• Title/Summary/Keyword: Speed-Sensitive

Search Result 495, Processing Time 0.03 seconds

Waveform characteristics of ultrasonic wave generated from CNT/PDMS composite (CNT/PDMS 복합체로부터 방사된 초음파의 파형 특성)

  • Kim, Gisuk;Kim, Moojoon;Ha, Kanglyeol;Lee, Jooho;Paeng, Dong-Guk;Choi, Min Joo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.4
    • /
    • pp.459-466
    • /
    • 2019
  • When a laser pulse is irradiated on a CNT (Carbon Nanotube) and PDMS (Poly dimethylsiloxane) composite coated on a transparent PMMA (Poly methyl methacrylate) substrate, a strong ultrasonic wave is generated due to the thermoelastic effect. In this paper, the thermoacoustic theory related to the wave generation by the CNT/PDMS composite was established. The waveforms of ultrasonic waves when a laser pulse having a Gaussian waveform is irradiated on the composite with a thickness of $20{\mu}m$ were numerically simulated. From the results, it was confirmed that ultrasonic shock waves can be generated from the CNT/PDMS composite and the waveforms are changed little even if the physical properties of the composite are changed by ${\pm}20%$. It was found that the peak positive and negative pressures increase as the thermal expansion coefficient increases, or as density, heat capacity and sound speed decreased. However, those changes were not so sensitive with thermal conductivity. In addition, the physical properties of the CNT/PDMS composite fabricated in this study were estimated from the comparison of the measurement and simulation results.

3D numerical modeling of impact wave induced by landslide using a multiphase flow model (다상흐름 모형을 이용한 산사태 유발 수면충격파 3차원 수치모의)

  • Kim, Byungjoo;Paik, Joongcheol
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.11
    • /
    • pp.943-953
    • /
    • 2021
  • The propagation of impact wave induced by landslide and debris flow occurred on the slope of lake, reservoir and bays is a three-dimensional natural phenomenon associated with strong interaction of debris flow and water flow in complex geometrical environments. We carried out 3D numerical modeling of such impact wave in a bay using a multiphase turbulence flow model and a rheology model for non-Newtonian debris flow. Numerical results are compared with previous experimental result to evaluate the performance of present numerical approach. The results underscore that the reasonable predictions of both thickness and speed of debris flow head penetrating below the water surface are crucial to accurately reproduce the maximum peak height and free surface profiles of impact wave. Two predictions computed using different initial debris flow thicknesses become different from the instant when the peaks of impact waves fall due to the gravity. Numerical modeling using relatively thick initial debris flow thickness appears to well reproduce the water surface profile of impact wave propagating across the bay as well as wave run-up on the opposite slope. The results show that the maximum run-up height on the opposite slope is not sensitive to the initial thickness of debris flows of same total volume. Meanwhile, appropriate rheology model for debris flow consisting of inviscid particle only should be employed to more accurately reproduce the debris flow propagating along the channel bottom.

High-Frequency Bottom Loss Measured at Near-Normal Incidence Grazing Angle in Jinhae Bay (진해만에서 측정된 높은 수평입사각에서의 고주파 해저면 반사손실)

  • La, Hyoung-Sul;Park, Chi-Hyung;Cho, Sung-Ho;Choi, Jee-Woong;Na, Jung-Yul;Yoon, Kwan-Seob;Park, Kyung-ju;Park, Joung-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.29 no.4
    • /
    • pp.223-228
    • /
    • 2010
  • High-frequency bottom loss measurements for grazing angle of $82^{\circ}$ in frequency range 17-40 kHz were made in Jinhae bay in the southern part of Korea. Observations of bottom loss showed the strong variation as a function of frequency, which were compared to the predicted values using two-layered sediment reflection model. The geoacoustic parameters including sound speed, density and attenuation coefficient for the second sediment layer were predicted from the empirical relations with the mean grain size obtained from sediment core analysis. The geoacoustic parameters for the surficial sediment layer were inverted using Monte Carlo inversion algorithm. A sensitivity study for the geoacoustic parameters showed that the thickness of surficial sediment layer was most sensitive to the variation of the bottom loss.

Federated learning-based client training acceleration method for personalized digital twins (개인화 디지털 트윈을 위한 연합학습 기반 클라이언트 훈련 가속 방식)

  • YoungHwan Jeong;Won-gi Choi;Hyoseon Kye;JeeHyeong Kim;Min-hwan Song;Sang-shin Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.4
    • /
    • pp.23-37
    • /
    • 2024
  • Digital twin is an M&S (Modeling and Simulation) technology designed to solve or optimize problems in the real world by replicating physical objects in the real world as virtual objects in the digital world and predicting phenomena that may occur in the future through simulation. Digital twins have been elaborately designed and utilized based on data collected to achieve specific purposes in large-scale environments such as cities and industrial facilities. In order to apply this digital twin technology to real life and expand it into user-customized service technology, practical but sensitive issues such as personal information protection and personalization of simulations must be resolved. To solve this problem, this paper proposes a federated learning-based accelerated client training method (FACTS) for personalized digital twins. The basic approach is to use a cluster-driven federated learning training procedure to protect personal information while simultaneously selecting a training model similar to the user and training it adaptively. As a result of experiments under various statistically heterogeneous conditions, FACTS was found to be superior to the existing FL method in terms of training speed and resource efficiency.

Control Standards of Three Major Insect Pests of Chinese Cabbage (Brassica campestris) Using Drones for Pesticide Application (농약살포용 드론을 이용한 배추 주요해충 3종의 방제기준 설정)

  • Choi, Duck-Soo;Ma, Kyung-Cheol;Kim, Hyo-Jeong;Lee, Jin-Hee;Oh, Sang-A;Kim, Seon-Gon
    • Korean journal of applied entomology
    • /
    • v.57 no.4
    • /
    • pp.347-354
    • /
    • 2018
  • In order to setting the control standard of Chinese cabbage pests using a drone, the downward wind speed, spraying width, and the number of falling particles and particle size were examined using a water sensitive paper with spray different heights (3, 4, 5 m) and flying speeds (3, 4 m/sec). Fore kinds of pesticides for aviation control were used to test the perfect lethal concentration and dose for major pests of Chinese cabbage such as Plutella xylostella, Spodoptera exigua and Spodoptera litura. The number of falling particles in spraying pesticides with drones was 80.5% on the upper side, 14.8% on the vertical side, and 4.7% on the back side. The number of falling particles as different spray heights were 3 m = 53, 4 m = 40 and $5m=39particles\;cm^{-2}$. The number of falling particles as different flying speeds were $3m\;sec^{-1}=62$ and $4m\;sec^{-1}=25particles\;cm^{-2}$. In the laboratory test, the perfect lethal concentration and dose of Plutella xylostella was chlorfenapyr SC (20 times, $0.5{\mu}l$) and bistrifluron chlorfenapyr SC (25 times, $0.5{\mu}l$). The perfect lethal concentration and dose of Spodoptera exigua was chlorfenapyr SC (20 times, $1{\mu}l$), bistrifluron chlorfenapyr SC (20 times, $1{\mu}l$), and chlorfenapyr SC (20 times, $1{\mu}l$) and bistrifluron chlorfenapyr SC (20 times, $0.5{\mu}l$) for Spodoptera litura. Therefore, the main pest control method of Chinese cabbage using drones is 20 times diluted chlorphenapyr SC or bistrifluoruron-chlorphenapyr SC, sprayed at 3 m height by $3msec^{-1}$ of going speed. This spraying method will be effective for control of Chinese cabbage pest.

Dietary Behavior Related to Salty Food Intake of Adults Living in a Rural Area according to Saline Sensitivity (농촌 지역의 중년이후 성인의 염분 민감도에 따른 짠 음식 섭취 관련 식행동)

  • Kim, Mi-Kyoung;Han, Jang-Il;Chung, Young-Jin
    • Journal of Nutrition and Health
    • /
    • v.44 no.6
    • /
    • pp.537-550
    • /
    • 2011
  • This study was conducted to identify behavioral characteristics of salty food intake according to saline sensitivity of adults living in a rural area. Anthropometry and blood pressure were measured and salt intake-related dietary behavior was surveyed by questionnaires through interviews with 402 subjects aged ${\geq}$ 40 years in Chungcheongbuk-Do, Korea. The percentages of overweight and obese among the subjects were 37.8% and 3.8% respectively. Mean blood pressure of the subjects was in the normal range, but the distribution of subjects who were normotensive, high normal, and hypertensive was 48.7%, 17.7%, and 33.6% respectively. Approximately 27% of all subjects habitually consumed salty food, which was the smallest group, followed by 38.1% normal and 35.1% not-salty food. However, 34.6% of the eldest group of ${\geq}$ 65 years consumed salty food. The saline insensitive group showed a higher percentage of irregular meals, overeating, speed-eating, an unbalanced diet, a preference for fried food, and habitual intake of salty foods. These subjects recognized the risk for eating salty food, but they lacked the will to reduce their salty food intake. Compared to spouses and family members, experts such as doctors, nurses, and dieticians were the most influential for reducing the salty food intake of subjects. Saline sensitive group had relatively better control over salty food intake at every meal, eating out, and even when eating salty food that the spouse preferred. The saline sensitive group ate more frequently vegetables and fruits, whereas the saline insensitive group ate more frequently hot spicy foods. In conclusion, the results suggest that it is necessary to establish a social atmosphere toward reducing salt intake at the level of the government and food industry and to set action plans to be available for nutrition education programs to reduce salt intake nationwide.

End to End Model and Delay Performance for V2X in 5G (5G에서 V2X를 위한 End to End 모델 및 지연 성능 평가)

  • Bae, Kyoung Yul;Lee, Hong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.107-118
    • /
    • 2016
  • The advent of 5G mobile communications, which is expected in 2020, will provide many services such as Internet of Things (IoT) and vehicle-to-infra/vehicle/nomadic (V2X) communication. There are many requirements to realizing these services: reduced latency, high data rate and reliability, and real-time service. In particular, a high level of reliability and delay sensitivity with an increased data rate are very important for M2M, IoT, and Factory 4.0. Around the world, 5G standardization organizations have considered these services and grouped them to finally derive the technical requirements and service scenarios. The first scenario is broadcast services that use a high data rate for multiple cases of sporting events or emergencies. The second scenario is as support for e-Health, car reliability, etc.; the third scenario is related to VR games with delay sensitivity and real-time techniques. Recently, these groups have been forming agreements on the requirements for such scenarios and the target level. Various techniques are being studied to satisfy such requirements and are being discussed in the context of software-defined networking (SDN) as the next-generation network architecture. SDN is being used to standardize ONF and basically refers to a structure that separates signals for the control plane from the packets for the data plane. One of the best examples for low latency and high reliability is an intelligent traffic system (ITS) using V2X. Because a car passes a small cell of the 5G network very rapidly, the messages to be delivered in the event of an emergency have to be transported in a very short time. This is a typical example requiring high delay sensitivity. 5G has to support a high reliability and delay sensitivity requirements for V2X in the field of traffic control. For these reasons, V2X is a major application of critical delay. V2X (vehicle-to-infra/vehicle/nomadic) represents all types of communication methods applicable to road and vehicles. It refers to a connected or networked vehicle. V2X can be divided into three kinds of communications. First is the communication between a vehicle and infrastructure (vehicle-to-infrastructure; V2I). Second is the communication between a vehicle and another vehicle (vehicle-to-vehicle; V2V). Third is the communication between a vehicle and mobile equipment (vehicle-to-nomadic devices; V2N). This will be added in the future in various fields. Because the SDN structure is under consideration as the next-generation network architecture, the SDN architecture is significant. However, the centralized architecture of SDN can be considered as an unfavorable structure for delay-sensitive services because a centralized architecture is needed to communicate with many nodes and provide processing power. Therefore, in the case of emergency V2X communications, delay-related control functions require a tree supporting structure. For such a scenario, the architecture of the network processing the vehicle information is a major variable affecting delay. Because it is difficult to meet the desired level of delay sensitivity with a typical fully centralized SDN structure, research on the optimal size of an SDN for processing information is needed. This study examined the SDN architecture considering the V2X emergency delay requirements of a 5G network in the worst-case scenario and performed a system-level simulation on the speed of the car, radius, and cell tier to derive a range of cells for information transfer in SDN network. In the simulation, because 5G provides a sufficiently high data rate, the information for neighboring vehicle support to the car was assumed to be without errors. Furthermore, the 5G small cell was assumed to have a cell radius of 50-100 m, and the maximum speed of the vehicle was considered to be 30-200 km/h in order to examine the network architecture to minimize the delay.

An Iterative, Interactive and Unified Seismic Velocity Analysis (반복적 대화식 통합 탄성파 속도분석)

  • Suh Sayng-Yong;Chung Bu-Heung;Jang Seong-Hyung
    • Geophysics and Geophysical Exploration
    • /
    • v.2 no.1
    • /
    • pp.26-32
    • /
    • 1999
  • Among the various seismic data processing sequences, the velocity analysis is the most time consuming and man-hour intensive processing steps. For the production seismic data processing, a good velocity analysis tool as well as the high performance computer is required. The tool must give fast and accurate velocity analysis. There are two different approches in the velocity analysis, batch and interactive. In the batch processing, a velocity plot is made at every analysis point. Generally, the plot consisted of a semblance contour, super gather, and a stack pannel. The interpreter chooses the velocity function by analyzing the velocity plot. The technique is highly dependent on the interpreters skill and requires human efforts. As the high speed graphic workstations are becoming more popular, various interactive velocity analysis programs are developed. Although, the programs enabled faster picking of the velocity nodes using mouse, the main improvement of these programs is simply the replacement of the paper plot by the graphic screen. The velocity spectrum is highly sensitive to the presence of the noise, especially the coherent noise often found in the shallow region of the marine seismic data. For the accurate velocity analysis, these noise must be removed before the spectrum is computed. Also, the velocity analysis must be carried out by carefully choosing the location of the analysis point and accuarate computation of the spectrum. The analyzed velocity function must be verified by the mute and stack, and the sequence must be repeated most time. Therefore an iterative, interactive, and unified velocity analysis tool is highly required. An interactive velocity analysis program, xva(X-Window based Velocity Analysis) was invented. The program handles all processes required in the velocity analysis such as composing the super gather, computing the velocity spectrum, NMO correction, mute, and stack. Most of the parameter changes give the final stack via a few mouse clicks thereby enabling the iterative and interactive processing. A simple trace indexing scheme is introduced and a program to nike the index of the Geobit seismic disk file was invented. The index is used to reference the original input, i.e., CDP sort, directly A transformation techinique of the mute function between the T-X domain and NMOC domain is introduced and adopted to the program. The result of the transform is simliar to the remove-NMO technique in suppressing the shallow noise such as direct wave and refracted wave. However, it has two improvements, i.e., no interpolation error and very high speed computing time. By the introduction of the technique, the mute times can be easily designed from the NMOC domain and applied to the super gather in the T-X domain, thereby producing more accurate velocity spectrum interactively. The xva program consists of 28 files, 12,029 lines, 34,990 words and 304,073 characters. The program references Geobit utility libraries and can be installed under Geobit preinstalled environment. The program runs on X-Window/Motif environment. The program menu is designed according to the Motif style guide. A brief usage of the program has been discussed. The program allows fast and accurate seismic velocity analysis, which is necessary computing the AVO (Amplitude Versus Offset) based DHI (Direct Hydrocarn Indicator), and making the high quality seismic sections.

  • PDF

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.