• Title/Summary/Keyword: 최적화 프로세스

Search Result 339, Processing Time 0.024 seconds

Multidisciplinary Design Optimization of Vehicle Front Suspension System Using PIDO Technology (PIDO 기술을 이용한 차량 전륜 현가계의 다분야통합최적설계)

  • Lee, Gab-Seong;Park, Jung-Min;Choi, Byung-Lyul;Choi, Dong-Hoon;Nam, Chan-Hyuk;Kim, Gi-Hoon
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2012
  • Multidisciplinary design optimization (MDO) for a suspension component of the vehicle front suspension was performed in this research. Shapes and thicknesses of the subframe were optimized to satisfy multi-disciplinary design requirements; weight, fatigue, crash, noise, vibration, and harshness (NVH), and kinematic and compliance (K&C). Analyses procedures of the performance disciplines were integrated and automated by using the process integration and design optimization (PIDO) technique, and the integrated and automated analyses environments enabled various types of analytic design methodologies for solving the MDO problem. We applied an approximate optimization technique which involves sequential sampling and metamodeling. Since the design variables for thicknesses should be dealt as discrete variables. the evolutionary algorithm is selected as optimization technique. The MDO problem was formulated three types of problems according to the order of priorities among the performance disciplines, and the results of MDO provided design alternatives for various design situations.

A System for Supporting The Cyber Security Control of I&C System (제어계측 시스템 환경에서의 사이버 보안 통제 지원 시스템)

  • Jung, Hyun-Mi;Kim, Seok-Hun;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.442-448
    • /
    • 2013
  • I&C (Instrumentation & Control) system is different from information system and the security design of the two systems are also different. The modeling activity is needed based on the security control guide in order to build I&C system security control. In this paper, the role and by the security control, we designed the relationship (that is, the relation schema) between the documents for 'The system for supporting the cyber security control of I&C system design' based on the security control guide. The designed schema plans 'The system for supporting the cyber security control of I&C system' for observing the security control guide, and is used as the database and content that supports its design and implementation. The process and system of the proposed schema is utilized and designed. The design of the schema and system is intensified in the design phase with the proposed mode and supporting the I&C system cyber security design.

E-Business and Transaction Cost: Applications to Environment and Glocalization (e-비즈니스와 거래비용: 환경과 글로컬화에의 적용)

  • Lee, Sang-Ho;Cho, Sumi
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.109-119
    • /
    • 2013
  • Recent lifeline with Internet and smart-phone is a new ICT-based revolution that has transformed the structure of economics and business activities in digital economy. This paper deals with some economic perspectives on the conceptual concerns on transaction costs and its applications to energy and environments, and glocalization strategies of e-business. First, we consider substantial differences between offline and online channel transactions and categorize three different aspects of transaction costs in the purchasing process in both channels. Second, we examine the impacts of e-business that affect sustainable environments and provide some considerations on energy savings, product-process design, and logistics. Finally, we present some opportunities and challenges posted by global e-business and outline the economics of networking in achieving enhanced performance and competitive advantage through glocalization strategies of e-business.

3-DAT Based Evaluation Method for Mobile Game Development Process (3-DAT 기반의 모바일 게임 개발 프로세스 평가 방법)

  • Lee, Ji-Won;Kim, Kyung-Sik;Park, Sung-Jun
    • Journal of Korea Game Society
    • /
    • v.10 no.6
    • /
    • pp.15-23
    • /
    • 2010
  • The 4-DAT is a tool for analyzing general development process such as XP and Scrum. In this paper, we suggest a new evaluation method based on 3-DAT for mobile game. Since the 4-DAT has inappropriate evaluation items and unnecessary elements for mobile game development, a revised evaluation method which was optimized using three dimension. The 3-D based evaluation method have development context variables of 5 items and 20 detailed criteria. They were defined based on the theory of P.Abrahammsson, B. Boehm and R. Turner. For the experiment, We applied to five mobile game developments which were earned out for 4 months. It analyzed the three factors of the development teams dependence, inequity and flexibility. This study found that short-term mobile game developments can be completed with low risk when dependence is low, inequity is high and flexibility is high.

An Establishment of the Situational Application Criteria on the Risk Management Technique in the Construction Project (건설공사 위험관리 기법의 상황별 적용기준 정립)

  • Kwon Soon-O;Yoon Chul-Sung;Chu Hae-Keum;Kim Seon-Gyoo
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.228-231
    • /
    • 2004
  • Recently, a risk management in the construction project is getting more important. But the field application cases of risk management and its performance level that have been worked in the construction field are so rare and poor, because an application criteria on the risk management technique is not established systematically. So in order to apply of risk management in the field more successfully, it is necessary to optimize the technique of situational application on the risk management. The purpose of this study proposes the optimized application criteria in the field risk management based on the three categories such as historical data, experts, and analysis time.

  • PDF

A Study on the Application of Supply Chain Management in Curtain Wall Engineering (커튼월 공사에서의 공급사슬관리 적용에 관한 연구)

  • Park Sang-Woo;Park Sang-Jun;Kwon Won;Kim Chang-Duk;Chun Jae-Youl
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.301-304
    • /
    • 2004
  • The curtain wall engineering of local high-rise buildings consists of many phases such as design, curtain wail design, manufacture, procurement, construction and facility management, each of which also involves many' actors such as architect, curtain wall consultants, manufacturers, contractors, and facility managers. Moreover, the method for controlling the C/W process of each participant is needed. Eliminating wastes and problems existed in the C/W process can be more effective. What is more, it is necessary to improve the efficiency of the current process and to strengthen the competence through application of SCM to the C/W life-cycle. In addition, it is important that a ]ot of information transfer smoothly and share through information system. Therefore, this study aimed to propose the scope of application and the improvement directions in applying Supply Chain Management concept.

  • PDF

Towards a Combinatorial Auction Design Methodology (조합경매 설계방법론에 관한 연구)

  • Choi, Jin-Ho;Chang, Yong-Sik;Han, In-Goo
    • Information Systems Review
    • /
    • v.8 no.2
    • /
    • pp.103-117
    • /
    • 2006
  • As the interest in the combinatorial auction has increased, diverse combinatorial auction market types have been proposed. Although there have been several studies on the combinatorial auction design, the studies covered some factors or partial dimensions of combinatorial auction design. Given the potential practical value of combinatorial auctions, it is necessary to approach it with an integrated and systematic design methodology for supporting a comprehensive range of combinatorial auction models. Thus, we present a systematic framework for combinatorial auction design methodology. In particular, we classified the combinatorial auction architecture types, process types, and mechanism types. This framework characterizes the different combinatorial auction models, and lead to a useful taxonomy of the combinatorial auction design factors and taxonomy of the market types by coordination among the design factors. In addition, we illustrate an n-bilateral combinatorial auction market, derived from our design methodology, to show the viability of our study.

Labeling network applicaion study policy settings for optimized transmission of multimedia internet (멀티미디어 인터넷망의 최적화 전송을 위한 라벨링망 응용 정책설정 고찰)

  • Gu, Hyun-Sil;Hwang, Seong-kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1780-1784
    • /
    • 2015
  • Traditional IP routing, see only the Destination Address When Forwarding Layer 3 routing and exchange information and Destination-Based Routing Lookup is required for all Hop. Thus, all routers Full Internet routing information, the route information of more than about 120,000 may require. Therefore, the router configuration, which can be dispersed in the environment, the traffic load is required in accordance with this congestion. In this study, a unique characteristic of the Internet in the environment of an existing network Best Effect for QoS guarantee and hardware high speed switching of large multimedia data transmitted using a Labeling for forwarding a packet environment configuration is required. Video Stream Broadcast Transport Labeling rather than in much of the higher performance of the multi-step policy to most of the Video Stream Packet deulim was fixed to Labeling Header Format proposes a method of applying an effective QoS policy to a more simplified policy.

Design and Implementation of Charger Monitoring System Based on CAN Protocol (CAN 통신 기반 충전 모니터링 시스템 설계 및 구현)

  • Choo, Yeon-Gyu;Kim, Hyun-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.541-548
    • /
    • 2012
  • On this paper, we proposed a design rule of charger monitoring system which allow us to watch the charging status and verify it for building the electric chargers infrastructure by spread of electric vehicle. Gathering the charging status of battery by proposed system makes us to enhance the charging algorithm, to interface with BMS(Battery Management System) of electric vehicle, to control the charging process with users. Because the technology of rapid charging is dependant upon various factors such as a performance and stability of battery. We proposed the monitoring system of rapid charger based on CAN protocol that can watch a working status of rapid charger including the charging status of battery with real time and can reduce the charging time of battery with optimized status. We also implement it and evaluate its performance.

Hybrid Main Memory based Buffer Cache Scheme by Using Characteristics of Mobile Applications (모바일 애플리케이션의 특성을 이용한 하이브리드 메모리 기반 버퍼 캐시 정책)

  • Oh, Chansoo;Kang, Dong Hyun;Lee, Minho;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1314-1321
    • /
    • 2015
  • Mobile devices employ buffer cache mechanisms, just as in computer systems such as desktops or servers, to mitigate the performance gap between main memory and secondary storage. However, DRAM has a problem in that it accelerates battery consumption by performing refresh operations periodically to maintain the stored data. In this paper, we propose a novel buffer cache scheme to increase the battery lifecycle in mobile devices based on a hybrid main memory architecture consisting of DRAM and non-volatile PCM. We also suggest a new buffer cache policy that allocates buffers based on process states to optimize the performance and endurance of PCM. In particular, our algorithm allocates each page to the appropriate position corresponding to the state of the application that owns the page, and tries to ensure a rapid response of foreground applications even with a small amount of DRAM memory. The experimental results indicate that the proposed scheme reduces the elapsed time of foreground applications by 58% on average and power consumption by 23% on average without negatively impacting the performance of background applications.