• Title/Summary/Keyword: Information Delay

Search Result 5,532, Processing Time 0.035 seconds

A Finite Memory Structure Smoothing Filter and Its Equivalent Relationship with Existing Filters (유한기억구조 스무딩 필터와 기존 필터와의 등가 관계)

  • Kim, Min Hui;Kim, Pyung Soo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.2
    • /
    • pp.53-58
    • /
    • 2021
  • In this paper, an alternative finite memory structure(FMS) smoothing filter is developed for discrete-time state-space model with a control input. To obtain the FMS smoothing filter, unbiasedness will be required beforehand in addition to a performance criteria of minimum variance. The FMS smoothing filter is obtained by directly solving an optimization problem with the unbiasedness constraint using only finite measurements and inputs on the most recent window. The proposed FMS smoothing filter is shown to have intrinsic good properties such as deadbeat and time-invariance. In addition, the proposed FMS smoothing filter is shown to be equivalent to existing FMS filters according to the delay length between the measurement and the availability of its estimate. Finally, to verify intrinsic robustness of the proposed FMS smoothing filter, computer simulations are performed for a temporary model uncertainty. Simulation results show that the proposed FMS smoothing filter can be better than the standard FMS filter and Kalman filter.

Design and Analysis of Cell Controller Operation for Heat Process (열공정에 대한 셀 콘트롤러 운영의 설계와 해석)

  • So, Ye In;Jeon, Sang June;Kim, Jeong Ho
    • Journal of Platform Technology
    • /
    • v.8 no.2
    • /
    • pp.22-31
    • /
    • 2020
  • The construction and operation of industrial automation has been actively taking place from manufacturing plan to production for improving operational efficiency of production line and flexibility of equipment. ISO/TC184 is standardizing on operating methods that can share information of programmable device controllers such as PLC and IoT that are geographically distributed in the production line. In this study, the design of the cell controller consists of PLC group and IoT group that perform signals such as temperature sensors, gas sensors, and pressure sensors for thermal processes and corresponding motors or valves. The operation and analysis of the cell controller were performed using SDN(Software Defined Network) and the three types of process services performed in thermal processes are real-time transmission service, loss-sensitive large-capacity transmission service, and normal transmission service. The simulation result showed that the average loss rate improved by about 17% when the traffic increased before and after the application of the SDN route technique, and the delay in the real-time service was as low as 1 ms.

  • PDF

A Routing Algorithm based on Deep Reinforcement Learning in SDN (SDN에서 심층강화학습 기반 라우팅 알고리즘)

  • Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1153-1160
    • /
    • 2021
  • This paper proposes a routing algorithm that determines the optimal path using deep reinforcement learning in software-defined networks. The deep reinforcement learning model for learning is based on DQN, the inputs are the current network state, source, and destination nodes, and the output returns a list of routes from source to destination. The routing task is defined as a discrete control problem, and the quality of service parameters for routing consider delay, bandwidth, and loss rate. The routing agent classifies the appropriate service class according to the user's quality of service profile, and converts the service class that can be provided for each link from the current network state collected from the SDN. Based on this converted information, it learns to select a route that satisfies the required service level from the source to the destination. The simulation results indicated that if the proposed algorithm proceeds with a certain episode, the correct path is selected and the learning is successfully performed.

Study of the mechanical properties and effects of particles for oxide dispersion strengthened Zircaloy-4 via a 3D representative volume element model

  • Kim, Dong-Hyun;Hong, Jong-Dae;Kim, Hyochan;Kim, Jaeyong;Kim, Hak-Sung
    • Nuclear Engineering and Technology
    • /
    • v.54 no.5
    • /
    • pp.1549-1559
    • /
    • 2022
  • As an accident tolerant fuel (ATF) concept, oxide dispersion strengthened Zircaloy-4 (ODS Zry-4) cladding has been developed to enhance the mechanical properties of cladding using laser processing technology. In this study, a simulation technique was established to investigate the mechanical properties and effects of Y2O3 particles for the ODS Zry-4. A 3D representative volume element (RVE) model was developed considering the parameters of the size, shape, distribution and volume fraction (VF) of the Y2O3 particles. From the 3D RVE model, the Young's modulus, coefficient of thermal expansion (CTE) and creep strain rate of the ODS Zry-4 were effectively calculated. It was observed that the VF of Y2O3 particles had a significant effect on the aforementioned mechanical properties. In addition, the predicted properties of ODS Zry-4 were applied to a simulation model to investigate cladding deformation under a transient condition. The ODS Zry-4 cladding showed better performance, such as a delay in large deformation compared to Zry-4 cladding, which was also found experimentally. Accordingly, it is expected that the simulation approach developed here can be efficiently employed to predict more properties and to provide useful information with which to improve ODS Zry-4.

UAV-MEC Offloading and Migration Decision Algorithm for Load Balancing in Vehicular Edge Computing Network (차량 엣지 컴퓨팅 네트워크에서 로드 밸런싱을 위한 UAV-MEC 오프로딩 및 마이그레이션 결정 알고리즘)

  • A Young, Shin;Yujin, Lim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.437-444
    • /
    • 2022
  • Recently, research on mobile edge services has been conducted to handle computationally intensive and latency-sensitive tasks occurring in wireless networks. However, MEC, which is fixed on the ground, cannot flexibly cope with situations where task processing requests increase sharply, such as commuting time. To solve this problem, a technology that provides edge services using UAVs (Unmanned Aerial Vehicles) has emerged. Unlike ground MEC servers, UAVs have limited battery capacity, so it is necessary to optimize energy efficiency through load balancing between UAV MEC servers. Therefore, in this paper, we propose a load balancing technique with consideration of the energy state of UAVs and the mobility of vehicles. The proposed technique is composed of task offloading scheme using genetic algorithm and task migration scheme using Q-learning. To evaluate the performance of the proposed technique, experiments were conducted with varying mobility speed and number of vehicles, and performance was analyzed in terms of load variance, energy consumption, communication overhead, and delay constraint satisfaction rate.

Data Central Network Technology Trend Analysis using SDN/NFV/Edge-Computing (SDN, NFV, Edge-Computing을 이용한 데이터 중심 네트워크 기술 동향 분석)

  • Kim, Ki-Hyeon;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.3
    • /
    • pp.1-12
    • /
    • 2019
  • Recently, researching using big data and AI has emerged as a major issue in the ICT field. But, the size of big data for research is growing exponentially. In addition, users of data transmission of existing network method suggest that the problem the time taken to send and receive big data is slower than the time to copy and send the hard disk. Accordingly, researchers require dynamic and flexible network technology that can transmit data at high speed and accommodate various network structures. SDN/NFV technologies can be programming a network to provide a network suitable for the needs of users. It can easily solve the network's flexibility and security problems. Also, the problem with performing AI is that centralized data processing cannot guarantee real-time, and network delay occur when traffic increases. In order to solve this problem, the edge-computing technology, should be used which has moved away from the centralized method. In this paper, we investigate the concept and research trend of SDN, NFV, and edge-computing technologies, and analyze the trends of data central network technologies used by combining these three technologies.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

Measuring and unfolding fast neutron spectra using solution-grown trans-stilbene scintillation detector

  • Nguyen Duy Quang;HongJoo Kim;Phan Quoc Vuong;Nguyen Duc Ton;Uk-Won Nam;Won-Kee Park;JongDae Sohn;Young-Jun Choi;SungHwan Kim;SukWon Youn;Sung-Joon Ye
    • Nuclear Engineering and Technology
    • /
    • v.55 no.3
    • /
    • pp.1021-1030
    • /
    • 2023
  • We propose an overall procedure for measuring and unfolding fast neutron spectra using a trans-stilbene scintillation detector. Detector characterization was described, including the information on energy calibration, detector resolution, and nonproportionality response. The digital charge comparison method was used for the investigation of neutron-gamma Pulse Shape Discrimination (PSD). A pair of values of 600 ns pulse width and 24 ns delay time was found as the optimized conditions for PSD. A fitting technique was introduced to increase the trans-stilbene Proton Response Function (PRF) by 28% based on comparison of the simulated and experimental electron-equivalent distributions by the Cf-252 source. The detector response matrix was constructed by Monte-Carlo simulation and the spectrum unfolding was implemented using the iterative Bayesian method. The unfolding of simulated and measured spectra of Cf-252 and AmBe neutron sources indicates reliable, stable and no-bias results. The unfolding technique was also validated by the measured cosmic-ray induced neutron flux. Our approach is promising for fast neutron detection and spectroscopy.

Efficient Access Management Scheme for Machine Type Communications in LTE-A Networks (LTE-A 네트워크 환경에서 MTC를 위한 효율적인 접근관리 기법)

  • Moon, Jihun;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.287-295
    • /
    • 2017
  • Recently, MTC (Machine Type Communication) is known as an important part to support IoT (Internet of Things) applications. MTC provides network connectivities between MTC devices without human intervention. In MTC, a large number of devices try to access over communication resource with a short period of time. Due to the limited communication resource, resource contention becomes severe and it brings about access failures of devices. To solve the problem, it needs to regulate device accesses. In this paper, we present an efficient access management scheme. We measure the number of devices which try to access in a certain time period and predict the change of the number of devices in the next time period. Using the predicted change, we control the number of devices which try to access. To verify our scheme, we conduct experiments in terms of success probability, failure probability, collision probability and access delay.

Use of non-Tariff Barriers for protection of domestic industries and its implications: focusing on the Chinese Cosmetic Certification System (자국 산업보호를 위한 비관세장벽 활용과 시사점: 중국 화장품 인증제도를 중심으로)

  • Yoon, Sung-Wook;Lee, Handara
    • Korea Trade Review
    • /
    • v.43 no.6
    • /
    • pp.113-138
    • /
    • 2018
  • The purpose of this research is to analyze how the Chinese cosmetics certification system works as a Non-Tariff Barriers(NTBs) for Korean exporting companies to access the Chinese market. China is the largest market for Korea's cosmetic exports, but China's policy of protecting domestic industry has become a barrier to Korea's cosmetics exports to China. Therefore, this research, through the analysis of regulations of the Chinese certification system for imported cosmetics. revealed that there are such problems as ① information leakage ② duplication of inspection ③time delay. In order to verify those problems, surveys and face-to-face interviews with Korean cosmetic exporting companies to China have been conducted. In conclusion, Chinese cosmetics certification system not only protects its own industry, but also serves as a NTBs to disturb the access of imported cosmetics to the Chinese market in order to foster Chinese cosmetic industry.