• Title/Summary/Keyword: terminal constraints

Search Result 87, Processing Time 0.029 seconds

Implementation of Personal Energy Management System Using DDNS (DDNS를 이용한 개인 에너지 관리 시스템 구현)

  • Jeong, Nahk-Ju;Lee, Chun-Hee;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1321-1326
    • /
    • 2015
  • The amount of smart phones has increased exponentially. Due to the periodic release of high-performance smart phones and upgraded operating system, new smart phones become out-dated over 1 or 2 years. In order to solve environmental constraints of these smart phones, virtualization technology using Thin-Client terminal has been developed. However, in the case of Virtual Machine(VM), the applications associated with sensors and a GPS device can not run because they are not included. In this paper, by implementing the device driver for Android running in a virtual machine in the x86-based systems, it is to provide Android virtualization capabilities such as using the latest smart phones in the virtual machine environment. It would like to propose a method that the virtual device driver receives sensors and GPS information from the old Android smart phones(Thin-Client) that actually work and run as if the real device exists.

An Optimal Operation of Multi-Reservoirs for Flood Control by Incremental DP (Incremental DP에 의한 홍수시 댐군의 연계운영)

  • Lee, Jae-Hyeong;Lee, Gil-Seong;Jeong, Dong-Guk
    • Water for future
    • /
    • v.25 no.2
    • /
    • pp.47-60
    • /
    • 1992
  • An optimal operation model for flood control of multi-reservoirs, Hwacheon and Soyanggang, located in the north Han River basin is developed by using the Incremental DP. The objective function is to minimize the peak flow at the confluence point, of Euam dam, and the hydraulic and hydrologic constraints are established by considering the related laws as to the operation of dam in flood season, each reservoir and channel characteristics. In particular, the final elevations of each reservoir are induced to the conservation pool level in order to prepare for the secondary flood. In addition, the results of this model, simulation results and the single reservoir operation by DP are compared in terms of control and utility efficiencies, and also the peak flows at the confluence point for floods with various return periods are compared with the results of simulation suing feedback control. as the results, the control and utility effciencies are more or less low in contrast with the results of simulation and the single reservoir operation by DP, and the peak flows at confluence point are high because of terminal condition of reservoir storage.

  • PDF

Low Thrust, Fuel Optimal Earth Escape Trajectories Design (저추력기를 이용한 연료 최적의 지구탈출 궤적 설계 연구)

  • Lee, Dong-Hun;Bang, Hyo-Choong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.7
    • /
    • pp.647-654
    • /
    • 2007
  • A Discrete continuation Method/homotopy approaches are studied for energy/fuel optimal low thrust Earth escape trajectory by solving a two point boundary value problem(TPBVP). Recently, maneuvers using low thrust propulsion system have been identified as emerging technologies. The low thruster is considered as the main actuator for orbit maneuvers. The cost function consists of a energy/fuel consumption function, and constraints are position and velocity vectors at the terminal escape point. Solving the minimum energy/fuel problem directly is not an easy task, so we adopt the homotopy analysis. Using a solution of the minimum energy, which is solved by discrete continuation method, we obtain the solution of the minimum fuel problem.

Design and Implementation of the Simulator for Evaluating the Performance of Container Cranes (컨테이너크레인 성능평가를 위한 시뮬레이터 설계 및 구현)

  • Won, Seung-Hwan;Choi, Sang-Hei
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.3
    • /
    • pp.119-136
    • /
    • 2009
  • According to the increase of container flows and the appearance of large-sized container vessels, the container handling equipment in ports is evolving continuously. This research introduces the simulation model for evaluating in detail the mechanical productivity of container cranes. The model considers a single trolley and dual trolleys as the mechanism of a container crane and a single lift, a twin lift, and a tandem lift as the spreader type of it. Additionally, the detail specifications such as the dimension and the speed of a container crane are inputted and the kinematic characteristics of it are simulated. The model also considers the size of a vessel, the storage position of containers in the vessel, and the weight of containers as external physical constraints. Experimental conditions can be configured conveniently because various parameters in the model are separated. Moreover, the model can accommodate flexibly new equipment types and the changes of the existing equipment because it is designed and developed in object-oriented concept.

  • PDF

Structural Optimization for LMTT-Mover Using the Kriging Based Approximation Model (크리깅 근사모델 모델을 이용한 LMTT 이동체의 구조최적설계)

  • Lee, Kwon-Hee;Park, Hyung-Wook;Han, Dong-Seop;Han, Geun-Jo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.385-390
    • /
    • 2005
  • LMTT (Linear Motor-based Transfer Techn-ology) is a horizontal transfer system for the yard automation, which has been proposed to take the place of AGV (Automated Guided Vehicle) in the maritime container terminal. The system is based on PLMSL (Permanent Magnetic Linear Synchronous Motor) that consists of stator modules on the rail and shuttle car. It is desirable to reduce the weight of LMTT in order to control the electronic devices with minimum energy. In this research, the DACE modeling, known as the one of Kriging interpolation, is introduced to obtain the surrogate approximation model of the structural responses. Then, the GRG(Generalized Reduced Gradient) method built in Excel is adopted to determine the optimum. The objective function is set up as weight. On the contrary, the design variables are considered as transverse, longitudinal and wheel beam's thicknesses, and the constraints are the maximum stresses generated by four loading conditions.

  • PDF

cdma2000 Physical Layer: An overview

  • Willenegger, Serge
    • Journal of Communications and Networks
    • /
    • v.2 no.1
    • /
    • pp.5-17
    • /
    • 2000
  • cdma2000 offers several enhancement as compared to TIA/EIA-95, although it remains fully compatible with TIA/EIA-95 systems and allows for a smooth migration from one to the other-Major new capability include:1)connectivity to GSM-MAP in addition to IP and IS-41 networks; 2) new layering with new LAC and MAC architectures for improved service multiplexing and QoS management and efficient use of radio resource ;3) new bands and band widths of operation in support of various operator need and constraints, as well as desire for a smooth and progressive migration to cdma 2000; and 4) flexible channel structure in support of multiple services with various QoS and variable transmission rates at up to 1 Mbps per channel and 2 Mbps per user. Given the phenomenal success of wireless services and desire for higher rate wireless services. improved spectrum efficiency was a major design goal in the elaboration of cdma2000. Major capacity enhancing features include; 1) turbo coding for data transmission: 2)fast forward link power control :3) forward link transmit diversity; 4) support of directive antenna transmission techniques; 5) coherent reverse link structure; and 6) enhanced access channel operation. As users increasingly rely on their cell phone at work and at home for voice and data exchange, the stand-by time and operation-time are essential parameters that can influence customer's satisfaction and service utilization. Another major goal of cdma2000 was therefore to enable manufacturers to further optimize power utilization in the terminal. Major battery life enhancing features include; 1) improved reverse link performance (i.e., reduced transmit power per information bit; 2) new common channel structure and operation ;3) quick paging channel operation; 4) reverse link gated transmission ; and 5) new MAC stated for efficient and ubiquitous idle time idle time operation. this article provides additional details on those enhancements. The intent is not to duplicate the detailed cdma2000 radio access network specification, but rather to provide some background on the new features of cdma2000 and on the qualitative improvements as compared to the TIA/EIA-95 based systems. The article is focused on the physical layer structure and associated procedures. It therefore does not cover the MAC, LAC, radio resource management [1], or any other signaling protocols in any detail. We assume some familiarity with the basic CDMA concepts used in TIA/EIA-95.

  • PDF

A Study for Key Generation and Access Control Protocol in BYOD Environments (BYOD환경에서 키 생성 및 접근 제어 프로토콜에 관한 연구)

  • Min, So-Yeon;Jin, Byung-Wook;Lee, Kwang-Hyoung;Lee, Keun-Wang
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.27-35
    • /
    • 2015
  • Depending on the smart device user growth and development of communication technology, the area about working environment was extended without constraints of time and places. It is introducing to work using user's devices and this environment is called 'BYOD(Bring Your On Device)'. But it is vulnerable to security threat that happened in existing wireless environment and its security threat issue which is caused by inside information leak by an inside job and lost or stolen terminal which is caused by careless user is getting heated. So we studied about access control protocol by user rights under the BYOD situation make a session key based on the user information. We make a session key based on the user information and user device information, after that we design an access control protocol. The protocol we suggest can protect from attack under the BYOD situation and wireless communication situation and also safety and security requirement from inside information leak because it controls user rights.

Security Threats in the Mobile Cloud Service Environment (모바일 클라우드 서비스 환경에서의 보안위협에 관한 연구)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.263-269
    • /
    • 2014
  • Mobile Cloud Service will provide cloud services through mobile devices. Because storage space constraints and computing process performance limitations of mobile devices, this service will process in the cloud environment after moving works and data that have to process in mobile terminal. The obstacles of mobile cloud service activity will have concerned high about the reliability service, data security, and the confidentiality security. In particular, in convergence of mobile services and cloud services, each threats are expected to be generated complicatedly. In this paper, we define the type of mobile cloud services as well as security threats that can occur in mobile cloud. Also we suggest security countermeasures in mobile app. and enterprises countermeasures. We suggest verification of mobile applications for user information protection about security countermeasures in mobile app. Also we describe the cloud providers responsibility and user responsibility about enterprises countermeasures.

An Efficient Path Management for end-to-end QoS Provisioning Scheme on Mobile Environments (모바일환경에서의 종단 간 QoS 제공을 위한 효율적 경로관리기법)

  • Ahn Byung-Ho;Ahn Jung-Hyun;Cho Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3B
    • /
    • pp.207-215
    • /
    • 2006
  • It has known that the handover based on MIP in mobile environments has many constraints for proving seamless service due to well hon problems. Although there has been researching for the solutions, such as MRSVP and HMRSVP etc, it is difficult to do the research related with QoS due to the issues based on MIP used as a seamless mobility. In this paper, the seamless provides in a mobility based on SCTP, which is applied by IntServ for end-to-end QoS service. The paper also proposes the path management scheme for saving reservation cost. the scheme searches a new path on the moving mobile terminal and reserves the resources on the path for providing seamless QoS service. The paper is also analyzed on the comparition between a SCTP based and MIP based solutions. the scheme is evaluated using the cost effect saved for resource reservation.

Design of Bluetooth based MMORPG Game in MANETs (모바일 애드-혹 망에서 Bluetooth 기반 MMORPG의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.39-45
    • /
    • 2009
  • With the rapid growth of recent wireless mobile computing application technology and handheld mobile terminal device development technology, one of the big issue in these fields is to design online games in wireless mobile ad hoc network environment. Online games in mobile computing environment have lots of constraints for developing online games because mobile terminals have many limitations such as low performance of processor, limited memory space, small bandwidth of wireless communication, and confined life of battery power. Therefore, most of mobile games are restrictive in the function of online and multi-play up to date. In this paper, the online MMORPG game, capable of multi-play with many other mobile users using mobile terminals in wireless mobile computing environment, is designed and implemented. Proposed mobile online game uses bluetooth to construct temporary wireless mobile ad hoc network with other mobile clients, and designed to carry out online MMORPG game with these clients. It also supports multi-play among them.

  • PDF