• 제목/요약/키워드: Network Benefit

검색결과 375건 처리시간 0.024초

화물수송체계의 평가와 개선을 위한 다목적 Programming모델 (Multiobjective Transportation Infrastructure Development Problems on Dynamic Transportation Networks)

  • 이금숙
    • 대한교통학회지
    • /
    • 제5권1호
    • /
    • pp.47-58
    • /
    • 1987
  • A commodity distribution problem with intertemporal storage facilities and dynamic transportation networks is proposed. mathematical integer programming methods and multiobjective programming techniques are used in the model formulation. Dynamic characteristics of commodity distribution problems are taken into account in the model formulation. storage facility location problems and transportation link addition problems are incorporated into the intertemporal multicommodity distribution problem. The model is capable of generating the most efficient and rational commodity distribution system. Therefore it can be utilized to provided the most effective investment plan for the transportation infrastructure development as well as to evaluate the existing commodity distribution system. The model determines simultaneously the most efficient locations, sizes, and activity levels of storage facilities as well as new highway links. It is extended to multiobjective planning situations for the purpose of generating alternative investment plans in accordance to planning situations. sine the investment in transportation network improvement yields w\several external benefits for a regional economy, the induced benefit maximization objective is incorporated into the cost minimization objective. The multiobjective model generates explicitly the trade-off between cost savings and induced benefits of the investment in transportation network improvement.

  • PDF

소형 DSP6416 칩을 이용한 모터제어기 개발 (Motors Contorl development using compact DSP6416 chip)

  • 김현식;강경우;고성환;고종선;홍순찬
    • 전력전자학회:학술대회논문집
    • /
    • 전력전자학회 2005년도 전력전자학술대회 논문집
    • /
    • pp.230-233
    • /
    • 2005
  • This paper present a new method for world wide network motor controlled system. It use disturbance observer to present high precision position control algorithm to disturbance change, and to apply this to induction motors. It shows that proposed algorithm is strong in induction motor precision control for disturbance change. This system with disturbance observer used deadbeat control, which have high benefit, is good for quick disturbance compensation. To show these effectiveness the whole process is simulated by simulink, and also experimented by DSP6416 with TCP-IP network board.

  • PDF

Flow Factor Prediction of Centrifugal Hydraulic Turbine for Sea Water Reverse Osmosis (SWRO)

  • Ma, Ying;Kadaj, Eric;Terrasi, Kevin
    • International Journal of Fluid Machinery and Systems
    • /
    • 제3권4호
    • /
    • pp.369-378
    • /
    • 2010
  • The creation of the hydraulic turbine flow factor map will undoubtedly benefit its design by decreasing both the design cycle time and product cost. In this paper, the geometry and flow variables, which effectively affect the flow factor, are proposed, analyzed and determined. These flow variables are further used to create the operating condition maps by using different model approaches categorized into Response Surface Method (RSM) and Artificial Neural Network (ANN). The accuracies of models created by different approaches are compared and the performances of model approaches are analyzed. The influences of chosen variables and the combination of Principle Component Analysis (PCA) and model approaches are also studied. The comparison results between predicted and actual flow factors suggest that two-hidden-layer Feed-forward Neural Network (FFNN), and one.hidden-layer FFNN with PCA has the best performance on forming this mapping, and are accurate sufficiently for hydraulic turbine design.

DSP6416을 이용한 유도기의 정밀 위치 제어 (Precision position control of induction motors using DSP6416)

  • 김현식;김영찬;고종선
    • 전력전자학회논문지
    • /
    • 제12권1호
    • /
    • pp.19-26
    • /
    • 2007
  • 본 논문은 외란 변화에 대하여 정밀위치 변화를 줄이고자 외란 관측기를 사용하였고 이를 유도전동기에 적용하였다. 제안된 알고리즘이 외란 변화에 대한 유도전동기의 정밀 제어에 강인함을 보이고 있다. 외란 관측기가 있는 이 시스템은 높은 실효성과 외란 보상에 뛰어난 데드비트 컨트롤을 사용하고 있다. 이 효과를 보이기 위해서 모의 실험은 Simulink를 사용하였고 DSP6416 및 TCP-IP 네트워크 보드와 연동하여 실험하였다.

Neural network algorithm for VOC gas recognition and concentration estimation at field screen using E-Nose System

  • Kim, Jeong-Do;Byun, Hyung-Gi;Ham, Yu-Kyung;Lee, Jun-Sub;Shon, Won-Ryul;Heo, Nam-Up
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.61.3-61
    • /
    • 2001
  • Field screening for pollutants has been a target of instrumental development for number of years. An electronic nose can be of substantial benefit to rapidly localize the spatial extent of a pollution or to find pollutant source. Although an electronic nose cannot separate complex composition into the whole spectrum of present volatile organic compound(VOC) in pollutants such as Gas chromatography(GC), qualitative and semi-quantitative chemical characterizations are rapidly available on site at a low cost using the optimum sensory system and pattern recognition algorithm based on neural network.

  • PDF

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

Detecting A Crypto-mining Malware By Deep Learning Analysis

  • Aljehani, Shahad;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.172-180
    • /
    • 2022
  • Crypto-mining malware (known as crypto-jacking) is a novel cyber-attack that exploits the victim's computing resources such as CPU and GPU to generate illegal cryptocurrency. The attacker get benefit from crypto-jacking by using someone else's mining hardware and their electricity power. This research focused on the possibility of detecting the potential crypto-mining malware in an environment by analyzing both static and dynamic approaches of deep learning. The Program Executable (PE) files were utilized with deep learning methods which are Long Short-Term Memory (LSTM). The finding revealed that LTSM outperformed both SVM and RF in static and dynamic approaches with percentage of 98% and 96%, respectively. Future studies will focus on detecting the malware using larger dataset to have more accurate and realistic results.

The Bill of Exchange's Regulations and the Implications of its Abolition on the Commercial Community

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.303-311
    • /
    • 2022
  • Through our study, bill of exchange is defined as a written document that contains an order from the drawer directed to the drawee during which the predetermined amount must be paid within a certain time period or on sight. The research begins with an examination of how it was founded, the parties involved, and the organizer's formal conditions. Then, it discusses how to negotiate a bill of exchange through endorsement along with the different types of endorsement and its ramifications. The research concludes by elucidating the bill of exchange impact on the business community, since it decreases commercial conflicts and enables merchants to benefit from, circulate, and recycle their debts without being damaged by debts collection delays.

Encouraging Labor Intellectualization as a Tool for Intellectual Capital Development

  • Palagusyntes, Rostyslav;Shumytska, Halyna;Novosad, Kristina;Katsora, Oleksandr;Dzhuhan, Olha;Danko, Dana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.101-108
    • /
    • 2022
  • The article reviews the means of stimulating and motivating to labor intellectualization in diplomatic service employees. The means considered encourage them to raise the effectiveness in achieving goals. Leveling up of intellectual labor of diplomatic services employees, as well as means of motivation of employees are covered in the Law of Ukraine "On Civil Service". The law defines and regulates the conditions for the performance of intellectual labor entrusted to the staff of diplomatic services, namely: defines the direct rights and responsibilities of employees of diplomatic services, protects the interests and assists citizens of Ukraine abroad, meets the needs of all pressing issues and problems for their benefit.

Data Visualization and Visual Data Analytics in ITSM

  • Donia Y. Badawood
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.68-76
    • /
    • 2023
  • Nowadays, the power of data analytics in general and visual data analytics, in particular, have been proven to be an important area that would help development in any domain. Many well-known IT services best practices have touched on the importance of data analytics and visualization and what it can offer to information technology service management. Yet, little research exists that summarises what is already there and what can be done to utilise further the power of data analytics and visualization in this domain. This paper is divided into two main parts. First, a number of IT service management tools have been summarised with a focus on the data analytics and visualization features in each of them. Second, interviews with five senior IT managers have been conducted to further understand the usage of these features in their organisations and the barriers to fully benefit from them. It was found that the main barriers include a lack of good understanding of some visualization design principles, poor data quality, and limited application of the technology and shortage in data analytics and visualization expertise.