• Title/Summary/Keyword: 존재 증명

Search Result 529, Processing Time 0.027 seconds

Study of the Wake Flow Around a Circular Cylinder (단독 원기둥 주위의 후류유동에 관한 연구)

  • Lee, Jaesung;Kim, Sangil;Seung, Samsun
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.39 no.11
    • /
    • pp.891-896
    • /
    • 2015
  • This experimental study investigated the wake flow around an elastically supported circular cylinder. In this study, the Reynolds numbers are varied in the region of $1.4{\times}10^4{\leq}Re{\leq}3.2{\times}10^4$. Under these conditions, we have captured the process of the wake mechanism and the moving path of the vortex by measuring the velocity at each position in the wake around the cylinder. Further, these facts from the wind tunnel test are proved by a flow visualization test through a water channel. From the result, we have arrived at the following conclusions : i) The process (formation${\rightarrow}$growth${\rightarrow}$collapse) of vortex is observed in the wake around the cylinder, ii) The vortex efflux angle is approximately $16^{\circ}{\sim}17^{\circ}$ under the experimental conditions. These angles have no relationship with the velocity change and the existence of flow-induced vibrations of the cylinder, and iii) The moving path of the vortex center is obtained by spectrum analysis of the fluctuating velocity behind the cylinder. These are confirmed by conducting visualization tests.

A Mechanism to Support Real-Time Internet Services over the ATM Network (ATM 망을 통한 실시간 인터넷 서비스 지원 메커니즘)

  • 금정현;정광수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1113-1122
    • /
    • 1999
  • In this paper, we propose MSS(Multicast Synchronization Server) and QCS(QoS Conversion Server) models that can support IP multicast and QoS(Quality of Service) over the ATM network more efficiently. In the MSS model, it is possible to establish shortcut VCs(Virtual Circuits) among all hosts in the ATM network and to transfer multicast data at high speed. Also the MSS model is more scalable, because the number of inter-cluster VCs needed in the MSS model is less than that of EARTH. In the QCS model, ATM switch is modified to support one QoS service and best effort service through the one point-to-multipoint VC at the same time so required network resources are reduced, and dedicated server is used for QoS conversion to accept heterogeneous receivers more efficiently. In this Paper, the proposed MSS model and QCS model have solved both efficiency problem and scalability problem. It is proved through the comparison of the VCs required in each model.

  • PDF

Efficient Motion Compensation Algorithm for Ground Moving Targets Based on SAR-ATI System (SAR-ATI를 이용한 효율적인 지상 이동 표적 보상 알고리즘)

  • Ryu, Bo-Hyun;Kang, Byung-Soo;Lim, Byoung-Gyun;Oh, Tae-Bong;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.7
    • /
    • pp.560-570
    • /
    • 2017
  • Recently, well-known SAR imaging algorithms have been developed to form the focused SAR images for stationary targets. In general, the conventional methods exploit the range variation only defined by the motion of radar platform and SAR geometry. However, for SAR imaging of ground moving targets, the motion of the targets induces an additional range shift, yielding the blurred SAR images. To overcome the problem, in this paper we propose an effective motion compensation algorithm operated under a multi-channel SAR, named along-track interferometry(ATI) and phase unwrapping to directly estimate the motion parameters of the targets. In simulations, 50 Monte-Carlo simulation results show the effectiveness of the algorithm in the presence of noise.

Noise Smoothing using the 2D/3D Magnitude Ratio of Mesh Data (메쉬 데이터의 2D/3D 면적비를 이용한 잡음 평활화)

  • Hyeon, Dae-Hwan;WhangBo, Taeg-Keun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.473-482
    • /
    • 2009
  • Reconstructed 3D data from computer vision includes necessarily a noise or an error. When these data goes through a mesh process, the different 3D mesh data from original shape comes to make by a noise or an error. This paper proposed the method that smooths a noise effectively by noise analysis in reconstructed 3D data. Because the proposed method is smooths a noise using the area ratio of the mesh, the pre-processing of unusable mesh is necessary in 3D mesh data. This study detects a peak noise and Gaussian noise using the ratio of 3D volume and 2D area of mesh and smooths the noise with respect of its characteristics. The experimental results using synthetic and real data demonstrated the efficacy and performance of proposed algorithm.

  • PDF

Building a Database of DQT Information to Identify a Source of the SmartPhone JPEG Image File (스마트폰 JPEG 파일의 출처 식별을 위한 DQT 정보 데이터베이스 구축)

  • Kim, MinSik;Jung, Doowon;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.359-367
    • /
    • 2016
  • As taking pictures by using smartphones has become more common in society, there are many incidents which are unexpected manipulation of images and leak of confidential information. Because of those incidents, demands that identify forgery/alteration of image file and proves of the original copy is constantly increasing. In general, smartphone saves image file as JPEG form and it has DQT which determines a compression rate of image in a header part of image. There is also DQT in Thumbnail image which inside of JPEG. In previous research, it identified a smartphone which take image by only using DQT, However, the research has low accuracy to identify the devices. There are two main purposes in this research. First, this research will analogize a smartphone and an application that takes a picture, edits and save an image file by testing not only about a DQT information but also a information of Thumbnail image. Second, the research will build a database of DQT and Thumbnail information in JPEG file to find more accurate image file's origin.

Stacked Autoencoder Based Malware Feature Refinement Technology Research (Stacked Autoencoder 기반 악성코드 Feature 정제 기술 연구)

  • Kim, Hong-bi;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.593-603
    • /
    • 2020
  • The advent of malicious code has increased exponentially due to the spread of malicious code generation tools in accordance with the development of the network, but there is a limit to the response through existing malicious code detection methods. According to this situation, a machine learning-based malicious code detection method is evolving, and in this paper, the feature of data is extracted from the PE header for machine-learning-based malicious code detection, and then it is used to automate the malware through autoencoder. Research on how to extract the indicated features and feature importance. In this paper, 549 features composed of information such as DLL/API that can be identified from PE files that are commonly used in malware analysis are extracted, and autoencoder is used through the extracted features to improve the performance of malware detection in machine learning. It was proved to be successful in providing excellent accuracy and reducing the processing time by 2 times by effectively extracting the features of the data by compressively storing the data. The test results have been shown to be useful for classifying malware groups, and in the future, a classifier such as SVM will be introduced to continue research for more accurate malware detection.

Efficient Dummy Generation for Protecting Location Privacy (개인의 위치를 보호하기 위한 효율적인 더미 생성)

  • Cai, Tian-Yuan;Song, Doo-Hee;Youn, Ji-Hye;Lee, Won-Gyu;Kim, Yong-Kab;Park, Kwang-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.526-533
    • /
    • 2016
  • The researches protecting user's location in location-based services(LBS) have received much attention. Especially k-anonymity is the most popular privacy preservation method. k-anonymization means that it selects k-1 other dummies or clients to make the cloaking region. This reduced the probability of the query issuer's location being exposed to untrusted parties to 1/k. But query's location may expose to adversary when k-1 dummies are concentrated in query's location or there is dummy in where query can not exist. Therefore, we proposed the dummy system model and algorithm taking the real environment into account to protect user's location privacy. And we proved the efficiency of our method in terms of experiment result.

Performance Analysis for Malicious Interference Avoidance of Backscatter Communications Based on Game Theory (게임이론 기반 백스케터 통신의 악의적인 간섭 회피를 위한 성능 분석)

  • Hong, Seung Gwan;Hwang, Yu Min;Sun, Young Khyu;Shin, Yoan;Kim, Dong In;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.100-105
    • /
    • 2017
  • In this paper, we study an interference avoidance scenario in the presence of a interferer which can rapidly observe the transmit power of backscatter communications and effectively interrupt backscatter signals. We consider a power control with a sub-channel allocation to avoid interference attacks and a power-splitting ratio for backscattering and RF energy harvesting in sensors. We formulate the problem based on a Stackelberg game theory and compute the optimal transmit power, power-splitting ratio, and sub-channel allocation parameter to maximize a utility function against the interferer. We propose the utility maximization using Lagrangian dual decomposition for the backscatter communications and the interferer to prove the existence of the Stackelberg equilibrium. Numerical results show that the proposed algorithms effectively maximize the utility, compared to that of the algorithm based on the Nash game, so as to overcome a malicious interference in backscatter communications.

Effect of Lidocaine Compounds on the Expansion of Lipid Monolayer at the Air/Water Interface (국부 마취제로 이용되는 Lidocaine 화합물들이 공기/물 계면에 형성된 지질 단분자 막의 팽창효과에 미치는 영향)

  • Choi, Suk-Young;Oh, Seong-Geun;Lee, Ju-Seong
    • Applied Chemistry for Engineering
    • /
    • v.9 no.7
    • /
    • pp.1090-1097
    • /
    • 1998
  • Lidocaine compounds have widely been used as local anesthetics. Regarding the molecular mechanism for anesthesia by lidocaine, it is proposed that lidocaine molecules penetrate to the hydrophobic region of cell membrane and expand the membrane volume, producing a change in protein conformation that blocks sodium permeability or lidocaine molecules directly adsorb into lidocaine receptor in the protein channel without expanding the cell membrane. But these proposals have never been proven experimentally. In this study, the expansion of cell membrane by lidocaine compounds was investigated by employing lipid monolayer at the air/water interface as the mimetic system of cell membrane. It was found that oil-soluble lidocaine contracted the area/molecule of lipid in the monolayer of phosphatidyl choline, sphingomyelin, DS-PL95E and lipoid, but expanded the monolayer of phosphatidyl ethanolamine only in a certain range of mixing ratios. On the contrary, water-soluble lidocaine-HCl salt expanded the monolayers of all lipids used in this study.

  • PDF

An Empirical Study on Trade Openness and Industrial Relations: The Case of the Korean Manufacturing Industry (시장개방과 노사관계에 관한 실증분석 : 한국의 제조업을 대상으로)

  • Kim, Woo-Yung
    • Journal of Labour Economics
    • /
    • v.28 no.2
    • /
    • pp.55-92
    • /
    • 2005
  • This study examines how the difference in trade openness across manufacturing industries in Korea affects firm's employment strategies and industrial relations, utilizing the Korean establishment panel data. In terms of firm's employment strategy, it is found that trade openness is not associated with a particular employment strategy such as labor cost saving strategy or innovation strategy. This result is consistent with the previous findings that trade liberalization merely affects wages and employment. Moreover, this result disproves, at least for the Korean manufacturing, a general belief that when the domestic market is opened to foreign competition, firms will adopt and rely on labor cost saving strategy intensely. The obtained result concerning the relationship between trade openness and industrial relations is more interesting and informative. It is found that trade openness is positively associated with cooperative industrial relations. Furthermore, the positive relationship is reenforced when the establishment is unionized. This implies that management and union cooperate when they are faced with increased foreign competition as a result of trade liberalization.

  • PDF