• Title/Summary/Keyword: 시간제약조건

Search Result 576, Processing Time 0.024 seconds

Optimization of Active Tendon Controlled Structures by Efficient Solution of LQR Control Gain (LQR 제어이득의 효율적 산정에 의한 능동텐던 구조물의 최적화)

  • Cho, Chang-Geun;Kyun, Jun-Myong;Jung, In-Kju;Park, Moon-Ho
    • Journal of Korean Association for Spatial Structures
    • /
    • v.8 no.4
    • /
    • pp.73-80
    • /
    • 2008
  • The objective of current study is to develop an optimization technique for the seismic actively controlled building structures using active tendon devices by an efficient solution of LQR control gain. In order to solve the active control system, the Ricatti closed-loop algorithm has been applied, and the state vector has been formulated by the transfer matrix and solved by a numerical technique of the trapezoidal rule. The time-delay problem has been also considered by phase compensation. To optimize the performance index, the ratio of the weighted matrix is the design variable, allowable story drift limits of IBC 2000 and tendon forces have been applied as restraint conditions, and the optimum control program has been developed with the algorithm of the SUMT technique. In examples of the optimization problem of eight stories shear buildings, it is evaluated that the optimum controlled building is more suitable in the control of earthquake response than the uncontrolled system and can reduce the performance index to compare with the controlled system with a constant ratio of the weighted matrix.

  • PDF

Study on Dynamic Trust-based Access Control in Online Social Network Environment (소셜 네트워크 환경에서 동적 신뢰 중심의 접근 제어 모델에 관한 연구)

  • Baek, Seungsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1025-1035
    • /
    • 2013
  • There has been an explosive increase in the population of OSN(online social network) for 10 years. OSN provides users with many opportunities to have communication among friends, families and goes so far as to make relationships among unknown people having similar belief or interest. However, OSN also produced adverse effects such as privacy breaches, leaking uncontrolled information or disseminating false information. Access control models such as MAC, DAC, RBAC are applied to the OSN to control those problems but those models in OSN are not fit in dynamic OSN environment because user's acts in OSN are unpredictable and static access control imposes burden on users to change access control rules one by one. This paper proposes the dynamic trust-based access control to solve the problems of traditional static access control in OSN.

A method of Calculating Optimal Duration and Cost Using Monte Carlo Simulation and Linear Programming (몬테카를로 시뮬레이션과 선형계획법을 이용한 최적의 일정 및 비용 산정방법)

  • Kim Yong-Deuk;Lee Young-Dae
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.210-215
    • /
    • 2004
  • In can occur to many problems on progressing step without close scope definition, interrelation definition between activities, resource plan, and schedule plan on planning step. But it have not closely defined performance system on planning step because of many constraints of domestic construction industry. Therefore this paper intends to discuss a method of calculating optimal cost and duration using Linear Programming that solves maximing or minimizing problems among decision making methodology and Monte Carlo Simulation that decreases to probability errors. With outcoms applying Linear programming and Monte Carlo Simulation for calculating optimal cost and duration, follow as : With outcomes applying Monte Carlo Simulation, it could calculate reliable estimator about project duration through removing various constraints. With outcomes applying Linear programming, it could calculate optimal value about project cost through defining various variables and constraints on many activities.

  • PDF

A Development of Evaluation Index for Bus Demand-Elastic Schedule Management (수요탄력적 버스배차관리를 위한 평가지표 개발 및 적용)

  • Lee, Ho-Sang;Chang, Hyun-Ho;Kim, Young-Chan;Hwang, Kyong-Soo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.2
    • /
    • pp.1-13
    • /
    • 2009
  • Although enormous data have been collected in major cities (Korea) by APTS(Advanced Public Transit Systems), most of studies related to bus schedule management evaluation have confined to headway adherence and on-time performance. Therefore, bus operation management have been very lack of using APTS data. This study uses coefficient of correlation to evaluate bus company's schedule management level. However, direct application of coefficient of correlation has inequitable problem because of many limitation(number of vehicle, headway, etc). and so variable calibration method was developed and applied to cope with these problems. Thus, demand-elastic management evaluation index was developed. For verifying the equity of developed index, it is applied to Seoul bus routes. It is expected for the developed index to contribute into the demand-elastic management of bus schedule.

  • PDF

A Novel Global Mobility Management Scheme for Multicasting Service Support in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 멀티캐스팅 서비스 지원을 위한 글로벌 이동성관리 기법)

  • Park, Jongsun;Kim, Jongyoun;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.229-240
    • /
    • 2012
  • The development of multimedia applications followed by development of high-speed networks has improved the performance of mobile devices with high transfer speed broadband. Mobile internet access has made possible seamless indoor and outdoor mobile multicast services. Multicasting services are used to support efficient group communications. However, mobile multicasting services have two constraints: tunnel convergence and handover latency. Many protocols and handover methods have been proposed to address these problems. The inter-LMA optimized handover model for multicasting services has previously been proposed for PMIPv6-based networks. The proposed model removes the tunnel convergence issue and reduces router processing costs. It also makes possible the performance of fast handover operations with adaptive transmission mechanisms. In addition, the proposed scheme exhibits low packet delivery costs and handover latency in comparison with existing schemes, and ensures fast handover when moving the inter-LMA domain

A Case Study on Construction of Front-Jacking method in Daejeon E.W. perforate Road Project (대전 동서관통도로 Front-Jacking공법 시공사례)

  • Kim Yong-Il;Hwang Nak-Yeon;Cha Jong-Whi;Jang Sung-Wook;Lee Nai-Yong
    • Proceedings of the KSR Conference
    • /
    • 2005.05a
    • /
    • pp.646-654
    • /
    • 2005
  • The crossing construction under railroad have two methods which are cut and cover and trenchless method. First, cut and cover method is an extremely limited method concerning non-running time. Whereas, trenchless method is free from restriction such as train speed and running time, and has the strong points of safe and rapid construction. Front Jacking method, one of the trenchless methods, is frequently applied recently due to its stability during construction and vantage of assuring schedule reliability. The procedure is that after minimizing interlocking friction with structure and earth pressure due to jacking the small steel tube, pulling the precast box manufactured at the field in the ground using PC strand and hydraulic Jack. This method is able to be applied regardless of section size and length of box and condition of soil. And that is also pro-environmental. This paper presents the case of Daejeon E. W. perforate Road Project applied with the Front Jacking method.

  • PDF

Barrel Rifling Shape Optimization by Using Design of Experiment Approach (실험계획법을 적용한 포의 강선 형상최적설계)

  • Kang, Dae-Oh;Woo, Yoon-Hwan;Cha, Ki-Up
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.8
    • /
    • pp.897-904
    • /
    • 2012
  • The rifling design problem has continuous-type shape variables and an integral number of riflings. In addition, it requires considerable time for analysis because its behavior should be described by a nonlinear finite element model (FEM). Therefore, this study presents an efficient design process for rifling based on a design of experiment (DOE) approach. First, Bose's orthogonal array is used to represent 25 runs for four design variables including three shape variables and one integer variable. Then, nonlinear FE analyses are performed. Next, to minimize the bullet resistance without affecting the bullet velocity and bullet rotational angle immediately before a bullet leaves the gun barrel, a what-if design is performed. In the proposed what-if design, a functional including the design objective and constraints is constructed and effect analysis is performed by using the functional. It is found that the new design obtained from the what-if design shows better results than the current one.

Motion vector-tracing algorithms of video sequence (비디오 시퀀스의 움직임 추적 알고리즘)

  • 이재현
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.927-936
    • /
    • 2002
  • This paper presents the extraction of a feature by motion vector for efficient content-based retrieval for digital video. in this paper, divided by general size block for the current frame by video, using BMA(block matching algorithm) for an estimate by block move based on a time frame. but in case BMA appeared on a different pattern fact of motion in the vector obtain for the BMA. solve in this a problem to application for full search method this method is detected by of on many calculations. I propose an alternative plan in this paper Limit the search region to $\pm$15 and search is a limit integer pixel. a result, in this paper is make an estimate motion vector in more accurately using motion vector in adjoin in blocks. however, refer to the block vector because occurrence synchronism. Such addition information is get hold burden receive to transmit therefore, forecasted that motion feature each block and consider for problems for establish search region. in this paper Algorithm based to an examination Motion Estimation method by for motion Compensation is proposed.

  • PDF

Information Components of Social Commerce Websites -Focusing on Product, Price, Service, and Seller Information- (소셜커머스 웹사이트의 정보구성요소 -상품, 가격, 서비스, 판매원 정보를 중심으로-)

  • Park, Minjung
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.9
    • /
    • pp.369-381
    • /
    • 2013
  • The purpose of the study was to divide social commerce websites' information into components of product, price, service, and seller information, and to systematically analyze each component of information. A content analysis was used as a research methodology, and 100 webpages from social commerce websites were analyzed. As results, the social commerce websites provided basic information (front view, fabric contents, country of origin, care, color, size) for product information and emphasized price information, including discount rates, sales dues, product quantity, and the amount of products sold. They basically provided expected delivery date, delivery company, Q&A, and return/refund service for service information. In addition, they basically presented brand logo and brand name but need to add information about brand concepts, history and volume as seller information. This study suggested diverse theoretical and practical implications of social commerce information.

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF