• Title/Summary/Keyword: real-time network

Search Result 4,424, Processing Time 0.035 seconds

A Study on the Optimization Problem for Offshore Oil Production and Transportation (해양 석유 생산 및 수송 최적화 문제에 관한 연구)

  • Kim, Chang-Soo;Kim, Si-Hwa
    • Journal of Navigation and Port Research
    • /
    • v.39 no.4
    • /
    • pp.353-360
    • /
    • 2015
  • The offshore oil production requires a huge amount of cost and time accompanied by multiple variables due to the peculiar nature of 'offshore'. And every process concerned is controlled by elaborate series of plans for reducing loss of lives, environment and property. This paper treats an optimization problem for offshore oil production and transportation. We present an offshore production and transportation network to define scope of the problem and construct a mixed integer linear programming model to tackle it. To demonstrate the validity of the optimization model presented, some computational experiments based on hypothetical offshore oil fields and demand markets are carried out by using MS Office Excel solver. The downstream of the offshore production and transportation network ends up with the maritime transportation problem distributing the crude oil produced from offshore fields to demand markets. We used MoDiSS(Model-based DSS in Ship Scheduling) which was built to resolve this maritime transportation problem. The paper concludes with the remark that the results of the study might be meaningfully applicable to the real world problems of offshore oil production and transportation.

Load Balancing of Unidirectional Dual-link CC-NUMA System Using Dynamic Routing Method (단방향 이중연결 CC-NUMA 시스템의 동적 부하 대응 경로 설정 기법)

  • Suh Hyo-Joon
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.557-562
    • /
    • 2005
  • Throughput and latency of interconnection network are important factors of the performance of multiprocessor systems. The dual-link CC-NUMA architecture using point-to-point unidirectional link is one of the popular structures in high-end commercial systems. In terms of optimal path between nodes, several paths exist with the optimal hop count by its native multi-path structure. Furthermore, transaction latency between nodes is affected by congestion of links on the transaction path. Hence the transaction latency may get worse if the transactions make a hot spot on some links. In this paper, I propose a dynamic transaction routing algorithm that maintains the balanced link utilization with the optimal path length, and I compare the performance with the fixed path method on the dual-link CC-NUMA systems. By the proposed method, the link competition is alleviated by the real-time path selection, and consequently, dynamic transaction algorithm shows a better performance. The program-driven simulation results show $1{\~}10\%$ improved fluctuation of link utilization, $1{\~}3\%$ enhanced acquirement of link, and $1{\~}6\%$ improved system performance.

A Study on User Interface of the Broadband Access Network Operation Support System (광대역 가입자망 운용관리를 위한 그래픽 유저 인터페이스(GUI) 개발에 관한 연구)

  • 장은상;이종호;임현민;하동석
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.61-68
    • /
    • 1999
  • Most of the time, developers spend their energy to analyze the main function of the system or make source codes. As a result, they can not consider user interface on their own system and this is true in most programmer's world. But we want to consider the design concept in developing mechanism. In this case we have to upgrade the legacy system which maintaining the transmission system using the copper cables, and add the transmission system using the optical fiber cables. Therefore we design the user interface make easy for end users who are using the maintaining system on copper cables not to confuse the new system which include optical fibers. Especially, we are consider the developing model of design policy and real user to make easy to use new system. In this paper we will describe the instance to adapt the design concept on Broadband Access Network Operation Support System.

  • PDF

Identification of Japanese Black Cattle by the Faces for Precision Livestock Farming (흑소의 얼굴을 이용한 개체인식)

  • 김현태;지전선랑;서률귀구;이인복
    • Journal of Biosystems Engineering
    • /
    • v.29 no.4
    • /
    • pp.341-346
    • /
    • 2004
  • Recent livestock people concern not only increase of production, but also superior quality of animal-breeding environment. So far, the optimization of the breeding and air environment has been focused on the production increase. In the very near future, the optimization will be emphasized on the environment for the animal welfare and health. Especially, cattle farming demands the precision livestock farming and special attention has to be given to the management of feeding, animal health and fertility. The management of individual animal is the first step for precision livestock farming and animal welfare, and recognizing each individual is important for that. Though electronic identification of a cattle such as RFID(Radio Frequency Identification) has many advantages, RFID implementations practically involve several problems such as the reading speed and distance. In that sense, computer vision might be more effective than RFID for the identification of an individual animal. The researches on the identification of cattle via image processing were mostly performed with the cows having black-white patterns of the Holstein. But, the native Korean and Japanese cattle do not have any definite pattern on the body. The purpose of this research is to identify the Japanese black cattle that does not have a body pattern using computer vision technology and neural network algorithm. Twelve heads of Japanese black cattle have been tested to verify the proposed scheme. The values of input parameters were specified and then computed using the face images of cattle. The images of cattle faces were trained using associate neural network algorithm, and the algorithm was verified by the face images that were transformed using brightness, distortion, and noise factors. As a result, there was difference due to transform ratio of the brightness, distortion, and noise. And, the proposed algorithm could identify 100% in the range from -3 to +3 degrees of the brightness, from -2 to +4 degrees of the distortion, and from 0% to 60% of the noise transformed images. It is concluded that our system can not be applied in real time recognition of the moving cows, but can be used for the cattle being at a standstill.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

An Efficient USR system design and implementation based on the USN (USN을 이용한 효율적인 USR 시스템 설계 및 구현)

  • Jin, Woo-Jeong;Xiao, Huang;Jeong, Dae-Ryeong;Shin, Geuk-Jae;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.451-453
    • /
    • 2010
  • The world is rapidly evolving in the future society is based on intelligence. In such circumstances, USN(Ubiquitous Sensor Network) to implement the future ubiquitous(Ubiquitous) society have been highlighted as a key infrastructure. For realization of Ubiquitous computing(Ubiquitous Computing), The data recognized from each sensors must be collected on real-time and transferred to applied service so that they may be used as data for providing service to users. USN sensor data on the use for using a numerous sensor data provision service, service provider can publish its service in standardized registry for users to search and use the service registry. However, in previous studies using Web services standards WS-Eventing, and UDDI(Universal Description, Discovery, and Integration) as USR(USN Service Registry) for USN Application Service is unnecessary or insufficient. In this paper, data from sensors that provide information to service providers register their services and use the information for service users to explore and views on the registry of the system was designed and implemented.

  • PDF

Development of Ubiquitous Sensor Network Intelligent Bridge System (유비쿼터스 센서 네트워크 기반 지능형 교량 시스템 개발)

  • Jo, Byung Wan;Park, Jung Hoon;Yoon, Kwang Won;Kim, Heoun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.16 no.1
    • /
    • pp.120-130
    • /
    • 2012
  • As long span and complex bridges are constructed often recently, safety estimation became a big issue. Various types of measuring instruments are installed in case of long span bridge. New wireless technologies for long span bridges such as sending information through a gateway at the field or sending it through cables by signal processing the sensing data are applied these days. However, The case of occurred accidents related to bridge in the world have been reported that serious accidents occur due to lack of real-time proactive, intelligent action based on recognition accidents. To solve this problem in this study, the idea of "communication among things", which is the basic method of RFID/USN technology, is applied to the bridge monitoring system. A sensor node module for USN based intelligent bridge system in which sensor are utilized on the bridge and communicates interactively to prevent accidents when it captures the alert signals and urgent events, sends RF wireless signal to the nearest traffic signal to block the traffic and prevent massive accidents, is designed and tested by performing TinyOS based middleware design and sensor test free Space trans-receiving distance.

A Study on the Analysis of Electric Energy Pattern Based on Improved Real Time NIALM (개선된 실시간 NIALM 기반의 전기 에너지 패턴 분석에 관한 연구)

  • Jeong, Han-Sang;Sung, Kyung-Sang;Oh, Hae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.34-42
    • /
    • 2017
  • Since existing nonintrusive appliance load monitoring (NIALM) studies assume that voltage fluctuations are negligible for load identification, and do not affect the identification results, the power factor or harmonic signals associated with voltage are generally not considered parameters for load identification, which limits the application of NIALM in the Smart Home sector. Experiments in this paper indicate that the parameters related to voltage and the characteristics of harmonics should be used to improve the accuracy and reliability of the load monitoring system. Therefore, in this paper, we propose an improved NIALM method that can efficiently analyze the types of household appliances and electrical energy usage in a home network environment. The proposed method is able to analyze the energy usage pattern by analyzing operation characteristics inherent to household appliances using harmonic characteristics of some household appliances as recognition parameters. Through the proposed method, we expect to be able to provide services to the smart grid electric power demand management market and increase the energy efficiency of home appliances actually operating in a home network.

Resource Weighted Load Distribution Policy for Effective Transcoding Load Distribution (효과적인 트랜스코딩 부하 분산을 위한 자원 가중치 부하분산 정책)

  • Seo, Dong-Mahn;Lee, Joa-Hyoung;Choi, Myun-Uk;Kim, Yoon;Jung, In-Bum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.401-415
    • /
    • 2005
  • Owing to the improved wireless communication technologies, it is possible to provide streaming service of multimedia with PDAs and mobile phones in addition to desktop PCs. Since mobile client devices have low computing power and low network bandwidth due to wireless network, the transcoding technology to adapt media for mobile client devices considering their characteristics is necessary. Transcoding servers transcode the source media to the target media within corresponding grades and provide QoS in real-time. In particular, an effective load balancing policy for transcoding servers is inevitable to support QoS for large scale mobile users. In this paper, the resource weighted load distribution policy is proposed for a fair load balance and a more scalable performance in cluster-based transcoding servers. Our proposed policy is based on the resource weighted table and number of maximum supported users, which are pre-computed for each pre-defined grade. We implement the proposed policy on cluster-based transcoding servers and evaluate its fair load distribution and scalable performance with the number of transcoding servers.

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF