• Title/Summary/Keyword: Action Information Management Method

Search Result 102, Processing Time 0.027 seconds

Fault detection using heartbeat signal in the real-time distributed systems (실시간 분산 시스템에서 heartbeat 시그널을 이용한 장애 검출)

  • Moon, Wonsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.39-44
    • /
    • 2018
  • Communication in real-time distributed system should have high reliability. To develop group communication Protocol with high reliability, potential fault should be known and when fault occurs, it should be detected and a necessary action should be taken. Existing detection method by Ack and Time-out is not proper for real time system due to load to Ack which is not received. Therefore, group communication messages from real-time distributed processing systems should be communicated to all receiving processors or ignored by the message itself. This paper can make be sure of transmission of reliable message and deadline by suggesting and experimenting fault detection technique applicable in the real time distributed system based on ring, and analyzing its results. The experiment showed that the shorter the cycle of the heartbeat signal, the shorter the time to propagate the fault detection, which is the time for other nodes to detect the failure of the node.

Active Rule Language for XML Document Management (XML 문서 관리를 위한 능동 규칙 언어)

  • Hwang, Jeong-Hee;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.33-44
    • /
    • 2003
  • XML is the standard for storing and exchanging information in the Web. As the applications of XML become more widespread, the worts on rule-based technology are rapidly going on to support reactive functionality on the XML documents and the XML repositories. Active rules consist of event-condition-action, which automatically perform actions in response to status change of database. Therefore the feature of active rule satisfies the new needs in XML setting. In this paper, we propose not only a XML based active rule language to manage XML document automatically, but also an active rule analysis method to guarantee rule termination. Finally, we demonstrate some examples of active rule defined by the proposed rule language, and also verify the efficiency of our analysis method by comparing with another method.

A Study on Classification System of Urban Facilities Management Service Model in u-City (u-City 도시시설물관리 서비스모델 분류체계 연구)

  • Kim, Tae-Hoon;Nam, Sang-Kwan;Choi, Hyun-Sang
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.4
    • /
    • pp.81-86
    • /
    • 2009
  • This research is a part of the Intelligent Urban Facility Management project of the Korean Land Spatialization Group (KGSL). First, this study started from the investigation of existing u-City service model in order to drive essential components and considerations for the urban facilities management system. Considering the driven conclusions, this study finally proposed the new classification system of urban facilities management service model and the adequate application method in u-City.

  • PDF

A study of descriptive forms of catalogue and searching method for dissertations (학위논문의 목록기술형식 및 검색방법 고찰)

  • 조호일
    • Journal of Korean Library and Information Science Society
    • /
    • v.12
    • /
    • pp.133-160
    • /
    • 1985
  • In college or university libraries, the data of dissertations is one of the important academic information data. But traditional cataloging rules of dissertations and the method of operation is not only didn't unify but also fit to actual circumstances of library. This reason make librarians waste of time and the situation about piling up of unprocessed data don't make library services properly. In this papers, to analyze the above mentioned problems, I have investigated with questionaries about actual examples of construction methods of call number and item describing form of dissertations which is being used now in every college library in Korea. With the replied 61 questionaries which was compared with and investigated to merits and faults about library itself, I have showed revision ways. The characteristics of the revision ways are the followings. 1) Deleted informal and unmeaning descriptions and simplified describing. 2) Recommended to operating one or two kinds describing items which are only necessary. 3) Made call number specifically and then it make us easy to identify data and simultaneously call number can do its original action. 4) shelving range of data is made to colleges, years, departments, majors but in same departments, author's name is recommended by Korean alphabetical ordering. Besides, for proper and systematic management and operating of data. It must be necessary to recommend that reading systems of closed shelves type, incoming and outgoing and shelving by fulltime exclusive charged librarian, separate management of items and data are recommended.

  • PDF

Case Analysis for the Development of Smart Factory ISP Indicators

  • Heon-Wook Lim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.3
    • /
    • pp.321-326
    • /
    • 2023
  • The purpose of this study is to create and present a formalized module of ISP (Information Strategy Plan), a smart factory consulting method that is helpful to companies or consultants who will build smart factories. Order of study is First, the theoretical research direction is established through the investigation of related papers. Second, ISP policy research practices are compared to derive practical implementation methods. Third, in order to derive a standardized module method related to the final smart factory ISP, related cases of the government and individuals are compared. As a result of previous research, ISP (Information Strategy Planning), a consulting methodology, is similar to Deming's PDCA, and is regarded as Plan (environment and current status analysis), Do (establishment of future model goals), Check (establishment of implementation plan), and Act (follow-up management). As a result of the study, we obtained the following results. The first step is to analyze the current status and identify the purpose of introduction and problems in plant operation. In the second step, establish a consulting plan and derive a proposal description, strategic task, and master plan. Step 3 establishes detailed action plans, evaluates consulting outputs and consulting, and reports performance. Step 4 is established as follow-up management consulting. The limitation of the study is that although related data were compared to develop the consulting methodology into a standardized module, FGI analysis through experts or Delphi survey were not conducted, so there is a limit to the reliability of the mapping results.

Web Interface Agent based on Learning using Information Extraction (정보추출을 이용한 학습기반의 웹 인터페이스 에이전트)

  • 이말례;배금표
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.5-22
    • /
    • 2002
  • Users usually search for the required information via search engines which contain locations of the information. However. as the amount of data gets large, the result of the search is often not the information that users actually want. In this paper a web guide is proposed in order to resolve this problem. The web guide uses case-based learning method which stores and utilizes cases based on the keywords of user's action and agent's visit. The proposed agent system learns the user's visiting actions following the input of the data to be searched, and then helps rapid searches of the data wanted.

LSTM(Long Short-Term Memory)-Based Abnormal Behavior Recognition Using AlphaPose (AlphaPose를 활용한 LSTM(Long Short-Term Memory) 기반 이상행동인식)

  • Bae, Hyun-Jae;Jang, Gyu-Jin;Kim, Young-Hun;Kim, Jin-Pyung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.5
    • /
    • pp.187-194
    • /
    • 2021
  • A person's behavioral recognition is the recognition of what a person does according to joint movements. To this end, we utilize computer vision tasks that are utilized in image processing. Human behavior recognition is a safety accident response service that combines deep learning and CCTV, and can be applied within the safety management site. Existing studies are relatively lacking in behavioral recognition studies through human joint keypoint extraction by utilizing deep learning. There were also problems that were difficult to manage workers continuously and systematically at safety management sites. In this paper, to address these problems, we propose a method to recognize risk behavior using only joint keypoints and joint motion information. AlphaPose, one of the pose estimation methods, was used to extract joint keypoints in the body part. The extracted joint keypoints were sequentially entered into the Long Short-Term Memory (LSTM) model to be learned with continuous data. After checking the behavioral recognition accuracy, it was confirmed that the accuracy of the "Lying Down" behavioral recognition results was high.

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.

Using a Multi-Faced Technique SPFACS Video Object Design Analysis of The AAM Algorithm Applies Smile Detection (다면기법 SPFACS 영상객체를 이용한 AAM 알고리즘 적용 미소검출 설계 분석)

  • Choi, Byungkwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.99-112
    • /
    • 2015
  • Digital imaging technology has advanced beyond the limits of the multimedia industry IT convergence, and to develop a complex industry, particularly in the field of object recognition, face smart-phones associated with various Application technology are being actively researched. Recently, face recognition technology is evolving into an intelligent object recognition through image recognition technology, detection technology, the detection object recognition through image recognition processing techniques applied technology is applied to the IP camera through the 3D image object recognition technology Face Recognition been actively studied. In this paper, we first look at the essential human factor, technical factors and trends about the technology of the human object recognition based SPFACS(Smile Progress Facial Action Coding System)study measures the smile detection technology recognizes multi-faceted object recognition. Study Method: 1)Human cognitive skills necessary to analyze the 3D object imaging system was designed. 2)3D object recognition, face detection parameter identification and optimal measurement method using the AAM algorithm inside the proposals and 3)Face recognition objects (Face recognition Technology) to apply the result to the recognition of the person's teeth area detecting expression recognition demonstrated by the effect of extracting the feature points.

A Cache Consistency Algorithm for Client Caching Data Management Systems (클라이언트 캐슁 데이터 관리 시스템을 위한 캐쉬 일관성 알고리즘)

  • Kim Chi-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.1043-1046
    • /
    • 2006
  • Cached data management of clients is required to guarantee the correctness of client's applications. There are two categories of cache consistency algorithms : detection-based and avoidance-based cache consistency algorithm. Detection?.based schemes allow stale data access and then check the validity of any cached data before they ran be allowed to commit. In contrast, under avoidance-based algorithms, transactions never have the opportunity to access stale data. In this paper, we propose a new avoidance-based cache consistency algorithm make use of version. The proposed method maintains the two versions at clients and servers, so it has no callback message and it can be reduced abort ratio of transactions compare with the single-versioned algorithms. In addition to, the proposed method can be decreased cache miss using by mixed invalidation and propagation for remote update action.

  • PDF