• 제목/요약/키워드: Rule Server

검색결과 66건 처리시간 0.024초

Web Server Fault Diagnoisi and Recovery Mechanism Using INBANCA (INBANCA기법을 이용한 웹 서버 장애 진단 및 복구기법)

  • Yun, Jung-Mee;Ahn, Seong-Jin;Chung, Jin-Wook
    • The Transactions of the Korea Information Processing Society
    • /
    • 제7권8호
    • /
    • pp.2497-2504
    • /
    • 2000
  • This paper is aimed at defining items of fault, and then constructing rules of fault diagnosis and recovery using INBANCA technology for the purpose of managing the weh server. The fault items of web server consist of the process fault, server overload, network interface fault, configuration and performance fault. Based on these items, the actual fault management is carried out fault referencing. In order to reference the fault, we have formulated the system-level fault diagnosis production rule and the service-level fault diagnosis rule, conjunction with translating management knowledge into active network. Also, adaptive recovery mechanism of web server is applied to defining recovery rule and constructing case library for case-based web server fault recovery. Finally, through the experiment, fault environment and applicability of each proposed production rule and recovering scheme are presented to verify justification of proposed diagnosis rules and recovery mechanism for fault management. An intelligent case-based fault management scheme proposed in this paper can minimize an effort of web master to remove fault incurred web administration and operation.

  • PDF

A Study on Fuzzy Rule Functional Verification for Service ratio Prediction of Server in ATM Networks (ATM망에서 서버의 서비스율 예측을 위한 퍼지 규칙 기능 검증에 관한 연구)

  • 정동성;이용학
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제41권10호
    • /
    • pp.69-77
    • /
    • 2004
  • In this thesis, we created a Fuzzy rule in a Fuzzy logic that are fuzzy logic which is composed of linguistic rules and Fuzzy inference engine for effective traffic control in ATM networks. The parameters of the Fuzzy rules are adapted to minimize the given performance index in both cases. In other words, the difuzzification value controls the service rate in the server to total traffic arrival ratio and buffer occupancy ratio using fuzzy set theory for traffic connected after reasoning. Also, show experiment result about rule by MATLAB6.5 and on-line bulid-up to verify validity of created Fuzzy rule. As a result, we can verify that service ratio in server is efficiently controlled by the total traffic arrival ratio and buffer occupancy ratio.

Active Rule Manager for the Mobile Agent Middleware System

  • Lee, Yon-Sik;Cheon, Eun-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • 제21권10호
    • /
    • pp.99-105
    • /
    • 2016
  • The active rule system is a key element of the rule-based mobile agent middleware system for activeness and autonomy of the sensor network. The rule manager, which is the main components of active rule based mobile agent framework and active rule system, performs the control and management of the rule-related processes. In this paper, we design and implement the roles and functions of the rule manager in detail. The proposed rule manager plays an important role in the sensor network environment. The sensor data server loads the active rule on the mobile agent by the rule manager according to the situations, and the mobile agent migrates to the destination node and performs the designated action. This active rule-based mobile agent middleware system presents the usefulness for the various sensor network applications. Through the rule execution experiment using the rule-based mobile agent, we show the adaptability and applicability of rule-based mobile agent middleware system to the dynamic environmental changes in sensor networks.

Distributed Control Framework based on Mobile Agent Middleware

  • Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • 제25권12호
    • /
    • pp.195-202
    • /
    • 2020
  • The control system for the efficiency of resource utilization in sensor network environment based on object detection and environmental sensor requires active control function which based on sensor data acquisition and transmission functions and server's data analysis. Using active rule-based mobile agent middleware, this paper proposes a new distributed control framework that reduces the load of central sensor data server in sensor network environment by implementing remote data sensing and Zigbee-based communication with server and data analysis method of server. In addition, we implemented a power-saving system prototype using active rule-based distributed control methods that applied consumer's demand and environmental variables, and verified the validity of the proposed system through experiments and evaluations in the mobile agent middleware environment. The proposed system is a system framework that can efficiently autonomously control distributed objects in the sensor network environment, and it can be applied effectively to the development of demand response service based on optimal power control for the smart power system in the future.

Implementation of the Golf Play Advice System with Reasoning Rules Using Mobile Devices

  • Kim, Kapsu;Min, Meekyung
    • International journal of advanced smart convergence
    • /
    • 제7권2호
    • /
    • pp.47-54
    • /
    • 2018
  • This paper is a study on implementation of the golf play advice system which provides advice to golfers through mobile devices. The system consists of a mobile unit consisting of a GPS receiver, a data transmitter and receiver, and a display unit, and a server unit composed of a database and advice generator. The advice generator that provides advices to the users, generates advices with IF-THEN rule-based reasoning method. The reasoning module utilizes golfer's personal records and various information in the database of the server unit. This system provides the advice to the users who play on the golf course through mobile devices, so that it is possible to provide various information similar to the screen golf using the computer simulating technology in the outdoor golf course.

Development of Internet Expert System Tool using ASP (ASP를 이용한 인터넷 전문가 시스템 도구 개발)

  • 조성인;양희성;배영민;정재연
    • Journal of Biosystems Engineering
    • /
    • 제26권2호
    • /
    • pp.141-146
    • /
    • 2001
  • Lots of the agricultural information come from human experiences and are in non-numerical forms. Therefore, it is difficult to process to be processed in a conventional data processing way. An internet expert system for agricultural application using the ASP(active server page) was developed to solve this problem and consisted of databases, an inference engine, and an user interface. The databases were composed of rule base, question base and link data. The inference engine was developed with the ASP for connection with web between databases. The used interface was developed with the CGI(common gateway interface), so that question could be answered on a web browser, and the session technique was used to provide proper result to each of multi-users. A prototype internet expert system was developed for diagnosis of diseases and nutritional disorders of paddy rice. The expert system was interactively worked through WWW(world wide web) at remote sites by multi-users, even at the same time. The rule base could be easily updated and modified from a web server computer by a knowledge engineer.

  • PDF

A Study on Wrapping of Legacy System using a Transaction Adaptor Component (트랜잭션 어댑터 컴포넌트를 이용한 레거시 시스템의 랩핑에 관한 연구)

  • Hwang, Sun-Myung;Kim, Sang-Young;Kim, Jung-Ah;Jin, Young-Tak
    • The KIPS Transactions:PartD
    • /
    • 제11D권3호
    • /
    • pp.605-616
    • /
    • 2004
  • The purpose of CBSD(Component Based Software Development) if to develop software using a reuse component and components assembly. The reused components have to be adapter for satisfaction of requirement specification. This paper represents a component adaption method which reuse previously developed component or legacy system, using an adaptation component called by TA(Transaction Adaptor). The adaptation using TA transmits XML data that is translated into stream type, from a client to on host system. And we introduce RS(Rule Server) which gets some Information from XML data for application program development. Through the Interaction of TA and RS, we can improve effectiveness of component development and maintenance and we can reuse legacy system.

A Study on the Computer­Aided Processing of Sentence­Logic Rule (문장논리규칙의 컴퓨터프로세싱을 위한 연구)

  • Kum, Kyo-young;Kim, Jeong-mi
    • Journal of Korean Philosophical Society
    • /
    • 제139권
    • /
    • pp.1-21
    • /
    • 2016
  • To quickly and accurately grasp the consistency and the true/false of sentence description, we may require the help of a computer. It is thus necessary to research and quickly and accurately grasp the consistency and the true/false of sentence description by computer processing techniques. This requires research and planning for the whole study, namely a plan for the necessary tables and those of processing, and development of the table of the five logic rules. In future research, it will be necessary to create and develop the table of ten basic inference rules and the eleven kinds of derived inference rules, and it will be necessary to build a DB of those tables and the computer processing of sentence logic using server programming JSP and client programming JAVA over its foundation. In this paper we present the overall research plan in referring to the logic operation table, dividing the logic and inference rules, and preparing the listed process sequentially by dividing the combination of their use. These jobs are shown as a variable table and a symbol table, and in subsequent studies, will input a processing table and will perform the utilization of server programming JSP, client programming JAVA in the construction of subject/predicate part activated DB, and will prove the true/false of a sentence. In considering the table prepared in chapter 2 as a guide, chapter 3 shows the creation and development of the table of the five logic rules, i.e, The Rule of Double Negation, De Morgan's Rule, The Commutative Rule, The Associative Rule, and The Distributive Rule. These five logic rules are used in Propositional Calculus, Sentential Logic Calculus, and Statement Logic Calculus for sentence logic.

Detection Of Unknown Malicious Scripts using Code Insertion Technique (코드 삽입 기법을 이용한 알려지지 않은 악성 스크립트 탐지)

  • 이성욱;방효찬;홍만표
    • Journal of KIISE:Information Networking
    • /
    • 제29권6호
    • /
    • pp.663-673
    • /
    • 2002
  • Server-side anti-viruses are useful to protect their domains, because they can detect malicious codes at the gateway of their domains. In prevailing local network, all clients cannot be perfectly controlled by domain administrators, so server-side inspection, for example in e-mail server, is used as an efficient technique of detecting mobile malicious codes. However, current server-side anti-virus systems perform only signature-based detection for known malicious codes, simple filtering, and file name modification. One of the main reasons that they don't have detection features, for unknown malicious codes, is that activity monitoring technique is unavailable for server machines. In this paper, we propose a detection technique that is executed at the server, but it can monitor activities at the clients without any anti-virus features. we describe its implementation.

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • 제8권3호
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF