• Title/Summary/Keyword: Distributed architecture

Search Result 1,409, Processing Time 0.026 seconds

Robust Terrain Classification Against Environmental Variation for Autonomous Off-road Navigation (야지 자율주행을 위한 환경에 강인한 지형분류 기법)

  • Sung, Gi-Yeul;Lyou, Joon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.894-902
    • /
    • 2010
  • This paper presents a vision-based robust off-road terrain classification method against environmental variation. As a supervised classification algorithm, we applied a neural network classifier using wavelet features extracted from wavelet transform of an image. In order to get over an effect of overall image feature variation, we adopted environment sensors and gathered the training parameters database according to environmental conditions. The robust terrain classification algorithm against environmental variation was implemented by choosing an optimal parameter using environmental information. The proposed algorithm was embedded on a processor board under the VxWorks real-time operating system. The processor board is containing four 1GHz 7448 PowerPC CPUs. In order to implement an optimal software architecture on which a distributed parallel processing is possible, we measured and analyzed the data delivery time between the CPUs. And the performance of the present algorithm was verified, comparing classification results using the real off-road images acquired under various environmental conditions in conformity with applied classifiers and features. Experiments show the robustness of the classification results on any environmental condition.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Development of the Educational Simulator for the Electricity Spot Market in Korea (교육용 현물전력시장 모의 시뮬레이터)

  • Yang, Kwang-Min;Lee, Ki-Song;Park, Jong-Bae;Shin, Joong-Rhin
    • Proceedings of the KIEE Conference
    • /
    • 2004.11b
    • /
    • pp.94-96
    • /
    • 2004
  • This paper discusses the development of the educational simulator for the electricity spot market in korea. The interaction between lectures and users can be much enhanced via the web-based programs which result in the student's teaming effectiveness on an electricity spot market. However the difficulties for developing web-based application programs are that there can be the numerous unspecified users to access the application programs. To overcome the aforementioned multi-users problem and to develope the educational simulator, we have revised the system architecture, the modeling of application programs, and database which efficiently and effectively manages the complex data sets related to an electricity spot market. The developed application program is composed of the physical three tiers where the middle tier is logically divided into two kinds of application programs. The divided application programs are interconnected by using the Web-service based on XML (Extended Markup Technology) and HTTP (Hyper Text Transfer Protocol) which make it possible the distributed computing technology.

  • PDF

CACHE:Context-aware Clustering Hierarchy and Energy efficient for MANET (CACHE:상황인식 기반의 계층적 클러스터링 알고리즘에 관한 연구)

  • Mun, Chang-min;Lee, Kang-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.571-573
    • /
    • 2009
  • Mobile Ad-hoc Network(MANET) needs efficient node management because the wireless network has energy constraints. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. Previously proposed a hybrid routing CACH prolong the network lifetime and decrease latency. However the algorithm has a problem when node density is increase. In this paper, we propose a new method that the CACHE(Context-aware Clustering Hierarchy and Energy efficient) algorithm. The proposed analysis could not only help in defining the optimum depth of hierarchy architecture CACH utilize, but also improve the problem about node density.

  • PDF

Numerical analysis of NOx reduction for compact design in marine urea-SCR system

  • Choi, Cheolyong;Sung, Yonmo;Choi, Gyung Min;Kim, Duck Jool
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.7 no.6
    • /
    • pp.1020-1033
    • /
    • 2015
  • In order to design a compact urea selective catalytic reduction system, numerical simulation was conducted by computational fluid dynamics tool. A swirl type static mixer and a mixing chamber were considered as mixing units in the system. It had great influence on flow characteristics and urea decomposition into ammonia. The mixer caused flow recirculation and high level of turbulence intensity, and the chamber increased residence time of urea-water-solution injected. Because of those effects, reaction rates of urea decomposition were enhanced in the region. When those mixing units were combined, it showed the maximum because the recirculation zone was significantly developed. $NH_3$ conversion was maximized in the zone due to widely distributed turbulence intensity and high value of uniformity index. It caused improvement of $NO_x$ reduction efficiency of the system. It was possible to reduce 55% length of the chamber and connecting pipe without decrease of $NO_x$ reduction efficiency.

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks

  • Xiao, Xin;Zhang, Ruirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2732-2753
    • /
    • 2019
  • With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.

Influence of sine material gradients on delamination in multilayered beams

  • Rizov, Victor I.
    • Coupled systems mechanics
    • /
    • v.8 no.1
    • /
    • pp.1-17
    • /
    • 2019
  • The present paper deals with delamination fracture analyses of the multilayered functionally graded non-linear elastic Symmetric Split Beam (SSB) configurations. The material is functionally graded in both width and height directions in each layer. It is assumed that the material properties are distributed non-symmetrically with respect to the centroidal axes of the beam cross-section. Sine laws are used to describe the continuous variation of the material properties in the cross-sections of the layers. The delamination fracture is analyzed in terms of the strain energy release rate by considering the balance of the energy. A comparison with the J-integral is performed for verification. The solution derived is used for parametric analyses of the delamination fracture behavior of the multilayered functionally graded SSB in order to evaluate the effects of the sine gradients of the three material properties in the width and height directions of the layers and the location of the crack along the beam width on the strain energy release rate. The solution obtained is valid for two-dimensional functionally graded non-linear elastic SSB configurations which are made of an arbitrary number of lengthwise vertical layers. A delamination crack is located arbitrary between layers. Thus, the two crack arms have different widths. Besides, the layers have individual widths and material properties.

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

Implementation of a Raspberry-Pi-Sensor Network (라즈베리파이 센서 네트워크 구현)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.915-916
    • /
    • 2014
  • With the upcoming era of internet of things, the study of sensor network has been paid attention. Raspberry pi is a tiny versatile computer system which is able to act as a sensor node in hadoop cluster network. In this paper, we deployed 5 Raspberry pi's to construct an experimental testbed of hadoop sensor network with 5-node map-reduce hadoop software framework. We compared and analyzed the network architecture in terms of efficiency, resource management, and throughput using various parameters. We used a learning machine with support vector machine as test workload. In our experiments, Raspberry pi fulfilled the role of distributed computing sensor node in the sensor network.

  • PDF

Crushing study for interlocked armor layers of unbonded flexible risers with a modified equivalent stiffness method

  • Ren, Shaofei;Liu, Wencheng;Song, Ying;Geng, Hang;Wu, Fangguang
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.11 no.1
    • /
    • pp.521-529
    • /
    • 2019
  • Interlocked armor layers of unbonded flexible risers may crush when risers are being launched. In order to predict the behavior of interlocked armor layers, they are usually simplified as rings with geometric and contact nonlinearity ignored in the open-literature. However, the equivalent thickness of the interlocked armor layer has not been addressed yet. In the present paper, a geometric coefficient ${\gamma}$ is introduced to the equivalent stiffness method, and a linear relationship between ${\gamma}$ and geometric parameters of interlocked armor layers is validated by analytical and finite element models. Radial stiffness and equivalent thickness of interlocked armor layers are compared with experiments and different equivalent methods, which show that the present method has a higher accuracy. Furthermore, hoop stress distribution of interlocked armor layer under crushing is predicted, which indicates the interlocked armor layer can be divided into two compression and two expansion zones by four symmetrically distributed singular points.