• Title/Summary/Keyword: Processing procedure

Search Result 1,214, Processing Time 0.031 seconds

Implementation of Kalman Filter as a Remote Procedure Call Webservice (원격 프로시저 호출 웹서비스로 칼만필터 구현)

  • Yim, Jaegeol;Du, Vu Quang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1365-1368
    • /
    • 2011
  • The Kalman Filter is one of the most common techniques of tracking mobile user. Web service is a promising method of reusing programs. Therefore, this paper presents our implementation of Kalman Filter web service. There are three ways of implementing a web service system. Ours is Kalman filter as RPC web service.

Development of the 'Three-stage' Bayesian procedure and a reliability data processing code (3단계 베이지안 처리절차 및 신뢰도 자료 처리 코드 개발)

  • 임태진
    • Korean Management Science Review
    • /
    • v.11 no.2
    • /
    • pp.1-27
    • /
    • 1994
  • A reliability data processing MPRDP (Multi-Purpose Reliability Data Processor) has been developed in FORTRAN language since Jan. 1992 at KAERI (Korean Atomic Energy Research Institute). The purpose of the research is to construct a reliability database(plant-specific as well as generic) by processing various kinds of reliability data in most objective and systematic fashion. To account for generic estimates in various compendia as well as generic plants' operating experience, we developed a 'three-stage' Bayesian procedure[1] by logically combining the 'two-stage' procedure[2] and the idea for processing generic estimates[3]. The first stage manipulates generic plant data to determine a set of estimates for generic parameters,e.g. the mean and the error factor, which accordingly defines a generic failure rate distribution. Then the second stage combines these estimates with the other ones proposed by various generic compendia (we call these generic book type data). This stage adopts another Bayesian procedure to determine the final generic failure rate distribution which is to be used as a priori distribution in the third stage. Then the third stage updates the generic distribution by plant-specific data resulting in a posterior failure rate distribution. Both running failure and demand failure data can be handled in this code. In accordance with the growing needs for a consistent and well-structured reliability database, we constructed a generic reliability database by the MPRDP code[4]. About 30 generic data sources were reviewed and available data were collected and screened from them. We processed reliability data for about 100 safety related components frequently modeled in PSA. The underlying distribution for the failure rate was assumed to be lognormal or gamma, according to the PSA convention. The dependencies among the generic sources were not considered at this time. This problem will be approached in further study.

  • PDF

Design and Implementation of MAC Protocol for Wireless LAN (무선 LAN MAC 계층 설계 및 구현)

  • 김용권;기장근;조현묵
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.253-256
    • /
    • 2001
  • This paper describes a high speed MAC(Media Access Control) function chip for IEEE 802.11 MAC layer protocol. The MAC chip has control registers and interrupt scheme for interface with CPU and deals with transmission/reception of data as a unit of frame. The developed MAC chip is composed of protocol control block, transmission block, and reception block which supports the BCF function in IEEE 802.11 specification. The test suite which is adopted in order to verify operation of the MAC chip includes various functions, such as RTS-CTS frame exchange procedure, correct IFS(Inter Frame Space)timing, access procedure, random backoff procedure, retransmission procedure, fragmented frame transmission/reception procedure, duplicate reception frame detection, NAV(Network Allocation Vector), reception error processing, broadcast frame transmission/reception procedure, beacon frame transmission/reception procedure, and transmission/reception FIEO operation. By using this technique, it is possible to reduce the load of CPU and firmware size in high speed wireless LAN system.

  • PDF

Real-time system control for the 6-DOF simulation (6-DOF 시뮬레이터의 real-time 시스템 제어에 관한 연구)

  • 김영대;김충영;백인철;민성기
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.17-21
    • /
    • 1989
  • 6-DOE simulator system is designed to real-time processing for motion control, data acquisition, image generation and image processing etc.. In this paper, we introduce hardware and software design technologies for distributed processing, event-trapping, system monitoring and time scheduling procedure in 6-DOF simulator system design.

  • PDF

Quality Characteristics of Brown Rice Flakes Subjected to Various Flaking and Toasting Method (제조조건에 따른 압착형 현미 Flake의 품질특성)

  • 이연리;최영희;강미영
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.11 no.2
    • /
    • pp.131-139
    • /
    • 2001
  • The physicochemical and sensory characteristics of brown rice flakes by different processing conditions such as flaking Process and their heat treatments were investigated to establish the brown rice flake processing procedure. To successfully make the compressed rice grain type flakes, the most appropriate water steeping conditions were 5 hours at 60'C. The brown rice flakes by compressed flaking procedure and heat treatment with microwave toasting showed the best crispiness-texture that tested from textrometer or sensory evaluation, and there was no significant difference between the source of rice varieties. The water absorption index(WAI) of tested flakes were negatively correlated with the water soluble index( WSI) and positively correlated with bowl life. The flakes made by compressed flaking procedure and heat treatment with microwave toasting showed longer bowl life, which is the length of the time that the cereal can retain its crispness after being soaked in milk.

  • PDF

Design and Performance Evaluation of a RPC Algorithm using Queue (큐를 이용한 RPC 알고리즘 설계와 성능 평가)

  • Yun, Dong-Sik;Lee, Byeong-Gwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.3
    • /
    • pp.523-534
    • /
    • 1996
  • This paper presents the design technique and the performance evaluation of RPC(remote procedure call) algorithm using queue on the micro computer, works tationand PC's underUNIX SystemV, The existingRPC algorithmis aftercalling remote Procedure, it must has be returned in order torun next instructions. But if it is not done so, it must wait indefinitely. To solve this problem, a message transfer method which used queue is adopted. And the improved RPC algorithm that can process in sequence is designed and implemented.

  • PDF

Cyberattack Tracing System Operational Architecture (사이버공격 추적시스템 운용아키텍처)

  • Ahn, Jae-hong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.2
    • /
    • pp.179-187
    • /
    • 2023
  • APT cyber attacks have been a problem for over a past decade, but still remain a challenge today as attackers use more sophisticated techniques and the number of objects to be protected increases. 'Cyberattack Tracing System' allows analysts to find undetected attack codes that penetrated and hid in enterprises, and to investigate their lateral movement propagation activities. The enterprise is characterized by multiple networks and mass hosts (PCs/servers). This paper presents a data processing procedure that collects event data, generates a temporally and spatially extended provenance graph and cyberattack tracing paths. In each data process procedure phases, system design considerations are suggested. With reflecting the data processing procedure and the characteristics of enterprise environment, an operational architecture for CyberAttack Tracing System is presented. The operational architecture will be lead to the detailed design of the system.

A Study on the Security Structure and Authenitication Procedure in ATM (ATM 망에서의 정보보호 구조 및 인증절차에 관한 연구)

  • Sin, Hyo-Yeong;Yu, Hwang-Bin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.107-114
    • /
    • 1999
  • Recently as services in ATM are diversified, the need for security has been increased, But when we added the security features in ATM, the Compatibility and transparency with existing systems must be considered after analyzing threats of security. This paper designs the security protocol in ATM protocol stack and defines the primitivies and processing procedure of messages which are need in the security layer. Also, this paper presents the authentication and key distribution procedure which can be adopted at call establishment. The presented authentication protocol can be used for point-to-point method as well as point-to-multipoint method. and the correctness of this protocol is verified using GNY logic.

  • PDF

An Exponentialization Procedure for General FMS Network of Queues with Limited Buffer

  • Lee, Ho-Chang
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.19 no.3
    • /
    • pp.203-217
    • /
    • 1994
  • In this paper we develop an exponentialization procedure for the modelling of open FMS networks with general processing time at each station and limited buffer size. By imposing a reasonable assumption on the solution set, the nonlinear equation system for the exponentialization procedure is formulated as a variational inequality problem and the solution existence is examined. The efficient algorithm for the nonlinear equation system is developed using linearized Jacobi approximation method.

  • PDF

Recognition of Zip-Code using Neural Network (신경 회로망을 이용한 우편번호 인식)

  • 이래경;김성신
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.365-365
    • /
    • 2000
  • In this paper, we describe the system to recognize the six digit postal number of mails using neural network. Our zip-code recognition system consists of a preprocessing procedure for the original captured image, a segmentation procedure for separating an address block area with a shape, and recognition procedure for the cognition of a postal number. we extract the feature vectors that are the input of a neural network for the recognition process based on an area optimizing and an image thinning processing. The neural network classifies the zip-code in the mail and the recognized zip-code is verified through the zip-code database.

  • PDF