• 제목/요약/키워드: end-to-end approach.

검색결과 1,389건 처리시간 0.024초

후행 핵연료주기의 다자 방안 분석 (Multilateral Approaches to the Back-end of the Nuclear Fuel Cycle: Challenges and Possibilities)

  • 류호진
    • 방사성폐기물학회지
    • /
    • 제8권4호
    • /
    • pp.269-277
    • /
    • 2010
  • 원자력의 중흥기를 맞이하여 민감한 핵연료주기 기술의 무분별한 확장을 억제하고자 다양한 핵연료주기 다자 방안이 제시되고 있다. 현재 원자력 공급국 위주의 핵연료주기 다자화가 추진되고 있는 실정에서 후행 핵연료주기 기술의 다자화 추진 추이를 파악하고자 사용후핵연료 공동 관리 시설에 대한 분석 결과를 검토하였다. 또한 후행 핵연료주기 연구개발 시설의 다자화를 제안하고 기대효과와 문제점을 검토한 후 이를 실현하기 위한 추진방안을 도출하였다.

RIX-MAC: An Energy-Efficient Receiver-Initiated Wakeup MAC Protocol for WSNs

  • Park, Inhye;Lee, Hyungkeun;Kang, Seokjoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권5호
    • /
    • pp.1604-1617
    • /
    • 2014
  • This paper proposes RIX-MAC (Receiver-Initiated X-MAC), a new energy-efficient MAC protocol based on an asynchronous duty cycling. RIX-MAC improves energy efficiency through utilizing short preambles and adopting the receiver-initiated approach, where RIX-MAC minimizes sender nodes' energy consumption by enabling transmitters to predict receiver nodes' wake-up times. It also reduces receiver nodes' energy consumption by decreasing the number of control frames. We use the network simulator to evaluate RIX-MAC's performance. Compared to the prior asynchronous duty cycling approaches of X-MAC and PW-MAC, the proposed protocol shows a remarkable improvement in energy-efficiency and end-to-end delay.

RFID-based Secure Communication for Smart Device in Future Home Network Environment

  • Li, Nong-Jun;Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제5권1호
    • /
    • pp.18-22
    • /
    • 2013
  • We introduce, in this paper, a novel approach of protection mechanism for data which are transmitted not only between the networked devices but also between the digital media devices. As the devices are getting more powerful and more storage capacity, they can process the encoded/encrypted data autonomously. However, all devices must know the secret key that used to encrypt data, and also use secure method to distribute that key. Moreover, there are no protection mechanisms supporting end-to-end copy protection which result in the fact that the data passed through various devices can be manipulated or captured. Therefore, we propose a RFID-based key distribution and protection mechanism to resolve these problems.

기관협착의 임상적 고찰 (The clinical Experience of Tracheal Stenosis)

  • 명창률
    • Journal of Chest Surgery
    • /
    • 제27권2호
    • /
    • pp.136-139
    • /
    • 1994
  • Tracheal stenosis is relatively common complication after tracheal intubation or tracheostomy for a long time. We experienced 10 cases of tracheal stenosis with various causes, prolonged intubation or tracheostomy caused the tracheal stenosis in seven, one after advanced cancer of the lung, one after inhalation burn, and the other was palliative management for tracheal stenosis by Gianturco type tracheal stent. We tried to correct this stenosis applying three tracheal stent and one Montgomery T-tube as a palliative approach, but failed in two, one restenosis due to regrowing of granulation tissue with scarring or another metastatic spread of cancer to systemic organs after 3 months of placing the stent. Tracheal circumferential resection and end to end anastomosis were done in seven, and obtained one postoperative complication as subglottic stenosis was followed by Montgomery T-tube and reoperation later. With the brief review of references, we report the cases.

  • PDF

대형 융합 연구사업의 최선단 연구기획 관리전략 (Fuzzy-Front-End Management Strategies under High Risk and Fast-Changing Environment)

  • 송용일;이대희;박성배;정윤철
    • 기술혁신연구
    • /
    • 제12권3호
    • /
    • pp.135-157
    • /
    • 2004
  • As the speed of technological changes increase with the investment requirements steadily expanding, private firms and government-funded research institutes experience similar pressures with respect to the necessity of risk reduction and technological alliances in R&D activities. This paper first attempts to review previous research in managing R&D projects with large, risky, and long-term investment requirements. Our primary focus is placed on the "fuzzy front-end" (FFE) projects with uncertainties at the investigation and planning stages. We analyze various elements that create FFE conditions, classify them into basic constructs, and suggest tools and methods to deal with FFE conditions. The findings suggest that both initial FFE conditions and the effectiveness of FFE management affect the performance of the project later on, and thus, especially for large projects, we must deal with FFE seriously in a comprehensive manner. We utilize in-depth panel interviews and case studies to approach the research questions.

  • PDF

Enhancing Malware Detection with TabNetClassifier: A SMOTE-based Approach

  • Rahimov Faridun;Eul Gyu Im
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2024년도 춘계학술발표대회
    • /
    • pp.294-297
    • /
    • 2024
  • Malware detection has become increasingly critical with the proliferation of end devices. To improve detection rates and efficiency, the research focus in malware detection has shifted towards leveraging machine learning and deep learning approaches. This shift is particularly relevant in the context of the widespread adoption of end devices, including smartphones, Internet of Things devices, and personal computers. Machine learning techniques are employed to train models on extensive datasets and evaluate various features, while deep learning algorithms have been extensively utilized to achieve these objectives. In this research, we introduce TabNet, a novel architecture designed for deep learning with tabular data, specifically tailored for enhancing malware detection techniques. Furthermore, the Synthetic Minority Over-Sampling Technique is utilized in this work to counteract the challenges posed by imbalanced datasets in machine learning. SMOTE efficiently balances class distributions, thereby improving model performance and classification accuracy. Our study demonstrates that SMOTE can effectively neutralize class imbalance bias, resulting in more dependable and precise machine learning models.

  • PDF

종단간 QoS 지원을 위해 Bottom-half 메커니즘을 이용한 우선순위 및 예산 기반의 네트워크 프로토콜 처리 (Priority- and Budget-Based Protocol Processing Using The Bottom-Half Mechanism for End-to-End QoS Support)

  • 김지민;유민수
    • 정보처리학회논문지A
    • /
    • 제16A권3호
    • /
    • pp.189-198
    • /
    • 2009
  • 종단 호스트에서의 전통적인 네트워크 프로토콜 처리 기법은 인터럽트 기반의 선착순 처리 방식을 사용함으로써 다음과 같은 두 가지 문제점을 가진다. 첫째, 인터럽트가 가장 높은 우선순위로 처리되기 때문에 네트워크 패킷과 응용 프로세스간에 우선순위 역전현상이 발생할 수 있다. 둘째, 네트워크 패킷 처리가 선착순으로 진행되기 때문에 패킷과 패킷간에 우선순위 역전현상이 발생할 수 있다. 이러한 문제는 우선순위에 기반한 프로토콜 처리 방법으로 해결이 가능한 것으로 알려져 있지만, 기본적으로 우선순위 기반의 해법은 기아(starvation)라는 부작용을 가지고 있으며 각각의 네트워크 흐름에 대하여 QoS 격리 및 조절이 불가능하기 때문에 네트워크 흐름마다 상이한 QoS가 요구되는 환경에 적용하기 어렵다는 문제점을 가지고 있다. 본 논문에서는 우선순위와 예산(budget) 개념에 기반하여 bottom-half 메커니즘을 이용한 프로토콜 처리 기법을 제안한다. 제안하는 방법을 사용하면 우선순위 기반의 프로토콜 처리 방법이 가지고 있는 기아 현상을 해결함은 물론 각각의 네트워크 연결이 요구하는 QoS의 격리(isolation)가 가능하다. 이러한 특성으로 인해 패킷 처리 시간을 상한 (upper-bound)시키는 것이 가능해지며, 본 논문에서는 그 최대값을 계산해내는 방법을 함께 제안한다. 마지막으로, 실험을 통해 제안하는 방법이 네트워크 흐름간 QoS를 효과적으로 격리 및 조절할 수 있음을 확인할 수 있었다.

Extracorporeal Pedicles for Free Flap Reconstruction in Diabetic Lower Extremity Wounds

  • Alejandro R. Gimenez;Daniel Lazo;Salomao Chade;Alex Fioravanti;Olimpio Colicchio;Daniel Alvarez;Ernani Junior;Sarth Raj;Amjed Abu-Ghname;Marco Maricevich
    • Archives of Plastic Surgery
    • /
    • 제49권6호
    • /
    • pp.782-784
    • /
    • 2022
  • Diabetic foot ulcers are a severe complication of diabetes, and their management requires a multidisciplinary approach for optimal management. When treating these ulcers, limb salvage remains the ultimate goal. In this article, we present the "hanging" free flap for the reconstruction of chronic lower extremity diabetic ulcers. This two-staged approach involves standard free flap harvest and inset; however, following inset the "hanging" pedicle is covered within a skin graft instead of making extraneous incisions within the undisturbed soft tissues or tunnels that can compress the vessels. After incorporation, a second-stage surgery is performed in 4 to 6 weeks which entails pedicle division, flap inset revision, and end-to-end reconstruction of the recipient vessel. Besides decreasing the number of incisions on diabetic patients, our novel technique utilizing the "hanging" pedicle simplifies flap monitoring and inset and allows reconstruction of recipient vessels to reestablish distal blood flow.

하이브리드 MOM/UTD 방법을 이용한 주름진 표면파 안테나의 해석 (Analysis of Corugated Surface Wave Antenna Using Hybrid MOM/UTD Method)

  • 김중표;이창원;손현
    • 한국전자파학회논문지
    • /
    • 제10권3호
    • /
    • pp.359-367
    • /
    • 1999
  • 평행평판 도파관으로부터 급전되어지는 주름진 도체판을 가지는 표면파 안테나의 해석이 고려되어진다. 해석의 단순함을 위해 원래의 문제를 3개의 영역, 즉 단락된 평행평판 도파관 내부 구조(내부 영역 1)와 주름진 격자 내부의 구조(내부 영역 2)와 도체 쇄기의 구조(외부 영역)로 나누기 위해 등가원리가 도입된다. End-fire 복사를 하는 주름진 표면과 안테나를 해석하기 위하여 하이브리드 MOM/UTD 방법이 적용되어진다. 수치해석 결과들은 이전의 실험결과들과 매우 잘 일치하며, 이전의 단순 등가전류 접근의 결과들과 비교할 때 더 나은 결과들이 얻어진다. 또한 효과적인 end-fire 주름진 표면파 안테나 설계를 위한 인자들을 얻을 수 있다.

  • PDF

Electrical Repulsive Energy between Two Cylindrical Particles with Finite Length: Configuration Dependence

  • Choi, Ju-Young;Dong, Hyun-Bae;Haam, Seung-Joo;Lee, Sang-Yup
    • Bulletin of the Korean Chemical Society
    • /
    • 제29권6호
    • /
    • pp.1131-1136
    • /
    • 2008
  • The electrical repulsive energy between two model cylinders was calculated by solving nonlinear Poission- Boltzmann (P-B) equation under Derjaguin approximation. Effects of the surface potential, Debye screening length, and configuration of cylinders on the repulsive interaction energy were examined. Due to the anisotropy of the shape of cylinder, the interaction repulsive energy showed dependence to the configuration of particles; cylinders aligned in end-to-end configuration showed largest repulsive energy and crossed particles had lowest interaction energy. The configuration effect is originated from the curvature effect of the interacting surfaces. The curved surfaces showed less repulsive energy than flat surfaces at the same interacting surface area. The configuration dependency of interaction energy agreed with the previous analytical solution obtained under the linearized P-B equation. The approach and results present in this report would be applicable in predicting colloidal behavior of cylindrical particles.