• 제목/요약/키워드: 계층 모델

검색결과 1,487건 처리시간 0.031초

A Study of Autonomous Intelligent Load Management System Based on Queueing Model (큐잉모델에 기초한 자율 지능 부하 관리 시스템 연구)

  • Lee, Seung-Chul;Hong, Chang-Ho;Kim, Kyung-Dong;Lee, In-Yong;Park, Chan-Eom
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • 제22권2호
    • /
    • pp.134-141
    • /
    • 2008
  • This paper presents an innovative load management technique that can effectively lower the summer peak load by adjusting the aircondition loads through smoothe coordinations between utility companies and large customers. An intelligent hierarchical load management system composed of a Central Intelligent Load Management System(CIMS) and multiple Local Intelligent Management Systems(LIMS) is also proposed to implement the reposed technique. Upon receiving a load curtailment request from the utilities, CIMS issues tokens, which can be used by each LIMS as a right to turn on the airconditioner. CIMS creates and maintains a queue for fair allocation of the tokens among the LIMS demanding tokens. By adjusting the number tokens and queue management Policies, desired load factors can be achieved conveniently. The Markov Birth and Death Process and the Balance Equations are employed in estimating various queue performances. The proposed technique is tested using a summer load data of a large apartment complex and proved to be quite effective in load management while minimizing the customer inconveniences.

A Design of a Network Module supporting Primitive Messaging Operations for MOM (MOM의 Primitive Messaging Operation을 지원하는 네트워크 모듈 설계)

  • Kang, Tae-Gun;Sohn, Kang-Min;Ham, Ho-Sang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2003년도 추계학술발표논문집 (상)
    • /
    • pp.115-118
    • /
    • 2003
  • 최근 MOM 기술은 비즈니스 로직을 수행하는 애플리케이션 서버의 필수적인 구성요소로서 자리잡고 있으며, 보통 수백에서 수천의 클라이언트 요청을 처리할 수 있는 능력을 제공한다. MOM 은 이러한 대용량의 클라이언트 요청을 효과적으로 처리하기 위해서 효율적이고 확장성있는(스케일러블) 네트워크 모듈이 필요하며, 다양한 네트워크 프로토콜을 지원해야 한다. MOM이 기본적으로 지원하는 메시징 기능은 PTP(Point-To-Point)와 publish/subscribe 메시징 도메인으로 나뉘는데 이 논문에서는 두 가지 메시징 도메인과 그룹통신 메시징 서비스 기능을 동시에 지원하는 MoIM-Message 시스템의 하부 통신 모듈의 설계에 대해 기술한다. PTP와 publish/subscribe 메시징을 지원하기 위해 세가지 프리미티브 메시징 오퍼레이션인 "synchronous send", "synchronous receive", "asynchronous receive"를 정의하였으며 하부 통신 모듈 역할을 하는 메시지 트랜스포트 관리 계층내의 트랜스포트 관리자 내에 구현되었다. 트랜스포트 관리자는 다양한 트랜스포트 프로토콜을 적용할 수 있도록 하기 위해 트랜스포트 어댑터로 설계되었으며, 대량의 통신 요청을 효과적으로 처리하기 위해 "polling with multiple service thread model" 기법을 적용하여 구현되었다. 또한, 모바일 클라이언트 환경을 지원하기 위해 클라이언트 측 통신 모듈을 IPaq PDA 상에 포팅하였다. 본 논문에서 제안하는 세 가지 프리미티브 메시징 오퍼레이션을 제공하는 통신 모듈은 MOM이 기본적으로 지원해야 할 메시징 도메인과 대용량의 클라이언트 요청을 효율적으로 처리할 수 있는 구조를 가진다.es}8$ 모드를 모두 사용한 경우와 $8{\times}8$ 단일모드를 사용한 경우보다 계산 시간이 감소하였음을 확인하였다.행중인 MoIM-Messge서버의 네트워크 모듈로 다중 쓰레드 소켓폴링 모델을 적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유의성이 움직임 보정 전에 비하여 낮음을 알 수 있었다. 결론: 뇌활성화 과제 수행시에 동반되는 피험자의 머리 움직임에 의하여 도파민 유리가 과대평가되었으며 이는 이 연구에서 제안한 영상정합을 이용한 움직임 보정기법에

  • PDF

Performance Comparison of Clustering using Discritization Algorithm (이산화 알고리즘을 이용한 계층적 클러스터링의 실험적 성능 평가)

  • Won, Jae Kang;Lee, Jeong Chan;Jung, Yong Gyu;Lee, Young Ho
    • Journal of Service Research and Studies
    • /
    • 제3권2호
    • /
    • pp.53-60
    • /
    • 2013
  • Datamining from the large data in the form of various techniques for obtaining information have been developed. In recent years one of the most sought areas of pattern recognition and machine learning method is created with most of existing learning algorithms based on categorical attributes to a rule or decision model. However, the real-world data, it may consist of numeric attributes in many cases. In addition it contains attributes with numerical values to the normal categorical attribute. In this case, therefore, it is required processes in order to use the data to learn an appropriate value for the type attribute. In this paper, the domain of the numeric attributes are divided into several segments using learning algorithm techniques of discritization. It is described Clustering with other data mining techniques. Large amount of first cluster with characteristics is similar records from the database into smaller groups that split multiple given finite patterns in the pattern space. It is close to each other of a set of patterns that together make up a bunch. Among the set without specifying a particular category in a given data by extracting a pattern. It will be described similar grouping of data clustering technique to classify the data.

  • PDF

An Efficient Addressing Scheme Using (x, y) Coordinates in Environments of Smart Grid (스마트 그리드 환경에서 (x, y) 좌표값을 이용한 효율적인 주소 할당 방법)

  • Cho, Yang-Hyun;Lim, Song-Bin;Kim, Gyung-Mok
    • Journal of the Korea Society of Computer and Information
    • /
    • 제17권1호
    • /
    • pp.61-69
    • /
    • 2012
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. Smart Grid is created solution for standardization and interoperability. Smart Grid industry enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. Smart industy was ecolved actively cause Wireless communication is being considered for AMI system and wireless communication using ZigBee sensor has been applied in various industly. In this paper, we proposed efficient addressing scheme for improving the performance of the routing algorithm using ZigBee in Smart Grid environment. A distributed address allocation scheme used an existing algorithm has wasted address space. Therefore proposing x, y coordinate axes from divide address space of 16 bit to solve this problem. Each node was reduced not only bitwise but also multi hop using the coordinate axes while routing than Cskip algorithm. I compared the performance between the standard and the proposed mechanism through the numerical analysis. Simulation verify performance about decrease averaging multi hop count that compare proposing algorithm and another. The numerical analysis results show that proposed algorithm reduce multi hop than ZigBee distributed address assignment and another.

A Mesh Partitioning Using Adaptive Vertex Clustering (적응형 정점 군집화를 이용한 메쉬 분할)

  • Kim, Dae-Young;Kim, Jong-Won;Lee, Hae-Young
    • Journal of the Korea Computer Graphics Society
    • /
    • 제15권3호
    • /
    • pp.19-26
    • /
    • 2009
  • In this paper, a new adaptive vertex clustering using a KD-tree is presented for 3D mesh partitioning. A vertex clustering is used to divide a huge 3D mesh into several partitions for various mesh processing. An octree-based clustering and K-means clustering are currently leading techniques. However, the octree-based methods practice uniform space divisions and so each partitioned mesh has non-uniformly distributed number of vertices and the difference in its size. The K-means clustering produces uniformly partitioned meshes but takes much time due to many repetitions and optimizations. Therefore, we propose to use a KD-tree to efficiently partition meshes with uniform number of vertices. The bounding box region of the given mesh is adaptively subdivided according to the number of vertices included and dynamically determined axis. As a result, the partitioned meshes have a property of compactness with uniformly distributed vertices.

  • PDF

A Study on the Risk Control Measures of Ship′s Collision (선박충돌사고 위험성 제어방안에 관한 연구)

  • 양원재;금종수
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • 제9권1호
    • /
    • pp.51-56
    • /
    • 2003
  • The prevention of marine accidents has been a major topic in marine society for long time and various safety policies and Countermeasures have been developed and applied to prevent those accidents. In spite of these efforts, however significant marine accidents have taken place intermittently. Ship is being operated under a highly dynamic environments and many factors are related with ship's collision and those factors are interacting. So, the analysis on ship's collision rouses are very important to prepare countermeasures which will ensure the safe navigation. This study analysed the ship's collision data over the past 10 years(1991-2000), which is compiled by Korea Marine Accidents Inquiry Agency. The analysis confirmed that ‘ship's collision’ is occurred most frequently and the cause is closely related with human factor. The main purpose if this study is to propose risk control countermeasures of ship's collision. For this, the structure of human factor is analysed by the questionnaire methodology. Marine experts were surveyed based on major elements that were extracted from the human factor affecting to ship's collision FSM has been widely adopted in modeling a dynamic system which is composed of human factors. Then, the structure analysis on the rouses of ship's collision using FSM are performed. This structure model could be used in understanding and verifying the procedure of real ship's collision. Furthermore it could be used as the model to prevent ship's collision and to reduce marine accidents.

  • PDF

Evaluation of Multivariate Stream Data Reduction Techniques (다변량 스트림 데이터 축소 기법 평가)

  • Jung, Hung-Jo;Seo, Sung-Bo;Cheol, Kyung-Joo;Park, Jeong-Seok;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • 제13D권7호
    • /
    • pp.889-900
    • /
    • 2006
  • Even though sensor networks are different in user requests and data characteristics depending on each application area, the existing researches on stream data transmission problem focus on the performance improvement of their methods rather than considering the original characteristic of stream data. In this paper, we introduce a hierarchical or distributed sensor network architecture and data model, and then evaluate the multivariate data reduction methods suitable for user requirements and data features so as to apply reduction methods alternatively. To assess the relative performance of the proposed multivariate data reduction methods, we used the conventional techniques, such as Wavelet, HCL(Hierarchical Clustering), Sampling and SVD (Singular Value Decomposition) as well as the experimental data sets, such as multivariate time series, synthetic data and robot execution failure data. The experimental results shows that SVD and Sampling method are superior to Wavelet and HCL ia respect to the relative error ratio and execution time. Especially, since relative error ratio of each data reduction method is different according to data characteristic, it shows a good performance using the selective data reduction method for the experimental data set. The findings reported in this paper can serve as a useful guideline for sensor network application design and construction including multivariate stream data.

Development of SaaS cloud infrastructure to monitor conditions of wind turbine gearbox (풍력발전기 증속기 상태를 감시하기 위한 SaaS 클라우드 인프라 개발)

  • Lee, Gwang-Se;Choi, Jungchul;Kang, Seung-Jin;Park, Sail;Lee, Jin-jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제19권9호
    • /
    • pp.316-325
    • /
    • 2018
  • In this paper, to integrate distributed IT resources and manage human resource efficiently as purpose of cost reduction, infrastructure of wind turbine monitoring system have been designed and developed on the basis of SaaS cloud. This infrastructure hierarchize data according to related task and services. Softwares to monitor conditions via the infrastructure are also developed. Softwares are made up of DB design, field measurement, data transmission and monitoring programs. The infrastructure is able to monitor conditions from SCADA data and additional sensors. Total time delay from field measurement to monitoring is defined by modeling of step-wise time delay in condition monitoring algorithms. Since vibration data are acquired by measurements of high resolution, the delay is unavoidable and it is essential information for application of O&M program. Monitoring target is gearbox in wind turbine of MW-class and it is operating for 10 years, which means that accurate monitoring is essential for its efficient O&M in the future. The infrastructure is in operation to deal with the gearbox conditions with high resolution of 50 TB data capacity, annually.

Subnet Generation Scheme based on Deep Learing for Healthcare Information Gathering (헬스케어 정보 수집을 위한 딥 러닝 기반의 서브넷 구축 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • 제15권3호
    • /
    • pp.221-228
    • /
    • 2017
  • With the recent development of IoT technology, medical services using IoT technology are increasing in many medical institutions providing health care services. However, as the number of IoT sensors attached to the user body increases, the healthcare information transmitted to the server becomes complicated, thereby increasing the time required for analyzing the user's healthcare information in the server. In this paper, we propose a deep learning based health care information management method to collect and process healthcare information in a server for a large amount of healthcare information delivered through a user - attached IoT device. The proposed scheme constructs a subnet according to the attribute value by assigning an attribute value to the healthcare information transmitted to the server, and extracts the association information between the subnets as a seed and groups them into a hierarchical structure. The server extracts optimized information that can improve the observation speed and accuracy of user's treatment and prescription by using deep running of grouped healthcare information. As a result of the performance evaluation, the proposed method shows that the processing speed of the medical service operated in the healthcare service model is improved by 14.1% on average and the server overhead is 6.7% lower than the conventional technique. The accuracy of healthcare information extraction was 10.1% higher than the conventional method.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • 제32권6호
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.