• Title/Summary/Keyword: Translation Configuration

Search Result 29, Processing Time 0.024 seconds

Study Of Millimeter-Wave Passive Imaging Sensor Using the Horn Array Antenna (혼 배열 안테나를 이용한 밀리미터파 수동 이미징 센서 연구)

  • Lim, Hyun-Jun;Chae, Yeon-Sik;Kim, Mi-Ra;Rhee, Jin-Koo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.74-79
    • /
    • 2010
  • We have designed a millimeter-wave passive imaging sensor with multi-horn antenna array. Six horn array antenna is suggested that it is integrated into one housing, and this antenna is effectively configurated m space to assemble with LNA of WR-10 structure. Antenna is designed to have the peak gain of 17.5dBi at the center frequency of 94GHz, and the return loss of less than -25dB in W-band, and the small aperture size of $6mm{\times}9mm$ for antenna configuration with high resolution. LNA is designed to have total gain of more than 55dB and noise figure of less than 5dB for good sensitivity. We made a detector for DC output translation of millimeter-wave signal with zero bias Schottky diode. It is shown that good sensitivity of more than 500mV/mW.

Design and Implementation of tiny UDP/IPv6 Protocols for Sensor Networks (센서 네트워크를 위한 초소형 UDP/IPv6 프로토콜 설계 및 구현)

  • Jung, Ki-Jin;Lee, Jun-Seob;Kim, Yong-Woon;Sohn, Young-Ho;Lee, Wan-Jik;Heo, Seok-Yeol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.4
    • /
    • pp.73-82
    • /
    • 2008
  • Collecting and managing the sensor information through the Internet is critical to effectively manage and utilize the sensor information. The interworking technique of the sensor network and internet is required to realize the desirable condition for managing and utilizing the sensor information. Among many interworking techniques, the translation technique using the gateway had been widely studied. However, the technique which mounts IP-based Internet protocols directly on the sensor node is getting more attention recently. Particularly, IPv6 is suitable for the communication protocol for the sensor network, because its features, such as abundant address space or address auto-configuration, are well matched with the sensor network. In this paper, we design the tiny UDP/IPv6 protocol functions which are suitable for the sensor network environment, and we implemented the functions with TinyOS based nesC. After we examined the simulation results of by using TOSSIM and TinyViz, we carried out the experimental performance evaluation for the program by mounting the tiny UDP/IPv6 on the sensor node (Mote).

  • PDF

Design and Implementation of Binary XML Encoder using Fast Infoset (Fast Infoset을 이용한 Binary XML Encoder의 설계 및 구현)

  • Yu Seong-Jae;Choi Il-Sun;Yoon Haw-Mook;Ahn Byeong-Ho;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.943-946
    • /
    • 2006
  • XML is the most widely used document format by advantage that self-contained for platform. So, currently the most used among other document format. but XML appeared new problem that memory and transmission. And that be used in environment a request restriction memory and fast transmission as like mobile field. Although discussion of XML binarization is going on progress. And fast Infoset configuration using XML Information Set is receiving attention that a way to lower file size of hold down a existing usage. In this paper, we designed of module using fast Infoset and PER among ASN.1 Encoding Rule for XML binarization. And we implementation of encoder constructed interlace by stage of translation from XML into binary XML.

  • PDF

Design of the Shortcut based Integrated & Advanced Networking Server(IANS) for QoS path (QoS 경로 설정을 위한 Shortcut 기반 통합 서버 설계)

  • 김기영;이상호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.74-84
    • /
    • 2001
  • In the current Internet, InteServ model based on Resource reSerVation Protocol (RSVP), DiffServ Model based on service differentiation according to per hope behavior(PHB) and traffic engineering policy, and two-tire model of above mentioned two models which are adapted differently as the target network status for providing the end-to-end QoS Path are suggested. But, when we integrated this internet QoS into the ATM based network, differences of the connection setup procedure, name/address translation methods, and QoS provisioning mechanisms for end-to-end path setup procedures are introduced. In this paper, we propose the method of shortcut based QoS path setup procedure to solve these problems, and to guarantee the integration and scalability of Next Generation Internet(NGI) names/address in Integrated IP network into ATM based network. This network should support the engineering differentiated into the multiple service classes, which depend on established by this path is designed suitably into the target router and host step by step. In the near future, this function which provide the QoS guaranteed path based on end-to-end shortcut between the configuration devices are extended into the NGI target network.

  • PDF

Reliability and Validity of the Korean Version of Melbourne Low-Vision ADL Index (한국판 맬버른 저시력 일상생활지수(Melbourne Low-vision ADL Index: MLVAI)의 신뢰도 및 타당도)

  • Yoo, Yeon Hwan;Park, Ji-Hyuk;Jung, Min-Ye;Park, Hae Yean
    • Therapeutic Science for Rehabilitation
    • /
    • v.7 no.2
    • /
    • pp.51-61
    • /
    • 2018
  • Objective: The purpose of this study was performed to modify the performance-based assessment tool, Melbourne Low-Vision ADL Index (MLVAI) had been developed in Australia to suit the Korea culture to verify the reliability and validity. Methods: The subjects were only over the age of 20 living in communities, 26 with low-vision and 42 normal persons. The Korean MLVAI was completed through the expert translation verification and validation of the configuration tool. The validity of the Korean MLVAI was established through the content, discriminant, and convergent validity. Also, the reliability was analyzed through internal consistency reliability for the items, test-retest, and interrater reliability. Results: The Content Validity Index(CVI) was more than .78. There was a statically significant low in low-vision. Also, there was a statically significant low in low-vision. The convergent validity was determined the correlation coefficient of .751 analyzing LVQOL and Korean MLVAI total score, had a significant correlation(p<.05). Cronbach's ${\alpha}$ coefficient indicated an internal consistency of .983(p<.05). Test-retest reliability had a high, significant correlation of .976 and interrater reliability had a high, an intraclass correlation coefficient of .91(p<.05). Conclusion: The results of this study mean that the Korean MLVAI which was modified to fit the Korean is the ADL assessment tool with both validity and reliability. Based on this study, the Korean MLVAI can be used as a useful ADL assessment for OT interventions in low vision.

A Study on Congestion Control for LAN Interworking in ATM Network (ATM 망에서 LAN 연동을 위한 폭주 제어에 관한 연구)

  • Park, Chun-Kwan
    • Journal of IKEEE
    • /
    • v.2 no.1 s.2
    • /
    • pp.122-133
    • /
    • 1998
  • The CL network fer CBDS(Connectionless Broadband Data Service) defined by ITU-(International Telecommunication Union-Telecommunication) consists of CL(ConnectionLess) servers which route frames and links which connect between CL user and CL server or between CL servers[1][2]. In this configuration, two kinds of congestion, CL link congestion and CL server congestion may occur. Therefore this paper has proposed the scheme that can deal with the above congestion state of LAN traffic efficiently in interworking LANs in ATM network. Proposed schemes ale link-by-link scheme and hybrid scheme. Link-by-link scheme uses the ABR feedback loops of AIM layer between CL user and CL server or between CL servers, and the header translation table carrying out the routing function of frame. And hybrid scheme is the scheme that adds end-to-end loop to link-by-link scheme and then uses RM message using CLNAP-PDU(ConnectionLess Network Access Protocol - Protocol Data Units) of CL layer. These schemes can be implemented easily because of using the ABR loop of ATM layer, end-to-end loop of CL layer, and the routing function of CL server. In this paper the characteristic and effects of two schemes in CL server bas been compared and analyzed.

  • PDF

Morphologic and positional assessment of temporomandibular joint disk in facial asymmetric patients by magnetic resonance imaging (자기 공명 영상을 이용한 안면비대칭환자의 측두하악관절원반의 형태와 위치에 관한 연구)

  • Zou, Bingshuang;Kim, Tae-Woo;Choi, Soon-Chul
    • The korean journal of orthodontics
    • /
    • v.35 no.5 s.112
    • /
    • pp.398-407
    • /
    • 2005
  • The present study was conducted to examine the morphometrics and function of the disk on both sides among patients with facial asymmetry (FA) and to elucidate plausible correlations between internal derangement (ID) and FA. The sample was composed of 10 males and 27 females with FA. The disk status of all subjects was evaluated by bilateral high resolution magnetic resonance scans in the sagittal (closed and open) and coronal (closed) planes. Five types of disk displacement were identified accordingly. The disk function was diagnosed as normal disk function, disk displacement with reduction, and disk displacement without reduction. The disk shape on sagittal MRI in closed position was classified as bi-concave, biplanar, funnel/hemiconvex, and deformed. The disk position, translation and rotation were also measured. The difference between the shifted side and non-shifted side was analyzed by statistical analysis. Approximately $70\%$ of the patients in the present study showed unilateral or bilateral ID. It was found that anterior disk displacements (ADD), especially rotational ADD, occurred more frequently in the shifted side, while normal disk position was observed mainly in the non-shifted side (p<0.01). The disk of the shifted side showed significantly deformed configuration and inferior-anterior disk position. However, the disk of the non-deviated side showed hyper-mobility during jaw opening movement. These results demonstrate that in FA patients, the disks status of the shifted side is different from that of the non-shifted side, a phenomenon that could be correlated to facial asymmetry.

FlaSim: A FTL Emulator using Linux Kernel Modules (FlaSim: 리눅스 커널 모듈을 이용한 FTL 에뮬레이터)

  • Choe, Hwa-Young;Kim, Sang-Hyun;Lee, Seoung-Won;Park, Sang-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.836-840
    • /
    • 2009
  • Many researchers have studied flash memory in order to replace hard disk storages. Many FTL algorithms have been proposed to overcome physical constraints of flash memory such as erase-before-write, wear leveling, and poor write performance. Therefore, these constraints should be considered for testing FTL algorithms and the performance evaluation of flash memory. As doing the experiments, we suffer from several problems with costs and settings in experimental configuration. When we, for example, replay the traces of Oracle to evaluate the I/O performance with flash memory, it is hard to extract exact traces of I/O operations in Oracle. Since there are only write operations in the log, it is impossible to gather read operations. In MySQL and SQLite, we can gather the read operations by changing I/O functions in the source codes. But it is not easy to search for the exact points about I/O and even if we can find out the points, we might get wrong results depending on how we modify source codes to get I/O traces. The FlaSim proposed in this paper removes the difficulties when we evaluate the performance of FTL algorithms and flash memory. Our Linux drivers emulate the flash memory as a hard disk. And we can easily obtain the usage statistics of flash memory such as the number of write, read, and erase operations. The FlaSim can be gracefully extended to support the additional modules implemented by novel algorithms and ideas. In this paper, we describe the structure of FTL emulator, development tools and operating methods. We expect this emulator to be helpful for many experiments and research with flash memory.

Embedded Korean in American Oriental Imagination: Kim Sisters' "Their First Album"

  • Lee, Yu Jung
    • Cross-Cultural Studies
    • /
    • v.24
    • /
    • pp.46-61
    • /
    • 2011
  • This paper considers how Koreans found their positions in the complex, overlapping, disjunctive, and interconnected "Oriental" repertoires in the early Cold War years. When we use the term, Oriental, it should require careful translation from context to context because it may be subject to very different sets of contextual circumstances. Klein views Cold War Orientalism in the complex of various regions including East Asian and Southeast Asian countries; however, when Koreans are contextualized at the center of the discussion the Orientalism produces another discursive meaning. Even though many great researches have been done on Korean immigrations, Korean American literatures, and US-Korea economic, political, and foreign relations, not many discussions about Korean American popular cultures have been discussed in the basis of the Oriental discourse in the United States.For this argument, this paper investigates the performative trajectory of a girl group "Kim Sisters" who began to sing at the US military show stages in South Korea in 1952 during the Korean War. They moved to Las Vegas show stages in 1959 and later appeared in Ed Sullivan Show more than thirty times during the 1960s and 70s. Meanwhile, they not only returned to South Korea often times to perform at the stages for Korean audiences in South Korea but also played at the shows for Korean immigrants in the United States. Korean American immigration to the United States has followed a different route from the majority of Asian American population such as Chinese or Japanese Americans, which means that efforts to compare this particular group to the others may be unnecessary. Rather doing comparative studies, this paper, therefore, focuses on the formation of the intersecting and multiple identities of Korean female entertainers who were forced or forced themselves to be incorporated into the American popular "Oriental" imagination, which I would call "embedded" identities. This embeddedness has been continuously maintained in the configuration of Korean characters in the United States. This will help not only to observe the discursive aspect of Asian American identity politics but also to claim a space for comparatively invisible Korean characters in the United States which has been often times neglected and not brought into a major Asian American or Oriental historical discourse. This paper starts with American scenes at the beginning of the twentieth century to trace Americans Oriental imagination which was observable in the various American cultural landscape and popular music soundscape. It will help us more clearly understand the production and consumption of the Korean "Oriental" performances during the early Cold War period and especially the Korean performance in the American venue, silently overshadowed into the political, social, and cultural framework.