• Title/Summary/Keyword: Event Management

Search Result 1,534, Processing Time 0.024 seconds

Exploiting Hardware Events to Reduce Energy Consumption of HPC Systems

  • Lee, Yongho;Kwon, Osang;Byeon, Kwangeun;Kim, Yongjun;Hong, Seokin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.8
    • /
    • pp.1-11
    • /
    • 2021
  • This paper proposes a novel mechanism called Event-driven Uncore Frequency Scaler (eUFS) to improve the energy efficiency of the HPC systems. UFS exploits the hardware events such as LAPI (Last-level Cache Accesses Per Instructions) and CPI (Clock Cycles Per Instruction) to dynamically adjusts the uncore frequency. Hardware events are collected at a reference time period, and the target uncore frequency is determined using the collected event and the previous uncore frequency. Experiments with the NPB benchmarks demonstrate that the eUFS reduces the energy consumption by 6% on average for class C and D NPB benchmarks while it only increases the execution time by 2% on average.

Seismic assessment of Nitinol Belleville Elastic Nonlinear (NI-BELL-E-N) structural system

  • Hadad, Alireza Asgari;Shahrooz, Bahram M
    • Steel and Composite Structures
    • /
    • v.43 no.3
    • /
    • pp.375-388
    • /
    • 2022
  • Nibellen structural system is a novel resilient bracing system based on the application of Bellville disks and Nitinol rods. The cyclic behavior of Nibellen assembly was obtained, and the design equations were developed based on the available literature. Seismic performance of the system was then studied analytically. Two groups of buildings with different lateral force resisting systems were designed and studied: one group with the Nibellen system, and the other with the special concentrically braced frame system. Each building group consisted of 5-, 10-, and 15-story buildings. The Design-Base-Event (DBE) and Maximum Considered Event (MCE) were considered as the seismic hazard, and a suite of seven ground motions were scaled accordingly for response history analyses. Finally, the resiliency of the buildings was studied by obtaining the functionality curve of the buildings before and after the seismic event. The construction cost of the 5-story building with Nibellen bracing system increased but the post-earthquake cost decreased significantly. The application of Nibellen system in the 10- and 15-story buildings reduced both the construction and repair costs, considerably. Resiliency of all the buildings was improved when Nibellen system was used as the lateral force resisting system.

YOLOv5 based Anomaly Detection for Subway Safety Management Using Dilated Convolution

  • Nusrat Jahan Tahira;Ju-Ryong Park;Seung-Jin Lim;Jang-Sik Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.2_1
    • /
    • pp.217-223
    • /
    • 2023
  • With the rapid advancement of technologies, need for different research fields where this technology can be used is also increasing. One of the most researched topic in computer vision is object detection, which has widely been implemented in various fields which include healthcare, video surveillance and education. The main goal of object detection is to identify and categorize all the objects in a target environment. Specifically, methods of object detection consist of a variety of significant techniq ues, such as image processing and patterns recognition. Anomaly detection is a part of object detection, anomalies can be found various scenarios for example crowded places such as subway stations. An abnormal event can be assumed as a variation from the conventional scene. Since the abnormal event does not occur frequently, the distribution of normal and abnormal events is thoroughly imbalanced. In terms of public safety, abnormal events should be avoided and therefore immediate action need to be taken. When abnormal events occur in certain places, real time detection is required to prevent and protect the safety of the people. To solve the above problems, we propose a modified YOLOv5 object detection algorithm by implementing dilated convolutional layers which achieved 97% mAP50 compared to other five different models of YOLOv5. In addition to this, we also created a simple mobile application to avail the abnormal event detection on mobile phones.

An Event-Driven Dynamic Monitor for Efficient Service Monitoring (효율적인 서비스 모니터링을 위한 이벤트 주도 동적 모니터)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.12
    • /
    • pp.892-908
    • /
    • 2010
  • Services in SOA are typically perceived as black-box to service consumers, and can be dynamically evolved at runtime, and run on a number of unknown and heterogeneous environments. Because of these characteristics of the services, effective and efficient monitoring of various aspects on services is an essential functionality for autonomous management of service. But the problem with or limitation in conventional or existing approaches is, that they focus on services themselves, ignoring the effects by business processes. Consequently, there is a room for service monitoring which provides more useful information of business level by acquisition of only external monitoring data that depend on specific BPEL engine and middleware. Moreover, there is a strong demand to present effective methods to reduce monitoring overhead which can degrade quality of services. EDA can cope with such limitations in SOA by collecting and analyzing events efficiently. In this paper, we first describe EDA benefits in service monitoring, and classify monitorring target, and present an appropriate monitoring method for each monitoring target. Also to provide the applicability of our approach, an event meta-model is defined, and event processing model and architecture based on the meta-model are proposed. And, with the proposed architecture and method, we implement a prototype of an event-driven dynamic monitoring framework which can collect and process internal and external data at runtime. Finally, we present the result of a case study to demonstrate the effectiveness and applicability of the proposed approach.

IMPLEMENTATION OF A DECISION SUPPORT SYSTEM FOR INTEGRATED RIVER BASIN WATER MANAGEMENT IN KOREA

  • Shim Soon-Do;Shim Kyu-Cheoul
    • Water Engineering Research
    • /
    • v.5 no.4
    • /
    • pp.157-176
    • /
    • 2004
  • This research presents a prototype development and implementation of Decision Support System (DSS) for integrated river basin water management for the flood control. The DSS consists of Relational Database Management System, Hydrologic Data Monitoring System, Spatial Analysis Module, Spatial and Temporal Analysis for Rainfall Event Tool, Flood Forecasting Module, Real-Time Operation of Multi Reservoir System, and Dialog Module with Graphical User Interface and Graphic Display Systems. The developed DSS provides an automated process of alternative evaluation and selection within a flexible, fully integrated, interactive, centered relational database management system in a user-friendly computer environment. The river basin decision-maker for the flood control should expect that she or he could manage the flood events more effectively by fully grasping the hydrologic situation throughout the basin.

  • PDF

Prediction of Hypertension Complications Risk Using Classification Techniques

  • Lee, Wonji;Lee, Junghye;Lee, Hyeseon;Jun, Chi-Hyuck;Park, Il-Su;Kang, Sung-Hong
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.4
    • /
    • pp.449-453
    • /
    • 2014
  • Chronic diseases including hypertension and its complications are major sources causing the national medical expenditures to increase. We aim to predict the risk of hypertension complications for hypertension patients, using the sample national healthcare database established by Korean National Health Insurance Corporation. We apply classification techniques, such as logistic regression, linear discriminant analysis, and classification and regression tree to predict the hypertension complication onset event for each patient. The performance of these three methods is compared in terms of accuracy, sensitivity and specificity. The result shows that these methods seem to perform similarly although the logistic regression performs marginally better than the others.

A Study on the Supply Chain Security and Risk Management Strategies of Global Companies (글로벌 기업의 공급사슬보안 및 위험관리전략에 관한 연구)

  • Yang, Jung-Ho
    • Management & Information Systems Review
    • /
    • v.27
    • /
    • pp.149-172
    • /
    • 2008
  • Since the 9/11 terror attack, the event which caused supply chain disruption, supply chain security has becomes more important than ever before. Furthermore, such company's logistics strategies conflicting supply chain security as increased global sourcing, JIT manufacturing are increasing supply chain vulnerability. It could burden for global companies to strengthen supply chain security because not only it requires additional investment cost but also changes of companiy's global logistics strategy. However, on the other hand, supply chain visibility and resilience can be improved through supply chain security. In addition, it allows companies to stabilize supply chain structure as well as rapid and flexible response to market demand. The key issue is balancing between efficiency and supply chain security. To do this, identifying risk elements under the supply chain and assessing vulnerability of each supply chain components should be performed before developing efficient supply chain security management system without obstructing supply chain efficiency.

  • PDF

Emergency Management on Internet Spread of Social Events

  • Dai, Weihui;Wang, Chunshi;Zhang, Yuan
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.41-53
    • /
    • 2011
  • The rapid development and widespread application of Internet has provided a platform for people to participate and discuss social hotspot events. In the meantime, social events may be spread throughout the Internet more quickly and widely than they did ever before, and possibly lead to serious social problems due to opinion violence or seditious rumour. This paper analyzed the Internet spread of social events, and presented a five-stage model to describe the evolution process of that spread. Furthermore, the improved IBF algorithm was applied to extract a pruned connected graph aiming to find the key nodes and the shortest spread path for the control of that spread. After analyzing the different factors that may cause the netizens' attention, this paper concluded BBS type, the visit quantity and the opinion leader are key factors which affect the Internet spread. Based on those researches, a life-cycle emergency management methodology and the related strategies were proposed for the achievement of healthy spreading environment on Internet.

Performance Management of Communication Networks for Computer Intergrated Manufacturing (컴퓨터 통합 생산을 위한 통신망의 성능 관리)

  • Lee, S.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.11 no.4
    • /
    • pp.126-137
    • /
    • 1994
  • Performance management of computer networks is intended to improve a given network performance in order for more efficient information exchange between subsystems of an integrated large-scale system. Importance of perfomance management is growing as many functions of the large- scale system depend on the quality of communication services provided by the network. The role of performance management is to manipulate the adjustable protocol parameters on line so that the network can adapt itself to a dynamic environment. This can be divided into two subtasks : performance evaluation to find how changes in protocol parameters affect the network performance and decision making to determine the magnitude and direction of parameter adjustment. This paper is the first part of the two papers focusing on conceptual design, development, and evaluation of performance management for token bus networks. This paper specifically deals with the task of performance evaluation which utilizes the principle of perturbation analysis of discrete event dynamic systems. The developed algorithm can estimate the network performance under a perturbed protocol parameter setting from observations of the network operations under a nominal parameter setting.

  • PDF

SIMPLIFIED SIMULATION APPROACH TO MANAGING SCHEDULE-OVERRUN RISKS IN CONSTRUCTION OPERATIONS

  • Wah-Ho CHAN;Ming LU
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.929-934
    • /
    • 2005
  • The complex and dynamic job nature and the ever-changing working environment of construction projects inevitably present uncertainties to construction operations. Identification, evaluation and control of uncertainties constitute main elements of risk management and critical tasks of project management in construction. This paper is focused on application of a simplified discrete-event simulation approach in management of schedule-overrun risks, each being the combination of the occurrence probability of an uncertain interruptive factor and its potential consequence in terms of time delay. A case study observed from a concreting operation in Hong Kong is converted into a simulation model and analyzed with an in-house-developed simulation package for demonstrating how the proposed approach can be implemented to manage multiple schedule-overrun risks on construction projects.

  • PDF