• Title/Summary/Keyword: 특성정보 파일

Search Result 550, Processing Time 0.033 seconds

Designing 3D Antenna Pattern using Target's RCS Pattern (RCS 패턴을 이용한 3차원 안테나 패턴 디자인)

  • Park, Tae-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.194-196
    • /
    • 2022
  • When electromagnetic wave transmitted from the radar antenna hits the target, a specific type of electric field is formed according to the electrical characteristics and appearance of the target, which is called an RCS pattern. There are various commercial programs that calculate the RCS of the target and plot the RCS pattern. For the analysis of large targets such as warships or ships, a program with a high frequency analysis method, which has a faster calculation speed than the low frequency analysis method is suitable. XGTD, a high-frequency analysis program, can quickly plot a two-dimensional RCS pattern for 360 degrees of a target, but a three-dimensional RCS pattern cannot be obtained. In this paper, it is proposed that a method of plotting two-dimensional RCS patterns of a target from various angles using XGTD, generating a three-dimensional RCS pattern using this, and converting it into a three-dimensional antenna pattern file.

  • PDF

Evaluation of Deformation Characteristics and Vulnerable Parts according to Loading on Compound Behavior Connector (복합거동연결체의 하중재하에 따른 변형 특성 및 취약부위 산정)

  • Kim, Ki-Sung;Kim, Dong-wook;Ahn, Jun-hyuk
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.524-530
    • /
    • 2019
  • Purpose: In this paper, we construct a detailed three-dimensional interface element using a three-dimensional analysis program, and evaluate the composite behavior stability of the connector by applying physical properties such as the characteristics of general members and those of reinforced members Method: The analytical model uses solid elements, including non-linear material behavior, to complete the modeling of beam structures, circular flanges, bolting systems, etc. to the same dimensions as the design drawing, with each member assembled into one composite behavior linkage. In order to more effectively control the uniformity and mesh generation of other element type contact surfaces, the partitioning was performed. Modeled with 50 carbon steel materials. Results: It shows the displacement, deformation, and stress state of each load stage by the contact adjoining part, load loading part, fixed end part, and vulnerable anticipated part by member, and after displacement, deformation, The effect of the stress distribution was verified and the validity of the design was verified. Conclusion: Therefore, if the design support of the micro pile is determined based on this result, it is possible to identify the Vulnerable Parts of the composite behavior connector and the degree of reinforcement.

Design and Implementation of a Backup System for Object based Storage Systems (객체기반 저장시스템을 위한 백업시스템 설계 및 구현)

  • Yun, Jong-Hyeon;Lee, Seok-Jae;Jang, Su-Min;Yoo, Jae-Soo;Kim, Hong-Yeon;Kim, Jun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.1
    • /
    • pp.1-17
    • /
    • 2008
  • Recently, the object based storage devices systems(OSDs) have been actively researched. They are different from existing block based storage systems(BSDs) in terms of the storage unit. The storage unit of the OSDs is an object that includes the access methods, the attributes of data, the security information, and so on. The object has no size limit and no influence on the internal storage structures. Therefore, the OSDs improve the I/O throughput and the scalability. But the backup systems for the OSDs still use the existing backup techniques for the BSDs. As a result, they need much backup time and do not utilize the characteristics of the OSDs. In this paper, we design and implement a new object based backup system that utilizes the features of the OSDs. Our backup system significantly improves the backup time over existing backup systems because the raw objects are directly transferred to the backup devices in our system. It also restores the backup data much faster than the existing systems when system failures occur. In addition, it supports various types of backup and restore requests.

Distribute Intelligent Multi-Agent Technology for User Service in Ubiquitous Environment (유비쿼터스 환경의 사용자 서비스를 위한 분산 지능형 에이전트 기술)

  • Choi, Jung-Hwa;Choi, Yong-June;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.9
    • /
    • pp.817-827
    • /
    • 2007
  • In the age of ubiquitous environment, huge number of devices and computing services are provided to users. Personalized service, which is modeled according to the character of each and every individual is of particular need. In order to provide various dynamic services according to user's movement, service unit and operating mode should be able to operate automatically with minimum user intervention. In this paper, we discuss the steps of offering approximate service based on user's request in ubiquitous environment. First, we present our simulator designed for modeling the physical resource and computing object in smart space - the infrastructure in ubiquitous. Second, intelligent agents, which we developed based on a FIPA specification compliant multi-agent framework will be discussed. These intelligent agents are developed for achieving the service goal through cooperation between distributed agents. Third, we propose an automated service discovery and composition method in heterogeneous environment using semantic message communication between agents, according to the movement by the user interacting with the service available in the smart space. Fourth, we provide personalized service through agent monitoring anytime, anywhere from user's profile information stored on handhold device. Therefore, our research provides high quality service more than general automated service operation.

서비스 사용경험과 가입매체의 정보전달 풍부성이 하이테크 서비스에 대한 가입자의 초기이탈에 미치는 영향

  • Han, Sang-Pil;An, Jae-Hyeon;Lee, Dong-Ju
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.93-103
    • /
    • 2006
  • 소비자의 하이테크 서비스 가입 이후 행태를 살펴보면, 가입자들은 서비스를 실제로 사용하기도 전에 가입 해지결정을 내리기도 한다. 최근 미국의 기간통신회사에서 출시된 인터넷전화 서비스의 경우, 출시 후 1년 반 동안 이탈한 고객 중 무려 60%정도가 서비스를 실제로 사용하기 전 상태인 네트워크 및 시스템이 준비되는 동안이나 소비자가 가정에서 전화기 연결용 어댑터를 설치하는 단계에서 이탈한 것으로 나타났다. 이와 같은 가입초기 고객의 이탈은 기업에게 고객획득과정에서 지출된 마케팅비용의 손실 및 미래의 매출감소뿐만 아니라, 기 가입자를 통한 미래의 가입 희망자에게 미칠 수 있는 긍정적 구전효과와 같은 간접효과에 대한 손실을 의미한다. 하지만 하이테크 서비스에 대한 소비자의 가입 후 행태에 대한 기존연구는 고객불평 연구, 서비스 사용 후 발생하는 정상적 이탈행태(normal churn)에 대한 연구, 또는 탐색적 연구를 제외하면 매우 부족하다. 더욱이 하이테크서비스의 특성을 고려한 서비스 출시초기에 소비자의 가입직후 해지결정에 대한 결정요인 연구는 그 필요성에 비해 연구가 전무하다시피한 실정이다. 본 연구에서는 하이테크 서비스에 대한 소비자의가입시점과 실제 사용시점 사이에 발생하는 소비자의 이탈행태를 이탈시점에 따라 '가입직후 이탈(immediate churn)' 과 '가입 후 이탈(earlychurn)'로 정의한 후, 특히 가입직후 고객의 이탈행태를 설명하기 위해 하이테크 서비스에 대한 소비자의 이전 사용경험정도와 서비스에 대한 정보를 획득한 채널의 정보전달 풍부성 등을 연구모형에 포함하였다. 이 기간 동안에 기업은 서비스 제공에 필요한 부수적인 기기 제공 및 서비스 준비 등을 수행하지만, 동시에 소비자는 여러가지 이유로 가입결정을 제고할 수도 있게 된다. 제안된 연구모형에 대한 실증분석을 위해 미국 유수의 기간통신회사에서 2004년 출시된 인터넷전화(Voice over Internet Protocol: VoIP)서비스에 가입한 12,000여명 의 고객 프로파일과 서비스사용 데이터를 활용하였다. 분석결과 가입자의 하이테크 서비스에 대한 사용경험정도가 낮을수록 서비스 가입직후 바로 해지하는 경향을 보였다. 하지만 하이테크 서비스에 대한 이전 사용경험이 낮은 경우라도, 가입 후서비스를 실제로 사용하였다면 서비스에 대한 가입해지 경향은 더 이상 나타나지 않았다. 이는 가입자의 하이테크 서비스에 대한 이전 사용경험정도가 가입직후 해지에만 영향을 미치는 요인임을 보여준다. 또한 매체의 정보전달 풍부성 (media richness)이 상대적으로 높은 소매점이나 웹사이트를 통해 서비스에 가입한 소비자일수록 가입 직후뿐만 아니라 서비스사용 이후에도 낮은 해지성향을 나타냈다. 이러한 분석결과를 바탕으로 인터넷전화 서비스에 적합한 고객지원 프로그램 설계와 마케팅 매체선정과 관련한 전략적 시사점을 도출한다. 그리고 국내에서 최근 이슈가 되고 있는 차세대 무선인터넷 서비스인 와이브로 출시에 따른 마케팅 및 고객관리와 관련된 시사점을 논의한다.

  • PDF

Research on Touch Function capable of Real-time Response in Low-end Embedded System (저사양 임베디드 시스템에서의 실시간 응답이 가능한 터치 기능 연구)

  • Lee, Yong-Min;Han, Chang Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.37-41
    • /
    • 2021
  • This paper presents a study to implement a touch screen capable of real-time response processing in a low-end embedded system. This was done by introducing an algorithm using an interpolation method to represent real-time response characteristics when a touch input is performed. In this experiment, we applied a linear interpolation algorithm that estimates random data by deriving a first-order polynomial from 2-point data. We also applied a Lagrange interpolation algorithm that estimates random data by deriving a quadratic polynomial from 3-point data. As a result of the experiment, it was found that the Lagrange interpolation method was more complicated than the linear interpolation method, and the processing speed was slow, so the text was not smooth. When using the linear interpolation method, it was confirmed that the speed displayed on a screen is 2.4 times faster than when using the Lagrange interpolation method. For real-time response characteristics, it was confirmed that smaller size of the executable file of the algorithm is more advantageous than the superiority of the algorithm itself. In conclusion, in order to secure real-time response characteristics in a low-end embedded system, it was confirmed that a relatively simple linear interpolation algorithm performs touch operations with better real-time response characteristics than the Lagrange interpolation method.

A Study on the Characteristics of Non-Fungible Token(NFT) and Application Plans from the Digital Records Perspective : Focused on Transferable Records (전자기록 관점에서 본 대체 불가능한 토큰(NFT) 특성 및 활용 방안 이전 및 거래 가능한 기록을 중심으로)

  • Won, Joo-hye;So, Hyeon-Gi;Oh, Hyo-Jung
    • The Korean Journal of Archival Studies
    • /
    • no.73
    • /
    • pp.47-79
    • /
    • 2022
  • NFT is literally a 'non-fungible token', a digital file that records specific virtual assets on a blockchain. Events such as ownership of the asset and transaction history are recorded on the blockchain through the token transaction, so counterfeiting and falsification are impossible. Therefore, NFT is used as a tool that can uniquely represent a specific virtual asset. The main purpose of this paper is to examine the characteristics of NFT from a records management point of view and to find ways to use them, and focuses on digital records that have the characteristics of assets as digital works. For this purpose, we first examine the basic concept of NFT and the principle of ownership and proof of value as an asset for digital works. In addition, it was confirmed how the advantages of NFT were applied through NFT use cases in various fields, and in particular, areas related to audio-visual records such as art, music, sports, and fashion were focused on. Furthermore, by comparing the characteristics of digital records with those of NFT, factors applicable to electronic records were identified. Finally, the types of digital records that are expected to be effective in the application of NFT were identified, and the possibility of their use and discussion points for introduction in records management are presented.

UX Methodology Study by Data Analysis Focusing on deriving persona through customer segment classification (데이터 분석을 통한 UX 방법론 연구 고객 세그먼트 분류를 통한 페르소나 도출을 중심으로)

  • Lee, Seul-Yi;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.151-176
    • /
    • 2021
  • As the information technology industry develops, various kinds of data are being created, and it is now essential to process them and use them in the industry. Analyzing and utilizing various digital data collected online and offline is a necessary process to provide an appropriate experience for customers in the industry. In order to create new businesses, products, and services, it is essential to use customer data collected in various ways to deeply understand potential customers' needs and analyze behavior patterns to capture hidden signals of desire. However, it is true that research using data analysis and UX methodology, which should be conducted in parallel for effective service development, is being conducted separately and that there is a lack of examples of use in the industry. In thiswork, we construct a single process by applying data analysis methods and UX methodologies. This study is important in that it is highly likely to be used because it applies methodologies that are actively used in practice. We conducted a survey on the topic to identify and cluster the associations between factors to establish customer classification and target customers. The research methods are as follows. First, we first conduct a factor, regression analysis to determine the association between factors in the happiness data survey. Groups are grouped according to the survey results and identify the relationship between 34 questions of psychological stability, family life, relational satisfaction, health, economic satisfaction, work satisfaction, daily life satisfaction, and residential environment satisfaction. Second, we classify clusters based on factors affecting happiness and extract the optimal number of clusters. Based on the results, we cross-analyzed the characteristics of each cluster. Third, forservice definition, analysis was conducted by correlating with keywords related to happiness. We leverage keyword analysis of the thumb trend to derive ideas based on the interest and associations of the keyword. We also collected approximately 11,000 news articles based on the top three keywords that are highly related to happiness, then derived issues between keywords through text mining analysis in SAS, and utilized them in defining services after ideas were conceived. Fourth, based on the characteristics identified through data analysis, we selected segmentation and targetingappropriate for service discovery. To this end, the characteristics of the factors were grouped and selected into four groups, and the profile was drawn up and the main target customers were selected. Fifth, based on the characteristics of the main target customers, interviewers were selected and the In-depthinterviews were conducted to discover the causes of happiness, causes of unhappiness, and needs for services. Sixth, we derive customer behavior patterns based on segment results and detailed interviews, and specify the objectives associated with the characteristics. Seventh, a typical persona using qualitative surveys and a persona using data were produced to analyze each characteristic and pros and cons by comparing the two personas. Existing market segmentation classifies customers based on purchasing factors, and UX methodology measures users' behavior variables to establish criteria and redefine users' classification. Utilizing these segment classification methods, applying the process of producinguser classification and persona in UX methodology will be able to utilize them as more accurate customer classification schemes. The significance of this study is summarized in two ways: First, the idea of using data to create a variety of services was linked to the UX methodology used to plan IT services by applying it in the hot topic era. Second, we further enhance user classification by applying segment analysis methods that are not currently used well in UX methodologies. To provide a consistent experience in creating a single service, from large to small, it is necessary to define customers with common goals. To this end, it is necessary to derive persona and persuade various stakeholders. Under these circumstances, designing a consistent experience from beginning to end, through fast and concrete user descriptions, would be a very effective way to produce a successful service.

The Development of a beam profile monitoring system for improving the beam output characteristics (빔 출력 특성 개선을 위한 빔 프로파일 모니터링 시스템 개발)

  • An, Young-jun;Hur, Min-goo;Yang, Seung-dae;Shin, Dae-seob;Lee, Dong-hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2689-2696
    • /
    • 2015
  • Radioactive isotopes which are manufactured using a cyclotron in a radioisotope used for radiation diagnosis is affected by the production yield according to size and shape of the beam and beam uniform degree from irradiated location when the proton beam investigated the target by cyclotron. Therefore, in this paper developed the BPM(Beam Profile Monitor) device capable of measuring the beam cross-section at the cyclotron beam line. It was configured so as to be able to remote control the BPM device in LabView and used the BPM program it was to be able to easily monitor and display to analyze the graph of two-dimensional graph and a three-dimensional beam distribution numerical information of the beam obtained while scanning the tungsten wire to the X and Y axis. The time it takes to measure the beam can be confirmed 37seconds when step motor driving speed was 2000pps. Through a beam readjusted based on the measured beam distribution information by optimizing the beam distribution it can be made to maximize the RI production yield and contribute supply stabilization.

Trajectory Index Structure based on Signatures for Moving Objects on a Spatial Network (공간 네트워크 상의 이동객체를 위한 시그니처 기반의 궤적 색인구조)

  • Kim, Young-Jin;Kim, Young-Chang;Chang, Jae-Woo;Sim, Chun-Bo
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.3
    • /
    • pp.1-18
    • /
    • 2008
  • Because we can usually get many information through analyzing trajectories of moving objects on spatial networks, efficient trajectory index structures are required to achieve good retrieval performance on their trajectories. However, there has been little research on trajectory index structures for spatial networks such as FNR-tree and MON-tree. Also, because FNR-tree and MON-tree store the segment unit of moving objects, they can't support the trajectory of whole moving objects. In this paper, we propose an efficient trajectory index structures based on signatures on a spatial network, named SigMO-Tree. For this, we divide moving object data into spatial and temporal attributes, and design an index structure which supports not only range query but trajectory query by preserving the whole trajectory of moving objects. In addition, we divide user queries into trajectory query based on spatio-temporal area and similar-tralectory query, and propose query processing algorithms to support them. The algorithm uses a signature file in order to retrieve candidate trajectories efficiently Finally, we show from our performance analysis that our trajectory index structure outperforms the existing index structures like FNR-Tree and MON-Tree.

  • PDF