• Title/Summary/Keyword: 효용적 정보시스템

Search Result 423, Processing Time 0.029 seconds

Implemention of the System-Level Multidisciplinary Design Optimization Using the Process Integration and Design Optimization Framework (PIDO 프레임워크를 이용한 시스템 레벨의 선박 최적설계 구현)

  • Park, Jin-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.93-102
    • /
    • 2020
  • The design of large complex mechanical systems, such as automobile, aircraft, and ship, is a kind of Multidisciplinary Design Optimization (MDO) because it requires both experience and expertise in many areas. With the rapid development of technology and the demand to improve human convenience, the complexity of these systems is increasing further. The design of such a complex system requires an integrated system design, i.e., MDO, which can fuse not only domain-specific knowledge but also knowledge, experience, and perspectives in various fields. In the past, the MDO relied heavily on the designer's intuition and experience, making it less efficient in terms of accuracy and time efficiency. Process integration and the design optimization framework mainly support MDO owing to the evolution of IT technology. This paper examined the procedure and methods to implement an efficient MDO with reasonable effort and time using RCE, an open-source PIDO framework. As a benchmarking example, the authors applied the proposed MDO methodology to a bulk carrier's conceptual design synthesis model. The validity of this proposed MDO methodology was determined by visual analysis of the Pareto optimal solutions.

Call-Site Tracing-based Shared Memory Allocator for False Sharing Reduction in DSM Systems (분산 공유 메모리 시스템에서 거짓 공유를 줄이는 호출지 추적 기반 공유 메모리 할당 기법)

  • Lee, Jong-Woo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.349-358
    • /
    • 2005
  • False sharing is a result of co-location of unrelated data in the same unit of memory coherency, and is one source of unnecessary overhead being of no help to keep the memory coherency in multiprocessor systems. Moreover. the damage caused by false sharing becomes large in proportion to the granularity of memory coherency. To reduce false sharing in a page-based DSM system, it is necessary to allocate unrelated data objects that have different access patterns into the separate shared pages. In this paper we propose call-site tracing-based shared memory allocator. shortly CSTallocator. CSTallocator expects that the data objects requested from the different call-sites may have different access patterns in the future. So CSTailocator places each data object requested from the different call-sites into the separate shared pages, and consequently data objects that have the same call-site are likely to get together into the same shared pages. We use execution-driven simulation of real parallel applications to evaluate the effectiveness of our CSTallocator. Our observations show that by using CSTallocator a considerable amount of false sharing misses can be additionally reduced in comparison with the existing techniques.

A Guidance Methodology Using Ubiquitous Sensor Network Information in Large-Sized Underground Facilities in Fire (대형 지하시설물에서 화재발생 시 USN정보를 이용한 피난 유도 방안)

  • Seo, Yonghee;Lee, Changju;Jung, Jumlae;Shin, Seongil
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.4D
    • /
    • pp.459-467
    • /
    • 2008
  • Because of the insufficiency of ground space, the utilization of underground is getting more and more in these days. Moreover, underground space is being used not only buildings but multipurpose space for movement, storage and shopping. However, ground space has vital weakness for fire compared to ground space. Especially in case of underground shopping center, there are various stuffs to burn and poisonous gas can be exposed on this count when the space is burned. A large number of casualties can be also occurred from conflagration as underground space has closed structures that prevent rapid evacuation and access. Therefore, this research proposes the guidance methodology for evacuation from conflagration in large-sized underground facilities. In addition, suggested methodology uses high technology wireless sensor information from up-to-date ubiquitous sensor networks. Fire information collected by sensors is integrated with existing underground facilities information and this is sent to guidance systems by inducing process. In the end, this information is used for minimum time paths finding algorithm considering the passageway capacity and distance. Also, usefulness and inadequacies of proposed methodology is verified by a case study.

Scenario-Driven Verification Method for Completeness and Consistency Checking of UML Object-Oriented Analysis Model (UML 객체지향 분석모델의 완전성 및 일관성 진단을 위한 시나리오기반 검증기법)

  • Jo, Jin-Hyeong;Bae, Du-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.3
    • /
    • pp.211-223
    • /
    • 2001
  • 본 논문에서 제안하는 시나리오기반 검증기법의 목적은 UML로 작성된 객체지향 분석모델의 완전성 및 일관성을 진단하는 것이다. 검증기법의 전체 절차는 요구분석을 위한 Use Case 모델링 과정에서 생성되는 Use Case 시나리오와 UML 분석모델로부터 역공학적 방법으로 도출된 객체행위 시나리오와의 상호참조과정 및 시나리오 정보트리 추적과정을 이용하여 단계적으로 수행된다. 본 검증절차를 위하여 우선, UML로 작성된 객체지향 분석모델들은 우선 정형명세언어를 사용하여 Use Case 정형명세로 변환하다. 그 다음에, Use Case 정형명세로부터 해당 Use Case 내의 객체의 정적구조를 표현하는 시나리오 정보트리를 구축하고, Use Case 정형명세 내에 포함되어 있는 객체 동적행위 정보인 메시지 순차에 따라 개별 시나리오흐름을 시나리오 정보트리에 표현한다. 마지막으로 시나리오 정보트리 추적과 시나리오 정보 테이블 참조과정을 중심으로 완전성 및 일관성 검증작업을 수행한다. 즉, 검증하고자 하는 해당 Use Case의 시나리오 정보트리를 이용한 시나리오 추적과정을 통해 생성되는 객체행위 시나리오와 요구분석 과정에서 도출되는 Use Case 시나리오와의 일치여부를 조사하여 분석모델과 사용자 요구사양과의 완전성을 검사한다. 그리고, 시나리오 추적과정을 통해 수집되는 시나리오 관련종보들을 가지고 시나리오 정보 테이블을 작성한 후, 분석과정에서 작성된 클래스 관련정보들의 시나리오 포함 여부를 확인하여 분석모델의 일관성을 검사한다. 한편, 본 논문에서 제안하는 검증기법의 효용성을 증명하기 위해 대학의 수강등록시스템 개발을 위해 UML을 이용해 작성된 분석모델을 특정한 사례로써 적용하여 보았다. 프로세싱 오버헤드 및 메모리와 대역폭 요구량 측면에서 MARS 모델보다 유리함을 알 수 있었다.과는 본 논문에서 제안된 프리페칭 기법이 효율적으로 peak bandwidth를 줄일 수 있다는 것을 나타낸다.ore complicate such a prediction. Although these overestimation sources have been attacked in many existing analysis techniques, we cannot find in the literature any description about questions like which one is most important. Thus, in this paper, we quantitatively analyze the impacts of overestimation sources on the accuracy of the worst case timing analysis. Using the results, we can identify dominant overestimation sources that should be analyzed more accurately to get tighter WCET estimations. To make our method independent of any existing analysis techniques, we use simulation based methodology. We have implemented a MIPS R3000 simulator equipped with several switches, each of which determines the accuracy level of the

  • PDF

Personalized Media Control Method using Probabilistic Fuzzy Rule-based Learning (확률적 퍼지 룰 기반 학습에 의한 개인화된 미디어 제어 방법)

  • Lee, Hyong-Euk;Kim, Yong-Hwi;Lee, Tae-Youb;Park, Kwang-Hyun;Kim, Yong-Soo;Cho, Joon-Myun;Bien, Z. Zenn
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.2
    • /
    • pp.244-251
    • /
    • 2007
  • Intention reading technique is essential to provide personalized services toward more convenient and human-friendly services in complex ubiquitous environment such as a smart home. If a system has knowledge about an user's intention of his/her behavioral pattern, the system can provide mote qualified and satisfactory services automatically in advance to the user's explicit command. In this sense, learning capability is considered as a key function for the intention reading technique in view of knowledge discovery. In this paper, ore introduce a personalized media control method for a possible application iii a smart home. Note that data pattern such as human behavior contains lots of inconsistent data due to limitation of feature extraction and insufficiently available features, where separable data groups are intermingled with inseparable data groups. To deal with such a data pattern, we introduce an effective engineering approach with the combination of fuzzy logic and probabilistic reasoning. The proposed learning system, which is based on IFCS (Iterative Fuzzy Clustering with Supervision) algorithm, extract probabilistic fuzzy rules effectively from the given numerical training data pattern. Furthermore, an extended architectural design methodology of the learning system incorporating with the IFCS algorithm are introduced. Finally, experimental results of the media contents recommendation system are given to show the effectiveness of the proposed system.

Mosaic image generation of AISA Eagle hyperspectral sensor using SIFT method (SIFT 기법을 이용한 AISA Eagle 초분광센서의 모자이크영상 생성)

  • Han, You Kyung;Kim, Yong Il;Han, Dong Yeob;Choi, Jae Wan
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.31 no.2
    • /
    • pp.165-172
    • /
    • 2013
  • In this paper, high-quality mosaic image is generated by high-resolution hyperspectral strip images using scale-invariant feature transform (SIFT) algorithm, which is one of the representative image matching methods. The experiments are applied to AISA Eagle images geo-referenced by using GPS/INS information acquired when it was taken on flight. The matching points between three strips of hyperspectral images are extracted using SIFT method, and the transformation models between images are constructed from the points. Mosaic image is, then, generated using the transformation models constructed from corresponding images. Optimal band appropriate for the matching point extraction is determined by selecting representative bands of hyperspectral data and analyzing the matched results based on each band. Mosaic image generated by proposed method is visually compared with the mosaic image generated from initial geo-referenced AISA hyperspectral images. From the comparison, we could estimate geometrical accuracy of generated mosaic image and analyze the efficiency of our methodology.

A Qualitative Study of the Difficulties Experienced in the Reemployment Process : Focusing on The Experience of Career-interrupted Women and Recruiters (경력단절여성의 재취업 경험에 대한 질적 연구 : 경력단절여성과 채용담당자가 경험한 어려움을 중심으로)

  • Park, Eun-Ju;Chun, Hyung-mi
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.166-182
    • /
    • 2017
  • The purpose of this study was to explore the difficulties experienced by career-interrupted women and recruiters in the reemployment process. Using focused group interview(FGI), the depth interviews with six women and six recruiters had been carried out. Collected data was analyzed based on the interview and focus group research method by Corbin and Strauss(2008). Finally, eight domains in career-interrupted women' experience and five in recruiters' were created from the analysis of the data. In the context of the experience there were something in common. They include the need of proper job for woman, the lack of employment system and resource, and the negative perception of women workers. As result, we suggested implications. for solving the difficulties in the reemployment process.

(Efficient Fault Diagnosis of Stuck-at-Faults in Multistage Interconnection Networks) (다단계 상호연결망의 고착고장에 대한 효율적인 고장진단 기법)

  • Kim, Yeong-Jae;Jo, Gwang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.39 no.1
    • /
    • pp.24-32
    • /
    • 2002
  • This paper is concerned with the fault diagnosis for stuck-at faults of a multistage interconnection network(MIM) which is a kind of interconnection networks in multicomputer systems. Up to the present, a fault diagnosis scheme has dealt with a fault model of all types, which results in complicated algorithms. In the literature, it is shown that a number of steps and computation are required for the fault detection and isolation algorithms for a class of MINs. In this paper, we propose a simple and easily implementable algorithm for the detection and isolation of the stuck-at fault in MIM. specifically, we develope an at algorithm for the isolation of the source fault in switching elements whenever tile stuck-at fault is detected in MINs. After all, the proposed algorithm is illustrated by an example of 16$\times$16 baseline networks of MINs.

Convergence and integration study related to development of digital contents for radiography training using dental radiograph and augmented reality (치과방사선사진과 증강현실을 활용한 방사선촬영법 숙련용 디지털 콘텐츠 개발에 대한 융복합 연구)

  • Gu, Ja-Young;Lee, Jae-Gi
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.441-447
    • /
    • 2018
  • This study aims to develop digital techniques that enable repeated practice of dental radiography using augmented reality technology. A three-dimensional object was fabricated by superimposing a photograph of an adult model and a computed tomography image of a manikin phantom. The system was structured using 106 radiographs such that one of these saved radiographs is opened when the user attempts to take a radiograph on a mobile device. This system enabled users to repeatedly practice at the pre-clinical stage without exposure to radiation. We attempt to contribute to enhancing dental hygienists' competency in dental radiography using these techniques. However, a system that enables the user to actually take a radiograph based on face recognition would be more useful in terms of practice, so additional studies are needed on the topic.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.