• Title/Summary/Keyword: Diversified Technique

Search Result 96, Processing Time 0.028 seconds

Development of Traditional Inlaying Base Using Rapid Prototyping Technique (쾌속조형기술을 이용한 전통상감 베이스 개발)

  • Jang, Woongeun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.1
    • /
    • pp.1-13
    • /
    • 2014
  • RP(Rapid prototyping) technology is widely used to reduce the cost and cycle time of new prototypes in industries as new product development cycle time currently shortened and the voice of customers also become to be diversified. In this study, RP skill used in making jewelry products was adapted to develop the metallic inlaying base of traditional handicraft products as the significance of CAD/CAM technologies was increased. The RP technology showed that it helped the handicraftsman to cut the groove for inlaying metalic wire more easily, uniformly and diversely than conventional handicraft technique in making the groove with undercut shape. Therefore this study showed that RP technology applied for the metalic inlaying base achieved more elaborate, intricate and uniform patterns, not depending on craftsmanship, compared with conventional handicraft skill in terms of quality, cost and delivery.

Structure Assembling Method for 3D Puzzle System (3차원 퍼즐 시스템을 위한 구조물 조립 기법)

  • Kim, Jin-Mo;Cho, Hyung-Je
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.1
    • /
    • pp.58-68
    • /
    • 2009
  • With the rapid development of computer hardware and invention of various game-related technologies, the quality of games has been greatly improved and the genres of games have been diversified. Yet, in comparison, puzzle games have held to the past simple way of games, which has only led to a depression of the puzzle game market. This paper is the first attempt to overcome limits of the current puzzle games, by finding a breakthrough in three-dimensional puzzle games. In order to describe a realistic puzzle assembly in a three-dimensional puzzle game, this paper aimed to design a structure assembly technique made up of three steps that used a proper process to handle structure suitable to assembly, an elaborate way of collisions between individual objects and a physical structure. Through this technique, we intend to show in a simple experiment that it is possible to minimize the calculation cost in the assembly process and at the same time to achieve an elaborate puzzle assembly between structures.

  • PDF

An OFDMA-Based Next-Generation Wireless Downlink System Design with Hybrid Multiple Access and Frequency Grouping Techniques

  • Lee Won-Ick;Lee Byeong Gi;Lee Kwang Bok;Bahk Saewoong
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.115-125
    • /
    • 2005
  • This paper discusses how to effectively design a next-generation wireless communication system that can possibly provide very high data-rate transmissions and versatile quality services. In order to accommodate the sophisticated user requirements and diversified user environments of the next-generation systems, it should be designed to take an efficient and flexible structure for multiple access and resource allocation. In addition, the design should be optimized for cost-effective usage of resources and for efficient operation in a multi-cell environment. As orthogonal frequency division multiple access (OFDMA) has turned out in recent researches to be one of the most promising multiple access techniques that can possibly meet all those requirements through efficient radio spectrum utilization, we take OFDMA as the basic framework in the next-generation wireless communications system design. So, in this paper, we focus on introducing an OFDMA-based downlink system design that employs the techniques of hybrid multiple access (HMA) and frequency group (FG) in conjunction with intra-frequency group averaging (IFGA). The HMA technique combines various multiple access schemes on the basis of OFDMA system, adopting the multiple access scheme that best fits to the given user condition in terms of mobility, service, and environment. The FG concept and IFGA technique help to reduce the feedback overhead of OFDMA system and the other-cell interference (OCI) problem by grouping the sub-carriers based on coherence band-widths and by harmonizing the channel condition and OCI of the grouped sub-carriers.

Anomaly Detection Analysis using Repository based on Inverted Index (역방향 인덱스 기반의 저장소를 이용한 이상 탐지 분석)

  • Park, Jumi;Cho, Weduke;Kim, Kangseok
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.294-302
    • /
    • 2018
  • With the emergence of the new service industry due to the development of information and communication technology, cyber space risks such as personal information infringement and industrial confidentiality leakage have diversified, and the security problem has emerged as a critical issue. In this paper, we propose a behavior-based anomaly detection method that is suitable for real-time and large-volume data analysis technology. We show that the proposed detection method is superior to existing signature security countermeasures that are based on large-capacity user log data according to in-company personal information abuse and internal information leakage. As the proposed behavior-based anomaly detection method requires a technique for processing large amounts of data, a real-time search engine is used, called Elasticsearch, which is based on an inverted index. In addition, statistical based frequency analysis and preprocessing were performed for data analysis, and the DBSCAN algorithm, which is a density based clustering method, was applied to classify abnormal data with an example for easy analysis through visualization. Unlike the existing anomaly detection system, the proposed behavior-based anomaly detection technique is promising as it enables anomaly detection analysis without the need to set the threshold value separately, and was proposed from a statistical perspective.

Voice Phishing Occurrence and Counterplan (보이스피싱 발생 및 대응방안)

  • Cho, Ho-Dae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.176-182
    • /
    • 2012
  • Voice Phishing finds out personal information illegally using electrification and it is confidence game that withdraw deposit on the basis of this. It appeared by new social problem as damage instances increase rapidly. Target of the damage is invading indiscriminately to good civilian and is crime that commit by foreigners such as a most Chinese, Formosan. Voice Phishing can be crime type of new form in terms of criminal practice is achieved in the foreign countries. Therefore, this study wishes to analyze present occurrence actual conditions and example, and search effective confrontation plan regarding Voice Phishing. Voice Phishing criminal offense is growing as crime is not eradicated in spite of continuous public relations and control, and technique is diversified and specializes preferably. Hereafter, confrontation plan about problem may have to be readied in banking communication investigation to eradicate Voice Phishing. Also, polices control activity may have to be reinforce through quick investigation's practice and development of investigation technique, and relevant government ministry and international mutual assistance cooperation such as the Interpol should be reinforced because is shown international crime personality.

Development of Fashion Design Applying Code and Tape Trimming Decoration Techniques of Computer Embroidery Machine (컴퓨터 자수기계 코드 및 테이프 트리밍 장식기법을 활용한 패션디자인 개발)

  • Seoyun, Lee;Jiyoung, Kim
    • Journal of Fashion Business
    • /
    • v.26 no.5
    • /
    • pp.1-21
    • /
    • 2022
  • Purpose of this study is to develop fashion design with greater added value and to seek the expandability of its expression domain by applying special computer code and tape embroidery machine capable of creating more special and fancier fashion to the development of fashion design by focusing on the fashion decorations that are becoming increasingly more computer systematized. For this purpose, expression techniques and effects of computer embroidery machine code and tape trimming decoration techniques, and cases of modern fashion design are examined. Major images are then deduced to designing and production of actual 6 creative pieces equipped with creativity and commercial value by applying such images deduced. As the results, it is not only possible to develop highly value added fashion design by utilizing mixed computer embroidery machine code and tape trimming decoration technique but also to produce countlessly new and unique surfaces by inducing changes in diversified pattern expressions, thickness of cord thread, and width, color and texture of material, etc. of the tape. This can maximize the expression domain of design, and fulfill the fashion desires of consumers wanting modern enhancement of quality and individualization. If multilateral attempts and studies for the aforementioned purposes can be expanded continuously, it is deemed possible to broaden the range of expression techniques in fashion design and, moreover, to make contribution towards enhancement of competitiveness of fashion industry.

IoT data trust techniques based on auto-encoder through IoT-linked processing (오토인코더 기반의 IoT 연계 처리를 통한 IoT 데이터 신뢰 기법)

  • Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.351-357
    • /
    • 2021
  • IoT devices, which are used in various ways in distributed environments, are becoming more important in data transmitted and received from IoT devices as fields of use such as medical, environment, transportation, bio, and public places are diversified. In this paper, as a method to ensure the reliability of IoT data, an autoencoder-based IoT-linked processing technique is proposed to classify and process numerous data by various important attributes. The proposed technique uses correlation indices for each IoT data so that IoT data is grouped and processed by blockchain by characteristics for IoT linkage processing based on autoencoder. The proposed technique expands and operates into a blockchain-based n-layer structure applied to the correlation index to ensure the reliability of IoT data. In addition, the proposed technique can not only select IoT data by applying weights to IoT collection data according to the correlation index of IoT data, but also reduce the cost of verifying the integrity of IoT data in real time. The proposed technique maintains the processing cost of IoT data so that IoT data can be expanded to an n-layer structure.

A Study on the Graphic Contents of Hyuk-Wha in the late Chosun Dynasty (조선후기 혁화의 그래픽 콘텐츠 연구)

  • 이명구;남인복
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.37-46
    • /
    • 2003
  • About 18th century in the late Chosun dynasty, various kinds of 'Min-Wha' had played a significant role and had an important meaning in the lives of the people in that period. Therefore, both in material and in technique, so many diversified 'Min-Wha' were mass produced in that time. Starting from those backgrounds, 'Hyuk-Wha', is considered as one of unique style of expression. Though, 'Hyuk-Wha', in techniques, was originated from 'Bibaekseo' classified as one of the style of expression in Oriental drawing and writing art. 'Hyuk-Wha' shows and expresses visual differentiation from rough 'Bibaekseo', in substance, written by brush made from the skin of a willow tree or the stem of a sort of reeds. 'Hyuk-Wha', in mode, has very dose relation to the process of the development of 'Min-Wha'. Judging from this point of view, 'Hyuk-Wha' has deep relationship to Taosmic character painting of 'Gilsang: an auspicious sign' or Confucian character painting of 'Hyojae: filial piety. Accordingly, 'Hyuk-Wha' has been developed to that character painting designed by another type of creative differentiations. For these reasons, 'Hyuk-Wha' which significantly shapes and contains the meanings of Chinese Character also has been esteemed to have interrelation with Pictography in application of Word mark or Brand logotype in graphic areas. 'Hyuk-Wha' which was prevalent in use of home decorations for the people existed in the past has been ceased to exist nowadays in use of home decorations by appearance of all sort of decoration articles. All these days, 'Hyuk-Wha' which was diversified as a part 'Min-Wha' and developed together with oriental drawing and writing art and character painting is to be necessarily relighted. And 'Hyuk-Wha', which is also vigorously in practical application in Western Europe is desirable to be reconsidered.

  • PDF

The proposition of cosine net confidence in association rule mining (연관 규칙 마이닝에서의 코사인 순수 신뢰도의 제안)

  • Park, Hee Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.1
    • /
    • pp.97-106
    • /
    • 2014
  • The development of big data technology was to more accurately predict diversified contemporary society and to more efficiently operate it, and to enable impossible technique in the past. This technology can be utilized in various fields such as the social science, economics, politics, cultural sector, and science technology at the national level. It is a prerequisite to find valuable information by data mining techniques in order to analyze big data. Data mining techniques associated with big data involve text mining, opinion mining, cluster analysis, association rule mining, and so on. The most widely used data mining technique is to explore association rules. This technique has been used to find the relationship between each set of items based on the association thresholds such as support, confidence, lift, similarity measures, etc.This paper proposed cosine net confidence as association thresholds, and checked the conditions of interestingness measure proposed by Piatetsky-Shapiro, and examined various characteristics. The comparative studies with basic confidence and cosine similarity, and cosine net confidence were shown by numerical example. The results showed that cosine net confidence are better than basic confidence and cosine similarity because of the relevant direction.

Antifuse Circuits and Their Applicatoins to Post-Package of DRAMs

  • Wee, Jae-Kyung;Kook, Jeong-Hoon;Kim, Se-Jun;Hong, Sang-Hoon;Ahn, Jin-Hong
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.1 no.4
    • /
    • pp.216-231
    • /
    • 2001
  • Several methods for improving device yields and characteristics have been studied by IC manufacturers, as the options for programming components become diversified through the introduction of novel processes. Especially, the sequential repair steps on wafer level and package level are essentially required in DRAMs to improve the yield. Several repair methods for DRAMs are reviewed in this paper. They include the optical methods (laser-fuse, laser-antifuse) and the electrical methods (electrical-fuse, ONO-antifuse). Theses methods can also be categorized into the wafer-level(on wafer) and the package-level(post-package) repair methods. Although the wafer-level laser-fuse repair method is the most widely used up to now, the package-level antifuse repair method is becoming an essential auxiliary technique for its advantage in terms of cost and design efficiency. The advantages of the package-level antifuse method are discussed in this paper with the measured data of manufactured devices. With devices based on several processes, it was verified that the antifuse repair method can improve the net yield by more than 2%~3%. Finally, as an illustration of the usefulness of the package-level antifuse repair method, the repair method was applied to the replica delay circuit of DLL to get the decrease of clock skew from 55ps to 9ps.

  • PDF