• Title/Summary/Keyword: System-level design

Search Result 4,254, Processing Time 0.038 seconds

The Computerized 3-D Clothing Simulation for the Evaluation of Men's Working Pants (남성용 작업복 팬츠 3차원 가상착의 시뮬레이션 평가)

  • Park, Gin Ah
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.8
    • /
    • pp.27-42
    • /
    • 2013
  • The study was aimed to develop men's working pants patterns through the computerized 3-D virtual clothing simulation system and to verify the effects of the 3-D simulated outfit by comparing it to the images of the actual outfits. The average body measurements of South Korean men aged between 30 and 39 used for the simulation in order to generate a 3-D virtual model and to realize outfits of men's working pants for the workers in the heavy industry in South Korea. And also the preliminary questionnaire survey results on certain aspects of the working pants such as type, detailed design preference and discomforting parts were taken into consideration. Both the simulated and real images of the developed working pants were compared in terms of the ease amount according to parts of the working pants, the position of seam lines, the appearance of darts and pleats, and the effects of the fabric surface according to expertise panels' subjective 5-point scale evaluation. The results throughout the study were (1) the basic working pants item worn by subject workers were the straight one pleated pants. The most discomforting parts of the working pants were in the order of body rise, thigh, hip, waist, pants hems and knee girth. (2) the drafting factors of pants patterns differed by the men's body features, which was related to the allocation of suppression amounts between waist and hip girths into darts and hip curve amounts on the waist line level of the pants. (3) the similarity of the virtually simulated and real images of men's working pants resulted in an average of 4.5 to the ease of appearance, 4.6 to the seam lines, 4.1 to the fabric surface effects in a 5-point scale, which means that the two were highly alike.

System Level Space Environment Testing of Satellite Digital Transponder (디지털 위성중계기에 대한 시스템 단위의 우주환경 검증 시험)

  • Song, Young-Joong;Kim, Jung-Ho;Lee, Sue-Hyun;Seo, Hak-Geum;Shin, Guan-Ho;Jin, Bong-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1159-1169
    • /
    • 2013
  • EQM Model Digital transponder applying the Korean's own designing and manufacturing technology has gone through a series of trials and errors during the development. In particular, lack of thermal designs expedience for the vacuum causes variety of errors in designing, assembling transponder and setting up the test at the first thermal vacuum test (TVAC). Since the first TVAC test could not accomplished its aims successfully, so the second TVAC should be performed as make up test with revised Digital transponder. In this paper, the defects that identified in the first TVAC are analyzed and applied solutions and its results at the second TVAC are presented. Using the lessons from the first and second TVAC, we will be able to make more reliable digital transponders in the next phase of project. In addition it also be useful as a reference when we design another satellite payloads.

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.

Design and Implementation of Supporting System of a Self-Directed Learning using Virtual Document Concept (가상문서를 개념을 활용한자기 주도적 학습지원 시스템의 설계 및 구현)

  • Noh, Jin-Soon;Lee, Yong-Bae;Myaeng, Sung-Hyon
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.2
    • /
    • pp.234-245
    • /
    • 2002
  • A new era has come where high quality educational materials can be acquired easily through the World Wide Web. These materials, however, need to be refined and streamlined to maximize their effect on education. In order to provide such a streamlined flow, we need to be able to re-organize documents, which exist independent of each other on the Web, in a way that maintains their appropriate order in the right context to satisfy educational purposes. In addition, we should be able to provide supplementary explanations or missing information to the organized materials for smooth connections among them. In order to meet the requirements, we employed the virtual document concept that allows us to reuse existing documents for educational purposes. By providing a retrieval engine for virtual documents, we attempt to induce self-directed learning based on document retrieval, suitable for the level and purpose of students.

  • PDF

The Audit Method for Private Location Information based on Location Services (위치서비스에 기반한 개인위치정보에 대한 감리방법)

  • Seo, Jung-Ho;Seo, Hee-Myung;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.251-266
    • /
    • 2012
  • Location Information is an information about a place where an individual exists or had existed. As smart phones are popularized, location information becomes more than simple information about the place. As a result, services using an individual's location information became the trend. However, problems arising from discharging Private Information can damage an individual, because it causes financial and economic loss but also detects individual's location and route directly. In realities, the guide that regulates Location Based Service for administering Private Location Information is insufficient. Therefore, this paper proposes check items, which contain standards of judicial action, financial loss ratings, importance of Private Location Information, and criticality of check lists, during the Private Location Information audit at the level of analysis, design, and management of the Information System, in order to prevent the infringement and disclosure of the Private Location Information. Moreover, the proposed check items were verified for its suitability by the professionals' survey.

Design of The 10bit 80MHz CMOS D/A Converter with Switching Noise Reduction Method (스위칭 잡음 감소기법을 이용한 10비트 80MHz CMOS D/A 변환기 설계)

  • Hwang, Jung-Jin;Seon, Jong-Kug;Park, Li-Min;Yoon, Kwang-Sub
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.6
    • /
    • pp.35-42
    • /
    • 2010
  • This paper describes a 10 bit 80MHz CMOS D/A converter for wireless communication system. The proposed circuit in the paper is implemented with a $0.18{\mu}m$ CMOS n-well 1-poly 6-metal process. The architecture of the circuit consists of the 4bit LSB with binary decoder, and both the 3bit ULSB and the 3bit MSB with the thermometer decoder. The measurement results demonstrates SFDR of 60.42dBc at sampling frequency 80MHz, input frequency 1MHz and ENOB of 8.75bit. INL and DNL have been measured to be ${\pm}$0.38LSB and ${\pm}$0.32LSB and glitch energy is measured to be 4.6$pV{\cdot}s$. Total power dissipation is 48mW at 80MHz(maximum sampling frequency) with a single power supply of 1.8V.

Efficient Cache Architecture for Transactional Memory (트랜잭셔널 메모리를 위한 효율적인 캐시 구조)

  • Choi, Dong-Min;Kim, Seung-Hun;Ro, Won-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.1-8
    • /
    • 2011
  • Traditional transactional memory systems are no longer able to guarantee the performance of diverse applications with overflowed transactions since there is the drawback that tracking the data for logging is difficult. Especially, this mechanism has a disadvantage of increasing communication delay for sustaining the state which is required to detect the conflict on the overflowed transactions from the first level cache in the transactional memory systems. To address this point, we have focused on the cache architecture of the systems to reduce the overhead caused by overflows and cache misses. In this paper, we present Supportive Cache which reduces additional overhead during transactions. Supportive Cache performs a parallel look-up with L1 private cache and uses the same replacement policy as L1 private cache. We evaluate the performance of the proposed design by comparing LogTM-SE with and without Supportive Cache. The simulation results show that our system improves the performance by 37% on average, compared to the original LogTM-SE which uses the same hardware resource.

Image Features Based Secure Access Control for Data Content Protection (데이터 내용 보호를 위한 이미지 특징 기반의 보안 접근 제어)

  • Ha, Sunju;Park, Daechul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.171-180
    • /
    • 2013
  • Data security is always an important issue. In particular, the current emerging cloud computing system inevitably raises the issue of data security. However, data security is no longer safe with a simple way, but requires rather advanced method to secure the data. In this paper, instead of exploiting the existing text-based cryptography approach an image-based access control of data content is studied to present a higher level of data security. Color key chain is generated both using histogram value of the original image, and the location information and featured color information extracted by geometric transformation to form the security key to access secure data content. Finally, the paper addresses design interface and implementation for data content access control for evaluation of the proposed scheme.

Dual task interference while walking in chronic stroke survivors

  • Shin, Joon-Ho;Choi, Hyun;Lee, Jung Ah;Eun, Seon-deok;Koo, Dohoon;Kim, JaeHo;Lee, Sol;Cho, KiHun
    • Physical Therapy Rehabilitation Science
    • /
    • v.6 no.3
    • /
    • pp.134-139
    • /
    • 2017
  • Objective: Dual-task interference is defined as decrements in performance observed when people attempt to perform two tasks concurrently, such as a verbal task and walking. The purpose of this study was to investigate the changes of gait ability according to the dual task interference in chronic stroke survivors. Design: Cross-sectional study. Methods: Ten chronic stroke survivors (9 male, 1 female; mean age, 55.30 years; mini mental state examination, 19.60; onset duration, 56.90 months) recruited from the local community participated in this study. Gait ability (velocity, paretic side step, and stride time and length) under the single- and dual-task conditions at a self-selected comfortable walking speed was measured using the motion analysis system. In the dual task conditions, subjects performed three types of cognitive tasks (controlled oral word association test, auditory clock test, and counting backwards) while walking on the track. Results: For velocity, step and stride length, there was a significant decrease in the dual-task walking condition compared to the single walking condition (p<0.05). In particular, higher reduction of walking ability was observed when applying the counting backward task. Conclusions: Our results revealed that the addition of cognitive tasks while walking may lead to decrements of gait ability in stroke survivors. In particular, the difficulty level was the highest for the calculating task. We believe that these results provide basic information for improvements in gait ability and may be useful in gait training to prevent falls after a stroke incident.

Design of Scheduling Superframe based on IEEE 802.15.4 MAC using LQI (LQI를 이용한 IEEE 802.15.4 MAC 기반의 스케줄링 슈퍼프레임 설계)

  • Chon, Young-Jo;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.159-164
    • /
    • 2016
  • This paper proposes an improved superframe structure with one : N situation of the network as a target for efficiency battery and communication performance used in the existing standard IEEE 702.15.4 MAC layer. The proposed superframe transforms and adds a two structures. First, we add the proposed scheduling interval after the arrival of the beacon. Second, we change to a structure in which one of the contention access period is divided into two. The contention access period and the contention-free access period of active portion are divided according to the LQI value of the device. Through this system-level simulation written by $c{^+^+}$, as a results show that the battery consumption and transmission performance has been increased.