• 제목/요약/키워드: 낭비

Search Result 1,495, Processing Time 0.028 seconds

Feasibility Study on a Defrost Control Method by Using a Photoelectric Sensors (광센서를 이용한 제상제어 방법에 대한 타당성 검토)

  • Jeon, Chang-Duk;Kim, Dong-Seon;Lee, Seung-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3389-3395
    • /
    • 2014
  • Conventional methods, such as the clock time control method and temperature difference control method, for defrost control often encounter mal-defrost and a waste of energy. Therefore, a more efficient method is needed to control defrosting precisely. A photoelectric sensor unit consisting of an emitter and a collector was installed in the front of outdoor heat exchanger. Accurate defrost control was performed by monitoring and using the change in output voltage according to the presence of frost. In this study, experiments were performed to determine if the performance and characteristic curves obtained using the clock time control method can be reproduced using a photoelectric sensor under the heating and defrosting capacity test condition described at KS C 9306. The output voltage of the phototransistor (receiver) and heating capacity, power consumption, and surface temperature of the outdoor heat exchanger, were compared. The results showed that photoelectric sensors can be used as a defrost control method. On-off control timing of the clock time defrosting method was in good agreement with those predicted by the output voltage of the photoelectric sensor.

A Study on the Development Lightweight Aggregate using Recycled-Paint for Reduction in Freezing Ground (단열골재 개발을 통한 동토방지 기술개발에 관한 연구)

  • Moon, Jong-Wook;Back, Min-Ho
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.4
    • /
    • pp.47-54
    • /
    • 2010
  • This study is progressed function ratio, it's trued taste by an experiment to present data for human work light weight aggregate development that use clink ash progressed liquid limit, small success limit, wear loss in quantity, sand equivalent, sieve cutting examination. 80:20's match of function rain examination is 1.4, and that use rubble aggregate as recyeled-panit lightweight aggregate's capacity ratio increases by 1.0 increase of function rain many. Also, examination multiplied delicate flavor gradually according to increase of the mixing rate, and absorption coefficient increased. This is judged by phenomenon that appear by special quality upper recycled-panit of polystyrene bid and porosity's increase between lightweight aggregate. It is case that use aggregate of wear loss in quantity is 13.5 in sand equivalent and a wear loss in quantity experiment and although case that mix 20% increases by 14.4, this phenomenon by weak tissue of lightweight aggergate be judged. When it's as a these experiment, the statue prevention floor of a street improvement specifications is prescribing so that satisfy by sand equivalent 20, CBR 10. This is showed result that this satisfies in quality standard all in match experiment ago that see.

The QoS Filtering and Scalable Transmission Scheme of MPEG Data to Adapt Network Bandwidth Variation (통신망 대역폭 변화에 적응하는 MPEG 데이터의 QoS 필터링 기법과 스케일러블 전송 기법)

  • 유우종;김두현;유관종
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.5
    • /
    • pp.479-494
    • /
    • 2000
  • Although the proliferation of real-time multimedia services over the Internet might indicate its successfulness in dealing with heterogeneous environments, it is obvious, on the other hand, that the internet now has to cope with a flood of multimedia data which consumes most of network communication channels due to a great deal of video or audio streams. Therefore, for the purpose of an efficient and appropriate utilization of network resources, it requires to develop and deploy a new scalable transmission technique n consideration of respective network environment and individual clients computing power. Also, we can eliminate the waste effects of storage device and data transmission overhead in that the same video stream duplicated according to QoS. The purpose of this paper is to develop a technology that can adjust the amount of data transmitted as an MPEG video stream according to its given communication bandwidth, and technique that can reflect dynamic bandwidth while playing a video stream. For this purpose, we introduce a media scalable media decomposer working on server side, and a scalable media composer working o n a client side, and then propose a scalable transmission method and a media sender and a media receiver in consideration of dynamic QoS. Those methods proposed her can facilitate an effective use of network resources, and provide multimedia MPEG video services in real-time with respect to individual client computing environment.

  • PDF

Air-conditioning and Heating Time Prediction Based on Artificial Neural Network and Its Application in IoT System (냉난방 시간을 예측하는 인공신경망의 구축 및 IoT 시스템에서의 활용)

  • Kim, Jun-soo;Lee, Ju-ik;Kim, Dongho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.347-350
    • /
    • 2018
  • In order for an IoT system to automatically make the house temperature pleasant for the user, the system needs to predict the optimal start-up time of air-conditioner or heater to get to the temperature that the user has set. Predicting the optimal start-up time is important because it prevents extra fee from the unnecessary operation of the air-conditioner and heater. This paper introduces an ANN(Artificial Neural Network) and an IoT system that predicts the cooling and heating time in households using air-conditioner and heater. Many variables such as house structure, house size, and external weather condition affect the cooling and heating. Out of the many variables, measurable variables such as house temperature, house humidity, outdoor temperature, outdoor humidity, wind speed, wind direction, and wind chill was used to create training data for constructing the model. After constructing the ANN model, an IoT system that uses the model was developed. The IoT system comprises of a main system powered by Raspberry Pi 3 and a mobile application powered by Android. The mobile's GPS sensor and an developed feature used to predict user's return.

  • PDF

Shared Resource Management Scheme in Advance and Immediate Reservations for Effective Resource Allocation (효율적인 자원 할당을 위한 사전 예약과 즉석 예약 간 공유 자원 관리)

  • 이동훈;김종원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.685-696
    • /
    • 2004
  • Real-time multimedia applications that require large amount of bandwidth need resource reservation before starting service for providing the QoS(i.e., Quality of Service). To reserve resources in advance, each reservation request has to notify its expectation on the required amount of resources and service duration. Using this information, a resource manager can schedule advance reservations. However, most existing resource management systems are adopting straightforward call admission control process (i.e., only immediate reservation) by checking currently available resources without considering the service duration. Hence, the resource management system that supports advance reservation has to manage confliction caused by indefinite service duration of immediate reservation. Even though the separation of resource pool according to type of reservation can prevent the confliction, it causes low resource utilization. In this paper, we propose an effective resource management scheme that supports both immediate and advance reservations by sharing resources dynamically. Using network cost function, the proposed scheme determines and adaptively adjusts resource boundary according to the confliction rate by varying weight parameters. And also, we define user utility function to quantify user satisfaction based on how well the reserved resource is guaranteed during service time. Simulation results using NS-2 network simulator show that the proposed scheme can achieve better resource utilization with preferable QoS than other schemes like static resource partitioning.

The Establishment for Technology Development Plan for National Spatial Information Infrastructure Cloud Service (국가 공간정보 인프라의 클라우드 서비스 기술개발 방안 수립)

  • Youn, Junhee;Kim, Changyoon;Moon, Hyonseok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.469-477
    • /
    • 2017
  • Cloud computing is an IT resource providing technology to various users by using virtualization technology. Newly updated spatial information may not be used by other organizations since management authorities are dispersed for Korean public spatial information. Further, the national budget is wasted since each organization independently implements renewable GIS analysis function. These problems can be solved by applying cloud service. However, research related to the application of cloud service to Korea spatial information system has been proposed in the technology development direction, and no detailed development plan has been proposed. In this paper, we deal with the establishment of a technology development plan for national spatial information infrastructure cloud service. First, we deduct the implication to derive the technology development goals by analyzing the political and technical environment. Second, technology and critical technology elements are derived to achieve the goals of the specialist's analysis based on the evaluation elements. As a result, thirteen critical technology elements are derived. Finally, thirty-one research activities, which comprise the critical technology elements, are defined. Critical technology elements and research activities derived in this research will be used for the generation of a technology development road-map.

An Energy Efficient Transmission Scheme based on Cross-Layer for Wired and Wireless Networks (유.무선 혼합망에서 Cross-Layer기반의 에너지 효율적인 전송 기법)

  • Kim, Jae-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.6
    • /
    • pp.435-445
    • /
    • 2007
  • Snoop protocol is one of the efficient schemes to compensate TCP packet loss and enhance TCP throughput in wired-cum-wireless networks. However, Snoop protocol has a problem: it cannot perform local retransmission efficiently under the bursty-error prone wireless link. To solve this problem, SACK-Aware-Snoop and SNACK mechanism have been proposed. These approaches improve the performance by using SACK option field between base station and mobile host. However in the wireless channel with high packet loss rate, SACK-Aware-Snoop and SNACK mechanism do not work well because of two reason: (a) end-to-end performance is degraded because duplicate ACKs themself can be lost in the presence of bursty error, (b) energy of mobile device and bandwidth utilization in the wireless link are wasted unnecessarily because of SACK option field in the wireless link. In this paper, we propose a new local retransmission scheme based on Cross-layer approach, called Cross-layer Snoop(C-Snoop) protocol, to solve the limitation of previous localized link layer schemes. C-Snoop protocol includes caching lost TCP data and performing local retransmission based on a few policies dealing with MAC-layer's timeout and local retransmission timeout. From the simulation result, we could see more improved TCP throughput and energy efficiency than previous mechanisms.

Two Stage Dropping Scheme Considering Latency of rtPS Class in IEEE 802.16/WiBro System (IEEE 802.16/WiBro 시스템에서의 rtPS 클래스의 지연을 고려한 두 단계 드롭 기법)

  • Baek, Joo-Young;Yoon, Jong-Pil;Kim, Sok-Hyong;Suh, Young-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.783-787
    • /
    • 2008
  • IEEE 802.16/WiBro, one of the representative Broadband Wireless Access (BWA) systems, defines QoS negotiation between BS and SS and five service classes to guarantee QoS for flows. The five service classes are UGS, ertPS, rtPS, nrtPS, and BE, but the standard does not define how to provide services to flows according to the service classes. Existing research works have been studied about the scheduler architecture to effectively utilize the IEEE 802.16/WiBro systems. These works use the original packet scheduling algorithm for service classes. However, it is necessary to consider bandwidth allocation mechanisms in scheduling algorithms since bandwidth allocation mechanisms are different according to service classes. Especially, bandwidth allocation mechanisms should be considered for the scheduling of rtPS class since rtPS class uses the polling mechanism that takes time to allocate bandwidth and has the minimum latency constraint. Therefore, we propose two stage dropping scheme for rtPS class that is sensitive to latency, and thus it reduces the wasted resources and provides efficient service to rtPS class.

A Cost-Efficient Job Scheduling Algorithm in Cloud Resource Broker with Scalable VM Allocation Scheme (클라우드 자원 브로커에서 확장성 있는 가상 머신 할당 기법을 이용한 비용 적응형 작업 스케쥴링 알고리즘)

  • Ren, Ye;Kim, Seong-Hwan;Kang, Dong-Ki;Kim, Byung-Sang;Youn, Chan-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.3
    • /
    • pp.137-148
    • /
    • 2012
  • Cloud service users request dedicated virtual computing resource from the cloud service provider to process jobs in independent environment from other users. To optimize this process with automated method, in this paper we proposed a framework for workflow scheduling in the cloud environment, in which the core component is the middleware called broker mediating the interaction between users and cloud service providers. To process jobs in on-demand and virtualized resources from cloud service providers, many papers propose scheduling algorithms that allocate jobs to virtual machines which are dedicated to one machine one job. With this method, the isolation of being processed jobs is guaranteed, but we can't use each resource to its fullest computing capacity with high efficiency in resource utilization. This paper therefore proposed a cost-efficient job scheduling algorithm which maximizes the utilization of managed resources with increasing the degree of multiprogramming to reduce the number of needed virtual machines; consequently we can save the cost for processing requests. We also consider the performance degradation in proposed scheme with thrashing and context switching. By evaluating the experimental results, we have shown that the proposed scheme has better cost-performance feature compared to an existing scheme.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.