• Title/Summary/Keyword: Distributed Knowledge

Search Result 684, Processing Time 0.033 seconds

Design and Implementation of a Large-Scale Spatial Reasoner Using MapReduce Framework (맵리듀스 프레임워크를 이용한 대용량 공간 추론기의 설계 및 구현)

  • Nam, Sang Ha;Kim, In Cheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.10
    • /
    • pp.397-406
    • /
    • 2014
  • In order to answer the questions successfully on behalf of the human in DeepQA environments such as Jeopardy! of the American quiz show, the computer is required to have the capability of fast temporal and spatial reasoning on a large-scale commonsense knowledge base. In this paper, we present a scalable spatial reasoning algorithm for deriving efficiently new directional and topological relations using the MapReduce framework, one of well-known parallel distributed computing environments. The proposed reasoning algorithm assumes as input a large-scale spatial knowledge base including CSD-9 directional relations and RCC-8 topological relations. To infer new directional and topological relations from the given spatial knowledge base, it performs the cross-consistency checks as well as the path-consistency checks on the knowledge base. To maximize the parallelism of reasoning computations according to the principle of the MapReduce framework, we design the algorithm to partition effectively the large knowledge base into smaller ones and distribute them over multiple computing nodes at the map phase. And then, at the reduce phase, the algorithm infers the new knowledge from distributed spatial knowledge bases. Through experiments performed on the sample knowledge base with the MapReduce-based implementation of our algorithm, we proved the high performance of our large-scale spatial reasoner.

Knowledge Management with IS/IT Practice in Organizations: A Multilevel Perspective

  • Tae Hun Kim
    • Asia pacific journal of information systems
    • /
    • v.32 no.1
    • /
    • pp.151-167
    • /
    • 2022
  • This paper is motivated by social influence theory implying the multilevel nature of knowledge management (KM) in an organization. Organizational knowledge is generated and distributed by individuals from different groups across organizational boundaries. Its transfers are supported by IS/IT practice, i.e., the individual and collective use of the technology available in the organization. I propose a multilevel perspective to explain how IS/IT practice supports multilevel KM capabilities to manage organizational knowledge successfully and how the effectiveness of multilevel KM capabilities expands into the improvement of multilevel task-related organizational performance. The multilevel KM theory extends the knowledge-based view of the firm by describing the dynamic process through which strategic values of knowledge are generated by IS/IT practice across the organizational levels. This paper also discusses multilevel insights on the strategic value of organizational learning based on the social context of organizations.

A Design of Distributed Programing Tool in support of Programming Transparency (프로그래밍 투명성을 지원하는 분산 프로그래밍 도구의 설계)

  • 이상윤;김승호
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.259-268
    • /
    • 2004
  • According to the increasing demand of application software that must be applied to the distributed computing environment, the various tools are proposed to write distributed softwares. But, if using these tools, programmers have to know the usage of each tool requisite for writing distributed softwares. If programmers can write distributed software without additional knowledge, they can get better concentration of the functions of software itself to develop, because it reduces burden for distributed programming. In this paper. we introduce new distributed programming tool, named TORB(Transparent Object Request Broker). With TORB, thanks to programming transparency that is supported by TORB, we can write the distributed software with java more easily. After postprocessing, this software can run in the distributed processing environment that is supported by TORB.

Design and Implementation of a Distributed Data Mining Framework (분산된 데이터마이닝을 위한 프레임워크의 설계 및 구현)

  • Kadel, Prakash;Choi, Ho-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06c
    • /
    • pp.336-340
    • /
    • 2007
  • We envisage that grid computing environments allow us to implement distributed data mining services, that is, those applications which analyze large sets of geographically distributed databases and information using the computational power and resources of a grid environment. This paper describes an experimental framework towards such a distributed data mining approach, including design considerations and a prototype implementation. Based on the "Knowledge Grid" architecture suggested by Cannataro et al., we identify four major components - user node, broker node, data node, and computation node - and define their individual roles. For implementing the prototype, we have investigated methods for utilizing distributed resources within a grid computing environment, e.g., communication and coordination among the various resources available.

  • PDF

The Design of an Election Protocol based on Mobile Ad-hoc Network Environment

  • Park, Sung-Hoon;Kim, Yeong-Mok;Yoo, Su-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.8
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper, we propose an election protocol based on mobile ad-hoc network. In distributed systems, a group of computer should continue to do cooperation in order to finish some jobs. In such a system, an election protocol is especially practical and important elements to provide processes in a group with a consistent common knowledge about the membership of the group. Whenever a membership change occurs, processes should agree on which of them should do to accomplish an unfinished job or begins a new job. The problem of electing a leader is very same with the agreeing common predicate in a distributed system such as the consensus problem. Based on the termination detection protocol that is traditional one in asynchronous distributed systems, we present the new election protocol in distributed systems that are based on MANET, i.e. mobile ad hoc network.

An Analysis of the Relationships Among Financial Risk Components (가계 재무위험 구성요소들의 관계분석)

  • Jeong Woonyoung;Kim Kyungia
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.10 s.200
    • /
    • pp.11-22
    • /
    • 2004
  • The purpose of this study was to examine the structure of financial risk components of households. The financial risk of households was assumed to be composed of risk knowledge, risk attitude and risk management behavior. For this study, a questionnaire was developed and distributed to 700 households in Seoul and Kwangju, and there were 495 responses with usable data. The findings showed that income stability had a positive relationship with the level of risk knowledge and risk attitude. Income stability, household debt, age of the youngest child and risk knowledge were found to have direct effects on risky vs. non-risky asset ratio. Income stability, savings, age of the youngest child and risk knowledge also had significant effects on the number of risky assets owned by households. Risk knowledge was the most important determinant of risk management behavior.

Knowledge-Based Control via the Internet

  • Tang, Kok-Zuea;Goh, Han-Leong;Tan, Kok-Kiong;Lee, Tong-Heng
    • International Journal of Control, Automation, and Systems
    • /
    • v.2 no.2
    • /
    • pp.207-219
    • /
    • 2004
  • This paper presents the development of a knowledge-based control system operating via the Internet. With the synergy provided by the Internet, the central expert controller with its knowledge-base has the potential to serve a multitude of front-end clients located anywhere in the world provided they have Internet access. In this way, the operational span of the knowledge-based control system can be expanded to virtually anyplace within the reach of the Internet. This configuration has positive implications in improving the efficiency of distributed operations, thereby enabling plantwide optimization and costs savings. Datasocket technology is adopted to facilitate a more efficient data exchange between the knowledge-based central server and the front-end clients. A specific application in the remote monitoring and fault diagnosis of machines using the proposed control configuration is presented in the paper.

The HCARD Model using an Agent for Knowledge Discovery

  • Gerardo Bobby D.;Lee Jae-Wan;Joo Su-Chong
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.53-58
    • /
    • 2005
  • In this study, we will employ a multi-agent for the search and extraction of data in a distributed environment. We will use an Integrator Agent in the proposed model on the Hierarchical Clustering and Association Rule Discovery(HCARD). The HCARD will address the inadequacy of other data mining tools in processing performance and efficiency when use for knowledge discovery. The Integrator Agent was developed based on CORBA architecture for search and extraction of data from heterogeneous servers in the distributed environment. Our experiment shows that the HCARD generated essential association rules which can be practically explained for decision making purposes. Shorter processing time had been noted in computing for clusters using the HCARD and implying ideal processing period than computing the rules without HCARD.

  • PDF

Biometric Certificate on Secure Group Communication

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF