• Title/Summary/Keyword: real time systems

Search Result 6,554, Processing Time 0.038 seconds

The Establishment of an Activity-Based EVM - PMIS Integration Model (액티비티 기반의 EVM - PMIS 통합모델 구축)

  • Na, Kwang-Tae;Kang, Byeung-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.1
    • /
    • pp.199-212
    • /
    • 2010
  • To establish an infrastructure for technology and information in the domestic construction industry, several construction regulations pertaining to construction information have been institutionalized. However, there are major problems with the domestic information classification system, earned value management (EVM) and project management information system (PMIS). In particular, the functions of the current PMIS have consisted of a builder-oriented system, and as EVM is not applied to PMIS, the functions of reporting, analysis and forecast for owners are lacking. Moreover, owners cannot confirm information on construction schedule and cost in real time due to the differences between the EVM and PMIS operation systems. The purpose of this study is to provide a framework that is capable of operating PMIS efficiently under an e-business environment, by providing a proposal on how to establish a work breakdown structure (WBS) and an EVM - PMIS integration model, so that PMIS may provide the function of EVM, and stakeholders may have all information in common. At the core of EVM - PMIS integration is the idea that EVM and PMIS have the same operation system, in order to be an activity-based system. The principle of the integration is data integration, in which the information field of an activity is connected with the field of a relational database table consisting of sub-modules for the schedule and cost management function of PMIS using a relational database management system. Therefore, the planned value (PV), cost value (CV), actual cost (AC), schedule variance (SV), schedule performance index (SPI), cost variance (CV) and cost performance index (CPI) of an activity are connected with the field of the relational database table for the schedule and cost sub-modules of PMIS.

A Quantization-adaptive Watermarking Algorithm to Protect MPEG Moving Picture Contents (MPEG 동영상 컨텐츠 보호를 위한 양자화-적응적 워터마킹 알고리즘)

  • Kim Joo-Hyuk;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.149-158
    • /
    • 2005
  • This paper proposed a blind watermarking method for video contents which satisfies both the invisibility and the robustness to attacks to prohibit counterfeiting, modification, illegal usage and illegal re-production of video contents. This watermarking algorithm targets MPEG compression system and was designed to control the amount of watermarking to be inserted according to the adaptive quantization scale code to follow the adaptive quantization of the compression system. The inserting positions of the watermark were chosen by considering the frequency property of an image and horizontal, vertical and diagonal property of a $8{\times}8$ image block. Also the amount of watermarking for each watermark bit was decided by considering the quantization step. This algorithm was implemented by C++ and experimented for invisibility and robustness with MPEG-2 system. The experiment results showed that the method satisfied enough the invisibility of the inserted watermark and robustness against attacks. For the general attacks, the error rate of the extracted watermark was less than $10\%$, which is enough in robustness against the attacks. Therefore, this algorithm is expected to be used effectively as a part in many MPEG systems for real-time watermarking, especially in the sensitive applications to the network environments.

MPSoC Design Space Exploration Based on Static Analysis of Process Network Model (프로세스 네트워크 모델의 정적 분석에 기반을 둔 다중 프로세서 시스템 온 칩 설계 공간 탐색)

  • Ahn, Yong-Jin;Choi, Ki-Young
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.10
    • /
    • pp.7-16
    • /
    • 2007
  • In this paper, we introduce a new design environment for efficient multiprocessor system-on-chip design space exploration. The design environment takes a process network model as input system specification. The process network model has been widely used for modeling signal processing applications because of its excellent modeling power. However, it has limitation in predictability, which could cause severe problem for real time systems. This paper proposes a new approach that enables static analysis of a process network model by converting it to a hierarchical synchronous dataflow model. For efficient design space exploration in the early design step, mapping application to target architectures has been a crucial part for finding better solution. In this paper, we propose an efficient mapping algorithm. Our mapping algorithm supports both single bus architecture and multiple bus architecture. In the experiments, we show that the automatic conversion approach of the process network model for static analysis is performed successfully for several signal processing applications, and show the effectiveness of our mapping algorithm by comparing it with previous approaches.

Development of a Suitability Analysis System for Wind Energy Facilities Using 3D Web GIS (3차원 Web GIS 기반 풍력에너지 시설물 적지분석 시스템 개발)

  • Kim, Kwang-Deuk;Yun, Chang-Yeol;Jo, Myung-Hee;Kim, Sung-Jae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.3
    • /
    • pp.81-90
    • /
    • 2012
  • Recently, with an increased social interest in new and renewable energy resources, together with rapid advancement in IT(information technology) and spatial information technology, there have recently been a lot of attempts to find out methods to make systematic and scientific use of information technology and spatial information technology, depending upon a fusion with GIS(Geographic Information System) spatial information technology in the field of new and renewable energy. This paper developed a suitability analysis system to conduct a correct and precise analysis of an ideal place for wind energy facilities in comprehensive consideration of topographic, economic, and cultural environments. It also used recent spatial information technology including 3D GIS to develop a supportive system for an analysis and decision making of an ideal place for 3D Web GIS-based wind energy facilities like a precise field information implementation, a 3D result display, a 3D object implementation, simulation, and so on. These systems make it possible to build scientific new-renewable energy facilities, to collect, manage and analyze information in an accurate and quantitative manner. In addition, they help serve as a turning point for the construction of a real-time information supply system. Furthermore, they can support rational decision making by making it possible to analyze a variety of forms of field information through building a system for the management of 3D image-based information on new-renewable energy resources.

Design and Implementation of IEEE 11073/HL7 Translation Gateway Based on U-Healthcare Application Service for M2M (M2M을 위한 U-헬스케어 응용 서비스 기반 IEEE 11073/HL7 변환 게이트웨이 설계 및 구현)

  • Chun, Seung-Man;Nah, Jae-Wook;Park, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.275-286
    • /
    • 2011
  • As the 21st century paradigm of healthcare service changes from post-therapeutic treatment to disease prevention and management in advance, the M2M-based u-healthcare application service is increasingly important. M2M-based u-healthcare application service uses mobile handsets equipped with sensors to measure vital information, and the medical staff in remote locations can manage the health of the patient or the public in real time. In this paper, IEEE/HL7 translation gateway, utilizing the gateway based on M2M u-healthcare application service structure, which is based on international standards, has been designed and implemented. Specifically, the gateway between ISO/IEEE 11073 standards and ANSI HL7 has been developed. The former defines the protocol for the exchange of information between the agent device and the manger devices for measuring and handling biological signal, and the latter defines the application layer protocol for the exchange of various healthcare information systems. Finally, in order to demonstrate the functionality of the proposed architecture, the M2M-based U-healthcare application service based on IEEE/HL7 translation gateway, utilizing the gateway, has been developed which can measure, collect and process a variety of vital signs such as ECG or SpO2.

A Study on Package Design of Intellectual Property Protection Programs -a focus on trademark and registration of design- (패키지디자인의 법적보호에 관한 연구 -의장 및 상표등록을 중심으로-)

  • Yang, Cho-San
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.27-36
    • /
    • 2004
  • The protection of intellectual property right in international conventions are worldwide or regional areas already exists a century. Therefore, our country is positive affiliated with international conventions. After that time, such as a violation of international convention and an example of imitations are continually that we prognosticate the international trade market activities was difficult not only became an issue of country credit risk. At this point, the major purpose of this study make an analysis of both paralleled with the case study follow an example and the comprehension with concerned about recognition of intellectual property right. In additionally, it stands a plan of package design protections under the WTO systems. This study have carried out a theoretical and practical analysis of intellectual property right and statistical analysis through the inside and outside of the country packaging design study and a case study of troubles with intellectual property. Besides, it is accomplish the purpose of the study that established exploratory study survey about inside and outside of the country packaging design infringement case study and relative package design industry employees with consumptions real research. I hoped that this study will be a foundation on which packaging, design industry protections to intellectual property right.

  • PDF

A-team Based Approach for Reactive Power/Voltage Control Considering Steady State Security Assessment (정태 안전성 평가를 고려한 무효전력 전압제어를 위한 A-team기반 접근법)

  • Kim, Doo-Hyun
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.2
    • /
    • pp.150-159
    • /
    • 1996
  • In this paper, an A-team(Asynchronous Team ) based approach for Reactive power and volage control considering static security assessment in a power system with infrastructural deficiencies is proposed. Reactive power and voltage control problem is the one of optimally establishing voltage level given several constraints such as reactive generation, voltage magnitude, line flow, and other switchable reactive power sources. It can be formulated as a mixed-integer linear programming(MILP) problem without deteriorating of solution accuracy to a certain extent. The security assessment is to estimate the relative robustness of the system in Its present state through the evaluation of data provided by security monitoring. Deterministic approach based on AC load flow calculations is adopted to assess the system security, especially voltage security. A security metric, as a standard of measurement for power system security, producting a set of discrete values rather than binary values, is employed. In order to analyze the above two problems, reactive power/voltage control problem and static security assessment problem, in an integrated fashion for real-time operations, a new organizational structure, called an A-team, is adopted. An A-team is an organization for agents which ale all autonomeus, work in parallel and communicate asynchronously, which is well-suited to the development of computer-based, multi-agent systems for operations. This A-team based approach, although it is still in the beginning stage, also has potential for handling other difficult power system problems.

  • PDF

REAL-TIME MEASUREMENT OF DENTINAL TUBULAR FLUID FLOW DURING AND AFTER AMALGAM AND COMPOSITE RESTORATIONS (아말감과 복합레진의 수복 과정과 수복 후 발생하는 상아세관액 흐름의 실시간 측정)

  • Kim, Sun-Young;Cho, Byeong-Hoon;Baek, Seung-Ho;Lim, Bum-Sun;Lee, In-Bog
    • Restorative Dentistry and Endodontics
    • /
    • v.34 no.6
    • /
    • pp.467-476
    • /
    • 2009
  • The aim of this study was to measure the dentinal tubular fluid flow (DFF) during and after amalgam and composite restorations. A newly designed fluid flow measurement instrument was made. A third molar cut at 3 mm apical from the CEJ was connected to the flow measuring device under a hydrostatic pressure of 15 $cmH_2O$. Class I cavity was prepared and restored with either amalgam (Copalite varnish and Bestaloy) or composite (Z-250 with ScotchBond MultiPurpose: MP, Single Bond 2: SB, Clearfil SE Bond: CE and Easy Bond: EB as bonding systems). The DFF was measured from the intact tooth state through restoration procedures to 30 minutes after restoration, and re-measured at 3 and 7days after restoration. Inward fluid flow (IF) during cavity preparation was followed by outward flow (OF) after preparation, In amalgam restoration, the OF changed to IF during amalgam filling and slight OF followed after finishing. In composite restoration, application CE and EB showed a continuous OF and air-dry increased rapidly the OF until light-curing, whereas in MP and SB, rinse and dry caused IF and OF, respectively. Application of hydrophobic bonding resin in MP and CE caused a decrease in flow rate or even slight IF. Light-curing of adhesive and composite showed an abrupt IF. There was no statistically significant difference in the reduction of DFF among the materials at 30 min. 3 and 7 days after restoration (p > 0.05).

Two Design Techniques of Embedded Systems Based on Ad-Hoc Network for Wireless Image Observation (애드 혹 네트워크 기반의 무선 영상 관측용 임베디드 시스템의 두 가지 설계 기법들)

  • LEE, Yong Up;Song, Chang-Yeoung;Park, Jeong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.5
    • /
    • pp.271-279
    • /
    • 2014
  • In this paper, the two design techniques of the embedded system which provides a wireless image observation with temporary ad-hoc network are proposed and developed. The first method is based on the embedded system design technique for a nearly real-time wireless short observation application, having a specific remote monitoring node with a built-in image processing function, and having the maximum rate of 1 fps (frame per second) wireless image transmission capability of a $160{\times}128$size image. The second technique uses the embedded system for a general wireless long observation application, consisting of the main node, the remote monitoring node, and the system controller with built-in image processing function, and the capability of the wireless image transmission rate of 1/3 fps. The proposed system uses the wireless ad-hoc network which is widely accepted as a short range, low power, and bidirectional digital communication, the hardware are consisted of the general developed modules, a small digital camera, and a PC, and the embedded software based upon the Zigbee stack and the user interface software are developed and tested on the implemented module. The wireless environment analysis and the performance results are presented.

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.