• Title/Summary/Keyword: Technical Application Design

Search Result 529, Processing Time 0.028 seconds

A Design and Implementation of Culture Guide Application (문화재 가이드 애플리케이션 설계 및 구현)

  • Lee, Won Joo;Jo, Seok-Hee;Shin, Eun-Bi;Jung, Jin-Goo;Jeon, Se-Yeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.91-92
    • /
    • 2020
  • 본 논문에서는 Android 앱 기반의 새로운 문화재 관광 가이드 서비스를 제안한다. 본 서비스는 Google Map API와 문화재청에서 제공하는 전국 지정문화재 현황 API를 활용하여 문화재의 위치와 음성 가이드 서비스를 제공한다. 먼저 자신의 위치를 기반으로 주변의 문화재를 지도에 마커를 통하여 표시 해준다. 이는 위치 검색을 통하여 위치를 지정하여서도 가능하다. 마커가 표시된 문화재에 NFC태그를 설치하여 태그를 할 때 음성 가이드 서비스를 제공한다. 뿐만 아니라 마커가 표시된 문화재의 정보를 리스트로 나타내어 정보를 쉽게 확인할 수 있도록 한다. 이 서비스를 통해 기존 여행 가이드를 통해 제공받던 서비스를 무료로 편리하게 제공받을 수 있으며 이로 인해 더 많은 문화 관광이 활성화 될 수 있다.

  • PDF

A Design and Implementation of Impromptu Gathering Application Based on Android Platform (안드로이드 플랫폼 기반의 즉석 모임 정보 제공 애플리케이션 설계 및 구현)

  • Lee, Won Joo;Yoo, Jung Hyun;Jeong, Won Hyeok;Lee, Hyun Bok;Kim, Hyung Gyu
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.93-94
    • /
    • 2020
  • 본 논문에서는 스마트폰의 GPS 센서와 구글 지도기반의 즉석 모임 정보제공 연동이 자유로운 애플리케이션을 설계하고 구현한다. 이 애플리케이션은 안드로이드 내장 센서를 이용하여 현재 위치를 기준으로 반경 1Km을 파란색 반원으로 표시하며 빠르게 접근할 수 있는 모임을 확인할 수 있다. 그리고 즉석 모임 중 자주 이루어지는 택시, 테니스같이 혼자 할 수 없는 운동, 등과 같이 주요 모임별로 다르게 표시하여 정보를 보지 않아도 직관적으로 어떤 유형인지 알 수 있도록 구현한다. 또한, 마커를 클릭하면 해당 모임에 관한 정보를 확인할 수 있고, 장소 근처에 가면 알람을 보낼지 선택할 수 있는데 지도 하단에 버튼을 통해 알람 설정한 모임을 관리 할 수 있다. 위치기반 알람을 통해서 모임에 대한 정보를 까먹지 않게 계속 알려줌으로써 참여율을 높일 수 있도록 구현한다.

  • PDF

Design and Application of Location Data Management System for LBS (LBS를 위한 위치 데이터 관리 시스템 설계 및 적용)

  • Ahn Yoon-Ae
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.4
    • /
    • pp.388-400
    • /
    • 2006
  • There are wireless location acquisition technique, LBS platform technique, and LBS application technique in the important technical elements of the LBS. In this paper, we design a location data management system which is the core base technique of the important technical elements of the LBS. The proposed system consist of an application interface of LBS, a query processor of application. service, a location estimator of the moving objects, a location information manager, a real-time data receiver, and a database of location data. This system manages efficiently the location change information of the moving objects using the database technique, suggests some useful inform to the users of LBS, and supports operation and facility of location estimation to process continuous location data of the moving objects. On the basis of location data triggering, this system supplements the problem of the related location data management systems to complement the loss of location data in the environment of real-time.

  • PDF

A Study of Nude Construction Roon Composition & Application for Interior Construction Education (실내시공 교육을 위한 누드시공실 구성과 운용에 관한 연구)

  • 박의정
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2001.05a
    • /
    • pp.133-139
    • /
    • 2001
  • Today the social concern about Interior Design gradually requires wide comprehension. Also according to demanders' requirement. Universities cope with speed. Interior Design made by experts for the function and purpose in the conception of decoration. Therefore, Universities we responsible to educate for more capable professional designers. But management is the first concern for Interior Design Company students are going to work at. Interior Design has not the important state yet in Korea, it is hard to manage the company with design alone. As architecture must get admittion, design is apart from construction. but they are worked together in Interior Design. It is true that all the work of construction is Capenters' or technical engineers' work except space design. Of course students are interested in just design not in construction. Students majoring in design need wide understanding of construction not a concept design. but detailed design for construction and proper valuation ability to manage company. I propose component and practical use of nude construction department to understand detailed design.

  • PDF

Effect of hydraulic and structural parameters on the wave run-up over the berm breakwaters

  • Milanian, Farzad;Niri, Mahmood Zakeri;Najafi-Jilani, Ataollah
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.9 no.3
    • /
    • pp.282-291
    • /
    • 2017
  • The main aim of this study is to investigate the effect of berm breakwater on wave run-up. A total of 200 numerical analysis tests have been carried out in this paper to investigate the effect of berm width, wave height, and wave period on the wave run-up, using an integrating technique of Computer-Aided Design (CAD) and Computational Fluid Dynamics (CFD). Direct application of Navier Stokes equations within the berm width has been used to provide a more reliable approach for studying the wave run-up over berm breakwaters. A well tested Reynolds-averaged Navier-Stokes (RANS) code with the Volume of Fluid (VOF) scheme was adopted for numerical computations. The computational results were compared with theoretical data to validate the model outputs. Numerical results showed that the simulation method can provide accurate estimations for wave run-up over berm breakwaters. It was found that the wave run-up may be decreased by increasing the berm width up to about 36 percent. Furthermore, the wave run-up may increase by increasing the wave height and wave period up to about 53 and 36 percent, respectively. These results may convince the engineers to use this model for design of berm breakwater in actual scale by calculating the Reynolds numbers.

A Survey on Characteristics and Application Domains of 3D Factory Simulation Technology (3D 팩토리 시뮬레이션 기술의 특징과 응용 분야에 대한 고찰)

  • Jo, Da-Seol;Kim, Jun-Woo
    • The Journal of Information Systems
    • /
    • v.27 no.4
    • /
    • pp.35-70
    • /
    • 2018
  • Purpose Recently, 3D factory simulation technology has emeged as a powerful tool for modeling and analysis of a wide range of production systems, however, it has been not paid much attention in Korea. In this context, this paper aims to provide a comprehensive literature review on discrete event simulation softwares and introduce a promising 3D factory simulation software called FlexSim and its application domains. Design/methodology/approach In order to demonstrate worldwide popularity and technical superiority of FlexSim software, we analyzed the recent list of rankings for commercial discrete simulation softwares released by winter simulation conference and users' opinions collected from business software review site. Moreover, several main application domains are derived from a review of the previous research papers that deal with applications of FlexSim software. Findings FlexSim software recently moved up the list of major commercial simulation softwares, and technical superiorities of the software demonstrate that it is a promising tool for practical 3D factory simulation. Moreover, recent research papers suggest that FlexSim software can be used as a component of smart factory system. In this context, it is expected that FlexSim software becomes more popular in the era of industry 4.0.

A study on development of CATIA V5 file security system using CAA (CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구)

  • Chae H.C.;Park D.S.;Byun J.H.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.417-418
    • /
    • 2006
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. The best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function, A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

  • PDF

A Study on Development of CATIA V5 File Security System Using CAA (CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구)

  • Chae, Hee-Chang;Park, Doo-Seob;Byun, Jae-Hong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.24 no.5
    • /
    • pp.77-81
    • /
    • 2007
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. the best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function. A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

A Research and application of modern ornaments applied with technology convergence (focus on ring with NFC tag applied) (기술융합이 적용된 현대장신구사례 및 응용연구 (nfc tag이 적용된 반지를 중심으로))

  • Hwang, Sun-Wook
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.459-467
    • /
    • 2020
  • From the perspective of the artist who produces modern ornaments, I wanted to see the future of modern ornaments in the hyperconnected era. I would like to find a practical way of converging information communication technology, which is one of them, and applying nfc tag among them. For the practical approach, after looking at the actual examples of commercial ring products using nfc tag technology, I tried to find a practical method that can be applied to modern ornaments produced in the workshop. As a result, two realistic alternatives were drawn: the investment method, which is free to converge, but has limited technical utilization, and an assembly method that requires high convergence from the design planning stage. After then, to know investment methods, have been produced that may have problems with real applications. I made a real sample, not a concept, to explain the technical factors and precautions necessary for applying nfc technology.

A Study on the Scalability of Design Content Using Pixel Art

  • Qianqian Jiang;Jeanhun Chung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.160-165
    • /
    • 2023
  • The pixel art style evolved from the shortcomings of computer image display technology has gradually transformed from a technical limitation into a widely recognized form of artistic expression since development in the early 20th century. This study analyzes the application and characteristics of the expandability of pixel art style design content in sub industries such as physical goods, environmental design, website design, digital art and illustration in the design field. It aims to explore the visual expression and sustainable development form of pixel art style under the development of new media technology that contradicts traditional technological concepts. The research results show that although the pixel art style generally pursues external visual features such as pixelated visual effects, sawtooth and matrix arrangements, its expansion in the art field shows a unique diversity of visual expressions. It has become an important means to convey nostalgic emotions and cultural values. Through this research, we hope to inspire more academic researchers and technology practitioners to explore the development potential of the pixel art style in emerging fields and promote its innovative application in design practice.