• Title/Summary/Keyword: Dynamic efficiency

Search Result 2,287, Processing Time 0.034 seconds

Precise-Optimal Frame Length Based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems

  • Dhakal, Sunil;Shin, Seokjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.165-182
    • /
    • 2014
  • An RFID systems employ efficient Anti-Collision Algorithms (ACAs) to enhance the performance in various applications. The EPC-Global G2 RFID system utilizes Frame Slotted Aloha (FSA) as its ACA. One of the common approaches used to maximize the system performance (tag identification efficiency) of FSA-based RFID systems involves finding the optimal value of the frame length relative to the contending population size of the RFID tags. Several analytical models for finding the optimal frame length have been developed; however, they are not perfectly optimized because they lack precise characterization for the timing details of the underlying ACA. In this paper, we investigate this promising direction by precisely characterizing the timing details of the EPC-Global G2 protocol and use it to derive a precise-optimal frame length model. The main objective of the model is to determine the optimal frame length value for the estimated number of tags that maximizes the performance of an RFID system. However, because precise estimation of the contending tags is difficult, we utilize a parametric-heuristic approach to maximize the system performance and propose two simple schemes based on the obtained optimal frame length-namely, Improved Dynamic-Frame Slotted Aloha (ID-FSA) and Exponential Random Partitioning-Frame Slotted Aloha (ERP-FSA). The ID-FSA scheme is based on the tag set estimation and frame size update mechanisms, whereas the ERP-FSA scheme adjusts the contending tag population in such a way that the applied frame size becomes optimal. The results of simulations conducted indicate that the ID-FSA scheme performs better than several well-known schemes in various conditions, while the ERP-FSA scheme performs well when the frame size is small.

A Methodology for Task placement and Scheduling Based on Virtual Machines

  • Chen, Xiaojun;Zhang, Jing;Li, Junhuai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1544-1572
    • /
    • 2011
  • Task placement and scheduling are traditionally studied in following aspects: resource utilization, application throughput, application execution latency and starvation, and recently, the studies are more on application scalability and application performance. A methodology for task placement and scheduling centered on tasks based on virtual machines is studied in this paper to improve the performances of systems and dynamic adaptability in applications development and deployment oriented parallel computing. For parallel applications with no real-time constraints, we describe a thought of feature model and make a formal description for four layers of task placement and scheduling. To place the tasks to different layers of virtual computing systems, we take the performances of four layers as the goal function in the model of task placement and scheduling. Furthermore, we take the personal preference, the application scalability for a designer in his (her) development and deployment, as the constraint of this model. The workflow of task placement and scheduling based on virtual machines has been discussed. Then, an algorithm TPVM is designed to work out the optimal scheme of the model, and an algorithm TEVM completes the execution of tasks in four layers. The experiments have been performed to validate the effectiveness of time estimated method and the feasibility and rationality of algorithms. It is seen from the experiments that our algorithms are better than other four algorithms in performance. The results show that the methodology presented in this paper has guiding significance to improve the efficiency of virtual computing systems.

A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity (사용자 익명성을 제공하는 스마트카드 기반 원격 인증 프로토콜)

  • Baek, Yi-Roo;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.229-239
    • /
    • 2009
  • To solve user authentication problem, many remote user authentication schemes using password and smart card at the same time have been proposed. Due to the increasing of interest in personal privacy, there were some recent researches to provide user anonymity. In 2004, Das et al. firstly proposed an authentication scheme that guarantees user anonymity using a dynamic ID. In 2005, Chien et al. pointed out that Das et al.'s scheme has a vulnerability for guaranteing user anonymity and proposed an improved scheme. However their authentication scheme was found some weaknesses about insider attack, DoS attack, and restricted replay attack. In this paper, we propose an enhanced scheme which can remove vulnerabilities of Chien et al.'s scheme. The proposed authentication protocol prevented insider attack by using user's Nonce value and removed the restricted replay attack by replacing time stamp with random number. Furthermore, we improved computational efficiency by eliminating the exponentiation operation.

  • PDF

Traffic Control using Q-Learning Algorithm (Q 학습을 이용한 교통 제어 시스템)

  • Zheng, Zhang;Seung, Ji-Hoon;Kim, Tae-Yeong;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5135-5142
    • /
    • 2011
  • A flexible mechanism is proposed in this paper to improve the dynamic response performance of a traffic flow control system in an urban area. The roads, vehicles, and traffic control systems are all modeled as intelligent systems, wherein a wireless communication network is used as the medium of communication between the vehicles and the roads. The necessary sensor networks are installed in the roads and on the roadside upon which reinforcement learning is adopted as the core algorithm for this mechanism. A traffic policy can be planned online according to the updated situations on the roads, based on all the information from the vehicles and the roads. This improves the flexibility of traffic flow and offers a much more efficient use of the roads over a traditional traffic control system. The optimum intersection signals can be learned automatically online. An intersection control system is studied as an example of the mechanism using Q-learning based algorithm, and simulation results showed that the proposed mechanism can improve the traffic efficiency and the waiting time at the signal light by more than 30% in various conditions compare to the traditional signaling system.

Analysis of the Influence of the Design Factors and Modeling for the 8inch Class Down-the-Hole Hammer (8인치급 다운더홀(DTH) 해머의 모델링 및 설계 인자에 따른 영향도 분석)

  • Lee, Chung No;Hong, Ki Chang;Jeong, Heon Sul
    • Journal of Drive and Control
    • /
    • v.14 no.4
    • /
    • pp.1-8
    • /
    • 2017
  • The Down-the-Hole hammer is one of the pneumatic drill equipment used for grinding, drilling, and mining. One the advantages of which is that a reduction work efficiency at deep site are relatively small compared to other drilling methods. Due to the large vibration in the underground area, it is difficult to measure the performance of the hammer, and hammer testing requires substantial production cost and operating expenses so research on the development of the hammer is insufficient. Therefore, this study has developed a dynamic simulation model that apprehends the operating principles of an 8-inch DTH hammer and calculates performance data such as performance impact force, piston speed, and BPM. By using the simulation model, design factors related to strike force and BPM were selected, and the influence of each design factors on performance was analyzed through ANOVA analysis. As a result, be the most important for BPM and the strike force are position of upper port that push the piston in the direction of the bit and in BPM, the size of the empty space between the bits and the piston is the second most important design factor.

Study for Operation Method of Underwater Cable and Pipeline Burying ROV Trencher using Barge and Its Application in Real Construction

  • Kim, Min-Gyu;Kang, Hyungjoo;Lee, Mun-Jik;Cho, Gun Rae;Li, Ji-Hong;Yoon, Tae-Sagm;Ju, Jaeheung;Kwak, Han-Wan
    • Journal of Ocean Engineering and Technology
    • /
    • v.34 no.5
    • /
    • pp.361-370
    • /
    • 2020
  • We developed a heavy-duty work class ROV trencher named URI-T (Underwater robot it's trencher) that can conduct burial and maintenance tasks for underwater cables and small diameter pipelines. It requires various supporting systems, including a dynamic positioning (DP) vessel, launch and recovery system (LARS), A-frame, and winch in order to perform burial tasks because of its dimensions (6.5 m × 5.0 m × 4.5 m, 20 t) and the tough working environment. However, operating a DP vessel has disadvantages as it is expensive to rent and operate and it is difficult to adjust the working schedule for some domestic coast construction cases. In this paper, we propose a method using a barge instead of a DP vessel to avoid the above disadvantages. Although burying the cable and pipeline using a barge has lower working efficiency than a DP vessel, it can save construction expenses and does not require a large crew. The proposed method was applied over two months at the construction of the water supply in Yokji-do, and the results were verified.

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.

Analytical Method for Dioxin and Organo-Chlorinated Compounds: (Ⅱ) Comparison and Extraction Methods of Dioxins from XAD-2 Adsorbent

  • 양정수;이성광;박영훈;이대운
    • Bulletin of the Korean Chemical Society
    • /
    • v.20 no.6
    • /
    • pp.689-695
    • /
    • 1999
  • Supercritical fluid extraction (SFE), ultrasonic extraction (USE), and accelerated solvent extraction (ASE) were compared with the well known Soxhlet extraction for the extraction of polychlorinated biphenyls (PCBs) and polychlorinated dibenzo-p-dioxins(PCDDs) from the XAD-2 resin which was used to adsorb PCDDs in the atmosphere. XAD-2 resin spiked with five PCDDs was chosen as a sample. The optimum conditions for the extraction of PCDDs by SFE were turned out to be the use of CO2 modified with 10% toluene at 100 ℃ and 350 atm, with 5 min static extraction followed by 20 min dynamic extraction. SFE gave a good extraction rate with good reproducibility for PCDDs ranging from 68 to 98%. The ultrasonic extraction of PCDDs from XAD-2 was investigated and compared with other extractions. A probe type method was compared with a bath type. Two extraction solvents, toluene and acetone were compared with their mixture. The use of their mixture in probe type, with 9 minutes of extraction time, was found to be the optimum condition. The average recovery of the five PCDDs for USE was 82-93%. Accelerated solvent extraction (ASE) with a liquid solvent, a new technique for sample preparation, was performed under elevated temperatures and pressures. The effect of tem-perature on the efficiency of ASE was investigated. The extraction time for a 10 g sample was less than 15 min, when the organic solvent was n-hexaneacetone mixture (1 : 1, v/v). Using ASE, the average recoveries of five PCDDs ranged from 90 to 103%. SFE, USE, and ASE were faster and less laborious than Soxhlet extraction. The former three methods required less solvent than Soxhlet extraction. SFE required no concentration of the solvent extracts. SFE and ASE failed to perform simultaneous parallel extractions because of instrumental limitations.

A Study on dynamic gateway system for MOST GATEWAY Scheduling Algorithm in MOST25 and MOST150 Networks (MOST25와 MOST150 네트워크에서 효율적인 데이터 전송을 위한 MOST GATEWAY 스케줄링 알고리즘에 관한 연구)

  • Jang, Seong-jin;Jang, Jong-yug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.784-788
    • /
    • 2009
  • In recent years, the driver needs the convenience of their vehicles and that there is an increasing requirement. Many researches have been mainly focused on MOST Networks to provide quality of multimedia service. The MOST network to support different bandwidth(MOST 25, MOST 50, MOST 150) should consist of a heterogeneous network. So the networks to used different protocols required gateway for receive and transmit information. The method to used gateway has problems occured loss of a packet by a lot of delay. Therefore in this paper, we propose a MOST GATEWAY system for organically connected to the network MOST150 and MOST 25. After analyzing the performance of the existing scheduling algorithm, we will present an improvement scheme of the efficiency and scalability.

  • PDF

Economic Evaluation of Glass Greenhouse Heating Solar Thermal System Applied with Seasonal Borehole Thermal Energy Storage System (BTES 방식의 계간축열 시스템을 적용한 유리온실의 난방용 태양열시스템의 경제성 평가)

  • Park, Sang-Mi;Seo, Tae-Beom
    • Journal of the Korean Solar Energy Society
    • /
    • v.38 no.5
    • /
    • pp.63-74
    • /
    • 2018
  • The heating performance of a solar thermal seasonal storage system applied to a 1,320 m2 glass greenhouse was analyzed numerically, and the economic feasibility depending upon the number of boreholes was evaluated. For this study, the gardening 16th and 19th zucchini greenhouse of Jeollanam-do agricultural research & extension services was selected. And the heating load of the glass greenhouse selected was 1,147 GJ. BTES(Borehole Thermal Energy Storage) was considered as a seasonal storage, which is relatively economical. The number of boreholes was selected from 25 to 150. The TRNSYS was used to predict and analyze the dynamic performance of the solar thermal system. Numerical simulation was performed by modelling the solar thermal seasonal storage system consisting of flat plate solar collector, BTES system, short-term storage tank, boiler, heat exchanger, pump and controller. As a result of the analysis, when the number of boreholes was from 25 to 50, the thermal efficiency of BTES system and the solar fraction was the highest. When the number of boreholes was from 25 to 50, it was analyzed that the payback period was from 5.2 years to 6.2 years. Therefore it was judged to be the number of boreholes of the proposed system was from 25 to 50, which is the most efficient and economical.