• 제목/요약/키워드: 요소 기반 시뮬레이션

Search Result 643, Processing Time 0.026 seconds

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

Initial System for Automation of PDQ-based Shape Quality Verification of Naval Ship Product Model (제품데이터품질(PDQ) 평가에 따른 함정 제품모델의 형상 품질검증 자동화 초기 시스템)

  • Oh, Dae-Kyun;Hwang, In-Hyuck;Ryu, Cheol-Ho;Lee, Dong-Kun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.1
    • /
    • pp.113-119
    • /
    • 2014
  • Recently, R.O.K. Navy is increasing re-usability of design data and application of M&S(Modeling and Simulation) through the establishment of collaborative product development environment focused on Naval Ship Product Model(NSPM). As a result, the reliability of the result of design is getting better, and furthermore, a study to improve quality of construction through simulation of production/operation is in progress. Accordingly, the database construction of design data and the DB(Database) quality become important, but there was not research related to those or it was just initial state. This paper conducted research about system of the quality verification process of shape elements which compose NSPM based on the quality verification guideline of NSPM as the result of the precedent study. The hull surface was limited as verification object. The study to verify two things that application of basic drawing by the cad model of hull surface, and whether there is error in the geometric quality of cad model was progressed. To achieve this goal, the verification criteria and algorithm were defined and the prototype system which is based on was developed.

Simulation of Remote Field Scanner for Defect Evaluation of Water Wall Tube Within the Fluidized Bed Boiler (유동층보일러 수냉벽튜브 결함평가를 위한 원격자장 스캐너 시뮬레이션에 관한 연구)

  • Gil, Doo-Song;Jung, Gye-Jo;Seo, Jung-Seok;Kim, Hak-Joon;Kwon, Chan-Wool
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.2
    • /
    • pp.145-150
    • /
    • 2020
  • Water wall tube is one of the major factors consisting of a fluidized bed boiler and it plays very important role for the generation of electricity within the boiler. But these water wall tubes within the fluidized bed boiler are subject to the ware and corrosion caused by the high temperature gas and the flowing medium. If water leak is occurred, the secondary damage by the water leak will occur. As a result of that, the power generation efficiency decreases noticeably. Therefore, the maintenance of the water wall tube is very important. In this study, we designed a exciter sensor based on simulation and composed a remote field eddy current system for the defect evaluation of the outer water wall tube. Starting from the shape design of exciter, we conducted simulations for various design factors such as the water wall tube size, material, frequency, lift-off and so on. Based on the results, we designed the optimum exciter sensor for the water wall tube test within the fluidized bed boiler.

Construction Business Automation System (건설사업 자동화 시스템)

  • Lee, Dong-Eun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.95-102
    • /
    • 2007
  • This paper presents the core technology of Construction Business Process Automation to model and automate construction business processes. Business Process Reengineering (BPR) and Automation (BPA) have been recognized as one of the important aspects in construction business management. However, BPR requires a lot of efforts to identify, document, implement, execute, maintain, and keep track thousands of business processes to deliver a project. Moreover, existing BPA technologies used in existing Enterprise Resource Planning (ERP) systems do not lend themselves to effective scalability for construction business process management. Application of Workflow and Object Technologies would be quite effective in implementing a scalable enterprise application for construction business processes by addressing how: 1) Automated construction management tasks are developed as software components, 2) The process modeling is facilitated by dragging-and dropping task components in a network, 3) Raising business requests and instantiating corresponding process instances are delivered, and 4) Business process instances are executed by using workflow technology based on real-time simulation engine. This paper presents how the construction business process automation is achieved by using equipment reservation and cancellation processes simplified intentionally.

  • PDF

Performance Analysis of RFID Interference Suppression System Based on the Gold Code (골드 코드 기반의 RFID 간섭제거 시스템 성능분석)

  • khadka, Grishma;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1491-1497
    • /
    • 2013
  • Radio frequency identification (RFID) is an important and essential components of ubiquitous computing, with the development of wireless communication technologies and mobile computing environment. Recently, RFID becomes the mainstream application that helps fast handling and uniquely identifying the physical objects. It utilizes the electromagnetic energy for data transmission from a tag to a reader in the presence of arbitrary interference and noise. In order to employ the portable mobile RFID reader, a tag-collision problem between two or more adjacent tags should be considered. In this paper, we present the operation of RFID system in which numerous tags are present in the interrogation zone of a single reader at the same time. Since there may exist a number of tagged objects in the narrow area, multiple RFID tags may interfere each other, caused to degrade the data reliability and efficiency of the RFID system. In order to suppress interference signals from multiple neighboring tags, we present an application of Gold code for RFID communication system, which uses spread spectrum technique. In this RFID system, data bits are spreaded in each tags with the unique Gold code and the spreaded data bits are despreaded in the reader with the same Gold code. The performance analysis of the considered RFID anti-collision system is illustrated via computer simulation examples.

Advanced Victim Cache with Processor Reuse Information (프로세서의 재사용 정보를 이용하는 개선된 고성능 희생 캐쉬)

  • Kwak Jong Wook;Lee Hyunbae;Jhang Seong Tae;Jhon Chu Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.12
    • /
    • pp.704-715
    • /
    • 2004
  • Recently, a single or multi processor system uses the hierarchical memory structure to reduce the time gap between processor clock rate and memory access time. A cache memory system includes especially two or three levels of caches to reduce this time gap. Moreover, one of the most important things In the hierarchical memory system is the hit rate in level 1 cache, because level 1 cache interfaces directly with the processor. Therefore, the high hit rate in level 1 cache is critical for system performance. A victim cache, another high level cache, is also important to assist level 1 cache by reducing the conflict miss in high level cache. In this paper, we propose the advanced high level cache management scheme based on the processor reuse information. This technique is a kind of cache replacement policy which uses the frequency of processor's memory accesses and makes the higher frequency address of the cache location reside longer in cache than the lower one. With this scheme, we simulate our policy using Augmint, the event-driven simulator, and analyze the simulation results. The simulation results show that the modified processor reuse information scheme(LIVMR) outperforms the level 1 with the simple victim cache(LIV), 6.7% in maximum and 0.5% in average, and performance benefits become larger as the number of processors increases.

Comparison of target classification accuracy according to the aspect angle and the bistatic angle in bistatic sonar (양상태 소나에서의 자세각과 양상태각에 따른 표적 식별 정확도 비교)

  • Choo, Yeon-Seong;Byun, Sung-Hoon;Choo, Youngmin;Choi, Giyung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.4
    • /
    • pp.330-336
    • /
    • 2021
  • In bistatic sonar operation, the scattering strength of a sonar target is characterized by the probe signal frequency, the aspect angle and the bistatic angle. Therefore, the target detection and identification performance of the bistatic sonar may vary depending on how the positions of the target, sound source, and receiver are changed during sonar operation. In this study, it was evaluated which variable is advantageous to change by comparing the target identification performance between the case of changing the aspect angle and the case of changing the bistatic angle during the operation. A scenario of identifying a hollow sphere and a cylinder was assumed, and performance was compared by classifying two targets with a support vector machine and comparing their accuracy using a finite element method-based acoustic scattering simulation. As a result of comparison, using the scattering strength defined by the frequency and the bistatic angle with the aspect angle fixed showed superior average classification accuracy. It means that moving the receiver to change the bistatic angle is more effective than moving the sound source to change the aspect angle for target identification.

A Study on the Adoption of Korean Register of Shipping Rules through the Analysis of Pile Driving Boat Capsizing (침몰된 항타선 분석을 통한 한국선급 규칙 적용에 관한 연구)

  • Chung, Won-Jun;Kim, Jeong-Dae;Park, Sung-Boo;Jung, Kwang-Hyo;Lee, Jae-Myung
    • Journal of Navigation and Port Research
    • /
    • v.43 no.1
    • /
    • pp.33-41
    • /
    • 2019
  • In December 2012, a pile driving boat sunk off the coast of Ulsan port in Korea. The cause of capsizing of these boats was considered a complex problem. Although Korean Ship Safety Technology Authority concluded that leaders (cranes) of the vessel were designed with sufficient safety factors, National Forensic Service concluded that the capsizing was caused by the failure of leaders. This study reviewed the related laws, strength calculations, and structural analysis methods used by the Korea Ship Safety Technology Authority. In addition, numerical simulations were carried out on hydrodynamic analysis and structural analysis to analyze the cause of vessel capsizing based on the rules of the Korean Register of Shipping. The results were similar to those found by National Forensic Service. In conclusion, the study suggested that inspection especially for a pile driving boat subjected to the Korean Register of Shipping rules should be carried out to prevent the similar accident.

Study of the Acceptable Tolerances of a Window Hermetic Optical Connector (Window 밀폐형 광 커넥터의 허용 공차에 관한 연구)

  • Jeon, Woo-Sung;Jung, Mee-Suk
    • Korean Journal of Optics and Photonics
    • /
    • v.33 no.5
    • /
    • pp.210-217
    • /
    • 2022
  • In this paper, a study is conducted on the acceptable tolerance of an alignment device to reduce the optical loss caused by the alignment tolerance of a window hermetic optical connector. To increase the transmission distance of optical signals and fiber-optic communication systems, it is necessary to maintain and improve the high optical efficiency of the connectors used to bond optical fibers. In the case of the window hermetic optical connector, the optical system is aligned through an alignment device. At this time, since the two connectors are used together, each component is fixed, and further alignment is impossible. The alignment tolerance of the housing system and pin used to align the optical system of the connector causes optical loss, leading to serious problems in the fiber-optic communication system. Thus, to find the acceptable tolerance required for manufacturing the optical-connector alignment device, tolerance analysis is performed on the components of the optical connector, such as the ball lens and the window. We also implement single-mode and multimode optical-connector systems, respectively. Based on the results, we determine an acceptable tolerance value for the alignment device.

Pallet Size Optimization for Special Cargo based on Neighborhood Search Algorithm (이웃해 탐색 알고리즘 기반의 특수화물 팔레트 크기 최적화)

  • Hyeon-Soo Shin;Chang-Hyeon Kim;Chang-Wan Ha;Hwan-Seong Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.250-251
    • /
    • 2023
  • The pallet, typically a form of tertiary packaging, is a flat structure used as a base for the unitization of goods in the supply chain. In addition, standard pallets such as T-11 and T-12 are used throughout the logistics industry to reduce the cost and enhance the efficiency of transportation. However, in the case of special cargo, it is impossible to handle such cargo using a standard pallet due to its size and weight, so many have developed and are now using their customized pallet. Therefore, this study suggests a pallet size optimization method to calculate the optimal pallet size, which minimizes the loss of space on a pallet. The main input features are the specifications and the storage quantity of each cargo, and the optimization method that has modified the Neighborhood Search Algorithm calculates the optimal pallet size. In order to verify the optimality of the developed algorithm, a comparative analysis has been conducted through simulation.

  • PDF