• Title/Summary/Keyword: Commercial Software

Search Result 1,732, Processing Time 0.031 seconds

Analysis of Surface Plasmon Resonance on Periodic Metal Hole Array by Diffraction Orders

  • Hwang, Jeong-U;Yun, Su-Jin;Gang, Sang-U;No, Sam-Gyu;Lee, Sang-Jun;Urbas, Augustine;Ku, Zahyun
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.176-177
    • /
    • 2013
  • Surface plasmon polaritons (SPPs) have attracted the attention of scientists and engineers involved in a wide area of research, microscopy, diagnostics and sensing. SPPs are waves that propagate along the surface of a conductor, usually metals. These are essentially light waves that are trapped on the surface because of their interaction with the free electrons of conductor. In this interaction, the free electrons respond collectively by oscillating in resonance with the light wave. The resonant interaction between the surface charge oscillation and the electromagnetic field of the light constitutes the SPPs and gives rise to its unique properties. In this papers, we studied theoretical and experimental extraordinary transmittance (T) and reflectance (R) of 2 dimensional metal hole array (2D-MHA) on GaAs in consideration of the diffraction orders. The 2d-MHAs was fabricated using ultra-violet photolithography, electron-beam evaporation and standard lift-off process with pitches ranging from 1.8 to $3.2{\mu}m$ and diameter of half of pitch, and was deposited 5-nm thick layer of titanium (Ti) as an adhesion layer and 50-nm thick layer of gold (Au) on the semiinsulating GaAs substrate. We employed both the commercial software (CST Microwave Studio: Computer Simulation Technology GmbH, Darmstadt, Germany) based on a finite integration technique (FIT) and a rigorous coupled wave analysis (RCWA) to calculate transmittance and reflectance. The transmittance was measured at a normal incident, and the reflectance was measured at variable incident angle of range between $30^{\circ}{\sim}80^{\circ}$ with a Nicolet Fourier transmission infrared (FTIR) spectrometer with a KBr beam splitter and a MCT detector. For MHAs of pitch (P), the peaks ${\lambda}$ max in the normal incidence transmittance spectra can be indentified approximately from SP dispersion relation, that is frequency-dependent SP wave vector (ksp). Shown in Fig. 1 is the transmission of P=2.2 um sample at normal incidence. We attribute the observation to be a result of FTIR system may be able to collect the transmitted light with higher diffraction order than 0th order. This is confirmed by calculations: for the MHAs, diffraction efficiency in (0, 0) diffracted orders is lower than in the (${\pm}x$, ${\pm}y$) diffracted orders. To further investigate the result, we calculated the angular dependent transmission of P=2.2 um sample (Fig. 2). The incident angle varies from 30o to 70o with a 10o increment. We also found the splitting character on reflectance measurement. The splitting effect is considered a results of SPPs assisted diffraction process by oblique incidence.

  • PDF

Wearable Technology with Future Fabrics (웨어러블 테크놀로지와 미래 소재)

  • Park, Hye-Sook;Lee, Jae-Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.12 s.159
    • /
    • pp.1800-1809
    • /
    • 2006
  • The wearable technology takes the concept of clothing over its limits -integrating software, communication devices, and sensors into the garments to enable them to 'think' for the wearer. A dress is no longer just a dress, but a dress as well as a wearable computer interface. This wearable computer network transports the data power and control signals within the wearer's personal space. The purpose of this thesis is to explore the wearable technology from a commercial perspective. On this theme I made a survey and interviewed 20 men and 20 women in London to find out if many people are familiar with the concept of the wearable technology. The main results of this study include: Firstly, according to the survey, people are not familiar with the concept of the wearable technology, and further people thought negatively about the wearable computer rather than positively they worried about hish prices, inappropriate technology and side effects. Secondly, people are especially interested in items related to health and security, so in this area there are huge potential opportunities for the wearable technology, Finally, wearable technology needs to be a simplified set of interactive devices, which are in a user friendly format for marketability because convenience was one of the biggest concern for consumers. Therefore, development of the wearable computer should be promoted not only through computer engineering but also through the connection with human lift.

A Space-Time Cluster of Foot-and-Mouth Disease Outbreaks in South Korea, 2010~2011 (구제역의 시.공간 군집 분석 - 2010~2011 한국에서 발생한 구제역을 사례로 -)

  • Pak, Son Il;Bae, Sun Hak
    • Journal of the Korean association of regional geographers
    • /
    • v.18 no.4
    • /
    • pp.464-472
    • /
    • 2012
  • To assess the space-time clustering of FMD(Foot-and-Mouth Disease) epidemic occurred in Korea between November 2010 to April 2011, geographical information system (GIS)-based spatial analysis technique was used. Farm address and geographic data obtained from a commercial portal site were integrated into GIS software, which we used to map out the color-shading geographic features of the outbreaks through a process called thematic mapping, and to produce a visual representation of the relationship between epidemic course and time throughout the country. FMD cases reported in northern area of Gyounggi province were clustered in space and time within small geographic areas due to the environmental characteristics which livestock population density is high enough to ease transmit FMD virus to the neighboring farm, whereas FMD cases were clustered in space but not in time for southern and eastern area of Gyounggi province. When analyzing the data for 7-day interval, the mean radius of the spatial-time clustering was 25km with minimum 5.4km and maximum 74km. In addition, the radius of clustering was relatively small in the early stage of FMD epidemic, but the size was geographically expanded over the epidemic course. Prior to implementing control measures during the outbreak period, assessment of geographic units potentially affected and identification of risky areas which are subsequently be targeted for specific intervention measures is recommended.

  • PDF

Development of Intelligent Internet Shopping Mall Supporting Tool Based on Software Agents and Knowledge Discovery Technology (소프트웨어 에이전트 및 지식탐사기술 기반 지능형 인터넷 쇼핑몰 지원도구의 개발)

  • 김재경;김우주;조윤호;김제란
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.153-177
    • /
    • 2001
  • Nowadays, product recommendation is one of the important issues regarding both CRM and Internet shopping mall. Generally, a recommendation system tracks past actions of a group of users to make a recommendation to individual members of the group. The computer-mediated marketing and commerce have grown rapidly and thereby automatic recommendation methodologies have got great attentions. But the researches and commercial tools for product recommendation so far, still have many aspects that merit further considerations. To supplement those aspects, we devise a recommendation methodology by which we can get further recommendation effectiveness when applied to Internet shopping mall. The suggested methodology is based on web log information, product taxonomy, association rule mining, and decision tree learning. To implement this we also design and intelligent Internet shopping mall support system based on agent technology and develop it as a prototype system. We applied this methodology and the prototype system to a leading Korean Internet shopping mall and provide some experimental results. Through the experiment, we found that the suggested methodology can perform recommendation tasks both effectively and efficiently in real world problems. Its systematic validity issues are also discussed.

  • PDF

A EJB Component-based WAP Application Generator (EJB 컴포넌트 기반 WAP 응용 생성기)

  • Eum, Doo-Hun;Kang, I-Zzy
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.125-139
    • /
    • 2005
  • Mobile e-business is in wide use with the rapid growth of wireless internet users. To meet the growing requests for mobile e-business the productivity of mobile applications has been demanded. The WAPSiteGen, introduced in this paper, automatically generates a 3-tier WAP application that needs a new application database or that already has an application database to increase the productivity. The WAPSiteGen generates the EJB components that handle business logic and the JSP Web components that process user-made queries and the WAP Push feature. For a presentation layer, it also generates the HTML forms for an application manager and the WML decks for end users, which consists of many cards. The WAPSiteGen enhances extendibility, reusability and portability of generated 3-tier applications by comprising such component technologies as EJB and JSP. Furthermore, it supports the WAP Push services for generated applications that provide necessary information to wherever and at whenever a user wants. Since the applications generated by the WAPSiteGen provide the information on an interested entity as well as the information on all the directly or indirectly related entities to the interested one, it shows faster information accessibility. In this paper, we explain the functionality and implementation of the WAPSiteGen and then show its merits by comparing the WAPSiteGen to commercial WAP application generators.

  • PDF

Parametric Study on Buckling Behavior of Longitudinally Stiffened Curved Panels by Closed-section Ribs (폐단면리브로 보강된 곡판의 국부판좌굴에 관한 변수해석적 연구)

  • Andico, Arriane Nicole P.;Kwak, Jae-Young;Choi, Byung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.714-721
    • /
    • 2018
  • In this study, we investigate a design technology intended to radically increase the buckling strength of vertically curved panels. Recent studies proposed a buckling strength formula which properly reflects the effect on the local plate buckling strength of flat plates when they are stiffened by closed section ribs. Herein, we attempted to quantitatively evaluate this effect on curved panels and to reveal the correlations with the design parameters. The commercial finite element software, ABAQUS, was used to build a three dimensional numerical model and numerical parametric studies were conducted to evaluate the variation of the buckling strength. In the case of flat panels, the local buckling strength of stiffened curved panels increases proportionally with increasing rotational stiffness of the closed-section ribs. After attaining a limiting value, an obvious tendency was found that the local buckling strength of the stiffened curved panel would converge towards a fixed value when the panels are supported along both sides. The parametric studies performed using the influential design parameters confirmed that the estimated partially-restrained curved panel strength is well correlated with the proposed formula.

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

Communication Method for Torque Control of Commercial Diesel Engine in Range-Extended Electric Trash Truck (주행거리 연장형 청소용 전기자동차에 장착된 상용 디젤엔진의 토크제어를 위한 통신 방안)

  • Park, Young-Kug
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.7
    • /
    • pp.1-8
    • /
    • 2018
  • This paper describes new communication methods for transmitting torque commands between the vehicle controller that determines the amount of power generation in a range-extended electric vehicle and the engine controller that performs it. Generally, vehicles use CAN communication, but in this case, the hardware and software of the existing engine controller must be modified. For this reason, it is not easy to apply CAN communication to small and medium sized automotive reorganize companies. Therefore, this research presents a pin-pin communication method for applying the existing mass produced engine controller to range-extended electric vehicles. The pin-pin communication method converts the driver's demand torque control map inside an mass produced engine controller into a virtual accelerator opening position according to the target speed and target torque of the engine, and converts this to a voltage signal for the existing mass produced engine controller to recognize it. The virtual accelerator opening positions are mounted in the form of a control map in the vehicle controller through the reverse conversion process in an offline environment and are determined by the engine generating power requirements and engine optimal operating point algorithm. These algorithms and signal conversion circuits for engine torque transmission have been mounted on the vehicle controller to conduct the virtual accelerator opening position conversion process according to the engine target torque and to establish the virtual accelerator voltage signal using the signal converter.

A Hybrid Collaborative Filtering Using a Low-dimensional Linear Model (저차원 선형 모델을 이용한 하이브리드 협력적 여과)

  • Ko, Su-Jeong
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.10
    • /
    • pp.777-785
    • /
    • 2009
  • Collaborative filtering is a technique used to predict whether a particular user will like a particular item. User-based or item-based collaborative techniques have been used extensively in many commercial recommender systems. In this paper, a hybrid collaborative filtering method that combines user-based and item-based methods using a low-dimensional linear model is proposed. The proposed method solves the problems of sparsity and a large database by using NMF among the low-dimensional linear models. In collaborative filtering systems the methods using the NMF are useful in expressing users as semantic relations. However, they are model-based methods and the process of computation is complex, so they can not recommend items dynamically. In order to complement the shortcomings, the proposed method clusters users into groups by using NMF and selects features of groups by using TF-IDF. Mutual information is then used to compute similarities between items. The proposed method clusters users into groups and extracts features of groups on offline and determines the most suitable group for an active user using the features of groups on online. Finally, the proposed method reduces the time required to classify an active user into a group and outperforms previous methods by combining user-based and item-based collaborative filtering methods.

Thermal and Flow Analysis of a Driving Controller for Active Destruction Protections (능동 파괴 방호 구동제어기의 열 유동 해석)

  • Ryu, Bong-Jo;Oh, Bu-Jin;Kim, Youngshik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.235-242
    • /
    • 2017
  • A driving controller for active destruction protections can be applied to machinery, aerospace and military fields. In particular, this controller can be used to track and attack enemy flying objects through the active control. It is important to ensure reliability of the driving controller since its operation should be kept with precision to the target point. The temperature of the environment where the driving controller is used is about -32 C ~ 50 C (241~323 ). Heat generated in the driving controller should be maintained below a certain threshold (85 C (358 )) to ensure reliability; therefore, the study and analysis of the heat flow characteristics in the driving controller are required. In this research, commercial software Solid-Works Flow Simulation was used for the numerical simulation assuming a low Reynolds number turbulence model and an incompressible viscous flow. The goal of this paper is to design the driving controller safely by analyzing the characteristics of the heat flow inside of the controller composed of chips or boards. Our analysis shows temperature distributions for boards and chips below a certain threshold.