• Title/Summary/Keyword: Critical path method

Search Result 224, Processing Time 0.027 seconds

A re-route method for reliable data transport in Ad Hoc Networks (Ad Hoc 망에서 신뢰성 있는 데이터 전송을 위한 경로 재설정 기법)

  • 한정안;백종근;김병기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3A
    • /
    • pp.276-287
    • /
    • 2004
  • An ad hoc network is infra(Base Sstation or Access Point) free wireless mobile communication technology. Mobile nodes function as routers and servers in ad hoc networks. Many routing protocols for ad hoc network have been proposed. If any route is broken owing to moving node, source must repair broken route again. But route repair technology after route collapses is not suitable to transmit real-time data packet for QoS guarantee. So this paper presents route repair technology that prevents route from breaking. If intermediate node moves to critical section, the node issues handoff packet and sends the packet to the next node. After next node receives handoff packet, the node broadcasts route request packet to the previous node for intermediate node. Finally, even if intermediate node moves out of the routing region, the source can continuously transmit data packets to the destination through the new path.

Development of Simulator for Designing Unidirectional AGV Systems (일방향 AGV 시스템 설계를 위한 시뮬레이터 개발)

  • Lee, Gyeong-Jae;Seo, Yoon-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.133-142
    • /
    • 2008
  • AGV systems are widely used to increase the flexibility and the efficiency of the material handling systems. AGV systems are one of critical factors which determine the overall performance of the manufacturing systems. To this end, the optimal design for AGV systems is essential. Commercial simulation software is often used as an analysis tool during the design of AGV systems, however a series of procedures are desirable to simplify the analysis processes. In this paper, we present and develop the architecture for unidirectional AGV systems simulator which is able to consider approximate optimal unidirectional flow path and various operational parameters. The designed AGV systems simulator is based on JAVA, and it is developed to support designing approximate optimal unidirectional network by using Tabu search method. In addition, it enables users to design and evaluate AGV systems and to analyze alternative solutions easily. Simulation engine is consists of layout designer, AGV operation plan designer, and integrated AGVS layout designer. Users enter their system design/operation information into input window, then the entered information is automatically utilized for modeling and simulating AGV systems in simulation engine. By this series of procedures, users can get the feed back quickly.

  • PDF

A FPGA Design of High Speed LDPC Decoder Based on HSS (HSS 기반의 고속 LDPC 복호기 FPGA 설계)

  • Kim, Min-Hyuk;Park, Tae-Doo;Jung, Ji-Won
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.11
    • /
    • pp.1248-1255
    • /
    • 2012
  • LDPC decoder architectures are generally classified into serial, parallel and partially parallel architectures. Conventional method of LDPC decoding in general give rise to a large number of computation operations, mass power consumption, and decoding delay. It is necessary to reduce the iteration numbers and computation operations without performance degradation. This paper studies horizontal shuffle scheduling(HSS) algorithm and self-correction normalized min-sum(SC-NMS) algorithm. In the result, number of iteration is half than conventional algorithm and performance is almost same between sum-product(SP) and SC-NMS. Finally, This paper implements high-speed LDPC decoder based on FPGA. Decoding throughput is 816 Mbps.

Physical protection system vulnerability assessment of a small nuclear research reactor due to TNT-shaped charge impact on its reinforced concrete wall

  • Moo, Jee Hoon;Chirayath, Sunil S.;Cho, Sung Gook
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2135-2146
    • /
    • 2022
  • A nuclear energy facility is one of the most critical facilities to be safely protected during and after operation because the physical destruction of its barriers by an external attack could release radioactivity into the environment and can cause harmful effects. The barrier walls of nuclear energy facilities should be sufficiently robust to protect essential facilities from external attack or sabotage. Physical protection system (PPS) vulnerability assessment of a typical small nuclear research reactor was carried out by simulating an external attack with a tri-nitro toluene (TNT) shaped charge and results are presented. The reinforced concrete (RC) barrier wall of the research reactor located at a distance of 50 m from a TNT-shaped charge was the target of external attack. For the purpose of the impact assessment of the RC barrier wall, a finite element method (FEM) is utilized to simulate the destruction condition. The study results showed that a hole-size of diameter 342 mm at the front side and 364 mm at the back side was created on the RC barrier wall as a result of a 143.35 kg TNT-shaped charge. This aperture would be large enough to let at least one person can pass through at a time. For the purpose of the PPS vulnerability assessment, an Estimate of Adversary Sequence Interruption (EASI) model was used, which enabled the determination of most vulnerable path to the target with a probability of interruption equal to 0.43. The study showed that the RC barrier wall is vulnerable to a TNT-shaped charge impact, which could in turn reduce the effectiveness of the PPS.

Extraction of Optimal Moving Patterns of Edge Devices Using Frequencies and Weights (빈발도와 가중치를 적용한 엣지 디바이스의 최적 이동패턴 추출)

  • Lee, YonSik;Jang, MinSeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.786-792
    • /
    • 2022
  • In the cloud computing environment, there has been a lot of research into the Fog/Edge Computing (FEC) paradigm for securing user proximity of application services and computation offloading to alleviate service delay difficulties. The method of predicting dynamic location change patterns of edge devices (moving objects) requesting application services is critical in this FEC environment for efficient computing resource distribution and deployment. This paper proposes an optimal moving pattern extraction algorithm in which variable weights (distance, time, congestion) are applied to selected paths in addition to a support factor threshold for frequency patterns (moving objects) of edge devices. The proposed algorithm is compared to the OPE_freq [8] algorithm, which just applies frequency, as well as the A* and Dijkstra algorithms, and it can be shown that the execution time and number of nodes accessed are reduced, and a more accurate path is extracted through experiments.

Real-time Data Enhancement of 3D Underwater Terrain Map Using Nonlinear Interpolation on Image Sonar (비선형 보간법을 이용한 수중 이미지 소나의 3 차원 해저지형 실시간 생성기법)

  • Ingyu Lee;Jason Kim;Sehwan Rho;Kee–Cheol Shin;Jaejun Lee;Son-Cheol Yu
    • Journal of Sensor Science and Technology
    • /
    • v.32 no.2
    • /
    • pp.110-117
    • /
    • 2023
  • Reconstructing underwater geometry in real time with forward-looking sonar is critical for applications such as localization, mapping, and path planning. Geometrical data must be repeatedly calculated and overwritten in real time because the reliability of the acoustic data is affected by various factors. Moreover, scattering of signal data during the coordinate conversion process may lead to geometrical errors, which lowers the accuracy of the information obtained by the sensor system. In this study, we propose a three-step data processing method with low computational cost for real-time operation. First, the number of data points to be interpolated is determined with respect to the distance between each point and the size of the data grid in a Cartesian coordinate system. Then, the data are processed with a nonlinear interpolation so that they exhibit linear properties in the coordinate system. Finally, the data are transformed based on variations in the position and orientation of the sonar over time. The results of an evaluation of our proposed approach in a simulation show that the nonlinear interpolation operation constructed a continuous underwater geometry dataset with low geometrical error.

Time Management Status of Small Contractors and Suggestions on Education for Time Management in Colleges (소규모 건설회사의 공정관리 현황과 대학의 공정관리 교육방안)

  • Jang, Myung-Houn;Yi, Yong-Kyu
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.413-422
    • /
    • 2016
  • A construction manager tries to complete a construction project within its duration and budget using available resources. Schedule networks such as Bar-chart and CPM(critical path method) are used to finish the project within the duration. A survey shows that small contractors prefer Microsoft Excel to commercial time management softwares to manage construction time in their fields, because the Excel is useful to control cost with schedule and few time management experts works in the small contractors. A college produces talented graduates who are able to manage time of a construction project. But the quality and quantity of college eduction for time management is insufficient. Another survey shows that majors in Architectural engineering of local national universities have the curriculum for time management, and teach mainly the theory of network scheduling and how to make the network schedule. The several majors have classes for the theory and exercise of commercial time management softwares in several majors. It is necessary to educate time management experts able to use Bar-chart and commercial time management softwares for the small contractors.

Study for Reducing Safety Distance by Installing Ammunition Storage Facility in Underground (탄약저장시설 지하화에 따른 안전거리 축소방안 연구)

  • Park, Sangwoo;Jun, Jonghoon;Choi, Hangseok;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.3
    • /
    • pp.253-260
    • /
    • 2020
  • With increasing interest in an underground-type ammunition storage facility, several design results have been provided recently. However, since not only experts in the tunnel but also military persons in charge of ammunition have not fully understood the safety distance standard, reliable design results are not being produced. In this study, the effective design method of an underground-type ammunition storage facility was provided by analyzing the current safety distance standard. First, the critical safety distances that dominate the size of construction site for underground-type ammunition storage facilities were evaluated, which are the layout of chambers and the configuration of the entrances. Then, the decreasing effect of inter-chamber distance was studied according to the rock type and the storage density of ammunition. In addition, the method of designing tunnels with parallel lines and two-floors was considered for arranging more chambers while complying with the safety distance standards. In particular, numerical simulations were carried out to determine the satisfaction of the safety distance standards when an underground-type ammunition storage facility is composed of two-floor and the decreasing effect of inter-chamber distance according to the inner explosive pressure reduction. Finally, the method to adjust the size of entrances and the path of pressure were studied for decreasing the safety distance at the entrance.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

A Study on Duration Calculation Method for Eco-Friendly Remodeling Demolition Work Using Productivity Analysis (생산성 분석에 기초한 친환경 리모델링 철거공사 기간 산출 방안)

  • Woo, Joong-Pyung;Cha, Hee-Sung;Kim, Kyung-Rai;Shin, Dong-Woo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.1
    • /
    • pp.124-132
    • /
    • 2013
  • An influx of the population to the city has soared due to industrialization. As times go by, cities become densely populated so Korean government started to construct a number of buildings including apartment housings. Because they have become functionally, structurally, esthetically deteriorated over the past two decades. some improvements are needed. There are mainly two ways to improve old buildings: remodeling and reconstruction. Between the two, the first one is more popular as it is less time-consuming and more eco-friendly. Demolition work comes first for both of them and it should not give negative effects since it is regarded as a CP(Critical path) in the overall process. For this reason, a thorough construction management must be done. The reality, however, demolition is managed by the construction manager's experiences and decisions. If the key factor of demolition which is the planning of manpower and machine equipment, is determined by unscientific and subjective judgments, its period and risk also will increase. In particular, eco-friendly demolition can be more risky because it's been rarely conducted. Therefore, scientific and objective ways of demolition management are needed. In this context, this paper aims at analyzing productivity in each process of demolition focusing on manpower and machinery equipment which are the main parts of demolition assuming that the demands of eco-friendly remodeling demolition projects will be increasing. At the same time, by estimating working period through the output, this paper would be helpful to set up the plans for overall project in earlier stage.