• Title/Summary/Keyword: Key elements

Search Result 1,356, Processing Time 0.025 seconds

Design Strategy and Outer Jacket Prototype Study for Sustainable Growth of Outdoor Brands (아웃도어 브랜드의 지속가능한 성장을 위한 디자인 전략과 아우터 재킷 프로토타입 연구)

  • Hyeon Jeong Ji
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.48 no.1
    • /
    • pp.120-139
    • /
    • 2024
  • Considering the need for a clothing product design strategy for the sustainable growth of outdoor brands, this study analyzed an outdoor consumer survey applying selected sustainable elements, reflected the results in design planning, suggested prototypes, and presented a design strategy. The consumer survey was conducted from July 19 to July 25, 2022, and 216 respondents were used for analysis. As a result of the outdoor consumer survey analysis of selected sustainable elements, the most preferred outdoor design concept involved the keywords 'zero waste' and 'transformable design' from a sustainable economic perspective. An outer jacket design was then created focusing on these two keywords and a prototype was produced. The SCD (sustainability, consumer, designer) design strategy was presented as a strategy for sustainable growth of outdoor brands, and the key factors of this strategy are as follows: (a) application of sustainable design elements, (b) reflection of consumer opinions on sustainability, (c) designers' sustainable mindset and decisions.

Study of High Speed Image Registration using BLOG (BLOG를 이용한 고속 이미지 정합에 관한 연구)

  • Kim, Jong-Min;Kang, Myung-A
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2478-2484
    • /
    • 2010
  • In this paper, real-time detection methods for Panorama system Key-Points offers. A recent study in PANORAMA system real-time area navigation or DVR to apply such research has recently been actively. The detection of the Key-Point is the most important elements that make up a Panorama system. Not affected by contrast, scale, Orientation must be detected Key-Point. Existing research methods are difficult to use in real-time Because it takes a lot of computation time. Therefore, this paper propose BLOG(BitRate Laplacian Of Gaussian)method for faster time Key-Point Detecting and Through various experiments to detect the Speed, Computation, detection performance is compared against.

Summarizing the Differences in Chinese-Vietnamese Bilingual News

  • Wu, Jinjuan;Yu, Zhengtao;Liu, Shulong;Zhang, Yafei;Gao, Shengxiang
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1365-1377
    • /
    • 2019
  • Summarizing the differences in Chinese-Vietnamese bilingual news plays an important supporting role in the comparative analysis of news views between China and Vietnam. Aiming at cross-language problems in the analysis of the differences between Chinese and Vietnamese bilingual news, we propose a new method of summarizing the differences based on an undirected graph model. The method extracts elements to represent the sentences, and builds a bridge between different languages based on Wikipedia's multilingual concept description page. Firstly, we calculate the similarity between Chinese and Vietnamese news sentences, and filter the bilingual sentences accordingly. Then we use the filtered sentences as nodes and the similarity grade as the weight of the edge to construct an undirected graph model. Finally, combining the random walk algorithm, the weight of the node is calculated according to the weight of the edge, and sentences with highest weight can be extracted as the difference summary. The experiment results show that our proposed approach achieved the highest score of 0.1837 on the annotated test set, which outperforms the state-of-the-art summarization models.

Isonumber based Iso-Key Interchange Protocol for Network Communication

  • Dani, Mamta S.;Meshram, Akshaykumar;Pohane, Rupesh;Meshram, Rupali R.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.209-213
    • /
    • 2022
  • Key exchange protocol (KEP) is an essential setup to secure authenticates transmission among two or more users in cyberspace. Digital files protected and transmitted by the encryption of the files over public channels, a single key communal concerning the channel parties and utilized for both to encrypt the files as well as decrypt the files. If entirely done, this impedes unauthorized third parties from imposing a key optimal on the authorized parties. In this article, we have suggested a new KEP term as isokey interchange protocol based on generalization of modern mathematics term as isomathematics by utilizing isonumbers for corresponding isounits over the Block Upper Triangular Isomatrices (BUTI) which is secure, feasible and extensible. We also were utilizing arithmetic operations like Isoaddition, isosubtraction, isomultiplication and isodivision from isomathematics to build iso-key interchange protocol for network communication. The execution of our protocol is for two isointegers corresponding two elements of the group of isomatrices and cryptographic performance of products eachother. We demonstrate the protection of suggested isokey interchange protocol against Brute force attacks, Menezes et al. algorithm and Climent et al. algorithm.

Substrate Integrated Waveguide Power Divider Fed Dual-Dipole Array Antenna

  • Yu, Chen;Hong, Wei;Kuai, Zhenqi
    • Journal of electromagnetic engineering and science
    • /
    • v.10 no.3
    • /
    • pp.171-174
    • /
    • 2010
  • In the paper, a printed dual-dipole array antenna is presented. A 4-way planar SIW power divider is adopted for feeding the array antenna. The dual-dipole is adopted as radiation elements which greatly improves the impedance band. The measured bandwidth larger than 31 % for VSWR$\leq$1.5 operating near 14 GHz is achieved and in agreement with the simulated results. The radiation E-plane and H-plane radiation pattern is presented in the paper. The radiation gain is also presented in the paper.

A SIW Fed Antipodal Linear Tapered Slot Planar Multi-Beam Antenna for Millimeter-Wave Application

  • Zhang, Yingsong;Hong, Wei;Kuai, Zhenqi
    • Journal of electromagnetic engineering and science
    • /
    • v.10 no.3
    • /
    • pp.175-178
    • /
    • 2010
  • In this paper, a millimeter-wave multi-beam antenna is studied by rotating the antipodal linear tapered slot antenna(ALTSA) with respect to a center is successfully designed. In order to lowering the SLL and enhancing the isolation between the ALTSA elements, a row of metallic via is inserted between the ALTSAs. A 9 beams antenna is designed and experimented at Ka band. The measured and simulated results agree well with each other. The antenna can provide horizontal wide angle coverage up to ${\pm}62^{\circ}$. The gain of each beam can achieve about 12.5 dB. The mutual coupling between ports is all below 20 dB.

Finite Element Model to Simulate Crack Propagation Using Interface Elements and Its Verification in Tensile Test

  • Chu, Shi;Yu, Luo;Zhen, Chen
    • Journal of Advanced Research in Ocean Engineering
    • /
    • v.1 no.1
    • /
    • pp.36-43
    • /
    • 2015
  • Since the crack generation and its propagation caused by welding defects is one of the main hull damage patterns, the simulation of crack propagation process has an important significance for ship safety. Based on interface element method, a finite element model to simulate crack propagation is studied in the paper. A Lennard-Jones type potential function is employed to define potential energy of the interface element. Tensile tests of steel flat plates with initial central crack are carried out. Surface energy density and spring critical stress that are suitable for the simulation of crack propagation are determined by comparing numerical calculation and tests results. Based on a large number of simulation results, the curve of simulation correction parameter plotted against the crack length is calculated.

A Study on the 2 Key Bridge (2 Key Bridge에 대한 연구)

  • Park, Jong-Hee
    • Journal of Technologic Dentistry
    • /
    • v.22 no.1
    • /
    • pp.57-67
    • /
    • 2000
  • The 2 key bridge system has been developed to make crownless bridges without damaging sound teeth. Strong bridge work of single or multiple pontics is possible for replacing both anterior and posterior teeth. It is incresingly considerde to be unacceptable, by dentists as well as patients, to fully grind down healthy elements in order fit a conventional bridges. Because this technique uses a combination of hole and adhesive fitting, it has a number of adventages over etched bridges and conventional bridges: - In comparison with conventional bridges, hardly and healthy dental tissue is sacrificed - Due to the lack of crown edges there is no periodontal pressure, as is the case with conventional bridges - The treatment procedure is straight forward and involves less time than conventional bridges. - The treatment is largely resiverable and repairable

  • PDF

Damage detection on two-dimensional structure based on active Lamb waves

  • Peng, Ge;Yuan, Shen Fang;Xu, Xin
    • Smart Structures and Systems
    • /
    • v.2 no.2
    • /
    • pp.171-188
    • /
    • 2006
  • This paper deals with damage detection using active Lamb waves. The wavelet transform and empirical mode decomposition methods are discussed for measuring the Lamb wave's arrival time of the group velocity. An experimental system to diagnose the damage in the composite plate is developed. A method to optimize this system is also given for practical applications of active Lamb waves, which involve optimal arrangement of the piezoelectric elements to produce single mode Lamb waves. In the paper, the single mode Lamb wave means that there exists no overlapping among different Lamb wave modes and the original Lamb wave signal with the boundary reflection signals. Based on this optimized PZT arrangement method, five damage localizations on different plates are completed and the results using wavelet transform and empirical mode decomposition methods are compared.

A Method on Maintaining Consistency of Certificates in public Key Infrastructure using DNS (DNS를 사용한 공개키 인증서의 일치성 보장에 관한연구)

  • 석우진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.3-12
    • /
    • 2000
  • In this paper we propose a new algorithm which resolves the inconsistency problems occurring when DNS severs are employed as elements of PKI. The inconsistency may take place between primary name servers and secondary name servers and between cached certificate and original certificate. The former can be removed by adapting RFC 1996 NOTIFY opcode for DNS. In order to eliminate the latter type of inconsistency we develope a new algorithm which is implemented with two additional RR(Resource Record). The present algorithm is designed such that DNS contacts the destination DNS prior to returning public key to users. Therefore the inconsistency problem occurring when DNS is operated as PKI can be eliminated by using the proposed adaptation and algorithm.