• Title/Summary/Keyword: 진화기법

Search Result 489, Processing Time 0.023 seconds

Analysis of nested HTS magnets considering the magnitude and orientation of applied magnetic field (인가자장의 크기와 방향을 고려한 고온초전도 다중마그넷의 특성 해석)

  • Park, Ju-Gyeong;Cha, Guee-Soo;Lee, Hee-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.23-30
    • /
    • 2017
  • Most superconducting magnets which generate more than 20 T consist of nested magnets. A combination of LTS and HTS magnets is conventionally used, but high field magnets which use only HTS magnets have been developed recently. As HTS wires have very strong magnetic anisotropy, appropriate techniques should be used to consider this effect properly. The load line method has been conventionally used to design nested magnets for high field generation. Because this method considers only parallel and perpendicular magnetic fields, the effect of their orientation is not taken into account. In this paper, the actual orientation of the magnetic fields from 0 to 90 degrees is considered. The critical currents of the two kinds of high field nested magnets designed using the proposed method are calculated. The finite element method is used to calculate the distribution of the magnetic fields and the evolution strategy is used to find the critical current which maximizes the central magnetic field.

A Window-Based DVS Algorithm for MPEG Player (MPEG 동영상 재생기를 위한 윈도우 기반 동적 전압조절 알고리즘)

  • Seo, Young-Sun;Park, Kyung-Hwan;Baek, Yong-Gyu;Cho, Jin-Sung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.11
    • /
    • pp.517-526
    • /
    • 2008
  • As the functionality of portable devices arc being enhanced and the performance is being greatly improved, power dissipations of battery driven portable devices are being increased. So, an efficient power management for reducing their power consumption is needed. In this paper, we propose a window-based DVS algorithm for MPEG Player. The proposed algorithm maintains the recently frame information and execution time received from MPEG player in window queue and dynamically adjusts (frequency, voltage) level based on window queue information. Our algorithm can be implemented in the common multimedia player as a module. We employed well-known MPlayer for the measurement of performance. The experimental result shows that the proposed algorithm reduces energy consumption by 56% on maximal performance.

A Framework for Time Awareness System in the Internet of Things (사물인터넷에서 시각 정보 관리 체계)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1069-1073
    • /
    • 2016
  • The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications and covers a variety of protocols, domains, and applications. Key system-level features that IoT needs to support can be summarized as device heterogeneity, scalability, ubiquitous data exchange through proximity wireless technologies, energy optimized solutions, localization and tracking capabilities, self-organization capabilities, semantic interoperability and data management, embedded security and privacy-preserving mechanisms. Time information is a critical piece of infrastructure for any distributed system. Time information and time synchronization are also fundamental building blocks in the IoT. The IoT requires new paradigms for combining time and data. This paper reviews conventional time keeping mechanisms in the Internet and presents issues to be considered for combining time and data in the IoT.

A Study on Implementation of the Push System Based on FCM Service Inducing Communication of Candidates and Influence on Voters: Using Smart Devices Application (FCM 서비스를 이용한 후보자 소통 유도 푸시 시스템의 구현과 유권자에게 미치는 영향에 관한 연구 : 스마트 디바이스 어플리케이션을 활용하여)

  • Lee, Seungwon;Lee, Ook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.454-463
    • /
    • 2017
  • Advancement of science and technology have led to development of the media, which has evolved election campaign strategies. Nowadays, media development has made communication more important, and it is a growing trend where smart-device applications are widely used to facilitate communication with electors. Based on Google's Fire base Cloud Messaging (FCM) push service, which keeps up with the fast-changing election trends and supports election campaigns systematically, this research aims to help accomplish the goals of an election campaign by developing an information system and performing empirical analysis of the variables that the information system affects. The system consists of an elector's application and a management system. The management system includes browsing and management of received-and sent-message history, and direct management of the application. By managing the push system in more progressive ways, this system will help to improve the effectiveness of election campaigns and accomplish election goals.

A Study on Risk Analysis and Countermeasures of Electronic Financial Fraud (전자금융사기 위험 분석과 대응방안에 관한 연구)

  • Jeong, Dae Yong;Kim, Gibum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.115-128
    • /
    • 2017
  • The methods of electronic financial fraud continue to evolve. Various research and countermeasures have been proposed to counter this problem, but it is difficult to eradicate it. The purpose of this study is to analyze the risk of electronic financial fraud through MS Threat Risk Modeling and to propose the countermeasures against the electronic financial fraud. As a result of the analysis, it is confirmed that despite the difference of authentication methods, there is a high risk of pharming, and it is difficult to prevent attack by using only additional authentication means, device security or user authentication based security system. Therefore, this study suggests the introduction of preventive measures such as readjustment of transaction limit by security means, account authentication, and additional physical security measures. It also suggests the establishment and implementation of a comprehensive electronic financial fraud prevention policy through linkage of electronic fraud prevention system and improvement of public relations and user awareness.

디지털미디어 시대의 시각디자인 교육시스템 연구

  • 정봉금
    • Archives of design research
    • /
    • v.16 no.3
    • /
    • pp.341-350
    • /
    • 2003
  • The topic of 21st century's culture is the appearance of digital media. It made changes as big as the industrial revolution, and our society is now ruled by the digital media. The main objective of this study is to forecast the direction of current visual design education by researching and analyzing how the introduction of digital media is influencing the evolution of visual design's identity, which is an ever changing and developing science. Also, since the rain target of digital media is the young generation, the change in the method of expressing visual language is inevitable In fact, there have been a lot of changes in the methods of creating and distributing visual communication due to the introduction of digital media. In the past, most educational institutions of design had similar objectives, curriculums and teaching methods to provide education that prepares students for practical business. However, in this digital media era, the application and utilization of visual design are uncomparably diversified, and it is generally classified as interaction. The purpose of this study is to find a wat to train visual design professionals in this digital era. For this purpose, this study will identify a new educational system that fulfills the demands of this society by fusing the traditional education and the new digital education, and will suggest what an design education institute that is ahead of the demands of society should be like.

  • PDF

A Design Technique of Meta-Model for Reengineering from Legacy to CBD (레거시로부터 CBD로의 재공학을 위한 메타 모델 설계 기법)

  • Kim Chul-Jin;Cho Eun-Sook
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.3
    • /
    • pp.398-412
    • /
    • 2005
  • There is an increasing interest in migration legacy systems to new hardware platforms and to new software development paradigms. The reason is that high maintenance costs and lack of documentation. In order to migrate or transform legacy system, various approaches such as screen scrapping, wrapping, semi-development, and re-development, tools, and methodologies are introduced until now. However, architecture or requirements level's transformation is not suggested because most of those approaches focus on code-level transformation or a few model-level transform. In this paper, we suggest a meta-model driven approach applying 3D space concept, which can be applied into architecture and requirement phase. Proposed integrated model drives seamless migration or co-evolution from code to architecture of reverse engineering and from architecture to code of forward engineering.

  • PDF

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.

Applying the AHP approach to evaluate Mobile Commerce Environment (AHP 기법을 이용한 모바일 상거래 환경의 평가)

  • Oh, Gi-Oug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2308-2314
    • /
    • 2006
  • Internet Technology allowed general commerce to have proceeded actively, and now it is sharply evolving into Mobile Commerce. Mobile Commerce came into an inheritance of the Electronic Commerce, thought the feature to be different form is various as well. Many researches that analyzed the feature of Electronic Commerce were carried out but those were processed according to its location and field only. This study extracted and analyzed the factor that considered the several positions for Mobile Commerce so that it can reflect diverse the demands from those related to Mobile Commerce. It sought the new characteristic which is different from the Electronic Commerce, and took account of the successful factor for Mobile Commerce which includes the position in a user, a developer and an operator. In addition AHP (Analytics Hierarchy Process) was used in order to evaluate the subject characteristic applied to each related to through more objective methods. The analysis results identified in this study such as the quality trust and understandability for an information duality might be the one of the chief elements of success in Mobile Commerce which applies at the present.

A Visual Programming Tool for Constructing Object-Oriented C++ Class (객체 지향 C++클래스 생성을 위한 시각 프로그래밍 도구)

  • Ha, Su-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.1
    • /
    • pp.23-33
    • /
    • 1995
  • This paper describes a visual programming tool which provides novice programmer as well expert with the abilites to capture real physical world of problem domain and to manipulate it user-friendly using icons and symbols. Therefore, novice can understand object-oriented features of C++ incrementally and construct classes easily. For this, we introduce some visual metaphors which are displayed as tables. The tables can not only represent objects and classes, but also be considered themselves as icons. We have named these tables as table-icons. Three levels of table-icons(i.e., Super Table-Icons, Intermediate Table-Icons and Detailed Table-Icons) are proposed to follow up appropriate evolution of object-oriented concepts. Table-icons are not simple pictographs but are activated and expanded to table forms. And then, developer can inset necessary entities into table body and delete useless entities from it. These table-icons are applied to a diagramming technique, C++gram[18], which is suggested for designing and implementing C++ programs.

  • PDF