• Title/Summary/Keyword: Capacity of use

Search Result 3,259, Processing Time 0.029 seconds

Automation of BIM Material Mapping to Activate Virtual Construction (가상건설 활성화를 위한 BIM 재질 매핑 자동화 기술)

  • Seo, Myoung Bae
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.107-115
    • /
    • 2020
  • Recently, BIM has become mandatory in the construction field, research on various use cases is increasing. In particular, when virtual reality technology, one of the core technologies of the 4th industrial revolution, and BIM are combined, it can be used in various fields such as preliminary design review and construction simulation. Until now, however, virtual reality grafting technology is only used as a simple prototype or as a model house. Also, it is difficult to activate virtual construction because it is expensive to produce high-quality virtual reality contents. Therefore, in this paper, in order to increase the utilization and quality of the virtual construction field, a study was conducted to shorten the material mapping time, which takes a lot of time when producing virtual reality contents using BIM. To this end, object properties were assigned to enable material mapping in the BIM model, and materials most used in the construction field were configured, and automated material function development and final tests were conducted that automatically map properties and materials. For the test, 10 models were used and the test was repeated three times, and the productivity improvement of about 50.16% was finally achieved. In the future, we plan to conduct research on physical data weight reduction based on the advanced material mapping automation function and the large-capacity BIM model.

An Investigation into the Equivalence of Three Pictures for Creative Story Writing: 'Dog Owners', 'Lost Dog', and 'Overslept' (창의적 이야기 작문용 세 그림의 동형 조사: 'Dog Owners,' 'Lost Dog,' 'Overslept')

  • Suh, Heejung;Bae, Jungok
    • Journal of Gifted/Talented Education
    • /
    • v.26 no.4
    • /
    • pp.699-719
    • /
    • 2016
  • Alternate pictures that are proven to be equivalent are in high demand to assess creative thinking and language skills. This study aimed to investigate the equivalence of three pictures ('Dog owners,' 'Lost Dog,' and 'Overslept') recently developed for use in a creative writing task. Middle school students (N=183) wrote a story in English based on one of the three prompts distributed randomly. Four writing features (fluency, syntactic complexity, lexical diversity, and temporality) were analyzed with Coh-Metrix and MANCOVA. The three prompts were largely equivalent in their capacity to detect differences among writers in all the features of writing. The difficulty levels of the three prompts, however, were not necessarily the same. Two prompts, Dog Owners and Lost Dog, were verified as equivalent prompts, and therefore, they are recommended as alternate forms to assess creative language skills in repeated measurements. The Overslept prompt had greater facility in eliciting diverse words and more temporal connectives in composing stories. The differential difficulty shown among the prompts suggests that the validity of using different picture versions in repeated assessment remains questionable unless those versions undergo equivalence verification.

Efficient Resource Allocation Schemes for Relay-based Cooperative Networks in 3GPP LTE-Advanced Systems (3GPP LTE-Advanced 시스템에서 릴레이 기반의 협력 네트워크를 위한 효율적인 자원할당 기법)

  • Kim, San-Hae;Yang, Mo-Chan;Lee, Je-Yeon;Shin, Yo-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.555-567
    • /
    • 2010
  • Unlike single-hop systems, multi-hop systems that use relay nodes assign a part of the overall resources to relay communications. If efficient resource allocation schemes are not adopted, this leads to a loss of resources. Moreover, because we may not be able to guarantee high-link performance due to the adjacent-cell interference in relay-based cellular systems, resource efficiency can be severely decreased. In this paper, we propose efficient resource allocation schemes for downlink relay-based networks in 3GPP (3rd Generation Partnership Project) LTE (Long Term Evolution)-Advanced systems. Unlike conventional schemes that have static resource regions for each data link, the proposed schemes dynamically allocate the resources of each link to resource blocks, by considering the channel state and the capacity of each link. We also propose resource overlapping schemes in which two different links overlap at the same resource region, so as to improve cell or user throughput performance. The proposed resource overlapping schemes do not require additional processes such as interference cancellation in users, thank to considering additional interference from resource overlapping in advance.

A Study on Room Assignment Considering Accessibility in a University Dormitory: A Case Study for University A (공용 공간의 접근성을 고려한 대학 기숙사 공실 배정에 관한 연구: A대학교를 중심으로)

  • Kim, Na Yeong;Lee, Jinho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.148-154
    • /
    • 2020
  • This study examines room assignments to improve accessibility in a university dormitory depending on the student grade, taking into account frequency of using a certain common space. An integer programming model is presented to minimize the total moving distance from the common space to the students' rooms for accessibility. The model also constrains the maximum capacity of a room, and disallows different grade students to be assigned to the same room. This model is similar to a facility location problem used widely in the supply chain management field. Applying our optimization model to a small group at the dormitory of Unversity A as the case study, our results indicate that lower grade students are assigned rooms closer to the common space due to their higher frequency of using that space to guarantee high accessibility. Moreover, if higher grade students are prioritized to select their rooms, we suggest an objective function that imposes a penalty in cases when lower grade students select rooms with priority. Based on the results obtained, we propose assigning rooms to students in a dormitory by considering their complex requirements and convenience to use the common space.

Mobile Cloud Context-Awareness System based on Jess Inference and Semantic Web RL for Inference Cost Decline (추론 비용 감소를 위한 Jess 추론과 시멘틱 웹 RL기반의 모바일 클라우드 상황인식 시스템)

  • Jung, Se-Hoon;Sim, Chun-Bo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.1
    • /
    • pp.19-30
    • /
    • 2012
  • The context aware service is the service to provide useful information to the users by recognizing surroundings around people who receive the service via computer based on computing and communication, and by conducting self-decision. But CAS(Context Awareness System) shows the weak point of small-scale context awareness processing capacity due to restricted mobile function under the current mobile environment, memory space, and inference cost increment. In this paper, we propose a mobile cloud context system with using Google App Engine based on PaaS(Platform as a Service) in order to get context service in various mobile devices without any subordination to any specific platform. Inference design method of the proposed system makes use of knowledge-based framework with semantic inference that is presented by SWRL rule and OWL ontology and Jess with rule-based inference engine. As well as, it is intended to shorten the context service reasoning time with mapping the regular reasoning of SWRL to Jess reasoning engine by connecting the values such as Class, Property and Individual which are regular information in the form of SWRL to Jess reasoning engine via JessTab plug-in in order to overcome the demerit of queries reasoning method of SparQL in semantic search which is a previous reasoning method.

Development and Application of Green Infrastructure Planning Framework for Improving Urban Water Cycle: Focused on Yeonje-Gu and Nam-Gu in Busan, Korea (도시물순환 개선을 위한 그린인프라 계획 프레임워크 개발 및 시범적용 - 부산시 연제구 및 남구를 대상으로 -)

  • Kang, JungEun;Lee, MoungJin;Koo, YouSeong;Cho, YeonHee
    • Journal of Environmental Policy
    • /
    • v.13 no.3
    • /
    • pp.43-73
    • /
    • 2014
  • Cities in Korea have rapidly urbanized and they are not well prepared for natural disasters which have been increased by climate change. In particular, they often struggle with urban flooding. Recently, green infrastructure has been emphasized as a critical strategy for flood mitigation in developed countries due to its capability to infiltrate water into the ground, provide the ability to absorb and store rainfall, and contribute to mitigating floods. However, in Korea, green infrastructure planning only focuses on esthetic functions or accessibility, and does not think how other functions such as flood mitigation, can be effectively realized. Based on this, we address this critical gap by suggesting the new green infrastructure planning framework for improving urban water cycle and maximizing flood mitigation capacity. This framework includes flood vulnerability assessment for identifying flood risk area and deciding suitable locations for green infrastructure. We propose the use of the combination of frequency ratio model and GIS for flood vulnerability assessment. The framework also includes the selection process of green infrastructure practices under local conditions such as geography, flood experience and finance. Finally, we applied this planning framework to the case study area, namely YeonJe-gu an Nam-gu in Busan. We expect this framework will be incorporated into green infrastructure spatial planning to provide effective decision making process regarding location and design of green infrastructure.

  • PDF

International Airfares and Application of Competition Laws (국제항공운임과 국내 경쟁법규의 적용)

  • Shin, Dong-Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.1
    • /
    • pp.93-125
    • /
    • 2011
  • The International Civil Aviation Convention (Chicago Convention) has been a backbone of international air transport system whereby air transport between States should be based on bilateral agreements, and in particular, international airfares, which are set up through IATA(International Air Transport Association) rate-fixing machinery could be approved by the governments concerned. International airfares are fares for transporting passenger and freight and their conditions between two or more countries. However, since U.S. pursued th deregulation policy in 1978 whereby routes, capacity and fares could be freely determined by airlines, many States have been following so called open-skies agreements. In many cases, aeronautical and competent authorities have been reviewing whether airlines' commercial activities including air fares could possibly conflict with free competition rules envisaged in relevant laws and regulations. As competition among airlines gets intense, airlines often resort to cooperation with other airlines in the forms such as equity exchange, M&A, code-sharing, fares consultation and resource pooling, mainly with a view to effectively use resources available and to avoid monopoly situation resulting from excessive and destructive competition among players. Whereas bearing in mind that application of competition laws is important to secure consumers' interests by preventing airlines's malpractices such as bargaining exorbitant fares, it is also important to comprehensively consider as many factors as possible, from that unilateral measure by governments may bring about retaliatory measures by the governments affected, to that airlines' cooperative practices may rather increase consumers' benefits by lowering air fares.

  • PDF

WebPR : A Dynamic Web Page Recommendation Algorithm Based on Mining Frequent Traversal Patterns (WebPR :빈발 순회패턴 탐사에 기반한 동적 웹페이지 추천 알고리즘)

  • Yoon, Sun-Hee;Kim, Sam-Keun;Lee, Chang-Hoon
    • The KIPS Transactions:PartB
    • /
    • v.11B no.2
    • /
    • pp.187-198
    • /
    • 2004
  • The World-Wide Web is the largest distributed Information space and has grown to encompass diverse information resources. However, although Web is growing exponentially, the individual's capacity to read and digest contents is essentially fixed. From the view point of Web users, they can be confused by explosion of Web information, by constantly changing Web environments, and by lack of understanding needs of Web users. In these Web environments, mining traversal patterns is an important problem in Web mining with a host of application domains including system design and Information services. Conventional traversal pattern mining systems use the inter-pages association in sessions with only a very restricted mechanism (based on vector or matrix) for generating frequent k-Pagesets. We develop a family of novel algorithms (termed WebPR - Web Page Recommend) for mining frequent traversal patterns and then pageset to recommend. Our algorithms provide Web users with new page views, which Include pagesets to recommend, so that users can effectively traverse its Web site. The main distinguishing factors are both a point consistently spanning schemes applying inter-pages association for mining frequent traversal patterns and a point proposing the most efficient tree model. Our experimentation with two real data sets, including Lady Asiana and KBS media server site, clearly validates that our method outperforms conventional methods.

Next-generation Vaccines for Infectious Viral Diseases (차세대 감염병 백신)

  • Sun-Woo Yoon
    • Journal of Life Science
    • /
    • v.33 no.9
    • /
    • pp.746-753
    • /
    • 2023
  • Viral infectious diseases have been regarded as one of the greatest threats to global public health. The recent coronavirus disease 2019 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2) is a stark reminder of the threat posed by emerging viral infections. Developing and producing appropriate and efficient vaccines and therapeutics are the only options to combat this pandemic. The COVID-19 pandemic has highlighted the need for novel vaccine platforms to control and prevent emerging viral diseases. Conventional vaccine platforms, including live-attenuated vaccine and inactivated vaccines, pose limitations in the speed of vaccine development, manufacturing capacity, and broad protection for emergency use. Interestingly, vaccination with the SARS-CoV-2 vaccine candidate based on the mRNA-lipid nanoparticle (LNP) platform protected against COVID-19, confirming that the nucleoside-modified candidate is a safe and effective alternative to conventional vaccines. Moreover, the prophylactic strategies against the COVID-19 pandemic have been mRNA nucleic acid-based vaccines and nanoparticle-based platforms, which are effective against SARS-CoV-2 and its variants. Overall, the novel vaccine platform has presented advantages compared with the traditional vaccine platform in the COVID-19 pandemic. This review explores the recent advancements in vaccine technologies and platforms, focusing on mRNA vaccines, digital vaccines, and nanoparticles while considering their advantages and possible drawbacks.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.