• Title/Summary/Keyword: 트리핑

Search Result 18, Processing Time 0.032 seconds

Multicast Routing and Cost Model with Source Mobility in Mobile IPv6 Networks (Mobile IPv6망에서 소스 이동성을 갖는 멀티캐스트 라우팅 및 비용모델)

  • Park Byoung-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.197-203
    • /
    • 2004
  • In mobile network, the maintenance o( host grouping or the multicast delivery tree for multicasting algorithm becomes a major issues. In this paper, we explore the issues of mobile Multicast scheme using Mobile-IPv6, and addresses case when a mobile host is a source as well as a recipient of a given multicast operation using MLD(Multicast Listener Discovery) scheme, and the proposed MLD-based multicasting protocol asks its HA(Home Agent) to stop forwarding multicast for group using tunneling. We examine and compare our model to existing approaches by proposed cost model, and observe an improved ferformacne.

  • PDF

The effects of tripping structure on the development of turbulent boundary layer subjected to adverse pressure gradient (역압력 구배가 존재하는 난류 경계층의 발달에 트리핑 구조물이 미치는 영향에 관한 연구)

  • 임태현;김대성;윤순현
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2001.11a
    • /
    • pp.36-44
    • /
    • 2001
  • The effects of various tripping structures on turbulent boundary layer subjected to adverse pressure gradient were examined. The profiles are compared to zero pressure gradient and adverse pressure gradient. The increases of tripping structures of height, k are affects almost flow parameter included velocity fluctuation, skin friction coefficient and turbulent boundary thickness.

  • PDF

Binary Tree-based Invalidation Reporting for Cache Consistency Maintenance in a Mobile Database System (이동 데이타베이스 시스템에서 캐쉬 일관성 유지를 위한 이진 트리 기반의 무효화 보고)

  • Lim, Sang-Min;Kang, Hyun-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.244-247
    • /
    • 2000
  • 이동 통신 기술의 발전으로, 이동컴퓨팅 환경에서의 데이타 서비스에 대한 수요가 증가하고 있다. 이동 호스트 내에 캐쉬가 존재할 경우, 대역폭의 절약 및 빠른 응답시간을 제공할 수 있지만, 캐쉬 일관성을 유지해야하는 부담이 생긴다. 한 셀 내에 존재하는 수 많은 이동 호스트들의 캐쉬 일관성 유지를 위해서 서버(MSS)가 캐쉬 무효화 보고를 일정시간마다 주기적으로 방송하는 방법은 효과적일 수 있다. 기존에 제시된 무효화 보고에서는 갱신된 데이타의 식별자가 사용되지만, 좀 더 적은 양의 대역폭을 소모하는 효율적인 무효화 보고가 되기 위해서는 데이타들을 그룹핑할 수 있는 방안이 연구되어야 한다. 본 논문에서는 서버의 데이타베이스를 데이타의 식별자 값을 기준으로 여러 구역으로 나누었을 때, 데이타의 갱신이 데이타베이스 내 인근 구역에서 많이 발생할 경우, 이진 트리를 기반으로 하여 효율적인 무효화 보고를 생성하는 방법을 제안하고 그 성능을 평가한다.

  • PDF

Reynolds Stress Distribution on Boundary Layer Flow Conditions in the Near-Wake of a Flat Plate (평판 근접 후류에서 경계층의 유동조건에 따른 레이놀즈 응력분포)

  • Kim, Dong-Ha;Chang, Jo-Won
    • Journal of ILASS-Korea
    • /
    • v.9 no.4
    • /
    • pp.53-66
    • /
    • 2004
  • An experimental study was carried out in order to investigate the influence of flow conditions on a boundary layer in the near-wake of a flat plate. The flow conditions in the vicinity of the trailing edge that is influenced by upstream condition history are an essential factor that determines the physical characteristics of a near-wake. Tripping wires attached at various positions were selected to change flow conditions of a boundary layer. The flows such as laminar, transitional, and turbulent boundary layer at 0.98C from the leading edge are imposed in order to investigate the evolution of symmetric and asymmetric wake. An x-type hot-wire probe(55P61) is employed to measure at 8 stations in the near-wake. Test results show that the near-wake for the case of a turbulent boundary layer is relatively insensitive to instability after separating at the trailing edge, and Reynolds shear stress in the near-wake for the case of a turbulent boundary layer collapses due to turbulent kinetic energy.

  • PDF

A Study on the Robot Grouping based on Context Awareness for Performing Collaborative Task (협력적 작업수행을 위한 상황인지 기반의 Robot Grouping에 관한 연구)

  • Suh, Joo-hee;Woo, Chong-woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.31-34
    • /
    • 2009
  • 유비쿼터스 환경에서 상황인지 능력을 가진 지능적 컴퓨팅 개체들 중 사람에게 의존적이지 않고 독립적으로 행동할 수 있는 개체는 유비쿼터스 로봇으로 볼 수 있다. 이러한 로봇은 최근 상호협력 함으로서 보다 최적화된 서비스를 제공하는 연구가 진행되고 있으며, 또한 다수의 로봇이 포함된 환경일 때는 특정한 작업을 수행하기 위하여 특정 로봇의 선별에 관한 연구가 진행 중이다. 본 논문에서는 유비쿼터스 환경에서 서로 다른 기능과 구조를 가지고 있는 지능형 로봇들이 협력하여 특수한 상황이나 임무를 그룹으로 대처할 수 있는 로봇 그룹핑을 설계하고 이를 구현한 결과에 대하여 기술한다. 다수의 로봇 중에서 특정 임무수행을 위한 로봇의 선별 알고리즘은 Entropy를 이용하여 결정 트리를 생성하였다. 또한 Grouping을 위한 Group Layer를 설계하여 구현하였다.

Design and Implementation of the Spatial Data Cache Based on Agents for Providing Mobile Map Services (모바일 지도 서비스를 위한 에이전트 기반의 공간 데이터 캐쉬의 설계 및 구현)

  • Lim, Duk-Sung;Lee, Jai-Ho;Hong, Bong-Hee
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.175-186
    • /
    • 2003
  • Mobile clients like a PDA need a cache and a spatial index to search and access map data efficiently. When a server transmits spatial objects to a mobile client which has a low storage capacity, some of them can be duplicated in a cache of the mobile client. Moreover, the cost for strong added data in the cache and reconfiguring spatial index is very high in the mobile client with low computing power. The scheme for processing duplicated objects and disturbing tasks of the mobile client which has low computing power is needed. In this paper, we classfy the method for strorng duplicated objects and present the scheme for the both caching objects and reconfiguring a spatial index of cached objects using the clipping technique. We propose the caching system based on an agent in order to distribute the overhead of a mobile client as well as to provide efficiently map services. We design and implement it, and evaluate the performance.

A Variable-Slotted Tree Based Anti-Collision Algorithm Using Bit Change Sensing in RFID Systems (RFID 시스템에서 비트 변화 감지를 이용한 가변 슬롯 트리 기반 충돌 방지 알고리즘)

  • Kim, Won-Tae;Ahn, Kwang-Seon;Lee, Seong-Joon
    • The KIPS Transactions:PartA
    • /
    • v.16A no.4
    • /
    • pp.289-298
    • /
    • 2009
  • Generally, RFID systems are composed of one reader and several passive tags, and share the single wireless channel. For this reason, collisions occurwhen more than two tags simultaneously respond to the reader's inquiry. To achieve this problem, many papers, such as QT[8], HCT[10], BSCTTA[2], and QT-BCS[9], have been proposed. In this paper, we propose the tree-based anti-collision algorithm using a bit change sensing unit (TABCS) based on BSCTTA algorithm. The proposed algorithm can identify bits returned from tags through bit change sensing unit, even if multi collisions occur. So, it rapidly generates the unique prefix to indentify each tag, and reduce the total of bits. As the result, the cost of identifying all tag IDs is relatively reduced as compared with existing algorithms. It is verified through simulations that the proposed algorithm surpass other existing algorithms.

A Study on the Functional Analysis of Parking Lot Expansion Technology using Technology-Tree (기술트리를 이용한 주차장 확대 기술의 기능분석에 관한 연구)

  • Youn, Bohyung;Choi, Jaewook;Park, Sungpyo;Kim, Taewan;Lee, Chansik
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.3
    • /
    • pp.64-76
    • /
    • 2019
  • Aged apartments lack parking space and are suffering from severe parking difficulties due to the increase in the supply of private cars due to the economic improvement. Efficient remodeling technology is required as a way to solve the problem of a shortage of parking spaces, but there is a lack of establishing a technology for remodeling plans that can reflect the characteristics of various parks. This study was conducted to analyze the functions of the parking lot expansion technology using the technology tree and to derive the final technology through the function deployment. As a result of functional deployment of the plan to expand the parking lot, the fifth function was deployed and a total of 22 technologies were derived. Four types of technologies are categorized, four technologies for underground expansion, 12 technologies for underground and ground expansion, two technologies for ground expansion, and four technologies for ground-based expansion. As a result of the functional deployment of the main entrance plan, the fifth function was deployed and derived with 22 technologies. The total technologies were grouped into four categories, four technologies for direct underground entry, 11 technologies for indirect underground entry, three technologies for direct access to ground, and four technologies for indirect entry to ground. Through case verification, the detailed technologies applied to the semi-industrial complex of remodeling were identified and expert surveys and interviews were conducted to verify the adequacy of the technology tree.