• Title/Summary/Keyword: Schedule information

Search Result 1,098, Processing Time 0.036 seconds

Multi-Channel Pipelining for Energy Efficiency and Delay Reduction in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성과 지연 감소를 위한 다중 채널 파리프라인 기법)

  • Lee, Yoh-Han;Kim, Daeyoung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.11-18
    • /
    • 2014
  • Most of the energy efficient MAC protocols for wireless sensor networks (WSNs) are based on duty cycling in a single channel and show competitive performances in a small number of traffic flows; however, under concurrent multiple flows, they result in significant performance degradation due to contention and collision. We propose a multi-channel pipelining (MCP) method for convergecast WSN in order to address these problems. In MCP, a staggered dynamic phase shift (SDPS) algorithms devised to minimize end-to-end latency by dynamically staggering wake-up schedule of nodes on a multi-hop path. Also, a phase-locking identification (PLI) algorithm is proposed to optimize energy efficiency. Based on these algorithms, multiple flows can be dynamically pipelined in one of multiple channels and successively handled by sink switched to each channel. We present an analytical model to compute the duty cycle and the latency of MCP and validate the model by simulation. Simulation evaluation shows that our proposal is superior to existing protocols: X-MAC and DPS-MAC in terms of duty cycle, end-to-end latency, delivery ratio, and aggregate throughput.

Reconfigurable SoC Design with Hierarchical FSM and Synchronous Dataflow Model (Hierarchical FSM과 Synchronous Dataflow Model을 이용한 재구성 가능한 SoC의 설계)

  • 이성현;유승주;최기영
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.8
    • /
    • pp.619-630
    • /
    • 2003
  • We present a method of runtime configuration scheduling in reconfigurable SoC design. As a model of computation, we use a popular formal model of computation, hierarchical FSM (HFSM) with synchronous dataflow (SDF) model, in short, HFSM-SDF model. In reconfigurable SoC design with HFSM-SDF model, the problem of configuration scheduling becomes challenging due to the dynamic behavior of the system such as concurrent execution of state transitions (by AND relation), complex control flow (HFSM), and complex schedules of SDF actor firing. This makes it hard to hide configuration latency efficiently with compile-time static configuration scheduling. To resolve the problem, it is necessary to know the exact order of required configurations during runtime and to perform runtime configuration scheduling. To obtain the exact order of configurations, we exploit the inherent property of HFSM-SDF that the execution order of SDF actors can be determined before executing the state transition of top FSM. After obtaining the order information and storing it in the ready configuration queue (ready CQ), we execute the state transition. During the execution, whenever there is FPGA resource available, a new configuration is selected from the ready CQ and fetched by the runtime configuration scheduler. We applied the method to an MPEG4 decoder and IS95 design and obtained up to 21.8% improvement in system runtime with a negligible overhead of memory usage.

A Study on the Evaluation of Container Terminal Logistics Systems in SCM's Perspective (SCM 관점의 컨테이너터미널 물류시스템 평가)

  • Kim, Sungu;Choi, Yongseok;Yeun, Dongha
    • Journal of Korea Port Economic Association
    • /
    • v.30 no.4
    • /
    • pp.47-67
    • /
    • 2014
  • This study examined elements which could evaluate a container terminal logistics system from the viewpoint of supply chain management. This study derived the elements of a container terminal logistics system such as flexibility, reliability, responsiveness, and information sharing and 16 evaluation sub-items in the aspect of a supply chain. In the result of analysis, the weight between SCM elements of a container terminal logistics system was the highest in reliability(0.282), followed by flexibility(0.273), responsiveness(0.224), and information sharing(0.221). The conversion weight was calculated by combining the weight of elements of a container terminal logistics system and the weight of evaluation sub-items. The highest weight which was considered as the most important factor to evaluate a container terminal logistics system was work planning(berth, yard) of flexibility(0.081), followed by accurate fulfillment of container work schedule(ship, yard) and the optimum distribution and arrangement of equipment(QC, TC, YT)(0.079), stable works without damage of containers and ships(0.071), and preventive maintenance of equipment and operators' skill(0.070).

On Resistance of Bit Permutation Based Block Cipher against Nonlinear Invariant Attack (비트 순열 기반 블록암호의 비선형 불변 공격 저항성 연구)

  • Jeong, Keonsang;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.325-336
    • /
    • 2020
  • Nonlinear Invariant Attack is an attack that should be considered when constructing lightweight block ciphers with relatively simple key schedule. A shortcut to prove a block cipher's resistance against nonlinear invariant attack is checking the smallest dimension of linear layer-invariant linear subspace which contains all known differences between round keys is equal to the block size. In this paper, we presents the following results. We identify the structure and number of optimal bit-permutations which require only one known difference between round keys for a designer to show that the corresponding block cipher is resistant against nonlinear invariant attack. Moreover, we show that PRESENT-like block ciphers need at least two known differences between round keys by checking all PRESENT-like bit-permutations. Additionally, we verify that the variants of PRESENT-like bit-permutations requiring the only two known differences between round keys do not conflict with the resistance against differential attack by comparing the best differential trails. Finally, through the distribution of the invariant factors of all bit-permutations that maintain BOGI logic with GIFT S-box, GIFT-variant block ciphers require at least 8 known differences between round keys for the resistance.

A Indoor Management System using Raspberry Pi (라즈베리 파이를 이용한 실내관리 시스템)

  • Jeong, Soo;Lee, Jong Jin;Jung, Won Ki
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.745-752
    • /
    • 2016
  • In the era of the Internet of Things, where all physical objects are connected to the Internet, we suggest a remote control system using a Raspberry Pi single-board computer with ZigBee, which can turn an indoor light-emitting diode (LED) and a multiple-tap on and off, and with a smart phone can control the brightness of the LED as well as an electronic door lock. By connecting an infrared (IR) transmitter module to the Raspberry Pi, we can control home appliances, such as an air conditioner, and we can also monitor indoor images, indoor temperatures, and illumination by using a smart phone app. We developed a method of finding out IR transmission codes required for remote-controllable appliances with an AVR micro-controller. We suggest a method to remotely open and shut an office door by novating the door lock. The brightness level of an LED (between 0 and 10) can be controlled through a PWM signal generated by an ATmega88 microcontroller. A mutiple-tap is controlled using an ATmega32, a photo-coupler, and a TRIAC. The signals for measured temperature and illumination are converted from analog to digital by using the ATtiny44A microcontroller transmitting to a Raspberry Pi through SPI communication. Then, we connect a camera to the CSI head of the Raspberry Pi. We can turn on the smart multiple-tap for a certain period of time, or we can schedule the multi-tap to turn on at a specific time. To reduce standby power, people usually pull out a power code from multiple-taps or turn off a switch. Our method helps people do the same thing with a smart phone, if they are away from home.

Measuring Destination Image Components and Segmenting the Market of Forest Region Festival : The Case of Acasia-Honey Festival in Chilgok (산촌지역축제(山村地域祝祭)의 관광지(觀光地) 이미지 구성요인(構成要因) 측정(測定)과 시장분할(市場分割): 칠곡군(漆谷郡) 아카시아벌꿀축제(祝祭)를 대상(對象)으로)

  • Han, Sang-Yoel
    • Journal of Korean Society of Forest Science
    • /
    • v.90 no.6
    • /
    • pp.747-755
    • /
    • 2001
  • This study was analyzed the destination image and tests of image value of forest region festival by segmenting the market. A field survey was conducted during the Acasia-Honey Festival days in Chilgok, the famous acasia-honey products place, from May 12-15, 2001. In this study, 20 image items on five-point Likert scale were examined through factor analysis using a sample of 394 visitors. Four factors were identified as follows : environment, behavior-facilities, festival programs, and products. The author observed if there were statistically significant differences of destination images between the first-time and the repeat visitors, between residents and non-residents, and between purchasers and non-purchasers of acasia-honey products. The results indicated that repeat visitors and residents group had a more positive image of behavior factor such as hospitality and information for festival. And, the author found that purchasers of acasia-honey products had more positive image of product as well as environment factor such as special atmosphere, nostalgia, natural attractions, local culture, and novelty. For these results, it is possible to conclude that local government must effectively provide the festival visitors with well-defined information such as festival contents and schedule, also, develop the programs involved unique attributes of forest region festival to improve festival image.

  • PDF

Efficient Multi-spot Monitoring System Using PTZ Camera and Wireless Sensor Network (PTZ 카메라와 무선 센서 네트워크를 이용한 효율적인 다중 지역 절전형 모니터링 시스템)

  • Seo, Dong-kyu;Son, Cheol-su;Yang, Su-yeong;Cho, Byung-lok;Kim, Won-jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.581-584
    • /
    • 2009
  • Recently, the cameras which used for observation are installed in children protection area and local crime prevention area in order to protect life and property and by its work being recognized and are installed more. Normal cameras have cost problem to observe multiple area and detail, because they can observe only one place. PTZ camera can observe multiple area by moving focus by schedule or remote control, but it can't automatically move the focus of it to the place where event occurred, because it can't recognize the place. In this study, we can monitor multiple area effectively, by installing a wireless sensor node equipped with temperature, lighting, gas and human detection sensor to each area, to monitor many place low-price and actively and to move the focus of PTZ camera to preset position, and send recorded video to the user, when the various sensor data received from wireless sensors in observation area are to be determined abnormal by analyzing. In addition, at night we can record a scene using infrared, but to reduce power consumption of lighting system which are installed to improve resolution, it supplies power to the lighting system when event occurred. So we were able to implement low power green monitoring system.

  • PDF

A Study of Today's Concept and Application of the Principle of the Provenance in Archives management (출처주의의 새로운 경향과 적용에 관한 연구)

  • Bang, Hyo-Soon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.2 no.2
    • /
    • pp.69-92
    • /
    • 2002
  • The objective of this study is to examine the re cent trend of the interpretation of the Principle of the Provenance in today s new environment of Archives Management and to identify the effective way of the application of the Principle of Provenance to Archives Management. Because of the continued change and the flexibility of the administrative organization and the development of information network, the traditional concept of the Principle of Provenance which put emphasis on a single creator and the physical entity of the archives has been gradually modified to a rather conceptual, abstract and realistic one. A method to apply the recent concept of the Principle of Provenance is to separate the descriptions of the record entity, the creators and the context and use the organic linkage of the separated description areas. Also we can control the provenance from the current stage or even from the pre-current stage by utilizing the classification scheme and the retention schedule. In case of the electronic records, we can manage the provenance and the context by using metadata inherent in the computerized information system. Above all it is critical that we need to structure and control the provenance by building the Korean rules for archival description corresponding to the international standards. And it is another an essential point that we have to develop a guideline for constructing the fond and maintaining its consistency.

A Study on model for Records Management of Local Assembly to Embody Local Governance (로컬 거버넌스 실현을 위한 지방의회 기록관리 모형에 관한 연구)

  • Choi, Youn-Ju
    • The Korean Journal of Archival Studies
    • /
    • no.14
    • /
    • pp.241-288
    • /
    • 2006
  • For cope with the participating government promoted local decentralization of the present time, local governments are coming to aim at the realization of local governance. Local governance refers to a way of solving public problems of urban area through partnership which is a collaboration and participation based on 'relationship' among diverse interested parties such as executive authority of policy, private sectors. First of all, it is most important task to make transparency and responsibility of all people and networks by themselves through sharing information. With like this kind of a background, local assembly is an momentos body of local governance because it is a decision making organization at the same time as a representative organization of local residents, and it has a relationship of 'check and balance' with chiefs of local governments as an organization monitoring and supervising the administration of an executive authority. Not the less, information about local assembly does not open to the public or exist. Even some informations open to the public, they are not enough to be settled distrust and low-valuation by civil society. Now Local assembly is face to a point that improve over all of record management. This study is based like this critical mind, then, it examines throughly local assembly's realities by suggestion with reforming plan of record management. Record can embody true values when record management practices indefatigably through prudential system from production until preservation. Accordingly, this study suggests management of transaction unit without the omission of record. Also this study is satisfy the condition of Korean record management system with proposals of record management policy and establishment of record center. At the conclusion of study, it puts effects into shape that local assembly secure transparency and responsibility and organize local governance by record management.

A Study on 50 states' Open Meeting Act in the United States (미국 50개 주 회의공개법 연구)

  • Choi, Jeong Min;Kim, You-seung
    • The Korean Journal of Archival Studies
    • /
    • no.57
    • /
    • pp.35-73
    • /
    • 2018
  • This study aims to elucidate the implications for 20 years of the establishment of the information disclosure law by analyzing contents of the public regulations of 50 states of the United States. For the purpose, it looks at the general outline of the open meetings law of the 50 states, including the requirements and procedure of the advance notification of the meeting, and the protest procedure and penalties for the violation of the law. As a result of analysis, under the law, public meetings should announce their schedule and agenda in advance, and minutes of meetings and recording of meetings should be accessible to citizens. Furthermore, a person who violates the law for opening meetings could be fined or imprisoned. The implications for the establishment of the Open Meetings Act in Korea are as follows: First, the open meeting system starts with the appropriate period and method of advance notice of meeting holding. Second, the substantive contents of the advance notification guarantee the effectiveness of the meeting disclosure system. Third, the method and subject of advance notification should be as wide and diverse as possible. Fourth, all decisions of the meeting that violate the law are null and void. Fifth, a system should be set up so that any citizen could easily raise objections to the violation of the law. Sixth, the person who violates the law should be held responsible. Lastly, citizen access to minutes, recordings as well as comprehensive meeting minutes writing including attendees, agendas, and ballots should be guaranteed.