• Title/Summary/Keyword: execution monitoring

Search Result 183, Processing Time 0.027 seconds

Framework of File System Robustness Test (FORT : 파일 시스템 강인성 테스트 프레임 워크)

  • Kim, Young-Jin;Won, You-Jip;Kim, Ra-Kie;Lee, Mo-Won;Park, Jae-Seok;Lee, Joo-Wheun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.8
    • /
    • pp.348-366
    • /
    • 2007
  • Capacity of modem storage devices is becoming larger than yesterday and integration of disk is increasing. It refers that physical errors can damage a lot of digital information on storage devices. So we propose file system test framework in this paper to test integrity and robustness of file systems. We develop the tool for generating bad sectors on disks and the tool which creates all physical errors defined in storage devices. We also develop the tool for immediately monitoring the condition of read and write execution on storage devices. So, by integrating those tools, we develop FORT, test framework for confirming robustness of file system. We analyze robustness of ext3 file systems by FORT. Lastly, we present draft of intelligent system merging file system and device driver's layer architecture.

Applet Control using Java Bytecode Modification on the Internet Communication (인터넷 통신상에서 자바 바이트 코드 수정을 이용한 애플릿 제어)

  • 김광준;나상동;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.90-99
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients' browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, and annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

Runtime Fault Detection Method based on Context Insensitive Behavioral Model for Legacy Software Systems (레거시 소프트웨어 시스템을 위한 문맥 독립적 행위 기반 실시간 오작동 탐지 기법)

  • Kim, Suntae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.9-18
    • /
    • 2015
  • In recent years, the number of applications embedded in the various devices such as a smart phone is getting larger. Due to the frequent changes of states in the execution environment, various malfunctions may occur. In order to handle the issue, this paper suggests an approach to detecting method-level failures in the legacy software systems. We can determine if the software executes the abnormal behavior based on the behavior model. However, when we apply the context-sensitive behavior model to the method-level, several problems happen such as false alarms and monitoring overhead. To tackle those issues, we propose CIBFD (Context-Insensitive Behavior Model-based Failure Detection) method. Through the case studies, we compare CIBFD method with the existing method. In addition, we analyze the effectiveness of the method for each application domains.

A Study on Systematic Review of Learning with a Robot (로봇활용교육의 체계적 문헌고찰에 관한 연구)

  • Kim, Chul
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.2
    • /
    • pp.199-209
    • /
    • 2013
  • The study is to review the effects of learning with a robot among regular courses of elementary and middle schools so that the research method of systematic review for papers from 2001 and 2013 was conducted. The database for review were KISS, DBpia, and E-article and it was searched with two options of 'robot & education' and 'learning with a robot'. Initially, 481 papers were searched; but finally 50 were selected after monitoring and extraction execution in line with protocol. Great volume of researches focused on academic skill such as a creativity, problem solving skills and as for research methods, Pretest-Posttest Control Group Design and t-test took the lion's share. As for educational effects, improvements of course interest, immersion, attitude, motivation, creativeness and problem solving skills were identified; but in some researches, insignificant research outcomes were reported. Based on analysis results, considerations for learning with a robot were suggested.

  • PDF

A Semantics-based protocol for Business Process Transactions (비즈니스 프로세스 트랜잭션을 위한 시맨틱스 기반의 프로토콜)

  • Kang, Dong-Woo;Lee, Sun-Jae;Lee, Jae-Yeol;Kim, Kwang-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.2
    • /
    • pp.93-110
    • /
    • 2006
  • A Business Process Management System(BPMS) requires transaction management to guarantee reliability for transactions. Though several transaction protocols have been suggested for the transaction management, the difference of transaction protocols interrupts interoperability among transaction management systems. In this paper, a business process transaction based on semantics is suggested. It is defined based on the static semantics and the operational semantics. As the static semantics defines the ontologies for transaction states and transaction messages using Web Ontology Language(OWL), it solves the difference of expression for the concepts of transaction protocols. As the operational semantics defines state transitions of business process transactions using Abstract State Machine(ASM), it can guarantee formalism for transaction operations. The operational semantics refers to the state ontology and message ontology defined in the static semantics. This approach can enhance interoperability among various transaction protocols, increase the understandability for the transaction protocols, and support autonomous transaction execution and systematic transaction monitoring.

  • PDF

A Methodology of Implementing SOA and BPM Based Information Systems : A Case Study on Product BOM Management under Customer-Oriented Make-To-Order Manufacturing Environments (SOA 및 BPM 기반의 정보시스템 구축 방법론: 고객지향 수주생산 환경에서의 제품 BOM 관리 적용사례)

  • Shin, Jung-Bum;Kim, Jae-Gyun;Jang, Gil-Sang
    • The Journal of Information Systems
    • /
    • v.18 no.1
    • /
    • pp.77-95
    • /
    • 2009
  • In customer-oriented make-to-order manufacturing environments, the works of BOM changes due to the changes of product specification and engineering are closely connected with almost all departments such as sales, engineering, production, procurement, cost, after service, etc within an enterprise. So, the contents of BOM changes must be instantly reflected on the related works among the departments. To effectively process these complex works of BOM changes, types of changes on product specification and engineering and types of BOM changes linked with those must be systematically defined, classified and managed by information systems. Thus, it is necessary to introduce solutions such as BPM and SOA in order to efficiently deal with complex business processes like BOM change management. This paper proposes a methodology of constructing information systems based on BPM and SOA. The proposed methodology defines the relationship between processes of BPM for definition, execution, monitoring, etc of business processes and services of SOA for connection among information systems within an enterprise, and presents a scheme of practically applying BPM and SOA solutions to actual business works. To show an utilization of the proposed methodology, the prototype system for product BOM management is implemented in order to efficiently deal with the works of BOM changes due to the changes of product specification and engineering.

Integration of Six Sigma and BPM for Continuous Process Improvement (지속적 프로세스 개선을 위한 6시그마와 BPM 통합 모형)

  • Yoon, Ji Hyun;Jung, Jae-Yoon
    • The Journal of Bigdata
    • /
    • v.2 no.1
    • /
    • pp.5-15
    • /
    • 2017
  • Six Sigma has been adopted for the last two decades in many industries of manufacturing and service business to implement processs improvement. The methodology has difficulties in discovering target projects in the Define step and in controlling continuous measure and control in the Control step. To address the problem, more advanced system is required to support continuous control and management, and business process management (BPM) can be an effective solution for this problem. In this research, we introduce integrated models of Six Sigma and BPM for the purpose of realizing continuous process improvement, and explain the procedure of analyzing, improving, and monitoring the processes based on the data which has been accumulated in business process execution. It is expected that this integrated approach can maximize business performance by improving and managing business continuously on the integrated platform of two business innovation strategies, Six Sigma and BPM.

  • PDF

A Real-Time Scheduling System Architecture in Next Generation Wafer Production System (차세대 웨이퍼 생산시스템에서의 실시간 스케줄링 시스템 아키텍처)

  • Lee, Hyun;Hur, Sun;Park, You-Jin;Lee, Gun-Woo;Cho, Yong-Ju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.3
    • /
    • pp.184-191
    • /
    • 2010
  • In the environment of 450mm wafers production known as the next-generation semiconductor production process, one of the most significant features is the full automation over the whole manufacturing processes involved. The full automation system for 450mm wafer production will minimize the human workers' involvement in the manufacturing process as much as possible. In addition, since the importance of an individual wafer processing increases noticeably, it is necessary to develop more robust scheduling systems in the whole manufacturing process than so ever. The scheduling systems for the next-generation semiconductor production processes also should be capable of monitoring individual wafers and collecting useful data on them in real time. Based on the information gathered from these processes, the system should finally have a real-time scheduling functions controlling whole the semiconductor manufacturing processes. In this study, preliminary investigations on the requirements and needed functions for constructing the real time scheduling system and transforming manufacturing environments for 300mm wafers to those of 400mm are conducted and through which the next generation semiconductor processes for efficient scheduling in a clustered production system architecture of the scheduler is proposed. Our scheduling architecture is composed of the modules for real-time scheduling, the clustered production type supporting, the optimal scheduling and so on. The specifications of modules to define the major required functions, capabilities, and the relationship between them are presented.

Development of Real time Air Quality Prediction System

  • Oh, Jai-Ho;Kim, Tae-Kook;Park, Hung-Mok;Kim, Young-Tae
    • Proceedings of the Korean Environmental Sciences Society Conference
    • /
    • 2003.11a
    • /
    • pp.73-78
    • /
    • 2003
  • In this research, we implement Realtime Air Diffusion Prediction System which is a parallel Fortran model running on distributed-memory parallel computers. The system is designed for air diffusion simulations with four-dimensional data assimilation. For regional air quality forecasting a series of dynamic downscaling technique is adopted using the NCAR/Penn. State MM5 model which is an atmospheric model. The realtime initial data have been provided daily from the KMA (Korean Meteorological Administration) global spectral model output. It takes huge resources of computation to get 24 hour air quality forecast with this four step dynamic downscaling (27km, 9km, 3km, and lkm). Parallel implementation of the realtime system is imperative to achieve increased throughput since the realtime system have to be performed which correct timing behavior and the sequential code requires a large amount of CPU time for typical simulations. The parallel system uses MPI (Message Passing Interface), a standard library to support high-level routines for message passing. We validate the parallel model by comparing it with the sequential model. For realtime running, we implement a cluster computer which is a distributed-memory parallel computer that links high-performance PCs with high-speed interconnection networks. We use 32 2-CPU nodes and a Myrinet network for the cluster. Since cluster computers more cost effective than conventional distributed parallel computers, we can build a dedicated realtime computer. The system also includes web based Gill (Graphic User Interface) for convenient system management and performance monitoring so that end-users can restart the system easily when the system faults. Performance of the parallel model is analyzed by comparing its execution time with the sequential model, and by calculating communication overhead and load imbalance, which are common problems in parallel processing. Performance analysis is carried out on our cluster which has 32 2-CPU nodes.

  • PDF

Risk Critical Point (RCP): A Quantifying Safety-Based Method Developed to Screen Construction Safety Risks

  • Soltanmohammadi, Mehdi;Saberi, Morteza;Yoon, Jin Hee;Soltanmohammadi, Khatereh;Pazhoheshfar, Peiman
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.3
    • /
    • pp.221-235
    • /
    • 2015
  • Risk assessment is an important phase of risk management. It is the stage in which risk is measured thoroughly to achieve effective management. Some factors such as probability and impact of risk have been used in the literature related to construction projects. Because in high-rise projects safety issues are paramount, this study has tried to develop a quantifying technique that takes into account three factors: probability, impact and Safety Performance Index (SPI) where the SPI is defined as the capability of an appropriate response to reduce or limit the effect of an event after its occurrence with regard to safety pertaining to a project. Regarding risk-related literatures which cover an uncertain subject, the proposed method developed in this research is based on a fuzzy logic approach. This approach entails a questionnaire in which the subjectivity and vagueness of responses is dealt with by using triangular fuzzy numbers instead of linguistic terms. This method returns a Risk Critical Point (RCP) on a zoning chart that places risks under categories: critical, critical-probability, critical-impact, and non-critical. The high-rise project in the execution phase has been taken as a case study to confirm the applicability of the proposed method. The monitoring results showed that the RCP method has the inherent ability to be extended to subsequent applications in the phases of risk response and control.