• Title/Summary/Keyword: system deployment

Search Result 878, Processing Time 0.029 seconds

Modified Random Early Defection Algorithm for the Dynamic Congestion Control in Routers (라우터에서의 동적인 혼잡 제어를 위한 새로운 큐 관리 알고리즘)

  • Koo, Ja-Hon;Song, Byung-Hun;Chung, Kwang-Sue;Oh, Seoung-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.517-526
    • /
    • 2001
  • In order to reduce the increasing packet loss rates caused by an exponential increase in network traffic, the IETF(Internet Engineering Task Force) is considering the deployment of active queue management techniques such as RED(Random Early Detection). While active queue management in routers and gateways can potentially reduce total packet loss rates in the Internet, this paper has demonstrated the inherent weakness of current techniques and shows that they are ineffective in preventing high loss rates. The inherent problem with these queue management algorithms is that they all use queue lengths as the indicator of the severity of congestion. In this paper, in order to solve this problem, a new active queue management algorithm called MRED(Modified Random Early Detection) is proposed. MRED computes the packet drop probability based on our heuristic method rather than the simple method used in RED. Using simulation, MRED is shown to perform better than existing queue management schemes. To analyze the performance, we also measure throughput of traffics under the FIFO control, and compared the performance with that of this MRED system.

  • PDF

Application of Concurrent Engineering for Conceptual design of a Future Main Battle Tank (차세대 주력전차의 개념설계를 위한 동시공학의 적용)

  • 김진우;소한균
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.1
    • /
    • pp.38-60
    • /
    • 1999
  • The main objective of this study is systemization of the technique of ROC quantification and optimization of baseline design by applying CE principle to the acquisition process of a weapon system. QFD and TOA techniques can be employed to a good working example of the conceptual design of a future main battle tank. In this paper, Product Planning Phase, the first phase of four QFD phases, is deployed in terms of eight steps including customer requirements and final product control characteristics. TOA is carried out considering only combat weight. In order to perform combat weight analysis and performance TOA, Preliminary Configuration Synthesis Methodology is used. Preliminary Configuration Synthesis Methodology employs the method of least squares and described linear equations of weight interrelation equation for each component of tank. As a result of QFD based upon the ROC, it was cleared that armor piercing power, main armament, type of ammunition, cruising range, combat weight, armor protection, power loading, threat detection and cost are primary factors influencing design and that combat weight is the most dominant one. The results of TOA based on the combat weight constraint show that 5100 lb reduction was required to satisfy the ROC. The baseline design of a future main battle tank is illustrated with assumption that all phases of QFD are employed to development and production process of subsystems, components, and parts of main battle tank. TOA is applied in iterative process between initial baseline design and ROC. The detailed design of each component is illustrated for a future main battle tank.

  • PDF

An Efficient Evolutionary Algorithm for Optimal Arrangement of RFID Reader Antenna (RFID 리더기 안테나의 최적 배치를 위한 효율적인 진화연산 알고리즘)

  • Soon, Nam-Soon;Yeo, Myung-Ho;Yoo, Jae-Soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.715-719
    • /
    • 2009
  • Incorrect deployment of RFID readers occurs reader-to-reader interferences in many applications using RFID technologies. Reader-to-reader interference occurs when a reader transmits a signal that interferes with the operation of another reader, thus preventing the second reader from communicating with tags in its interrogation zone. Interference detected by one reader and caused by another reader is referred to as a reader collision. In RFID systems, the reader collision problem is considered to be the bottleneck for the system throughput and reading efficiency. In this paper, we propose a novel RFID reader anti-collision algorithm based on evolutionary algorithm(EA). First, we analyze characteristics of RFID antennas and build database. Also, we propose EA encoding algorithm, fitness algorithm and genetic operators to deploy antennas efficiently. To show superiority of our proposed algorithm, we simulated our proposed algorithm. In the result, our proposed algorithm obtains 95.45% coverage rate and 10.29% interference rate after about 100 generations.

  • PDF

A Study on the Development of Educational Modules for Aids to Navigation Using the Aid to Navigation Simulator (항로표지 시뮬레이션 시스템을 활용한 항로표지 교육모듈 개발에 관한 연구)

  • Jeong, Woo-Lee;Jo, Gi-Jong;Moon, Serng-Bae
    • Journal of Navigation and Port Research
    • /
    • v.43 no.6
    • /
    • pp.361-368
    • /
    • 2019
  • Aid to Navigation (AtoN) is the artificial facilities to facilitate the ship's safe navigation using light, shape, color, sound, and radio waves. IALA has developed and operated the educational course for expert groups for the design, deployment, and management of AtoN. Also, maritime educational institutes have operated various educational courses for safe navigation through the ship's operation and ECDIS curriculum for seafarers. However, education using the AtoN Simulator System is needed to prevent marine accidents caused by misunderstanding of the AtoN according to various topographical, environmental, and maritime traffic environments. In this study, the existing ship handling simulator and AtoN simulator were applied to develop educational modules for accurate understanding and application of AtoN in various environments, enhancing the quality of education from the existing theoretical point of view and improving practical use to maximize educational efforts.

On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks

  • Karimi, Hamid;Kargahi, Mehdi;Yazdani, Nasser
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.413-434
    • /
    • 2010
  • Wireless sensor networks are usually characterized by dense deployment of energy constrained nodes. Due to the usage of a large number of sensor nodes in uncontrolled hostile or harsh environments, node failure is a common event in these systems. Another common reason for node failure is the exhaustion of their energy resources and node inactivation. Such failures can have adverse effects on the quality of the real-time services in Wireless Sensor Networks (WSNs). To avoid such degradations, it is necessary that the failures be recovered in a proper manner to sustain network operation. In this paper we present a dynamic Energy efficient Real-Time Job Allocation (ERTJA) algorithm for handling node failures in a cluster of sensor nodes with the consideration of communication energy and time overheads besides the nodes' characteristics. ERTJA relies on the computation power of cluster members for handling a node failure. It also tries to minimize the energy consumption of the cluster by minimum activation of the sleeping nodes. The resulting system can then guarantee the Quality of Service (QoS) of the cluster application. Further, when the number of sleeping nodes is limited, the proposed algorithm uses the idle times of the active nodes to engage a graceful QoS degradation in the cluster. Simulation results show significant performance improvements of ERTJA in terms of the energy conservation and the probability of meeting deadlines compared with the other studied algorithms.

A New Approach to Evaluation of Industrial Informatization (차세대 기업 정보화수준 평가 시스템에 관한 연구)

  • Leem, Choon-Seong;Yu, Eun-Jung;Kim, Byeong-Wan;Shin, Seon-Do;Lee, Byeong-Ryul;Cha, Jeong-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.4
    • /
    • pp.125-144
    • /
    • 2008
  • Recently, the main concerns of enterprise management activities is how to strengthen the competitiveness to quickly respond to changes and sustain the growth in business environment. As IT(Information Technology) has become to be viewed as a key driver for the business competitiveness, new paradigms, such as business and IT alignment, IT-driven product/service innovation and so on, are regarded as the hot topic in many industries. However, previous studies related to IT evaluation, which is more critical than any other IT activities, have focused on quantitative IT deployment, utilization and its economical effects. Therefore, this study presents the newly-developed evaluation domains and items based on four pairs of relative concepts in industrial informatization, and their multi-dimensional analysis methodology which explains various types of IT characteristics of enterprises. And finally, pilot tests at 2 companies in financial service sector will be performed in order to verify the practicality of the evaluation system.

  • PDF

Operational Reliability Analysis of Guided Weapon Systems (유도무기 시스템의 운용 신뢰도 분석)

  • Ha, Ju Seok;Kim, Kyung Mo
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.95-101
    • /
    • 2017
  • Reliability is the priority matter in guided weapon systems. The reliability prediction data is used during the devel opment stage as the manufacturing cost is very high and the production quantity if quite limited. At the same time it takes relatively a long period of time to acquire a reliable operation data set after deployment such that in order t o determine the operational reliability, weapons must be tested and analyzed in real operating environments. For the research, the life distributions were estimated by using actual operation data and the reliability was calculated by ap plying the method of least squares and maximum likelihood estimation. Also, the comparisons were made between pr edicted reliability and actual operational reliability. As a result, the actual reliability of each system was higher than predicted reliability and it was considered that such a difference was caused by the fact that the application of the l atest designing technology and improved parts to the guided weapon systems was not reflected on the estimation of predicted reliability. It was possible to confirm the actual operational reliability of domestic (ROK) guided weapon sy stems through this research and the methods used here will contribute to the reliability analyses for the future guide d weapon systems to be developed.

UAV based Wireless Ad hoc Network Performance Analysis (공중무인기 기반의 무선애드혹 네트워크 성능 분석)

  • Chun, Jeong-myong;Ha, Dong-hun;Park, Jae-seong;Yoon, Seok-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.123-125
    • /
    • 2015
  • Wireless ad hoc network which is comprised of wireless nodes that have the limited communication range is utilized to monitoring disaster area, tracing object, and tactical system. But in the case of wireless node on the ground, a network performance decrease because wireless channel is affected from obstacle or the node deployment is restricted. In this paper, we consider wireless network based on UAV(Unmanned Aerial Vehicle) which has little spatial constraint and quickly deploy a position. We implement test-bed included ground nodes and UAV, and measure throughput and PDR(Packet Delivery Ratio) according to the usage of UAV. We show that network performance is improved by relaying data on UAV.

  • PDF

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

Real-Time Object Recognition Using Local Features (지역 특징을 사용한 실시간 객체인식)

  • Kim, Dae-Hoon;Hwang, Een-Jun
    • Journal of IKEEE
    • /
    • v.14 no.3
    • /
    • pp.224-231
    • /
    • 2010
  • Automatic detection of objects in images has been one of core challenges in the areas such as computer vision and pattern analysis. Especially, with the recent deployment of personal mobile devices such as smart phone, such technology is required to be transported to them. Usually, these smart phone users are equipped with devices such as camera, GPS, and gyroscope and provide various services through user-friendly interface. However, the smart phones fail to give excellent performance due to limited system resources. In this paper, we propose a new scheme to improve object recognition performance based on pre-computation and simple local features. In the pre-processing, we first find several representative parts from similar type objects and classify them. In addition, we extract features from each classified part and train them using regression functions. For a given query image, we first find candidate representative parts and compare them with trained information to recognize objects. Through experiments, we have shown that our proposed scheme can achieve resonable performance.