• Title/Summary/Keyword: Problem Space

Search Result 3,980, Processing Time 0.035 seconds

CHARMS: A Mapping Heuristic to Explore an Optimal Partitioning in HW/SW Co-Design (CHARMS: 하드웨어-소프트웨어 통합설계의 최적 분할 탐색을 위한 매핑 휴리스틱)

  • Adeluyi, Olufemi;Lee, Jeong-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.1-8
    • /
    • 2010
  • The key challenge in HW/SW co-design is how to choose the appropriate HW/SW partitioning from the vast array of possible options in the mapping set. In this paper we present a unique and efficient approach for addressing this problem known as Customized Heuristic Algorithm for Reducing Mapping Sets(CHARMS). CHARMS uses sensitivity to individual task computational complexity as well the computed weighted values of system performance influencing metrics to streamline the mapping sets and extract the most optimal cases. Using H.263 encoder, we show that CHARMS sieves out 95.17% of the sub-optimal mapping sets, leaving the designer with 4.83% of the best cases to select from for run-time implementation.

An Efficient Management Model of Security Policy in the Unified Threat Management System (통합 보안 시스템에서의 효율적인 보안 정책 관리 모델)

  • Joo, Heon-Sik;Kim, Jong-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.99-107
    • /
    • 2010
  • This paper showed that the integrated system to fortify security was much more efficient than the respective system through the analysis of problems from Firewall and IPS system in the existing security systems. The results of problem analysis revealed that there were the delay of processing time and lack of efficiency in the existing security systems. Accordingly, their performance was evaluated by using the separated Firewall, IPS system, and the integrated system. The result of evaluation shows that the integrated security system this paper suggested is five times faster than the existing one in terms of processing speed of response. This paper demonstrated the excellence of the proposed security system is also more than fivefold in session handling per second and six times process speeding in the CPU processing performance. In addition, several security policies are applied, and it provided a fact that it gave an excellent performance when it comes to protecting from harmful traffic attacks. In conclusion, this paper emphasized that fortifying the integrated security system was more efficient than fortifying the existing one considering in various respects such as cost, management, time, space and so on.

Relationship with Visualization and Immersion in Virtual Reality Games (가상현실 게임에서의 시각화와 몰입도의 상관관계)

  • Choi, Min Soo;Park, Jun
    • Journal of the Korean Society for Computer Game
    • /
    • v.31 no.4
    • /
    • pp.121-128
    • /
    • 2018
  • Virtual reality is a technology that enables users to implement environments that are separate from the real world, and immersion is an important factor in implementing separate environments. However, a variety of studies have been conducted to solve this problem as the lack of awareness of the surrounding environment can lead to an unstable virtual reality game environment. Most studies are focused on solving problems through visualization. On the other hand, because visualizations are generally information that is not relevant to the space of virtual reality, research is needed on the effect of the degree of immersion in virtual reality to which they are applied. The guidelines are necessary because there are differences in individual tendencies and the factors that influence the immersion. In order to solve these two problems, we are going to conduct experiments on two systems: a survey based on the immersion tendency and a visualized communication of information about the surrounding environment. Through these results, we will measure the immersion of individuals and identify the impact of visualizations on virtual reality games by dividing them by their propensity to do so to present guidelines on the creation of virtual reality game environments based on the individual's tendency to engage in immersion.

A Study on the Method and Application of Shaft Repair using Directed Energy Deposition Process (직접식 에너지 용착 공정을 활용한 축 보수 방법 및 활용 사례 연구)

  • Lee, Yoon Sun;Lee, Min Kyu;Sung, Ji Hyun;Hong, Myeong Pyo;Son, Yong;An, Seouk;Jeong, Oe Cheol;Lee, Ho Jin
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.20 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • Recently, the repair and recycling of damaged mechanical parts via metal additive manufacturing processes have been industrial points of interest. This is because the repair and recycling of damaged mechanical parts can reduce energy and resource consumption. The directed energy deposition(DED) process has various advantages such as the possibility of selective deposition, large building space, and a small heat-affected zone. Hence, it is a suitable process for repairing damaged mechanical parts. The shaft is a core component of various mechanical systems. Although there is a high demand for the repair of the shaft, it is difficult to repair with traditional welding processes because of the thermal deformation problem. The objective of this study is to propose a repair procedure for a damaged shaft using the DED process and discuss its applications. Three types of cases, including a small shaft with a damaged surface, a medium-size shaft with a worn bearing joint, and a large shaft with serious damage, were repaired using the proposed procedure. The microstructure and hardness were examined to discuss the characteristics of the repaired component. The efficiency of the repair of the damaged shaft is also discussed.

Dispatching Rule based Job-Shop Scheduling Algorithm with Delay Schedule for Minimizing Total Tardiness (지연 스케쥴을 허용하는 납기최소화 잡샵 스케쥴링 알고리즘)

  • Kim, Jae-Gon;Bang, June-Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.1
    • /
    • pp.33-40
    • /
    • 2019
  • This study focuses on a job-shop scheduling problem with the objective of minimizing total tardiness for the job orders that have different due dates and different process flows. We suggest the dispatching rule based scheduling algorithm to generate fast and efficient schedule. First, we show the delay schedule can be optimal for total tardiness measure in some cases. Based on this observation, we expand search space for selecting the job operation to explore the delay schedules. That means, not only all job operations waiting for process but also job operations not arrived at the machine yet are considered to be scheduled when a machine is available and it is need decision for the next operation to be processed. Assuming each job operation is assigned to the available machine, the expected total tardiness is estimated, and the job operation with the minimum expected total tardiness is selected to be processed in the machine. If this job is being processed in the other machine, then machine should wait until the job arrives at the machine. Simulation experiments are carried out to test the suggested algorithm and compare with the results of other well-known dispatching rules such as EDD, ATC and COVERT, etc. Results show that the proposed algorithm, MET, works better in terms of total tardiness of orders than existing rules without increasing the number of tardy jobs.

High-speed visible light communication system using space division processing (공간 분할 처리를 이용한 고속 가시광통신 시스템)

  • Park, Jun Hyung;Lee, Kyu Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.237-242
    • /
    • 2018
  • There are various 'wireless communication technologies' around us. Wireless mobile communication has evolved through various stages, and its utilization is also diverse. However, due to the development of wireless communication technology, the demand for frequency resources is much higher than the supply, so frequency shortage is serious. Recently, 'visible light communication' has been attracting attention as an emerging communication technology that can solve the frequency shortage. 'Visible light communication' is a communication method based on serial data transmission / reception, and there is a difficulty in transmitting / receiving parallel data because the transmitter and the receiver are arbitrarily present. In this paper, we have studied parallel data processing of visible light communication. We could solve the problem by analyzing parallel data using image processing. Through this study, communication performance can be verified through I / O data comparison by implementing parallel data analysis method. It is expected that diversity in parallel data analysis will be presented through the results.

A Genetic Algorithm Based Learning Path Optimization for Music Education (유전 알고리즘 기반의 음악 교육 학습 경로 최적화)

  • Jung, Woosung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.13-20
    • /
    • 2019
  • For customized education, it is essential to search the learning path for the learner. The genetic algorithm makes it possible to find optimal solutions within a practical time when they are difficult to be obtained with deterministic approaches because of the problem's very large search space. In this research, based on genetic algorithm, the learning paths to learn 200 chords in 27 music sheets were optimized to maximize the learning effect by balancing and minimizing learner's burden and learning size for each step in the learning paths. Although the permutation size of the possible learning path for 27 learning contents is more than $10^{28}$, the optimal solution could be obtained within 20 minutes in average by an implemented tool in this research. Experimental results showed that genetic algorithm can be effectively used to design complex learning path for customized education with various purposes. The proposed method is expected to be applied in other educational domains as well.

A Study on the Near-Field Simulation Method for AESA RADAR using a Single Beam-Focusing LUT (단일 빔 집속 LUT를 이용한 AESA 레이다의 근전계 시뮬레이션 기법)

  • Ju, Hye Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.81-88
    • /
    • 2019
  • Since the AESA radar scans and tracks a distant targets or ground, it requires a test field which meets far-field condition before flight test. In order to test beam foaming, targeting, and availability from cluttering and jamming, it is general to build a outdoor roof-lab test site at tens of meters high. However, the site is affected by surrounding terrain, weather, and noise wave and is also requires time, space, and a lot of costs. In order to solve this problem, theoretical near-field beam foaming method has proposed. However, it requires modification of associated hardware in order to construct near-field test configuration. In this paper, we propose near-field beam foaming method which use single LUT in order to calibrate the variation of TRM(transmit-receive module) which consists AESA radar without modification of associated hardware and software. It requires less costs than far-field test and multiple LUT based near-field test, nevertheless it can derives similar experimental results.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

A Study on the Self-contained Earth Retaining Wall Method Using Bracing (브레이싱을 이용한 자립식 흙막이 공법에 관한 연구)

  • Kim, Jong-Gil
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.205-213
    • /
    • 2019
  • In a construction site, excavation work has a close relation with temporary earth retaining structure. In order to build the underground structure most effectively in a narrow space, prevent soil relaxation of the external behind ground in excavation work, and maintain a ground water level, it is required to install a temporary earth retaining structure that secures safety. To prevent soil washoff in underground excavation work, the conventional method of temporary earth retaining structure is to make a temporary wall and build the internal support with the use of earth anchor, raker, and struct for excavation work. RSB method that improves the problem of the conventional method is to remove the internal support, make use of two-row soldier piles and bracing, and thereby to resist earth pressure independently for underground excavation. This study revealed that through the field application cases of RSB method and the measurement result, the applicability of the method for installing a temporary earth retaining structure, the assessment result, and displacement all met allowable values of measurement, and that the RSB method, compared to the conventional method, improved constructability and economy.