• Title/Summary/Keyword: 신뢰도 기반 설계

Search Result 1,308, Processing Time 0.036 seconds

A Design of Hop-by-Hop based Reliable Congestion Control Protocol for WSNs (무선 센서 네트워크를 위한 Hop-by-Hop 기반의 신뢰성 있는 혼잡제어 기법 설계)

  • Heo Kwan;Kim Hyun-Tae;Yang Hae-Kwon;Ra In-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.442-445
    • /
    • 2006
  • In Wireless Sensor Networks(WSNs), a sensor node broadcasts an acquisited data to neighboring other nodes and it makes serious data duplication problem that increases network traffic loads and data loss. This problem is concerned with the conflict condition for supporting both the reliability of data transfer and avoidance of network congestion. To solve the problem, a reliable congestion control protocol is necessary that considers critical factors affecting on data transfer reliability such as reliable data transmission, wireless loss, and congestion loss for supporting effective congestion control in WSNs. In this paper, we proposes a reliable congestion protocol, ratted HRCCP, based on hop-hop sequence number, and DSbACK by minimizing useless data transfers as an energy-saved congestion control method.

  • PDF

Reliability Analysis Under Input Variable and Metamodel Uncertainty Using Simulation Method Based on Bayesian Approach (베이지안 접근법을 이용한 입력변수 및 근사모델 불확실성 하에 서의 신뢰성 분석)

  • An, Da-Wn;Won, Jun-Ho;Kim, Eun-Jeong;Choi, Joo-Ho
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.33 no.10
    • /
    • pp.1163-1170
    • /
    • 2009
  • Reliability analysis is of great importance in the advanced product design, which is to evaluate reliability due to the associated uncertainties. There are three types of uncertainties: the first is the aleatory uncertainty which is related with inherent physical randomness that is completely described by a suitable probability model. The second is the epistemic uncertainty, which results from the lack of knowledge due to the insufficient data. These two uncertainties are encountered in the input variables such as dimensional tolerances, material properties and loading conditions. The third is the metamodel uncertainty which arises from the approximation of the response function. In this study, an integrated method for the reliability analysis is proposed that can address all these uncertainties in a single Bayesian framework. Markov Chain Monte Carlo (MCMC) method is employed to facilitate the simulation of the posterior distribution. Mathematical and engineering examples are used to demonstrate the proposed method.

The Mass Production Weapon System Environmental Stress-Screening Test Design Method based on Cost-effective-Optimization (비용 효과도 최적화 기반 양산 무기체계 환경 부하 선별 시험 설계 방법)

  • Kim, Jangeun
    • Journal of Applied Reliability
    • /
    • v.18 no.3
    • /
    • pp.229-239
    • /
    • 2018
  • Purpose: There is a difficulty in Environmental Stress Screening (ESS) test design for weapon system's electrical/electronic components/products in small and medium-sized enterprises. To overcome this difficulty, I propose an easy ESS test design approach algorithm that is optimized with only one environment tolerance design information parameter (${\Delta}T$). Methods: To propose the mass production weapon system ESS test design for cost-effective optimization, I define an optimum cost-effective mathematical model ESS test algorithm model based on modified MIL-HDBK-344, MIL-HDBK-2164 and DTIC Technical Report 2477. Results: I clearly confirmed and obtained the quantitative data of ESS effectiveness and cost optimization along our ESS test design algorithm through the practical case. I will expect that proposed ESS test method is used for ESS process improvement activity and cost cutting of mass production weapon system manufacturing cost in small and medium-sized enterprises. Conclusion: In order to compare the effectiveness of the proposed algorithm, I compared the effectiveness of the existing ESS test and the proposed algorithm ESS test based on the existing weapon system circuit card assembly for signal processing. As a result of the comparison, it was confirmed that the test time was reduced from 573.0 minutes to 517.2minutes (9.74% less than existing test time).

Object Tracking Algorithm based on Siamese Network with Local Overlap Confidence (지역 중첩 신뢰도가 적용된 샴 네트워크 기반 객체 추적 알고리즘)

  • Su-Chang Lim;Jong-Chan Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1109-1116
    • /
    • 2023
  • Object tracking is used to track a goal in a video sequence by using coordinate information provided as annotation in the first frame of the video. In this paper, we propose a tracking algorithm that combines deep features and region inference modules to improve object tracking accuracy. In order to obtain sufficient object information, a convolution neural network was designed with a Siamese network structure. For object region inference, the region proposal network and overlapping confidence module were applied and used for tracking. The performance of the proposed tracking algorithm was evaluated using the Object Tracking Benchmark dataset, and it achieved 69.1% in the Success index and 89.3% in the Precision Metrics.

A Study on the Seismic Design for Water Exthinguishing Piping Systems (수계 파이프 시스템의 내진설계에 관한 연구)

  • Lee, Dong-Myung
    • Fire Science and Engineering
    • /
    • v.22 no.1
    • /
    • pp.10-15
    • /
    • 2008
  • In this study, seismic design in sprinkler head pipeline of water extinguishing system has been carried out. This study describes a generation of artificial earthquake wave compatible with seismic design spectrum, and also analyzed the dynamic response spectra by the simulated earthquake motion. This study constructed powerful engineering base for seismic design, and presented seismic design techniques of water and gas extinguishing piping system. Also, this study readied basis that can apply seismic design and performance estimation of fire fighting system and performance rating as well as pipeline of water extinguishing system from result of this research. Hereafter, if additional research by earthquake magnitude and ground kind is approached, reliance elevation, safety raising and performance based design of fire fighting system see to achieve.

Decision Supporting System for Shadow Mask′s Development Using Rule and Case (Rule과 Case를 활용한 설계 의사결정 지원 시스템)

  • 김민성;진홍기;정사범;손기목;예병진
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.05a
    • /
    • pp.315-322
    • /
    • 2002
  • 최근에 경험적 지식을 체계화하는 방법으로 사례기반추론(CBR: Case Based Reasoning) 및 규칙기반추론(RBR: Rule Based Reasoning)이 여러 분야에서 이용되고 있다. CBR과 RBR이 각각 활용되기도 하지만 문제 해결의 정확성을 높이기 위해 복합된 형태로 사용되기도 하고, 흑은 효과적으로 문제를 해결하기 위해 문제 해결 단계별로 각각 사용되기도 한다 또한 데이터에서 지식을 추출하기 위한 세부 알고리즘으로는 인공지능과 통계적 분석기법 등이 활발하게 연구 및 적용되고 있다. 본 연구는 모니터의 핵심 부품인 섀도우마스크(Shadow Mask)를 개발하는데 있어 도면 협의부터 설계가지의 과정에 CBR과 RBR을 활용하고 발생되는 데이터를 이용하여 진화(Evolution)하는 지식기반시스템(Knowledge Based System)으로 구축하는 것을 목적으로 하고 있다. 특히 도면 협의시 인터넷상에 웹서버 시스템을 통하여 규격 (User Spec.)을 생성하고 이를 이용하여 자동으로 도면이 설계되도록 하고 저장된 사례들을 공유할 수 있도록 하여 도면 검토 시간이 단축되고 검토의 정확성을 기할 수 있어 실패비용을 감소시켰다. 그리고 실제 설계시 CBR과 RBR을 활용하여 자동설계를 할 수 있게 하였고 현장에서 발생되는 데이터를 지식화하여 유사사례 설계가 가능하도록 하였다. 지식기반시스템은 신속한 도면 검토가 가능하므로 인원 활용이 극대화되고, 섀도우 마스크 설계자와 마스터 패턴 설계자 사이의 원활한 의사소통을 통해 고객과의 신뢰성 확보와 신인도 향상을 기대할 수 있는 효과가 있다. 그리고 고급설계자에게만 의지되어온 것을 어느 정도 해결할 수 있고, 신입설계자에게는 훌륭한 교육시스템이 될 수 있다.한 도구임을 입증하였다는 점에서 큰 의의를 갖는다고 하겠다.운 선용품 판매 및 관련 정보 제공 등 해운 거래를 위한 종합적인 서비스가 제공되어야 한다. 이를 위해, 본문에서는 e-Marketplace의 효율적인 연계 방안에 대해 해운 관련 업종별로 제시하고 있다. 리스트 제공형, 중개형, 협력형, 보완형, 정보 연계형 등이 있는데, 이는 해운 분야에서 사이버 해운 거래가 가지는 문제점들을 보완하고 업종간 협업체제를 이루어 원활한 거래를 유도할 것이다. 그리하여 우리나라가 동북아 지역뿐만 아니라 세계적인 해운 국가 및 물류 ·정보 중심지로 성장할 수 있는 여건을 구축하는데 기여할 것이다. 나타내었다.약 1주일간의 포르말린 고정이 끝난 소장 및 대장을 부위별, 별 종양개수 및 분포를 자동영상분석기(Kontron Co. Ltd., Germany)로 분석하였다. 체의 변화, 장기무게, 사료소비량 및 마리당 종양의 개수에 대한 통계학적 유의성 검증을 위하여 Duncan's t-test로 통계처리 하였고, 종양 발생빈도에 대하여는 Likelihood ration Chi-square test로 유의성을 검증하였다. C57BL/6J-Apc$^{min/+}$계 수컷 이형접합체 형질전환 마우스에 AIN-76A 정제사료만을 투여한 대조군의 대장선종의 발생률은 84%(Group 3; 21/25례)로써 I3C 100ppm 및 300ppm을 투여한 경우에 있어서는 각군 모두 60%(Group 1; 12/20 례, Group 2; 15/25 례)로 감소하는 경향을 나타내었다. 대장선종의 마리당 발생개수에 있어서는 C57BL/6J-Apc$^{min/+}$계 수컷 이형접합체 형질전환 마우스에 AIN-76A 정제사료만을 투여한

  • PDF

A Security Architecture for ID-Based Cryptographic Schemes in Ad Hoc Networks (Ad Hoc 네트워크에서 신원기반 암호기법을 위한 보안구조 설계)

  • Park Young-Ho;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.974-987
    • /
    • 2005
  • As the ad hoc networks have been received a great deal of attention to not only the military but also the industry applications, some security mechanisms are required for implementing a practical ad hoc application. In this paper, we propose a security architecture in ad hoc networks for the purpose of supporting ID-based public key cryptosystems because of the advantage that ID-based schemes require less complex infrastructure compared with the traditional public key cryptosystems. We assume a trusted key generation center which only issues a private key derived from IDs of every nodes in the system setup phase, and use NIL(Node ID List) and NRL(Node Revocation List) in order to distribute the information about IDs used as public keys in our system. Furthermore, we propose a collaborative status checking mechanism that is performed by nodes themselves not by a central server in ad-hoc network to check the validity of the IDs.

  • PDF

Implementation of Mobile System based on LBS using Design Pattern (디자인 패턴을 활용한 LBS기반 모바일 시스템 구현)

  • Lee, Hong-Ro;Baek, Jeong-Ho;Mun, Young-Chae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.12 no.1
    • /
    • pp.26-35
    • /
    • 2009
  • This paper will propose the efficient method that should be designed to utilize the design pattern of GoF(Gang of Four) for implementation of LBS(Location Based Service) mobile system. The design method proposed by this paper can design and implement system interface using creational patterns, structural patterns and behavioral patterns of design pattern from the user and mobile system viewpoint. The design method using design pattern can show increasing reusability of module and software, abridging the development time, minimizing the maintenance and decreasing the efficiency of memory of system to software development. Therefore, we used a design pattern in order to change the middleware applying geographic information system from mobile environment. Finally, the mobile system applied to design pattern shall contribute to showing high stability and reliability, improving reusability and scalability of module and software and developing efficient LBS mobile system.

  • PDF

Study on the Improvement of OFDM/64QAM Modem (OFDM/64QAM방식의 모뎀 설계)

  • Park, Jin-Soo
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.158-162
    • /
    • 2012
  • In this paper, we propose a wireless modem, which used OFDM/64QAM method and the ISM band with 2.4GHz radio frequency. In this paper proposed the case of a modem, the main program to process the baseband processor, processing speed, operating voltage, and reliability should be ensured. So we have designed with Ralink's RT2870, witch was used for Wi-Fi solution. The RT2870 provides full support for wireless LAN standard, and supports various modulation formats, 2.4GHz and 5GHz bands, both of which support chip. In this paper, we also output the modulated signal transmitted wirelessly to the 2.4GHz band RF RT2850 chip processing was applied and using 40MHz band 2.422 ~ 2.462GHz wireless bands were designed to occupy. By applying bi-directional transmission between wireless transmitter and receiver, it can be effectively connected with any kinds of wireless LAN with 2.4GHz ISM band. Therefore it could economically be used as peripheral equipments for POS system or personal wireless device based on Android platform.

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF