• Title/Summary/Keyword: Position trace

Search Result 131, Processing Time 0.027 seconds

Assessment of clothing ventilation by a trace gas method (Trace gas법에 의한 의복의 환기 양상의 평가)

  • 추미선
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.21 no.8
    • /
    • pp.1387-1395
    • /
    • 1997
  • Effects of the ambient air temperature and the opening position on the pattern of the clothing ventilation of a thermal manikin wearing an impermeable blouse were investigated by the trace gas method. Under an isothermal condition, the ventilation was governed by diffusion, and the ventilation rate through the wrist-openings was greatly affected by the distance from the openings. Under non-isothermal conditions, however, the ventilation was accelerated by the convection driven by the temperature gradient between the clothing microclimate and the surrounding air; the greater the temperature gradient, the greater the ventilation. Even though it was certainly affected by the ambient air temperature, the ventilation rate was more significantly influenced by the position of openings. The ventilation patterns at the arm and the body were distinctive.

  • PDF

Development of Position Information System using GPS and PDA (GPS와 PDA를 이용한 위치정보시스템 개발에 관한 연구)

  • 최병길;홍상기
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2004.04a
    • /
    • pp.119-124
    • /
    • 2004
  • Tracking correct position information is essential for rescue active in the case of wreck accidents, abscondence and kid napping. Position information system Using GPS and PDA can trace holder's positions exactly and fast, the system can minimize a loss of lives in emergency circumstance. In this study, it is aimed to develop a chasing system to position holders rapidly during distress situation.

  • PDF

A Study of Connection Maintenance Techniques using TCP Hijacking

  • Kim, JeomGoo
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.57-63
    • /
    • 2014
  • Internet users drastically increases, also through the Internet to buy various intrusion significantly increased. These various methods of intrusion defense thinking hacker attempting to hack the actual position of the real-time tracking of the intruder backtracking technique for research have been actively carried out. In this paper, a technique used in TCP Connection trace-back System in one packet trace-back technique watermarking technique using TCP Hijacking Connection Reply packets how to solve the difficulties of maintaining presented.

GPS to monitor and track vehicle position in steel works

  • Park, Chel-No;Jee, Gyu-In
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.114.2-114
    • /
    • 2001
  • In steel works, Locomotives and torpedo ladle cars are used to convey the smelted iron that comes out Blast Furnace to the steel-making mill. Above conveying vehicles are operated in all steel works area. And to trace their positions, after partitioned their areas, Automatic Vehicle Identification(RF-ID method) is installed on the railroad and identifies vehicle numbers. But AVI facilities have many problem that means that are too expensive, cost too much maintenance fee and inefficient management. This paper is to revamp those inefficient operations and state the status of operations of train positioning system, get to know what the problem is. And also when we use GPS to monitor and trace the vehicle position ...

  • PDF

Position Detection System of Robot by using Visible Light Communication (VLC) (가시광통신을 이용한 로봇 위치확인 시스템)

  • Kim, Eung Soo
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.23 no.4
    • /
    • pp.119-123
    • /
    • 2016
  • In this paper, we have fabricated the position detection system with LED and optical sensor to detect a position and trace of robot through visible light communication (VLC). The fabricated position detection system did not have been affected by sunlight in outdoor and a fluorescent light in building. Because 4 LEDs, respectively, transmitted different signals, we have known the position of robot. And we have also observed a trajectory of robot in real time.

Real-Time Haptic Rendering for Tele-operation with Varying Communication Time Delay (가변적인 통신지연시간을 갖는 원격 작업 환경을 위한 실시간 햅틱 렌더링)

  • Lee, K.;Chung, S.Y.
    • Journal of Power System Engineering
    • /
    • v.13 no.2
    • /
    • pp.71-82
    • /
    • 2009
  • This paper presents a real-time haptic rendering method for a realistic force feedback in a remote environment with varying communication time-delay. The remote environment is assumed as a virtual environment based on a computer graphics, for example, on-line shopping mall, internet game and cyber-education. The properties of a virtual object such as stiffness and viscosity are assumed to be unknown because they are changed according to the contact position and/or a penetrated depth into the object. The DARMAX model based output estimator is proposed to trace the correct impedance of the virtual object in real-time. The output estimator is developed on the input-output relationship. It can trace the varying impedance in real-time by virtue of P-matrix resetting algorithm. And the estimator can trace the correct impedance by using a white noise that prevents the biased input-output information. Realistic output forces are generated in real-time, by using the inputs and the estimated impedance, even though the communication time delay and the impedance of the virtual object are unknown and changed. The generated forces trace the analytical forces computed from the virtual model of the remote environment. Performance is demonstrated by experiments with a 1-dof haptic device and a spring-damper-based virtual model.

  • PDF

A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2) (네트워크 시뮬레이터 도구를 이용한 침입자 역추적 알고리즘 검증)

  • Seo Dong-il;Kim Hwan-kuk;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • Internet has become an essential part of our daily lives. Many of the day to day activities can already be carried out over Internet, and its convenience has greatly increased the number of Internet users. Hut as Internet gains its popularity, the illicit incidents over Internet has also proliferated. The intruder trace-back technology is the one that enables real time tracking the position of the hacker who attempts to invade the system through the various bypass routes. In this paper, the RTS algorithm which is the TCP connection trace-back system using the watermarking technology on Internet is proposed. Furthermore, the trace-bark elements are modeled by analyzing the Proposed trace-back algorithm, and the results of the simulation under the virtual topology network using ns-2, the network simulation tool are presented.

Numerical Analysis of Unsteady Heat Transfer for the Location Selection of Anti-freeze for the Fire Protection Piping with Electrical Heat Trace (소방 배관 동파방지용 열선의 위치 선정을 위한 비정상 열전달 수치해석)

  • Choi, Myoung-Young;Lee, Dong-Wook;Choi, Hyoung-Gwon
    • Fire Science and Engineering
    • /
    • v.28 no.1
    • /
    • pp.52-57
    • /
    • 2014
  • In this paper, the unsteady incompressible Navier-Stokes equations coupled with energy equation were solved to find out the optimal location of electrical heat trace for anti-freeze of water inside the pipe for fire protection. Since the conduction equation of pipe was coupled with the natural convection of water, the analysis of conjugate heat transfer was conducted. A commercial code (ANSYS-FLUENT) based on SIMPLE-type algorithm was used for investigating the unsteady flows and temperature distributions in water region. From the numerical experiments, the isotherms and the vector fields in water region were obtained. Furthermore, it was found that the lowest part of the pipe cross-section was an optimal position of electrical heat trace assuming the constant thermal expansion coefficient of water since the minimum temperature of the water with the position is higher than those with the other positions.

An Efficient Scheme to write a Transmission Schedule using Convergence after Interactive Operations in a Stored Video (대화형 연산 후 수렴을 이용한 저장된 비디오의 효율적인 전송 스케줄 작성 방안)

  • Lee, Jae-Hong;Kim, Seung-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2050-2059
    • /
    • 2000
  • In a video-on-Demand(VOD) service, a server has to return to he normal playback quickly at a certain new frame position after interactive operations such as jump or last playback. In this paper, we propose an efficient scheme to write a transmission schedule for a playback restart of a video stream at a new frame position after interactive operations. The proposed scheme is based on convergence characteristics, that is transmission schedules with different playback startup frame position in a video stream meet each other at some frame position. The scheme applies a bandwidth smoothing from a new frame position to a convergence position without considering all remaining frames of a video stream. And then the scheme transmits video dta according to the new schedule from the new frame position to the convergence position, and then transmits the remaining video data according to the reference schedule from the convergence position, and then transmits the remaining video data according to the reference schedule from the convergence position to the last frame position. In this paper, we showed that there existed the convergence position corresponding to nay frame position in a video stream through many experiments based on MPEG-1 bit trace data. With the convergence we reduced the computational overhead of a bandwidth smoothing, which was applied to find a new transmission schedule after interactive operations. Also, storage overhead is greatly reduced by storing pre-calculated schedule information up to the convergence position for each I frame position of a video stream with video data off-line. By saving information on a transmission schedule off-line along with the video data and searching the schedule corresponding to the specified restarting frame position, we expect the possibility of normal playback of a video stream with small tolerable playback startup delay.

  • PDF

Where a Null C Fails to PF-merge

  • Hong, Sung-Shim
    • Language and Information
    • /
    • v.9 no.2
    • /
    • pp.69-83
    • /
    • 2005
  • This paper discusses the distribution of a null complementizer C, as opposed to an overt counterpart 'that', presenting empirical support both for and against the PF-merge analysis of C proposed by Boscovic and Lasnik (2003, henceafter B&L) who in turn attribute to the proposal in Pesetsky (1992) and Halle & Marantz (1993). In Section I, as a background, I discuss B&L's proposal that a null complementizer C is a PF-affix which undergoes a PF-merger operation at the PF component. In Section 2, after a brief sketch of the distribution of a null C mostly in bare-relatives, I explore the possibility of extending B&L's analysis to accomodate the null C's in the bare-relative constructions. In Section 3, I argue that despite some empirical difficulties, B&L's analysis of a null C as a PF-affix can still be maintained, if Adverb Fronting is an operation to Spec-C position. Furthermore, I propose a rule - PF Spell-Out Constraint - to account for the C-trace (i.e. that-trace) effect in relative constructions. With the PF Spell-Out Constraint and B&L's PF-merge account, the distribution of a null C can better be analyzed.

  • PDF