• Title/Summary/Keyword: computing model

Search Result 3,349, Processing Time 0.025 seconds

Primary Solution Evaluations for Interpreting Electromagnetic Data (전자탐사 자료 해석을 위한 1차장 계산)

  • Kim, Hee-Joon;Choi, Ji-Hyang;Han, Nu-Ree;Song, Yoon-Ho;Lee, Ki-Ha
    • Geophysics and Geophysical Exploration
    • /
    • v.12 no.4
    • /
    • pp.361-366
    • /
    • 2009
  • Layered-earth Green's functions in electormagnetic (EM) surveys play a key role in modeling the response of exploration targets. They are computed through the Hankel transforms of analytic kernels. Computational precision depends upon the choice of algebraically equivalent forms by which these kemels are expressed. Since three-dimensional (3D) modeling can require a huge number of Green's function evaluations, total computational time can be influenced by computational time for the Hankel transform evaluations. Linear digital filters have proven to be a fast and accurate method of computing these Hankel transforms. In EM modeling for 3D inversion, electric fields are generally evaluated by the secondary field formulation to avoid the singularity problem. In this study, three components of electric fields for five different sources on the surface of homogeneous half-space were derived as primary field solutions. Moreover, reflection coefficients in TE and TM modes were produced to calculate EM responses accurately for a two-layered model having a sea layer. Accurate primary fields should substantially improve accuracy and decrease computation times for Green's function-based problems like MT problems and marine EM surveys.

A Study of e-Textbook Format Standardization Scheme for Smart Education Circumstance (스마트 교육환경을 위한 e-교과서 포맷 표준화 방안 연구)

  • Sohn, Won-Sung;Lim, Soon-Bum;Kim, Jae-Kyung
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.3
    • /
    • pp.327-336
    • /
    • 2012
  • The Korea government has recently announced "A Master Plan for Smart Education", including application of digital textbooks and composition of education system using cloud computing. Our education system in future circumstance, over the conventional e-learning methods, needs the smart education solutions which enable students to study and communicate on various types of devices. The ongoing government project related with the digital textbook has been performed as mid- and long-term goals, whereas PDF-based e-textbook project, similar to e-book model and, has been already completed for the short-term goal. For the purpose of improved future smart education circumstance, however, a specific strategy is required in the following areas: flexibility of format conversion and independency of original text sources among the multiple device platforms. Therefore, in this paper, we propose a standardization scheme for e-textbook format based on e-book structure. To do this, we survey trends in e-book technologies, and research on standardization of e-book format for digitalization of textbooks, based on the analysis of existing textbooks. Moreover, we produce an example e-book content using our proposed standard method. As a result, our approach can be applied to the future smart education circumstance, and we may say that it will be efficiently applicable to the long-term digital textbook project.

  • PDF

Flexible Intelligent Exit Sign Management of Cloud-Connected Buildings

  • Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Cho, Juphil;Cha, Jaesang
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.58-63
    • /
    • 2017
  • Emergencies and disasters can happen any time without any warning, and things can change and escalate very quickly, and often it is swift and decisive actions that make all the difference. It is a responsibility of the building facility management to ensure that a proven evacuation plan in place to cover various worst scenario to handled automatically inside the facility. To mapping out optimal safe escape routes is a straightforward undertaking, but does not necessarily guarantee residents the highest level of protection. The emergency evacuation navigation approach is a state-of-the-art that designed to evacuate human livings during an emergencies based on real-time decisions using live sensory data with pre-defined optimum path finding algorithm. The poor decision on causalities and guidance may apparently end the evacuation process and cannot then be remedied. This paper propose a cloud connected emergency evacuation system model to react dynamically to changes in the environment in emergency for safest emergency evacuation using IoT based emergency exit sign system. In the previous researches shows that the performance of optimal routing algorithms for evacuation purposes are more sensitive to the initial distribution of evacuees, the occupancy levels, and the type and level of emergency situations. The heuristic-based evacuees routing algorithms have a problem with the choice of certain parameters which causes evacuation process in real-time. Therefore, this paper proposes an evacuee routing algorithm that optimizes evacuation by making using high computational power of cloud servers. The proposed algorithm is evaluated via a cloud-based simulator with different "simulated casualties" are then re-routed using a Dijkstra's algorithm to obtain new safe emergency evacuation paths against guiding evacuees with a predetermined routing algorithm for them to emergency exits. The performance of proposed approach can be iterated as long as corrective action is still possible and give safe evacuation paths and dynamically configure the emergency exit signs to react for real-time instantaneous safe evacuation guidance.

5G Mobile Communications: 4th Industrial Aorta (5G 이동통신: 4차 산업 대동맥)

  • Kim, Jeong Su;Lee, Moon Ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.337-351
    • /
    • 2018
  • This paper discusses 5G IOT, Augmented Reality, Cloud Computing, Big Data, Future Autonomous Driving Vehicle technology, and presents 5G utilization of Pyeongchang Winter Olympic Games and Jeju Smart City model. The reason is that 5G is the main artery of the 4th industry.5G is the fourth industrial aorta because 5G is the core infrastructure of the fourth industrial revolution. In order for the AI, autonomous vehicle, VR / AR, and Internet (IoT) era to take off, data must be transmitted several times faster and more securely than before. For example, if you send a stop signal to LTE, which is a communication technology, to a remote autonomous vehicle, it takes a hundredth of a second. It seems to be fairly fast, but if you run at 100km / h, you can not guarantee safety because the car moves 30cm until it stops. 5G is more than 20 gigabits per second (Gbps), about 40 times faster than current LTE. Theoretically, the vehicle can be set up within 1 cm. 5G not only connects 1 million Internet (IoT) devices within a radius of 1 kilometer, but also has a speed delay of less than 0.001 sec. Steve Mollenkov, chief executive officer of Qualcomm, the world's largest maker of smartphones, said, "5G is a key element and innovative technology that will connect the future." With 5G commercialization, there will be an economic effect of 12 trillion dollars in 2035 and 22 million new jobs We can expect to see the effect of creation.

Implementation of A Multiple-agent System for Conference Calling (회의 소집을 위한 다중 에이전트 시스템의 구현)

  • 유재홍;노승진;성미영
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.2
    • /
    • pp.205-227
    • /
    • 2002
  • Our study is focused on a multiple-agent system to provide efficient collaborative work by automating the conference calling process with the help of intelligent agents. Automating the meeting scheduling requires a careful consideration of the individual official schedule as well as the privacy and personal preferences. Therefore, the automation of conference calling needs the distributed processing task where a separate calendar management process is associated for increasing the reliability and inherent parallelism. This paper describes in detail the design and implementation issues of a multiple-agent system for conference calling that allows the convener and participants to minimize their efforts in creating a meeting. Our system is based on the client-sewer model. In the sewer side, a scheduling agent, a negotiating agent, a personal information managing agent, a group information managing agent, a session managing agent, and a coordinating agent are operating. In the client side, an interface agent, a media agent, and a collaborating agent are operating. Agents use a standardized knowledge manipulation language to communicate amongst themselves. Communicating through a standardized knowledge manipulation language allows the system to overcome heterogeneity which is one of the most important problems in communication among agents for distributed collaborative computing. The agents of our system propose the dates on which as many participants as possible are available to attend the conference using the forward chaining algorithm and the back propagation network algorithm.

  • PDF

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

A Time Slot Assignment Scheme for Sensor Data Compression (센서 데이터의 압축을 위한 시간 슬롯 할당 기법)

  • Yeo, Myung-Ho;Kim, Hak-Sin;Park, Hyoung-Soon;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.846-850
    • /
    • 2009
  • Recently, wireless sensor networks have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics such as environmental monitoring, smart spaces, medical applications, and precision agriculture. The sensor nodes are battery powered. Therefore, the energy is the most precious resource of a wireless sensor network since periodically replacing the battery of the nodes in large scale deployments is infeasible. Energy efficient mechanisms for gathering sensor readings are indispensable to prolong the lifetime of a sensor network as long as possible. There are two energy-efficient approaches to prolong the network lifetime in sensor networks. One is the compression scheme to reduce the size of sensor readings. When the communication conflict is occurred between two sensor nodes, the sender must try to retransmit its reading. The other is the MAC protocol to prevent the communication conflict. In this paper, we propose a novel approaches to reduce the size of the sensor readings in the MAC layer. The proposed scheme compresses sensor readings by allocating the time slots of the TDMA schedule to them dynamically. We also present a mathematical model to predict latency from collecting the sensor readings as the compression ratio is changed. In the simulation result, our proposed scheme reduces the communication cost by about 52% over the existing scheme.

Protein Interaction Possibility Ranking Method based on Domain Combination (도메인 조합 기반 단백질 상호작용 가능성 순위 부여 기법)

  • Han Dong-Soo;Kim Hong-Song;Jong Woo-Hyuk;Lee Sung-Doke
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.427-435
    • /
    • 2005
  • With the accumulation of protein and its related data on the Internet, many domain based computational techniques to predict protein interactions have been developed. However, most of the techniques still have many limitations to be used in real fields. They usually suffer from a low accuracy problem in prediction and do not provide any interaction possibility ranking method for multiple protein pairs. In this paper, we reevaluate a domain combination based protein interaction prediction method and develop an interaction possibility ranking method for multiple protein pairs. Probability equations are devised and proposed in the framework of domain combination based protein interaction prediction method. Using the ranking method, one can discern which protein pair is more probable to interact with each other than other protein pairs in multiple protein pairs. In the validation of the ranking method, we revealed that there exist some correlations between the interacting probability and the precision of the prediction in case of the protein pair group having the matching PIP(Primary Interaction Probability) values in the interacting or non interacting PIP distributions.

XML Fragmentation for Resource-Efficient Query Processing over XML Fragment Stream (자원 효율적인 XML 조각 스트림 질의 처리를 위한 XML 분할)

  • Kim, Jin;Kang, Hyun-Chul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.27-42
    • /
    • 2009
  • In realizing ubiquitous computing, techniques of efficiently using the limited resource at client such as mobile devices are required. With a mobile device with limited amount of memory, the techniques of XML stream query processing should be employed to process queries over a large volume of XML data. Recently, several techniques were proposed which fragment XML documents into XML fragments and stream them for query processing at client. During query processing, there could be great difference in resource usage (query processing time and memory usage) depending on how the source XML documents are fragmented. As such, an efficient fragmentation technique is needed. In this paper, we propose an XML fragmentation technique whereby resource efficiency in query processing at client could be enhanced. For this, we first present a cost model of query processing over XML fragment stream. Then, we propose an algorithm for resource-efficient XML fragmentation. Through implementation and experiments, we showed that our fragmentation technique outperformed previous techniques both in processing time and memory usage. The contribution of this paper is to have made the techniques of query processing over XML fragment stream more feasible for practical use.

Design and Implementation of a Subscriber Interface Management System in ATM Network (ATM망을 위한 가입자 인터페이스 관리 시스템의 설계 및 구현)

  • Lee, Byeong-Gi;Jo, Guk-Hyeon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.6
    • /
    • pp.782-792
    • /
    • 1999
  • 효과적인 ATM 망의 관리는 연결 지향 환경, 다양한 서비스 등급, 대규모 트래픽, 가상 망 구성 그리고 여러가지 트래픽 유형 등과 같은 다양한 ATM 특성을 다룰 수 있어야만 한다. 이를 위해 ATM 포럼에서는 ATM 장치, 사설망, 공중망 및 그들간의 상호작용을 지원하기 위한 ATM 망 관리 참조 모델을 정의하였으며, 그 중 하나가 서로 다른 판매자로부터의 ATM 장비들간의 상호동작성을 보장하기 위해 SNMP 기반 망 관리 프로토콜을 통해 상호 연결된 인터페이스를 관리할 수 있도록 정의된 통합 지역 관리 인터페이스(ILMI) 프로토콜이다. ILMI의 목적은 두 인접한 ATM 장치로 하여금 그들 간에 공통의 ATM 링크에 대한 동작 파라메타를 자동적으로 구성할 수 있도록 함으로서, 관리자에 의해 수동 구성이 아닌 ATM 장치 상호간의 플러그 앤 플러그 기능을 지원하는데 있다. 본 논문에서는 이러한 ILMI 기술을 바탕으로 공중망 ATM 교환기에 연결된 가입자의 물리 인터페이스, ATM 계층 인터페이스, VPC 및 VCC의 구성 및 상태 정보를 효율적으로 관리하며, 가입자 시스템의 ATM 주소를 자동으로 등록, 관리할 수 있도록 하는 가입자 인터페이스 관리 시스템(SIMS)을 설계하고, 구현하였다. Abstract An effective ATM management must address the various features of ATM such as connection-oriented environment, varying class of service, large scale traffic, virtual network configurations and, and multiple traffic types. For this, ATM network management reference model defined by ATM Forum describes the various types of network management needed to support ATM devices, private networks, public networks, and the interaction between them. One of these types is Integrated Local Management Interface (ILMI) defined to manage interconnected interface through SNMP-based network management protocol for ensuring the interoperability of ATM devices from different vendors. The purpose of ILMI is to enable two adjacent ATM devices to automatically configure the operation parameters of the common ATM link between them and then to provide a Plug and Plug function to any ATM devices with not a passive configuration by manager but a automatic configuration. This paper design and implement a Subscriber Interface Management System (SIMS) which provide automatic registration and management of ATM address of subscriber system and efficiently manages physical interface of subscriber who is connected to public ATM switch, ATM layer interface, configuration information and status information of VPC and VCC.