• Title/Summary/Keyword: Multi-Target Information Management

Search Result 45, Processing Time 0.035 seconds

A Strategy for Multi-target Paths Coverage by Improving Individual Information Sharing

  • Qian, Zhongsheng;Hong, Dafei;Zhao, Chang;Zhu, Jie;Zhu, Zhanggeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5464-5488
    • /
    • 2019
  • The multi-population genetic algorithm in multi-target paths coverage has become a top choice for many test engineers. Also, information sharing strategy can improve the efficiency of multi-population genetic algorithm to generate multi-target test data; however, there is still space for some improvements in several aspects, which will affect the effectiveness of covering the target path set. Therefore, a multi-target paths coverage strategy is proposed by improving multi-population genetic algorithm based on individual information sharing among populations. It primarily contains three aspects. Firstly, the behavior of the sub-population covering corresponding target path is improved, so that it can continue to try to cover other sub-paths after covering the current target path, so as to take full advantage of population resources; Secondly, the populations initialized are prioritized according to the matching process, so that those sub-populations with better path coverage rate are executed firstly. Thirdly, for difficultly-covered paths, the individual chromosome features which can cover the difficultly-covered paths are extracted by utilizing the data generated, so as to screen those individuals who can cover the difficultly-covered paths. In the experiments, several benchmark programs were employed to verify the accuracy of the method from different aspects and also compare with similar methods. The experimental results show that it takes less time to cover target paths by our approach than the similar ones, and achieves more efficient test case generation process. Finally, a plug-in prototype is given to implement the approach proposed.

An Adaptive Multi-Echelon Inventory Control Model for Nonstationary Demand Process

  • Na, Sung-Soo;Jun, Jin;Kim, Chang-Ouk
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.441-445
    • /
    • 2004
  • In this paper, we deal with an inventory model of a multi-stage, serial supply chain system where a single product type and nonstationary customer demand pattern are considered. The retailer and suppliers place their orders according to an echelon-stock based replenishment control policy. We assume that the suppliers can access online information on the demand history and use this information when making their replenishment decisions. Using a reinforcement learning technique, the inventory control parameters are designed to adaptively change as the customer demand pattern is altered, in order to maintain a given target service level. Through a simulation based experiment, we verified that our approach is good for maintaining the target service level.

  • PDF

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

The Framework for the Classification of KM Strategies in Manufacturing Firms Based on Target Costing and IT Infrastructure (원가기획시스템과 정보기술 하부구조를 이용한 제조기업 지식경영 전략 유형 구분의 틀)

  • Choe, Jong-Min
    • The Journal of Information Systems
    • /
    • v.21 no.3
    • /
    • pp.45-70
    • /
    • 2012
  • Based on the usage levels of target costing systems(TCS) and information technology (IT) infrastructure, this study aims to develop a framework useful for classifying four types of knowledge management(KM) strategies in manufacturing firms: process-oriented, product-oriented, mixed and negative. We adopted a multi-methodological approach by mixing both qualitative and quantitative methods. Before developing a framework, through a case study of the H Motor Company in Korea, this paper investigated and showed the functions of TCS in the management of tacit knowledge. The results from the case study indicated that with the use of TCS, a firm can create, transfer, and share diverse kinds of tacit knowledge among employees for the facilitation of process innovation. We also empirically confirmed the four types of KM strategies, and demonstrated the characteristics(i.e., size, total sales, age, and knowledge intensity) of the organizations adopting each strategy.

Implementation and Performance Analysis of Real-time Multi-source Sensor Data Management System Based on Wireless Sensor Network (무선 센서네트워크 기반 실시간 다중소스 센서데이터 관리시스템 구현 및 성능분석)

  • Kang, Moon-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.1003-1011
    • /
    • 2011
  • In this paper, a real-time multi-source sensor data management system based on wireless sensor network is proposed and implemented. The proposed management system is designed to transmit the wireless data to the server in order to monitor and control the multi-source target's status efficiently by analyzing them. The proposed system is implemented to make it possible to control and transmit the wireless sensor data by classifying them, of which data are issued from the clustered sources composed of a number of the remote multiple sensors. In order to evaluate the performance of the proposed system, we measure and analyze both the transmission delay time according to the distance and the data loss rate issued from multiple data sources. From these results, it is verified that the proposed system has a good performance.

A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention (악성코드 감염방지 및 사용자 부정행위 방지를 위한 통합 관리 시스템 구현)

  • Min, So-Yeon;Cho, Eun-Sook;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8908-8914
    • /
    • 2015
  • The Internet continues to grow and develop, but there are going to generate a variety of Internet attacks that exploit it. In the initial Internet environment, the attackers maliciously exploited Internet environments for ostentations and hobbies. but these days many malicious attempts purpose the financial gain so systematic and sophisticated attacks that are associated with various crimes are occurred. The structures, such as viruses and worms were present in the form of one source multi-target before. but recently, APT(Advanced Persistent Threat, intelligent continuous attacks) in the form of multi-source single target is dealing massive damage. The performance evaluation analyzed whether to generate audit data and detect integrity infringement, and false positives for normal traffic, process detecting and blocking functions, and Agent policy capabilities with respect to the application availability.

An Exploratory Study on 3D-based Building Information Management for Multi-User Fire Protection System

  • Kim, Dahee;Cha, Heesung
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1162-1169
    • /
    • 2022
  • As buildings become more and more complicated, the importance of developing and managing facility management information is increasing. In a building fire situation, various information is generated and needed to be quickly shared among participants. However, the current fire response system fails to monitor the relevant information in a real time basis. This study aims to develop a system prototype for fire protection management which can quickly and accurately manage and effectively deliver the pertinent information to the target participants. The research contributes to the efficiency of fire protection endeavors by interpreting both dynamic and static fire information in an appropriate manner.

  • PDF

Data Association and Its Applications to Intelligent Systems: A Review (데이터 연관 문제와 지능시스템에서의 응용: 리뷰)

  • Oh, Song-Hwai
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.3
    • /
    • pp.1-11
    • /
    • 2012
  • Data association plays an important role in intelligent systems. This paper presents the Bayesian formulation of data association and its applications to intelligent systems. We first describe the Bayesian formulation of data association developed for solving multi-target tracking problems in a cluttered environment. Then we review applications of data association in intelligent systems, including surveillance using wireless sensor networks, identity management for air traffic control, camera network localization, and multi-sensor fusion.

The Coordinated Local (R, S) Policy for Managing Inventory in Multi-stage Distribution Systems (다단계 분배시스템에서의 통합된 정기발주정책 수립방안)

  • 박창규
    • Korean Management Science Review
    • /
    • v.19 no.1
    • /
    • pp.107-116
    • /
    • 2002
  • A major challenge to supply chain managers is how to control inventories and costs along the supply chain while maximizing customer service Performance. In the literature, although the optimal management of inventory along the supply chain has received considerable attention during the past decades, the attention has been mainly given to multi-echelon control policies. A prerequisite for applying these policies is full information transparency in the supply chain, which is hard to accomplish in practice because it may require major organizational chanties. In the case that a decentralized control (local (R, S) policy) should be used at each location in multi-stave distribution systems, this paper presents the coordinating approach of determining the best policy which satisfies predetermined target customer service levels and minimizes the mean physical stock along the system.

Development of a Remote Multi-Task Debugger for Qplus-T RTOS (Qplus-T RTOS를 위한 원격 멀티 태스크 디버거의 개발)

  • 이광용;김흥남
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.393-409
    • /
    • 2003
  • In this paper, we present a multi-task debugging environment for Qplus-T embedded-system such as internet information appliances. We will propose the structure and functions of a remote multi-task debugging environment supporting environment effective ross-development. And, we are going enhance the communication architecture between the host and target system to provide more efficient cross-development environment. The remote development toolset called Q+Esto consists to several independent support tools: an interactive shell, a remote debugger, a resource monitor, a target manager and a debug agent. Excepting a debug agent, all these support tools reside on the host systems. Using the remote multi-task debugger on the host, the developer can spawn and debug tasks on the target run-time system. It can also be attached to already-running tasks spawned from the application or from interactive shell. Application code can be viewed as C/C++ source, or as assembly-level code. It incorporates a variety of display windows for source, registers, local/global variables, stack frame, memory, event traces and so on. The target manager implements common functions that are shared by Q+Esto tools, e.g., the host-target communication, object file loading, and management of target-resident host tool´s memory pool and target system´s symbol-table, and so on. These functions are called OPEn C APIs and they greatly improve the extensibility of the Q+Esto Toolset. The Q+Esto target manager is responsible for communicating between host and target system. Also, there exist a counterpart on the target system communicating with the host target manager, which is called debug agent. Debug agent is a daemon task on real-time operating systems in the target system. It gets debugging requests from the host tools including debugger via target manager, interprets the requests, executes them and sends the results to the host.