• Title/Summary/Keyword: 제약조건

Search Result 2,118, Processing Time 0.026 seconds

Design and Implementation of an Efficient Web Services Data Processing Using Hadoop-Based Big Data Processing Technique (하둡 기반 빅 데이터 기법을 이용한 웹 서비스 데이터 처리 설계 및 구현)

  • Kim, Hyun-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.726-734
    • /
    • 2015
  • Relational databases used by structuralizing data are the most widely used in data management at present. However, in relational databases, service becomes slower as the amount of data increases because of constraints in the reading and writing operations to save or query data. Furthermore, when a new task is added, the database grows and, consequently, requires additional infrastructure, such as parallel configuration of hardware, CPU, memory, and network, to support smooth operation. In this paper, in order to improve the web information services that are slowing down due to increase of data in the relational databases, we implemented a model to extract a large amount of data quickly and safely for users by processing Hadoop Distributed File System (HDFS) files after sending data to HDFSs and unifying and reconstructing the data. We implemented our model in a Web-based civil affairs system that stores image files, which is irregular data processing. Our proposed system's data processing was found to be 0.4 sec faster than that of a relational database system. Thus, we found that it is possible to support Web information services with a Hadoop-based big data processing technique in order to process a large amount of data, as in conventional relational databases. Furthermore, since Hadoop is open source, our model has the advantage of reducing software costs. The proposed system is expected to be used as a model for Web services that provide fast information processing for organizations that require efficient processing of big data because of the increase in the size of conventional relational databases.

Growth and Berry Quality of 'Kyoho' Grapes in Double Cropping System as Affected by Root Zone Heating and CO2 Enrichment in Plastic Greenhouse ('거봉' 포도 2기작 재배 시 근권 가온 및 CO2 시용이 생장 및 과실 품질에 미치는 영향)

  • Oh, Sung Do;Kim, Yong Hyeon;Choi, Dong Geun
    • Horticultural Science & Technology
    • /
    • v.19 no.3
    • /
    • pp.367-372
    • /
    • 2001
  • 'Kyoho' grape (Vitis labruscana L.) has currently cropped twice a year in plastic greenhouses. However, there are problems with low fruit quality in the second cropping owing to low temperatures and short photoperiods. This experiment was conducted to investigate the effect of root zone heating and $CO_2$ enrichment in plastic greenhouse on the vine growth and fruit quality of 'Kyoho' grape in double cropping system. The internode length of shoots, leaf area and leaf dry weight at the treatment of soil heating near root zone was significantly different regardless of $CO_2$ enrichment. There were no significant differences in fruit bunch and berry weight, titratable acidity, coloration degree and berry shattering among the treatments, but the soluble solids significantly increased by root zone heating. Photosynthetic rate increased with increasing $CO_2$ concentration from 300 to $800{\mu}mol{\cdot}mol^{-1}$ in sunny day, whereas it didn't increase in cloudy day regardless of $CO_2$ enrichment.

  • PDF

PSO-Based PID Controller for AVR Systems Concerned with Design Specification (설계사양을 고려한 AVR 시스템의 PSO 기반 PID 제어기)

  • Lee, Yun-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.330-338
    • /
    • 2018
  • The proportional-integral-derivative(PID) controller has been widely used in the industry because of its robust performance and simple structure in a wide range of operating conditions. However, the AVR(Automatic Voltage Regulator) as a control system is not robust to variations of the power system parameters. Therefore, it is necessary to use PID controller to increase the stability and performance of the AVR system. In this paper, a novel design method for determining the optimal PID controller parameters of an AVR system using the particle swarm optimization(PSO) algorithm is presented. The proposed approach has superior features, including easy implementation, stable convergence characteristic and good computational efficiency. In order to assist estimating the performance of the proposed PSO-PID controller, a new performance criterion function is also defined. This evaluation function is intended to reflect when the maximum percentage overshoot, the settling time are given as design specifications. The ITAE evaluation function should impose a penalty if the design specifications are violated, so that the PSO algorithm satisfies the specifications when searching for the PID controller parameter. Finally, through the computer simulations, the proposed PSO-PID controller not only satisfies the given design specifications for the terminal voltage step response, but also shows better control performance than other similar recent studies.

Improved Simple Boundary Following Algorithm (개선된 간단한 경계선 추적자 알고리즘)

  • Cheong, Cheol-Ho;Han, Tack-Don
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.4
    • /
    • pp.427-439
    • /
    • 2006
  • The SBF (Simple Boundary Follower) is a boundary-following algorithm, and is used mainly for image recognition and presentation. The SBF is very popular because of its simplicity and efficiency in tracing the boundary of an object from an acquired binary image; however, it does have two drawbacks. First, the SBF cannot consistently process inner or inner-outer corners according to the follower's position and direction. Second, the SBF requires movement operations for the non-boundary pixels that are connected to boundary pixels. The MSBF (Modified Simple Boundary Follower) has a diagonal detour step for preventing inner-outer corner inconsistency, but is still inconsistent with inner-corners and still requires extra movement operations on non-boundary pixels. In this paper, we propose the ISBF (Improved Simple Boundary Follower), which solves the inconsistencies and reduces the extra operations. In addition, we have classified the tour maps by paths from a current boundary pixel to the next boundary pixel and have analyzed SBF, MSBF, and ISBF. We have determined that the ISBF has no inconsistency issues and reduces the overall number of operations.

A Burn-in Test System with Dynamic Bone Allocation (동적 존 할당이 가능한 번인 시험 시스템)

  • Oh, Sam-Kweon;Shin, Joong-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.1
    • /
    • pp.75-80
    • /
    • 2009
  • Bum-in test is one for eliminating semiconductor devices that are subject to early failures and other operational problems; it is usually carried out on the devices by imposing severe test conditions such as elevated voltages, temperatures, and time. In order for such a test to be performed, each burn-in board having devices to be tested, needs to be inserted into a corresponding slot. A set of such slots is called a zone. The slots comprising a zone can only have the burn-in boards with the devices of the same type. In order to test many different types of semiconductor devices, it is desirable to build a burn-in test system to have as many zones as possible. A zone controller controlling a zone, is a device that performs a burn-in test and collects test results. In case of existing systems, each zone controller takes care of a zone that consists of a fixed number of slots. Since a zone controller is, in most cases, embedded into a workstation that controls the overall testing process, adding new zone controllers is restricted by the spaces for them. As a way to solve or alleviate these problems, a dynamic zone system in which the number of slots in a zone can be dynamically allocated, is presented. This system maximizes the efficiency of system utilization, by altering the number of slots and hence minimizing the idle slots of a zone. In addition, all the test operations being performed must be aborted for maintenance in existing systems. In dynamic zone systems, however, a separate and independent maintenance is allowed for each slot, as long as the main power supply system has no problem.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

User Demand-based Grid Trade Management Model (사용자 요구기반의 그리드 거래 관리 모델)

  • Ma, Yong-Beom;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.11-21
    • /
    • 2006
  • Importance of and need for grid resource management have accelerated in accordance with increasing development of grid computing. However, it is very complex to distribute and utilize resources efficiently in geographically dispersed environments. This is due to the different access policies and constraints of grid resource owners. Users request resources according to their needs. Operators of a grid computing system need to be able to monitor the system states for reflecting these demands. So, a grid computing system needs a resource management policy that monitors states of resources and then allocates resources. This paper proposes a user demand-based grid trade management model that provides an efficient resource management by the trade allocation based on a users' demand and providers' supply strategy. To evaluate performance, this paper measures increasing rate of resource trades, average response time of trades, and processing time utilization. Firstly, the average increasing rates of trade are 585.7% and 322.6% higher than an auction model and a double auction model. Secondly, the average response time of the user demand-based grid trade management model is maintained between 3 and 5 simulation time. Finally, it is found that the processing time utilization is an average of 145.4% and 118.0% higher than an auction model and a double auction model. These empirical results demonstrate the usefulness of the user demand-based grid trade management model.

  • PDF

Economic Analysis of Dam Operation Improvement by Dam Downstream River Improvement Works (II)-Economic Benefit and Cost Allocation Analysis (댐하류하천정비사업의 댐 운영개선 효과 경제성 분석 (II) -경제적 편익 및 비용분담률 분석)

  • Yoo, Seung-Hoon;Lee, Gwang-Man;Lee, Eul-Rae
    • Journal of Korea Water Resources Association
    • /
    • v.44 no.9
    • /
    • pp.765-776
    • /
    • 2011
  • Flood discharge capacity in a dam downstream reach has been decreased after dam construction because of the river cross section reduction impacted by farm lands, sand-bars and parking lots, etc. in river flood plains. Those obstacles being in the river inside areas have caused negative influences to the dam operation policy. Therefore, the dam downstream river improvement work associated with the dam operation improvement plan is under construction for removing reduction factors on the dam effective storage, assuring flood safety in the dam downstream river and incrementing dam operation benefits. But the project has issued some problems such as project feasibility, economic evaluation, cost allocation and benefit share, etc. Since a dam enterpriser has not committed such kind of project before, it is necessary to set up an objective analysis process and a quantitative financial valuation. This study examines the measurable economic benefits and the cost allocation of the project for the fairness between benefit owners (central government and water electricity enterprisers). As a result, the total economic benefit from 3 dams (Imha, Daechung and Youngdam Dam) accounts for 14.41 Billion Won/year. The financial valuation of K-water as a project enterpriser is approximately estimated at 40% of the total value and the government is 60%.

Face Detection Using A Selectively Attentional Hough Transform and Neural Network (선택적 주의집중 Hough 변환과 신경망을 이용한 얼굴 검출)

  • Choi, Il;Seo, Jung-Ik;Chien, Sung-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.4
    • /
    • pp.93-101
    • /
    • 2004
  • A face boundary can be approximated by an ellipse with five-dimensional parameters. This property allows an ellipse detection algorithm to be adapted to detecting faces. However, the construction of a huge five-dimensional parameter space for a Hough transform is quite unpractical. Accordingly, we Propose a selectively attentional Hough transform method for detecting faces from a symmetric contour in an image. The idea is based on the use of a constant aspect ratio for a face, gradient information, and scan-line-based orientation decomposition, thereby allowing a 5-dimensional problem to be decomposed into a two-dimensional one to compute a center with a specific orientation and an one-dimensional one to estimate a short axis. In addition, a two-point selection constraint using geometric and gradient information is also employed to increase the speed and cope with a cluttered background. After detecting candidate face regions using the proposed Hough transform, a multi-layer perceptron verifier is adopted to reject false positives. The proposed method was found to be relatively fast and promising.

Sustainable Production Strategy of Pine Mushroom (Tricholoma matsutake) using the Maximum Entropy Technique (최대 엔트로피 기법으로 도출한 지속 가능한 송이 생산 전략)

  • Choi, Junyeong;Koo, Ja-Choon;Youn, Yeo-Chang
    • Journal of Korean Society of Forest Science
    • /
    • v.102 no.3
    • /
    • pp.365-371
    • /
    • 2013
  • Pine mushroom (Tricholoma matsutake) is one of the most profitable forest products in Korea. We postulated a hypothesis that a high rate of returns to labor input could make the harvest of pine mushroom off the optimum level. In the view of developing a sustainable production strategy for pine mushroom producers, production of pine mushroom collectors and pine mushroom growth function were estimated using maximum entropy method. Annual pine mushroom production and labor input were the data used in the estimation of production function of pine mushroom collectors and pine mushroom growth function. The level of sustainable maximum production derived from the estimated function. The production function estimated shows that production of pine mushroom is affected more by the resource of pine mushroom stocked in the forests than by labor that households put in forestry business. The production function of mushroom collectors and the estimated growth function indicate that pine mushroom harvests for the period of 2005-2011 did not reach the potential level of maximum sustainable production. Therefore, we suggest that pine mushroom harvest should be controlled until the resource stock of pine mushroom in the forests increases to the level of maximum sustainable production.