• Title/Summary/Keyword: 수학 모델

Search Result 1,815, Processing Time 0.029 seconds

A Weight based GTS Allocation Scheme for Fair Queuing in IEEE 802.15.4 LR-WPAN (IEEE 802.15.4 LR-WPAN 환경에서 공정 큐잉을 위한 가중치 기반 GTS 할당 기법)

  • Lee, Kyoung-Hwa;Lee, Hyeop-Geon;Shin, Yong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.9
    • /
    • pp.19-28
    • /
    • 2010
  • The GTS(Guaranteed Time Slot) of the IEEE 802.15.4 standard, which is the contention free access mechanism, is used for low-latency applications or applications requiring specific data bandwidth. But it has some problems such as delay of service due to FIFS(First In First Service) scheduling. In this paper, we proposes a weight based GTS allocation scheme for fair queuing in IEEE 802.15.4 LR-WPAN. The proposed scheme uses a weight that formed by how much more weight we give to the recent history than to the older history for a new GTS allocation. This scheme reduces service delay time and also guarantees transmission simultaneously within a limited time. The results of the performance analysis shows that our approach improves the performance as compared to the native explicit allocation mechanism defined in the IEEE 802.15.4 standard.

Resilient Routing Protocol Scheme for 6LoWPAN (6LoWPAN에서 회복력 있는 라우팅 프로토콜 기법)

  • Woo, Yeon Kyung;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.141-149
    • /
    • 2013
  • IETF 6LoWPAN standard technique has been studied in IoT environment to support the IPv6 packet communication. 6LoWPAN protocol for transmission of packets mainly in the AODV routing protocol and a variety of extended techniques have been investigated. In particular, consisting of nodes with limited resources in a network error occurs when the 6LoWPAN reliable data transfer and fast routing method is needed. To this end, in this paper, we propose resilient routing protocol and extension of IETF LOAD algorithm, for optimal recovery path, More specifically, the optimal recovery path setup algorithm, signal flow, and detailed protocols for the verification of the reliability of packet transmission mathematical model is presented. The proposed protocol techniques to analyze the performance of the NS-3 performance through the simulation results that is end-to-end delay, throughput, packet delivery fraction and control packet overhead demonstrated excellence in comparison with existing LOAD.

The Computer Simulation and Estimation of Membrane Mass Transfer Coefficients of Hollow Fiber Membrane G-L Contactors for SO2 Removal (SO2 제거를 위한 중공사막 기-액 접촉기의 모사 및 분리막 물질 전달 계수 추정)

  • Kim, Yong Kuk;Song, Hee Ouel;Lee, Hyung Keun;Kim, In-Won
    • Korean Chemical Engineering Research
    • /
    • v.45 no.1
    • /
    • pp.81-86
    • /
    • 2007
  • Hollow fiber membrane G-L contactors are widely used to remove $SO_2$ emitted from industrial facilities. In this work, the mathematical modeling and computer simulation for hollow membrane G-L contactors is carried out to analyze $SO_2$ absorption behavior in hollow fiber membranes. The model is solved with the finite element method using a commercial software. Investigated is the dependency of $SO_2$ removal efficiency and mass transfer characteristics on gas velocities, membrane mass transfer coefficients and physical properties of contactors. The membrane mass transfer coefficients are estimated by fitting the experimental data with the simulated $SO_2$ removal efficiencies. In addition, a design methodology of membrane contactors is suggested.

Multiscale Modeling and Simulation of Water Gas Shift Reactor (Water Gas Shift Reactor의 Multiscale 모델링 및 모사)

  • Lee, Ukjune;Kim, Kihyun;Oh, Min
    • Korean Chemical Engineering Research
    • /
    • v.45 no.6
    • /
    • pp.582-590
    • /
    • 2007
  • In view of the analysis of the phenomena and the prediction of the performance, mathematical modelling and simulation of a high temperature pilot reactor for water gas shift reaction (WGSR) has been carried out. Multiscale simulation incorporated computational fluid dynamics (CFD) technique, which has the capability to deal with the reactor shape, fluid and energy transport with extensive degree of accuracy, and process modeling technique, which, in turn is responsible for reaction kinetics and mass transport. This research employed multiscale simulation and the results were compared with those from process simulation. From multiscale simulation, the maximum conversion of was predicted approximately 0.85 and the maximum temperature at the reactor was calculated 720 K, resulting from the heat of reaction. Dynamic simulation was also performed for the time transient profile of temperature, conversion, etc. Considering the results, it is concluded that multiscale simulation is a safe and accurate technique to predict reactor behaviors, and consequently will be available for the design of commercial size chemical reactors as well as other commercial unit operations.

Realization of Intelligence Controller Using Genetic Algorithm.Neural Network.Fuzzy Logic (유전알고리즘.신경회로망.퍼지논리가 결합된 지능제어기의 구현)

  • Lee Sang-Boo;Kim Hyung-Soo
    • Journal of Digital Contents Society
    • /
    • v.2 no.1
    • /
    • pp.51-61
    • /
    • 2001
  • The FLC(Fuzzy Logic Controller) is stronger to the disturbance and has the excellent characteristic to the overshoot of the initialized value than the classical controller, and also can carry out the proper control being out of all relation to the mathematical model and parameter value of the system. But it has the restriction which can't adopt the environment changes of the control system because of generating the fuzzy control rule through an expert's experience and the fixed value of the once determined control rule, and also can't converge correctly to the desired value because of haying the minute error of the controller output value. Now there are many suggested methods to eliminate the minute error, we also suggest the GA-FNNIC(Genetic Algorithm Fuzzy Neural Network Intelligence Controller) combined FLC with NN(Neural Network) and GA(Genetic Algorithm). In this paper, we compare the suggested GA-FNNIC with FLC and analyze the output characteristics, convergence speed, overshoot and rising time. Finally we show that the GA-FNNIC converge correctly to the desirable value without any error.

  • PDF

Effects of Oscillating Flow on the Dynamic Behavior of an Artificial Sensory Hair (인공 감각모의 동적 거동에 미치는 진동유동의 영향)

  • Park, Byung-Kyu;Lee, Joon-Sik
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.35 no.8
    • /
    • pp.847-853
    • /
    • 2011
  • Filiform hairs that respond to movements of the surrounding medium are the mechanoreceptors commonly found in arthropods and vertebrates. The hairs function as a sensory system for perceiving information produced by prey, predators, or conspecifics. A mathematical model is proposed, and the parametric analyses for the response of artificial filiform hair are conducted to design and predict the performance of a microfabricated device. The results for the Cytop hair, one of the most popular polymer optical fibers (POFs), show that the fundamental mode has a dominant effect on the hair behavior in an oscillating medium flow. The dynamic behavior of sensory hair is also dependent on the physical dimensions such as length and diameter. It is found that the artificial hair with a high elastic modulus does not show a resonance in the biologically important frequency range.

Skemp's concept development of underachievers' analytic geometry using the exploratory software, GSP & Excel (탐구형 소프트웨어를 활용한 해석기하에서 학습부진학생들의 개념형성에 관한 연구: 관계적.도구적 이해를 중심으로)

  • Yoon, In Jun;ChoiKoh, Sang Sook
    • Journal of the Korean School Mathematics Society
    • /
    • v.15 no.4
    • /
    • pp.643-671
    • /
    • 2012
  • The purpose of this study was to examine How the exploratory activities using Excel and GSP which are exploratory software, in learning analytic geometry affected on the underachievers' analytic geometry concept development process. The subjects of 5 students who received the 8th~9th grades from their examination of the last semester, participated in a total of 7 units based on Skemp's intelligent learning model. The results of the study showed that there were two important cases found to nearly achieve the category $R_2$. One was reflective thinking could happen through exploratory software in category $R_1$. The other was the exploratory activities which could have the same effectiveness as the relational understanding in category $I_2$, as Skemp mentioned that there is a room to be achieved in the elementary level when such relational understanding is achieved.

  • PDF

Probabilistic Power-saving Scheduling of a Real-time Parallel Task on Discrete DVFS-enabled Multi-core Processors (이산적 DVFS 멀티코어 프로세서 상에서 실시간 병렬 작업을 위한 확률적 저전력 스케쥴링)

  • Lee, Wan Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.31-39
    • /
    • 2013
  • In this paper, we propose a power-efficient scheduling scheme that stochastically minimizes the power consumption of a real-time parallel task while meeting the deadline on multicore processors. The proposed scheme applies the parallel processing that executes a task on multiple cores concurrently, and activates a part of all available cores with unused cores powered off, in order to save power consumption. It is proved that the proposed scheme minimizes the mean power consumption of a real-time parallel task with probabilistic computation amount on DVFS-enabled multicore processors with a finite set of discrete clock frequencies. Evaluation shows that the proposed scheme saves up to 81% power consumption of the previous method.

Numerical Analysis on the Startup of a Rocket Engine (로켓 엔진의 시동에 관한 해석적 연구)

  • Park, Soon-Young;Seol, Woo-Seok
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.11 no.5
    • /
    • pp.60-71
    • /
    • 2007
  • The startup characteristic of liquid propellant rocket engine should be focused on the stable ignition of combustion chamber and gas generator. Also, to lessen the propellants consumption during this period which doesn't contribute to the flight thrust, the engine has to be transferred to the nominal mode quickly. Because of the risk of test, it is impossible to develop all the startup cyclogram or the specifications of engine by test, so the precedent numerical approach is quite necessary. In this study we developed a mathematical model for the startup phenomena in a liquid rocket engine driven by gas generator-turbopump system based on the commercial 1-D flow system analysis program, Flowmaster. Using this program we proposed a methodology to obtain the specifications of turbine starter and the opening time of shutoff valves for the stable startup of the engine. To verify this methodology we qualitatively compared the analysis results to the typical startup curve of the published engine, then found it is quite well matched.

Privacy Protection Scheme of Healthcare Patients using Hierarchical Multiple Property (계층적 다중 속성을 이용한 헬스케어 환자의 프라이버시 보호 기법)

  • Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.275-281
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.