• Title/Summary/Keyword: Internal Performance

Search Result 3,874, Processing Time 0.03 seconds

Design and Fabrication of the Triple Band(DCS, PCS, UPCS) Internal Chip Antenna (내장형 트리플(DCS, PCS, UPCS) 칩 안테나 설계 및 제작)

  • Park, Seong-Il;Park, Sung-Ha;Ko, Young-Hyuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1261-1266
    • /
    • 2009
  • In this paper, triple band mobile chip antenna for DCS(1.71${\sim}$1.88GHz) / PCS(1.75${\sim}$1.87GHz) / UPCS(1.8S${\sim}$1.99GHz) on PCB Layout is designed. To analyze the characteristics of the designed antenna, we used commerical simulation tool(HFSS). Triple and wide band characteristic could be realized the measured bandwidth(V.S.W.R<2.0) of the designed antenna operated in 1.71GHz${\sim}$1.99GHz. The size of the designed antenna is about 19mm${\times}$4mm${\times}$1.6mm, narrow bandwidth which is a defect of chip antenna is improved. And its experimental results were a good agreement with simulation performance.

A study on Influencing Factors of Knowledge Creation focus on Transactive Memory (지식성장의 영향요인에 관한 연구-분산기억중심으로)

  • Liu, Chang;Kim, Sang Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1073-1083
    • /
    • 2015
  • As an empirical study focused on how transactive memory concept influence the four processes of knowledge growth, this study aimed at explaining the function of transactive memory in the dynamic process of knowledge growth. To verify the research model, this study carried out a path analysis of 130 team memebers and as a result, part of the team transactive memory measurements does affect the knowledge growth. Consequentially, transactive memory especially based on team level, is relevant with knowledge growth. According to team level, this study targeted at the team members, and by adopting the team transactive memory concept in Cognitive Psycology, theoretically explained and analysed how to approach personal knowledge in internal organizations. To accelerate the knowledge process, the work should be modified collaboratively by trusting the team members' duty relations more than specialized knowledge. Furthermore, managers had better assign team members the work where they can make the most of their personal knowledge, and this study presented that the whole team performance could be improved by doing that.

TPKDB-tree : An Index Structure for Efficient Retrieval of Future Positions of Moving Objects (TPKDB 트리 : 이동 객체의 효과적인 미래 위치 검색을 위한 색인구조)

  • Seo Dong Min;Bok Kyoung Soo;Yoo Jae Soo;Lee Byoung Yup
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.624-640
    • /
    • 2004
  • Recently, with the rapid development of location-based techniques, index structures to efficiently manage moving objects have been required. In this paper, we propose a new spatio-temporal index structure that supports a future position retrieval and minimizes a update cost. The proposed index structure combines an assistant index structure that directly accesses current positions of moving objects with KDB-tree that is a space partitioning access method. The internal node in our proposed index structure keeps time parameters in order to support the future position retrieval and to minimize a update cost. Moreover, we propose new update and split methods to maximize the space utilization and the search performance. We perform various experiments to show that our proposed index structure outperforms the existing index structure.

A Converting Method to Simulate DEVS Models on AddSIM (컴포넌트기반 체계모의환경(AddSIM)에서 실행하기 위한 DEVS 모델 변환 방법)

  • Kim, Dohyung;Oh, Hyunshik;Park, Juhye;Park, Samjoon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.7
    • /
    • pp.488-493
    • /
    • 2015
  • An AddSIM(Adaptive distributed and parallel Simulation environment for Interoperable and reusable Models) is an integrated engagement simulation environment with high-resolution weapon system models for estimation and analysis of their performance and effectiveness. AddSIM can simultaneously handle the continuous dynamical system models based on continuous time, and command, control(C2) and network system models based on a discrete event. To accommodate legacies based on DEVS(Discrete Event System Specification) modeling, DEVS legacies must first be converted into AddSIM models. This paper describes how to implement DEVS models on AddSIM. In this study a method of mapping from hierarchical DEVS models to AddSIM players was developed: The hierarchical DEVS model should be flattened into a one layered model and four DEVS functions of the model, external transition, internal transition, output and time advance, should be mapped into functions of the AddSIM player.

Document Management Monitoring System in P2P Environment (P2P 환경에서 문서관리 모니터링 시스템)

  • Kim, Jong-Tae;Kim, Dong-Keun;Maeng, Seung-Ryol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1402-1408
    • /
    • 2013
  • Document managements are very important in internal communication for good performance on projects. In case of small scale projects, the document management criteria often have very different from each of the cooperation departments and changes of document structure of work process are frequent over a project period. In this thesis, we propose a monitoring system of document management which is based on P2P(Peer-to-Peer). The proposed monitoring system of document management, which is based on P2P, makes up for time limits and a specific work process in small scale project groups. It can be managed focusing on work process and can monitor effectively the status of creations, sharing and distributions of documents. We can be installed at a low cost by using P2P in a small scale project.

Design and Performance Evaluation of a Flash Compression Layer for NAND-type Flash Memory Systems (NAND형 플래시메모리를 위한 플래시 압축 계층의 설계 및 성능평가)

  • Yim Keun Soo;Bahn Hyokyung;Koh Kern
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.4
    • /
    • pp.177-185
    • /
    • 2005
  • NAND-type flash memory is becoming increasingly popular as a large data storage for mobile computing devices. Since flash memory is an order of magnitude more expensive than magnetic disks, data compression can be effectively used in managing flash memory based storage systems. However, compressed data management in NAND-type flash memory is challenging because it supports only page-based I/Os. For example, when the size of compressed data is smaller than the page size. internal fragmentation occurs and this degrades the effectiveness of compression seriously. In this paper, we present an efficient flash compression layer (FCL) for NAND-type flash memory which stores several small compressed pages into one physical page by using a write buffer Based on prototype implementation and simulation studies, we show that the proposed scheme offers the storage of flash memory more than $140\%$ of its original size and expands the write bandwidth significantly.

A Study on the Combustion Characteristics of the Small Scale Cyclone Incinerate System for Sludge (슬러지용 소형 사이클론 소각 시스템의 연소특성에 대한 연구)

  • Park, Woo-Cheul;Lee, Hyun-Chang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2007
  • The performance of the small scale cyclone incinerate system (100kg/hr) to process the sewage sludge containing high moisture is evaluated. The incinerate system design is based on properties of the domestic sewage sludge. The combustion characteristics of the incinerate system is tested and analyzed with the various operation conditions of the moisture level, the sludge feed rate and the auxiliary fuel feed rate. The pressure loss of the whole system is appeared relatively small of 700mmAq under the normal operating condition and the temperature distribution of the incinerator internal combustion is maintained less than 1000C. Auxiliary fuel of 4.7 1/hr is required to incinerate 100kg sludge which include 87% moisture. Because the inside temperature of the incinerator is maintained less than $1000^{\circ}C$, it is predicted that the most NOx measured is produced not from the heat during the combustion process but from the oxidation of the N ingredient in the sludge. From the component analysis of ash, the organic matter is not entirely detected. Accordingly, it is estimated that the complete combustion has been accomplished in the incinerator.

  • PDF

System Integrity Monitoring System using Kernel-based Virtual Machine (커널 기반 가상머신을 이용한 시스템 무결성 모니터링 시스템)

  • Nam, Hyun-Woo;Park, Neung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.157-166
    • /
    • 2011
  • The virtualization layer is executed in higher authority layer than kernel layer and suitable for monitoring operating systems. However, existing virtualization monitoring systems provide simple information about the usage rate of CPU or memory. In this paper, the monitoring system using full virtualization technique is proposed, which can monitor virtual machine's dynamic kernel object as memory, register, GDT, IDT and system call table. To verify the monitoring system, the proposed system was implemented based on KVM(Kernel-based Virtual Machine) with full virtualization that is directly applied to linux kernel without any modification. The proposed system consists of KvmAccess module to access KVM's internal object and API to provide other external modules with monitoring result. In experiments, the CPU utilization for monitoring operations in the proposed monitering system is 0.35% when the system is monitored with 1-second period. The proposed monitoring system has a little performance degradation.

Smart IoT Home Data Analysis and Device Control Algorithm Using Deep Learning (딥 러닝 기반 스마트 IoT 홈 데이터 분석 및 기기 제어 알고리즘)

  • Lee, Sang-Hyeong;Lee, Hae-Yeoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.4
    • /
    • pp.103-110
    • /
    • 2018
  • Services that enhance user convenience by using various IoT devices are increasing with the development of Internet of Things(IoT) technology. Also, since the price of IoT sensors has become cheaper, companies providing services by collecting and utilizing data from various sensors are increasing. The smart IoT home system is a representative use case that improves the user convenience by using IoT devices. To improve user convenience of Smart IoT home system, this paper proposes a method for the control of related devices based on data analysis. Internal environment measurement data collected from IoT sensors, device control data collected from device control actuators, and user judgment data are learned to predict the current home state and control devices. Especially, differently from previous approaches, it uses deep neural network to analyze the data to determine the inner state of the home and provide information for maintaining the optimal inner environment. In the experiment, we compared the results of the long-term measured data with the inferred data and analyzed the discrimination performance of the proposed method.

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF