• Title/Summary/Keyword: Centralized system

Search Result 697, Processing Time 0.024 seconds

Development of the Centralized Monitoring and Control System for Absorption Chillier-heaters

  • Lee, Ji-Hyung;Ryu, Sang-Hun;Park, In-Wan
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.66.2-66
    • /
    • 2001
  • Double-effect absorption chiller-heaters have been widely installed in large buildings and are also becoming popular in mid-sized commercial buildings. While much emphasis is Put on designing energy saving and efficient chiller-heaters, careful attention must also be given to the design of control systems for these devices. Currently, these devices are controlled by their own built-in controllers, such as relay based sequence controller or microprocessor based controller. But, because large buildings require multiple chiller-heaters, a centralized supervision and control system is necessary for the efficient monitoring, control, and operations management of these devices We have developed man-machine interface software that allows the implementation of such a system. This system will support increased reliability, more efficient building management operations, and reduced ...

  • PDF

THE PROVISION OF QUALITY AND SAFE FOODS IN SCHOOL LUNCH PROGRAM THROUGH CENTRALIZED FOOD PRODUCTION TECHNOLOGIES

  • Clara, M.L.;Rdn, Pi-Ms
    • Proceedings of the KSCN Conference
    • /
    • 1998.08a
    • /
    • pp.21-30
    • /
    • 1998
  • Sound nutrition is the basic foundation for the health of a population. Proper nutrition education through the school system can actualize the building of sound nutrition being provided at school lunch programs along with nutrition education can have far reaching impact to the health of the whole nation. In Hong Kong, the recent change over from a half day to full day school program signaled the need for a school lunch program. However, there has been no organized effort so far in Hong Kong to provide such service. School lunches are being provided by caterers who are more concerned about profits than food safetly. Alarming rates of food poisoning occurring recently in Taiwan school has further accentuated the importance of fool safety. With the advent of centralized food production technologies, Dietirians can apply their nutrition knowledge and integrate with food production processes such that safe, healthy and nutritious mcals can be produced in large quantities in a cost-effective manner serving he needs of the school children. This paper introduces the centralized food production concept, using some of the cool chill production centers for school lunch programs in the United States as examples to discuss how new technologies and management system can be integrated to yield the best outcome in food quality and safety.

  • PDF

Capacity Analysis of Centralized Cognitive Radio Networks for Best-effort Traffics

  • Lin, Mingming;Hong, Xuemin;Xiong, Jin;Xue, Ke;Shi, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2154-2172
    • /
    • 2013
  • A centralized cognitive radio (CR) network is proposed and its system capacity is studied. The CR network is designed with power control and multi-user scheduling schemes to support best-effort traffics under peak interference power constraints. We provide an analytical framework to quantify its system capacity, taking into account various key factors such as interference constraints, density of primary users, cell radius, the number of CR users, and propagations effects. Furthermore, closed-form formulas are derived for its capacities when only path loss is considered in the channel model. Semi-analytical expressions for the capacities are also given when more realistic channel models that include path loss, shadowing, and small-scale fading are used. The accuracy of the proposed analytical framework is validated by Monte Carlo simulations. Illustrated with a practical example, the provided analytical framework is shown to be useful for the strategic planning of centralized CR networks.

A Study on the Improvement of Performance for Centralized Air Conditioning System by Using Air-Cooled Air Conditioner - The Case of Mokpo National Maritime University - (공랭식 에어컨을 이용한 중앙 집중 공조시스템의 성능 개선에 관한 연구 - 실습선 새누리호를 중심으로 -)

  • Kim, Hong-Ryel;Han, Seung-Hun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.2
    • /
    • pp.207-212
    • /
    • 2013
  • In this study, distributed the ship's Centralized Air Conditioning System the way an individual to replace the air conditioning system by using Air-cooled air conditioner. Research results, Individually separated air conditioning system complement the heat source control and thermal efficiency problems and improves the efficiency of the device was confirmed. In addition, under the same conditions refrigeration capacity and coefficient of performance of the device, an average of about 3 %, 23 ~ 26 %, higher, Chilled Water Plants Compressor power consumption is about 12 % lower. Also while heating under the same conditions, power consumption is about 33.5 % lower. Therefore Individually Separated Air Conditioning System greatly contributed to the improved performance of the device and living spaces for comfortable temperature and humidity control as well as heating source could be obtained.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

The Relationship of Information System Resources distribution Between the System Plan.Control and System Development and System Operation (시스템 계획 및 통제, 개발, 운영 차원에서의 정보시스템 자원 분산화에 관한 연구)

  • Jung Lee-Sang;Han Jung-Hee
    • Management & Information Systems Review
    • /
    • v.2
    • /
    • pp.133-167
    • /
    • 1998
  • This article discusses the findings of an empirical study conducted on 62 large organizations. The major purpose of the study was to analyze the relationship of Information System Resources distribution between the system plan control and system development and system operation. In this study information system resource is broadly Identified by computer hardware, software, data, procedure, operator. Because of the real centralization/decentralization issue facing organizations is much broader then the choice between alternative computer hardware configurations. And there are three separate resources of the information system that can be decentralized system plan and control, system development, system operations. The decision regarding how to organize each of these three separate resources is based on a different set of criteria. Furthermore, each decision can be made relatively independently of the others. In this article the results of a study are indicated below. In the degree of decentralization of information system resources between system plan control and system development and system operations were found the positive relationship. Therefore, the more information system resources are decentralized in the one dimension, the more information system resources are decentralized in the other dimensions, and the more information system resources are centralized in the one dimension, the more information system resources are centralized in the other dimensions.

  • PDF

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

The impact of distributed/open architecture on Seoul regional control center SCADA system of KEPCO (한국전력 서울지역급전소 SCADA 시스템의 분산/개방형 구조)

  • 김용팔
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10a
    • /
    • pp.1147-1154
    • /
    • 1993
  • This paper introduces a case of SCADA System replacing from centralized processing system to distributed/open architecture system. The cons and pros of the distinctive two system configurations were studied and the requirements of new system that would be enable to easily follow 21 century's technical and operational inovation were presented.

  • PDF

A Data Fusion Algorithm of the Nonlinear System Based on Filtering Step By Step

  • Wen Cheng-Lin;Ge Quan-Bo
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.2
    • /
    • pp.165-171
    • /
    • 2006
  • This paper proposes a data fusion algorithm of nonlinear multi sensor dynamic systems of synchronous sampling based on filtering step by step. Firstly, the object state variable at the next time index can be predicted by the previous global information with the systems, then the predicted estimation can be updated in turn by use of the extended Kalman filter when all of the observations aiming at the target state variable arrive. Finally a fusion estimation of the object state variable is obtained based on the system global information. Synchronously, we formulate the new algorithm and compare its performances with those of the traditional nonlinear centralized and distributed data fusion algorithms by the indexes that include the computational complexity, data communicational burden, time delay and estimation accuracy, etc.. These compared results indicate that the performance from the new algorithm is superior to the performances from the two traditional nonlinear data fusion algorithms.

An Operation of Cloud System for the Centralization Services of Business Documents (업무문서 중앙화 서비스 제공을 위한 클라우드 시스템 운영방안)

  • Yoon, Yong;Kim, Younsung
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.309-324
    • /
    • 2014
  • This case study focuses on the preparing a guide for the plan to the companies that want to build a business document system for the centralized services under the cloud computing. Total 3 Operating companies with regard to cloud computing issues are introduced for this purpose. Analyzing the usage and development direction of the selected companies were performed to set up plans. Through this in-depth needs of the user's point of view for the management of business documents, The necessary improvements in the process of collaboration and document sharing were derived. Business documents centralized service plans were proposed based on cloud computing models. Practical experiences of the companies were helpful to present the details of the operational strategy and operational plans. Especially with minimal staff input and verification process, Sample method for the automatic generating of the new document file name is introduced. A test bed before operating the enterprise-wide system were presented with information that is to be considered when building systems.