• Title/Summary/Keyword: Application Function

Search Result 5,364, Processing Time 0.04 seconds

A Study on the Location and Landscaping Characteristics of Yonghogugok of Jiri Mountain Illuminated by Old Literatures and Letters Carved on the Rocks (고문헌과 바위글씨로 조명한 지리산 용호구곡(龍湖九曲)의 입지 및 경관특성)

  • Rho, Jae-Hyun;Kahng, Byung-Seon
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.32 no.3
    • /
    • pp.154-167
    • /
    • 2014
  • The results of this study conducted to identify the substance, regional characteristics or landscaping of Namwon Yonghogugok, which is the only valley of Jiri Mountain, based on Kim Samun's 'Yonghokugok-Gyeongseungannae(龍湖九曲景勝案內)', 'Yongseongji(龍城誌)' and position, meaning of letters carved and projection technique by ArcGIS10.0 on the rocks are as below. The feature landscapes of the canyon of Yonghogugok, which is an incised meander and one of the Eight beautiful scenery of Namwon, ponds, cliffs and rocks generated with metamorphic rocks and granites weathered by rapids torrents. As a result of measuring the GPS coordinates of the letters carved on the rocks, excluding the 3 Gok Hakseoam and the distances based on the origin and destination of the letters carved on the rocks using the API(Application Programming Interface) function of Daum map, the total distance of Yonghogugok was 3.5km and the average distance between the each Gok was 436.5m. It is assumed that Yonghogugok was designated by Sarim(士林) of the Kiho School(畿湖學派) related to Wondong Hyangyak(元洞鄕約) which is the main agent of Yonghojeongsa(龍湖精舍), the forerunner of Yonghoseowon(龍湖書院), between the late Joseon Dynasty and the early Japanese colonial era, in 1927. Its grounds are the existence of Yonghoyeongdang mentioned on 'Yonghojeongsilgi'(龍湖亭實記), records of 'Haeunyugo(荷隱遺稿)', 'Yonghopumje(龍湖品題)' of Bulshindang(佛神堂), 'Yonghojeongsadonggu Gapjachun(龍湖精舍洞口 甲子春)' letters carved on the rocks and 'Yonghogugok-Shipyeong(龍湖九曲十詠)' posted on Mokgandang of Yonghoseowon. Comprehensively considering the numerous poetry society lists carved on the stone wall of Punghodae(風乎臺), the Sixth Gok Yuseondae, its stone mortar, 'Bangjangjeildongcheon(方丈第一洞天)' of Bulshindang and Gyoryongdam(交龍潭), the Yonghoseokmun(龍湖石門) letters carved on the rocks, Yeogungseok adjacent to the First Gok and Fengshui facilities, centered on Yonghoseowon and Yonghojeong, Yonghogugok can be understood as a unique valley culture formed with the thoughts of Confucianism, Buddhism, Taoism and Fengshui. 'Yonghogugok-Gyeongseungannae' provides very useful information to understand the place name, called by locals and landscaping aspects of Yonghogugok in the late Joseon Dynasty. In addition, the meaning of "Nine dragons" and even though 12 chu(湫: pond) of Yonghogugok Yongchudong including Bulyeongchu, Guryongchu, Isuchu, Goieumchu and Daeyachu are mentioned on Yongseongji, a part of them cannot be confirmed now. Various place names and facilities relevant to Guryong adjacent to Yonghogugok are the core of the place identity. In addition, the accurate location identification and the delivery of the landscaping significance of the 12 ponds is expected to provide landscaping attractiveness of Yonghogugok and become very useful contents for landscaping storytelling and a keyword of storyboard.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

A Study on the Component-based GIS Development Methodology using UML (UML을 활용한 컴포넌트 기반의 GIS 개발방법론에 관한 연구)

  • Park, Tae-Og;Kim, Kye-Hyun
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.2 s.6
    • /
    • pp.21-43
    • /
    • 2001
  • The environment to development information system including a GIS has been drastically changed in recent years in the perspectives of the complexity and diversity of the software, and the distributed processing and network computing, etc. This leads the paradigm of the software development to the CBD(Component Based Development) based object-oriented technology. As an effort to support these movements, OGC has released the abstract and implementation standards to enable approaching to the service for heterogeneous geographic information processing. It is also common trend in domestic field to develop the GIS application based on the component technology for municipal governments. Therefore, it is imperative to adopt the component technology considering current movements, yet related research works have not been made. This research is to propose a component-based GIS development methodology-ATOM(Advanced Technology Of Methodology)-and to verify its adoptability through the case study. ATOM can be used as a methodology to develop component itself and enterprise GIS supporting the whole procedure for the software development life cycle based on conventional reusable component. ATOM defines stepwise development process comprising activities and work units of each process. Also, it provides input and output, standardized items and specs for the documentation, detailed instructions for the easy understanding of the development methodology. The major characteristics of ATOM would be the component-based development methodology considering numerous features of the GIS domain to generate a component with a simple function, the smallest size, and the maximum reusability. The case study to validate the adoptability of the ATOM showed that it proves to be a efficient tool for generating a component providing relatively systematic and detailed guidelines for the component development. Therefore, ATOM would lead to the promotion of the quality and the productivity for developing application GIS software and eventually contribute to the automatic production of the GIS software, the our final goal.

  • PDF

Establishment of Valve Replacement Registry and Risk Factor Analysis Based on Database Application Program (데이터베이스 프로그램에 기반한 심장판막 치환수술 환자의 레지스트리 확립 및 위험인자 분석)

  • Kim, Kyung-Hwan;Lee, Jae-Ik;Lim, Cheong;Ahn, Hyuk
    • Journal of Chest Surgery
    • /
    • v.35 no.3
    • /
    • pp.209-216
    • /
    • 2002
  • Background: Valvular heart disease is still the most common health problem in Korea. By the end of the year 1999, there has been 94,586 cases of open heart surgery since the first case in 1958. Among them, 36,247 cases were acquired heart diseases and 20,704 of those had valvular heart disease. But there was no database system and every surgeon and physician had great difficulties in analysing and utilizing those tremendous medical resources. Therefore, we developed a valve registry database program and utilize it for risk factor analysis and so on. Material and Method: Personal computer-based multiuser database program was created using Microsoft AccessTM. That consisted of relational database structure with fine-tuned compact field variables and server-client architecture. Simple graphic user interface showed easy-to-use accessability and comprehensibility. User-oriented modular structure enabled easier modification through native AccessTM functions. Infinite application of query function aided users to extract, summarize, analyse and report the study result promptly. Result: About three-thousand cases of valve replacement procedure were performed in our hospital from 1968 to 1999. Total number of prosthesis replaced was 3,700. The numbers of cases for mitral, aortic and tricuspid valve replacement were 1600, 584, 76, respectively. Among them, 700 patients received prosthesis in more than two positions. Bioprosthesis or mechanical prosthesis were used in 1,280 and 1,500 patients respectively Redo valve replacements were performed in 460 patients totally and 40 patients annually Conclusion: Database program for registry of valvular heart disease was successfully developed and used in personal computer-based multiuser environment. This revealed promising results and perspectives in database management and utilization system.

Effects of a Lipid Mixture on Glucocorticoid-induced Barrier Impairment and Epidermal Atrophy in the Canine Skin (글루코코티코이드에 의해서 유발된 개 피부의 장벽기능이상과 위축에 대한 지질 혼합물의 효과)

  • Jin, Yeo-Won;Ahn, Mi-Ji;Ku, Sae-Kwang;Park, Hyun-Jeong;Lee, Keun-Woo;Oh, Tae-Ho
    • Journal of Veterinary Clinics
    • /
    • v.27 no.5
    • /
    • pp.522-532
    • /
    • 2010
  • The aims of the present study were to characterize the effect of glucocorticosteroids (GCs) on the normal canine skin and to evaluate the effect of a lipid mixture (LM), containing cholesterol, pseudoceramide, and free fatty acid, on the steroid-induced damaged skin of dogs. Five beagles were involved and the skin of the back of each dog was topically applied with four kinds of GCs twice daily for 28 days. LM was applied after that period of GCs application. Transepidermal water loss (TEWL), skin hydration, and skin pH were assessed during experimental periods and histopathological evaluation was performed. TEWL was significantly increased, with a maximum increase obtained on day 28 (p < 0.01). Skin pH was significantly decreased, with a maximum decrease obtained on day 28 (p < 0.01). Skin surface hydration was significantly increased on day 3, but values of skin hydration were progressively decreased and finally reached those of baseline. In histology, as results of steroid application, losses of keratin layers in the stratum corneum and edematous changes in the upper parts of dermis, and consequently, thickness of the epidermis and the stratum corneum were decreased. In addition, the numbers of hair follicles were markedly decreased in steroid control as compared to intact control. However, these skin atrophic changes were markedly inhibited by treatment of LM as compared with steroid control in the present study. Moreover, all biophysical parameters were reached to the baseline after LM treatment. These results showed that the topically applied GCs induced skin barrier impairment and a LM should be effective on repair of disturbed skin barrier function in dogs. Therefore, it is concluded that a LM tested in the present study is expected to treat the steroid-induced skin damages.

Techniques for Acquisition of Moving Object Location in LBS (위치기반 서비스(LBS)를 위한 이동체 위치획득 기법)

  • Min, Gyeong-Uk;Jo, Dae-Su
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.885-896
    • /
    • 2003
  • The typws of service using location Information are being various and extending their domain as wireless internet tochnology is developing and its application par is widespread, so it is prospected that LBS(Location-Based Services) will be killer application in wireless internet services. This location information is basic and high value-added information, and this information services make prior GIS(Geographic Information System) to be useful to anybody. The acquisition of this location information from moving object is very important part in LBS. Also the interfacing of acquisition of moving object between MODB and telecommunication network is being very important function in LBS. After this, when LBS are familiar to everybody, we can predict that LBS system load is so heavy for the acquisition of so many subscribers and vehicles. That is to say, LBS platform performance is fallen off because of overhead increment of acquiring moving object between MODB and wireless telecommunication network. So, to make stable of LBS platform, in this MODB system, acquisition of moving object location par as reducing the number of acquisition of unneccessary moving object location. We study problems in acquiring a huge number of moving objects location and design some acquisition model using past moving patternof each object to reduce telecommunication overhead. And after implementation these models, we estimate performance of each model.

Synthetic Application of Seismic Piezo-cone Penetration Test for Evaluating Shear Wave Velocity in Korean Soil Deposits (국내 퇴적 지반의 전단파 속도 평가를 위한 탄성파 피에조콘 관입 시험의 종합적 활용)

  • Sun, Chang-Guk;Kim, Hong-Jong;Jung, Jong-Hong;Jung, Gyung-Ja
    • Geophysics and Geophysical Exploration
    • /
    • v.9 no.3
    • /
    • pp.207-224
    • /
    • 2006
  • It has been widely known that the seismic piezo-cone penetration test (SCPTu) is one of the most useful techniques for investigating the geotechnical characteristics such as static and dynamic soil properties. As practical applications in Korea, SCPTu was carried out at two sites in Busan and four sites in Incheon, which are mainly composed of alluvial or marine soil deposits. From the SCPTu waveform data obtained from the testing sites, the first arrival times of shear waves and the corresponding time differences with depth were determined using the cross-over method, and the shear wave velocity $(V_S)$ profiles with depth were derived based on the refracted ray path method based on Snell's law. Comparing the determined $V_S$ profile with the cone tip resistance $(q_t)$ profile, both trends of profiles with depth were similar. For the application of the conventional CPTu to earthquake engineering practices, the correlations between $V_S$ and CPTu data were deduced based on the SCPTu results. For the empirical evaluation of $V_S$ for all soils together with clays and sands which are classified unambiguously in this study by the soil behavior type classification index $(I_C)$, the authors suggested the $V_S-CPTu$ data correlations expressed as a function of four parameters, $q_t,\;f_s,\;\sigma'_{v0}$ and $B_q$, determined by multiple statistical regression modeling. Despite the incompatible strain levels of the downhole seismic test during SCPTu and the conventional CPTu, it is shown that the $V_S-CPTu$ data correlations for all soils, clays and sands suggested in this study is applicable to the preliminary estimation of $V_S$ for the soil deposits at a part in Korea and is more reliable than the previous correlations proposed by other researchers.

Hardware Approach to Fuzzy Inference―ASIC and RISC―

  • Watanabe, Hiroyuki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.975-976
    • /
    • 1993
  • This talk presents the overview of the author's research and development activities on fuzzy inference hardware. We involved it with two distinct approaches. The first approach is to use application specific integrated circuits (ASIC) technology. The fuzzy inference method is directly implemented in silicon. The second approach, which is in its preliminary stage, is to use more conventional microprocessor architecture. Here, we use a quantitative technique used by designer of reduced instruction set computer (RISC) to modify an architecture of a microprocessor. In the ASIC approach, we implemented the most widely used fuzzy inference mechanism directly on silicon. The mechanism is beaded on a max-min compositional rule of inference, and Mandami's method of fuzzy implication. The two VLSI fuzzy inference chips are designed, fabricated, and fully tested. Both used a full-custom CMOS technology. The second and more claborate chip was designed at the University of North Carolina(U C) in cooperation with MCNC. Both VLSI chips had muliple datapaths for rule digital fuzzy inference chips had multiple datapaths for rule evaluation, and they executed multiple fuzzy if-then rules in parallel. The AT & T chip is the first digital fuzzy inference chip in the world. It ran with a 20 MHz clock cycle and achieved an approximately 80.000 Fuzzy Logical inferences Per Second (FLIPS). It stored and executed 16 fuzzy if-then rules. Since it was designed as a proof of concept prototype chip, it had minimal amount of peripheral logic for system integration. UNC/MCNC chip consists of 688,131 transistors of which 476,160 are used for RAM memory. It ran with a 10 MHz clock cycle. The chip has a 3-staged pipeline and initiates a computation of new inference every 64 cycle. This chip achieved an approximately 160,000 FLIPS. The new architecture have the following important improvements from the AT & T chip: Programmable rule set memory (RAM). On-chip fuzzification operation by a table lookup method. On-chip defuzzification operation by a centroid method. Reconfigurable architecture for processing two rule formats. RAM/datapath redundancy for higher yield It can store and execute 51 if-then rule of the following format: IF A and B and C and D Then Do E, and Then Do F. With this format, the chip takes four inputs and produces two outputs. By software reconfiguration, it can store and execute 102 if-then rules of the following simpler format using the same datapath: IF A and B Then Do E. With this format the chip takes two inputs and produces one outputs. We have built two VME-bus board systems based on this chip for Oak Ridge National Laboratory (ORNL). The board is now installed in a robot at ORNL. Researchers uses this board for experiment in autonomous robot navigation. The Fuzzy Logic system board places the Fuzzy chip into a VMEbus environment. High level C language functions hide the operational details of the board from the applications programme . The programmer treats rule memories and fuzzification function memories as local structures passed as parameters to the C functions. ASIC fuzzy inference hardware is extremely fast, but they are limited in generality. Many aspects of the design are limited or fixed. We have proposed to designing a are limited or fixed. We have proposed to designing a fuzzy information processor as an application specific processor using a quantitative approach. The quantitative approach was developed by RISC designers. In effect, we are interested in evaluating the effectiveness of a specialized RISC processor for fuzzy information processing. As the first step, we measured the possible speed-up of a fuzzy inference program based on if-then rules by an introduction of specialized instructions, i.e., min and max instructions. The minimum and maximum operations are heavily used in fuzzy logic applications as fuzzy intersection and union. We performed measurements using a MIPS R3000 as a base micropro essor. The initial result is encouraging. We can achieve as high as a 2.5 increase in inference speed if the R3000 had min and max instructions. Also, they are useful for speeding up other fuzzy operations such as bounded product and bounded sum. The embedded processor's main task is to control some device or process. It usually runs a single or a embedded processer to create an embedded processor for fuzzy control is very effective. Table I shows the measured speed of the inference by a MIPS R3000 microprocessor, a fictitious MIPS R3000 microprocessor with min and max instructions, and a UNC/MCNC ASIC fuzzy inference chip. The software that used on microprocessors is a simulator of the ASIC chip. The first row is the computation time in seconds of 6000 inferences using 51 rules where each fuzzy set is represented by an array of 64 elements. The second row is the time required to perform a single inference. The last row is the fuzzy logical inferences per second (FLIPS) measured for ach device. There is a large gap in run time between the ASIC and software approaches even if we resort to a specialized fuzzy microprocessor. As for design time and cost, these two approaches represent two extremes. An ASIC approach is extremely expensive. It is, therefore, an important research topic to design a specialized computing architecture for fuzzy applications that falls between these two extremes both in run time and design time/cost. TABLEI INFERENCE TIME BY 51 RULES {{{{Time }}{{MIPS R3000 }}{{ASIC }}{{Regular }}{{With min/mix }}{{6000 inference 1 inference FLIPS }}{{125s 20.8ms 48 }}{{49s 8.2ms 122 }}{{0.0038s 6.4㎲ 156,250 }} }}

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Development and Evaluation of Model-based Predictive Control Algorithm for Effluent $NH_4-N$ in $A^2/O$ Process ($A^2/O$ 공정의 유출수 $NH_4-N$에 대한 모델기반 예측 제어 알고리즘 개발 및 평가)

  • Woo, Dae-Joon;Kim, Hyo-Soo;Kim, Ye-Jin;Cha, Jae-Hwan;Choi, Soo-Jung;Kim, Min-Soo;Kim, Chang-Won
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.33 no.1
    • /
    • pp.25-31
    • /
    • 2011
  • In this study, model-based $NH_4-N$ predictive control algorithm by using influent pattern was developed and evaluated for effective control application in $A^2/O$ process. A pilot-scale $A^2/O$process at S wastewater treatment plant in B city was selected. The behaviors of organic, nitrogen and phosphorous in the biological reactors were described by using the modified ASM3+Bio-P model. A one-dimensional double exponential function model was selected for modeling of the secondary settlers. The effluent $NH_4-N$ concentration on the next day was predicted according to model-based simulation by using influent pattern. After the objective effluent quality and simulation result were compared, the optimal operational condition which able to meet the objective effluent quality was deduced through repetitive simulation. Next the effluent $NH_4-N$ control schedule was generated by using the optimal operational condition and this control schedule on the next day was applied in pilot-scale $A^2/O$ process. DO concentration in aerobic reactor in predictive control algorithm was selected as the manipulated variable. Without control case and with control case were compared to confirm the control applicability and the study of the applied $NH_4-N$control schedule in summer and winter was performed to confirm the seasonal effect. In this result, the effluent $NH_4-N$concentration without control case was exceeded the objective effluent quality. However the effluent $NH_4-N$ concentration with control case was not exceeded the objective effluent quality both summer and winter season. As compared in case of without predictive control algorithm, in case of application of predictive control algorithm, the RPM of air blower was increased about 9.1%, however the effluent $NH_4-N$ concentration was decreased about 45.2%. Therefore it was concluded that the developed predictive control algorithm to the effluent $NH_4-N$ in this study was properly applied in a full-scale wastewater treatment process and was more efficient in aspect to stable effluent.