• Title/Summary/Keyword: Required performance

Search Result 8,871, Processing Time 0.044 seconds

Drying of Agricultural Products by the Flat-plate Solar Collector with Rock-piled Heat Storage Medium (Rock-pile식(式) 집열기(集熱器)를 이용(利用)한 농산물건조(農産物乾燥)에 관(關)한 연구(硏究))

  • Chang, Kyu-Seob;Kim, Man-Soo
    • Applied Biological Chemistry
    • /
    • v.26 no.2
    • /
    • pp.75-81
    • /
    • 1983
  • The performance of the flat-plate solar collector with rock-pile thermal storage medium and the drying characteristics of rough rice and red pepper by use of natural air and of supplementary heated air by the solar drier were studied. The thermal efficiency of the flat-plate solar collector was average 25.4 percent and the overall heattransfer coefficient of the collector was approximately $38.13kJ/hr.m^2^{\circ}C$. The flat-plate collector was able to supply the supplementary heated air which was about $7^{\circ}C$ higher than the ambient air temperature during the daytime and about $3^{\circ}C$ higher than during the night. For rough rice drying of grain moisture content front 24.5 to 14.5%, it took 18 days in the natural air system, 12 days in the tubular solar collector and 10 days in the flat-plate solar collector. For red pepper drying from it's moisture from 81.0 to 15.0%, 68 hrs required under conventional sun drying system, but 38 hrs in tubular solar collector and 36 hrs in the flateplate solar collector. The changes of capsanthin and capsaicine content were investigated at various drying system, and little difference was found among the drying system.

  • PDF

A Large Scale Distributed Presence Service System by SIP Message Control Session (SIP 메시지 제어 세션에 의한 대용량 분산 프레즌스 서비스 시스템)

  • Jang, Choonseo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.514-520
    • /
    • 2018
  • Presence service provides various information about users such as locations, status of on/offline and network access methods, and number of presence resources required by each users increases largely in mobile environment. Therefore an effective method which can reduce load of presence servers is needed. In this paper, a large scale distributed presence service system which can distribute effectively total presence system load of presence servers using message control session has been presented. This large scale distributed presence service system provides various presence information for massive volumes of users. In this study, a new message control session architecture which can dynamically distribute loads of the presence servers to multiple servers has been presented, and a new presence information data architecture for controlling load of the presence servers has been designed. In this architecture, each presence server can exchange current load level in real time to get variance of the total system load change according to user numbers, and can distribute system load to maintain load level of each server evenly. The performance of the proposed large scale distributed presence service system has been analysed by experiments. The results has been showed that average presence resource subscription processing time reduced from 42.6% to 73.6%, and average presence notification processing time reduced from 37.6% to 64.8%.

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

Neighbor Discovery for Mobile Systems based on Deep Learning (딥러닝을 이용한 주변 무선단말 파악방안)

  • Lee, Woongsup;Ban, Tae-Won;Kim, Seong Hwan;Ryu, Jongyeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.527-533
    • /
    • 2018
  • Recently, the device-to-device (D2D) communication has been conceived as the key technology for the next-generation mobile communication systems. The neighbor discovery in which the nearby users are found, is essential for the proper operation of the D2D communication. In this paper, we propose new neighbor discovery scheme based on deep learning technology which has gained a lot of attention recently. In the proposed scheme, the neighboring users can be found using the uplink pilot transmission of users only, unlike conventional neighbor discovery schemes in which direct pilot communication among users is required, such that the signaling overhead can be greatly reduced in our proposed scheme. Moreover, the neighbors with different proximity can also be classified accordingly which enables more accurate neighbor discovery compared to the conventional schemes. The performance of our proposed scheme is verified through the tensorflow-based computer simulations.

A Framework for Quality Improvement in Weapon System using Post-Logistics Support Data (후속군수지원 데이터 분석을 활용한 무기체계 품질향상 방법론)

  • Kim, Geun-Hyung;Kim, Young-Kuk;Park, Seung Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.680-687
    • /
    • 2016
  • Although advanced weapon system weapons with high-performance and various functions have been developed, weapon defects can be fatal in the weapons industry. Therefore, the army requires quality improvement to reduce the number of defects which occur during both the development and operation of the weapon system. Recently, many manufacturers, including weapons manufacturers, have conducted analyses using defect related big-data in order to improve the quality. However, there have been few data analyses, because it is difficult to obtain the data required for the analysis of the development phase. Therefore, this study summarizes the pattern of the weapon system, military organization, and defect types using the actual data of the Post-Logistics Support (PLS) phase. The PLS data, which is referred to as the data collected after force integration, includes information on requests for maintenance. Through this information, this study selects key variables and analyzes the selected variables. The analysis results show the critical factors to be considered during the development phase. Finally, this study proposes a framework for advanced PLS systems using the PLS data. The proposed framework enables the development time of weapon systems to be further shortened and their quality to be improved.

Fast Combinatorial Programs Generating Total Data (전수데이터를 생성하는 빠른 콤비나토리얼 프로그램)

  • Jang, Jae-Soo;Won, Shin-Jae;Cheon, Hong-Sik;Suh, Chang-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1451-1458
    • /
    • 2013
  • This paper deals with the programs and algorithms that generate the full data set that satisfy the basic combinatorial requirement of combination, permutation, partial permutation or shortly r-permutation, which are used in the application of the total data testing or the simulation input. We search the programs able to meet the rules which is permutations and combinations, r-permutations, select the fastest program by field. With further study, we developed a new program reducing the time required to processing. Our research performs the following pre-study. Firstly, hundreds of algorithms and programs in the internet are collected and corrected to be executable. Secondly, we measure running time for all completed programs and select a few fast ones. Thirdly, the fast programs are analyzed in depth and its pseudo-code programs are provided. We succeeded in developing two programs that run faster. Firstly, the combination program can save the running time by removing recursive function and the r-permutation program become faster by combining the best combination program and the best permutation program. According to our performance test, the former and later program enhance the running speed by 22% to 34% and 62% to 226% respectively compared with the fastest collected program. The programs suggested in this study could apply to a particular cases easily based on Pseudo-code., Predicts the execution time spent on data processing, determine the validity of the processing, and also generates total data with minimum access programming.

A Resource Reservation Protocol for Mobile Hosts in Wireless Mobile Networks (무선 이동망에서의 이동 호스트를 지원하기 위한 자원 예약 프로토콜)

  • Kim, Min-Sun;Suh, Young-Joo;An, Syung-Og
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.428-436
    • /
    • 2002
  • Providing a mobile host with its required QoS is highly influenced by its mobility. The resource ReSerVation Protocol(RSVP) establishes and maintains a reservation state to ensure a given QoS level along the path from the sender to the receiver. However, RSVP is designed for use in fixed networks and thus it is inadequate in the mobile networking environment where a host changes its point of attachment. In this paper, we propose a new resource reservation protocol, RSVP-RA(RSVP by RSVP Agent) for mobile hosts. Our protocol assumes IETF Mobile IP as a mobility support mechanism. The proposed protocol introduce a new protocol entity - RSVP agent - to manage reservations in a mobile host's current visiting network. RSVP Agent is located in a local network and makes resource reservations in neighboring cells that the mobile host is expected to visit in the future. Thus, the proposed Protocol can provide a seamless QoS to the mobile host and significantly improve the scalability problem of RSVP by reducing the end-to-end signalling messages acrossing the backbone networks. The proposed protocols reduce packet delay, bandwidth overhead and the number of RSVP messages to maintain reservation states. We compared the performance of our proposed protocol with other proposed protocols in terms of signalling overhead, packet delay by simulation.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

An Integrated QoS Management System for Large-Scale Heterogeneous IP Networks : Design and Prototype Implementation (대규모 이기종 IP 망의 통합품질관리 시스템의 설계 및 구현)

  • Choi, Tae-Sang;Chung, Hyung-Seok;Choi, Hee-Sook;Kim, Chang-Hoon;Jeong, Tae-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3633-3650
    • /
    • 2000
  • Internet is no longer a network for special communities but became a global means of communication infrastructure for everyday life. People are exchanging their personal messages using e-mails, students are getting their educational aids through the web, people are buying a variety of goods from cyber shopping malls, and companies are conducting their businesses over the Internet. Recently, such an explosive growth of the traffic in the Internet raised a big concern on how to accommodate ever-changing user's needs in terms of an amount of the traffic, characteristics of the traffic, and various service quality requirements, Over provisioning can be a simple solution but it is too expensive and inefficient. Thus many new technologies to solve this very difficult puzzle have bcen introduced recently, Any single solution, however, can be insufficient and a carefully designed architecture, which integrates a group of solutions, is required. In this paper, we propose a policy-based Internet QoS provisioning, traffic engineering and perfonnance management system as our solution to this problem. Our integrated management QoS solution can provide highly responsive flow-through service provisioning, more realistic service and resource policy control based on the real network performance information, and centralized control of traffic engineering for heterogeneous networks.

  • PDF

Suggestions for Safety Improvement of CNG Bus Based on Accident and Failure Analysis (CNG버스 사고원인 분석에 근거한 안전성 향상 방안에 대한 연구)

  • Yoon, Jae-Kun;Yoon, Kee-Bong
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.2
    • /
    • pp.69-76
    • /
    • 2008
  • Three failure cases of CNG composite vessels were reported since after January 2005. The 1st and 2nd accidents were indebted to vessel defect and installation mistake. The 3rd was caused by gas leak at pipe connections. In this paper various aspects were studied based on information of the three failure analysis, which must be improved for better safety of the CNG bus system. Overpressure region caused by vessel explosion was theoretically predicted and also assessed by PHAST program. Explosion of 120 l vessel under 20 MPa is equivalent to 1.2 kg TNT explosion. The predicted value by PHAST was more serious than theoretical one. However, actual consequence of explosion was much less than both of the predicted consequences. Since the CNG vessel was designed by the performance based design methodology, it is difficult to verify whether the required process and tests were properly conducted or not after production. If material toughness is not enough, the vessel should be weak in brittle fracture at early in the morning of winter season since the metal temperature can be lower than the transition temperature. If autofrettage pressure is not correct, fatigue failure due to tensile stress during repeated charging is possible. One positive aspect is that fire did not ocurred after vessel failure. This may be indebted to fast diffusion of natural gas which hindered starting fire.

  • PDF