• Title/Summary/Keyword: environment-oriented

Search Result 1,898, Processing Time 0.029 seconds

Hardware Co-Simulation of an Adaptive Field Oriented Control of Induction Motor

  • Kabache, Nadir;Moulahoum, Samir;Houassine, Hamza
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.3 no.2
    • /
    • pp.110-115
    • /
    • 2014
  • The reconfigurability of FPGA devices allows designers to evaluate, test and validate a new control algorithm; a new component or prototypes without damaged the real system with the so-called hardware co-simulation. The present paper uses the Xilinx System Generator (XSG) environment to establish and validate a new nonlinear estimator for the rotor time constant inverse that will be exploited to improve the indirect rotor field control of induction motor.

An Analysis of Influence Factors for the Remodeling Project Management of Apartment Buildings -Focused on Construction Phase- (공동주택 리모델링 사업관리를 위한 영향요인 분석 -시공단계를 중심으로-)

  • Shim, Gyu-Jung;Seo, Jong-Min;Na, Young-Ju;Song, Yong-Sik;Kim, Sun-Kuk
    • KIEAE Journal
    • /
    • v.8 no.5
    • /
    • pp.77-83
    • /
    • 2008
  • Housing development, particularly apartment buildings, has been increasingly growing due to the construction promotion policy of the government since the 1980s. However such a volume-oriented policy results in unfavorable side effect of substandard quality and early deterioration in line with the expansion in volume. As part of measures to deal with the problems, rebuilding and remodeling have surfaced as alternative recently. Remodeling is expected to create the more benefits, compared to the rebuilding, in cost, efficiency and duration. To come up with the solution to such a challenge, it's necessary to analyze the influence factors of remodeling. Hence, the study was intended to compare the remodeling in the aspect of influence factors. The results of this study is expected to the propose of effectual management factors of the remodeling construction.

A Multi-Strategic Concept-Spotting Approach for Robust Understanding of Spoken Korean

  • Lee, Chang-Ki;Eun, Ji-Hyun;Jeong, Min-Woo;Lee, Gary Geun-Bae;Hwang, Yi-Gyu;Jang, Myung-Gil
    • ETRI Journal
    • /
    • v.29 no.2
    • /
    • pp.179-188
    • /
    • 2007
  • We propose a multi-strategic concept-spotting approach for robust spoken language understanding of conversational Korean in a hostile recognition environment such as in-car navigation and telebanking services. Our concept-spotting method adopts a partial semantic understanding strategy within a given specific domain since the method tries to directly extract predefined meaning representation slot values from spoken language inputs. In spite of partial understanding, we can efficiently acquire the necessary information to compose interesting applications because the meaning representation slots are properly designed for specific domain-oriented understanding tasks. We also propose a multi-strategic method based on this concept-spotting approach such as a voting method. We present experiments conducted to verify the feasibility of these methods using a variety of spoken Korean data.

  • PDF

Continuous Migration Container System for Upgrading Object

  • Yoosanthiah, N.;Khunkitti, A.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.960-964
    • /
    • 2004
  • During system resource improvement process that based on Object-Oriented technology could be affect to the continuous system performance if lack appropriate management and control objects mechanism. This paper proposes a methodology to support continuous system performance and its stability. The adoption is based on Java Container Framework and Collections Framework for object collection. Also includes Software Engineering, Object Migration and Multiple Class Loaders mechanism accommodate to construct Continuous Migration Container (CMC). CMC is a runtime environment provides interfaces for management and control to support upgrading object process. Upgrade object methodology of CMC can be divided into two phase are object equivalence checking and object migration process. Object equivalence checking include object behavior verification and functional conformance verification before object migration process. In addition, CMC use Multiple Class Loaders mechanism to support reload effected classes instead of state transfer in migration process while upgrading object. These operations are crucial for system stability and enhancement efficiency.

  • PDF

Clusters of Preschoolers' Play Behaviors (유아의 실내놀이행동 군집에 따른 예측변인 연구)

  • Shin, Nary;Lee, Hyungmin
    • Korean Journal of Child Studies
    • /
    • v.37 no.2
    • /
    • pp.79-94
    • /
    • 2016
  • Objective: This study aimed to examine the predictors of indoor play behaviors using cluster analyses. Methods: Data from 963 children (age 4 years) who participated in the $5^{th}$ phase of the Panel Study of Korean Children, their parents, and their teachers were analyzed using K-means clustering analyses, F-tests and multinomial logistic regression analyses. Results: The clustering analyses revealed three distinctive profiles: positive-theme oriented, general-exploratory/manipulative, and negative-exploratory/manipulative groups. Child characteristics, including cognition, language, and social level, and teachers' age were significantly associated with the groups in a different way; the clusters were partially different in the gender and creativity of children, interaction level of teachers' interaction, classroom environment, and program types that children attended. Conclusion: Findings revealed three clusters of play behaviors and highlighted the importance of the ecological variables that determined the clusters.

A Study on the Intrusion Tolerance System Applied to the Object Oriented Middleware Environment

  • Shin Seung Jung;Kim Young Soo;Kim Jung Tae;Ryu Dae Hyun;Na Jong Whoa
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.693-698
    • /
    • 2004
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

  • PDF

Analyses of Total Information Security Infrastructure of School Affairs Information System for Secure Ubiquitous-Campus (안전한 Ubiquitous-Campus를 위한 학사정보시스템의 종합정보보안 체계 구축에 관한 분석)

  • Kim, Jung-Tae;Lee, Jun-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.287-291
    • /
    • 2006
  • E-learning has increased on importance as people realize that the use of technology can improve the teaming process. Consequently, new learning environments have been developed. However, in general they are oriented to address a specific e-learning functionality. Therefore, in most of the cases, they are not developed to interoperate with other e-learning tools, which makes the creation of a fully functional e-learning environment more difficult. We analyses of total information security infrastructure of school affairs information system for secure ubiquitous campus.

  • PDF

A Study on Discovery Service using JClarens in Grid Computing Environment (Grid 컴퓨팅 환경에서 JClarens를 이용한 Discovery Service 연구)

  • Shim Eui-Kyu;Lee Moo-Hun;Park Hee-Yong;Choi Eui-In
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.1451-1454
    • /
    • 2006
  • Grid 컴퓨팅은 과학 분야에서 처음 시작되어 현재 과학 분야뿐만 아니라 e-business와 같은 더 많은 분야에서 폭 넓은 활용을 위하여 SOA(Services Oriented Architecture)를 채택하게 되었으며, SOA 프레임워크에 있는 기존의 어플리케이션과 프로그래밍 라이브러리를 통합하게 되었다. 특히 SOA에 기반을 둔 Clarens Grid 서비스 프레임워크는 권한 부여(authorization), 접근 제어(access control), Discovery Service를 제공한다. 본 논문에서는 Java로 구현한 JClarens를 이용하여 Discovery Service를 구현하는 두 가지 방법을 기술하고, 그 구현 방법으로 인해 발생할 수 있는 서비스 재등록으로 인한 네트워크 트래픽 증가에 대한 문제점을 진단하고 재등록을 위한 시간 간격을 차등화 함으로서 이 문제점을 해결할 수 있는 방안을 제안하였다. 따라서 Discovery Service는 Grid 컴퓨팅 환경에서 사용자에게 가장 적절한 자원을 발견할 수 있도록 지원 할 것이다.

  • PDF

The Implementation of a 3D Game Engine based on DirectX 9

  • Kang, Hyun-Myung;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.4 no.3
    • /
    • pp.35-40
    • /
    • 2008
  • Recently, almost games are using the 3D environment. Therefore, it required strongly that well-structured 3D engine or tools for development of some complicate 3D applications efficiently. In this paper, we design and implement a 3D engine (PLay engine) using the DirectX 9 SDK of the Microsoft corporation. The PLay engine has independent module structure, which has object oriented characteristics. and has not only 3D rendering functions but efficient algorithms. Moreover, we implement some tools what has compatibility with our engine for convenience. Therefore, it helps development of a 3D application easily and efficiently. We also describe each module with 2-layer structure, and each tool with compatible module, and make a simple game using PLay engine for testify.

Development of Expert System for Operation in Distribution Systems with Graphic Integrated Environments (그래픽 통합 환경을 갖춘 배전계통 운용 전문가 시스템 개발)

  • Kim, Se-Ho;Seo, Ki-Sung;Kim, Jeong-Keun;Park, Byoung-Youn;Woo, Kwang-Bang
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.41 no.9
    • /
    • pp.960-972
    • /
    • 1992
  • This paper deals with the development of expert system in distribution system which combined with graphic user interface. The proposed expert system can recognize and adjust to the system change, and includes the rule bases of security monitoring. Also it provides load transfer algorithm for efficient load distribution. The graphic user environment for expert system is implemented in the mouse-oriented user interface with overlapped window functions and pull-down menus. Therefore, the developed graphic integrated expert system can afford to assist system operators very conveniently through the various graphic function in proposing an optimal plan of load transfer for fault restoration and outage schedule.