• Title/Summary/Keyword: Address Systems

Search Result 1,627, Processing Time 0.035 seconds

Experimental Performance Evaluation of BACnet MS/TP Protocol

  • Park, Tae-Jin;Song, Won-Seok;Hong, Seung-Ho
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.5
    • /
    • pp.584-593
    • /
    • 2007
  • BACnet is a standard data communication protocol especially designed for building automation and control networks. BACnet uses the Master-Slave/Token-Passing (MS/TP) protocol as one of its field-level networks. In this study, the performance of the BACnet MS/TP protocol is evaluated using an experimental model. The network performance is investigated and evaluated in terms of token rotation time and round trip time. The experimental results show that the performance of the MS/TP network is heavily influenced by the network traffic load, the assignment of MS/TP node address and the network configuration parameter called $N_{max_info-frames}$. Based on the experimental results, simple practical designing guidelines for BACnet MS/TP network systems are also proposed.

State Feedback Control of Asynchronous Sequential Machines with Uncontrollable Inputs: Application to Error Counters (제어 불능 입력이 존재하는 비동기 순차 머신의 상태 피드백 제어 및 오류 카운터로의 응용)

  • Yang, Jung-Min;Kwak, Seong-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.10
    • /
    • pp.967-973
    • /
    • 2009
  • The model matching problem of asynchronous sequential machines is to design a corrective controller such that the stable-state behavior of the closed-loop system matches that of a prescribed model. In this paper, we address model matching when the external input set consists of controllable inputs and uncontrollable ones. Like in the frame of supervisory control of Discrete-Event Systems (DES), uncontrollable inputs cannot be disabled and must be transmitted to the plant without any change. We postulate necessary and sufficient conditions for the existence of a corrective controller that solves model matching despite the influence of uncontrollable events. Whenever a controller exists, the algorithm for its design is outlined. To illustrate the physical meaning of the proposed problem, the closed-loop system of an asynchronous machine with the proposed control scheme is implemented in VHDL code.

Identifying and Exploiting Trustable Users with Robust Features in Online Rating Systems

  • Oh, Hyun-Kyo;Kim, Sang-Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2171-2195
    • /
    • 2017
  • When purchasing an online product, a customer tends to be influenced strongly by its reputation, the aggregation of other customers' ratings on it. The reputation, however, is not always trustable since it can be manipulated easily by attackers who intentionally give unfair ratings to their target products. In this paper, we first address identifying trustable users who tend to give fair ratings to products in online rating systems and then propose a method of computing true reputation of a product by aggregating only those trustable users' ratings. In order to identify the trustable users, we list some candidate features that seem related significantly to the trustworthiness of users and verify the robustness of each of the features through extensive experiments. By finding and exploiting these robust features, we are able to identify trustable users and to compute true reputation effectively and efficiently based on fair ratings of those trustable users.

A Single Server-based Secure Electronic Sealed-Bid Auction Method (단일 서버 기반의 안전한 봉인경매 기법)

  • Lee, Keon-Myung;Kim, Dong-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.6
    • /
    • pp.678-686
    • /
    • 2004
  • This paper presents a new method to securely conduct online sealed-bid auctions with a single auctioneer server The sealed-bid auctions have several vulnerable security problems when they are performed on the Internet. One of such problems is the trust establishment between an auctioneer and bidders who participate in an auction. Several online sealed-bid auction methods have been developed to address this trust problem. The proposed method solves the security problems that would happen in the sealed-bid auction using a blind signature scheme and a contract signature protocol. It prevents the auctioneer from illegally manipulating the bidders' bidding information, repudiating the reception of some bid, manipulating the auction period, and illegally adding or deleting bids. In addition, it keeps the bidders from modifying the bidding information after issuing their bid and doing intentional mistake to invalidate their own bid. The method can be easily implemented using the multiagent architecture.

A Study on Influence of Usage Learning Effect for Computer System Acceptance (실사용에 의한 학습효과가 컴퓨터 시스템의 수용에 미치는 영향에 관한 연구)

  • Kim, Chong-Su
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.3
    • /
    • pp.176-183
    • /
    • 2010
  • The benefits of information technology cannot be obtained unless potential users utilize it for their work. This led to a lot of research works on computer system acceptance. But most of the works address the early stage of system introduction, leaving the learning effect on system acceptance unexplored. In this longitudinal study, two groups of novice and experienced users have been empirically investigated and compared for their acceptance of computer system and for the learning effect of actual usage. A research model based on the technology acceptance theory has been proposed and applied to the two groups. The result shows that the factor job relevance gets more important and the effect of user training on system acceptance diminishes as time passes. This finding may help introducing computer systems which can be easily accepted by users over the whole life cycle period of computer systems.

Design of rule based expert controller for time delay systems (지연시간을 갖는 계통의 성능 향상을 위한 지식기반 전문가 제어기 설계)

  • 박귀태;이기상;김성호;박태홍;고응렬
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.117-121
    • /
    • 1990
  • The control process involving pure time delays presents a continuing challenge to the control system engineer. The nonlinear nature of the delay which can be introduced into the system make the use of conventional control algorithms a poor prospect. The Smith Predictor was developed to alleviate this problem. Unfortunately the quality of control achieved with the Smith Predictor is known to be sensitive to modelling errors. Only recently have researchers attempted to quantify the Smith Predictor controller's robustness to modelling errors. In several studies stability boundaries were plotted as functions of errors in parameters. But the research results address the question of performance of Smith Predictor controllers, In this paper, the Rule based Expert Systems for performance improvement of the Smith Predictor controller are developed.

  • PDF

An Evaluation of Information Systems Services in the Public Sector: Knowledge Management Approach (공공부문 정보화사업평가 - 지식경영 측면의 접근)

  • Lim, Joon Hyoung;Myung, Sung-Jun;Kim, Jae-Young
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.231-246
    • /
    • 2017
  • As an interest in the efficiency of public sector expenditures has spread across the world, Korea has operated a self-evaluation system for government projects as a part of the performance-based budget system. However, an evaluation system for public information technology project has been criticized for its lack of validity, which stems from the uniformity of performance management. This study draws insight from knowledge management literature in an attempt to address the problems with the extant performance evaluation system in public agencies. To realize benefits from IT investment, an agency needs to develop its own performance management model for information systems projects, with a focus on the interaction of IT and organizational system. The knowledge management-based framework for IT projects was verified through a case study, with which we discussed the applicability of knowledge management to the evaluation of public information systems projects.

A Study on the Estimating Locations of Faults on Distribution Power Systems (배전계통 고장위치 검출방법에 관한 연구)

  • Kim Mi-Young;Oh Yong-Taek;Rho Dae-Seok
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.12
    • /
    • pp.670-677
    • /
    • 2004
  • The Conventional approach for estimating the locations of transmission line shunt faults has been to measure the apparent impedance to the fault from a line terminal and to convert the reactive component of the impedance to line length. But, these methods do not adequately address the problems associated with the fault location on distribution systems. This thesis presents a technique that estimates the location of shunt fault on a radial distribution system that has several single and multiphase laterals. Tapped loads and non-homogenity of the distribution system are take into account. The developed technique, which can handle shunt faults was tested to evaluate its suitability. Results from computer simulation of faults on a model of a 25KV distribution lines like real system are presented. The results approved that the proposed technique works well for estimating the locations of the distribution line shunt faults.

Reliability Growth Modeling in the Vehicles Developement Stage

  • Won Jung;Park, Sukhwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.3 no.1
    • /
    • pp.67-77
    • /
    • 1998
  • Reliability growth testing used to evaluate reliability in the automobile industry have not always been able to correctly address reliability concerns with increased confidence. The demand to confirm to all product performance requirements under various operating environments has added to the complexity of accurately assessin theproduct's reliability in the required development time. In addition, it is often desired to determine the relationship of a product's reliability to cost, development time, design, manufacturability and assembly. This paper presents the methods for reliability growth modeling to evaluate and interpret reliability concerns to support the reliability analysis of automobile assemblies and systems. This reliability growth modeling process is a mechanism to help "build in" reliability during early phases in the vehicle devleopment stage.

A Tall Building Ethos of Integration

  • Lee, Brian
    • International Journal of High-Rise Buildings
    • /
    • v.7 no.1
    • /
    • pp.47-64
    • /
    • 2018
  • The last decade has seen great design opportunities for tall building construction around the globe. The best designs represent a new generation of skyscrapers that go beyond willful preconceptions of building form and iconography, trying instead to simultaneously address interrelated issues of program space utility, structural efficiency, and environmentally sustainable systems. The resulting identities of these towers are unique because of their search for the intersection of spaces tuned to people's needs, expressive optimized structures, and high performance, site-responsive systems. This paper, through examples of recent SOM towers, both built and unbuilt, will discuss how a design becomes content-driven, how ideas create value, and how the typology of the tall building is advanced through the integration of architecture design and engineering systems.