• Title/Summary/Keyword: 기능 모델링

Search Result 1,156, Processing Time 0.025 seconds

A Study on Design and Implementation of a VC-Merge Capable LSR on MPLS over ATM (ATM기반 MPLS망에서 확장성을 고려한 VC-Merge 가능한 LSR 설계에 관한 연구)

  • Kim, Young-Chul;Lee, Tae-Won;Lee, Dong-Won;Choi, Deok-Jae;Lee, Guee-Sang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.12
    • /
    • pp.29-38
    • /
    • 2001
  • Recently, as Internet and its services grow rapidly, IETF(Internet Engineering Task Force) introduced a new switching mechanism, MPLS(Multi-Protocol Label Switching), to solve the problem of the scalability in Internet backbone. In this paper, we implemented the LSR loaded with VC-merging function, which causes LSR's management cost to be significantly reduced. We propose a new VC-merge function which supports differentiated services. In case of network congestion in the output buffer of each core LSR, appling link polices to the output modules of the LSR using the EPD algorithm can prevent the buffer from being overflowed. Simulation was performed for Diffserv by using multiple traffic models and investigated the impact of VC-merge method compared to non VC-merge method. The proposed switch is modeled in VHDL and fabricated using the SAMSUNG $0.5{\mu}m$ SOG process.

  • PDF

Smart Jewelry System for Health Management based on IoT (사물인터넷 기반 건강관리 스마트 주얼리 시스템)

  • Kang, Yun-Jeong;Yin, Li;Choi, DongOun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1494-1502
    • /
    • 2016
  • With the increasing availability of medical sensors and Internet of Things(IoT) devices for personal use, considering the interaction with users, it is planned to add intelligent function design to the fashionable jewelry, and develop composite multi-function intelligent jewelry through sensors identification. By means of IoT technology, while possessing communication function of intelligent jewelry, the function of intelligent jewelry can be expanded to the linkage network. In order to rapidly manage the mass data produced by intelligent jewelry sensors based on IoT, an intelligent jewelry system for health management is designed and an ontology model of intelligent jewelry system based on IoT is worked out. After the state of the services through the smart phone application is shown. The application provides a personalized service to the user and to determine the risk to show the guide lines according to the disease.

Case Study on the Improvement of Underground Building Works through the VE (VE 적용에 의한 지하 골조공사 개선연구)

  • Hong Jae-Wook;Kim Sun-Kuk;Lee Jong-Kook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.3 s.19
    • /
    • pp.106-113
    • /
    • 2004
  • Most construction project managers should focus on the reasonable cost-down with same quality and function-enhancement with same cost for the value-added construction project delivery in construction industry. Especially, a building structure construction is one of the most important processes to affect the total cost and schedule in building construction project. It means that the process has the possibility of project cost-down or quality-enhancement among the whole project life-cycle. This research focuses on the importance of underground structure of building project by increasing underground use ratio in the urban building construction projects nowadays. This research adopts VE method for the improvement of cost and time by process and analysis dimension modeling on the underground building structure construction, and verifies it throughout the case study, This research is the basic study on the improvement of underground building works through the value engineering method in construction industry.

A Systematic Design Method for Service System Development based on Similarity between Software System and Service System (소프트웨어 시스템과 서비스 시스템의 유사성에 기반한 서비스 시스템 개발을 위한 체계적 설계 기법)

  • Jeon, Won-Young;Chang, Soo-Ho;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.5
    • /
    • pp.407-418
    • /
    • 2007
  • Service science is a new application area that implements services in an interdisciplinary area of management, economics, and engineering. Service systems provide functionalities of traditional software systems, moreover the functionalities are more intellectual in that they require dynamic context awareness, analysis, and decision making based on the recognized and analyzed contexts. However, conventional software development approaches do not sufficiently provide methods to model the service requirements and to design service-intensive systems. Therefore, there is a great demand on effective methodologies for developing service systems. In this paper, we compare traditional software systems with service-intensive systems in order to identify characteristics of the service systems. And, we propose a step-wise process to model service systems, in terms of architecture, components, and workflows. Then, we show a case study on an emergency handling system which is a type of living assistant systems. We believe that the proposed approach can be used in developing high-quality service systems effectively.

Bioinformatic Analysis of Envelope Protein Domains of Zika Virus and Dengue Virus (지카 바이러스 및 뎅기 바이러스의 외피 단백질을 구성하는 도메인의 생물정보학적 분석)

  • Choi, Jae-Won;Kim, Hak Yong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.11
    • /
    • pp.632-643
    • /
    • 2019
  • In recent years, large scale damages from arbovirus infections by mosquitoes have been reported worldwide due to factors such as change in global climate, increased overseas travel, and increased logistics movement between countries. Among them, Zika virus and dengue virus belonging to genus Flavivirus are representative. In this study, we performed in-depth analyses of the envelope (E) protein that perform essential functions for host infection of Zika virus and dengue virus based on bioinformatics databases. The domain analysis of E protein was performed to determine the type, location, and function, and homology analysis for each domain. From these results, EDIII showing low homology was identified. The homology and immunogenicity of each peptide constituting EDIII were analyzed and three-dimensional structures were modeled. Furthermore, we discussed their biological meaning and how they could be used.

A Study on the End Mill Wear Detection by the Analysis of Acoustic Frequency for the Cutting Sound(KSD3753) (합금공구강재의 절삭음 음향주파수 분석에 의한 엔드밀 마모 검출에 관한 연구)

  • Lee Chang-Hee;Kim Nag-Cheol
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.4
    • /
    • pp.281-286
    • /
    • 2004
  • The wear process of end mill is a so complicated process that a more reliable technique is required for the monitoring and controling the tool life and its performance. This research presents a new tool wear monitoring method based on the sound signal generated on the machining. The experiment carried out continuous-side-milling for using the high-speed steel end mill under wet condition. The sound pressure was measured at 0.5m from the cutting zone by a dynamic microphone, and was analyzed at frequency domain. The tooth passing frequency appears as a harmonics form, and end mill wear is related with the first harmonic. It can be concluded from the result that the tool wear is correlate with the intensity of the measured sound at tooth passing frequency estimation of end mill wear using sound is possible through frequency analysis at tooth passing frequency under the given circumstances.

  • PDF

Development of a User-friendly Continuous-system Simulation Language (사용자 편의성을 고려한 연속체계 모의실험 언어의 개발)

  • 민경하;임창관;박찬모
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1993.10a
    • /
    • pp.12-13
    • /
    • 1993
  • 컴퓨터를 이용한 모의 실험 방법은 과학 및 공학 분야뿐만 아니라 경제,사회 현상등에도 널리 적용될 수 있는 유용한 도구이다. 그 중에서도 연속체계 모의 실험은 미분 방정식으로 모델링되는 시스템을 대상으로 하는 경우가 맡으며, 이를 위하여 그동안 맡은 연속체계 모의 실험 언어들이 개발되었다. 그러나 그들은 대부분 사용하기가 복잡하여 사용자 편의성을 고려한 모의 실험 언어에 대한 필요성이 증대되었다. 본 연구에서는 사용자에개 최대한 편의성을 제공하는 연속체계 모의 실험 언어인 PCSL (Postech Continuous-system Simulation language)을 개발하였다. PCSL 프로그램은 프로그램 헤더, 상수 정의부, 함수 정의부, 매개 변수 정의부, 초기화 선언부, 모델 정의부, 종료 조건 선언부, 출력 선언부 등으로 나누어 진다. 그리고 출력으로는 계산 결과를 파일에 저장, 흑은 수치로 인쇄하거나 그래프로 그려서 보여준다. PCSL 처리 시스템은 모델 정의부에서 주어진 미분방정식을 해석해서 digital-analog simulation 기법으로 풀 수 있는 형태로 변환하는 번역기와 이렇게 변환된 형태의 미분방정식과 여러 가지 조건들을 고려해서 C 프로그램을 생성해주는 생성기, 생성된 C 프로그램을 실행시켜서 그 결과를 얻는 실행기,그리고 사용자에게 편리한 입출력 방법을 제공하는 사용자 인터페이스로 구성된다. 번역기에서는 모델로 주어진 미분방정식의 종류를 결정한 후에 이들을 digital-analog simulation 기법으로 풀 수 있는 형태로 변환한다. 생성기에서는 번역기의 결과를 받고,프로그램 상의 여러 가지 조건들을 고려해서 C 프로그램을 생성한다. 여기서 생성된 C프로그램은 미분방정식을 포함하는 ‘f.c'와 조건들을 포함하는'main.h', 그리고 digital-analog simulation 기법을 이용하는 모의 실험 알고리즘을 구현한 'main.c'로 구성된다. 그리고 실행기에서는 생성기에서 생성한 C 프로그램을 실행시켜서 결과를 얻는다. 여기에서 필요로 하는 PCSL 프로그램의 내응은 종료 조건 선언부, 출력 선언부 등이다. 마지막으로 사용자 인터페이스는 사용자가 간편하게 PCSL 프로그램을 입력할 수 있게 도와주며 모의 실험 결과를 쉽게 화면상에 보여주기 위한 것이다. 이 때에 사용자가 원하면 계산 결과를 그래프로 그려서 보여주는 기능과 화면에 보이는 결과를 프린터로 출력할 수 있는 기능을 제공한다. 실형 결과로는 먼저 선형 상미분방정식의 예로 mass-damper-spring system, 비선형 상미분방정식의 예로는 van der Pol 방정식, 연립 상미분방정식의 예로는 mixing tank problem 등을 보였으며, 그의 공학에서 일어나는 여러 가지 문제들도 다루었다.

  • PDF

A Vulnerability Analysis for Armored Fighting Vehicle based on SES/MB Framework using Importance of Component (구성 부품의 중요도를 활용한 SES/MB 프레임워크 기반 전차 취약성 분석)

  • Kim, Hun-Ki;Hwang, Hun-Gyu;Lee, Jang-Se
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.59-68
    • /
    • 2015
  • In this paper, we proposed a methodology of vulnerability analysis for armored fighting vehicle based on modeling and simulation. The SES/MB framework serves hierarchical representation of the structure for a complex systems and is easy to conduct modeling for the armored fighting vehicle which consists of various components. When the armored fighting vehicle is hit by the shots from threat, the vulnerability of the armored fighting vehicle is decreased by damaged or penetrated level of armors and components. The penetration is determined by the result of comparing a penetration energy through penetration analysis equation and defence ability of armor and components. And the defence ability is determined in accordance with type and defined property of normal component and armor component, all components have a weighted values for the degree of importance. We developed a simulation program for verification proposed methodology. Thus, the program analyzes vulnerability for armored fighting vehicle SES/MB framework using importance.

Smart HCI Based on the Informations Fusion of Biosignal and Vision (생체 신호와 비전 정보의 융합을 통한 스마트 휴먼-컴퓨터 인터페이스)

  • Kang, Hee-Su;Shin, Hyun-Chool
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.4
    • /
    • pp.47-54
    • /
    • 2010
  • We propose a smart human-computer interface replacing conventional mouse interface. The interface is able to control cursor and command action with only hand performing without object. Four finger motions(left click, right click, hold, drag) for command action are enough to express all mouse function. Also we materialize cursor movement control using image processing. The measure what we use for inference is entropy of EMG signal, gaussian modeling and maximum likelihood estimation. In image processing for cursor control, we use color recognition to get the center point of finger tip from marker, and map the point onto cursor. Accuracy of finger movement inference is over 95% and cursor control works naturally without delay. we materialize whole system to check its performance and utility.

Self-Recognition Algorithm of Artificial Immune System (인공면역계의 자기-인식 알고리즘)

  • 심귀보;선상준
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.9
    • /
    • pp.801-806
    • /
    • 2001
  • According as many people use a computer newly, damage of computer virus and hacking is rapidly increasing by the crucial users A computer virus is one of program in computer and has abilities of self reproduction ad destruction like a virus of biology. And hacking is to rob a person's data in a intruded computer and to delete data in a person s computer from the outside. To block hacking that is intrusion of a person s computer and the computer virus that destroys data, a study for intrusion-detection of system and virus detection using a biological immune system is in progress. In this paper, we make a model of positive selection and negative selection of self-recognition process that is ability of T-cytotoxic cell that plays an important part in biological immune system. So we embody a self-nonself distinction algorithm in computer, which is an important part when we detect an infected data by computer virus and a modified data by intrusion from the outside. The composed self-recognition process distinguishes self-file from the changed files. To prove the efficacy of self-recognition algorithm, we use simulation by a cell change and a string change of self file.

  • PDF