• Title/Summary/Keyword: Disconnect

Search Result 89, Processing Time 0.027 seconds

Discovering child' and the Bauhaus: Cult of Innocence in the Modernism (어린이의 발견'과 바우하우스: 모더니즘에 나타난 '순수함'의 숭배)

  • Kim, Jin-Kyong
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.237-246
    • /
    • 2005
  • This study was intended to enlighten two-faced desires of the Bauhaus, revealing that it is closely related with the child education rooted in Frobel. The Bauhaus declared to disconnect with the traditional education standing for Academies and asked students to go bad to such 'innocence' as children had. The faculty of Bauhaus tried to understand of the essence of the world through primary geometrical forms as 'purity' without any inessential things as $Fr{\ddot{o}}bel$ did. Their attempts not to admit any nonessential things, however, and dinging to purity was rather a sort of neurosis. The modernism is not different from the child art hiding sadistic and dictatorial elements behind the myth of 'innocence'. Considering the child education was born and grown with nutrition from the bourgeois development, it was not compatible with democratic ideals of the Bauhaus. While the new types of schools for children provided an excellent preparation for the Bauhaus to initiate a new design education, people of the Bauhaus were going toward a different direction from aspiration of the bourgeois, strong supporters of the new schools.

  • PDF

THE ANALYSIS OF PSM (POWER SUPPLY MODULE) FOR MULTI-SPECTRAL CAMERA IN KOMPSAT

  • Park Jong-Euk;Kong Jong-Pil;Heo Haeng-Pal;Kim Young Sun;Chang Young Jun
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.493-496
    • /
    • 2005
  • The PMU (Payload Management Unit) in MSC (Multi-Spectral Camera) is the main subsystem for the management, control and power supply of the MSC payload operation. The PMU shall handle the communication with the BUS (Spacecraft) OBC (On Board Computer) for the command, the telemetry and the communications with the various MSC units. The PMU will perform that distributes power to the various MSC units, collects the telemetry reports from MSC units, performs thermal control of the EOS (Electro-Optical Subsystem), performs the NUC (Non-Uniformity Correction) function of the raw imagery data, and rearranges the pixel data and output it to the DCSU (Data Compression and Storage Unit). The BUS provides high voltage to the MSC. The PMU is connected to primary and redundant BUS power and distributes the high unregulated primary voltages for all MSC sub-units. The PSM (Power Supply Module) is an assembly in the PMU implements the interface between several channels on the input. The bus switches are used to prevent a single point system failure. Such a failure could need the PSS (Power Supply System) requirement to combine the two PSM boards' bus outputs in a wired-OR configuration. In such a configuration if one of the boards' output gets shorted to ground then the entire bus could fail thereby causing the entire MSC to fail. To prevent such a short from pulling down the system, the switch could be opened and disconnect the short from the bus. This switch operation is controlled by the BUS.

  • PDF

The research of 5.2 protocol performance and structure (V5.2 프로토콜의 성능 및 구조분석)

  • 이성우;이병란;이종영
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.226-230
    • /
    • 2003
  • In this thesis I analyzed that V5.2 protocol function is effective to fulfill all of the services that are provided at the existing local exchange. I analyzed this in five methods that refer to ETSI inside patronage. I experimented turnaround time by Start-up method and verified V5.2 protocol function when Start-up. Also I confirmed stability of system by the reconstruction-ability experiment related E1 switch over. I verified V5.2 protocol function through PSTN call process that uses a special service test and local call simulator. As a result of experiment, I confirmed the best method when simultaneous Start-up. V5.2 protocol function was excellent and It becomes switch over at 1/1000 seconds when E1 is out of service. V5.2 protocol function was effective to fulfill all of the special services that are provided at local exchange and its long call process ability was superior to KT standard with 4 fails in 20000 calls. Through the experiment, it was proved that V5.2 interface will become a significant element of communication network when after LE side expanse of v5 interface ID with TDX-100 exchanger and the AN occurrences OOS by message transmission limit and call disconnect when E1 switch over are improved.

  • PDF

A Study on the Guidance Signage System of Outpatient in General Hospital using Spatial Configuration Theory - View from G.D.Weisman's Way-finding Influence Factors (공간구조론을 적용한 종합병원 외래부 유도사인 배치 및 평가에 관한 연구 - G.D.Weisman의 길찾기 요소를 중심으로)

  • Kim, Suktae;Paik, Jinkyung
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.21 no.3
    • /
    • pp.25-35
    • /
    • 2015
  • Purpose: Signs that are installed at unnoticeable places or that disconnect before the destination can bring errors of location information delivery. Therefore, this study aims to find out the spatial relation between structure of space and signs in the perspective of visual exposure possibility, operating arrangement and assesment by applying spatial structure theory. Methods: Effectiveness of organization of guidance signs was evaluated after the four way-finding factors(Plan Configuration, Sign System, Perceptual Access, Architectural Difference) that G.D.Weisman suggested were interpreted by spatial structure theory(J-Graph analysis, Space Syntax, Visual Graph Analysis) under the premise that it is closely related to the structure of space. Results: 1) Because the south corridor that connects each department of outpatient division is located in the hierarchy center of the space, and walking density is expected to be high, guidance signs need to be organized at the place with high integration value. 2) The depth to the destination space can be estimated through J-Graph analysis. The depth means a switch of direction, and the guidance signs are needed according to the number. 3) According to visibility graph analysis, visual exposure can be different in the same hierarchy unit space according to the shape of the flat surface. Based on these data, location adjustment of signs is possible, and the improvement effect can be estimated quantitatively. Implications: Spatial structure theory can be utilized to design and evaluate sign systems, and it helps to clearly understand the improvement effect. It is desirable to specify design and estimation of sign systems in the order of J-Graph analysis${\rightarrow}$Space Syntax Theory${\rightarrow}$visibility graph analysis.

Transmission Rate Control in Heterogeneous Wireless Networks Using Multiple Connections (이기종 무선 네트워크에서 다중연결을 이용한 전송률 제어)

  • Jeong, Hyeon-Jin;Choi, Seung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.993-1003
    • /
    • 2012
  • In this paper, we propose a method that wireless mobile nodes can obtain high throughput in heterogeneous wireless networks using multiple connections and it has low packet loses under handover situation. Currently, a mobile node exchanges data with server for one network connection. The proposed method can use high throughput because it doesn't only use one network(WLAN, 3G, etc.) but also use multiple wireless networks. When mobile nodes move to area to use multiple connection, mobile nodes request heterogeneous wireless networks using multiple connections message from the server and the server transmit packets using multiple connections. Also, this method doesn't disconnect previous networks, so packets losses are decreased. Using the NS-2 simulation, we verify that the propose method enhances throughput.

The PWM Control Which used Microprocessor for Intensity Control of Acid Ion Water (산성이온수 농도제어를 위한 Microprocessor를 이용한 PWM 제어)

  • Kwon, Yunjung;Nam, Sangyep
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.7
    • /
    • pp.269-274
    • /
    • 2013
  • We are used with the alkaline ion water which an application field does to object for drinking water compare with the alkaline ion water which asked ion acid electrolysis so as to be very different. This is used with sterilization disinfection use by residual chlorine in case of strong acidity according to ph intensity, and in case of middle acidity use by washing and face washing, and mix with meal materials in case of weak acidity widely usable in cooking. Acid ion water generates as we electrolyze water. Chlorine gas and sodium hydroxide etc. was generated at electrolysis process, and we have toward sterilizing power. Derelicts such as chlorine, phosphorus, sulfur etc. are gathered from a negative ion, and we make acid ion water to + electrode direction in electrolysis. We used a diaphragm in order to disconnect too acid water and alkaline water. We implemented so that the acid water which it came down to three kinds of PWM voltage to PWM (pulse width modulation) control, and implementation method of ph intensity change authorized ph intensity between weak acidity to electrode in strong acidity as we used Microprocessor, and intensity was adjusted successively by PWM control was generated.

A Study on Leakage of Critical Information via the Power Analysis of Power Lines (전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.

A Study on Development of Personalized Learning Materials for Underachievers in Elementary Mathematics (초등 수학 학습 부진아 지도를 위한 맞춤형 학습 자료 개발 연구)

  • Choe, Seung-Hyun;Cho, Seong-Min;Ryu, Hyun-Ah
    • Education of Primary School Mathematics
    • /
    • v.15 no.2
    • /
    • pp.135-145
    • /
    • 2012
  • In this research, we observed how students perform as they followed the teachers' instruction, and consequently perform their realized potential. As the accountability of school education is emphasized, various attempts try to disconnect the vicious cycle of producing low achievers. Efforts are allocated into developing a method to minimize cumulative effect of the lag in educational benefit by focusing on the elementary education. Based on the 2007 revised curriculum, mathematics achievement level and assessment criteria were developed. These criteria were used to standardize the course and assessment objectives for 4th through 6th grade students' mathematics studies, and to assess lower performing students and the lag in their mathematical understanding. The educational materials and assessment criteria can be expected to lead lower performing students by giving them the personalized lesson plans to minimize the lag of mathematical understanding, and eventually expedite their progress and prevent cumulative effect of the lag in the following curriculum.

Race State Transition for Detecting Unaffected Race Conditions in Message-Passing Programs (메시지전달 프로그램의 영향받지 않은 경합조건 탐지를 위한 경합상태 전이기법)

  • Park Mi-Young;Kang Hyun-Syug;Jun Yong-Kee
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.495-504
    • /
    • 2006
  • Detecting unaffected race conditions is important to debugging message-passing programs effectively, because such a message race can affect other races to occur or not. The previous technique to detect efficiently unaffected races detects racing messages by halting at the receive event of the first race to occur in each process. However this technique does not guarantee that all of the detected races are unaffected, because halting such processes does disconnect some chain of affects-relations among those races. In this paper, we present a novel technique that manages the state of the detected race by examining if every received message is affected until the execution terminates. Our technique therefore guarantees to detect efficiently the unaffected races, because it maintains affects-relations of the races all along the execution of program.

A Study on the Student Surveys for CAAD(Computer Aided Architectural Design) (건축 CAD 과목에 대한 학생 설문평가에 관한 연구)

  • Nam, Yun-Cheol
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.12 no.4
    • /
    • pp.117-124
    • /
    • 2012
  • The importance of the digital architecture is increasing more ever. Currently, CAD and 3D programs are used as design fields, but the BIM (building information modeling) is gradually interested. BIM is mandatory on the project more than 50 billion won ordered by the government since 2012, it will be expanded to a total of government orders by 2016. University needs to evaluate teaching methods and computer-aided design environments such as CAD and BIM. In this paper, we surveyed computer-aided design environments and teaching methods for 73 students at the J University of Department of architectural engineering. Main results are as follows: 1. Hardlock is uncomfortable but necessary program for the computer management. 2. The desk placement considering the behavior of the design students results in higher satisfaction. 3. Because a CAD subject was a difficult course content and progress is fast, students thought it is difficult to follow. Especially, first-year students answered it is difficult to learn program and understand the structure of the building at the same time. 4. First-year students want to learn CAD more. Second-, third-, fourth-year students want to learn Photoshop more. Supplement for these classes is required. 5. Students answered that a teaching method of a CAD subject would be good to their own practice after the professor demonstrates for students. The senior's assistance is also a high effective way in the class. 6. During class, students' activities such surfing the web and Kakao Talk on a smartphone disrupt the class, there is a need to regulate by a rule such as disconnect computers from a network and against using smartphone. Although the Internet with the popularization of smartphones confers a benefit on modern life, it causes damage to us. This is a hard part for a salaried workers as well as students studying equally. The self management is required and a professor needs to control and restraint in a university classroom. The professor's continuing interest to students can increase the effectiveness of learning.