• Title/Summary/Keyword: Implementation science

Search Result 7,340, Processing Time 0.036 seconds

Implementation of the MPEG-1 Layer II Decoder Using the TMS320C64x DSP Processor (TMS320C64x 기반 MPEG-1 LayerII Decoder의 DSP 구현)

  • Cho, Choong-Sang;Lee, Young-Han;Oh, Yoo-Rhee;Kim, Hong-Kook
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.257-258
    • /
    • 2006
  • In this paper, we address several issues in the real time implementation of MPEG-1 Layer II decoder on a fixed-point digital signal processor (DSP), especially TMS320C6416. There is a trade-off between processing speed and the size of program/data memory for the optimal implementation. In a view of the speed optimization, we first convert the floating point operations into fixed point ones with little degradation in audio quality, and then the look-up tables used for the inverse quantization of the audio codec are forced to be located into the internal memory of the DSP. And then, window functions and filter coefficients in the decoder are precalculated and stored as constant, which makes the decoder faster even larger memory size is required. It is shown from the real-time experiments that the fixed-point implementation enables us to make the decoder with a sampling rate of 48 kHz operate with 3 times faster than real-time on TMS320C6416 at a clock rate of 600 MHz.

  • PDF

A study on classification of the security controls for the effective implementation to nuclear power plant

  • Han, Sang Min;Lee, Chanyoung;Chae, Young Ho;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.4
    • /
    • pp.1245-1252
    • /
    • 2022
  • As regulatory bodies require full implementation of security controls in nuclear power plants (NPPs), security functions for critical digital assets are currently being developed. For the ultimate introduction of security controls, not alternative measures, it is important to understand the relationship between possible cyber threats to NPPs and security controls to prevent them. To address the effectiveness of the security control implementation, this study investigated the types of cyber threats that can be prevented when the security controls are implemented through the mapping of the reorganized security controls in RS-015 to cyber threats on NPPs. Through this work, the cyber threat that each security control can prevent was confirmed, and the effectiveness of several strategies for implementing the security controls were compared. This study will be a useful reference for utilities or researchers who cannot use design basis threat (DBT) directly and be helpful when introducing security controls to NPPs that do not have actual security functions.

Design and implementation of wireless home network system using Home Network Control Protocol

  • Yoon, Dae-Kil;Lee, Kam-Rok;Myoung, Kwan-Joo;Kwon, Wook-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1558-1562
    • /
    • 2005
  • This paper describes the design and implementation of a wireless home network system using Home Network Control Protocol (HNCP) called the wireless HNCP home network system. For wireless interfaces of HNCP, IEEE 802.11b and IEEE 802.15.4 standard protocols are considered. With the implementation of the wireless HNCP home network system, a simple analysis about coexistence between IEEE 802.11b and IEEE 802.15.4 is achieved. Through the implemented wireless HNCP home network system and the analytical results about the coexistence between both two different wireless protocols, the feasibility of the wireless HNCP home network system is shown.

  • PDF

IMPLEMENTATION EXPERIMENT OF VTP BASED ADAPTIVE VIDEO BIT-RATE CONTROL OVER WIRELESS AD-HOC NETWORK

  • Ujikawa, Hirotaka;Katto, Jiro
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.668-672
    • /
    • 2009
  • In wireless ad-hoc network, knowing the available bandwidth of the time varying channel is imperative for live video streaming applications. This is because the available bandwidth is varying all the time and strictly limited against the large data size of video streaming. Additionally, adapting the encoding rate to the suitable bit-rate for the network, where an overlarge encoding rate induces congestion loss and playback delay, decreases the loss and delay. While some effective rate controlling methods have been proposed and simulated well like VTP (Video Transport Protocol) [1], implementing to cooperate with the encoder and tuning the parameters are still challenging works. In this paper, we show our result of the implementation experiment of VTP based encoding rate controlling method and then introduce some techniques of our parameter tuning for a video streaming application over wireless environment.

  • PDF

A Preliminary Study for the Implementation of General Accident Management Strategies

  • Yang, Soo-Hyung;Kim, Soo-Hyung;Jeong, Young-Hoon;Chang, Soon-Heung
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1997.10a
    • /
    • pp.695-700
    • /
    • 1997
  • To enhance the safety of nuclear power plants, implementation of accident management has been suggested as one of most important programs. Specially, accident management strategies are suggested as one of key elements considered in development of the accident management program. In this study, generally applicable accident management strategies to domestic nuclear power plants are identified through reviewing several accident management programs for the other countries and considering domestic conditions. Identified strategies are as follows; 1) Injection into the Reactor Coolant System, 2) Depressurize the Reactor Coolant System, 3) Depressurize the Steam Generator, 4) Injection into the Steam Generator, 5) Injection into the Containment, 6) Spray into the Containment, 7) Control Hydrogen in the Containment. In addition, the systems and instrumentation necessary for the implementation of .each strategy are also investigated.

  • PDF

Expert Suggestions for the Implementation of Science and Engineering Integrated Lesson in Middle Science Classrooms (과학·공학 융합 수업의 중학교 현장적용을 위한 전문가 제안)

  • Yi, Hyojin;Nam, Younkyeong
    • Journal of Engineering Education Research
    • /
    • v.23 no.3
    • /
    • pp.20-31
    • /
    • 2020
  • The purpose of this study is to suggest a meaningful way of implementing science and engineering integrated lessons in school science settings. To this end, two types of science and engineering integrated lesson units (focusing on the physic concepts of light and wave) were developed based on the core elements of science and engineering integrated lesson; object, context, engineering design, and connection with science. These two units were implemented in free semester program in a middle school in a metropolitan city. Throughout the process of program implementation, instructor's reflection and focus group interview with participant students were collected to reveal problems arising from the field implementation. In addition, engineering education experts were interviewed to discuss the potential problems and possible solutions for the problems. As results of the study, five main problems of implementing escience and engineering integrated lessons in a school science setting were revealed and practical solutions for the problems were suggested by the experts.

An implementation of network optimaization system using GIS (GIS를 이용한 네트워트 최적화 시스템 구축)

  • 박찬규;이상욱;박순달;성기석;진희채
    • Korean Management Science Review
    • /
    • v.17 no.1
    • /
    • pp.55-64
    • /
    • 2000
  • By managing not only geographical information but also various kinds of attribute data. GIS presents useful information for decision-makings. Most of decision-making problems using GIS can be formulated into network-optimization problems. In this study we deal with the implementation of network optimization system that extracts data from the database in GIS. solves a network optimization problem and present optimal solutions through GIS' graphical user interface. We design a nitwork optimization system and present some implementation techniques by showing a prototype of the network optimization system. Our network optimization system consists of three components : the interface module for user and GIS the basic network the program module the advanced network optimization program module. To handle large-scale networks the program module including various techniques for large sparse networks is also considered, For the implementation of the network optimization system we consider two approaches : the method using script languages supported by GIS and the method using client tools of GIS. Finally some execution results displayed by the prototype version of network optimization system are given.

  • PDF

An Explorative Study on the Impact of Environmental Variables on the Relationship between EDI controls and EDI Implementation (환경변수가 EDI통제와 EDI구현과의 관계에 미치는 영향에 관한 탐색적 연구)

  • Lee, Sang-Jae;Han, In-Goo
    • Asia pacific journal of information systems
    • /
    • v.9 no.2
    • /
    • pp.99-115
    • /
    • 1999
  • Electronic Data Interchange (EDI) is an important part of interorganizational electronic commerce due to the strategic impact derived from its use. In order to ensure successful implementation of EDI, EDI controls must first be developed. Because they are implemented in an environmental context, the characteristics of organizational environments have a significant impact on EDI controls. The control strategy for the EDI system - formal, informal, and automated controls - should fit certain organizational environments. A research model has been developed to depict the moderating effects of six environmental variables including industry, organizational, and task characteristics on the relationships between controls and implementation. It is shown empirically that the relationships between EDI controls and implementation are indeed affected by these factors. The results can help management design formal, informal, and automated controls in view of their own environmental contexts.

  • PDF

A contingent analysis on the relationships between end-user computing attributes and its implementation (최종사용자 컴퓨팅의 속성과 실행과의 상황적 분석)

  • 이진주;서건수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1990.04a
    • /
    • pp.81-90
    • /
    • 1990
  • The major objective of this paper is to analyze the relationships between End-User Computing(EUC) attributes and its implementation. Reviewing the related literatures, we categorized EUC attributes into threefactors - relative advantage, compatibility, complexity. With such attributes this paper proposed a hypothetical model which explains the effect of the EUC attributes on its implementation. Under the assumption that EUC attributes affect its implementation differently according to the several contingent factors, the model included such factors as organizational size, organizational support level on the EUC activities and individual characteristics - computer experience, education level, age. Data were collected form 177 end-users of 40 Korean business firms. Hypotheses were tested using Pearson Correlation, t-test, ANOVA and the results are discussed below.

  • PDF

Features of the Implementation of Public Authority in the Context of Modern International Security Challenges: Information Component

  • Borysenko, Olha;Kitsak, Taras;Pasichnyi, Roman;Akimova, Liudmyla;Karpa, Marta;Akimov, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.123-128
    • /
    • 2022
  • The main purpose of the study is to determine the features of the implementation of public authority in the context of modern international security challenges. The fact that public authority is a necessary regulator of the life of society ensures its development, unity, and manageability, which is an important factor in the organization and orderliness of society adds to the actualization of the research topic. The research methodology includes a set of theoretical methods of analysis. Based on the results of the study, key aspects of the implementation of public authority in the context of modern international security challenges were identified. The study has limitations, and they relate to the practical aspect of the implementation of public authority in the context of modern international security challenges.