• Title/Summary/Keyword: Virtual methods

Search Result 1,426, Processing Time 0.04 seconds

Wireless PKI Based Certificate Verification Using Virtual Identifier (무선 PKI 기반의 가상 식별자를 이용한 인증서 검증)

  • Choi Seung-Kwon;Shin Jung-Won;Shin Dong-Hwa;Kim Sun-Chul;Lee Byong-Rok;Cho Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8A
    • /
    • pp.804-813
    • /
    • 2006
  • In wireless Internet environment that demand of wireless Internet service increase steadily, wireless PKI(Public Key Infrastructure) service is appearing on stage as necessary essential base technology for information protection service offer, In this paper, we propose the method for verification to reduce the communication overload using VID to CSMP made with a goal of the performance guarantee for security and use in a real time and examine the existent certificate verification methods. The performance of security and the use in a real time is guaranteed by managing the note of authentification by the person who verifies and reducing the amount of the data transmission using VID.

Important Information Protection using Client Virtualization (클라이언트 가상화를 이용한 중요정보 보호)

  • Lim, Se-Jung;Kim, Gwang-Jun;Kang, Tae-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.111-117
    • /
    • 2011
  • In this paper, proposed client virtualization technology to minimize degradation of the local computing environment, efficient and qualified users in the area of virtual functions needed to enable the user to provide important information in the local computing environment protection and performance, stability and continuity was important to keep. As well as the local computing environment from malicious code attacks such as methods for protecting virtualized domain also can not be overlooked as a major problem area in a virtualized, virtualized data through the encryption of user-space security, maximized. In addition, through virtualization using local computing resources efficiently while still a local computing system separate from the computing resources to a single user can get the same effect.

Docking and QSAR studies of PARP-1 Inhibitors (PARP-1 억제제의 Docking 및 QSAR 연구)

  • Kim, Hye-Jung;Cho, Seung-Joo
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2004.11a
    • /
    • pp.210-218
    • /
    • 2004
  • Poly(ADP-ribose)polymerase-1 (PARP-1) is a nuclear enzyme involved in various physical functions related to genomic repair, and PARP inhibitors have therapeutic application in a variety of neurological diseases. Docking and the QSAR (quantitative structure-activity relationships) studies for 52 PARP-1 inhibitors were conducted using FlexX algorithm, comparative molecular field analysis (CoMFA), and hologram quantitative structure-activity relationship analysis (HQSAR). The resultant FlexX model showed a reasonable correlation (r$^{2}$ = 0.701) between predicted activity and observed activity. Partial least squares analysis produced statistically significant models with q$^{2}$ values of 0.795 (SDEP=0.690, r$^{2}$=0.940, s=0.367) and 0.796 (SDEP=0.678, r$^{2}$ = 0.919, s=0.427) for CoMFA and HQSAR, respectively. The models for the entire inhibitor set were validated by prediction test and scrambling in both QSAR methods. In this work, combination of docking, CoMFA with 3D descriptors and HQSAR based on molecular fragments provided an improved understanding in the interaction between the inhibitors and the PARP. This can be utilized for virtual screening to design novel PARP-1 inhibitors.

  • PDF

Three Dimensional Target Volume Reconstruction from Multiple Projection Images

  • Cheong, Kwang-Ho;Suh, Tae-Suk;Lee, Hyoung-Koo;Choe, Bo-Young
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2002.09a
    • /
    • pp.439-441
    • /
    • 2002
  • The aim of this study is to reconstruct the 3D target volume from multiple projection images. It was assumed that we were already aware of the target position exactly, and all processes were performed in Target Coordinates whose origin was the center of the target. We used six projections: two projections were used to make a Reconstruction Box and four projections were for image acquisition. Reconstruction Box was made up of voxels of 3D matrix. Projection images were transformed into 3D volume in this virtual box using geometrical based back-projection method. Algorithm was applied to an ellipsoid model and horse-shoe shaped model. Projection images were created using C program language by geometrical method and reconstruction was also accomplished using C program language and Matlab(The Mathwork Inc., USA). For ellipsoid model, reconstructed volume was slightly overestimated but target shape and position was proved to be correct. For horse-shoe shaped model, reconstructed volume was somewhat different from original target model but there was a considerable improvement in target volume determination.

  • PDF

Development of the Automated Calculation System for Air-Bearing Spindle (공기 베어링 주축의 자동설계시스템 개발)

  • Chernopyatov Y.A.;Chung W.J.;Dolotov K.S.;Kim D.S.;Lee C.M.
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.13 no.5
    • /
    • pp.38-48
    • /
    • 2004
  • Recently the use of high-speed equipment in machine-tool industry has greatly increased, which requires the development of prognostics and prediction methods on the design stage. Conversion of the test/experiments stage from real to virtual reality will not only significantly reduce the design and manufacturing cost, but will also increase design quality. This paper shows how it is possible to develop the automated system for the design calculations of the air-bearing spindles. First, the general calculation method is introduced. It contains several steps, namely, geometry identification, pressure calculation, stiffiness calculation, dynamics characteristics calculation. For geometry identification reducing spindle shaft to rings was proposed, which helps to automate the calculation process. For pressure calculation the Peshti method was implemented. For stiffiness calculation the analysis was made, which shown the necessity of correct calculation step selection. Then the system of ordinary differential equations containing influence coefficients was evolved, which is used for trjectories calculation. The graphical representation of the calculation results shows the dynamic behavior of the spindle unit concerning various working conditions. Finally, this automated system is illustrated by an example of the air-bearing spindle calculation.

Robust Stability eEaluation of Multi-loop Control Systems Based on Experimental Data of Frequency Response

  • Chen, Hong;Okuyama, Yoshifumi;Takemori, Fumiaki
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.360-363
    • /
    • 1995
  • In this paper, we describe the composition of frequency response bands based on experimental data of plants (controlled systems) with uncertainty and nonlinearity, and the robust stability evaluation of feedback control systems. Analysis and design of control systems using the upper and lower bounds of such experimental data would be effective as a practicable method which is not heavily dependent upon mathematical models such as the transfer function. First, we present a method to composite gain characteristic bands of frequency response of cascade connected plants with uncertainty and a recurrent inequality for the composition. Next, evaluation methods of the robust stability of multi-loop control systems obtained through feedback from the output terminals and multi-loop control systems obtained through feedback into the input terminals are described. In actual control systems, experimental data of frequency responses often depends on the amplitude of input. Therefore, we present the evaluation method of the nominal value and the width of the frequency response band in such a case, and finally give numerical examples based on virtual experimental data.

  • PDF

Dilation and Erosion Technique using a Inspection of the Catenary System Design (침식, 팽창기법을 이용한 전차선 검측 시스템의 설계)

  • Kim, Woo-Sang;Jung, Min-Yong;Kim, Ji-Yoon
    • Journal of the Korean Society for Railway
    • /
    • v.9 no.6 s.37
    • /
    • pp.701-704
    • /
    • 2006
  • The catenaries must guarantee the constant electricity to the trains, so that the safety and the estimate of fatigue degree and the inspection of abrasion degree should be done rapidly. This thesis proposes the system that can manage the performance/failure of the catenaries using the image process as the solution for the weak points of the existing inspection such as the decrease of immediateness and the lack of constancy in the human resources. This study simulates the ALD using VHSV (Virture HSV) which is the unreal HSV images, not getting the real HSV in ages to the image processing technique that repeats the erosion and the expansion of the images as the methods that can monitor the slight/critical defects of the catenaries as dealing with the result of the catenaries inspection images. The final ALD (Abnormal Line Detection) system is designed based on this simulation. I have demonstrated it with the VHSV (Virture HSV) virtual images as the materials of the test and inspected it through testing the defects of the catenaries for the thesis.

On a Substructure Synthesis Having Non-Matching Nodes (비부합 절점으로 이루어진 구조물의 합성과 재해석)

  • 정의일;박윤식
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2001.11a
    • /
    • pp.155-160
    • /
    • 2001
  • Actual engineering structure is frequently very complex, and parts of structure are designed independently by different engineers. Also each structure contains so many degree of freedom. For these reason, methods have been developed which permits the structure to be divided into components or substructures, with analysis being done on a small substructure in order to obtain a full structural system. In such case, because of different mesh size among finite element model (FEM) or different matching points among FEM models and experimentally obtained models, their interfacing points may be non-matching. Solving this non-matching problem is useful to other application such as structural dynamic modification or model updating. In this work, virtual node concept is introduced. Lagrange multipliers are used to enforce the interface compatibility constraint, and interface displacement is approximated by polynomial presentation. The governing equation of whole structure is derived using hybrid variational principle. The eigenvalue of whole structure are calculated using the determinant search method. The number of degree of freedom in the eigenvalue problem can be drastically reduced to just the number of interface degree of freedom. Some numerical simulation is performed to show usefulness of synthesis method.

  • PDF

Dynamic Simulation of Modifiable Bipedal Walking on Uneven Terrain with Unknown Height

  • Hong, Young-Dae;Lee, Ki-Baek
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.3
    • /
    • pp.733-740
    • /
    • 2016
  • To achieve bipedal walking in real human environments, a bipedal robot should be capable of modifiable walking both on uneven terrain with different heights and on flat terrain. In this paper, a novel walking pattern generator based on a 3-D linear inverted pendulum model (LIPM) is proposed to achieve this objective. By adopting a zero moment point (ZMP) variation scheme in real time, it is possible to change the center-of-mass (COM) position and the velocity of the 3-D LIPM throughout the single support phase. Consequently, the proposed method offers the ability to generate a modifiable pattern for walking on uneven terrain without the necessity for any extra footsteps to adjust the COM motion. In addition, a control strategy for bipedal walking on uneven terrain with unknown height is developed. The torques and ground reaction force are measured through force-sensing resisters (FSRs) on each foot and the foot of the robot is modeled as three virtual spring-damper models for the disturbance compensation. The methods for generating the foot and vertical COM of 3-D LIPM trajectories are proposed to achieve modifiable bipedal walking on uneven terrain without any information regarding the height of the terrain. The effectiveness of the proposed method is confirmed through dynamic simulations.

Realistic Skin Rendering for 3D Facial Makeup (3차원 얼굴 메이크업을 위한 사실적인 피부 렌더링)

  • Lee, Sang-Hoon;Kim, Hyeon-Joong;Choi, Soo-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.4
    • /
    • pp.520-528
    • /
    • 2013
  • Makeup simulation is a tool that tests various makeup methods on a virtual digital face using input and display devices. Although several simulation systems supporting various makeup styles have been recently developed, most systems have many limitations on realistic skin representations because they use 2D facial images. We develope a realistic makeup simulation method which can control skin reflectance and roughness parameters. The method allows a user to simulate makeup applications while changing skin parameters using high-resolution facial data acquired by 3D scanners. Besides we use a point-based shape representation which enables simple and flexible 3D rendering, and provide a more realistic makeup simulation by applying different skin parameters on each part of the face.