• Title/Summary/Keyword: Reader Recognition

Search Result 109, Processing Time 0.026 seconds

Will CFD ever Replace Wind Tunnels for Building Wind Simulations?

  • Phillips, Duncan A.;Soligo, Michael J.
    • International Journal of High-Rise Buildings
    • /
    • v.8 no.2
    • /
    • pp.107-116
    • /
    • 2019
  • The use of computational fluid dynamics (CFD) is becoming an increasingly popular means to model wind flows in and around buildings. The first published application of CFD to both indoor and outdoor building airflows was in the 1970's. Since then, CFD usage has expanded to include different aspects of building design. Wind tunnel testing (WTT) on buildings for wind loads goes back as far as 1908. Gustave Eiffel built a pair of wind tunnels in 1908 and 1912. Using these he published wind loads on an aircraft hangar in 1919 as cited in Hoerner (1965 - page 74). The second of these wind tunnels is still in use today for tests including building design ($Damljanovi{\acute{c}}$, 2012). The Empire State Building was tested in 1933 in smooth flow - see Baskaran (1993). The World Trade Center Twin Towers in New York City were wind tunnel tested in the mid-sixties for both wind loads, at Colorado State University (CSU) and the [US] National Physical Laboratory (NPL), as well as pedestrian level winds (PLW) at the University of Western Ontario (UWO) - Baskaran (1993). Since then, the understanding of the planetary boundary layer, recognition of the structures of turbulent wakes, instrumentation, methodologies and analysis have been continuously refined. There is a drive to replace WTT with computational methods, with the rationale that CFD is quicker, less expensive and gives more information and control to the architects. However, there is little information available to building owners and architects on the limitations of CFD for flows around buildings and communities. Hence building owners, developers, engineers and architects are not aware of the risks they incur by using CFD for different studies, traditionally conducted using wind tunnels. This paper will explain what needs to happen for CFD to replace wind tunnels. Ultimately, we anticipate the reader will come to the same conclusion that we have drawn: both WTT and CFD will continue to play important roles in building and infrastructure design. The most pressing challenge for the design and engineering community is to understand the strengths and limitations of each tool so that they can leverage and exploit the benefits that each offers while adhering to our moral and professional obligation to hold paramount the safety, health, and welfare of the public.

A Study on the Influence of Celebrities on the Purchase of Books (유명인이 집필한 책 구매에 미치는 영향에 관한 연구)

  • Lee, Ji-Hun
    • Journal of Industrial Convergence
    • /
    • v.16 no.2
    • /
    • pp.41-48
    • /
    • 2018
  • The purpose of this study is to identify the effects of book content, celebrity recognition, and celebrity expertise on book purchasing, and to suggest implications for the marketing factors for sales and the factors to consider when publishing celebrity books . The implications of this study are as follows. First, when a celebrity publishes a book, it should actively promote marketing activities that can give credibility to the reader and to the credibility of the information about the book field that he usually compiles. Second, when a book is compiled, celebrities should pay attention to book designs and pictures that fit their images. In addition, it is necessary to build a new type of advertising strategy will be. Finally, celebrities should ask for various means to inform viewers and pens of their information, experiences, and learned knowledge in various advertising environments before publishing the book. If you continue to recognize it, your future purchases of books will increase.

A Study on the Development of a Tool to Support Classification of Strategic Items Using Deep Learning (딥러닝을 활용한 전략물자 판정 지원도구 개발에 대한 연구)

  • Cho, Jae-Young;Yoon, Ji-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.967-973
    • /
    • 2020
  • As the implementation of export controls is spreading, the importance of classifying strategic items is increasing, but Korean export companies that are new to export controls are not able to understand the concept of strategic items, and it is difficult to classifying strategic items due to various criteria for controlling strategic items. In this paper, we propose a method that can easily approach the process of classification by lowering the barrier to entry for users who are new to export controls or users who are using classification of strategic items. If the user can confirm the decision result by providing a manual or a catalog for the procedure of classifying strategic items, it will be more convenient and easy to approach the method and procedure for classfying strategic items. In order to achieve the purpose of this study, it utilizes deep learning, which are being studied in image recognition and classification, and OCR(optical character reader) technology. And through the research and development of the support tool, we provide information that is helpful for the classification of strategic items to our companies.

The Significance of N6-Methyladenosine RNA Methylation in Regulating the Hepatitis B Virus Life Cycle

  • Jae-Su Moon;Wooseong Lee;Yong-Hee Cho;Yonghyo Kim;Geon-Woo Kim
    • Journal of Microbiology and Biotechnology
    • /
    • v.34 no.2
    • /
    • pp.233-239
    • /
    • 2024
  • N6-methyladenosine (m6A) RNA methylation has recently emerged as a significant co-transcriptional modification involved in regulating various RNA functions. It plays a vital function in numerous biological processes. Enzymes referred to as m6A methyltransferases, such as the methyltransferase-like (METTL) 3-METTL14-Wilms tumor 1 (WT1)-associated protein (WTAP) complex, are responsible for adding m6A modifications, while m6A demethylases, including fat mass and obesity-associated protein (FTO) and alkB homolog 5 (ALKBH5), can remove m6A methylation. The functions of m6A-methylated RNA are regulated through the recognition and interaction of m6A reader proteins. Recent research has shown that m6A methylation takes place at multiple sites within hepatitis B virus (HBV) RNAs, and the location of these modifications can differentially impact the HBV infection. The addition of m6A modifications to HBV RNA can influence its stability and translation, thereby affecting viral replication and pathogenesis. Furthermore, HBV infection can also alter the m6A modification pattern of host RNA, indicating the virus's ability to manipulate host cellular processes, including m6A modification. This manipulation aids in establishing chronic infection, promoting liver disease, and contributing to pathogenesis. A comprehensive understanding of the functional roles of m6A modification during HBV infection is crucial for developing innovative approaches to combat HBV-mediated liver disease. In this review, we explore the functions of m6A modification in HBV replication and its impact on the development of liver disease.

An Algorithm of Fingerprint Image Restoration Based on an Artificial Neural Network (인공 신경망 기반의 지문 영상 복원 알고리즘)

  • Jang, Seok-Woo;Lee, Samuel;Kim, Gye-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.530-536
    • /
    • 2020
  • The use of minutiae by fingerprint readers is robust against presentation attacks, but one weakness is that the mismatch rate is high. Therefore, minutiae tend to be used with skeleton images. There have been many studies on security vulnerabilities in the characteristics of minutiae, but vulnerability studies on the skeleton are weak, so this study attempts to analyze the vulnerability of presentation attacks against the skeleton. To this end, we propose a method based on the skeleton to recover the original fingerprint using a learning algorithm. The proposed method includes a new learning model, Pix2Pix, which adds a latent vector to the existing Pix2Pix model, thereby generating a natural fingerprint. In the experimental results, the original fingerprint is restored using the proposed machine learning, and then, the restored fingerprint is the input for the fingerprint reader in order to achieve a good recognition rate. Thus, this study verifies that fingerprint readers using the skeleton are vulnerable to presentation attacks. The approach presented in this paper is expected to be useful in a variety of applications concerning fingerprint restoration, video security, and biometrics.

Performance of Passive UHF RFID System in Impulsive Noise Channel Based on Statistical Modeling (통계적 모델링 기반의 임펄스 잡음 채널에서 수동형 UHF RFID 시스템의 성능)

  • Jae-sung Roh
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.835-840
    • /
    • 2023
  • RFID(Radio Frequency Identification) systems are attracting attention as a key component of Internet of Things technology due to the cost and energy efficiency of application services. In order to use RFID technology in the IoT application service field, it is necessary to be able to store and manage various information for a long period of time as well as simple recognition between the reader and tag of the RFID system. And in order to read and write information to tags, a performance improvement technology that is strong and reliable in poor wireless channels is needed. In particular, in the UHF(Ultra High Frequency) RFID system, since multiple tags communicate passively in a crowded environment, it is essential to improve the recognition rate and transmission speed of individual tags. In this paper, Middleton's Class A impulsive noise model was selected to analyze the performance of the RFID system in an impulsive noise environment, and FM0 encoding and Miller encoding were applied to the tag to analyze the error rate performance of the RFID system. As a result of analyzing the performance of the RFID system in Middleton's Class A impulsive noise channel, it was found that the larger the Gaussian noise to impulsive noise power ratio and the impulsive noise index, the more similar the characteristics to the Gaussian noise channel.

Timing Agency in Digital Comics : Focused on Multimedia Comics (전자만화의 타이밍 에이전시 : 멀티미디어와 혼합된 만화를 중심으로)

  • Yoh, Mi-Ju
    • Cartoon and Animation Studies
    • /
    • s.27
    • /
    • pp.79-97
    • /
    • 2012
  • Comic book readers have respectively different reading speed and this means that time in comics is translated by readers' view. The authors arrange panels and gutters to control time, but time recognition in comics depends on the readers and generally it is the readers' role. On the contrary, the phenomenon having occurred by infinite canvas varied the authority of timing. Infinite canvas can give the comic book authors more authority of controlling timing than the readers by intervening in readers' relative time as an agents and transforming their fictive time into absolute time. Following to the concept of "Agency" in games, agency is the power which satisfies the players by reemergence of their intentions. Since some of digital comics absorbed the properties of other media such as animation and sound, we can see that the reader's timing agency is shifted to the author's timing agency. The purpose of this study is to analyse this phenomenon and to remind that agency motivated by the balance between material constraints and formal constraints becomes a condition of readability of digital comics but excessive timing constraints given to the readers causes a decrease of the readers' timing agency. This also can be a considerable matter when we produce digital comics.

Design of Geo-fence-based Smart Attendance System (지오펜스 기반 스마트 출결시스템 설계)

  • Hong, Seong-Pyo;Kim, Tae-Yeun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.496-502
    • /
    • 2020
  • The electronic attendance management system is being introduced and operated on a pilot basis by some universities and educational institutions. However, most of the related systems have installed and operated the existing barcode and magnetic card systems. Classroom attendance is managed by introducing RF cards, but it causes problems such as recognition distance (less than 5cm) and the need for a check process in which students have to read the card each time with a reader for attendance. Also, it is not possible to respond in real time to the situation of midterm (early leave, absence from the second lecture time, etc.) because it is used in the lecture time of one subject with the record checked once. In order to solve these problems, the various mobile attendance systems proposed to solve these problems are also unable to fundamentally solve problems such as interim attendance and proxy attendance because they check attendance using only the application of a smartphone. In this paper, we use geofencing technology, which is a positioning-based technology that detects the entry and exit of people, objects, etc. in areas separated by virtual boundaries. The proposed system solves the problem of intermediate attendance and alternate attendance by setting the student to automatically record the access record when entering and leaving the classroom set as a geofence with a smartphone. In addition, it also provides a function to prevent unintentional mistakes that occur through the smartphone by limiting some of the functions of the smartphone such as silence, vibration, and Internet use when entering the classroom.

The Improvement Measures for the Establishment of Emergency Management System in Private Security (위험사회의 전개에 따른 민간경비 산업의 대응과제 - 위기관리를 중심으로)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.103-125
    • /
    • 2005
  • Hazard are defined here as threat to life, well-being, material goods and environmental from the extremes of natural processes or technology. The challenges of natural and technology in increasing the exposure of people and property to risk pose a dilemma for any government seeking the fullest protection for its people and their property. As society progresses and as technology improves and becomes ever more intricate and far reaching, the human species is confronted with increasingly diverse and numerous catastrophic events. Not so infrequently, unfortunately, the impact of either a man-made or natural disaster is compounded by the fact that policy makers have neither prepared themselves or the public to respond appropriately to a disaster once the tragedy has struck. Many concerns have been raised for importance of emergency management after 1990's numerous urban disasters in Korea. Emergency management is the discipline and profession of applying science, technology, planning, and management to deal with extreme events that can injure or kill large numbers of people, cause extensive damage to property, and disrupt community life. When the primary function of private security is to protect lives and property of clients, emergency management should be included in the security service and many countermeasures should be carried out for that purpose. The purpose of this study is to establish ways and means needed to improve the private security emergency management system in Korea. This study is spilt into four chapters. Chapter I is the introduction part. Chapter II introduces the reader to a private security and emergency management theory, and Chapter III deals with the establishment of an effective emergency management system in Korea private security, Chapter IV is a conclusion. Policy makers and private security industry employers in Korea has not concerned with the importance of training and education by lack of recognition and has been passive about qualified guards. And the authorities supervising and the administrating the guards has not recognized the importance of private security and has neglected the training of the guards. In theses contexts, private security should develop and maintain a educational program of emergency management to meet their responsibilities to provide the protection and safety of the clients. Today's modern corporate security director, is, first of all, a competent, well-rounded business executive and, second, a 'service expert'. And, emergency management personnel in private security industry need continuous training.

  • PDF