• 제목/요약/키워드: real-time network

Search Result 4,424, Processing Time 0.031 seconds

Spatial Data Model of Feature-based Digital Map using UFID (UFID를 이용한 객체기반 수치지도 공간 데이터 모델)

  • Kim, Hyeong-Soo;Kim, Sang-Yeob;Lee, Yang-Koo;Seo, Sung-Bo;Park, Ki-Surk;Ryu, Keun-Ho
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.71-78
    • /
    • 2009
  • A demand on the spatial data management has been rapidly increased with the introduction and diffusion process of ITS, Telematics, and Wireless Sensor Network. And many different users use the digital map that offers various thematic spatial data. Spatial data for digital map can be managed by tile-based and feature-based data. The existing tile-based digital map management systems have difficult problems such as data construction, history management, and update data based on a spatial object. In order to solve these problems, we proposed the data model for feature-based digital map management system for representation of feature-based seamless map, history management, real-time update of spatial data, and analyzed the validity and utility of the proposed model.

  • PDF

A Study on NOx Emission Control Methods in the Cement Firing Process Using Data Mining Techniques (데이터 마이닝을 이용한 시멘트 소성공정 질소산화물(NOx)배출 관리 방법에 관한 연구)

  • Park, Chul Hong;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.3
    • /
    • pp.739-752
    • /
    • 2018
  • Purpose: The purpose of this study was to investigate the relationship between kiln processing parameters and NOx emissions that occur in the sintering and calcination steps of the cement manufacturing process and to derive the main factors responsible for producing emissions outside emission limit criteria, as determined by category models and classification rules, using data mining techniques. The results from this study are expected to be useful as guidelines for NOx emission control standards. Methods: Data were collected from Precalciner Kiln No.3 used in one of the domestic cement plants in Korea. Thirty-four independent variables affecting NOx generation and dependent variables that exceeded or were below the NOx emiision limit (>1 and <0, respectively) were examined during kiln processing. These data were used to construct a detection model of NOx emission, in which emissions exceeded or were below the set limits. The model was validated using SPSS MODELER 18.0, artificial neural network, decision treee (C5.0), and logistic regression analysis data mining techniques. Results: The decision tree (C5.0) algorithm best represented NOx emission behavior and was used to identify 10 processing variables that resulted in NOx emissions outside limit criteria. Conclusion: The results of this study indicate that the decision tree (C5.0) can be applied for real-time monitoring and management of NOx emissions during the cement firing process to satisfy NOx emission control standards and to provide for a more eco-friendly cement product.

Design of Steel Structures Using the Neural Networks with Improved Learning (개선된 인공신경망의 학습방법에 의한 강구조물의 설계)

  • Choi, Byoung Han;Lim, Jung Hwan
    • Journal of Korean Society of Steel Construction
    • /
    • v.17 no.6 s.79
    • /
    • pp.661-672
    • /
    • 2005
  • For the efficient stochastic optimization of steel structures for which a large number of analyses is required, artificial neural networks,which have emerged as a powerful tool that could have been used to replace time-consuming procedures in many scientific or engineering applications, are applied. They are utilized for the solution of the equilibrium equations resulting from the application of the finite element method in connection with the reanalysis type of problem, for which a large number of finite element analyses are required in this study. As such, the use of artificial neural networks to predict finite element analysis outputs simplifies and facilitates the performance of the stochastic optimal design of structural systems where a trained neural network is used to replace the structural reanalysis phase. Moreover, to improve efficiency of used artificial neural networks, genetic algorithm is utilized. The stochastic optimizer used in this study is an algorithm based on the evolution theory. The efficiency of the proposed procedure is examined in problems with both volume (weight) functions and real-world cost functions

Design and Implementation of A Multi-Point Multimedia Conference System Using IP Grouping (IP 그룹화를 이용한 다자간 멀티미디어 회의시스템의 설계 및 구현)

  • Sung Baek-Kyon;Seong Dong-Su;Lee Keon-Bae;Hyun Don-Whan
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.1012-1021
    • /
    • 2005
  • This paper describes the design and implementation of an efficient multi-point multimedia conference system using IP grouping. Existing multi-point multimedia conference systems are difficult for multi-user to perform efficient cooperation due to bandwidth limitation for data transmission of video, audio and documentation. In the case that multi-user uses limited bandwidth, smooth cooperation does not accomplish due to transmission delay for the real-time transmission of image and speech data. A hybrid transfer method which is mixed with distributed and centralized methods is used for smooth cooperation, and the network bandwidth is reduced by forming multi-user conference systems of IP grouping in this paper. Also, adaptive image frame variations are used to solve bottleneck effect according to the number of users. An efficient multi-user conference system is designed to support audio quality.

  • PDF

Weld Quality Monitoring System Development Applying A design Optimization Approach Collaborating QFD and Risk Management Methods (품질 기능 전개법과 위험 부담 관리법을 조합한 설계 최적화 기법의 용접 품질 감시 시스템 개발 응용)

  • Son, Joong-Soo;Park, Young-Won
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.2
    • /
    • pp.207-216
    • /
    • 2000
  • This paper introduces an effective system design method to develop a customer oriented product using a design optimization process and to select a set of critical design paramenters,. The process results in the development of a successful product satisfying customer needs and reducing development risk. The proposed scheme adopted a five step QFD(Quality Function Deployment) in order to extract design parameters from customer needs and evaluated their priority using risk factors for extracted design parameters. In this process we determine critical design parameters and allocate them to subsystem designers. Subsequently design engineers develop and test the product based on these parameters. These design parameters capture the characteristics of customer needs in terms of performance cost and schedule in the process of QFD, The subsequent risk management task ensures the minimum risk approach in the presence of design parameter uncertainty. An application of this approach was demonstrated in the development of weld quality monitoring system. Dominant design parameters affect linearity characteristics of weld defect feature vectors. Therefore it simplifies the algorithm for adopting pattern classification of feature vectors and improves the accuracy of recognition rate of weld defect and the real time response of the defect detection in the performance. Additionally the development cost decreases by using DSP board for low speed because of reducing CPU's load adopting algorithm in classifying weld defects. It also reduces the cost by using the single sensor to measure weld defects. Furthermore the synergy effect derived from the critical design parameters improves the detection rate of weld defects by 15% when compared with the implementation using the non-critical design parameters. It also result in 30% saving in development cost./ The overall results are close to 95% customer level showing the effectiveness of the proposed development approach.

  • PDF

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

A dual-link CC-NUMA System Tolerant to the Multiprogramming Environment (다중 프로그램 환경에 적합한 이중 연결 CC-NUMA 시스템)

  • Suh, Hyo-Joong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.199-206
    • /
    • 2004
  • Under the multiprogrammed situation, the performance of multiprocessor system is affected by the process allocation policy of the operating systems. The lowest communication cost can be achieved when the related processes positioned to the adjacent processors. While the effective allocation is quite difficult to the real situation, and the processing of the allocation policy consumes some computation time. The dual-ring CC-NUMA systems exhibit a quite performance difference according to the process a1location policy due to a lot of unbalanced memory transactions on the interconnection networks. In this paper, I propose a load balanced dual-link CC-NUMA system that does not requires the processes allocation policy. By the program-driven simulation results. the proposed system shows no remarkable difference according to the allocation policy while the dual-ring systems shows 10% performance improvement by the process allocation. In addition, the proposed system outperforms the dual~ring systems about 1.5 times.

Performance Analysis of Bandwidth Allocation Scheme using POBP Method in ATM Networks. (ATM 네트워크에서 POBP 방식을 이용한 대역폭 할당 방법의 성능분석)

  • 한상엽;박광채
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.3
    • /
    • pp.537-548
    • /
    • 2000
  • ATM is the effective information transmission method which multiply statistical and can accept effective the traffic of the various transmission rate. However, it can happen excessive cell loss probability and cell delay when it have temporarily overload. Therefore, it is required the effective traffic control and network resource management for which guarantee QoS(Quality of Service) in terms of users and bandwidth utilization maximization in terms of networks. In this paper, we proposed POBP(PushOut BP) scheme which mixed pushout scheme with BP(Back Pressure), reactive control scheme recommended at the ATM Forum, to guarantee QoS in two stages ATM switch networks. In proposed method, we have to understand exactly using bandwidth information in real-time and become traffic shaping. Thorough these processes, we can not only use effectively unused bandwidth, but also guarantee the fair bandwidth utilization and then can improve cell-loss possibility happened by congestion states in two stage ATM networks.

  • PDF

Priority Collision Resolution Algorithm on HFC Networks (우선 순위를 고려한 HFC 망의 충돌 해소 알고리즘)

  • 김변곤;박준성;정경택;전병실
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1252-1260
    • /
    • 1999
  • The HFC network has a architecture of a star topology in fiber optic trunks, and tree and branch topology is used in the part of coaxial cable. It is well known that the HFC upstream channel is noisy. Ingress, common mode distortion and impulse noise exist in the upstream channel. In order to provide Quality of Service(QoS) to users with real-time data such as voice, video and interactive services, the evolving IEEE 802.14 standard for HFC networks must include an effective priority scheme. The scheme separates and resolves collisions between stations in a priority order. It is important to simulate protocols under a practical environment. The proposed algorithm in this paper is simulated with the assumption that the collision detector made certain mistake due to noises. Simulation results show that the proposed algorithm is more efficient than existing tree-based algorithm under practical environment.

  • PDF

A Pipelined Design of the Block Cipher Algorithm SEED (SEED 블록 암호 알고리즘의 파이프라인 하드웨어 설계)

  • 엄성용;이규원;박선화
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.3_4
    • /
    • pp.149-159
    • /
    • 2003
  • The need for information security increases interests on cipher algorithms recently. Especially, a large volume of data transmission over high-band communication network requires faster encryption and decryption techniques for real-time processing. It would be a good solution for this problem that we implement the cipher algorithm in forms of hardware circuits. Though some previous researches use this approach, they focus only on repeatedly executing the core part of the algorithm to minimize the hardware chip size, while most cipher algorithms are inherently parallel. In this paper, we propose a new design for the SEED block cipher algorithm developed by KISA (Korea Information Security Agency) in 1998 as Korean standard cipher algorithm. It exploits the parallelism of the algorithm basically and implements it in a pipelined fashion. We described the design in VHDL program and performed functional simulations on the program, and then found that it worked correctly. In addition, we synthesized it and verified that it could be implemented in a single FPGA chip, implying that the new design can be Practically used for the actual hardware implementation of a high-speed and high-performance cipher system.