• Title/Summary/Keyword: Software Architecture Design

Search Result 822, Processing Time 0.027 seconds

Hardware Implementation of Genetic Algorithm and Its Analysis (유전알고리즘의 하드웨어 구현 및 실험과 분석)

  • Dong, Sung-Soo;Lee, Chong-Ho
    • 전자공학회논문지 IE
    • /
    • v.46 no.2
    • /
    • pp.7-10
    • /
    • 2009
  • This paper presents the implementation of libraries of hardware modules for genetic algorithm using VHDL. Evolvable hardware refers to hardware that can change its architecture and behavior dynamically and autonomously by interacting with its environment. So, it is especially suited to applications where no hardware specifications can be given in advance. Evolvable hardware is based on the idea of combining reconfigurable hardware device with evolutionary computation, such as genetic algorithm. Because of parallel, no function call overhead and pipelining, a hardware genetic algorithm give speedup over a software genetic algorithm. This paper suggests the hardware genetic algorithm for evolvable embedded system chip. That includes simulation results and analysis for several fitness functions. It can be seen that our design works well for the three examples.

LabVIEW-based Remote Laboratory Experiments for a Multi-mode Single-leg Converter

  • Bayhan, Sertac
    • Journal of Power Electronics
    • /
    • v.14 no.5
    • /
    • pp.1069-1078
    • /
    • 2014
  • This study presents the design and implementation of a web-based remote laboratory for a multi-mode single-leg power converter, which is a topic in advanced power electronics course. The proposed laboratory includes an experimental test rig with a multi-mode single-leg power converter and its driver circuits, a measurement board, a control platform, and a LabVIEW-based user interface program that is operated in the server computer. Given that the proposed web-based remote laboratory is based on client/server architecture, the experimental test rig can be controlled by a client computer with Internet connection and a standard web browser. Although the multi-mode single-leg power converter can work at four different modes (main boost, buck-boost, boost-boost, and battery boost modes), only the buck-boost mode is used in the experiment because of page limit. Users can choose the control structure, control parameters, and reference values, as well as obtain graphical results from the user interface software. Consequently, the feedbacks received from students who conducted remote laboratory studies indicate that the proposed laboratory is a useful tool for both remote and traditional education.

The Safety Assessment of Small WIG Craft in the 20-Passenger Class (20인승급 소형 위그선의 안전성 평가)

  • Lee, Soon-Sup;Lee, Jong-Kap
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.2
    • /
    • pp.179-188
    • /
    • 2009
  • WIG crafts are a high speed vessel with features of dynamic supported craft. These crafts, which are predominantly of light weight and operate any substantially greater speeds than conventional craft such as bulk carrier, tanker, container ship, etc., could not be accommodated under traditional maritime safety instruments. It means that there is the need for risk and safety levels to be assessed on a holistic basis, recognizing that high levels of operator training, comprehensive and thoroughly implemented procedures, high levels of automation and sophisticated software can all make significant contributions to risk reduction. To response this requirement, the Interim Guideline for WIG craft(MSC/Circ.1054) were developed in the view of the configuration of WIG craft, which fall between the maritime and aviation regulatory regimes. This paper reviews a safety assessment process and methodology to be used in the design phase of a new ship. The process and methodology is based on the risk-based approach and is applied to safety assessment in concept development phase of small WIG craft in the 20-person class.

A study of the kinematic characteristic of a coupling device between the buffer system and the flexible pipe of a deep-seabed mining system

  • Oh, Jae-Won;Lee, Chang-Ho;Hong, Sup;Bae, Dae-Sung;Cho, Hui-Je;Kim, Hyung-Woo
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.6 no.3
    • /
    • pp.652-669
    • /
    • 2014
  • This paper concerns the kinematic characteristics of a coupling device in a deep-seabed mining system. This coupling device connects the buffer system and the flexible pipe. The motion of the buffer system, flexible pipe and mining robot are affected by the coupling device. So the coupling device should be considered as a major factor when this device is designed. Therefore, we find a stable kinematic device, and apply it to the design coupling device through this study. The kinematic characteristics of the coupling device are analyzed by multi-body dynamics simulation method, and finite element method. The dynamic analysis model was built in the commercial software DAFUL. The Fluid Structure Interaction (FSI) method is applied to build the deep-seabed environment. Hydrodynamic force and moment are applied in the dynamic model for the FSI method. The loads and deformation of flexible pipe are estimated for analysis results of the kinematic characteristics.

Implementation of Ray Tracing Processor for the Parallel Processing (병렬처리를 위한 고속 Ray Tracing 프로세서의 설계)

  • Choe, Gyu-Yeol;Jeong, Deok-Jin
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.5
    • /
    • pp.636-642
    • /
    • 1999
  • The synthesis of the 3D images is the most important part of the virtual reality. The ray tracing is the best method for reality in the 3D graphics. But the ray tracing requires long computation time for the synthesis of the 3D images. So, we implement the ray tracing with software and hardware. Specially we design the hit-test unit with FPGA tool for the ray tracing. Hit-test unit is a very important part of ray tracing to improve the speed. In this paper, we proposed a new hit-test algorithm and apply the parallel architecture for hit-test unit to improve the speed. We optimized the arithmetic unit because the critical path of hit-test unit is in the multiplication part. We used the booth algorithm and the baugh-wooley algorithm to reduce the partial product and adapted the CSA and CLA to improve the efficiency of the partial product addition. Our new Ray tracing processor can produce the image about 512ms/F and can be adapted to real-time application with only 10 parallel processors.

  • PDF

A Study on the Development of Framework Using Component Based Methodology (컴포넌트기반 방법론을 사용한 프레임워크 개발에 관한 연구)

  • Kim, Haeng-Gon;Han, Eun-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.842-851
    • /
    • 2000
  • Developers can reuse not only class code but also wide range of knowledge on domain by reusing framework. Existing Object-Oriented Methodology and Catalysis Methodology were presented when redefining component in the course of redesigning framework. However, existing methodologies have weakness that entire process is waterfall mode or design of interface lays too much stress on implementation stage. So, this thesis will present Component-Oriented Methodology for the reuse of framework, and construct the environment for framework and domain development. That is, domain is analyzed by input of domain knowledge on real world to create software based on component, and hotspot is identified through analyzed information, and refactoring by putting additional information on users and developers. After that, I will create domain framework and application framework depending on domain. In this Component-Oriented Methodology, information is searched, understood and extracted or composite through component library storage internally. Then this information is classified into the information on component, and used as additional information in redesigning. With this, developer can obtain reusability, easiness and portability by constructing infrastructure environment that allows to register, update and delete component through Component Management System(CMS) under he development environment which can be easily applied to his own application using framework component, in this thesis, CoRBA(Common Object Request Broker Architecture) environment.

  • PDF

Risk Management and Assessment Methodology in System Design (위험관리 프로세서와 평가의 새로운 접근)

  • 조희근;박영원
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.2
    • /
    • pp.197-208
    • /
    • 1999
  • Recently, risk management is a very important issue in many industrial applications. This paper describes a general structure for risk management and suggests a new risk assessment methodology. In risk management applications of financial or insurance industries, there are many methodologies developed for practical use. However, areas for improvement exist to facilitate the application of the methods. Two major risk assessment methodologies have been developed and widely applied in system engineering. One is in its original development application from aerospace and defense industry, and the other was developed in applied software engineering. In a large and complicated system development application, an effective risk management can reduce total development cost as well as uncertainty in achieving project goals of schedule and performance.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Design and Implementation of an Unified Cursor Considering Synchronization on the Android Mobile Platform (안드로이드 플랫폼 상에서 동기화가 고려된 통합 커서의 설계 및 구현)

  • Kim, Kyung-Hwan;Ha, Jo-Ho;Won, Jong-Pil;Lee, Uee-Song;Kim, Joo-Min;Son, Jin-Ho
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.3
    • /
    • pp.190-200
    • /
    • 2011
  • Android platform provides a content provider and a cursor mechanism to access the internal SQLite engine. Content providers not only store and retrieve data but also make it accessible to applications. Applications can only share data through content provider, since there's no common storage area that Android packages can access. Cursor is an interface that provides random read-write access to the result set returned by a database query. However, this cursor possesses two major limitations. First, a cursor does not support a join clause among cursors, since the cursor can only access a single table in the content provider. Second, the cursor is not capable of creating user-customized field in the predefined content providers. In this paper, we propose the unified cursor architecture that merges several cursors into a single virtual cursor. Cursor translation look-aside buffer (TLB), column windowing mechanism and virtual data management are the three major techniques we have adopted to implement our structure. And we also propose a delayed synchronization method between an application and a proposed unified cursor. An application can create a user-customized field and sort multiple tables using a unified cursor on Android platform.

An advanced technique to predict time-dependent corrosion damage of onshore, offshore, nearshore and ship structures: Part II = Application to the ship's ballast tank

  • Kim, Do Kyun;Lim, Hui Ling;Cho, Nak-Kyun
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.645-656
    • /
    • 2020
  • In this study (Part II), the empirical formulation of corrosion model of a ship's ballast tank was developed to predict nonlinear time-dependent corrosion wastage based on the advanced data processing technique proposed by Part I. The detail on how to propose generalised mathematical formulation of corrosion model was precisely documented in the previous paper (Part I). The statistical scatter of corrosion data at any exposure time was investigated by the refined method and formulated based on a 2-parameter Weibull distribution which selected the best fit PDF. Throughout the nine (9) steps, empirical formulation of the ship's seawater ballast tank was successfully proposed and four (4) key step results were also obtained. The proposed method in Part I was verified and confirmed by this application of seawater ballast tank, thus making it possible to predict accurate behaviours of nonlinear timedependent corrosion. Developed procedures and obtained corrosion damage model for ship's seawater ballast tank can be used for development of engineering software.