• Title/Summary/Keyword: Real Time Framework

Search Result 688, Processing Time 0.034 seconds

Hazelcast Vs. Ignite: Opportunities for Java Programmers

  • Maxim, Bartkov;Tetiana, Katkova;S., Kruglyk Vladyslav;G., Murtaziev Ernest;V., Kotova Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.406-412
    • /
    • 2022
  • Storing large amounts of data has always been a big problem from the beginning of computing history. Big Data has made huge advancements in improving business processes by finding the customers' needs using prediction models based on web and social media search. The main purpose of big data stream processing frameworks is to allow programmers to directly query the continuous stream without dealing with the lower-level mechanisms. In other words, programmers write the code to process streams using these runtime libraries (also called Stream Processing Engines). This is achieved by taking large volumes of data and analyzing them using Big Data frameworks. Streaming platforms are an emerging technology that deals with continuous streams of data. There are several streaming platforms of Big Data freely available on the Internet. However, selecting the most appropriate one is not easy for programmers. In this paper, we present a detailed description of two of the state-of-the-art and most popular streaming frameworks: Apache Ignite and Hazelcast. In addition, the performance of these frameworks is compared using selected attributes. Different types of databases are used in common to store the data. To process the data in real-time continuously, data streaming technologies are developed. With the development of today's large-scale distributed applications handling tons of data, these databases are not viable. Consequently, Big Data is introduced to store, process, and analyze data at a fast speed and also to deal with big users and data growth day by day.

OHDSI OMOP-CDM Database Security Weakness and Countermeasures (OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안)

  • Lee, Kyung-Hwan;Jang, Seong-Yong
    • Journal of Information Technology Services
    • /
    • v.21 no.4
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.

Dual Attention Based Image Pyramid Network for Object Detection

  • Dong, Xiang;Li, Feng;Bai, Huihui;Zhao, Yao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4439-4455
    • /
    • 2021
  • Compared with two-stage object detection algorithms, one-stage algorithms provide a better trade-off between real-time performance and accuracy. However, these methods treat the intermediate features equally, which lacks the flexibility to emphasize meaningful information for classification and location. Besides, they ignore the interaction of contextual information from different scales, which is important for medium and small objects detection. To tackle these problems, we propose an image pyramid network based on dual attention mechanism (DAIPNet), which builds an image pyramid to enrich the spatial information while emphasizing multi-scale informative features based on dual attention mechanisms for one-stage object detection. Our framework utilizes a pre-trained backbone as standard detection network, where the designed image pyramid network (IPN) is used as auxiliary network to provide complementary information. Here, the dual attention mechanism is composed of the adaptive feature fusion module (AFFM) and the progressive attention fusion module (PAFM). AFFM is designed to automatically pay attention to the feature maps with different importance from the backbone and auxiliary network, while PAFM is utilized to adaptively learn the channel attentive information in the context transfer process. Furthermore, in the IPN, we build an image pyramid to extract scale-wise features from downsampled images of different scales, where the features are further fused at different states to enrich scale-wise information and learn more comprehensive feature representations. Experimental results are shown on MS COCO dataset. Our proposed detector with a 300 × 300 input achieves superior performance of 32.6% mAP on the MS COCO test-dev compared with state-of-the-art methods.

Unsupervised one-class classification for condition assessment of bridge cables using Bayesian factor analysis

  • Wang, Xiaoyou;Li, Lingfang;Tian, Wei;Du, Yao;Hou, Rongrong;Xia, Yong
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.41-51
    • /
    • 2022
  • Cables are critical components of cable-stayed bridges. A structural health monitoring system provides real-time cable tension recording for cable health monitoring. However, the measurement data involve multiple sources of variability, i.e., varying environmental and operational factors, which increase the complexity of cable condition monitoring. In this study, a one-class classification method is developed for cable condition assessment using Bayesian factor analysis (FA). The single-peaked vehicle-induced cable tension is assumed to be relevant to vehicle positions and weights. The Bayesian FA is adopted to establish the correlation model between cable tensions and vehicles. Vehicle weights are assumed to be latent variables and the influences of different transverse positions are quantified by coefficient parameters. The Bayesian theorem is employed to estimate the parameters and variables automatically, and the damage index is defined on the basis of the well-trained model. The proposed method is applied to one cable-stayed bridge for cable damage detection. Significant deviations of the damage indices of Cable SJS11 were observed, indicating a damaged condition in 2011. This study develops a novel method to evaluate the health condition of individual cable using the FA in the Bayesian framework. Only vehicle-induced cable tensions are used and there is no need to monitor the vehicles. The entire process, including the data pre-processing, model training and damage index calculation of one cable, takes only 35 s, which is highly efficient.

A Design of the Social Disasters Safety Platform based on the Structured and Unstructured Data (정형/비정형 데이터 기반 사회재난 안전 플랫폼 설계)

  • Lee, Chang Yeol;Park, Gil Joo;Kim, Junggon;Kim, Taehwan
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.609-621
    • /
    • 2022
  • Purpose: Natural Disaster has well formed framework more than social disaster, because natural disaster is controlled by one department, such as MOIS, but social disaster is distributed. This study is on the design of the integrated service platform for the social diaster data. and then, apply to the local governments. Method: Firstly, we design DB templates for the incident cases considering the incident investigation reports. For the risk management, life-damage oriented social disaster risk assessment is defined. In case of the real-time incident data from NDMS, AI system provides the prediction information in the life damage and the cause of the incident. Result: We design the structured and unstructured incident data management system, and design the integrated social disaster and safety incident management system. Conclusion: The integrated social disaster and safety incident management system may be used in the local governments

Efficient Graph Construction and User Movement Path for Fast Inspection of Virus and Stable Management System

  • Kim, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.135-142
    • /
    • 2022
  • In this paper, we propose a graph-based user route control for rapidly conducting virus inspections in emergency situations (eg, COVID-19) and a framework that can simulate this on a city map. A* and navigation mesh data structures, which are widely used pathfinding algorithms in virtual environments, are effective when applied to CS(Computer science) problems that control Agents in virtual environments because they guide only a fixed static movement path. However, it is not enough to solve the problem by applying it to the real COVID-19 environment. In particular, there are many situations to consider, such as the actual road traffic situation, the size of the hospital, the number of patients moved, and the patient processing time, rather than using only a short distance to receive a fast virus inspection.

Towards a Machine Learning Approach for Monitoring Urban Morphology - Focused on a Boston Case Study - (도시 형태 변화 모니터링을 위한 머신러닝 기법의 가능성 - 보스톤 사례연구를 중심으로 -)

  • Hwang, Jie-Eun
    • Design Convergence Study
    • /
    • v.16 no.5
    • /
    • pp.125-140
    • /
    • 2017
  • This study explores potential capability of a machine learning approach for monitoring urban morphology based on an evident case study. The case study conveys year 2006 investigations on interpreting urban morphology of Boston Main Streets by applying a machine learning approach. From the lesson of the precedent study, in 2016, another field research and interview was conducted to compare changes in urban situation, data commons culture, and technology innovation during the decade. This paper describes open possibilities to advance urban monitoring for morphological changes. Most of all, a multi-participatory data platform enables managing urban data system in real time. Second, collaboration with machines with artificial intelligence can intervene the framework of the urban management system as well as transform it through new demands of innovative industries. Recently, urban regeneration became a dominant urban planning strategy in Korean, therefore, urban monitoring is on demand. It is timely important to correspond to in-situ problems based on empirical research.

Neurosurgical Management of Cerebrospinal Tumors in the Era of Artificial Intelligence : A Scoping Review

  • Kuchalambal Agadi;Asimina Dominari;Sameer Saleem Tebha;Asma Mohammadi;Samina Zahid
    • Journal of Korean Neurosurgical Society
    • /
    • v.66 no.6
    • /
    • pp.632-641
    • /
    • 2023
  • Central nervous system tumors are identified as tumors of the brain and spinal cord. The associated morbidity and mortality of cerebrospinal tumors are disproportionately high compared to other malignancies. While minimally invasive techniques have initiated a revolution in neurosurgery, artificial intelligence (AI) is expediting it. Our study aims to analyze AI's role in the neurosurgical management of cerebrospinal tumors. We conducted a scoping review using the Arksey and O'Malley framework. Upon screening, data extraction and analysis were focused on exploring all potential implications of AI, classification of these implications in the management of cerebrospinal tumors. AI has enhanced the precision of diagnosis of these tumors, enables surgeons to excise the tumor margins completely, thereby reducing the risk of recurrence, and helps to make a more accurate prediction of the patient's prognosis than the conventional methods. AI also offers real-time training to neurosurgeons using virtual and 3D simulation, thereby increasing their confidence and skills during procedures. In addition, robotics is integrated into neurosurgery and identified to increase patient outcomes by making surgery less invasive. AI, including machine learning, is rigorously considered for its applications in the neurosurgical management of cerebrospinal tumors. This field requires further research focused on areas clinically essential in improving the outcome that is also economically feasible for clinical use. The authors suggest that data analysts and neurosurgeons collaborate to explore the full potential of AI.

Empirical Examination of Determinants Affecting Safety Incidents in Building Construction (건축공사 안전사고에 대한 현장 요인별 영향력 분석)

  • Hur, Youn-Kyoung;Lee, Seung-Woo;Yoo, Wi-Sung;Song, Tae-Geun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.5
    • /
    • pp.583-593
    • /
    • 2023
  • For a holistic and precise assessment of safety benchmarks within a construction venture, it's paramount to delineate between the intrinsic features of the construction and its real-time, on-site performance metrics. In this study, we delved into genuine accident instances to discern the interplay between these construction attributes and on-ground performance determinants in relation to safety mishaps, employing the binomial logit analytical framework. Our scrutiny underscored that construction expenditure profoundly modulates the likelihood of fatal occurrences. Notably, variables pertinent to on-site safety protocols wielded considerable influence over both fatal mishaps and accidents implicating multiple personnel. These revelations intimate that while ascertaining the safety quotient of a construction initiative, a mere classification and recalibration based on fiscal dimensions can elucidate much. Yet, a comprehensive safety appraisal necessitates transcending quantitative indices, such as frequency of mishaps or casualty rates, to encapsulate the multifaceted interventions and strategies adopted at the construction locale.

IACS UR E26 - Analysis of the Cyber Resilience of Ships (국제선급협회 공통 규칙 - 선박의 사이버 복원력에 대한 기술적 분석)

  • Nam-seon Kang;Gum-jun Son;Rae-Chon Park;Chang-sik Lee;Seong-sang Yu
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.27-36
    • /
    • 2024
  • In this paper, we analyze the unified requirements of international association of classification societies - cyber resilience of ships, ahead of implementation of the agreement on July 1, 2024, and respond to ship cyber security and resilience programs based on 5 requirements, 17 details, and documents that must be submitted or maintained according to the ship's cyber resilience,. Measures include document management such as classification certification documents and design documents, configuration of a network with enhanced security, establishment of processes for accident response, configuration management using software tools, integrated network management, malware protection, and detection of ship network security threats with security management solutions. proposed a technology capable of real-time response.