• 제목/요약/키워드: Event Oriented

검색결과 208건 처리시간 0.027초

무선 센서네트워크 환경에서 Duty Cycle 기반 동기식 및 비동기식 MAC 프로토콜의 에너지 성능과 지연시간에 대한 상호 분석 (The Energy Performance Analysis Between Synchronous and Asynchronous Duty Cycle based MAC Protocols in Wireless Sensor Networks)

  • 이재호;엄두섭
    • 한국IT서비스학회지
    • /
    • 제10권3호
    • /
    • pp.237-250
    • /
    • 2011
  • Recently, Wireless Sensor Networks (WSN) require energy performance and guaranteed delivery delay time, contrarily with previous MAC protocols that aim to high throughput mostly. In order to satisfy the new significant requirements, many MAC protocols of WSN employ and try to enhance the duty cycle mechanism which is energy efficient technique in MAC layer. This duty cycle mechanism is oriented by toggling the transceiver conditions composed of wakeup and sleep states. The synchronous MAC protocols perform the period synchronization process. Hence, these are energy efficient in periodic monitoring environment, but are inefficient in where an event is incurred rarely and infrequently. Otherwise, the performance of asynchronous MAC protocols are contrarily with synchronous protocols. In this paper, we design two models consisting Always-busy and Always-idle ti simplify the general network congestion conditions. Through these models, moreover, we analyze two types MAC protocols in terms of energy efficiency and delay performance by analytical results. Additionally, we also evaluate two MAC protocols with two gongestion models that we designed. By the analytical and simulated results, we provide the general and efficient decision method in which protocols are more appropriate in a certain WSN environment.

조선 CIMS를 위한 용접정보 시스템 개발에 관한 연구 (Study on the Development of Welding Information System for CIMS in Shipbuilding)

  • 강병윤;박주용;엄동석
    • Journal of Welding and Joining
    • /
    • 제14권6호
    • /
    • pp.119-130
    • /
    • 1996
  • 용접은 조선공업의 핵심기술의 하나로서 용접작업의 장치화와 자동화를 통한 생산성 향상은 선박의 건조비 절감에 기여하는 바가 크다. 용접의 품질과 생산성은 엔지니어링 부서로부터 제공되는 관련정보의 질과 적합성에 많이 의존한다. 본고는 선박의 설계에서 생산에 이르기까지의 정보를 통합한 조선 CIMS구축에 활용될 수 있는 선박 용접 정보 시스템에 관하여 연구하였다. 이를 위하여 기존 용접정보의 생성과정과 내용을 체계적으로 분석하고 객체지향기법을 적용하여 복잡 다양한 선박의 용접 정보를 모델링 하였다. 또 이들 객체지향 모델을 지원하면서 방대한 양의 선박 용접정보를 신속하고 정확하게 처리하는 데이터베이스를 구축하였다. 개발시스템은 산적화물선을 대상으로 하였으며 사건구동 방식의 프로그래밍 기법을 적용하고 그래픽 사용자 환경을 구현하여 사용자의 편의성을 제고하였다.

  • PDF

Development of Advanced Annunciator System for Nuclear Power Plants

  • Hong, Jin-Hyuk;Park, Seong-Soo;Chang, Soon-Heung
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1995년도 추계학술발표회논문집(1)
    • /
    • pp.185-190
    • /
    • 1995
  • Conventional alarm system has many difficulties in the operator's identifying the plant status during special situations such as design basis accidents. To solve the shortcomings, an on-line alarm annunciator system, called dynamic alarm console (DAC), was developed. In the DAC, a signal is generated as alarm by the use of an adaptive setpoint check strategy based on operating mode, and time delay technique is used not to generate nuisance alarms. After alarm generation, if activated alarm is a level precursor alarm or a consequencial alarm, it would be suppressed, and the residual alarms go through dynamic prioritization which provide the alarms with pertinent priorities to the current operating mode. Dynamic prioritization is achieved by going through the system- and mode-oriented prioritization. The DAC has the alarm hierarchical structure based on the physical and functional importance of alarms. Therefore the operator can perceive alarm impacts on the safety or performance of the plant with the alarm propagation from equipment level to plant functional level. In order to provide the operator with the most possible cause of the event and quick cognition of the plant status even without recognizing the individual alarms, reactor trip status tree (RTST) was developed. The DAC and the RTST have been simulated with on-line data obtained from the full-scope simulator for several abnormal cases. The results indicated that the system can provide the operator with useful and compact information fur the earlier termination and mitigation of an abnormal state.

  • PDF

3D 모델링 기반 빌딩관제시스템의 설계 및 구현 (Design and Implementation of Building Control System based 3D Modeling)

  • 문상호;김병목;이계은
    • 한국멀티미디어학회논문지
    • /
    • 제23권5호
    • /
    • pp.673-682
    • /
    • 2020
  • Buildings are becoming more and more high-rise and large-scale in recent years, so in the event of a disaster such as a fire, enormous human and economic damage is expected. Therefore, management, security, and fire control are essential for large buildings in the city. Because these large buildings are very complex outside and inside, they need a three-dimensional control based on 3D modeling rather than a simple flat-oriented control. To do this, this paper designed and implemented a building control system based on 3D modeling. Specifically, we designed a 3D building / facility editing module for 3D modeling of buildings, a 3D based control module for building control, and a linkage module that connects information such as firefighting equipment, electrical equipment and IoT equipment. Based on this design, a building control system based on 3D modeling was implemented.

RSS 구독 시스템을 위한 패키지의 설계 (A Package Design for RSS Reader Systems)

  • 이동규;김윤호
    • 한국정보통신학회논문지
    • /
    • 제10권12호
    • /
    • pp.2140-2150
    • /
    • 2006
  • RSS 구독기는 웹에서 배포하고 많고 자주 변하는 RSS 포맷의 콘텐츠를 수집하여 구독자가 쉽게 구독할 수 있도록 도와주는 소프트웨어 애플리케이션이다. 본 논문에서는 RSS 구독기의 구현을 위하여 RUP 객체지향 설계 방법론에 의거한 체계적인 소프트웨어 설계를 제시하고자 한다. RSS 구독기의 구현을 위한 요구사항을 기초로 하여 유스케이스를 추출하고, 도메인 컨셉 모델을 제시한다. 이들을 바탕으로 사용자와 RSS 구독기간에 발생하는 이벤트와 논리적 아키텍처를 추출하여 RSS 구독기의 클래스와 패키지를 설계 한다. 아직 초기에 있는 RSS 구독기에 대한 체계적인 설계 방법이 제시됨으로서, 이에 기반한 다양한 특성의 기능을 가진 RSS 구독기의 손쉬운 제작이 가능하다.

클라우드 기반 센서 데이터 관리 시스템 설계 및 구현 (Design and Implementation of Cloud-based Sensor Data Management System)

  • 박경욱;김경옥;반경진;김응곤
    • 한국전자통신학회논문지
    • /
    • 제5권6호
    • /
    • pp.672-677
    • /
    • 2010
  • 최근 대규모 센서 네트워크의 구축이 증가하면서 대규모의 센서 데이터를 효율적으로 관리하는 시스템이 요구되고 있다. 본 논문에서는 저비용, 높은 확장성 그리고 고 효율성을 지닌 클라우드 기반의 센서 데이터 관리 시스템을 제안한다. 제안된 시스템에서는 센서 데이터는 클라우드 게이트웨이를 통해 클라우드로 전송되며 이때 이상상황 검출과 이벤트 처리가 수행된다. 클라우드로 전송된 센서 데이터는 분산 컬럼 지향 데이터 베이스인 하둡 HBase에 저장되며 맵리듀스 모델 기반의 질의처리 모듈을 통해 병렬 처리된다. 처리된 결과는 REST 기반의 웹서비스를 통해 제공되므로 다양한 플랫폼의 응용프로그램과 연동이 가능하다.

무기체계 시험평가의 신뢰성 향상방안 (The Action of the Reliability Enhancement in Test and Evaluation of the Weapon Systems)

  • 박종완
    • 한국신뢰성학회지:신뢰성응용연구
    • /
    • 제15권2호
    • /
    • pp.108-123
    • /
    • 2015
  • Test and Evaluation (T&E) have been verifying the level of it's technological skill and the needed operational status of the development weapons. If the overall spectrum of test and evaluation is fulfilled substantially in the production & deployment, the needed level of the weapon system will be enhanced and also the reliability status will become higher considerably. We can know currently these issues through the mass media and all kinds of the news regarding the defense industry and programs. And so this article have studied the method of enhancing reliability of the test and evaluation, the 6 variables were selected through the discussion of the professional group. The the test and evaluation group needs consistently the professional training systems. After DT&E, we have to the event to verify the technical level of the development systems. We have to take the high level of the kinds of the environmental test. Scientific methods like system engineering will be adapted in process of the test and evaluation. The number of suitable test prototype in the test and evaluation is analysed more systematically. And we need to establish the standardization of the test and evaluation. If 6 variables are well analysed and adapted in the working field, the reliability of the test and evaluation will be considerably, the defense industry will take the chance to develope the future-oriented.

Probabilistic estimation of seismic economic losses of portal-like precast industrial buildings

  • Demartino, Cristoforo;Vanzi, Ivo;Monti, Giorgio
    • Earthquakes and Structures
    • /
    • 제13권3호
    • /
    • pp.323-335
    • /
    • 2017
  • A simplified framework for the probabilistic estimation of economic losses induced by the structural vulnerability in single-story and single-bay precast industrial buildings is presented. The simplifications introduced in the framework are oriented to the definition of an expeditious procedure adoptable by government agencies and insurance companies for preliminary risk assessment. The economic losses are evaluated considering seismic hazard, structural response, damage resulting from the structural vulnerability and only structural-vulnerability-induced e]conomic losses, i.e., structural repair or reconstruction costs (stock and flow costs) and content losses induced by structural collapse. The uncertainties associated with each step are accounted for via Monte Carlo simulations. The estimation results in a probabilistic description of the seismic risk of portal-like industrial buildings, expressed in terms of economic losses for each occurrence (i.e., seismic event) that owners (i.e., insured) and stakeholders can use to make risk management decisions. The outcome may also be useful for the definition of the insurance premiums and the evaluation of the risks and costs for the owner corresponding to the insurance industrial costs. A prototype of a precast concrete industrial building located in Mirandola, Italy, hit by the 2012 Emilia earthquake, is used as an example of the application of the procedure.

오뜨꾸뛰르(Haute Couture) 작품에 표현된 현대패션의 경향 연구 (A Study on Contemporary Fashion Expressed in Haute Couture)

  • 김선영;임영자
    • 복식
    • /
    • 제51권6호
    • /
    • pp.147-165
    • /
    • 2001
  • Haute couture denotes a luxurious made-to-order dressmaker's shop. In principle, it refers to a place that is registered with the Paris Apparel Association and has met the size and criteria specified by the association. The features of modern fashion expressed in haute couture have been contemplated by categorizing them into mixed impression appearing in haute couture work pieces. turning the collection event into a spectacle and commercialization for the succession of haute couture. Mixed impression manifested in the haute couture has engendered (1) the creative and dynamic feature (2) eclecticism with popular culture (3) mixed impression of reactionism (4) ethnic characteristics. From the above considerations, one could say that the factors drive the very existence of haute couture and comprise three elements of impeccable backgrounds, They are (1) organizing ability and protective policies of the French fashion industry, (2) relentless experimental spirit of the haute couture designers and (3) Paris that supports creativity and fashion fabrication, have coincided with rising up of the value of persistence on originality of work pieces in accordance with diversifying cultural transformations. consumer-oriented patterns by way of capital symbolized by consumers and restructuring of company operation by each shop. This report describes comprehensive understanding of haute couture, creativity and dynamic power of the haute couture work pieces. Akin to the efforts to maintain the existence of high-grade cultures throughout the overall cultures themselves, haute couture, on the basis of these factors, should also become the motive power through which luxurious culture in fashion is created in the days ahead.

  • PDF

네트워크 보안을 위한 침입차단 시스템과 운영체제 보안 기능 모델링 및 시뮬레이션 (Modeling and Simulation of Firewall System and Security Functions of Operating System for Network Security)

  • 김태헌;이원영;김형종;김홍근;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제11권2호
    • /
    • pp.1-16
    • /
    • 2002
  • The need for network security is being increasing due to the development of information communication and internet technology. In this paper, firewall models, operating system models and other network component models are constructed. Each model is defined by basic or compound model, referencing DEVS formalism. These models and the simulation environment are implemented with MODSIM III, a general purpose, modular, block-structured high-level programming language which provides direct support for object-oriented programming and discrete-event simulation. In this simulation environment with representative attacks, the following three attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service, Mail bomb attack as an attack type of e-mail. The simulation is performed with the models that exploited various security policies against these attacks. The results of this study show that the modeling method of packet filtering system, proxy system, unix and windows NT operating system. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF