• Title/Summary/Keyword: Data Transactions

Search Result 8,803, Processing Time 0.027 seconds

A Study on a Reliability Prognosis based on Censored Failure Data (정시중단 고장자료를 이용한 신뢰성예측 연구)

  • Baek, Jae-Jin;Rhie, Kwang-Won;Meyna, Arno
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.18 no.1
    • /
    • pp.31-36
    • /
    • 2010
  • Collecting all failures during life cycle of vehicle is not easy way because its life cycle is normally over 10 years. Warranty period can help gathering failures data because most customers try to repair its failures during warranty period even though small failures. This warranty data, which means failures during warranty period, can be a good resource to predict initial reliability and permanence reliability. However uncertainty regarding reliability prediction remains because this data is censored. University of Wuppertal and major auto supplier developed the reliability prognosis model considering censored data and this model introduce to predict reliability estimate further "failure candidate". This paper predicts reliability of telecommunications system in vehicle using the model and describes data structure for reliability prediction.

A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code

  • Mugisha, Emmy;Zhang, Gongxuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.436-453
    • /
    • 2018
  • Storage cloud scheme, pushing data to the storage cloud poses much attention regarding data confidentiality. With encryption concept, data accessibility is limited because of encrypted data. To secure storage system with high access power is complicated due to dispersed storage environment. In this paper, we propose a hardware-based security scheme such that a secure dispersed storage system using erasure code is articulated. We designed a hardware-based security scheme with data encoding operations and migration capabilities. Using TPM (Trusted Platform Module), the data integrity and security is evaluated and achieved.

Enhanced Locality Sensitive Clustering in High Dimensional Space

  • Chen, Gang;Gao, Hao-Lin;Li, Bi-Cheng;Hu, Guo-En
    • Transactions on Electrical and Electronic Materials
    • /
    • v.15 no.3
    • /
    • pp.125-129
    • /
    • 2014
  • A dataset can be clustered by merging the bucket indices that come from the random projection of locality sensitive hashing functions. It should be noted that for this to work the merging interval must be calculated first. To improve the feasibility of large scale data clustering in high dimensional space we propose an enhanced Locality Sensitive Hashing Clustering Method. Firstly, multiple hashing functions are generated. Secondly, data points are projected to bucket indices. Thirdly, bucket indices are clustered to get class labels. Experimental results showed that on synthetic datasets this method achieves high accuracy at much improved cluster speeds. These attributes make it well suited to clustering data in high dimensional space.

Roundness Modelling by Fractal Interpolation (프랙탈 보간에 의한 진원도 모델링)

  • Yoon, Moon-Chul;Kim, Byung-Tak;Chin, Do-Hun
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.15 no.3
    • /
    • pp.67-72
    • /
    • 2006
  • There are many modelling methods using theoretical and experimental data. Recently, fractal interpolation methods have been widely used to estimate and analyze various data. Due to the chaotic nature of dynamic roundness profile data in roundness some desirable method must be used for the analysis which is natural to time series data. Fractal analysis used in this paper is within the scope of the fractal interpolation and fractal dimension. Also, two methods for computing the fractal dimension has been introduced which can obtain the dimension of typical dynamic roundness profile data according to the number of data points in which the fixed data are generally lower than 200 data points. This fractal analysis result shows a possible prediction of roundness profile that has some different roundness profile in round shape operation.

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

Design of Multi-Sensor Data Fusion Filter for a Flight Test System (비행시험시스템용 다중센서 자료융합필터 설계)

  • Lee, Yong-Jae;Lee, Ja-Sung
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.9
    • /
    • pp.414-419
    • /
    • 2006
  • This paper presents a design of a multi-sensor data fusion filter for a Flight Test System. The multi-sensor data consist of positional information of the target from radars and a telemetry system. The data fusion filter has a structure of a federated Kalman filter and is based on the Singer dynamic target model. It consists of dedicated local filter for each sensor, generally operating in parallel, plus a master fusion filter. A fault detection and correction algorithms are included in the local filter for treating bad measurements and sensor faults. The data fusion is carried out in the fusion filter by using maximum likelihood estimation algorithm. The performance of the designed fusion filter is verified by using both simulation data and real data.

Recent Developments in Law of International Electronic Information Transactions (국제전자정보거래(國際電子情報去來)에 관한 입법동향(立法動向))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.23
    • /
    • pp.155-219
    • /
    • 2004
  • This paper focuses on two recent legislative developments in electronic commerce: the "Uniform Computer Information Transactions Act" ("UCITA") of USA and the "preliminary draft convention on the use of data message in [international trade] [the context of international contracts]" ("preliminary draft Convention") of UNCITRAL. UCITA provides rules contracts for computer information transactions. UCITA supplies modified contract formation rules adapted to permit and to facilitate electronic contracting. UCITA also adjusts commonly recognized warranties as appropriate for computer information transactions; for example, to recognize the international context in connection with protection against infringement and misappropriation, and First Amendment considerations involved with informational content. Furthermore, UCITA adapts traditional rules as to what is acceptable performance to the context of computer information transactions, including providing rules for the protection of the parties concerning the electronic regulation of performance to clarify that the appropriate general rule is one of material breach with respect to cancellation (rather than so-called perfect tender). UCITA also supplies guidance in the case of certain specialized types of contracts, e.g., access contracts and for termination of contracts. While for the most part carrying over the familiar rules of Article 2 concerning breach when appropriate in the context of the tangible medium on which the information is fixed, but also adapting common law rules and rules from Article 2 on waiver, cure, assurance and anticipatory breach to the context of computer information transactions, UCITA provides a remedy structure somewhat modeled on that of Article 2 but adapted in significant respects to the different context of a computer information transaction. For example, UCITA contains very important limitations on the generally recognized common law right of self-help as applicable in the electronic context. The UNCITRAL's preliminary draft Convention applies to the use of data messages in connection with an existing or contemplated contract between parties whose places of business are in different States. Nothing in the Convention affects the application of any rule of law that may require the parties to disclose their identities, places of business or other information, or relieves a party from the legal consequences of making inaccurate or false statements in that regard. Likewise, nothing in the Convention requires a contract or any other communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract to be made or evidenced in any particular form. Under the Convention, a communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract, including an offer and the acceptance of an offer, is conveyed by means of data messages. Also, the Convention provides for use of automated information systems for contract formation: a contract formed by the interaction of an automated information system and a person, or by the interaction of automated information systems, shall not be denied on the sole ground that no person reviewed each of the individual actions carried out by such systems or the resulting agreement. Further, the Convention provides that, unless otherwise agreed by the parties, a contract concluded by a person that accesses an automated information system of another party has no legal effect and is not enforceable if the person made an error in a data message and (a) the automated information system did not provide the person with an opportunity to prevent or correct the error; (b) the person notifies the other party of the error as soon as practicable when the person making the error learns of it and indicates that he or she made an error in the data message; (c) The person takes reasonable steps, including steps that conform to the other party's instructions, to return the goods or services received, if any, as a result of the error or, if instructed to do so, to destroy such goods or services.

  • PDF

Resolving Cycle Extension Overhead Multimedia Data Retrieval

  • Won, Youjip;Cho, Kyungsun
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.4 no.2
    • /
    • pp.164-168
    • /
    • 2002
  • In this article, we present the novel approach of avoiding temporal insufficiency of data blocks, jitter, which occurs due to the commencement of new session. We propose to make the sufficient amount of data blocks available on memory such that the ongoing session can survive the cycle extension. This technique is called ″pre-buffering″. We examine two different approaches in pre-buffering: (i) loads all required data blocks prior to starting playback and (ii) incrementally accumulates the data blocks in each cycle. We develop an elaborate model to determine the appropriate amount of data blocks necessary to survive the cycle extension and to compute startup latency involved in loading these data blocks. The simulation result shows that limiting the disk bandwidth utilization to 60% can greatly improve the startup latency as well as the buffer requirement for individual streams.

A Large-scale Multi-track Mobile Data Collection Mechanism for Wireless Sensor Networks

  • Zheng, Guoqiang;Fu, Lei;Li, Jishun;Li, Ming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.857-872
    • /
    • 2014
  • Recent researches reveal that great benefit can be achieved for data gathering in wireless sensor networks (WSNs) by employing mobile data collectors. In order to balance the energy consumption at sensor nodes and prolong the network lifetime, a multi-track large-scale mobile data collection mechanism (MTDCM) is proposed in this paper. MTDCM is composed of two phases: the Energy-balance Phase and the Data Collection Phase. In this mechanism, the energy-balance trajectories, the sleep-wakeup strategy and the data collection algorithm are determined. Theoretical analysis and performance simulations indicate that MTDCM is an energy efficient mechanism. It has prominent features on balancing the energy consumption and prolonging the network lifetime.

The Exchange of Feature Data Among CAD Systems Using XML (CAD 시스템간의 형상정보 교환을 위한 XML 이용에 관한 연구)

  • 박승현;최의성;정태형
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.13 no.3
    • /
    • pp.30-36
    • /
    • 2004
  • The exchange of model design data among heterogeneous CAD systems is very difficult because each CAD system has different data structures suitable for its own functions. STEP represents product information in a common computer-interpretable form that is required to remain complete and consistent when the product information is needed to be exchanged among different computer systems. However, STEP has complex architecture to represent point, line, curve and vectors of element. Moreover it can't represent geometry data of feature based models. In this study, a structure of XML document that represents geometry data of feature based models as neutral format has been developed. To use the developed XML document, a converter also has been developed to exchange modules so that it can exchange feature based data models among heterogeneous CAD systems. Developed XML document and Converter have been applied to commercial CAD systems.