artifacts consistent and readable for analysts with different level of knowledge and experience to apply the pattern to analysis of rule-based variable business processes. And also, variable business components can be easily identified by applying the pattern to the UML Components development process. In order to prove the feasibility of the pattern, we have applied the pattern the deposit and import/export subsystem of the banking domain. According to our experience, we can make the same business conceptual models between the deposit and import/export subsystem due to the main concepts suggested by the pattern and effectively identify a variable business components in the UML Components development process.

Energy-efficient and QoS Guaranteed MAC protocol in Ubiquitous Sensor Networks (에너지 효율성과 서비스 품질 보장을 위한 MAC 프로토콜)

  • Kim, Seong-Hun;Goh, Sun-Bok;Jung, Chang-Ryul;Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.71-78
    • /
    • 2008
  • The sensor node's performance is expected to be improved and the price will be largely decreased. As USN-applied field is expanded, multiple application services are expected to be provided through one USN soon. Multiple applications be required a periodic data reporting, consecutive information monitoring, event-driven data and query-based data as the data pattern that USN is delivered. Accordingly, the mechanism which can assure QoS according to each data characteristic is required. In this paper, A proposed protocol apply the duty cycle of S-MAC protocol variably and flexible according QoS level. This method largely reduces the delay on the delay-sensitive traffic, while keeping the energy efficiency.

  • PDF

Short-term Traffic States Prediction Using k-Nearest Neighbor Algorithm: Focused on Urban Expressway in Seoul (k-NN 알고리즘을 활용한 단기 교통상황 예측: 서울시 도시고속도로 사례)

  • KIM, Hyungjoo;PARK, Shin Hyoung;JANG, Kitae
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.2
    • /
    • pp.158-167
    • /
    • 2016
  • This study evaluates potential sources of errors in k-NN(k-nearest neighbor) algorithm such as procedures, variables, and input data. Previous research has been thoroughly reviewed for understanding fundamentals of k-NN algorithm that has been widely used for short-term traffic states prediction. The framework of this algorithm commonly includes historical data smoothing, pattern database, similarity measure, k-value, and prediction horizon. The outcomes of this study suggests that: i) historical data smoothing is recommended to reduce random noise of measured traffic data; ii) the historical database should contain traffic state information on both normal and event conditions; and iii) trial and error method can improve the prediction accuracy by better searching for the optimum input time series and k-value. The study results also demonstrates that predicted error increases with the duration of prediction horizon and rapidly changing traffic states.

Naming Scheme for Standardization of Detection Rule on Security Monitoring Threat Event (보안관제 위협 이벤트 탐지규칙 표준 명명법 연구)

  • Park, Wonhyung;Kim, Yanghoon;Lim, YoungWhan;Ahn, Sungjin
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.83-90
    • /
    • 2015
  • Recent, Cyber attacks such as hacking and malicious code techniques are evolving very rapidly changing cyber a ttacks are increasing, the number of malicious code techniques vary accordingly become intelligent. In the case of m alware because of the ambiguity in the number of malware have increased rapidly by name or classified as maliciou s code may have difficulty coping with. This paper investigated the naming convention of the vaccine manufacturer s in Korea to solve this problem, the analysis and offers a naming convention for security control event detection r ule analysis to compare the pattern of the detection rule out based on this current.

XML-based Modeling for Semantic Retrieval of Syslog Data (Syslog 데이터의 의미론적 검색을 위한 XML 기반의 모델링)

  • Lee Seok-Joon;Shin Dong-Cheon;Park Sei-Kwon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.147-156
    • /
    • 2006
  • Event logging plays increasingly an important role in system and network management, and syslog is a de-facto standard for logging system events. However, due to the semi-structured features of Common Log Format data most studies on log analysis focus on the frequent patterns. The extensible Markup Language can provide a nice representation scheme for structure and search of formatted data found in syslog messages. However, previous XML-formatted schemes and applications for system logging are not suitable for semantic approach such as ranking based search or similarity measurement for log data. In this paper, based on ranked keyword search techniques over XML document, we propose an XML tree structure through a new data modeling approach for syslog data. Finally, we show suitability of proposed structure for semantic retrieval.

A Study on Air Interface System (AIS) Using Infrared Ray (IR) Camera (적외선 카메라를 이용한 에어 인터페이스 시스템(AIS) 연구)

  • Kim, Hyo-Sung;Jung, Hyun-Ki;Kim, Byung-Gyu
    • The KIPS Transactions:PartB
    • /
    • v.18B no.3
    • /
    • pp.109-116
    • /
    • 2011
  • In this paper, we introduce non-touch style interface system technology without any touch style controlling mechanism, which is called as "Air-interface". To develop this system, we used the full reflection principle of infrared (IR) light and then user's hand is separated from the background with the obtained image at every frame. The segmented hand region at every frame is used as input data for an hand-motion recognition module, and the hand-motion recognition module performs a suitable control event that has been mapped into the specified hand-motion through verifying the hand-motion. In this paper, we introduce some developed and suggested methods for image processing and hand-motion recognition. The developed air-touch technology will be very useful for advertizement panel, entertainment presentation system, kiosk system and so many applications.

An Effective Method to Reduce IPTV Channel Zapping Times using Pushed Number Key Information and Interval Time of the Events (IPTV에서 채널 번호 키 입력 이벤트가 발생 시 해당 숫자 정보와 이벤트간의 시간차를 활용하여 채널 변경 시간을 단축하는 방법)

  • Ryu, Joon-Hyuk;Youn, Hee-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.444-452
    • /
    • 2010
  • To avoid a channel zapping delay, the device needs to predict a next channel and must download it. Previous researches suggest algorithms based on assumption by utilizing many data. How to select and download future channels is a main issue in IPTV system. Most proposal based on assumption do not guarantees complete performance of channel zapping. In this paper, we suggest an effective method to avoid a channel zapping time with a constant performance by using a number remote controller key information.

Loan/Redemption Scheme for I/O performance improvement of Virtual Machine Scheduler (가상머신 스케줄러의 I/O 성능 향상을 위한 대출/상환 기법)

  • Kim, Kisu;Jang, Joonhyouk;Hong, Jiman
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.18-25
    • /
    • 2016
  • Virtualized hardware resources provides efficiency in use and easy of management. Based on the benefits, virtualization techniques are used to build large server clusters and cloud systems. The performance of a virtualized system is significantly affected by the virtual machine scheduler. However, the existing virtual machine scheduler have a problem in that the I/O response is reduced in accordance with the scheduling delay becomes longer. In this paper, we introduce the Loan/Redemption mechanism of a virtual machine scheduler in order to improve the responsiveness to I/O events. The proposed scheme gives additional credits for to virtual machines and classifies the task characteristics of each virtual machine by analyzing the credit consumption pattern. When an I/O event arrives, the scheduling priority of a virtual machine is temporally increased based on the analysis. The evaluation based on the implementation shows that the proposed scheme improves the I/O response 60% and bandwidth of virtual machines 62% compared to those of the existing virtual machine scheduler.

A Study On The Design of Patient Monitoring System Using RFID/WSN Based on Complex Event Processing (복합 이벤트 처리기반 RFID/WSN을 이용한 환자모니터링 시스템 설계에 관한 연구)

  • Park, Yong-Min;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.10
    • /
    • pp.1-7
    • /
    • 2009
  • Nowadays there are many studies and there's huge development about RFID and WSN which have great developmental potential to many kinds of applications. In particular, the healthcare field is expected to could be securing international competitive power in u-Healthcare and combined medical treatment industry and service. More and more real time application apply RFID and WSN technology to identify, data collect and locate objects. Wide deployment of RFID and WSN will generate an unprecedented volume of primitive data in a short time. Duplication and redundancy of primitive data will affect real time performance of application. Thus, emerging applications must filter primitive data and correlate them for complex pattern detection and transform them to events that provide meaningful, actionable information to end application. In this paper, we design a complex event processing system. This system will process RFID and WSN primitive data and event and perform data transformation. Integrate RFID and WSN system had applied each now in medical treatment through this study and efficient data transmission and management forecast that is possible.