• Title/Summary/Keyword: Efficient usage

Search Result 969, Processing Time 0.028 seconds

Implementation of Topological Operators for the Effective Non-manifold CAD System (효율적인 복합다양체 CAD 시스템 위상 작업자 구현)

  • 최국헌
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2004.10a
    • /
    • pp.382-387
    • /
    • 2004
  • As the increasing needs in the industrial filed, many studies for the 3D CAD system are carried out. There are two types of 3D CAD system. One is manifold modeler, the other is non-manifold modeler. In the manifold modeler only 3D objects can be modeled. In the non-manifold modeler 3D, 2D, 1D, and 0D objects can be modeled in a unified data structure. Recently there are many studies on the non-manifold modeler. Most of them are focused on finding unknown topological entities and representing all kinds of topological entities found. In this paper, efficient data structure is selected. The boundary information on a face and an edge is included in this data structure. The boundary information on a vertex is excluded considering the frequency of usage. Because the disk cycle information is not required in most case of modeling. It is compact. It stores essential non-manifold information such as loop cycle and radial cycle. A suitable Euler-Poincare equation is studied and selected. Using the efficient data structure and the selected Euler-Poincare equation, 18 basic Euler operators are implemented. Several 3D models are created using the implemented modeler. A non-manifold modeling can be carried out using the implemented 3D CAD system. The results of this paper could be used in the further studies such as an implementation of Boolean operators, and a translation of 2D CAD drawings to 3D models.

  • PDF

Effects of AI Speaker Users' Usage Motivations and Perception of Relationship Type with AI Speaker on Enjoyment (AI 스피커 이용자의 이용동기 및 AI 스피커에 대한 관계 유형 인식이 즐거움에 미치는 영향)

  • Jang, Yei-Beech
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.11
    • /
    • pp.558-566
    • /
    • 2019
  • Artificial intelligent (AI) smart speaker sales have increased rapidly, and AI technology has become more pervasive in our daily lives. This study explored motivations for smart speaker use and examined how motivation and relationship type with AI speakers affect enjoyment. Smart speaker use is primarily motivated by conversational, trend-leading, efficient, and entertaining factors. Among these four, trend-leading, efficient, and entertaining factors positively influenced users' enjoyment. However, among the three types of relationship with AI speakers, only the assistant/helper type affected enjoyment. The results of the current study provide practical implications for future directions in AI speaker interaction design.

A study on Improvement of Automatic Water Management System in Uiryeong Watershed Area (의령수역의 자동화 물관리 시스템 운영개선연구)

  • Cho, Young-Jea;Lee, Moung-Jun;Kim, Young-Ho;Park, Sang-Hyun
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2005.10a
    • /
    • pp.213-214
    • /
    • 2005
  • Uiryung Watershed area, located at the confluence of Nam River and Nagdong River has 9000 ha of agricultural land area and 3024 ha of paddy rice field have been reclaimed and managed by Korean Agricultural and Rural Infrastructure Corporation(KARICO) in the riparian area since 1954. In spite of irrigation and drainage improvement projects in last 3 decades since 1970, there are severe drought and innundation problems in the area. To improve the difficulties and efficient usage of irrigation water not only for agriculture but also for environmental conservation and cultural ceremony, Automatic Water management system has been installed supported by Ministry of Agriculture and Fishery in Korean Government. The control office in Uiryung Branch Office of KARICO, receive all the water management records from Remote Terminal Units in 7 reservoirs and 26 Pump stations to operate the decision supporting system of irrigation and drainage facility during cropping period. Since the completion of the water management system at the end of 2003, the electric cost decrease in 80 % than average years. In spite of decrease of two technical assistants since 2004, complains from farmers for the water management are very rare. The technological experience from the automatic water management system would contribute not only for the efficient water management of Uiryang area but also for the modernization of water management of other watershed areas in the future.

  • PDF

Position-Based Multicast Routing in Mobile Ad hoc Networks: An Analytical Study

  • Qabajeh, Mohammad M.;Adballa, Aisha H.;Khalifa, Othman O.;Qabajeh, Liana K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1586-1605
    • /
    • 2012
  • With the prevalence of multimedia applications and the potential commercial usage of Mobile Ad hoc Networks (MANETs) in group communications, Quality of Service (QoS) support became a key requirement. Recently, some researchers studied QoS multicast issues in MANETs. Most of the existing QoS multicast routing protocols are designed with flat topology and small networks in mind. In this paper, we investigate the scalability problem of these routing protocols. In particular, a Position-Based QoS Multicast Routing Protocol (PBQMRP) has been developed. PBQMRP builds a source multicast tree guided by the geographic information of the mobile nodes, which helps in achieving more efficient multicast delivery. This protocol depends on the location information of the multicast members which is obtained using a location service algorithm. A virtual backbone structure has been proposed to perform this location service with minimum overhead and this structure is utilized to provide efficient packet transmissions in a dynamic mobile Ad hoc network environment. The performance of PBQMRP is evaluated by performing both quantitative analysis and extensive simulations. The results show that the used virtual clustering is very useful in improving scalability and outperforms other clustering schemes. Compared to On-Demand Multicast Routing Protocol (ODMRP), PBQMRP achieves competing packet delivery ratio and significantly lower control overhead.

An Improvement of Hit-probability and an Efficient Counter-fire Execution (명중확률 개선 및 효율적인 대화력전 수행방안)

  • Kim, Se-Yong;Lee, Jae-Yeong
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • At an initial battle stage, counter-fire capability have critical impact on defeating the enemy in the future warfare. In this paper, we proposed an efficient method of counter-fire execution. To do that, hit-probability for each artillery type was evaluated using CEP and applied to calculate new target reference table of a counter-fire operation. In order to compare new result to the one obtained by using previous reference table from BTCS, we did simulation using MANA model. Simulation outputs show that new method is superior to previous method of counter-fire operation in various scenarios depending upon each method and usage of UAV.

  • PDF

Speaker-Dependent Emotion Recognition For Audio Document Indexing

  • Hung LE Xuan;QUENOT Georges;CASTELLI Eric
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.92-96
    • /
    • 2004
  • The researches of the emotions are currently great interest in speech processing as well as in human-machine interaction domain. In the recent years, more and more of researches relating to emotion synthesis or emotion recognition are developed for the different purposes. Each approach uses its methods and its various parameters measured on the speech signal. In this paper, we proposed using a short-time parameter: MFCC coefficients (Mel­Frequency Cepstrum Coefficients) and a simple but efficient classifying method: Vector Quantification (VQ) for speaker-dependent emotion recognition. Many other features: energy, pitch, zero crossing, phonetic rate, LPC... and their derivatives are also tested and combined with MFCC coefficients in order to find the best combination. The other models: GMM and HMM (Discrete and Continuous Hidden Markov Model) are studied as well in the hope that the usage of continuous distribution and the temporal behaviour of this set of features will improve the quality of emotion recognition. The maximum accuracy recognizing five different emotions exceeds $88\%$ by using only MFCC coefficients with VQ model. This is a simple but efficient approach, the result is even much better than those obtained with the same database in human evaluation by listening and judging without returning permission nor comparison between sentences [8]; And this result is positively comparable with the other approaches.

  • PDF

the Combination of Wavelet with Boundary Element Method for the Efficient Solution of Maxwell's Equations (Maxwell 방정식의 효율적인 풀이를 위한 경계요소법과 웨이브렛의 결합)

  • Kim, Hyun-Jun;Lee, Seung-Gol;O, Beom-Hoan;Lee, El-Hang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.39 no.6
    • /
    • pp.24-35
    • /
    • 2002
  • The wavelet transform is combined with the boundary element method (BEM), to solve efficiently the Maxwell's equation and the proposed method is applied to the electromagnetic problem for the analysis of topological effects of phase-shifting masks. The accuracy of the module developed was verified by comparison with both analytic solutions and published results. In addition, it was found that the boundary element method in combination with the wavelet matrix transform would be more efficient than the conventional methods based on the BEM in views of the calculation speed and the usage of computer memory.

Efficient Malware Detector for Android Devices (안드로이드 모바일 단말기를 위한 효율적인 악성앱 감지법)

  • Lee, Hye Lim;Jang, Soohee;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.617-624
    • /
    • 2014
  • Smart phone usage has increased exponentially and open source based Android OS occupy significant market share. However, various malicious applications that use the characteristic of Android threaten users. In this paper, we construct an efficient malicious application detector by using the principle component analysis and the incremental k nearest neighbor algorithm, which consider an required permission, of Android applications. The cross validation is exploited in order to find a critical parameter of the algorithm. For the performance evaluation of our approach, we simulate a real data set of Contagio Mobile.

A study on Teacher's Work Space in Middle and High School - Focus on Plan Based Department System Management in Middle and High School - (중·고등학교의 교사업무공간에 관한 연구 - 교과교실형 설계기반 중·고등학교를 중심으로 -)

  • Seo, Boong-Kyo;Kwak, Jun-Hyuck
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.21 no.1
    • /
    • pp.23-32
    • /
    • 2014
  • Aim of this research is suggesting a satisfied studying space for lecturer, student and curriculum by abstraction of improvement plan which based on investigation and analysis of the space that teacher is using in lecturer and study support facility in school which managed in 'Department system'. This research focused on analyse of teacher's laboratory, teacher's room, and common room in middle and high school which managed and designed by 'Department system' and registered on 'Seoul office of education' and designed in management of department system between 2009 and 2012. With these process, a conclusion of this research is as in the following. Firstly, plan of teachers' private place which is efficient and stable is required through to get out of module which can cover subject band and grade band. Secondly, we have to focus on size of teachers' convenience facilities for convenience or official usage, movement radius, and improvement of working environments. Thirdly, 'Subject type teachers' laboratory' which organized by teachers who teach same subject is more efficient than 'Task type laboratory' which organized by teachers who working on same task for management of school. In fourth, 'Task type teachers' laboratory' arranged regardless with teachers' class room to teach, and it makes lack of connectivity between teacher and class room.

A Digital Hologram Encryption Method Using Data Scrambling of Frequency Coefficients

  • Choi, Hyun-Jun
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.3
    • /
    • pp.185-189
    • /
    • 2013
  • A digital hologram generated by a computer calculation (computer-generated hologram or capture using charge-coupled device [CCD] camera) is one of the most expensive types of content, and its usage is expanding. Thus, it is highly necessary to protect the ownership of digital holograms. This paper presents an efficient visual security scheme for holographic image reconstruction with a low scrambling cost. Most recent studies on optical security concentrate their focus on security authentication using optical characteristics. However, in this paper, we propose an efficient scrambling method to protect a digital hologram. Therefore, we introduce in this paper several scrambling attempts in both the spatial domain and frequency domain on the basis of the results of analyzing the properties of the coefficients in each domain. To effectively hide the image information, 1/4, 1/256, and 1/16,384 of the original digital hologram needs to be scrambled for the spatial-domain scheme, Fresnel-domain scheme, and discrete cosine transform-domain scheme, respectively. The encryption schemes and the analyses in this paper can be expected to be useful in the research on encryption and other works on digital holograms.