• Title/Summary/Keyword: Systems Engineering, SE

Search Result 778, Processing Time 0.029 seconds

Efficient Cache Architecture for Transactional Memory (트랜잭셔널 메모리를 위한 효율적인 캐시 구조)

  • Choi, Dong-Min;Kim, Seung-Hun;Ro, Won-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.1-8
    • /
    • 2011
  • Traditional transactional memory systems are no longer able to guarantee the performance of diverse applications with overflowed transactions since there is the drawback that tracking the data for logging is difficult. Especially, this mechanism has a disadvantage of increasing communication delay for sustaining the state which is required to detect the conflict on the overflowed transactions from the first level cache in the transactional memory systems. To address this point, we have focused on the cache architecture of the systems to reduce the overhead caused by overflows and cache misses. In this paper, we present Supportive Cache which reduces additional overhead during transactions. Supportive Cache performs a parallel look-up with L1 private cache and uses the same replacement policy as L1 private cache. We evaluate the performance of the proposed design by comparing LogTM-SE with and without Supportive Cache. The simulation results show that our system improves the performance by 37% on average, compared to the original LogTM-SE which uses the same hardware resource.

Configuration Management for Multi-Level Security Information Technology Systems (IT 시스템의 다중 수준 보안을 위한 관리 환경 연구)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.39-48
    • /
    • 2010
  • In a complex, secure IT system environment there will be groups of data that be segregated from one another, yet reside on the same system. Users of the system will have varying degrees of access to specific data. The Configuration Management(CM) of the information architecture, the physical architecture, user privileges and application security policies increases the complexity for operations, maintenance and security staff. This pager describes(current work to merge the capabilities of a network CM toll with those of a Computer Aided System Engineering(CASE) tool. The rigour of Systems Engineering(SE) modelling techniques can be used to deal with the complexities of multi-level information security. The SE logical and physical models of the same system are readily tailorable to document the critical components of both the information architecture and physical architecture that needs to be managed. Linking a user-friendly, physical CM tool with the extended capabilities of a CASE tool provide the basis for improved configuration management of secure IT systems.

Resource Allocation and EE-SE Tradeoff for H-CRAN with NOMA-Based D2D Communications

  • Wang, Jingpu;Song, Xin;Dong, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1837-1860
    • /
    • 2020
  • We propose a general framework for studying resource allocation problem and the tradeoff between spectral efficiency (SE) and energy efficiency (EE) for downlink traffic in power domain-non-orthogonal multiple access (PD-NOMA) and device to device (D2D) based heterogeneous cloud radio access networks (H-CRANs) under imperfect channel state information (CSI). The aim is jointly optimize radio remote head (RRH) selection, spectrum allocation and power control, which is formulated as a multi-objective optimization (MOO) problem that can be solved with weighted Tchebycheff method. We propose a low-complexity algorithm to solve user association, spectrum allocation and power coordination separately. We first compute the CSI for RRHs. Then we study allocating the cell users (CUs) and D2D groups to different subchannels by constructing a bipartite graph and Hungrarian algorithm. To solve the power control and EE-SE tradeoff problems, we decompose the target function into two subproblems. Then, we utilize successive convex program approach to lower the computational complexity. Moreover, we use Lagrangian method and KKT conditions to find the global optimum with low complexity, and get a fast convergence by subgradient method. Numerical simulation results demonstrate that by using PD-NOMA technique and H-CRAN with D2D communications, the system gets good EE-SE tradeoff performance.

Analyzing Drift Patterns of Spray Booms with Different Nozzle Types and Working Pressures in Wind Tunnel (풍동실험에 의한 붐식 살포 농약의 노즐형태와 분사압력에 따른 비산 특성 분석)

  • Park, Jinseon;Lee, Se-Yeon;Choi, Lak-Yeong;Jeong, Hanna;Noh, Hyun Ho;Yu, Seung-Hwa;Song, Hosung;Hong, Se-woon
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.63 no.5
    • /
    • pp.39-47
    • /
    • 2021
  • With rising concerns about pesticide spray drifts, this study analyzed the drift patterns of two typically-used nozzles, XR nozzle and AI nozzle, concerning their working pressures and wind speeds by wind tunnel experiments. AI nozzle showed low drift potential with larger droplet sizes compared to XR nozzle. Airborne and deposition drifts of XR nozzle were two times higher than those of AI nozzle under high wind speeds (≥2 m s-1). In all cases, higher working pressures decreased the droplet sizes, thereby increasing the airborne and deposition drifts. Higher wind speeds also resulted in more airborne drifts, while ground deposition was increased under lower wind speeds. These effects of working pressures and wind speeds on the airborne and deposition drifts were observed at leeward distances less than 4 m from the nozzles. However, the airborne and deposition drifts were barely affected by the working pressures and wind speeds at leeward distances more than 11 m. The measurements were fitted to regression models of the drift curve with acceptable R2 values greater than 0.8, demonstrating that further studies will be useful to settle domestic issues of spray drifts.

IR and SAR Sensor Fusion based Target Detection using BMVT-M (BMVT-M을 이용한 IR 및 SAR 융합기반 지상표적 탐지)

  • Lim, Yunji;Kim, Taehun;Kim, Sungho;Song, WooJin;Kim, Kyung-Tae;Kim, Sohyeon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.11
    • /
    • pp.1017-1026
    • /
    • 2015
  • Infrared (IR) target detection is one of the key technologies in Automatic Target Detection/Recognition (ATD/R) for military applications. However, IR sensors have limitations due to the weather sensitivity and atmospheric effects. In recent years, sensor information fusion study is an active research topic to overcome these limitations. SAR sensor is adopted to sensor fusion, because SAR is robust to various weather conditions. In this paper, a Boolean Map Visual Theory-Morphology (BMVT-M) method is proposed to detect targets in SAR and IR images. Moreover, we suggest the IR and SAR image registration and decision level fusion algorithm. The experimental results using OKTAL-SE synthetic images validate the feasibility of sensor fusion-based target detection.

The Software Algorithm Design a Suitable Ultra-Low Power RF System

  • Kim, Jung-won;Choi, Ung-Se
    • Journal of IKEEE
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2008
  • The demand of wireless communication is increased rapidly due to the development of wireless communication systems, and many people have the great interest about the "RF system". The trend of the RF audio system is to design the system with less power consumption. In this paper, we explain the Software Algorithm Design of RF systems that is suitable for low power consumption.

  • PDF

Topology Optimization of Pick-up Actuator of CD-ROM for Vibration Reduction (위상 최적 설계를 통한 CD-ROM 광 픽업 액추에이터의 진동 저감)

  • Wang, Se-Myung;Kim, Yong-Su;Park, Ky-Hwan
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2000.06a
    • /
    • pp.479-484
    • /
    • 2000
  • The topology optimization of electromagnetic systems is investigated and the TOPEM (Topology Optimization for Electromagnetic Systems) is developed using the finite element method (FEM). The design sensitivity equation for topology optimization is derived using the adjoint variable method. The proposed method is validated by applying it to the topology optimizations of a C-core actuator and an optical pickup actuator.

  • PDF

Design of an Admission Counseling Chatbot (입시 상담 챗봇 설계)

  • Lee, Se-Hoon;Lee, Sang-Min;Im, Hong-Gab
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.429-430
    • /
    • 2017
  • 본 논문은 챗봇을 활용하여 반복적인 입시 질문을 응답하는 시스템에 설계하였다. 1회성 응답 대신 문맥을 기억하여 사용자의 의도를 파악하고 자세한 응답을 제공한다. 또한, 한글 처리와 입시 관련 데이터베이스 연동을 통해 일반화 할 수 있는 유연성을 갖는 구조이며, 반복적인 질의응답을 챗봇으로 대신할 수 있을 것으로 기대된다.

  • PDF

Robot Arm Control System using Deep Learning Object Detection (딥러닝 객체 검출을 이용한 로봇 팔 제어 시스템)

  • Lee, Se-Hoon;Kim, Jae-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.255-256
    • /
    • 2019
  • 본 논문에서는 물체를 집기(picking) 위해 필요한 깊이 값을 특수카메라인 리얼센스를 사용하여 받아와서 2D 카메라로는 하지 못하는 로봇 팔 피킹 시스템을 구현하였다. 객체 인식은 텐서플로우 객체 검출 라이브러리를 사용하여 정확도를 높였고, ROS 기반의 rviz, moveit, gazebo 등의 패키지를 사용하여 아두이노와 통신하며 로봇팔 하드웨어로 인식된 객체를 피킹하는 시스템을 구현하였다.

  • PDF

Intelligent missing persons index system based on the OpenCV and TensorFlow (OpenCV와 TensorfFlow 기반의 지능형 실종자 색인 시스템)

  • Baek, Yong-Tae;Kim, Ji-Sung;Lee, Kang-Min;Shin, Jin;Lee, Se-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.59-62
    • /
    • 2016
  • 본 논문에서는 실종자 데이터베이스에 등록된 실종자에 대한 색인으로 텍스트 기반의 통제 색인만을 사용할 때 발생하는 문제점에 대한 해결책을 다룬다. 기존 실종자를 등록할 때 함께 등록하게 되는 실종자에 대한 이미지는 정형화 할 수 없어 실종자 조회에 사용될 수 없었다. 이러한 문제점을 해결하고자 OpenCV와 TensorFlow 를 이용하여 영상의 유사도를 추출함으로써 실종자의 이미지를 정형화시켜 유의미한 정보로 변경하여 사용하고자 하는 방법을 제안한다.

  • PDF