• Title/Summary/Keyword: Function Domain

Search Result 2,065, Processing Time 0.024 seconds

A Study on Filling Holes of Large Polygon Model using Implicit Surface Scheme and Domain Decomposition Method (음함수 곡면기법과 영역 분할법을 이용한 대형 폴리곤 모델의 홀 메움에 관한 연구)

  • Yoo Dong-Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.23 no.1 s.178
    • /
    • pp.174-184
    • /
    • 2006
  • In order to fill the holes with complex shapes in the large polygon model, a new approach which is based on the implicit surface interpolation method combined with domain decomposition method is presented. In the present study, a surface is constructed by creating smooth implicit surface from the incomplete polygon model through which the surface should pass. In the method an implicit surface is defined by a radial basis function, a continuous scalar-valued function over the domain $R^3$ The generated surface is the set of all points at which this scalar function takes on the value zero and is created by placing zero-valued constraints at the vertices of the polygon model. In this paper the well-known domain decomposition method is used in order to treat the large polygon model. The global domain of interest is divided into smaller domains where the problem can be solved locally. LU decomposition method is used to solve a set of small local problems and their local solutions are combined together using the weighting coefficients to obtain a global solution. In order to show the validity of the present study, various hole fillings are carried out fur the large and complex polygon model of arbitrary topology.

A Study on the Electrical and Electronic Architecture of Electric Vehicle Powertrain Domain through Big Data Analysis (빅데이터 분석을 통한 전기차 파워트레인 도메인 전기전자 아키텍처 연구)

  • Kim, Do Kon;Kim, Woo Ju
    • The Journal of Information Systems
    • /
    • v.31 no.4
    • /
    • pp.47-73
    • /
    • 2022
  • Purpose The purpose of this study is to select the electronic architecture concept of the powertrain domain of the electronic platform to be applied to electric vehicles after 2025. Previously, the automotive electrical and electronic architecture was determined only by trend analysis, but the purpose was to determine the scenario based on the data and select it with clear evaluation indicators. Design/methodology/approach This study identified the function to be applied to the powertrain domain of next-generation electric vehicle, estimated the controller, defined the function feature list, organized the scenario candidates with the controller list and function feature list, and selected the final architecture scenario. Findings According to the research results, the powertrain domain of electric vehicles was selected as the architectural concept to apply the DCU (Domain Control Unit) and VCU (Vehicle Control Unit) integrated architecture to next-generation electric vehicles. Although it is disadvantageous or equivalent in terms of cost, it was found to be excellent in most indicators such as stability, security, and hardware demand.

Deep learning-based de-fogging method using fog features to solve the domain shift problem (Domain Shift 문제를 해결하기 위해 안개 특징을 이용한 딥러닝 기반 안개 제거 방법)

  • Sim, Hwi Bo;Kang, Bong Soon
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.10
    • /
    • pp.1319-1325
    • /
    • 2021
  • It is important to remove fog for accurate object recognition and detection during preprocessing because images taken in foggy adverse weather suffer from poor quality of images due to scattering and absorption of light, resulting in poor performance of various vision-based applications. This paper proposes an end-to-end deep learning-based single image de-fogging method using U-Net architecture. The loss function used in the algorithm is a loss function based on Mahalanobis distance with fog features, which solves the problem of domain shifts, and demonstrates superior performance by comparing qualitative and quantitative numerical evaluations with conventional methods. We also design it to generate fog through the VGG19 loss function and use it as the next training dataset.

A Molecular Model for Light Signal Perception and Interdomain Crosstalk in Phytochrome Photoreceptors

  • Song, Pill-Soon;Park, Chung-Mo
    • Journal of Photoscience
    • /
    • v.7 no.3
    • /
    • pp.79-86
    • /
    • 2000
  • Phytochromes are red and far-red light absorbing photoreceptors for photomorphogenesis in plants. The red/far wavelength reversible biliproteins are made up of two structural domains. The light-perceiving function of the photoreceptor resides in the N-terminal domain, whereas the signal transducing regulatory function is located within the C-terminal domain. The characteristic role of the phytochromes as phtosensory molecular switches is derived from the phototransformation between two distinct spectral forms, the red light absorbing Pr and the far-red light absorbing Pfr forms. The photoinduced Pr Pfr phototransformation accompanies subtle conformational changes throughout the phytochrome molecule. The conformational signals are subsequently transmitted to the C-terminal domain through various inter-domain crosstalks and induce the interaction of the activated C-terminal domain with phytochrome interacting factors. Thus the inter-domain crosstalks play critical roles in the photoactivation of the phytochromes. Posttranslational modifications, such as the phosphorylation of Ser-598, are also involved in this process through conformational changes and by modulating inter-domain signaling.

  • PDF

The Study for the Method of Network Security Domain Architecture Designing (네트워크 보안도메인 아키텍처 설계방법 연구)

  • Noh, Si-Choon
    • Journal of Digital Contents Society
    • /
    • v.8 no.2
    • /
    • pp.165-171
    • /
    • 2007
  • The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security domain is the concept to distinguish the domain from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security domain could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every domain. For the establishment of security domain it is needed to show what criterion of net work should be set up. This study is to research the criterion for topology factor, security domain. structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture. The purpose of this paper is to suggest the necessity of development of security mechanism and the distinguished blocking function according to the level of security domain.

  • PDF

A Study on Design of Multivariable Equalizer for Transmission Distortion Compensation (전송왜곡보상용 다중가변등화기 설계에 관한 연구)

  • 김동석;최규훈;문홍진;김종교
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.6
    • /
    • pp.921-928
    • /
    • 1990
  • A multivariable equalizer is designed which compensates transmission distortion for coaxial transmission line. The characteristic transfer function with bilateral parameter domain is approximated using the expansion method of orthonormal function and Gram Schmidt orthogonal function, but the parameter domain of approximated function is limited to unilateral. To solve that problem, Bode type transfer function is used to give bilateral variable characteristic to approximated function. The multivariable equalizer in this paper can be substituted for the current equalizer which consist of a fixed equalizer and a variable equalizer.

  • PDF

COEFFICIENT ESTIMATES FOR FUNCTIONS ASSOCIATED WITH VERTICAL STRIP DOMAIN

  • Bulut, Serap
    • Communications of the Korean Mathematical Society
    • /
    • v.37 no.2
    • /
    • pp.537-549
    • /
    • 2022
  • In this paper, we consider a convex univalent function fα,β which maps the open unit disc 𝕌 onto the vertical strip domain Ωα,β = {w ∈ ℂ : α < ℜ < (w) < β} and introduce new subclasses of both close-to-convex and bi-close-to-convex functions with respect to an odd starlike function associated with Ωα,β. Also, we investigate the Fekete-Szegö type coefficient bounds for functions belonging to these classes.

Security Properties of Domain Extenders for Cryptographic Hash Functions

  • Andreeva, Elena;Mennink, Bart;Preneel, Bart
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.453-480
    • /
    • 2010
  • Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most common procedure to extend the domain of a compression function in order to obtain a hash function is a simple linear iteration; however, some variants use multiple iterations or a tree structure that allows for parallelism. This paper presents a survey of 17 extenders in the literature. It considers the natural question whether these preserve the security properties of the compression function, and more in particular collision resistance, second preimage resistance, preimage resistance and the pseudo-random oracle property.

Sequential Feasible Domain Sampling of Kriging Metamodel by Using Penalty Function (벌칙함수 기반 크리깅메타모델의 순차적 유용영역 실험계획)

  • Lee Tae-Hee;Seong Jun-Yeob;Jung Jae-Jun
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.30 no.6 s.249
    • /
    • pp.691-697
    • /
    • 2006
  • Metamodel, model of model, has been widely used to improve an efficiency of optimization process in engineering fields. However, global metamodels of constraints in a constrained optimization problem are required good accuracy around neighborhood of optimum point. To satisfy this requirement, more sampling points must be located around the boundary and inside of feasible region. Therefore, a new sampling strategy that is capable of identifying feasible domain should be applied to select sampling points for metamodels of constraints. In this research, we suggeste sequential feasible domain sampling that can locate sampling points likely within feasible domain by using penalty function method. To validate the excellence of feasible domain sampling, we compare the optimum results from the proposed method with those form conventional global space-filling sampling for a variety of optimization problems. The advantages of the feasible domain sampling are discussed further.

Comparison of structure, function and regulation of plant cold shock domain proteins to bacterial and animal cold shock domain proteins

  • Chaikam, Vijay;Karlson, Dale T.
    • BMB Reports
    • /
    • v.43 no.1
    • /
    • pp.1-8
    • /
    • 2010
  • The cold shock domain (CSD) is among the most ancient and well conserved nucleic acid binding domains from bacteria to higher animals and plants. The CSD facilitates binding to RNA, ssDNA and dsDNA and most functions attributed to cold shock domain proteins are mediated by this nucleic acid binding activity. In prokaryotes, cold shock domain proteins only contain a single CSD and are termed cold shock proteins (Csps). In animal model systems, various auxiliary domains are present in addition to the CSD and are commonly named Y-box proteins. Similar to animal CSPs, plant CSPs contain auxiliary C-terminal domains in addition to their N-terminal CSD. Cold shock domain proteins have been shown to play important roles in development and stress adaptation in wide variety of organisms. In this review, the structure, function and regulation of plant CSPs are compared and contrasted to the characteristics of bacterial and animal CSPs.