• Title/Summary/Keyword: 계층이론

Search Result 453, Processing Time 0.029 seconds

Impossible Drawing Using a Loop of Layered Depth Images (계층적 깊이 영상의 고리형 맞물림을 이용한 비현실적 그림 생성)

  • Lee, Yun-Jin;Kim, Jun-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.102-109
    • /
    • 2009
  • In this paper, we present an algorithm which generates the impossible drawings after the manner of M.C. Escher. A class of the impossible drawings, focused on this paper, depicts the non-realistic configuration such that an ascent (or a descent) looks like keeping on permanently with a height-deceptive loop. We analyze the fact that the ascending direction in the non-realistic illustrations comes not from the physical heights of the objects but from the artist's intended forwarding direction about the loop, which does not have any physical sense of depths. The basic idea to support such impossible drawings is to use a loop of layered depth images (LDIs), where several LDIs are arranged along with the forwarding direction of the loop while having the physically constant heights. The height-deception between two adjacent objects comes from the layer values in the LDIs. In this paper, we propose a NPR system which can manipulate a shape of the loop and layer values of the LDIs and demonstrate several impossible drawings results generated by using our system.

Probability-based IoT management model using blockchain to expand multilayered networks (블록체인을 이용하여 다층 네트워크를 확장한 확률 기반의 IoT 관리 모델)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.33-39
    • /
    • 2020
  • Interest in 5G communication security has been growing recently amid growing expectations for 5G technology with faster speed and stability than LTE. However, 5G has so far included disparate areas, so it has not yet fully supported the issues of security. This paper proposes a blockchain-based IoT management model in order to efficiently provide the authentication of users using IoT in 5G In order to efficiently fuse the authentication of IoT users with probabilistic theory and physical structure, the proposed model uses two random keys in reverse direction at different layers so that two-way authentication is achieved by the managers of layers and layers. The proposed model applied blockchain between grouped IoT devices by assigning weights to layer information of IoT information after certification of IoT users in 5G environment is stratified on a probabilistic basis. In particular, the proposed model has better functions than the existing blockchain because it divides the IoT network into layered, multi-layered networks.

Ship block assembly modeling based on the graph theory (그래프 이론을 기반으로 한 선박의 블록 어셈블리 모델링)

  • Hag-Jong Jo;Kyu-Yeul Lee
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.38 no.2
    • /
    • pp.79-86
    • /
    • 2001
  • This study shows an attempt to generate an assembly sequence and its model for a ship block assembly using the graph theory and graph algorithms. To generate the ship block assembly, we propose four levels of the ship block assembly model such as "geometry mode1", "relational model", "sequential mode1", and "hierarchical model". To obtain the relational model, we used surface and surface intersection algorithm. The sequential model that represents a possible assembly sequence is made by using several graph algorithms from the relational model. The hierarchical model will be constructed from the sequential model in order to represent the block assembly tree and so forth. The purpose of the hierarchical model is to define an assembly tree and to generate the Bill Of Material(BOM). Lastly, the validity of the method proposed in this study is examined with application to ship block assembly models of a single type and double type according to four models mentioned above.

  • PDF

Implementation and Analysis of IEEE 802.15.4 Compliant Software based on a Vertically Decomposed Task Model (수직 분할 태스크 모델 기반의 IEEE 802.15.4 소프트웨어 구현과 성능평가)

  • Kim, Hie Cheol;Yoo, Seong Eun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.53-60
    • /
    • 2014
  • IEEE 802.15.4 is one of the most widely adopted physical layer standards in the area of LR-WPAN(Low-Rate Wireless Personal Area Network). Numerous previous researches have contributed to deep insights on energy efficiency, transmission throughput, and reliability that IEEE 802.15.4 delivers to the LR-WPAN. As a research that is orthogonal and complementary to previous researches, we explore the implementation and practical performance evaluation of IEEE 802.15.4 MAC software. We implement the MAC software from the perspective of the networking stack, exploring the issues raised when the MAC software serves as a functional component in a complete networking stack consisting of MAC, network as well as well as application support layers. The performance is evaluated on a realistic experimental software environment integrated with operating system, networking stack, and applications.

Interference Analysis of RFID Gen-2 System Considering Both PHY and MAC Layers (PHY/MAC 계층을 모두 고려한 RFID Gen-2 시스템의 간섭 분석)

  • Yoon, Hyun-Goo;Choi, Sun-Woong;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.7
    • /
    • pp.752-760
    • /
    • 2010
  • This paper investigates the performance of EPCglobal Generation-2(Gen-2) radio frequency identification(RFID) protocol under reader-to-reader interfering environments. We establish a modified discrete-time Markov chain(DTMC) model for the Gen-2 and accordingly obtain quantitative results of query success rate(QSR) and tag identification speed (TIS). Extensive simulations validate our theoretical analysis and demonstrate that the number of tags over 100 has little impact on the performance. TIS linearly decreases by 10 tags/sec/reader as the number of interfering readers increases. Our model for Gen-2 protocol is also useful to study the performance of other RFID protocols.

The New Framework for Taxonomy of Business Caused by Cyber Space Marketization and Its Application (공간시장화에 따른 새로운 비즈니스 분류 프레임워크의 제안과 적용)

  • 이홍길;이재원;류형근
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2003.05a
    • /
    • pp.291-297
    • /
    • 2003
  • The aim of this research is to propose new framework for taxonomy of various business and its concept, due to the changes in market space. This framework is three-dimension cubic model, based on three concepts, business layer(BL), value chain(VC), and Real/Virtual(R/V) that symbolizes real environment and virtual(or cyber) space. And we showed that this framework is able to describe all expected(or existed) business types in certain industry by the combinations of BL-VC-R/V on three dimension. In addition, we suggested new definition of e-business and e-Logistics from view of BL-VC-R/V. In order to test availability, this framework was applied for logistics related business. and classified typical business types existed (or expected) in logistics area.

  • PDF

The New Framework for Taxonomy of Business Caused by Cyber Space Marketization and Its Application (공간시장화에 따른 새로운 비즈니스 분류 프레임워크의 제안과 적용)

  • Lee, Hong-Girl;Lee, Jae-Won;Ryu, Hyung-Geun
    • Journal of Navigation and Port Research
    • /
    • v.27 no.4
    • /
    • pp.389-395
    • /
    • 2003
  • The aim of this research is to propose new framework for taxonomy of various business and its concept. due to the changes in market space. This framework is three-dimension cubic model based on three concepts, business layer(BL), value chain(VC), and Real/Virtual(R/V) that symbolizes real environment and virtual (or cyber) space. We showed that this framework is able to describe all expected(or existed) business types in certain industry by the combinations of BL-VC-R/V on three dimension. In addition, we suggested new definition of e-business and e-Logistics from view of BL-VC-R/V. In order to test availability of framework, this framework was applied for logistics related business, and we classified typical business types existed (or expected) in logistics area.

Factors Affecting Dietary Behavior Change of Vulnerable Elderly Based on the Stage of Change (변화단계 이론에 근거한 취약계층 노인의 식 행위 관련 요인분석)

  • Ko, Young;Yim, Eun shil
    • 한국노년학
    • /
    • v.30 no.3
    • /
    • pp.695-708
    • /
    • 2010
  • Purpose: This study was to explore the factors affecting on Dietary Behavior Change of the vulnerable elderly based on the Stage of Change. Methods: This study was a secondary analysis of the data collected from 1,262 elderly who were participated in the case management program. Total 984 participants who responded all questionnaire were included in the analysis. The variables included general characteristics, health behavior, health status, and dietary behavior stage. The data collected were analyzed by descriptive statistics, trend test and multi-variate logistic regressions. Results: about twenty four percent of the vulnerable elderly subject was pre-contemplation stage and 46.1% of them was contemplation stage of dietary behavior. Having a depressive mood, dependance of Instrumental Activity of Daily living, and being medicaid affected on starting or on maintaining healthy dietary behavior in vulnerable elderly negatively. Conclusion: The tailored nutritional intervention depending on dietary behavior stage are needed for the vulnerable elderly to improve the health. The program which can maintain the function remained of elderly and give psychological support together will be more effective.

Top-down Hierarchical Clustering using Multidimensional Indexes (다차원 색인을 이용한 하향식 계층 클러스터링)

  • Hwang, Jae-Jun;Mun, Yang-Se;Hwang, Gyu-Yeong
    • Journal of KIISE:Databases
    • /
    • v.29 no.5
    • /
    • pp.367-380
    • /
    • 2002
  • Due to recent increase in applications requiring huge amount of data such as spatial data analysis and image analysis, clustering on large databases has been actively studied. In a hierarchical clustering method, a tree representing hierarchical decomposition of the database is first created, and then, used for efficient clustering. Existing hierarchical clustering methods mainly adopted the bottom-up approach, which creates a tree from the bottom to the topmost level of the hierarchy. These bottom-up methods require at least one scan over the entire database in order to build the tree and need to search most nodes of the tree since the clustering algorithm starts from the leaf level. In this paper, we propose a novel top-down hierarchical clustering method that uses multidimensional indexes that are already maintained in most database applications. Generally, multidimensional indexes have the clustering property storing similar objects in the same (or adjacent) data pares. Using this property we can find adjacent objects without calculating distances among them. We first formally define the cluster based on the density of objects. For the definition, we propose the concept of the region contrast partition based on the density of the region. To speed up the clustering algorithm, we use the branch-and-bound algorithm. We propose the bounds and formally prove their correctness. Experimental results show that the proposed method is at least as effective in quality of clustering as BIRCH, a bottom-up hierarchical clustering method, while reducing the number of page accesses by up to 26~187 times depending on the size of the database. As a result, we believe that the proposed method significantly improves the clustering performance in large databases and is practically usable in various database applications.

Selection of Routes for Reflecting Driver's Characteristics by Adopting Multi-Attribute Utility Theory (MAUT) (다속성 효용이론을 적용한 운전자 특성별 경로 선택 연구)

  • Oh, Ji-Eun;Bae, Sang-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.3
    • /
    • pp.25-35
    • /
    • 2011
  • Traffic volume increases due to diversification of industry. Also, Automobile ownerships also increase steadily. It is estimated that the registered number of vehicle is expected to be 20 milion in the year 2015. These trends may result in increasing the number of woman drivers and elderly drivers. Therefore, this study aims to identify routes that reflect characteristics of each driver's preferences. A survey was conducted on different routes attributes for variances drivers. Driver types were classified by gender, age, and driving career. Accordingly, a weight for road composition attribute such as number of lanes, number of accidents, slope was estimated by using Swing Weighting technique in Multi-Attribute Utility Theory. In addition, a case study was conducted and identified weights were applied to routes. In result, drivers commonly prefer short route when they considered their routes. Also, male drivers prefer speedy and shorter route than that of female drivers. Elderly drivers prefer safe routes that represent low accidents rate. Moreover driving career under a year drivers prefer safe and easy routes. Therefore, we may conclude that the necessity of diversified route information is essential in the future car navigation system.