• Title/Summary/Keyword: Constrained Control

Search Result 512, Processing Time 0.029 seconds

Procedures of Transform the IDEF3 Process Model of Concurrent Design into CPM Precedence Network Model (동시공학적 설계의 IDEF3프로세스 모델을 CPM Network 모델로 변환하기 위한 절차)

  • 강동진
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.2
    • /
    • pp.73-80
    • /
    • 1999
  • A major concern in Concurrent Engineering is the control and management of workload As a general rule, leveling the peak of workload in a period is difficult because concurrent processing is comprised of various processed, including overlapping, paralleling and looping and so on. Therefore workload management with resource constraints is so beneficial that effective methods to analyze design process are momentous. This paper presents a procedure to transform the IDEF3 process model into the precedence network model for more useful assessment of the process. This procedure is expected to facilitate resolving resource constrained scheduling problems more systematically in Concurrent Engineering environment.

  • PDF

Ecological Correlates of Flowering Seasons in Korean Angiosperms

  • Kang, Hye-Soon;Jang, Sun-Young
    • Journal of Ecology and Environment
    • /
    • v.29 no.4
    • /
    • pp.353-360
    • /
    • 2006
  • Ecological correlates of flowering times often are examined to infer evolutionary mechanisms for flowering time diversities. We examined ecological characteristic associations such as growth habits and pollination modes with flowering times among 3,037 Korean angiosperms experiencing strong climatic seasonalities. We first examined taxonomic membership effects on flowering times across diverse taxonomic levels. Phylogeny constrained flowering times at all levels down to the genus level. We then analyzed the effects of ecological characteristics using subset data consisting of species randomly selected from each genus to control phylogenetic effects. The commonly observed patterns of early flowering of woody species in temperate regions existed. Spring flowering shrubs and trees, however, both being woody, were involved with biotic and abiotic vectors, respectively. In two herbaceous groups of annuals and perennials, annuals flowered later in the growing season than perennials although both herbs tended to be associated with abiotic vectors when flowering in autumn. These results support our hypothesis that species able to decouple vegetative and reproductive growth flower in spring's dry season, but species with different habits, even when they flower within the same season, are subjected to different selective pressures for efficient pollination.

Robust Transceiver Designs in Multiuser MISO Broadcasting with Simultaneous Wireless Information and Power Transmission

  • Zhu, Zhengyu;Wang, Zhongyong;Lee, Kyoung-Jae;Chu, Zheng;Lee, Inkyu
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.173-181
    • /
    • 2016
  • In this paper, we address a new robust optimization problem in a multiuser multiple-input single-output broadcasting system with simultaneous wireless information and power transmission, where a multi-antenna base station (BS) sends energy and information simultaneously to multiple users equipped with a single antenna. Assuming that perfect channel-state information (CSI) for all channels is not available at the BS, the uncertainty of the CSI is modeled by an Euclidean ball-shaped uncertainty set. To optimally design transmit beamforming weights and receive power splitting, an average total transmit power minimization problem is investigated subject to the individual harvested power constraint and the received signal-to-interference-plus-noise ratio constraint at each user. Due to the channel uncertainty, the original problem becomes a homogeneous quadratically constrained quadratic problem, which is NP-hard. The original design problem is reformulated to a relaxed semidefinite program, and then two different approaches based on convex programming are proposed, which can be solved efficiently by the interior point algorithm. Numerical results are provided to validate the robustness of the proposed algorithms.

The Effect of the Global Financial Crisis on Corporate Investment in Korea: From the Perspective of Costly External Finance

  • JEONG, DAEHEE
    • KDI Journal of Economic Policy
    • /
    • v.37 no.1
    • /
    • pp.19-44
    • /
    • 2015
  • This paper examines the effect of the global financial crisis on corporate investment in Korea. Specifically, the crisis was considered to have possibly constrained firm-level investment as the negative shock to the credit supply dramatically unfolded. As Duchin et al. (2010) demonstrated, if a negative supply-side shock is evident during a crisis period, larger cash holdings before the crisis will lead to fewer constraints to corporate investment, or vice versa. In order to investigate the supply-side effect of the crisis, we use firm-level financial data, including firms listed on the Korean stock market as well as small and medium-sized enterprises. We find that corporate investment declined significantly after the crisis, even if we control for factors associated with the demand side, such as contemporaneous capital productivity and cash flow. More importantly, the decline is positively and significantly related to cash holdings before the crisis, implying the negative effect of a credit supply shock. Small and medium enterprises experienced relatively sharp investment declines compared to those of larger firms, and the relationship between pre-crisis cash amounts and the degree of investment decline is greater than that in large firms. Additionally, we examine whether the negative effect persists up to the present, finding evidence that the cash-investment relationship continues in small and medium-sized enterprises.

  • PDF

Windows Program Package Development for Optimal Pourer Flour Analysis (최적전력조류 해석을 위한 원도우프로그램 팩키지 개발)

  • Kim, Gyu-Ho;Lee, Sang-Bong;Lee, Jae-Gyu;Yu, Seok-Gu
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.12
    • /
    • pp.584-590
    • /
    • 2001
  • This paper presents a windows program package for solving security constrained OPF in interconnected Power systems, which is based on the combined application of evolutionary programming(EP) and sequential quadratic programming(SQP). The objective functions are the minimization of generation fuel costs and system power losses. The control variables are the active power of the generating units, the voltage magnitude of the generator, transformer tap settings and SYC setting. The state variables are the bus voltage magnitude, the reactive power of the generating unit, line flows and the tie line flow In OPF considering security, the outages are selected by contingency ranking method. The resulting optimal operating point has to be feasible after outages such as any single line outage(respect of voltage magnitude, reactive power generation and power flow limits). The OPF package proposed is applied to IEEE 14 buses and 10 machines 39 buses model system.

  • PDF

ARM: Adaptive Resource Management for Wireless Network Reliability (무선 네트워크의 신뢰성 보장을 위한 적응적 자원 관리 기법)

  • Lee, Kisong;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2382-2388
    • /
    • 2014
  • To provide network reliability in indoor wireless communication systems, we should resolve the problem of unexpected network failure rapidly. In this paper, we propose an adaptive resource management (ARM) scheme to support seamless connectivity to users. In consideration of system throughput and user fairness simultaneously, the ARM scheme adaptively determines the set of healing channels, and performs scheduling and power allocation iteratively based on a constrained non-convex optimization technique. Through intensive simulations, we demonstrate the superior performance results of the proposed ARM scheme in terms of the average cell capacity and user fairness.

Triangulation of Voronoi Faces of Sphere Voronoi Diagram using Delaunay Refinement Algorithm (딜러니 개선 알고리듬을 이용한 삼차원 구의 보로노이 곡면 삼각화)

  • Kim, Donguk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.123-130
    • /
    • 2018
  • Triangulation is one of the fundamental problems in computational geometry and computer graphics community, and it has huge application areas such as 3D printing, computer-aided engineering, surface reconstruction, surface visualization, and so on. The Delaunay refinement algorithm is a well-known method to generate quality triangular meshes when point cloud and/or constrained edges are given in two- or three-dimensional space. In this paper, we propose a simple but efficient algorithm to triangulate Voronoi surfaces of Voronoi diagram of spheres in 3-dimensional Euclidean space. The proposed algorithm is based on the Ruppert's Delaunay refinement algorithm, and we modified the algorithm to be applied to the triangulation of Voronoi surfaces in two ways. First, a new method to deciding the location of a newly added vertex on the surface in 3-dimensional space is proposed. Second, a new efficient but effective way of estimating approximation error between Voronoi surface and triangulation. Because the proposed algorithm generates a triangular mesh for Voronoi surfaces with guaranteed quality, users can control the level of quality of the resulting triangulation that their application problems require. We have implemented and tested the proposed algorithm for random non-intersecting spheres, and the experimental result shows the proposed algorithm produces quality triangulations on Voronoi surfaces satisfying the quality criterion.

Interference Cancellation Scheme for Three-hop Cooperative Relay Networks

  • Zhang, Yinghua;Wang, Lei;Liu, Jian;Peng, Yunfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4446-4462
    • /
    • 2019
  • In this paper, we focus on interference cancellation for three-hop cognitive radio networks (CRNs) over Rayleigh fading channels. In CRNs, secondary users (SUs) are allowed to opportunistically utilize the licensed spectrum during the idle time of primary users (PUs) to achieve spectrum sharing. However, the SUs maybe power constrained to avoid interference and cover a very short transmission range. We here propose an interference cancellation scheme (ICS) for three-hop CRNs to prolong the transmission range of SUs and improve their transmission efficiency. In the proposed scheme, a flexible transmission protocol is adopted to cancel the interference at both secondary relays and destinations at the same time. And a closed-form expression for the secondary outage probability over Rayleigh fading channels is derived to measure the system performance. Simulation results show that the proposed scheme can significantly reduce the secondary outage probability and increase the secondary diversity in comparison with the traditional cases.

NAAL: Software for controlling heterogeneous IoT devices based on neuromorphic architecture abstraction (NAAL: 뉴로모픽 아키텍처 추상화 기반 이기종 IoT 기기 제어용 소프트웨어)

  • Cho, Jinsung;Kim, Bongjae
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.18-25
    • /
    • 2022
  • Neuromorphic computing generally shows significantly better power, area, and speed performance than neural network computation using CPU and GPU. These characteristics are suitable for resource-constrained IoT environments where energy consumption is important. However, there is a problem in that it is necessary to modify the source code for environment setting and application operation according to heterogeneous IoT devices that support neuromorphic computing. To solve these problems, NAAL was proposed and implemented in this paper. NAAL provides functions necessary for IoT device control and neuromorphic architecture abstraction and inference model operation in various heterogeneous IoT device environments based on common APIs of NAAL. NAAL has the advantage of enabling additional support for new heterogeneous IoT devices and neuromorphic architectures and computing devices in the future.

A Machine Learning-based Real-time Monitoring System for Classification of Elephant Flows on KOREN

  • Akbar, Waleed;Rivera, Javier J.D.;Ahmed, Khan T.;Muhammad, Afaq;Song, Wang-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2801-2815
    • /
    • 2022
  • With the advent and realization of Software Defined Network (SDN) architecture, many organizations are now shifting towards this paradigm. SDN brings more control, higher scalability, and serene elasticity. The SDN spontaneously changes the network configuration according to the dynamic network requirements inside the constrained environments. Therefore, a monitoring system that can monitor the physical and virtual entities is needed to operate this type of network technology with high efficiency and proficiency. In this manuscript, we propose a real-time monitoring system for data collection and visualization that includes the Prometheus, node exporter, and Grafana. A node exporter is configured on the physical devices to collect the physical and virtual entities resources utilization logs. A real-time Prometheus database is configured to collect and store the data from all the exporters. Furthermore, the Grafana is affixed with Prometheus to visualize the current network status and device provisioning. A monitoring system is deployed on the physical infrastructure of the KOREN topology. Data collected by the monitoring system is further pre-processed and restructured into a dataset. A monitoring system is further enhanced by including machine learning techniques applied on the formatted datasets to identify the elephant flows. Additionally, a Random Forest is trained on our generated labeled datasets, and the classification models' performance are verified using accuracy metrics.