• Title/Summary/Keyword: real-time mechanism

Search Result 1,052, Processing Time 0.031 seconds

A Study on Crashworthiness for Underframe of Motorized Trailer of High Speed Train (고속전철 동력객차 언더프레임에 대한 충돌특성 연구)

  • 김헌영;김상범;한재형
    • Proceedings of the KSR Conference
    • /
    • 1998.05a
    • /
    • pp.385-392
    • /
    • 1998
  • Train crashes involve complex interaction between deformable bodies in multiple collisions. The purpose of this study is to suggest the effective analytical procedure using simple model for the crashworthiness of motorized trailer of high speed train. The simple model, with very short modeling time and reduced computation time was adopted to extract the global behaviour and to perform a pre-optimization of the considered structure. Firstly, various types of crash events are investigated and the conditions for numerical simulation are defined. The simple model, using the beam and non-linear spring element, and shell element model are used to evaluated energy absorption and deformation mechanism in analyses. And aluminum is applied to real model after verification with square tube analyses. Finally, loading path and energy absorption of main components are evaluated. The analyses are aimed to ensure the crashworthiness design of high speed train.

  • PDF

Energy-balance node-selection algorithm for heterogeneous wireless sensor networks

  • Khan, Imran;Singh, Dhananjay
    • ETRI Journal
    • /
    • v.40 no.5
    • /
    • pp.604-612
    • /
    • 2018
  • To solve the problem of unbalanced loads and the short network lifetime of heterogeneous wireless sensor networks, this paper proposes a node-selection algorithm based on energy balance and dynamic adjustment. The spacing and energy of the nodes are calculated according to the proximity to the network nodes and the characteristics of the link structure. The direction factor and the energy-adjustment factor are introduced to optimize the node-selection probability in order to realize the dynamic selection of network nodes. On this basis, the target path is selected by the relevance of the nodes, and nodes with insufficient energy values are excluded in real time by the establishment of the node-selection mechanism, which guarantees the normal operation of the network and a balanced energy consumption. Simulation results show that this algorithm can effectively extend the network lifetime, and it has better stability, higher accuracy, and an enhanced data-receiving rate in sufficient time.

Performance Analysis of the IEEE 802.16 Broadband Wireless Access systems

  • Cho Dong-hoon;Kim Hyun-Sook;Kim Jin-nyun;Ha Nam-koo;Han Ki-jun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.176-180
    • /
    • 2004
  • In this paper we introduce a bandwidth allocation algorithm and admission control policy for IEEE 802.16 broadband wireless access standard. The proposed mechanism is practical and compatible to the IEEE 802.16. Our scheme provides QoS support to high priority traffic and high throughput in low priority traffic. The simulation show that the proposed scheme includes QoS support for real-time traffic and we presented that BS determine a efficient contention mini-slot size. We have shown the relationship between traffic size and its QoS requirements and the network performance.

  • PDF

A Conflict-Avoided Resource Reservation using Reservation Diversity for UWB WPAN with Distributed MAC Protocol

  • Joo, Yang-Ick;Hur, Kyeong
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.405-410
    • /
    • 2011
  • In this paper, a conflict-avoided resource reservation scheme for UWB (Ultra Wide Band) WPAN (Wireless Personal Area Network) with D-MAC (Distributed Medium Access Control) is proposed. Since distributed characteristic of the WiMedia D-MAC supporting DRP (Distributed Reservation Protocol) scheme may cause lots of conflicts, overall performances of the WiMedia D-MAC can be deteriorated. In addition, once a DRP conflict occurs, only one of the DRP reservations involved in that DRP conflict maintains the reserved MASs, while the other DRP reservation must be terminated and DRP negotiations for them have to be re-started. Such DRP termination and renegotiation time delays due to the DRP conflicts can be a critical problem to the mobile devices transceiving real-time QoS traffic streams. Therefore, we propose a mechanism to avoid DRP conflicts by providing a kind of path diversity using relay transmission scheme and demonstrate its performance improvements via simulation results.

Adaptive control of gas metal arc welding process

  • Song, Jae-Bok;Hardt, David-E.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10b
    • /
    • pp.191-196
    • /
    • 1993
  • Since the welding process is complex and highly nonlinear, it is very difficult to accurately model the process for real-time control. In this paper, a discrete-time transfer function matrix model for gas metal arc welding process is proposed. Although this linearized model is valid only around the operating point of interest, the adaptation mechanism employed in the control system render this model useful over a wide operating range. A multivariable one-step-ahead adaptive control strategy combined with a recursive least-squares method for on-line parameter estimation is implemented in order to achieve the desired weld bead geometries. Command following and disturbance rejection properties of the adaptive control system for both SISO and MIMO cases are investigated by simulation and experiment.

  • PDF

Characteristics of Magnetic Resonance(M.R.) and Comprehension of its Imaging Mechanism (자기공명(M.R.)진단법의 특징 및 그 영상기전의 이해)

  • Chang, Jae-Chun;Hwang, Mi-Soo;Kim, Sun-Yong
    • Journal of Yeungnam Medical Science
    • /
    • v.4 no.1
    • /
    • pp.1-15
    • /
    • 1987
  • Magnetic Resonance (M.R.) is rapidly emerging technique that provides high quality images and potentially provides much more diagnostic information than do conventional imaging modalities. M.R.I. is conceptually quite different from currently used imaging methods. The complex nature of M.R.I. allows a great deal of flexibility in image product ion and available information, and key points are as follows. 1. M.R.I. offers a non-invasive technique with which to gene rate in vivo human images without ionizing radiation and with no known adverse biological effects. 2. Imaging mechanism of M.R.I. is quite different from conventional imaging modality and for more accurate diagnostic application, It is necessary for physician to understand imaging mechanism of M.R.I. 3. M.R. makes available basic chemical parameters that may provide to be useful for diagnostic medical imaging and more specific pathophysiologic information which are not available by alternate techniques. 4. M.R. can be produced by number of different methods. This flexibility allows the imaging technique to be applicated for particular clinical purpose. Multiplanar and three dimensional imaging may extend the imaging process beyond the single section available with current CT. 5. Future directions include efforts to; a. Further development of hard ware b. More fasternning scan time c. Respiratory and cardiac gated imaging d. Imaging of additional nuclei except hydrogen e. Further development of contrast media f. M.R. in vivo spectroscopy g. Real time M.R. imaging.

  • PDF

The Face Authentication Mechanism of Learner for the Efficient E-Learning (효율적인 이러닝을 위한 학습자 얼굴 인증 기술)

  • Jang, Eun-Gyeom;Kim, Gyoung-Bae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.67-74
    • /
    • 2010
  • E-learning technology which effectively supports the learning methodologies between students and professors and which provides location and time benefits to students is being researched now a days. However, E-learning classes produce bad effects comparing with offline classes in learning procedures including scholastic achievements. Bad effects of E-learning system could be proxy attendance, lack of concentration, and bad attitude of students. These environmental problems must be solved first to achieve the advantages of E-learning technology. To get rid of these problems, in this paper, we proposed a mechanism which provides effective learning progress by using face authentication method. This mechanism supervise the student by using real time face recognition which prevents proxy attendance, illegal activities, and student's absences.

Effective Distributed Supercomputing Resource Management for Large Scale Scientific Applications (대규모 과학응용을 위한 효율적인 분산 슈퍼컴퓨팅 자원관리 기술 연구)

  • Rho, Seungwoo;Kim, Jik-Soo;Kim, Sangwan;Kim, Seoyoung;Hwang, Soonwook
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.573-579
    • /
    • 2015
  • Nationwide supercomputing infrastructures in Korea consist of geographically distributed supercomputing clusters. We developed High-Throughput Computing as a Service(HTCaaS) based on these distributed national supecomputing clusters to facilitate the ease at which scientists can explore large-scale and complex scientific problems. In this paper, we present our mechanism for dynamically managing computing resources and show its effectiveness through a case study of a real scientific application called drug repositioning. Specifically, we show that the resource utilization, accuracy, reliability, and usability can be improved by applying our resource management mechanism. The mechanism is based on the concepts of waiting time and success rate in order to identify valid computing resources. The results show a reduction in the total job completion time and improvement of the overall system throughput.

A Real-time Traffic Control Scheme for ATM network:RCT (ATM망을 위한 실시간 트래픽 제어 기법:RCT)

  • Lee, Jun-Yeon;Lee, Hae-Wan;Kwon, Hyeog-In
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2822-2831
    • /
    • 1997
  • A B-ISDN network based on ATM must support several kinds of transport services with different traffic characteristics and service requirements. There is neither link-by-link flow control nor error control in the ATM layer. For different services, different flow/error controls could be performed at the AAL layer or at a higher Iayer(e.g. transport layer). In traditional data networks, the window now control mechanism combined with error control was used prevalently. But, the window flow control mechanism might be useless in ATM networks because the propagation delay is too large compared with the transmission rate. In this paper, we propose a simple flow control mechanism, called RCT(Rate Control for end-to-end Transport), for end-to-end data transport. The RCT shows acceptable performance when the average overload period is bounded by a certain time.

  • PDF

A Fuzzy Window Mechanism for Information Differentiation in Mining Data Streams (데이터 스트림 마이닝에서 정보 중요성 차별화를 위한 퍼지 윈도우 기법)

  • Chang, Joong-Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.9
    • /
    • pp.4183-4191
    • /
    • 2011
  • Considering the characteristics of a data stream whose data elements are continuously generated and may change over time, there have been many techniques to differentiate the importance of data elements in a data stream by their generation time. The conventional techniques are efficient to get an analysis result focusing on the recent information in a data stream, but they have a limitation to differentiate the importance of information in various ways more flexible. An information differentiation technique based on the term of a fuzzy set can be an alternative way to compensate the limitation. A term of a fuzzy set has been widely used in various data mining fields, which can overcome the sharp boundary problem and give an analysis result reflecting the requirements in real world applications more. In this paper, a fuzzy window mechanism is proposed, which is adapting a term of a fuzzy set and is efficiently used to differentiate the importance of information in mining data streams. Basic concepts including fuzzy calendars are described first, and subsequently details on data stream mining of weighted patterns using a fuzzy window technique are described.