• Title/Summary/Keyword: Network theory

Search Result 1,835, Processing Time 0.034 seconds

Probability Distribution of Project Completion Times in Simulation based Scheduling (시뮬레이션 일정기법;최종공사기간의 확률 통계적 특성 추정)

  • Lee, Dong-Eun;Kim, Ryul-Hee
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.327-330
    • /
    • 2007
  • This paper verifies that the normality assumption that the simulation output data, Project Completion Times (PCTs), follow normal distribution is not always acceptable and the existing belief may lead to misleading results. A risk quantification method, which measures the effect caused by the assumption, relative to the probability distribution of PCTs is implemented as an algorithm in MATLAB. To validate the reliability of the quantification, several series of simulation experiments have been carried out to analyze a set of simulation output data which are obtained from different type of Probability Distribution Function (PDF) assigned to activities'duration in a network. The method facilitates to find the effect of PDF type and its parameters. The procedure necessary for performing the risk quantification method is described in detail along with the findings. This paper contributes to improving the reliability of simulation based scheduling method, as well as increasing the accuracy of analysis results.

  • PDF

A State Management MAC Protocol for Vehicle to Vehicle Communication Using Directional Antenna (차량 간 통신 환경에 적합한 방향성 안테나를 이용한 상태관리 MAC Protocol)

  • Park, Sang-Wook;Jung, Sung-Dae;Jung, Jong-In;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.526-535
    • /
    • 2008
  • Recently, several MAC protocols using the directional antennas have been proposed for wireless mobile ad hoc networks. In the theory, it can improve spatial reuse and communication throughput in the Mobile Ad-hoc networks. But, or However even though direction transmissions using the Directional MAC protocol(D-MAC) are expected to provide significant improvements, they causes other problems such as deafness problem and fairness problem. In this paper, we analyze the D-MAC protocol in Mobile Ad-hoc network for Vehicle to vehicle(V2V) communication. Through the results of the analysis, We the fundamental problem of D-MAC protocol and finally we suggest new D-MAC protocol for V2V networks.

A Stability of P-persistent MAC Scheme for Periodic Safety Messages with a Bayesian Game Model (베이지안 게임모델을 적용한 P-persistent MAC 기반 주기적 안정 메시지 전송 방법)

  • Kwon, YongHo;Rhee, Byung Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.7
    • /
    • pp.543-552
    • /
    • 2013
  • For the safety messages in IEEE 802.11p/WAVE vehicles network environment, strict periodic beacon broadcasting requires status advertisement to assist the driver for safety. In crowded networks where beacon message are broadcasted at a high number of frequencies by many vehicles, which used for beacon sending, will be congested by the wireless medium due to the contention-window based IEEE 802.11p MAC. To resolve the congestion, we consider a MAC scheme based on slotted p-persistent CSMA as a simple non-cooperative Bayesian game which involves payoffs reflecting the attempt probability. Then, we derive Bayesian Nash Equilibrium (BNE) in a closed form. Using the BNE, we propose new congestion control algorithm to improve the performance of the beacon rate under saturation condition in IEEE 802.11p/WAVE vehicular networks. This algorithm explicitly computes packet delivery probability as a function of contention window (CW) size and number of vehicles. The proposed algorithm is validated against numerical simulation results to demonstrate its stability.

A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism (자가치유 메커니즘을 활용한 침입감내시스템의 취약성 분석)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.333-340
    • /
    • 2005
  • One of the most important core technologies required for the design of the ITS (Intrusion Tolerance System) that performs continuously minimal essential services even when the network-based computer system is partially compromised because of the external or internal intrusions is the quantitative dependability analysis of the ITS. In this paper, we applied self-healing mechanism, the core technology of autonomic computing to secure the protection power of the ITS. We analyzed a state transition diagram of the ITS composed of a Primary server and a backup server utilizing two factors of self-healing mechanism (fault model and system response) and calculated the availability of ITS through simulation experiments and also performed studies on two cases of vulnerability attack.

Keeping-ownership Cache Replacement Policies for Remote Access Caches of NUMA System (NUMA 시스템에서 소유권에 근거한 원격 캐시 교체 정책)

  • 신숭현;곽종욱;장성태;전주식
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.473-486
    • /
    • 2004
  • NUMA systems have remote access caches(RAC) in each local node to reduce the overhead for repeated remote memory accesses. By this RAC, memory latency and network traffic can be reduced and the performance of the multiprocessor system can be improved. Until now, several cache replacement policies have been proposed in recent years, and there also is cache replacement policy for multiprocessor systems. In this paper, we propose a cache replacement policy which is based on cache line coherence information. In this policy, the cache line that does not have an ownership is replaced first with respect to cache line that has an ownership. Like this way, the overhead to transfer ownership is avoided and the memory latency can be decreased. We also propose “Keeping-Ownership replacement policy with MRU (KOM)” and “Keeping-Ownership replacement policy with Reference Bit(KORB)” to reduce the frequent replacement penalty of the ownership-lacking cache line. We compare and analyze these with LRU and Pseudo LRU(PLRU). The simulation shows that KOM outperforms the PLRU by 25%, and KORB outperforms the PLRU by 13%. Although the hardware cost of KOM is very small, the performance of KOM is nearly equal to that of the LRU.

Implementation of Remote Control System using TeleRemote System (TeleRemote를 이용한 원격 제어 시스템 구현)

  • 김상복;한성호;진현준;박노경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1115-1123
    • /
    • 2003
  • In this paper, a remote control system called TeleRemote system which can be applied to existing wireless mobile networks or public telephone networks for remote control is designed and implemented. The proposed design employs program technology based on the theory of signal detect control and enables the EPG(Electronic Program Guide) functions such as recording reservation of bidirectional video signals with TV reception card on PC. It can also control recording reservation using remote control program through telecommunication network The PC-EPG system is implemented in Web programs with Server/Clinet architecture and the server system that provides EPG functionalities is in charge of recording reservations and data communications by means of the scheduler program. Data storing to client PCs is performed through TCP/IP and finished by client programs implemented using Visual C++/MFC programs. As remote control system, the developed system can be used for unmanned security system using the Web camera. Building intranet and making connection to internet, the TeleRemote system is believed to create potential for commercial communication system.

A Study on the Plans of Apartments Underground Parking lots to Prevent Women's Criminal fear Psychology - Focused on apartment design competitions of Suwon A region - (여성의 범죄불안심리를 고려한 공동주택의 지하주차장 계획 연구 - 수원A지구 공동주택 현상설계를 중심으로 -)

  • Li, Jin-Ji;Kim, Nam-Hyo
    • Korean Institute of Interior Design Journal
    • /
    • v.18 no.6
    • /
    • pp.104-114
    • /
    • 2009
  • The purpose of study was understanding necessity of environment design for underground parking lot in residential design plan and grasping design plans of 'Activity Support' that considerate women, exclude women's unsecured feeling at underground parking lot. The inquiry analyzed 6 design plan in design competition that considerate women according to precede studies, a theory of CPTED, a design guide for wayfinding, and survey. A ramp, circulation, entrance, lighting, ventilation, and space design plan are proceed on this study The result are as below. First, a rectilinear figure ramp suits entrance plan on the circulation, but if it is not possible, cross-using of rectilinear and curvilinear figure ramp plan is desirable. Second, on the circulation plan, vehicles circulation plan and equality parking distribution plan got accomplished generally, and help senses of direction because it is planed network systemize. On a large scale underground parking lot, simplify parking circulation to convenience entrance and exit for weak in sense of direction. Third, the shape and material that‘s environmentally conscious will be in use to the entrance plan. As the first stage to the underground, artwork that women prefer can modulate the rejection of underground space. Forth, natural lighting system and ventilation can make the environment-friendly space, decrease the women’s rejection to the underground, it can also keep a natural watch on the space. Fifth, on the space design plan, it can use bright and comfortable design of wall and ground to decrease the women‘s rejection, also it is useful to the sense of direction. LED indirect lighting plan that 58.7% of women prefers on survey reflects women’s state of desire that bright and atmosphere. In addition, proper use of plans that subsidiary facilities, rest area with Sunken, and nature-friendly material can minimize differences of underground and ground parking lot.

Comparative Study of PI, FNN and ALM-FNN for High Control of Induction Motor Drive (유도전동기 드라이브의 고성능 제어를 위한 PI, FNN 및 ALM-FNN 제어기의 비교연구)

  • Kang, Sung-Jun;Ko, Jae-Sub;Choi, Jung-Sik;Jang, Mi-Geum;Back, Jung-Woo;Chung, Dong-Hwa
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2009.05a
    • /
    • pp.408-411
    • /
    • 2009
  • In this paper, conventional PI, fuzzy neural network(FNN) and adaptive teaming mechanism(ALM)-FNN for rotor field oriented controlled(RFOC) induction motor are studied comparatively. The widely used control theory based design of PI family controllers fails to perform satisfactorily under parameter variation nonlinear or load disturbance. In high performance applications, it is useful to automatically extract the complex relation that represent the drive behaviour. The use of learning through example algorithms can be a powerful tool for automatic modelling variable speed drives. They can automatically extract a functional relationship representative of the drive behavior. These methods present some advantages over the classical ones since they do not rely on the precise knowledge of mathematical models and parameters. Comparative study of PI, FNN and ALM-FNN are carried out from various aspects which is dynamic performance, steady-state accuracy, parameter robustness and complementation etc. To have a clear view of the three techniques, a RFOC system based on a three level neutral point clamped inverter-fed induction motor drive is established in this paper. Each of the three control technique: PI, FNN and ALM-FNN, are used in the outer loops for rotor speed. The merit and drawbacks of each method are summarized in the conclusion part, which may a guideline for industry application.

  • PDF

A Meta Analysis of Innovation Diffusion Theory based on Behavioral Intention of Consumer (혁신확산이론 기반 소비자 행위의도에 관한 메타분석)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.140-141
    • /
    • 2017
  • Big data analysis, in the large amount of data stored as the data warehouse which it refers the process of discovering meaningful new correlations, patterns, trends and creating new values. Thus, Big data analysis is an effective analysis of various big data that exist all over the world such as social big data, machine to machine (M2M) sensor data, and corporate customer relationship management data. In the big data era, it has become more important to effectively analyze not only structured data that is well organized in the database, but also unstructured big data such as the internet, social network services, and explosively generated web documents, e-mails, and social data in mobile environments. By the way, a meta analysis refers to a statistical literature synthesis method from the quantitative results of many known empirical studies. We reviewed a total of 750 samples among 50 studies published on the topic related as IDT between 2000 and 2017 in Korea.

  • PDF

A VIA-based RDMA Mechanism for High Performance PC Cluster Systems (고성능 PC 클러스터 시스템을 위한 VIA 기반 RDMA 메커니즘 구현)

  • Jung In-Hyung;Chung Sang-Hwa;Park Sejin
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.11
    • /
    • pp.635-642
    • /
    • 2004
  • The traditional communication protocols such as TCP/IP are not suitable for PC cluster systems because of their high software processing overhead. To eliminate this overhead, industry leaders have defined the Virtual Interface Architecture (VIA). VIA provides two different data transfer mechanisms, a traditional Send/Receive model and the Remote Direct Memory Access (RDMA) model. RDMA is extremely efficient way to reduce software overhead because it can bypass the OS and use the network interface controller (NIC) directly for communication, also bypass the CPU on the remote host. In this paper, we have implemented VIA-based RDMA mechanism in hardware. Compared to the traditional Send/Receive model, the RDMA mechanism improves latency and bandwidth. Our RDMA mechanism can also communicate without using remote CPU cycles. Our experimental results show a minimum latency of 12.5${\mu}\textrm{s}$ and a maximum bandwidth of 95.5MB/s. As a result, our RDMA mechanism allows PC cluster systems to have a high performance communication method.