• Title/Summary/Keyword: PowerManager

Search Result 174, Processing Time 0.056 seconds

An Energy Efficient Clustering Algorithm in Mobile Adhoc Network Using Ticket Id Based Clustering Manager

  • Venkatasubramanian, S.;Suhasini, A.;Vennila, C.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.341-349
    • /
    • 2021
  • Many emerging mobile ad-hoc network application communications are group-oriented. Multicast supports group-oriented applications efficiently, particularly in a mobile environment that has a limited bandwidth and limited power. Energy effectiveness along with safety are 2 key problem in MANET design. Within this paper, MANET is presented with a stable, energy-efficient clustering technique. In this proposed work advanced clustering in the networks with ticket ID cluster manager (TID-CMGR) has formed in MANET. The proposed routing scheme makes secure networking the shortest route possible. In this article, we propose a Cluster manager approach based on TICKET-ID to address energy consumption issues and reduce CH workload. TID-CMGR includes two mechanism including ticket ID controller, ticketing pool, route planning and other components. The CA (cluster agent) shall control and supervise the functions of nodes and inform to TID-CMGR. The CH conducts and transfers packets to the network nodes. As the CH energy level is depleted, CA elects the corresponding node with elevated energy values, and all new and old operations are simultaneously stored by CA at this time. A simulation trial for 20 to 100 nodes was performed to show the proposed scheme performance. The suggested approach is used to do experimental work using the NS- simulator. TIDCMGR is compared with TID BRM and PSO to calculate the utility of the work proposed. The assessment shows that the proposed TICKET-ID scheme achieves 90 percent more than other current systems.

A Study on the Organizational Effectiveness in accordance with the Construction Project Manager's Leadership Style (건설현장소장의 리더십 유형에 따른 조직유효성에 관한 연구)

  • Choi, Soo-Il;Kim, Hong;Min, Kyoung-Ho
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.415-443
    • /
    • 2006
  • This empirical study focused on examining the relationship between transactional transformational leadership style and power of construction project manager and the organizational effectiveness, respectively, and the moderating role of power between leadership and the organizational effectiveness. A 790 numbers useful questionnaires were obtained from the stuffs working at the construction sites excluding project managers. Internal consistency test using Cronbach's ${\alpha}$ and confirmatory factor analysis were conducted for the reliability and validity of the scales respectively. And cluster analysis and multivariate analysis of variance (MANOVA) were conducted to test the hypotheses. The results and implications are as follows. First, the leadership styles of project managers influence positively the subordinates' job satisfaction but not organizational commitment in construction project. Second, the power styles of project managers influence positively the subordinates' job satisfaction and organizational commitment. Third, the leadership styles of the project managers influence positively the subordinates' job satisfaction and organizational commitment by the power moderating role. The implication of this result is important because of the fact that the transformational leadership can be useful even in the construction projects. And the moderating role of the project manage's power suggests.

  • PDF

Design of Border Surveillance and Control System Based on Wireless Sensor Network (WSN 기반 국경 감시 및 제어 시스템 설계)

  • Hwang, Bo Ram;An, Sun Shin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.11-14
    • /
    • 2015
  • WSN (Wireless Sensor Network) based on low-power is one of the core technologies in the ubiquitous society. In this paper, we present a border surveillance and control system in WSN environment. The system consists of static sensor node, mobile sensor node, static gateway, mobile gateway, server and mobile application. Mobile applications are divided into user mode and manager mode. So users monitor border surveillance through mobile phone and get information of border network environment without time and space constraints. In manager mode, for the flexible operation of nodes, manager can update to the software remotely and adjust the position of the mobile node. And also we implement a suitable multi-hop routing protocol for scalable low-power sensor nodes and confirm that the system operates well in WSN environment.

Design of Conformance Test Manager Program for Client based on IEC 61850 (IEC 61850 기반의 클라이언트 적합성 테스트 관리 프로그램 설계)

  • Park, Min-Woo;Yang, Hyo-Sig;Jang, Byung-Tae;Lee, Nam-Ho;Jang, Hyuk-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.276-278
    • /
    • 2008
  • IEC 61850 기반의 클라이언트의 적합성 검사를 시행할 방법이 아직 체계적으로 정립되어 있지 않다. 이에 본 논문에서는 클라이언트의 적합성 검사를 위한 관리 프로그램의 구현을 위해 소프트웨어 개발 방법론을 적용하여 설계하고 이에 대한 자세한 내용을 다룬다.

  • PDF

Network Based UPS Remote Control System Using SNMP (네트워크 환경에서의 무정전전원장치용 원격제어 시스템)

  • 최소영
    • Proceedings of the KIPE Conference
    • /
    • 2000.07a
    • /
    • pp.744-747
    • /
    • 2000
  • This paper aims at developing remote control system to control and monitor distribute various devices through internet or information communication network. So far for managing UPS(Uninterruptible Power Supply) serial communication system has been used. This paper proposes managing method of UPS monitoring using SNMP. It consists of SNMP agent network board SNMP manager PC software serial communication software and UPS. The proposed method can be applied to various devices with communication network remotely.

  • PDF

A Study on Proposal to improve Domestic Construction Management Service Guide (국내 건설사업관리 업무지침의 개선(안)에 관한 연구)

  • Na, Kwang-Tae;Ryoo, Boong-Yeol;Kang, Byeung-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.2 no.3
    • /
    • pp.147-154
    • /
    • 2002
  • The Korean government makes an effort to raise the competitive power of nation through CM activation in the construction industry. Since the first CM service was applied to the atomic power plant project in 1986, the number of CM contracts are continuously being increased and will be up to 20% by 2002 in public sector. However, the public projects had been executed without any procedure manual or standard guideline of CM services. Meanwhile the Ministry of Construction and Transportation issued $\ulcorner$CM Service Guide$\lrcorner$, but the guide shows an indefinite description in the responsibility, authority and scope of activity for the project participants. Therefore, it is required the procedures be improved and scope of activities be established for the project participants. This study was generated from the comparative analysis of $\ulcorner$Standard CM Services and Practice$\lrcorner$ Published by CMAA and domestic $\ulcorner$CM Service Guide$\lrcorner$ and the case of Incheon International Airport construction. The purpose of this study is to provide the fundamental data for an improvement in the procedures of project execution and the construction manager's activities/rolls shown on $\ulcorner$CM Service Guide$\lrcorner$

Mixed combustion expert system for General Manager at Thermal Power Plant (저열량탄 혼소 전문가시스템 구현 방안)

  • Kim, Hae-Soon;Kim, Sun-Ic;Joo, Yong-Jae;Kim, Ji-Hyun;Kim, Tae-Hyung
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1374-1375
    • /
    • 2011
  • Mixed combustion expert system is implemented to prevent various problems in combustion process by increasing rate of mixing low calorific value coal to reduce costs. This system shows optimal coal mixture rate by interfacing CBS(Coal Blending Screener, Implementing slagging and fouling factors by coal characteristic and algorithm), SGE(Stream Generate Expert, Combustion process model) and CFS(Configured Fireside Simulator, Computational fluid dynamics).

  • PDF

Neuro-Fuzzy Algorithm for Nuclear Reactor Power Control : Part I

  • Chio, Jung-In;Hah, Yung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.5 no.3
    • /
    • pp.52-63
    • /
    • 1995
  • A neuro-fuzzy algorithm is presented for nuclear reactor power control in a pressurized water reactor. Automatic reacotr power control is complicated by the use of control rods because of highly nonlinear dynamics in the axial power shape. Thus, manual shaped controls are usually employed even for the limited capability during the power maneuvers. In an attempt to achieve automatic shape control, a neuro-fuzzy approach is considered because fuzzy algorithms are good at various aspects of operator's knowledge representation while neural networks are efficinet structures capable of learning from experience and adaptation to a changing nuclear core state. In the proposed neuro-fuzzy control scheme, the rule base is formulated based ona multi-input multi-output system and the dynamic back-propagation is used for learning. The neuro-fuzzy powere control algorithm has been tested using simulation fesponses of a Korean standard pressurized water reactor. The results illustrate that the proposed control algorithm would be a parctical strategy for automatic nuclear reactor power control.

  • PDF

Design of Intrustion Prevention System(IPS) in Linux Environment (리눅스 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing Power. while in Previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, Political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Design of Intrusion Prevention System(IPS) in Linux Environment (Linux 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-26
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing power. while in previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately. That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF