• Title/Summary/Keyword: Resource Optimization

Search Result 551, Processing Time 0.022 seconds

An Study on Spray and Combustion Characteristics of Direct Injection LPG under Low Pressure Injection Condition (저압 분사조건에 따른 직접분사 LPG의 분무 및 연소특성 연구)

  • Hwang, Seong-Ill;Chung, Sung-Sik;Yeom, Jeong-Kuk;Lee, Jin-Hyun
    • Journal of the Korean Institute of Gas
    • /
    • v.20 no.1
    • /
    • pp.52-61
    • /
    • 2016
  • Liquefied petroleum gas is regarded as a promising alternative fuel as it is eco-friendly, has good energy efficiency and output performance, practically and has high cost competitiveness over competing fuels. In spark-ignition engine, direct injection technology improves engine volumetric efficiency apparently and operates engine using the stratified charge that has relatively higher combustion efficiency. This study designed a combustion chamber equipped with visualization system by applying gasoline direct injection engine principle. In doing so, the study recorded and analyzed ignition probability and flame propagation process of spark-ignited direct injection LPG in a digital way. The result can contribute as a basic resource widespread for spark-ignited direct injection LPG engine design and optimization extensively.

User Scheduling Algorithm Based on Signal Quality and Inter-User Interference for Outage Minimization in Full-Duplex Cellular Networks (전이중 셀룰라 네트워크에서 아웃티지 최소화를 위한 신호 품질과 사용자간 간섭량 기반의 사용자 스케쥴링 알고리즘)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2576-2583
    • /
    • 2015
  • In a full-duplex (FD) wireless cellular network, uplink (UL) users induce the severe inter-user interference to downlink (DL) users. Therefore, a user scheduling that makes a pair of DL user and UL user to use the same radio resource simultaneously influences the system performances significantly. In this paper, we first formulate an optimization problem for user scheduling to minimize the occurrence of outage, aiming to guarantee the quality of service of users, and then we propose a suboptimal user scheduling algorithm with low complexity. The proposed scheduling algorithm is designed in a way where the DL user with a worse signal quality has a higher priority to choose its UL user that causes less interference. Simulation results show that the FD system using the proposed user scheduling algorithm achieves the optimal performance and significantly decreases the outage probability compared with the conventional half-duplex cellular system.

A Productivity Analysis of Tower Crane Installation Progress Based on Simulation Technique (시뮬레이션 기반의 타워크레인 설치 생산성 분석)

  • Kim, Yun-Sik;Cho, Jae-Kyong;Kim, Min-Ji;Cho, Kyu-Man;Hyun, Chang-Taek
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.2
    • /
    • pp.33-40
    • /
    • 2010
  • Recently, the scale of construction work has been growing, and buildings are becoming higher. To enable greater efficiency of construction work, the use of vertical transportation equipment has been radically increasing. In this context, many studies have been conducted on tower cranes. While these studies have discussed issues such as the selection of tower cranes, the optimization of locations, and the hoisting time of tower cranes, there has been no research on the installation of tower cranes. As such, the installation of tower cranes on construction sites has been accomplished based on subjective judgment and technical assistance, and the experience of workers in equipment companies. Therefore, this study analyzes the productivity of tower cranes using simulation methodology, and proposes a generalized model of the installation process of tower cranes in order to offer a basic resource that site managers can directly utilize.

Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices (모바일 기기를 위한 가상 스토리지 프로토콜(iATA)의 설계 및 파라메터 최적화)

  • Yeoh, Chee-Min;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.267-276
    • /
    • 2009
  • Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.

A New Head Pose Estimation Method based on Boosted 3-D PCA (새로운 Boosted 3-D PCA 기반 Head Pose Estimation 방법)

  • Lee, Kyung-Min;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.105-109
    • /
    • 2021
  • In this paper, we evaluate Boosted 3-D PCA as a Dataset and evaluate its performance. After that, we will analyze the network features and performance. In this paper, the learning was performed using the 300W-LP data set using the same learning method as Boosted 3-D PCA, and the evaluation was evaluated using the AFLW2000 data set. The results show that the performance is similar to that of the Boosted 3-D PCA paper. This performance result can be learned using the data set of face images freely than the existing Landmark-to-Pose method, so that the poses can be accurately predicted in real-world situations. Since the optimization of the set of key points is not independent, we confirmed the manual that can reduce the computation time. This analysis is expected to be a very important resource for improving the performance of network boosted 3-D PCA or applying it to various application domains.

Mathematical Programming and Optimization of the Resource Allocation and Deployment for Disaster Response : AED case study (수리계획법을 활용한 방재자원 배치 최적화: AED 배치 사례)

  • Hwang, Seongeun;Lee, Nagyeong;Jang, Dongkuk;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.3
    • /
    • pp.53-58
    • /
    • 2021
  • The number of patients with cardiovascular diseases who experience an out-of-hospital cardiac arrest (OHCA) are increasing among young adults as well as the aged population. An automated external defibrillator (AED) is vital in improving survival rates of OHCA victims. Survival rates of OHCA were shown to decline exponentially in time to defibrillation, yet studies in Korea are uncommon that captures the properties of their survival rates in examining optimal locations of AEDs. In this study, we worked on the maximal gradual coverage location problem (MGCLP) with exponential decay coverage function to decide on their optimal locations. The exponential decay coverage function mitigates the drawback of over-estimating survival rates of OHCA patients. It is expected that a more sophisticated facility location problem will be developed to identify the "emergent" characteristics of pedestrians who responds to the OHCA occurrence by incorporating random pedestrian locations and movement through simulation.

Research of organized data extraction method for digital investigation in relational database system (데이터베이스 시스템에서 디지털 포렌식 조사를 위한 체계적인 데이터 추출 기법 연구)

  • Lee, Dong-Chan;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.565-573
    • /
    • 2012
  • To investigate the business corruption, the obtainments of the business data such as personnel, manufacture, accounting and distribution etc., is absolutely necessary. Futhermore, the investigator should have the systematic extraction solution from the business data of the enterprise database, because most company manage each business data through the distributed database system, In the general business environment, the database exists in the system with upper layer application and big size file server. Besides, original resource data which input by user are distributed and stored in one or more table following the normalized rule. The earlier researches of the database structure analysis mainly handled the table relation for database's optimization and visualization. But, in the point of the digital forensic, the data, itself analysis is more important than the table relation. This paper suggests the extraction technique from the table relation which already defined in the database. Moreover, by the systematic analysis process based on the domain knowledge, analyzes the original business data structure stored in the database and proposes the solution to extract table which is related incident.

Efficient Hardware Implementation of ${\eta}_T$ Pairing Based Cryptography (${\eta}_T$ Pairing 알고리즘의 효율적인 하드웨어 구현)

  • Lee, Dong-Geoon;Lee, Chul-Hee;Choi, Doo-Ho;Kim, Chul-Su;Choi, Eun-Young;Kim, Ho-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.3-16
    • /
    • 2010
  • Recently in the field of the wireless sensor network, many researchers are attracted to pairing cryptography since it has ability to distribute keys without additive communication. In this paper, we propose efficient hardware implementation of ${\eta}_T$ pairing which is one of various pairing scheme. we suggest efficient hardware architecture of ${\eta}_T$ pairing based on parallel processing and register/resource optimization, and then we present the result of our FPGA implementation over GF($2^{239}$). Our implementation gives 15% better result than others in Area Time Product.

Resource Eestimation of Grover Algorithm through Hash Function LSH Quantum Circuit Optimization (해시함수 LSH 양자 회로 최적화를 통한 그루버 알고리즘 적용 자원 추정)

  • Song, Gyeong-ju;Jang, Kyung-bae;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.323-330
    • /
    • 2021
  • Recently, the advantages of high-speed arithmetic in quantum computers have been known, and interest in quantum circuits utilizing qubits has increased. The Grover algorithm is a quantum algorithm that can reduce n-bit security level symmetric key cryptography and hash functions to n/2-bit security level. Since the Grover algorithm work on quantum computers, the symmetric cryptographic technique and hash function to be applied must be implemented in a quantum circuit. This is the motivation for these studies, and recently, research on implementing symmetric cryptographic technique and hash functions in quantum circuits has been actively conducted. However, at present, in a situation where the number of qubits is limited, we are interested in implementing with the minimum number of qubits and aim for efficient implementation. In this paper, the domestic hash function LSH is efficiently implemented using qubits recycling and pre-computation. Also, major operations such as Mix and Final were efficiently implemented as quantum circuits using ProjectQ, a quantum programming tool provided by IBM, and the quantum resources required for this were evaluated.

EXECUTION TIME AND POWER CONSUMPTION OPTIMIZATION in FOG COMPUTING ENVIRONMENT

  • Alghamdi, Anwar;Alzahrani, Ahmed;Thayananthan, Vijey
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.137-142
    • /
    • 2021
  • The Internet of Things (IoT) paradigm is at the forefront of present and future research activities. The huge amount of sensing data from IoT devices needing to be processed is increasing dramatically in volume, variety, and velocity. In response, cloud computing was involved in handling the challenges of collecting, storing, and processing jobs. The fog computing technology is a model that is used to support cloud computing by implementing pre-processing jobs close to the end-user for realizing low latency, less power consumption in the cloud side, and high scalability. However, it may be that some resources in fog computing networks are not suitable for some kind of jobs, or the number of requests increases outside capacity. So, it is more efficient to decrease sending jobs to the cloud. Hence some other fog resources are idle, and it is better to be federated rather than forwarding them to the cloud server. Obviously, this issue affects the performance of the fog environment when dealing with big data applications or applications that are sensitive to time processing. This research aims to build a fog topology job scheduling (FTJS) to schedule the incoming jobs which are generated from the IoT devices and discover all available fog nodes with their capabilities. Also, the fog topology job placement algorithm is introduced to deploy jobs into appropriate resources in the network effectively. Finally, by comparing our result with the state-of-art first come first serve (FCFS) scheduling technique, the overall execution time is reduced significantly by approximately 20%, the energy consumption in the cloud side is reduced by 18%.