• Title/Summary/Keyword: Information flow control

Search Result 1,186, Processing Time 0.029 seconds

Comparison of Display Visual Effects in Control Task under Limited Reaction Time (반응시간제한시 제어작업의 디스플레이 시각효과 비교)

  • 오영진
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.21 no.47
    • /
    • pp.57-68
    • /
    • 1998
  • Work environments have been changed with the advent of new technologies, such as computer technology. However, human cognitive limits can't pace up with the change of work environment. Designing human-computer system requires knowledge and evaluation of the human cognitive processes which control information flow workload. Futhermore, under limited reaction time and/or urgent situation, human operator may the work stress, work error and resultant deleterious work environment. This paper evaluate the visual factors of major information processing factors(information density, amount of information, operational speed of speed)on operator performance of supervisory control under urgent(limited reaction time)environments which require deleterious work condition. To describe the work performance int the urgent work situations with time stress and dynamic event occurrence, a new concept of information density was introduced. For a series of experiments performed for this study, three independent variables(information amount, system proceeding speed, information density) were evaluated using five dependent variables. The result of statistical analyses indicate that the amount of information affected on all of five dependent measure. Number of failure and number of secondary task score were influenced by both amount of information and operational speed of system. However reaction time of secondary task were affected by both amount of information and information density. As a result, the deleterious factors for the performances seemed to be a scanning time to supervise each control panel. Consequently, a new display panel was suggest to reduce operator work load for scanning task showing better operator performance.

  • PDF

Decomposing Twitter Network in Tourism Marketing

  • Kim, Wonsik;Kim, Daegeun
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.80-85
    • /
    • 2021
  • This study is to analyze the structure of the networks of tourism marketing on Twitter, identifying the most prominent users, the flow of information about tourism marketing, and the interaction between the users posting tweets. This study employs NodeXL pro as a visualization software package for social network analysis. The number of vertices or nodes is 171, and the number of the unique edges or links is 128, but there are 101 edges with duplicates, so the total links are 229, which means that there are fewer Twitter accounts in the social network on tourism marketing, but they have a few close relationships by sharing information. The research can map the social network of communicators of tourism marketing using Twitter data. The network has a complicated pattern, including one independent network and some connected networks. Some mediators connect each network and can control the information flow of tourism marketing. More communicators are getting the information than the ones providing it, which means that there is likely to be the dependence of information among communicators that can cause an obstacle and distortion of the information flow system, especially in the independent network.

A Minimal Constrained Scheduling Algorithm for Control Dominated ASIC Design (Control Dominated ASIC 설계를 위한 최소 제한조건 스케쥴링 알고리즘)

  • In, Chi-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.6
    • /
    • pp.1646-1655
    • /
    • 1999
  • This thesis presents a new VHDL intermediate format CDDG(Control Dominated Data Graph) and a minimal constrained scheduling algorithm for an optimal control dominated ASIC design. CDDG is a control flow graph which represents conditional branches and loops efficiently. Also it represents data dependency and such constraints as hardware resource and timing. In the proposed scheduling algorithm, the constraints using the inclusion and overlap relation among subgraphs. The effectiveness of the proposed algorithm has been proven by the experiment with the benchmark examples.

  • PDF

Static Type Inference Based on Static Single Assignment for Bytecode (바이트코드를 위한 정적 단일 배정문 기반의 정적 타입 추론)

  • Kim Ji-Min;Kim Ki-Tea;Kim Je-Min;Yoo Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.87-96
    • /
    • 2006
  • Although bytecode has many good features, it has slow execution speed and it is not an ideal representation for program analysis or optimization. For analysises and optimizations. bytecode must be translated to a Static Single Assignment Form(SSA Form) But when bytecode is translated a SSA Form it has lost type informations of son variables. For resolving these problem in this paper, we create extended control flow graph on bytecode. Also we convert the control flow graph to SSA Form for static analysis. Calculation about many informations such as dominator, immediate dominator. dominance frontier. ${\phi}$-Function. renaming are required to convert to SSA Form. To obtain appropriate type for generated SSA Form, we proceed the followings. First. we construct call graph and derivation graph of classes. And the we collect information associated with each node. After finding equivalence nodes and constructing Strongly Connected Component based on the collected informations. we assign type to each node.

  • PDF

Static Control Flow Analysis of Binary Codes (이진 코드의 정적 제어 흐름 분석)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.70-79
    • /
    • 2010
  • We perform static program analysis for the binary code. The reason you want to analyze at the level of binary code, installed on your local computer, run the executable file without source code. And the reason we want to perform static analysis, static program analysis is to understand what actions to perform on your local computer. In this paper, execution flow graph representing information such as the execution order among functions and the flow of control is generated. Using graph, User can find execution flow of binary file and calls of insecure functions at the same time, and the graph should facilitate the analysis of binary files. In addition, program to be run is ensured the safety by providing an automated way to search the flow of execution, and program to be downloaded and installed from outside is determined whether safe before running.

On the Formulation and Optimal Solution of the Rate Control Problem in Wireless Mesh Networks

  • Le, Cong Loi;Hwang, Won-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.295-303
    • /
    • 2007
  • An algorithm is proposed to seek a local optimal solution of the network utility maximization problem in a wireless mesh network, where the architecture being considered is an infrastructure/backbone wireless mesh network. The objective is to achieve proportional fairness amongst the end-to-end flows in wireless mesh networks. In order to establish the communication constraints of the flow rates in the network utility maximization problem, we have presented necessary and sufficient conditions for the achievability of the flow rates. Since wireless mesh networks are generally considered as a type of ad hoc networks, similarly as in wireless multi-hop network, the network utility maximization problem in wireless mesh network is a nonlinear nonconvex programming problem. Besides, the gateway/bridge functionalities in mesh routers enable the integration of wireless mesh networks with various existing wireless networks. Thus, the rate optimization problem in wireless mesh networks is more complex than in wireless multi-hop networks.

Fire Detection Algorithm for a Quad-rotor using Ego-motion Compensation (Ego-Motion 보정기법을 적용한 쿼드로터의 화재 감지 알고리즘)

  • Lee, Young-Wan;Kim, Jin-Hwang;Oh, Jeong-Ju;Kim, Hakil
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.1
    • /
    • pp.21-27
    • /
    • 2015
  • A conventional fire detection has been developed based on images captured from a fixed camera. However, It is difficult to apply current algorithms to a flying Quad-rotor to detect fire. To solve this problem, we propose that the fire detection algorithm can be modified for Quad-rotor using Ego-motion compensation. The proposed fire detection algorithm consists of color detection, motion detection, and fire determination using a randomness test. Color detection and randomness test are adapted similarly from an existing algorithm. However, Ego-motion compensation is adapted on motion detection for compensating the degree of Quad-rotor's motion using Planar Projective Transformation based on Optical Flow, RANSAC Algorithm, and Homography. By adapting Ego-motion compensation on the motion detection step, it has been proven that the proposed algorithm has been able to detect fires 83% of the time in hovering mode.

A Study on the Characteristics change of WSix Thin Films by S/H Life Time (S/H Life Time에 따른 WSix의 특성 변화에 관한 연구)

  • 정양희;강성준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.5
    • /
    • pp.689-695
    • /
    • 2002
  • Film compositions are needed in semiconductor manufacturing for such diverse application as production tool qualifications and process development. Surface and interface information is generally provided with Auger electron spectroscopy(AES). In this paper, WSix films were analyzed for structural, electrical, and compositional properties of tungsten silicide thin films produced by low pressure chemical vapor deposition as a function of temperature, DCS post flow, shower head life time, and the silicon to tungsten ratios have been investigated. We find that Si/W composition ratio is increased in the surface and interface of WSix thin films by the DCS post flow process and increasing deposition temperature, respectively. The results obtained in this study are also applicable to process control of WSix deposition for memory device fabrication.

An Analysis of the Regulation Limits for Location Based Services (위치기반서비스의 법률적 규제범위 분석)

  • Jin, Heui-Chae;Sun, Yo-Sub;Nam, Kwang-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.177-182
    • /
    • 2009
  • Location Based Service(LBS) is various and widely spreading service based on the Location information. Those services are under the control of Privacy Act for Location Information to protect from misusing or overusing of personal location information. In this paper, we analyze a concept and a feature of personal location information and how to use and control the flow of location information by the Location Information Act. As the result of this paper, we expect to use the location information in various fields to develop more efficient service.

  • PDF

A study on the development of a corridos control model in the framework of the ITS (도로지능화를 위한 교통축제어모형 개발에 관한 연구)

  • Kim, Dong-Sun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.5 no.2 s.10
    • /
    • pp.29-43
    • /
    • 1997
  • An integrated optimal control modelhas been formulated to address dynamic freeway diversion control process. The purpose of this paper is to develop an effective and efficient approach for simultaneous]v solving optimal control measures, including on-ramp metering rates, off-ramp diversion rates, and g/C ratios for traffic signals, on a real-time basis. By approximating the flow-density relation with a two-segment linear function, the non-linear optimal control problem can be simplified into a set of piece-wised linear programming models and solved with the proposed SLP algorithm. consequently, an effective on-line feedback method has been developed for integrated freeway corridor control in the framework of the ITS

  • PDF