• Title/Summary/Keyword: Network Performance Evaluation

Search Result 1,863, Processing Time 0.028 seconds

Construction for the Design Project Management System(DPMS) (디자인 프로젝트 관리 시스템(DPMS)의 구성)

  • 우흥룡
    • Archives of design research
    • /
    • v.12 no.3
    • /
    • pp.227-234
    • /
    • 1999
  • We paid attention to the fact that a project will always tend to increase in size even if its scope is narrowing. The complexities and multidisciplinary aspects of projects require that the many parts should be put together so that the prime objectives- performance, time, and cost- are met. These aspects lead to the use of teams to solve problems that used to be solved by individuals. Firstly, We surveyed the design companies and their clients on the design projects, and categorized the design task into 5 phases, that are marketing, planning, idea development, presentation, and follow-up. Among the phases, the presentation has the most difficult task, longest processing time, and highest cost, whereas idea development phase has relatively low cost, longer processing time, and more difficult task. Most of the companies used to be faced several bottlenecks on their design projects - time control, budget control, and resource control. Secondly, for improving the project managing process, we adopted that dividing and analyzing the sub critical paths may help in the effective managing.(Badiru, Adedeji B., 1995) Some critical paths require almost as much attention as the critical path since they have a high potential of becoming critical when changes occur in the network. Therefrom we suggest the Total task weight(Gt) as a management formula for the design project management.${Gt=\mathrm{T}\ast\leftthreetimes\ast1/100}$<\TEX> ( Gt = Total task weight, mathrm{T} = Task Weight, \leftthreetimes= Criticality ) Thirdly, In order to support to managing for the design projects, we set up an application system, which is graphically planning and implementing a complex undertaking. It is helpful to make the control of a project easy. The DPMS(Design Project Management System), which has two sub system. One is Project Screening System(PSS), and another Project Managing System(PMS). In PMS, we divided the design project into three modules; Project Planning, Project Implementation, and Project Evaluation. As a result, the DPMS will contribute to supply the control of a project easily and effectively. Also teams are used for making decisions and taking action with the DPMS. But we need to get further studies on the relationships between the whole project and its tasks.

  • PDF

Different Impacts of Independent Recurrent and Non-Recurrent Congestion on Freeway Segments (고속도로상의 독립적인 반복 및 비반복정체의 영향비교)

  • Gang, Gyeong-Pyo;Jang, Myeong-Sun
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.6
    • /
    • pp.99-109
    • /
    • 2007
  • There have been few studies on the impacts of independent recurrent and non-recurrent congestion on freeway networks. The main reason is due partly to the lack of traffic data collected during those periods of recurrent and non-recurrent congestion and partly to the difficulty of using the simulation tools effectively. This study has suggested a methodology to analyze the independent impacts of the recurrent and non-recurrent congestion on target freeway segments. The proposed methodology is based on an elaborately calibrated simulation analysis, using real traffic data obtained during the recurrent and non-recurrent congestion periods. This paper has also summarized the evaluation results from the field tests of two ITS technologies, which were developed to provide drivers with real-time traffic information under traffic congestion. As a result, their accuracy may not be guaranteed during the transition periods such as the non-recurrent congestion. In summary, this study has been focused on the importance of non-recurrent congestion compared to recurrent congestion, and the proposed methodology is expected to provide a basic foundation for prioritizing limited government investments for improving freeway network performance degraded by recurrent or non-recurrent congestion.

A Multi-Agent framework for Distributed Collaborative Filtering (분산 환경에서의 협력적 여과를 위한 멀티 에이전트 프레임워크)

  • Ji, Ae-Ttie;Yeon, Cheol;Lee, Seung-Hun;Jo, Geun-Sik;Kim, Heung-Nam
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.3
    • /
    • pp.119-140
    • /
    • 2007
  • Recommender systems enable a user to decide which information is interesting and valuable in our world of information overload. As the recent studies of distributed computing environment have been progressing actively, recommender systems, most of which were centralized, have changed toward a peer-to-peer approach. Collaborative Filtering (CF), one of the most successful technologies in recommender systems, presents several limitations, namely sparsity, scalability, cold start, and the shilling problem, in spite of its popularity. The move from centralized systems to distributed approaches can partially improve the issues; distrust of recommendation and abuses of personal information. However, distributed systems can be vulnerable to attackers, who may inject biased profiles to force systems to adapt their objectives. In this paper, we consider both effective CF in P2P environment in order to improve overall performance of system and efficient solution of the problems related to abuses of personal data and attacks of malicious users. To deal with these issues, we propose a multi-agent framework for a distributed CF focusing on the trust relationships between individuals, i.e. web of trust. We employ an agent-based approach to improve the efficiency of distributed computing and propagate trust information among users with effect. The experimental evaluation shows that the proposed method brings significant improvement in terms of the distributed computing of similarity model building and the robustness of system against malicious attacks. Finally, we are planning to study trust propagation mechanisms by taking trust decay problem into consideration.

  • PDF

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

Pre-Planned Tree Reconfiguration Mechanism for QoS Multicast Routing (QoS 멀티캐스트 라우팅을 위한 계획된 트리 재구성 방법)

  • Han, Seung-Jae;Park, Sun-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.120-133
    • /
    • 2007
  • A multicast tree includes several, possibly a large number of, paths connecting source-receiver pairs, and network failure may disable part of the multicast tree. Reconstruction of the entire multicast tree to recover from a component failure is highly undesirable, because some group members have to suffer service disruptions even though the communication paths to/from them are not affected by the failure. To limit reconfiguration region and to maximize the likelihood of successful reconfiguration, we propose and evaluate a pre-planned reconfiguration policy for QoS multicast sessions. Specifically, we equip a reconfiguration path (RP) with each end-to-end path that connects a source-receiver pair in the multicast tree, and reserve resources in advance along the RPs. Efficient resource-sharing techniques are applied to reduce the amount of resources reserved for RPs but not used in the absence of failures. This way, we prevent uncontrolled competition among different multicast sessions which may simultaneously try to recover from failures. We evaluate the performance of the proposed scheme using simulation on randomly-generated networks. We use the shortest-path routing for QoS multicast sessions, and simulate both source-based and shared multicast trees. The evaluation results indicates that successful pre-planned reconfiguration can be achieved for all group members with reasonable overhead. Our scheme is also shown to adapt well to dynamic changes of group membership.

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

Quantitative Evaluation of the Semi-Actuated Signal Control Systems (반감응 신호제어의 정량적 효과 평가에 관한 연구)

  • Kim, Seung-Jin;Lee, Sang-Soo;Lee, Choul-Ki;Park, Sung-Kyun;Lee, Ho-Jun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.19-28
    • /
    • 2013
  • This study evaluated the quantitative effects of the deployment of semi-actuated signal systems using field data. For this, a semi-actuted signal system was deployed in the regional roadway network extensively. This paper investigated an operating strategy of semi-actuated signal systems for field application, and implemented the functional strategy into the standard signal controller. The performance was evaluated using three measures of effectiveness such as traffic volume, travel time, and the number of delayed vehicle. From the analysis results, traffic volume increased about 9.4% and 11.3% for morning and evening peak periods, respectively. The average travel time was reduced about 6.3% and 7.8% during morning and evening peak periods, respectively because of the expansion of bandwidths for major streets. In addition, the number of delayed vehicles was reduced about 36.4% and 23.9% for morning and evening peak periods, respectively. It is expected that the effectiveness of signal control system can be improved by incorporating a properly designed semi-actuated signal system in regional roadways with directional demand variation.

Evaluation of Travel Time Prediction Reliability on Highway Using DSRC Data (DSRC 기반 고속도로 통행 소요시간 예측정보 신뢰성 평가)

  • Han, Daechul;Kim, Joohyon;Kim, Seoungbum
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.4
    • /
    • pp.86-98
    • /
    • 2018
  • Since 2015, the Korea Expressway Corporation has provided predicted travel time information, which is reproduced from DSRC systems over the extended expressway network in Korea. When it is open for public information, it helps travelers decide optimal routes while minimizing traffic congestions and travel cost. Although, sutiable evaluations to investigate the reliability of travel time forecast information have not been conducted so far. First of all, this study seeks to find out a measure of effectiveness to evaluate the reliability of travel time forecast via various literatures. Secondly, using the performance measurement, this study evaluates concurrent travel time forecast information in highway quantitatively and examines the forecast error by exploratory data analysis. It appears that most of highway lines provided reliable forecast information. However, we found significant over/under-forecast on a few links within several long lines and it turns out that such minor errors reduce overall reliability in travel time forecast of the corresponding highway lines. This study would help to build a priority for quality control of the travel time forecast information system, and highlight the importance of performing periodic and sustainable management for travel time forecast information.

A Study on Backup Route Setup Scheme in Ad Hoc Networks (애드혹 네트워크에서의 보조 경로 설정 기법에 관한 연구)

  • Jung Se-Won;Lee Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.47-58
    • /
    • 2006
  • Due to the movement of nodes, ad-hoc networks suffer from the problems such as the decrease of data delivery ratio, the increase of end-to-end delay, and the increase of routing overhead. The backup routing schemes try to solve these problems by finding the backup routes during the route discovery phase and using them when a route fails. Generally the backup routing schemes outperform the single-path routing schemes in terms of data delivery ratio, end-to-end delay, and routing overhead when the nodes move rapidly. But when the nodes don't move rapidly, the backup routing schemes generate more routing traffics than the single-path routing schemes because they need to exchange packets to find the backup route. In addition, when the backup route fails earlier than the main route, it can not use the backup route because in many backup route algorithms, the backup route is found only at the initial route discovery phase. RBR(Reactive Backup Routing Algorithm) proposed in this paper is an algorithm that provides more stable data delivery than the previous backup routing schemes through the selective maintenance of backup route and the backup route rediscovery. To do that RBR prioritize the backup routes, and maintain and use them selectively Thus it can also decrease the routing overheads. Also, RBR can increase data delivery ratio and decrease delay because it reestablishes the backup route when the network topology changes. For the performance evaluation, OPNET simulator is used to compare RBR with the single-path routing scheme and some of the well known backup routing schemes.

Structural Strength Evaluation for Development of a Vertical Transfer Device for a Personal Rapid Transit (PRT) Vehicle (PRT 차량용 수직이송장치의 개발을 위한 구조강도 평가)

  • Kang, Seok-Won;Um, Ju-Hwan;Jeong, Rag-Gyo;Song, Joon-Hyun
    • Transactions of the KSME C: Technology and Education
    • /
    • v.3 no.3
    • /
    • pp.165-173
    • /
    • 2015
  • This paper presents numerical results of static structural stability analysis in development of a vertical transfer device of a PRT(Personal Rapid Transit) vehicle. The vertical transfer of a fully occupied vehicle operating on a road network is the first attempt, which is expected to contribute to overcome the limitations of conventional 2-dimensional operation mode. In particular, the vertical transfer apparatus designed based on vertical circulating conveyors is capable of continuous transfer without time delay so that it enables to accommodate a high traffic density. This system has been frequently used in a logistics field; however, it is essential to assess a structural integrity because an external force by a vehicle weight is exerted on the conveyors in the form of a concentrated load unlike a conventional logistic transport. In this study, prior to the production process, the structural performance of the pilot design in an early stage is numerically evaluated using the commercial finite element method (FEM) solver (i.e., $Ansys^{(R)}$).