• Title/Summary/Keyword: Computer application capability

Search Result 163, Processing Time 0.032 seconds

Design and optimization of steel trusses using genetic algorithms, parallel computing, and human-computer interaction

  • Agarwal, Pranab;Raich, Anne M.
    • Structural Engineering and Mechanics
    • /
    • v.23 no.4
    • /
    • pp.325-337
    • /
    • 2006
  • A hybrid structural design and optimization methodology that combines the strengths of genetic algorithms, local search techniques, and parallel computing is developed to evolve optimal truss systems in this research effort. The primary objective that is met in evolving near-optimal or optimal structural systems using this approach is the capability of satisfying user-defined design criteria while minimizing the computational time required. The application of genetic algorithms to the design and optimization of truss systems supports conceptual design by facilitating the exploration of new design alternatives. In addition, final shape optimization of the evolved designs is supported through the refinement of member sizes using local search techniques for further improvement. The use of the hybrid approach, therefore, enhances the overall process of structural design. Parallel computing is implemented to reduce the total computation time required to obtain near-optimal designs. The support of human-computer interaction during layout optimization and local optimization is also discussed since it assists in evolving optimal truss systems that better satisfy a user's design requirements and design preferences.

Analytic consideration on real-time assembly line control for multi-PCB models

  • Um, Doo-Gan;Park, Jong-Oh;Cho, Sung-Jong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10b
    • /
    • pp.318-323
    • /
    • 1992
  • The improvement of the production capability of multi PCB assembly line can not be simply done by improving the capacities of each assembly robot cells but must be done by controlling the production line effectively with the line host computer which controls over the whole assembly line. A real time production control, a real time model change and a real time trouble shooting compose the specific concepts of this technique. In this paper, we present and analyze the definition and application method of real time assembly concept. The meaning of real time model change, troubles and error sooting and its algorithm will be introduced. Also, the function of the host computer which is in charge of all of many different tasks mentioned above and the method are presented. The improvement of the productivity is mainly focused on the efficiency of multi-PCB production control. The importance of this aspect is gradually increasing, which we have presented the analysis and the solution.

  • PDF

Sensitivity-Based Method for the Effective Location of SSSC

  • Eghtedarpour, Navid;Seifi, Ali Reza
    • Journal of Power Electronics
    • /
    • v.11 no.1
    • /
    • pp.90-96
    • /
    • 2011
  • Congestion management is one of the most challenging aspects in the recently deregulated electricity markets. FACTS devices have been shown to be an efficient alternative to control the flow of power in lines, resulting in increased loadability, lower system loss and a reduced cost of production. In this paper, the application of a static series synchronous compensator (SSSC) for the purpose of congestion management of power systems has been studied. A sensitivity-based analysis method is utilized for effective determination of the SSSC location in an electricity market. The method is topology based and it is independent of the system operation point. A power injection p-model is developed for the SSSC in this study. Numerical results based on the modified IEEE 14 bus system with/without the SSSC demonstrate the feasibility as well as the effectiveness of the SSSC for congestion management in a network. The results obtained when using the SSSC to improve system transfer capability and congestion management is encouraging.

Enhanced Fuzzy Single Layer Perceptron

  • Chae, Gyoo-Yong;Eom, Sang-Hee;Kim, Kwang-Baek
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.1
    • /
    • pp.36-39
    • /
    • 2004
  • In this paper, a method of improving the learning speed and convergence rate is proposed to exploit the advantages of artificial neural networks and neuro-fuzzy systems. This method is applied to the XOR problem, n bit parity problem, which is used as the benchmark in the field of pattern recognition. The method is also applied to the recognition of digital image for practical image application. As a result of experiment, it does not always guarantee convergence. However, the network showed considerable improvement in learning time and has a high convergence rate. The proposed network can be extended to any number of layers. When we consider only the case of the single layer, the networks had the capability of high speed during the learning process and rapid processing on huge images.

Development of Preprocessor Program for Articulated Total Body

  • Lee, Dong-Jea;Son, Kwon;Jeon, Kyu-Nam;Choi, Kyung-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.69.5-69
    • /
    • 2001
  • Computer simulations are widely used to analyze passenger safety in traffic accidents. ATB(articulated total body) is a computer simulation model developed to predict gross human body response to such dynamic environments as vehicle crashes and pilot ejections. ATB, whose code is open, has high flexibility and application capability that users can easily insert defined modules and functions. ATB is, however, inconvenient as it was coded in FORTRAN and it needs a formatted input file. Moreover, it takes much time to make input files and to modify coding errors. This study aims to increase user friendliness by adding a preprocessor program, WINATB(WiNdow ATB), to the conventional ATB. WINATB programmed in Visual C++ and OpenGL uses ATB IV as a dynamic solver ...

  • PDF

Contents-based Application Layer Routing Protocol for Wireless Internet Services (무선 인터넷 서비스를 위한 컨텐츠 기반의 응용 계층 라우팅 프로토콜)

  • Park, HaeYong;Lee, JiHyun;Lim, Kyungshik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1525-1528
    • /
    • 2004
  • 현재의 무선 인터넷 환경에서는 유선 환경에서의 다양한 컨텐츠 및 프로토콜을 무선 단말에 맞도록 전용 서비스 게이트웨이를 이용하여 변환 처리함으로써 사용자 증가에 따른 부하 집중과 이로 인한 서비스 질의 저하를 초래하고 있다. 이러한 문제를 해결하기 위하여 본 논문에서는 오버레이 네트워크 상에서 부하를 동적으로 분산 처리할 수 있는 컨텐츠 기반의 응용 계층 라우팅 프로토콜을 제안한다. 이 프로토콜은 단말기로부터의 기능(capability) 정보, 오버레이 노드로부터의 시스템 부하 및 네트워크 상태 정보, 응용으로부터의 컨텐츠 정보를 종합하여, 서버로부터 컨텐츠를 요구한 단말기까지 최적의 응용계층 경로를 선택한다. 컨텐츠는 서버로부터 단말까지 선택된 경로를 따라 전송되면서 하나 이상의 중간 노드에서 단말기의 기능에 맞도록 최적화된다. ns-2 네트워크 시뮬레이터로 프로토콜을 구현하고 성능을 측정한 결과, 전용 서비스 게이트웨이를 사용한 경우보다 더욱 많은 부하에서도 훨씬 짧은 서비스 반응 시간을 얻을 수 있었다. 향후, 본 논문에서 제안한 프레임워크 내에서 다양한 경로 선택 알고리즘에 대한 연구를 추진할 예정이다.

  • PDF

Task Scheduling in Fog Computing - Classification, Review, Challenges and Future Directions

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.89-100
    • /
    • 2022
  • With the advancement in the Internet of things Technology (IoT) cloud computing, billions of physical devices have been interconnected for sharing and collecting data in different applications. Despite many advancements, some latency - specific application in the real world is not feasible due to existing constraints of IoT devices and distance between cloud and IoT devices. In order to address issues of latency sensitive applications, fog computing has been developed that involves the availability of computing and storage resources at the edge of the network near the IoT devices. However, fog computing suffers from many limitations such as heterogeneity, storage capabilities, processing capability, memory limitations etc. Therefore, it requires an adequate task scheduling method for utilizing computing resources optimally at the fog layer. This work presents a comprehensive review of different task scheduling methods in fog computing. It analyses different task scheduling methods developed for a fog computing environment in multiple dimensions and compares them to highlight the advantages and disadvantages of methods. Finally, it presents promising research directions for fellow researchers in the fog computing environment.

A Multiagent System for Workflow-Based Bioinformatics Tool Integration

  • Sohn, Bong-Ki;Lee, Keon-Myung;Kim, Hak-Joon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.2
    • /
    • pp.133-137
    • /
    • 2003
  • Various bioinformatics tools for biological data processing have been developed and most of them are available in public. Most bioinformatics works are carried out by a composite application of those tools. Several integration approaches have been proposed for easy use of the tools. This paper proposes a new multi agent system to integrate bioinformatics tools in the perspective of workflow since the composite applications of tools can be regarded as workflows. For the easy integration, the proposed system employs wrapper agents for existing tools, uses XML-based messages in the inter-agent communication, and agents are supposed to extract necessary information from the received messages. This allows new tools to be easily added on the integration framework. The proposed method allows various control structures in workflow definition and provides the progress monitoring capability of the on-going workflows. In particular, agents in this system have the rule-based architecture which allows the defined rule set to be a special role agent. This feature provides fast and flexible agent development to aid in managing the complexity of bioinformatics application. This system has been partially implemented and has been proven to be a viable implementation for workflow-based bioinformatics tool integration.

Balanced MVC Architecture for High Efficiency Mobile Applications

  • La, Hyun-Jung;Kim, Soo-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1421-1444
    • /
    • 2012
  • Mobile devices such as Android devices are emerging as a convenient client computing device with mobility and context-sensing capability. However, the computing power and hardware resource of the devices are limited due to their small form-factor. Consequently, large-scaled applications could not be deployed on these devices. Nonetheless, if the large-scaled applications are deployed and executed on the devices, high performance of the applications cannot be guaranteed. To remedy the limitation in terms of performance, it is inevitable to let some heavy-weight functionality executed on the server side and let a client application invoke the functionality in the server. To realize this kind of mobile applications, we adopt well-defined architecture design principles; being thin-client, being layered with Model-View-Controller (MVC), and being balanced between client side and server side. By adopting the principles, we propose a unique, ideal and practical architecture for mobile applications, called balanced MVC architecture. By considering the principles, key design considerations of realizing balanced MVC architecture lie in functionality partitioning. Hence, we define key criteria of determining the degree of performance. And, we define a method to design a balanced MVC architecture which embodies functionality partitioning for high performance, and a simulation-based evaluation method of balanced MVC architectures.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.