• Title/Summary/Keyword: standardization algorithm

Search Result 122, Processing Time 0.03 seconds

Optimization of the Distribution Plan and Multi-product Capacity using Genetic Algorithm (유전 알고리즘을 이용한 다 제품 생산용량 및 분배계획 최적화)

  • Cha, Youngcheol;Lee, Gapsoo;Lee, Jonghwan;Wie, Do-Yeong
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.125-134
    • /
    • 2014
  • Supply Chain Management(SCM) is getting important, because size of the company is getting bigger and the kinds of product are various. In the case of manufacturing corporation, for the optimization of SCM, we have to make production and distribution plan by considering the various fluctuation in the aspect of integration. In this paper, first, It proposed the reasonable operational way of the SCM about when the customer's demanding is various and demanding expectation fluctuates in capacity standardization of producer stage. Second, the paper proposed the management way for demanding by considering confirmed demanding information, related inventory expense and demanding shortage expense when we make production and distribution plan. The paper applied the genetic algorithm proved for current usefulness. it proposed the optimal operational way for SCM by dividing into 2 ways for dealing with the duration of confirmed demanding information and various fluctuation.

Performance Analysis of DBA Algorithm for ATM-PON System (ATM-PON 에서의 효율적인 DBA 알고리즘 제안 및 성능 분석)

  • 이유태;한동환;전덕영;김승환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.803-811
    • /
    • 2002
  • Asynchronous Transfer Mode-Passive Optical Network(ATM-PON) Technology is one of the best solutions for implementation of broadband access network. In this paper, we propose a new Dynamic Bandwidth Allocation (DBA) algorithm for ATM-PON systems. The DBA is a key technique for data traffic management. DBA has been studied widely to allow ATM-PON to transport data traffic cost-effectively and efficiently, and currently a hot standardization issue in Full Service Access Network(FSAN) and ITU-T. The proposed DBA algorithm efficiently manages the user traffics according to their service categories. Performance of the proposed algorithm, in aspect of Cell Transfer Delay(CTD) and Cell Delay Variation(CDV), is evaluated using computer simulation.

Design of MAC Algorithm Supporting Adaptive Transmission Rate on VANET (VANET에서 적정 전송속도를 지원하는 MAC 설계)

  • Park, Sanghyun;Kim, Nam-Il
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.11
    • /
    • pp.132-138
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network), standardization of IEEE 802.11p specification is in process. 802.11 MAC protocol grants all nodes equal opportunity to acquire channel without regard to their bit-rates, making it possible for lower bit-rate nodes to occupy communication channel for a fair amount of time thus keeping the higher bit-rate nodes from acquiring connection channel which downward-equalize the overall network performance. Also with the 802.11p MAC protocol, the probability of collision occurring increases as the number of nodes grow. The proposed algorithm is a new MAC protocol that guarantees nodes with acquired channel a firm priority over other nodes for a fixed amount of time with TXOP concept added to 'packet burst' according to the current transmitting speed. This newly designed algorithm allows the construction of wireless network with enhanced network throughput, decreased probability of collisions as well as providing the means to grant each node a fair chance of acquiring connection according to their channel conditions. The algorithm sets the CW's (Contention Window) width wider than the standard's and modulates the continuous transmitting threshold value depending on channel acquired time, thus improving the overall performance of the network.

A Study on the Algorithm of Address Symmetric using Cadastral Map (지적도를 이용한 주소정제 알고리즘 연구)

  • Yoon, Hun-Joo;Ryu, Jung-Hee;Kim, So-Hee;Kim, Hyun-Jong;Jeong, Jong-Chul
    • 한국지형공간정보학회:학술대회논문집
    • /
    • 2004.10a
    • /
    • pp.147-154
    • /
    • 2004
  • The purpose of this study is to create address standardization through an Algorithm based on cadastral maps, as well as to establish a method of transforming one information area to all of the domestic areas in relation to the geographic information system. To do this, it analyzed the current level of e-government cadastral data and their integration strategy with addresses of both the administrator and the cadastral data. By doing this it is be able to suggest an application method for the Algorithm. The algorithm proposed from this study have a built-in GUI and correlate addresses between the administration and the cadastral map, it can analyze matching success rates. This study is to provide a more efficient method for co-operative work between private sector and public sector. In addition, we can expect that the information strategy of local government will become more active.

  • PDF

A Study on the Protection Switching Mechanism for Distribution Automation System Ethernet Networks Service of Distribution Automation System (배전자동화시스템 통신서비스를 위한 이중화 통신망 보호절체 알고리즘 연구)

  • Yu, Nam-Cheol;Kim, Jae-Dong;Oh, Chae-Gon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.6
    • /
    • pp.744-749
    • /
    • 2013
  • The protection switching technology is widely adopted in the fiber-optical transmission equipments based on TDM(Time Division Multiplexing), such as PDH, SDH/SONET. A variety of protection switching algorithms for Ethernet networks and the progress of standardization are summarized in the document. There are several kinds of protection switching algorithms for Ethernet networks, such as STP, RSTP, MSTP and etc. However, since Ethernet signal move through detour route, it causes much time to recover. Accordingly, it is difficult to secure a usability of Ethernet networks and QOS(Quality of Service). Also, if the protection switching protocol standardized by IEEE and ITU-T is used, it remains a inherent network switching time for protection. Therefore, a specific protection switching algorithm for Ethernet are needed for seamless and stable operation of Ethernet networks service for Distribution Automation System(DAS). A reliable protection algorithm with no switching delay time is very important to implement Self-healing service for DAS. This study of FPGA based protection switching algorithm for Ethernet networks shows that in case of faults occurrence on distribution power network, immediate fault isolation and restoration are conducted through interaction with distribution equipments using P2P(Peer to Peer) communication for protection coordination. It is concluded that FPGA based protection switching algorithm for Ethernet networks available 0ms switching time is crucial technology to secure reliability of DAS.

Ephemeral Key Reuse Attack of the SABER Algorithm by Meta-PKE Structure (Meta-PKE 구조에 의한 SABER 알고리즘의 임시 키 재사용 공격)

  • Lee, Changwon;Jeon, Chanho;Kim, Suhri;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.765-777
    • /
    • 2022
  • The SABER algorithm, a PKE/KEM algorithm presented in NIST PQC Standardization Round 3, is an algorithm based on the Module-LWR problem among lattice-based problems and has a Meta-PKE structure. At this time, the secret information used in the encryption process is called a ephemeral key, and in this paper, the ephemeral key reuse attack using the Meta-PKE structure is described. For each parameter satisfying the security strengths required by NIST, we present a detailed analysis of the previous studies attacked using 4, 6, and 6 queries, and improve them, using only 3, 4, and 4 queries. In addition, we introduce how to reduce the computational complexity of recovering ephemeral keys with a single query from the brute-force complexity on the n-dimension lattice, 27.91×n, 210.51×n, 212.22×n to 24.91×n, 26.5×n, 26.22×n, for each parameter, and present the results and limitations.

Hourly Average Wind Speed Simulation and Forecast Based on ARMA Model in Jeju Island, Korea

  • Do, Duy-Phuong N.;Lee, Yeonchan;Choi, Jaeseok
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.6
    • /
    • pp.1548-1555
    • /
    • 2016
  • This paper presents an application of time series analysis in hourly wind speed simulation and forecast in Jeju Island, Korea. Autoregressive - moving average (ARMA) model, which is well in description of random data characteristics, is used to analyze historical wind speed data (from year of 2010 to 2012). The ARMA model requires stationary variables of data is satisfied by power law transformation and standardization. In this study, the autocorrelation analysis, Bayesian information criterion and general least squares algorithm is implemented to identify and estimate parameters of wind speed model. The ARMA (2,1) models, fitted to the wind speed data, simulate reference year and forecast hourly wind speed in Jeju Island.

Implementation of CoAP-Lite Protocol over USN

  • Jeong, Sun-Chul;Yu, So-Ra;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.602-606
    • /
    • 2011
  • It is necessary for developing specific application protocol for mobile sensor end nodes and data collection devices that have constrained resources and computing powers. Because of these needs, IETF WG developed CoAP protocol and Internet draft was released, and processing to international standardization of this protocol. Because sensor nodes and information collection devices have restricted resources and computing powers, there are some limitations for applying to this proposed protocol directly. Thus in this paper we shows the implementation of full CoAP protocol for server, works on Linux and CoAP-Lite over telos which works on TinyOS for information collection devices. In this implementation we verified the main activities of CoAP protocol over USN by modifying some hardware with dependent algorithm.

3D Electric Field Analysis for the Standardization of the Insulation Design of GIS (초고압차단기 절연설계 표준화를 위한 3차원 전계해석)

  • Kim, J.S.;Choi, M.J.;Choi, Y.C.;Kim, I.M.;Kim, J.G.;Park, I.H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07b
    • /
    • pp.687-689
    • /
    • 2001
  • In this study, BIEM(Boundary Integral Equation Method) using Green's function is applied in order to analyze 3D electric field precisely. The algorithm is developed with equivalent electric surface charge as a variable, which promises less unknown variables and higher accuracy of electric field analysis. The validity of the developed program is varified by applying it to a coaxial cylinder mode and 3-phase GIS model.

  • PDF

Pose Invariant View-Based Enhanced Fisher Linear Discriminant Models for Face Recognition

  • Lee, Sung-Oh;Park, Gwi-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.101.2-101
    • /
    • 2001
  • This paper proposes a novel face recognition algorithm to recognize human face robustly under various conditions, such as changes of pose, illumination, and expression, etc. at indoor environments. A conventional automatic face recognition system consists of the detection and the recognition part. Generally, the detection part is dominant over the other part in the estimating whole recognition rate. So, in this paper, we suggest the view-specific eigenface method as preprocessor to estimate various poses of the face in the input image. Then, we apply the Enhanced FLD Models (EFM) to the result of it, twice. Because, the EFM recognizes human face, and reduces the error of standardization effectively. To deal with view-varying problem, we build one basis vector set for each view individually. Finally, the dimensionalities of ...

  • PDF