• Title/Summary/Keyword: Computer usage

Search Result 1,229, Processing Time 0.029 seconds

Determining the Time of Least Water Use for the Major Water Usage Types in District Metered Areas (상수관망 블록의 대표적인 용수사용 유형에 대한 최소 용수사용 시간의 결정)

  • Park, Suwan;Jung, So-Yeon;Sahleh, Vahideh
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.29 no.3
    • /
    • pp.415-425
    • /
    • 2015
  • Aging water pipe networks hinder efficient management of important water service indices such as revenue water and leakage ratio due to pipe breakage and malfunctioning of pipe appurtenance. In order to control leakage in water pipe networks, various methods such as the minimum night flow analysis and sound waves method have been used. However, the accuracy and efficiency of detecting water leak by these methods need to be improved due to the increase of water consumption at night. In this study the Principal Component Analysis (PCA) technique was applied to the night water flow data of 426 days collected from a water distribution system in the interval of one hour. Based on the PCA technique, computational algorithms were developed to narrow the time windows for efficient execution of leak detection job. The algorithms were programmed on computer using the MATLAB. The presented techniques are expected to contribute to the efficient management of water pipe networks by providing more effective time windows for the detection of the anomaly of pipe network such as leak or abnormal demand.

Selecting a Synthesizable RISC-V Processor Core for Low-cost Hardware Devices

  • Gookyi, Dennis Agyemanh Nana;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1406-1421
    • /
    • 2019
  • The Internet-of-Things (IoT) has been deployed in almost every facet of our day to day activities. This is made possible because sensing and data collection devices have been given computing and communication capabilities. The devices implement System-on-Chips (SoCs) that incorporate a lot of functionalities, yet they are severely constrained in terms of memory capacitance, hardware area, and power consumption. With the increase in the functionalities of sensing devices, there is a need for low-cost synthesizable processors to handle control, interfacing, and error processing. The first step in selecting a synthesizable processor core for low-cost devices is to examine the hardware resource utilization to make sure that it fulfills the requirements of the device. This paper gives an analysis of the hardware resource usage of ten synthesizable processors that implement the Reduced Instruction Set Computer Five (RISC-V) Instruction Set Architecture (ISA). All the ten processors are synthesized using Vivado v2018.02. The maximum frequency, area, and power reports are extracted and a comparison is made to determine which processor is ideal for low-cost hardware devices.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

EFL Learners' Use of the Modals and Quasi-Modals of Obligation and Necessity

  • Min, Sujung;Lee, Jongbok
    • English Language & Literature Teaching
    • /
    • v.18 no.3
    • /
    • pp.191-206
    • /
    • 2012
  • This study examines the use of the modals and quasi-modals of obligation and necessity, which involves the layering of must, should, have (got) to, got to, and need to in a corpus of cross-cultural communication between EFL learners. The study compares the EFL learners' corpus with a sub-corpus of ICE-GB in terms of token counts and semantic/functional distributions because International Corpus of Standard varieties of English serves as common reference points for international comparison of varieties of English. The results showed that must, should, and have to were the main players in both the corpus of EFL learners and that of native speakers. However, some discrepancy exists between EFL learners' corpus and the native speakers' corpus in the use of the modals and quasi-modals of obligation and necessity. Compared to the corpus of native speakers, the corpus of EFL learners was distinctively different in the relative unpopularity of have to and in the comparative popularity of must particularly for root meaning. Suggestions were made for using computer corpora in understanding EFL learners' language use. And pedagogical implications were made for teaching English modality considering the current usage of the modals and quasi-modals in Standard varieties of English and helping the students develop pragmatic competence.

  • PDF

A Study on Improvement of LTE-WiFi Vertical Handover Efficiency (LTE-WiFi Vertical 핸드오버 효율향상 방안 연구)

  • Joo, Young-Hwan;Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.127-134
    • /
    • 2017
  • In this paper, we try to solve the frequency shortage due to the increase of LTE terminals and the traffic jam caused by the inefficient WiFi connection method. The proposed LTE-WIFI Vertical Handover method uses a pre-authentication method of the AP through LTE and a method of controlling the access AP of the terminal using the RADIUS server. Through the simulation, the proposed method shows that the access speed of the AP is improved by about 95% compared to the conventional connection method, and the connection speed is improved by about 18% compared to the conventional method. Providing seamless AP through pre-authentication system and improving wireless network speed through AP access distribution can solve LTE frequency shortage problem and improve wireless network usage satisfaction.

Usage Analysis of Multi-mouse Mischief for ESD (ESD를 위한 멀티마우스 Mischief 적용분석)

  • Han, Jeonghye
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.4
    • /
    • pp.509-516
    • /
    • 2015
  • As the interest in Education for Sustainable Development (ESD) increases worldwide in and around UNESCO, the aids for IT equipment and the donations for educations to developing countries are being active. Through Powerpoint-based teaching and learning contents simply authored by teachers, Mischief can be used to help many children in self-driven class activities. In this paper, we developed an additional program to control mouse pointers of Mischief with image files, size, and speed factors. Then we applied them to elementary students for enhancing their interest and participation to class activities.

Video Generation Algorithm for Remote Lecture Recording Tools (원격 강의용 콘텐츠 제작 도구를 위한 동영상 생성 알고리즘)

  • Kwon, Oh-Sung
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.5
    • /
    • pp.605-611
    • /
    • 2018
  • On-Line Lectures are becoming more common due to the MOOK service and the expansion of national policy in Korea. Especially, It is being changed to new remote mixed style from traditional lecture in universities. We propose and implement a remote contents making tool with audio synchronization function based on more with less resources. To implement our proposed algorithm, we design an interactive interface to assign multiple cutting intervals and convert an input video to print a new result. In experimental, we can confirm our algorithm works properly with average performance value 9.3% cpu share ratio and 87mega byte ram usage(CPU 2.60GHz, 820*600 Area).

the Combination of Wavelet with Boundary Element Method for the Efficient Solution of Maxwell's Equations (Maxwell 방정식의 효율적인 풀이를 위한 경계요소법과 웨이브렛의 결합)

  • Kim, Hyun-Jun;Lee, Seung-Gol;O, Beom-Hoan;Lee, El-Hang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.39 no.6
    • /
    • pp.24-35
    • /
    • 2002
  • The wavelet transform is combined with the boundary element method (BEM), to solve efficiently the Maxwell's equation and the proposed method is applied to the electromagnetic problem for the analysis of topological effects of phase-shifting masks. The accuracy of the module developed was verified by comparison with both analytic solutions and published results. In addition, it was found that the boundary element method in combination with the wavelet matrix transform would be more efficient than the conventional methods based on the BEM in views of the calculation speed and the usage of computer memory.

On a Design and Implementation Technique of a Universal ATPG for VLSI Circuits (VLSI 회로용 범용 자동 패턴 생성기의 설계 및 구현 기법)

  • Jang, Jong-Gwon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.425-432
    • /
    • 1995
  • In this paper we propose a design and implementation technique of a universal automatic test pattern generator(UATPG) which is well suited for VLSI digital circuits. UATPG is designed to extend the capabilities of the existing APTG and to provide a convenient environment to computer-aided design(CAD) users. We employ heuristic techniques in line justification and fault propagation for functional gates during test pattern generation for a target fault. In addition, the flip-flops associated with design for testability (DFT) are exploited for pseudo PIs and pseudo POs to enhance the testabilities of VLSI circuits. As a result, UATPG shows a good enhancement in convenient usage and performance.

  • PDF

3D Image Qube Password Interface Design and Implementation for Entrance/Exit of Sailors (선박승무원 출입관리를 위한 3차원 영상 큐브 암호 인터페이스 설계 및 구현)

  • Son, Nam-Rye;Jeong, Min-A;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.25-32
    • /
    • 2010
  • Recently a passenger ship and liner has been spread throughout men of diversity, the space and informations is not open to general passenger. Therefore security systems are necessary for special sailors to admit them. Although security systems has a variety usage methods which are organism recognition(finger printer, iritis and vein etc) a few years ago, these usages has a defect reusing other objects because of leaving a trace. Therefore this paper designs and implements using 3D Qube image password interface which hand gestures are recognized after acquiring from 2D input image for protective marker of finger printer.