• Title/Summary/Keyword: 결함 관리 기법

Search Result 2,857, Processing Time 0.033 seconds

Development of climate change uncertainty assessment method for projecting the water resources (기후변화에 따른 수자원 전망의 불확실성 평가기법 개발)

  • Lee, Moon-Hwan;So, Jae-Min;Bae, Deg-Hyo
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.8
    • /
    • pp.657-671
    • /
    • 2016
  • It is expected that water resources will be changed spatially and temporally due to the global climate change. The quantitative assessment of change in water availability and appropriate water resources management measures are needed for corresponding adaptation. However, there are large uncertainties in climate change impact assessment on water resources. For this reason, development of technology to evaluate the uncertainties quantitatively is required. The objectives of this study are to develop the climate change uncertainty assessment method and to apply it. The 5 RCMs (HadGEM3-RA, RegCM4, MM5, WRF, and RSM), 5 statistical post-processing methods (SPP) and 2 hydrological models (HYM) were applied for evaluation. The results of the uncertainty analysis showed that the RCM was the largest sources of uncertainty in Spring, Summer, Autumn (29.3~68.9%), the hydrological model was the largest source of uncertainty in Winter (46.5%). This method can be possible to analyze the changes in the total uncertainty according to the specific RCM, SPP, HYM model. And then it is expected to provide the method to reduce the total uncertainty.

Low-Power Motion Estimator Architecture for Deep Sub-Micron Multimedia SoC (Deep Submicron 공정의 멀티미디어 SoC를 위한 저전력 움직임 추정기 아키텍쳐)

  • 연규성;전치훈;황태진;이성수;위재경
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.10
    • /
    • pp.95-104
    • /
    • 2004
  • This paper propose a motion estimator architecture to reduce the power consumption of the most-power-consuming motion estimation method when designing multimedia SoC with deep submicron technologies below 0.13${\mu}{\textrm}{m}$. The proposed architecture considers both dynamic and static power consumption so that it is suitable for large leakage process technologies, while conventional architectures consider only dynamic power consumption. Consequently, it is suitable for mobile information terminals such as mobile videophone where efficient power management is essential. It exploits full search method for simple hardware implementation. It also exploits early break-off method to reduce dynamic power consumption. To reduce static power consumption, megablock shutdown method considering power line noise is also employed. To evaluate the proposed architecture when applied multimedia SoC, system-level control flow and low-power control algorithm are developed and the power consumption was calculated based on thor From the simulation results, power consumption was reduced to about 60%. Considering the line width reduction and increased leakage current due to heat dissipation in chip core, the proposed architecture shows steady power reduction while it goes worse in conventional architectures.

A Coding Packet Group-Based ARQ Scheme for File Delivery Services in a Multi-Hop Wireless Network (다중 홉 MANET에서의 파일 전송 응용을 위한 코딩 패킷 그룹 기반 ARQ 기법)

  • Kim, Youngsil;Kang, Kyungran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.7
    • /
    • pp.612-622
    • /
    • 2013
  • In this paper, we propose a coding packet group-based ARQ scheme (rNC) for file delivery in wireless networks. rNC assumes multiple network coding points between the source and the destination. Each network coding point gathers and codes a group of packets according to the queue polling system. A queue polling system makes a few or several packets available for coding in a queue while polling the other queues in the system. Thus, we assuem a queue polling system at each network coding point. We call this group of packets as coded packet group. Each coding point acknowledges the reception of every code packet group to its previous coding point for reliable delivery. Thus, the intermediate coding points including the source can release its buffer before the packet is delivered to the destination. To guarantee the ultimate file delivery to the destination, the destination sends acknowledgement to the sender. We evaluate our proposed scheme using ns-2 and compare the performance with CodeCast. The results show that rNC works better than CodeCast in terms of packet delivery ratio and control overhead in unreliable wireless networks.

Hash-chain-based IoT authentication scheme suitable for small and medium enterprises (중소기업 환경에 적합한 해쉬 체인 기반의 IoT 인증 기법)

  • Jeong, Yoon-Su;Yon, Yong-Ho;Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.105-111
    • /
    • 2017
  • With the emergence of the fourth industrial revolution, more and more attempts have been made to apply IoT technology to the manufacturing process and launch the product. In this paper, we propose IoT authentication scheme based on hash chain which can easily apply IoT device to small and medium enterprises in Korea. In the proposed method, the companies that installed IoT devices suitable for the manufacturing environment are selected to maintain the linkage between IoT devices so that product information and release information can be efficiently collected and managed during the entire manufacturing process. In addition, the proposed scheme is characterized in that it does not require an additional encryption / decryption algorithm because the authentication information of the IoT device is constructed based on a hash chain. As a result of the performance evaluation, the efficiency of the manufacturing process was improved by 18.5% and the processing of the manufacturing process with the IoT device was shortened by 20.1% on the average according to the application of the IoT device. In addition, the labor cost reduction costs in the manufacturing process decreased by an average of 30.7%.

Top-down Hierarchical Clustering using Multidimensional Indexes (다차원 색인을 이용한 하향식 계층 클러스터링)

  • Hwang, Jae-Jun;Mun, Yang-Se;Hwang, Gyu-Yeong
    • Journal of KIISE:Databases
    • /
    • v.29 no.5
    • /
    • pp.367-380
    • /
    • 2002
  • Due to recent increase in applications requiring huge amount of data such as spatial data analysis and image analysis, clustering on large databases has been actively studied. In a hierarchical clustering method, a tree representing hierarchical decomposition of the database is first created, and then, used for efficient clustering. Existing hierarchical clustering methods mainly adopted the bottom-up approach, which creates a tree from the bottom to the topmost level of the hierarchy. These bottom-up methods require at least one scan over the entire database in order to build the tree and need to search most nodes of the tree since the clustering algorithm starts from the leaf level. In this paper, we propose a novel top-down hierarchical clustering method that uses multidimensional indexes that are already maintained in most database applications. Generally, multidimensional indexes have the clustering property storing similar objects in the same (or adjacent) data pares. Using this property we can find adjacent objects without calculating distances among them. We first formally define the cluster based on the density of objects. For the definition, we propose the concept of the region contrast partition based on the density of the region. To speed up the clustering algorithm, we use the branch-and-bound algorithm. We propose the bounds and formally prove their correctness. Experimental results show that the proposed method is at least as effective in quality of clustering as BIRCH, a bottom-up hierarchical clustering method, while reducing the number of page accesses by up to 26~187 times depending on the size of the database. As a result, we believe that the proposed method significantly improves the clustering performance in large databases and is practically usable in various database applications.

A Secure and Lightweight Authentication Scheme for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 안전하고 경량화 된 인증기법)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.77-83
    • /
    • 2019
  • With the increase in population, the number of such senior citizens is increasing day by day. These senior citizens have a variety of care needs, but there are not enough health workers to look after them. Ambient Assisted Living (AAL) aims at ensuring the safety and health quality of the older adults and extending the number of years the senior citizens can live independently in an environment of their own preference. AAL provides a system comprising of smart devices, medical sensors, wireless networks, computer and software applications for healthcare monitoring. AAL can be used for various purposes like preventing, curing, and improving wellness and health conditions of older adults. While information security and privacy are critical to providing assurance that users of AAL systems are protected, few studies take into account this feature. In this paper, we propose a secure and lightweight authentication scheme for the AAL systems. The proposed authentication scheme not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. Also, the security analysis results are presented to show the proposed authentication scheme is more secure and efficient rather than existing authentication schemes.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

Probabilistic Medium- and Long-Term Reservoir Inflow Forecasts (II) Use of GDAPS for Ensemble Reservoir Inflow Forecasts (확률론적 중장기 댐 유입량 예측 (II) 앙상블 댐 유입량 예측을 위한 GDAPS 활용)

  • Kim, Jin-Hoon;Bae, Deg-Hyo
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.3 s.164
    • /
    • pp.275-288
    • /
    • 2006
  • This study develops ESP (Ensemble Streamflow Prediction) system by using medium-term numerical weather prediction model which is GDAPS(T213) of KMA. The developed system forecasts medium- and long-range exceedance Probability for streamflow and RPSS evaluation scheme is used to analyze the accuracy of probability forecasts. It can be seen that the daily probability forecast results contain high uncertainties. A sensitivity analysis with respect to forecast time resolution shows that uncertainties decrease and accuracy generally improves as the forecast time step increase. Weekly ESP results by using the GDAPS output with a lead time of up to 28 days are more accurately predicted than traditional ESP results because conditional probabilities are stably distributed and uncertainties can be reduced. Therefore, it can be concluded that the developed system will be useful tool for medium- and long-term reservoir inflow forecasts in order to manage water resources.

Estimation of Life Expectancy and Budget Demands based on Maintenance Strategy (도로포장 유지보수 전략에 따른 기대수명과 보수비용산정)

  • Han, Dae-Seok;Do, Myung-Sik
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.4D
    • /
    • pp.345-356
    • /
    • 2012
  • Road pavement requires repetitive maintenance works to maintain satisfactory service level to the public. However, the repetitive maintenance works upon deteriorated pavement structure make negative effects to deterioration speed. It often leads to inefficient use of limited budget. For that reason, the pavements require reconstruction work to recover their original performance. Recently, construction demands in the Korean national highway have already been reached to maximum level, and the aged pavements start to demand much more reconstruction works. However, in the real world, road agencies have often been confused when they determine maintenance design for such aged road sections due to budget constraint. It is because there is no reliable long-term maintenance strategy that supports their decision making. To support their decision making, this paper aimed to suggest the best maintenance strategy considering changing process of pavement performance by repetitive maintenance works. As an analysis method, probability distribution and hazard function to estimate the life expectancy were adopted, and then the results were used for long-term life cycle cost analysis with deterministic or Monte-Carlo method under various scenarios. As an empirical study, the Korean national highway data that has long-maintenance history data since 1986 has been applied. Last, this paper considered quality assurance of maintenance work to improve maintenance quality. These could be important information as a part of long-term maintenance strategy of pavement.

A Unified Software Architecture for Storage Class Random Access Memory (스토리지 클래스 램을 위한 통합 소프트웨어 구조)

  • Baek, Seung-Jae;Choi, Jong-Moo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.3
    • /
    • pp.171-180
    • /
    • 2009
  • Slowly, but surely, we are seeing the emergence of a variety of embedded systems that are employing Storage Class RAM (SCRAM) such as FeRAM, MRAM and PRAM, SCRAM not only has DRAM-characteristic, that is, random byte-unit access capability, but also Disk-characteristic, that is, non-volatility. In this paper, we propose a new software architecture that allows SCRAM to be used both for main memory and for secondary storage simultaneously- The proposed software architecture has two core modules, one is a SCRAM driver and the other is a SCRAM manager. The SCRAM driver takes care of SCRAM directly and exports low level interfaces required for upper layer software modules including traditional file systems, buddy systems and our SCRAM manager. The SCRAM manager treats file objects and memory objects as a single object and deals with them in a unified way so that they can be interchanged without copy overheads. Experiments conducted on real embedded board with FeRAM have shown that the SCRAM driver indeed supports both the traditional F AT file system and buddy system seamlessly. The results also have revealed that the SCRAM manager makes effective use of both characteristics of SCRAM and performs an order of magnitude better than the traditional file system and buddy system.