• 제목/요약/키워드: Path Maintenance

검색결과 197건 처리시간 0.026초

애드혹 네트워크에서의 보조 경로 설정 기법에 관한 연구 (A Study on Backup Route Setup Scheme in Ad Hoc Networks)

  • 정세원;이채우
    • 대한전자공학회논문지TC
    • /
    • 제43권8호
    • /
    • pp.47-58
    • /
    • 2006
  • 애드 혹 네트워크는 노드의 이동에 의해 데이터 수신율의 저하, 지연 시간의 증가, 그리고 라우팅 오버헤드의 증가 등의 문제가 발생한다. 이를 해결하기 위한 보조 경로 기법은 노드의 이동에 의한 통신 성능 저하를 방지하기 위해 사전에 보조 경로를 설정해두어 링크 손상이 발생하더라도 패킷 손실이 없는 신속한 경로 복구가 가능하다. 보조 경로 기법은 노드의 이동이 잦은 상황에서 단일 경로 기법보다 데이터 수신율, 지연 시간, 및 라우팅 오버헤드 측면에서 더 좋은 성능을 보인다. 하지만 보조 경로 기법은 경로 탐색 단계에 설정된 보조경로만을 사용하기 때문에 네트워크 토폴로지 변화에 의한 새로운 보조경로를 사용하지 못한다. 본 논문에서 제안하는 리액티브 보조 경로 알고리즘(Reactive Backup Routing Algorithm, RBR)은 선택적 보조 경로 유지와 보조 경로 재 탐색을 통해 적은 오버헤드로 이동이 잦은 환경에서도 안정적인 데이터 수신율과 지연 시간을 보장하는 알고리즘이다. RBR은 설정된 모든 보조 경로를 주기적으로 확인하는 기존 방식과는 달리 보조 경로의 우선순위를 결정하고 보조 경로의 선택적 유지 및 사용으로 라우팅 오버헤드를 감소시킨다. 또한, RBR은 노드의 이동에 의해 보조 경로가 모두 손상되거나 경로가 변경되면 토폴로지 변화에 따라 새롭게 보조 경로를 설정하여 데이터 수신율을 높이고 지연 시간을 감소시킨다. 본 논문에서는 성능 검증을 위해 OPNET을 사용하여 단일 경로 기법 및 기존 보조 경로 기법과 RBR의 성능을 비교 분석한다.

AOMDV의 특성과 진동 센서를 적용한 이동성과 연결성이 개선된 WSN용 LEACH 프로토콜 연구 (A Research of LEACH Protocol improved Mobility and Connectivity on WSN using Feature of AOMDV and Vibration Sensor)

  • 이양민;원준위;차미양;이재기
    • 정보처리학회논문지C
    • /
    • 제18C권3호
    • /
    • pp.167-178
    • /
    • 2011
  • 유비쿼터스 서비스의 성장과 함께 여러 종류의 애드 혹 네트워크가 등장하게 되었다. 특히 애드 혹 네트워크에는 무선 센서 네트워크와 모바일 애드 혹 네트워크가 많이 알려져 있는데, 앞서 서술한 두 가지 네트워크의 특성을 혼합한 무선 애드 혹 네트워크도 존재한다. 본 논문은 LEACH 라우팅 프로토콜을 혼합 네트워크 환경에 적합하도록 개선한 변형된 LEACH 프로토콜 제안한다. 즉 제안한 라우팅 프로토콜은 대규모 이동 센서 노드로 구성된 네트워크에서 노드 검출과 경로 탐색 및 경로 유지를 제공하며, 동시에 노드의 이동성, 연결성, 에너지 효율성을 유지할 수 있다. 제안한 라우팅 프로토콜은 멀티-홉(multi-hop) 및 멀티-패스(multi-path) 알고리즘을 적용하고, 토플로지 재구성 기법으로는 이동중인 대규모 노드에 대한 노드 이동 평가, 진동 센서, 효율적인 경로 선택과 데이터 전송 기법을 이용하여 구현하였다. 실험에서는 제안한 프로토콜과 기존의 전통적인 LEACH 프로토콜을 비교하여 성능을 나타내었다.

제품군의 재사용 가능한 클론 코드의 메소드 경로 통일을 위한 코드 클러스터링 방법 (A Code Clustering Technique for Unifying Method Full Path of Reusable Cloned Code Sets of a Product Family)

  • 김태영;이지현;김은미
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제12권1호
    • /
    • pp.1-18
    • /
    • 2023
  • 유사한 소프트웨어는 기존 산출물을 복제하고 수정하는 클론-앤-오운(clone-and-own, CAO) 방법으로 개발되곤 한다. 그러나 클론-앤-오운 방법은 복제된 제품의 수가 늘면서 유지보수를 어렵게 만들기 때문에 나쁜 프랙티스로 간주된다. 소프트웨어 제품라인 공학은 체계적인 재사용을 통해 소프트웨어 제품군을 개발하는 방법으로 클론-앤-오운 방법의 문제를 해결할 수 있다. CAO 방식으로 개발되어 온 제품패밀리를 제품라인 공학으로 마이그레이션하는 작업은 여러 소프트웨어 제품에서 클로닝된 부분들을 찾아 통합하고 재사용 가능한 자산으로 구축하는 것으로부터 시작된다. 그러나 클로닝이 디렉토리부터 코드 라인까지 다양한 수준에서 발생하고 그 과정에서 이들의 구조에 변경이 일어날 수 있어 단순하게 클로닝을 찾아내는 것만으로는 고품질의 제품라인 코드베이스를 구축하기 어렵다. 성공적인 마이그레이션을 위해서는 소스 코드들 사이의 클로닝 관계를 찾는 것 이외에도 소스 코드들의 파일 경로와 클래스 이름, 메소드 시그니처 등의 동일성을 확보는 작업이 선행되어야 한다. 이에 본 연구는 CAO 기반으로 개발된 제품들로부터 마이그레이션 대상 제품들을 선정한 후 제품들에 흩어져 있는 유사 코드 집합을 검출하여 메소드 경로의 통일이 필요한 대상을 식별하는 클러스터링 방법을 제안한다. 제안 방법의 효과를 보이기 위해 CAO 방식으로 진화해온 ApoGames 제품군에 제안 방법을 적용하여 실험을 진행하였다. 그 결과, 전처리 없이 수행된 파일의 상대 경로 기반 클러스터링 방법의 평균 정밀도는 0.91이며 식별된 공통 클러스터의 개수는 0개인 반면에 이 논문에서 제안하는 전처리와 함께 수행된 메소드 시그니처 기반 클러스터링 방법의 평균 정밀도는 0.98로 개선되었으며 식별된 공통 클러스터는 최대 15개까지 증가하였다.

PLS 경로모형을 이용한 IT 조직의 BSC 성공요인간의 인과관계 분석 (A PLS Path Modeling Approach on the Cause-and-Effect Relationships among BSC Critical Success Factors for IT Organizations)

  • 이정훈;신택수;임종호
    • Asia pacific journal of information systems
    • /
    • 제17권4호
    • /
    • pp.207-228
    • /
    • 2007
  • Measuring Information Technology(IT) organizations' activities have been limited to mainly measure financial indicators for a long time. However, according to the multifarious functions of Information System, a number of researches have been done for the new trends on measurement methodologies that come with financial measurement as well as new measurement methods. Especially, the researches on IT Balanced Scorecard(BSC), concept from BSC measuring IT activities have been done as well in recent years. BSC provides more advantages than only integration of non-financial measures in a performance measurement system. The core of BSC rests on the cause-and-effect relationships between measures to allow prediction of value chain performance measures to allow prediction of value chain performance measures, communication, and realization of the corporate strategy and incentive controlled actions. More recently, BSC proponents have focused on the need to tie measures together into a causal chain of performance, and to test the validity of these hypothesized effects to guide the development of strategy. Kaplan and Norton[2001] argue that one of the primary benefits of the balanced scorecard is its use in gauging the success of strategy. Norreklit[2000] insist that the cause-and-effect chain is central to the balanced scorecard. The cause-and-effect chain is also central to the IT BSC. However, prior researches on relationship between information system and enterprise strategies as well as connection between various IT performance measurement indicators are not so much studied. Ittner et al.[2003] report that 77% of all surveyed companies with an implemented BSC place no or only little interest on soundly modeled cause-and-effect relationships despite of the importance of cause-and-effect chains as an integral part of BSC. This shortcoming can be explained with one theoretical and one practical reason[Blumenberg and Hinz, 2006]. From a theoretical point of view, causalities within the BSC method and their application are only vaguely described by Kaplan and Norton. From a practical consideration, modeling corporate causalities is a complex task due to tedious data acquisition and following reliability maintenance. However, cause-and effect relationships are an essential part of BSCs because they differentiate performance measurement systems like BSCs from simple key performance indicator(KPI) lists. KPI lists present an ad-hoc collection of measures to managers but do not allow for a comprehensive view on corporate performance. Instead, performance measurement system like BSCs tries to model the relationships of the underlying value chain in cause-and-effect relationships. Therefore, to overcome the deficiencies of causal modeling in IT BSC, sound and robust causal modeling approaches are required in theory as well as in practice for offering a solution. The propose of this study is to suggest critical success factors(CSFs) and KPIs for measuring performance for IT organizations and empirically validate the casual relationships between those CSFs. For this purpose, we define four perspectives of BSC for IT organizations according to Van Grembergen's study[2000] as follows. The Future Orientation perspective represents the human and technology resources needed by IT to deliver its services. The Operational Excellence perspective represents the IT processes employed to develop and deliver the applications. The User Orientation perspective represents the user evaluation of IT. The Business Contribution perspective captures the business value of the IT investments. Each of these perspectives has to be translated into corresponding metrics and measures that assess the current situations. This study suggests 12 CSFs for IT BSC based on the previous IT BSC's studies and COBIT 4.1. These CSFs consist of 51 KPIs. We defines the cause-and-effect relationships among BSC CSFs for IT Organizations as follows. The Future Orientation perspective will have positive effects on the Operational Excellence perspective. Then the Operational Excellence perspective will have positive effects on the User Orientation perspective. Finally, the User Orientation perspective will have positive effects on the Business Contribution perspective. This research tests the validity of these hypothesized casual effects and the sub-hypothesized causal relationships. For the purpose, we used the Partial Least Squares approach to Structural Equation Modeling(or PLS Path Modeling) for analyzing multiple IT BSC CSFs. The PLS path modeling has special abilities that make it more appropriate than other techniques, such as multiple regression and LISREL, when analyzing small sample sizes. Recently the use of PLS path modeling has been gaining interests and use among IS researchers in recent years because of its ability to model latent constructs under conditions of nonormality and with small to medium sample sizes(Chin et al., 2003). The empirical results of our study using PLS path modeling show that the casual effects in IT BSC significantly exist partially in our hypotheses.

다관절 머니퓰레이터의 사용자 중심 제어기 설계 (User-Oriented Controller Design for Multi-Axis Manipulators)

  • 손현석;강대훈;이장명
    • 대한임베디드공학회논문지
    • /
    • 제3권2호
    • /
    • pp.49-56
    • /
    • 2008
  • This paper proposes a PC-based open architecture controller for a multi-axis robotic manipulator. The designed controller can be applied for various multi-axes robotic manipulators since the motion controller is implemented on a PC with its peripheral devices. The accuracy of the controller based on the computed torque method has been measured with the dynamic model of manipulator. Since the controller is implemented in the PC-based architecture, it is free from the user circumstances and the operating environment. Dynamics of the manipulator have been compensated by the feed forward path in the inner loop and the resulting linear outer loop has been controlled by PD algorithm. Using the specialized language, it can be more efficient in programming and in driving of the multi-axis robot. Unlike the conventional controller that is used to control only a specific robot, this controller can be easily changed for various types of robots. This paper proposes a PC-based controller that has a simple architecture with its simple interface circuits than general commercial controllers. The maintenance and the performance of the controller can be easily improved for a specific robot. In fact, using a Samsung multi-axis robot, AT1, the controller performance and convenience of the PC-based controller have been verified by comparing to the commercial one.

  • PDF

Evolution and Maintenance of Proxy Networks for Location Transparent Mobile Agent and Formal Representation By Graph Transformation Rules

  • Kurihara, Masahito;Numazawa, Masanobu
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2001년도 The Pacific Aisan Confrence On Intelligent Systems 2001
    • /
    • pp.151-155
    • /
    • 2001
  • Mobile agent technology has been the subject of much attention in the last few years, mainly due to the proliferation of distributed software technologies combined with the distributed AI research field. In this paper, we present a design of communication networks of agents that cooperate with each other for forwarding messages to the specific mobile agent in order to make the overall system location transparent. In order to make the material accessible to general intelligent system researchers, we present the general ideas abstractly in terms of the graph theory. In particular, a proxy network is defined as a directed acyclic graph satisfying some structural conditions. In turns out that the definition ensures some kind of reliability of the network, in the sense that as long as at most one proxy agent is abnormal, there agent exists a communication path, from every proxy agent to the target agent, without passing through the abnormal proxy. As the basis for the implementation of this scheme, an appropriate initial proxy network is specified and the dynamic nature of the network is represented by a set of graph transformation rules. It is shown that those rules are sound, in the sense that all graphs created from the initial proxy network by zero or more applications of the rules are guaranteed to be proxy networks. Finally, we will discuss some implementation issues.

  • PDF

The Effect of IT Human Capability and Absorptive Capacity on Knowledge Transfer

  • Park, Joo-Yeon
    • Journal of Information Technology Applications and Management
    • /
    • 제15권3호
    • /
    • pp.209-225
    • /
    • 2008
  • The purpose of this study is to examine the relationship between IT human capability and knowledge transfer and the role of absorptive capacity between them. From the test of both measurement and structural model using Partial Least Squares (PLS), IT human capability is found to be significant to absorptive capacity and knowledge transfer. Absorptive capacity is also significantly related to knowledge transfer. The interesting result found in this study is that the path of absorptive capacity drawn from IT human capability to knowledge transfer is stronger than the direct relationship between IT human capability and knowledge transfer, indicating that absorptive capacity plays an important role in knowledge transfer. This result indicates that IT personnel with stronger technical skill, interpersonal skill and management capability are more likely to acquire and learn knowledge effectively from outside expertise. Moreover, this study shows that absorptive capacity, the individual’s ability to utilize external knowledge is derived from IT human capability and strongly effects on transferring knowledge from outsourcing vendors. This study suggests IT related managers that the development of IT human capability and absorptive capacity should be recognized for a successful exploitation of outside knowledge within a firm. It is also a necessary condition for a successful IT implementation and maintenance independently and economically from outside vendors.

  • PDF

자동차 차체공장의 매뉴얼 점용접 공정에 가상생산기술 적용 (Implementation of Virtual Manufacturing Technology to Manual Spot Welding Process in Automotive Body Shop)

  • 정광조;이건상;박영진
    • 대한기계학회:학술대회논문집
    • /
    • 대한기계학회 2003년도 춘계학술대회
    • /
    • pp.1166-1172
    • /
    • 2003
  • The extremely strong competition among the world automobile industries has introduced the concept of PLM in the total production activities, one of whose major components is VM(Virtual Manufacturing). If the production lines are equipped with robots, the application of OLP in the virtual space is fully mature. However, in the point of the investment's and the maintenance's view, there are always some activities, which can not be automated: for example, typically the manual welding for prefixing in the automobile body shop and the material loading. Process planning for these activities, therefore, are decided mainly by experiences, which caused many repeated rework of the processes and the inconvenience of the workers, and resulted consequently in the reduction of the productivity and the safety of the workers. In this paper, the optimal dimension of the welding gun and its handle position and the optimal working path is simulated and decided by use of DELIMN/IGRIP and DELMIA/Ergo and the working area modelized in the virtual workcell of DELMIA.

  • PDF

분산 제어기 구조를 갖는 마스터 암의 기구학 설계 및 해석

  • 이장욱;김윤상;이수용;김문상
    • 제어로봇시스템학회논문지
    • /
    • 제7권6호
    • /
    • pp.532-539
    • /
    • 2001
  • In robot teleoperation, much research has been carried out to control the slave robot from remote site. One of the essential devices for robot teleoperation is the masterarm, which is a path command generating device worn on human arm. In this paper, a new masterarm based on human kinematics is proposed. Its controller is based on the distributed controller architecture composed of two controller parts: a host controller and a set of satellite controllers. Each satellite controller measures the corresponding joint angle, while the host controller performs forward and inverse kinematics calculation. This distributed controller architecture can make the data updating faster, which allows to implement real-time implementation. The host controller and the satellited controllers are networked via three-wire daisy-chained SPI(Serial Peripheral Interface) protocol, so this architecture makes the electrical wiring very simple, and enhances maintenance. Analytical method for finding three additional unknown joint angles is derived using only three measured angles for each shoulder and wrist, which makes th hardware implementation very simple by minimizing the required number of satellite controllers. Finally, the simulation and experiment results are given to demonstrate the usefulness and performance of the proposed masterarm.

  • PDF

ZigBee 무선계측/경보 시스템을 위한 클러스터 기반의 AODV (Cluster-based AODV for ZigBee Wireless Measurement and Alarm Systems)

  • 박재원;김홍록;이연정
    • 제어로봇시스템학회논문지
    • /
    • 제13권9호
    • /
    • pp.920-926
    • /
    • 2007
  • Establishing a fixed path for the message delivery through a wireless network is impossible due to the mobility. Among the number of routing protocols that have been proposed for wireless ad-hoc networks, the AODV(Ad-hoc On-demand Distance Vector) algorithm is suitable in the case of highly dynamic topology changes, along with ZigBee Routing(ZBR), with the exception of route maintenance. Accordingly, this paper introduces a routing scheme focusing on the energy efficiency and route discovery time for wireless alarm systems using IEEE 802.15.4-based ZigBee. Essentially, the proposed routing algorithm utilizes a cluster structure and applies ZBR within a cluster and DSR (Dynamic Source Routing) between clusters. The proposed algorithm does not require a routing table for the cluster heads, as the inter-cluster routing is performed using DSR. The performance of the proposed algorithm is evaluated and compared with ZBR using an NS2 simulator. The results confirm that the proposed Cluster-based AODV (CAODV) algorithm is more efficient than ZBR in terms of the route discovery time and energy consumption.