• Title/Summary/Keyword: File pattern

Search Result 154, Processing Time 0.027 seconds

Fabrication of Precise Patterns using a Laser Beam Expanding Technique in Nano-Replication Printing (nRP) Process (레이저 빔 단면확대를 이용한 나노 복화(複畵)공정의 패턴 정밀도 향상에 관한 연구)

  • Park Sang Hu;Lim Tae Woo;Yang Dong-Yol;Yi Shin Wook;Kong Hong Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.1
    • /
    • pp.175-182
    • /
    • 2005
  • A laser beam expanding technique is employed to fabricate precise nano-patterns in a nano-replication printing (nRP) process. In the nRP process, some patterns can be fabricated in the range of several microns inside on a polymerizable resin by using a volume-pixel (voxel) matrix that is transformed from a two-tone bitmap figure file. The liquid monomers are polymerized by means of a two-photon-absorption (TPA) phenomenon that is induced by a femtosecond (fs)-pulse laser. The yokels are generated consecutively to merge into adjoining yokels in the process of fabricating a pattern. The resolution of a fabricated pattern can be obtained under the diffraction limit of a laser beam by the two-photon absorbed polymerization (TPP). In this work, a beam-expanding technique has been applied to enlarge a working area and to fabricate precise patterns. Through this work, a working area is expanded by the technique as much as 2.5 times compared with a case of without a beam expanding technique, and precision of outside patterns is improved.

Study of Development of Torso Pattern according to Somatotype (체형별 토르소 원형의 개발에 관한 연구 -다트(Dart) 배분을 중심으로-)

  • 김소라;송미령
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.21 no.2
    • /
    • pp.262-276
    • /
    • 1997
  • The purpose of this study was to develop torso patterns according to the somatotype and thus to contribute to the ready-made industry. Classification of the somatotypes was based on each individual's lateral and frontal view and development of torso patterns according to the somatotype was to center on the darts. The subjects in this study were female college students of 18 to 24 year old. This study was carried out by the following procedures: 1. Classification of the somatotypes was based on each individual's lateral and frontal view. The somatotypes were classified into 18 types. 2. Eighteen subjects who had prominent somatic characteristics and average mea- surements were chosen. 3. Subjects were clothed and a sensory evaluation was carried out. 4. Experiments of alterations were carried out. The quantities of revision of torso patterns due to the difference of somatotypes were measured through these. These method were due to the items of the sensory evaluation. 5. By obtaining the results of the sensory evaluation and experiments of alterations, the torso patterns according to the somatotypes were developed. These were inputted to the CAD System and compared with one another. 6. Grading of the torso pattern according to each somatotype was carried out and thus a file of torso patterns was made according to the somatotypes.

  • PDF

Discrimination and Comparison of Digital License for Copyright Management of Software Source Code and CRYPTEX Model (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스의 비교와 분류 그리고 크립텍스 모델)

  • Cha, Byung-Rae;Jung, Young-Kee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.246-258
    • /
    • 2008
  • The software industry is so important to the 21C information society Not only the digital content control but the technology of software source code for the intellectual property is so much mean to international competition. On occurring disputation property of software source code, we have to prove the fact, there is a problem to discriminate the original software source code. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express node pattern and architecture pattern of software source code by tree structure form instead of complex software source code. And we make a simulation of discrimination possibility of digital license and propose CRYPTEX model.

SPaRe: Efficient SQLite Recovery Using Database Schema Patterns

  • Lee, Suchul;Lee, Sungil;Lee, Jun-Rak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1557-1569
    • /
    • 2017
  • In recent times, the Internet of Things (IoT) has rapidly emerged as one of the most influential information and communication technologies (ICT). The various constituents of the IoT together offer novel technological opportunities by facilitating the so-called "hyper-connected world." The fundamental tasks that need to be performed to provide such a function involve the transceiving, storing, and analyzing of digital data. However, it is challenging to handle voluminous data with IoT devices because such devices generally lack sufficient computational capability. In this study, we examine the IoT from the perspective of security and digital forensics. SQLite is a light-weight database management system (DBMS) used in many IoT applications that stores private information. This information can be used in digital forensics as evidence. However, it is difficult to obtain critical evidence from IoT devices because the digital data stored in these devices is frequently deleted or updated. To address this issue, we propose Schema Pattern-based Recovery (SPaRe), an SQLite recovery scheme that leverages the pattern of a database schema. In particular, SPaRe exhaustively explores an SQLite database file and identifies all schematic patterns of a database record. We implemented SPaRe on an iPhone 6 running iOS 7 in order to test its performance. The results confirmed that SPaRe recovers an SQLite record at a high recovery rate.

Design and Performance Evaluation of Attributed Intrusion Detection System Model using Pattern Extracting Agent (패턴 추출 에이전트를 이용한 분산 침입 탐지 시스템 모델 설계 및 성능 평가)

  • 정종근;편석범;이윤배
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.117-124
    • /
    • 2000
  • As network security is coming up with significant problem after the major Internet sites were hacked nowadays, IDS (Intrusion Detection System) is considered as a next generation security solution for more trusted network and system security We propose the new IDS model which can detect intrusion in the expanded distribute environment in host level, drawback of existing IDS, and implement prototype. We used pattern extraction agent so that we extract automatically audit file needed in intrusion detection even in other Platforms.

  • PDF

Multivariate Analysis and Gas Chromatographic Determination of the Smelly Nitro Compounds in Dried-Fishes (GC에 의한 건어물 냄새성분중 질소화합물 분석과 다변량해석)

  • Bae, Sun Young;Lee, Dong Sun
    • Journal of the Korean Chemical Society
    • /
    • v.41 no.2
    • /
    • pp.105-112
    • /
    • 1997
  • The smelly nitro compounds were extracted from dried fishes by simultanous distillation and extraction, then were analyzed by GC-MS. Carbon number and order of an amine could be predicted by using retention time and equivalent chain length. Anchovy, codfish, imitation crab meat, cuttle fish, file fish, pollack, shrimp, octopus, harvest fish, and hard-shelled mussel were used for this investigation. Various smelly nitro compounds such as methylamine, acetamide, thiazole, 2-hydroxy isopropylamine, N-methyl pyrroline, piperidine, cyclohexylamine were identified, however, dimethylamine, trimethylamine, diethylamine were not detected. Principal components analysis was applied to GC-MS profiles for pattern recognition of smelly nitro compounds in dried fishes. Multivariate aspects using principal components analysis were very useful for pattern recognition of smelly components, category similarity.

  • PDF

Evaluation method of Drought for Irrigation Reservoir (관개저수지의 가뭄평가 방법)

  • 김태철;이성희
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.44 no.2
    • /
    • pp.75-80
    • /
    • 2002
  • The severity of drought in (the) irrigation reservoir could be evaluated by the accumulative rainfall method, soil moisture content method, storage ratio method, and water supply restricted intensity method, etc. The storage ratio method would be the most reliable one for irrigation reservoir. The pattern of drought might be forecast with the most similar pattern of accumulative rainfall and/or storage ratio out of the file of past operation history.

A Study on Resin flow Analysis and Free Surface forming at Micro-stereolithography using a Dynamic Pattern Generator (동적 패턴 생성기를 이용한 마이크로 광 조형 시스템에서 수지 유동 해석 및 자유표면 형성에 관한 연구)

  • Won M.H.;Choi J.W.;Ha Y.M.;Lee S.H.;Kim H.C.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.10a
    • /
    • pp.878-881
    • /
    • 2005
  • A Stereolithography technology is based on stacking of sliced layer from STL file that is converted from 3-dimensional CAD data. A microstereolithography technology is evolved from conventional stereolithography to fabricate microstructures. In this technology, we have to consider influence of resin flow to make refresh surface. To generate new resin surface, stage has to be moved downward deeply and upward to desired position. At this time, resin flow affects to refresh surface of resin. And resin viscosity is the key factor in simulation of resin flow. By setting optimal refresh time for resin surface, total fabrication time is reduced and there is no damage to fabricated layers. In this research, we simulate resin flow using CFD software and derive optimal stage moving time and dwelling time.

  • PDF

Quality Assurance of Patients for Intensity Modulated Radiation Therapy (세기조절방사선치료(IMRT) 환자의 QA)

  • Yoon Sang Min;Yi Byong Yong;Choi Eun Kyung;Kim Jong Hoon;Ahn Seung Do;Lee Sang-Wook
    • Radiation Oncology Journal
    • /
    • v.20 no.1
    • /
    • pp.81-90
    • /
    • 2002
  • Purpose : To establish and verify the proper and the practical IMRT (Intensity--modulated radiation therapy) patient QA (Quality Assurance). Materials and Methods : An IMRT QA which consists of 3 steps and 16 items were designed and examined the validity of the program by applying to 9 patients, 12 IMRT cases of various sites. The three step OA program consists of RTP related QA, treatment information flow QA, and a treatment delivery QA procedure. The evaluation of organ constraints, the validity of the point dose, and the dose distribution are major issues in the RTP related QA procedure. The leaf sequence file generation, the evaluation of the MLC control file, the comparison of the dry run film, and the IMRT field simulate image were included in the treatment information flow procedure QA. The patient setup QA, the verification of the IMRT treatment fields to the patients, and the examination of the data in the Record & Verify system make up the treatment delivery QA procedure. Results : The point dose measurement results of 10 cases showed good agreement with the RTP calculation within $3\%$. One case showed more than a $3\%$ difference and the other case showed more than $5\%$, which was out side the tolerance level. We could not find any differences of more than 2 mm between the RTP leaf sequence and the dry run film. Film dosimetry and the dose distribution from the phantom plan showed the same tendency, but quantitative analysis was not possible because of the film dosimetry nature. No error had been found from the MLC control file and one mis-registration case was found before treatment. Conclusion : This study shows the usefulness and the necessity of the IMRT patient QA program. The whole procedure of this program should be peformed, especially by institutions that have just started to accumulate experience. But, the program is too complex and time consuming. Therefore, we propose practical and essential QA items for institutions in which the IMRT is performed as a routine procedure.

PG2CIF의 개발

  • Kim, Eung-Su;Lee, Cheol-Dong;Yu, Yeong-Uk
    • ETRI Journal
    • /
    • v.7 no.3
    • /
    • pp.3-11
    • /
    • 1985
  • CAD tools that has the common data base system are important to design for the VLSI. Each CAD tools are used to design for the VLSI, and to reduce the complexity, man-error, design-time for the IC design. CIF, a layout description language, was proved to be effective in this point. In this article, the program which translates pattern generation data for the mask tooling into CIF data was described. This program has its character in the unification of physical design data base for a design automated CAD system. The output format of CIF data is fitting to the input of the kgraph that is graphic layout editor, and the name of each layer and the output file is extended as a user's option.

  • PDF