• Title/Summary/Keyword: Virtual prototype

Search Result 275, Processing Time 0.025 seconds

The Study on the Internet-based Virtual Apartment Remodeling and Auto Estimation Simulator (인터넷 기반의 아파트 리모델링 및 자동 내역산출을 위한 시뮬레이터 디자인 연구)

  • 서재은;김성곤
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.191-202
    • /
    • 2002
  • As family types have been diverse, patterns of living and living space became diverse as much as users are. Therefore, it is needed to provide various remodeled design of living space corresponding to changes of users'living patterns, and to provide these remodeling process to users directly on the web. In this paper, use scenario for the Internet-based Virtual Apartment Remodeling Simulator is researched as an export system to remodel space in accordance with users diverse lifestyle paradigm and the website is developed. The study consists of four parts. First, the general concept of remodeling, including the range and types of remodeling, are defined, and the misleading terms in this field are reviewed and organized by secondary research Second, fixed factors and variable factors are differentiated in the complex building for residence and business that was decided as a basic building type in this study. Third, there needed a database for consulting, final material, pre-estimation real estimation for simulation of remodeling. This database was introduced along with floor plan and elevation. Finally, the remodeling simulator is presented by the case study developed on the web. The system structure and use scenario are also presented. In order to present and inspect design alternatives, prototype was produced. The Final simulator was enhanced by defeating problems regarding interface efficiency and missing information of existing online site.

  • PDF

Application model research on visualizing anti-inflammation effects by using the virtual cell (가상세포를 활용한 항염증 효능 응용모델 연구)

  • Kim, Chul;Yea, Sang-Jun;Kim, Jin-Hyun;Kim, Sang-Kyun;Jang, Hyun-Chul;Kim, An-Na;Nam, Ky-Youb;Song, Mi-Young
    • Herbal Formula Science
    • /
    • v.18 no.2
    • /
    • pp.227-239
    • /
    • 2010
  • Objective : The purpose of this study was to develop the simulator which can analyze the anti-inflammatory effects of herbs based on e-cell, or the virtual cell. Method : We have ensured the medical herbs and its active compounds by investigating the oriental medicine records and NBCI(Biomedicine database). Also we have developed the web-based search system for confirming database related to anti-inflammation. We have researched the cell signal pathway related with inflammatory response control and established the mathematical model of herb interaction on selected signal pathway in e-cell. Finally we have developed the prototype which can confirm the result of this model visibly. Results : We constructed the database of 62 cases of anti-inflammatory active compounds in 61 cases of medical herbs which have been known anti-inflammation effects in the paper, 16 cases of inflammatory factors, 10 cases of signal pathways related with inflammatory response and 6,834 cases of URL(Uniform Resource Locator) of referenced papers. And we embodied the web-based research system, which can research this database. User can search basic and detailed information of medical plants related with anti-inflammatory by using information system. And user can acquire information on an active compounds, a signal pathway and a link URL of related paper. Among investigated ten pathways, we selected NF-${\kappa}B$, which plays important role in activation of immune system, and we searched the mechanisms of actions of proteins which could be components of this pathway. We reduced total network into IKK-$I{\kappa}B$ - NF-${\kappa}B$, and completed mathematic modeling by using ordinary differential equations and response variables of $I{\kappa}B-NF-{\kappa}B$ signaling model network which is suggested by Baltimore Group. We designed OED(Ordinary Differential Equation) for response of IKK, $I{\kappa}B$, $NF-{\kappa}B$ in e-cell's cytoplasm and nucleus, and measured whether an active compound of medicinal plants which is inputted by an user would have a anti-inflammation effects in obedience to change in concentration over time. The proposed model was verified by using experimental results of the papers which are listed on NCBI.

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA) (메모리 주소 변환 공격에 대한 스케줄러 기반의 방어 방법)

  • Jang, Daehee;Jang, Jinsoo;Kim, Donguk;Choi, Changho;Kang, Brent ByungHoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.873-880
    • /
    • 2015
  • Since hardware-based kernel-integrity monitoring systems run in the environments that are isolated from the monitored OS, attackers in the monitored OS cannot undermine the security of monitoring systems. However, because the monitoring is performed by using physical addresses, the hardware-based monitoring systems are vulnerable to Address Translation Redirection Attack (ATRA) that manipulates virtual-to-physical memory translations. To ameliorate this problem, we propose a scheduler-based ATRA detection method. The method detects ATRA during the process scheduling by leveraging the fact that kernel scheduler engages every context switch of processes. We implemented a prototype on Android emulator and TizenTV, and verified that it successfully detected ATRA without incurring any significant performance loss.

Shared Distributed Big-Data Processing Platform Model: a Study (대용량 분산처리 플랫폼 공유 모델 연구)

  • Jeong, Hwanjin;Kang, Taeho;Kim, GyuSeok;Shin, YoungHo;Jeong, Jinkyu
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.11
    • /
    • pp.601-613
    • /
    • 2016
  • With the increasing need for big data processing, building a shared big data processing platform is important to minimize time and monetary costs. In shared big data processing, multitenancy is a major requirement that needs to be addressed, in order to provide a single isolated personal big data platform for each user, but to share the underlying hardware is shared among users to increase hardware utilization. In this paper, we explore two well-known shared big data processing platform models. One is to use a native Hadoop cluster, and the other is to build a virtual Hadoop cluster for each user. For each model we verified whether it is sufficient to support multi-tenancy. We also present a method to complement unsupported multi-tenancy features in a native Hadoop cluster model. Lastly we built prototype platforms and compared the performance of both models.

Web based 3-D Medical Image Visualization System on the PC (웹 기반 3차원 의료모델 시각화 시스템)

  • Kim, Nam-Kug;Lee, Dong-Hyuk;Kim, Jong-Hyo;Kang, Heung-Sik;Min, Byung-Goo;Kim, Young-Ho
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1997 no.11
    • /
    • pp.201-205
    • /
    • 1997
  • With the recent advance of Web and its associated technologies, information sharing on distribute computing environments has gained a great amount of attention from many researchers in many application areas, such as medicine, engineering, and business. One basic requirement of distributed medical consultation systems is that geographically dispersed, disparate participants are allowed to exchange information readily with each other. Such software also needs to be supported on a broad range of computer platforms to increase the software's accessibility. In this paper, the development of world-wide-web based medical consultation system or radiology imaging is addressed to provide the platform independence and great accessibility. The system supports sharing of 3-dimensional objects. We use VRML (Virtual Reality Modeling Language), which is the de-facto standard in 3-D modeling on the Web. 3-D objects are reconstructed from CT or MRI volume data using a VRML format, which can be viewed and manipulated easily in Web-browsers with a VRML plug-in. A Marching cubes method is used in the transformation of scanned volume data set to polygonal surfaces of VRML. A decimation algorithm is adopted to reduce the number of meshes in the resulting VRML file. 3-D volume data are often very large-sized, and hence loading the data on PC level computers requires a significant reduction of the size of the data, while minimizing the loss of the original shape information. This is also important to decrease network delays. A prototype system has been implemented (http://netopia.snu.ac.kr/-cyber/). and several sessions of experiments are carried out.

  • PDF

Men's Work Clothes Jumper Pattern-making and Its Appearance Evaluation through 3-D Clothing Simulation (3차원 가상착의 시뮬레이션을 이용한 20~50대 연령별 남성 작업복 점퍼 패턴 설계 및 외관평가)

  • Park, Gin-Ah;Lee, Woo-Kyoung
    • Journal of Fashion Business
    • /
    • v.16 no.1
    • /
    • pp.103-120
    • /
    • 2012
  • The study aimed to evaluate the appearance of the men's work clothes jumpers developed to suggest the prototype work clothes jumper patterns by using the 3-D clothing simulation technology. The 3-D simulated clothing images considered the upper body features of men in the age range between 20 and 59 in South Korea. A questionnaire survey conducted previously suggested a basic jumper style with shirt collar and snap opening cuffs for the heavy industry workers; and discomforting parts of the work clothes jumper of the subject workers have been referred to for the experimental jumper appearance test. Besides, defining the measurements of men's upper bodies enabled to generate the men's 3-D virtual models representing each age group's average body feature. The significant body measurement factors for men's 3-D body modeling and jumper pattern-making were stature for the height factor; chest, waist and hip circumferences for the circumference factor; waist back, hip and arm lengths and interscye front/back for the length factor; and back neck breadth for the breadth factor and armscye and scye depths for the depth factor. The men's body measurements of 30's were implemented to three experimental jumper pattern-making methods, i.e. the 1st method using the relations based on stature and chest circumference; the 2nd method using the direct body measurements; and the 3rd method adopting the maximum ease amount of given body measurements whether relations or direct measurements except the direct measurement of scye depth. A comparison among the three experimental jumpers' simulated images highlighted that the appropriate ease amount of the jumper gained higher scores in terms of the jumpers' front, side, back and sleeve parts and the total silhouettes. Therefore the 3rd experimental jumper was finally selected for the heavy industry workers.

Study on Vehicle Haptic-Seat for the Driving Information Transfer to Driver for the Elderly (고령운전자 운전정보전달을 위한 차량용 햅틱시트 연구)

  • Oh, S.Y.;Kim, K.T.;Yu, C.H.;Kwon, T.K.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.8 no.3
    • /
    • pp.151-160
    • /
    • 2014
  • In this study, the effect of the automotive haptic-seat technology which can transmit the driving information by the vibro-stimulus from the seat was investigated to overcome previous system's limitation relied on the visual and audial method and to help handicap driving. A prototype haptic seat cover with 30 coin-type motors and driver module were developed for this sake. In an experiment of seat vibration stimulation being performed under virtual driving situation by targeting the elderly aged over 65 years old, average score of test subjects for total vibration recognition was 3.5/4 points and recognition rate of 87.5% was represented. In addition, a result that all the test subjects totally recognized overspeed warning signal of 4 times was represented. As a result of statistical analysis for vibration recognition score by each group depending on TMT score, a significant difference was not found and a result that tactile function of which vibration is recognized even by the aged whose visual, perceptional function is declined showed an equal ability was obtained.. In this study it was shown that the seat vibration stimulus could be used to transfer the old drivers' information while driving.

  • PDF

End-mill Modeling and Manufacturing Methodology via Cutting simulation (Cutting simulation을 이용한 End-milling cutter의 모델링 및 제작에 관한 연구)

  • Kim J.H.;Park S.J.;Kim J.H.;Park J.W.;Ko T.J.;Kim H.S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.10a
    • /
    • pp.456-463
    • /
    • 2005
  • This paper describes a design process of end-milling cutters: solid model of the designed cutter is constructed along with computation of cutter geometry, and the wheel geometry as well as wheel positioning data fur fabricating end-mills with required cutter geometry is calculated. In the process, the main idea is to use the cutting simulation method by which the machined shape of an end-milling cutter is obtained via Boolean operation between a given grinding wheel and a cylindrical workpiece (raw stock). Major design parameters of a cutter such as rake angle, inner radius can be verified by interrogating the section profile of its solid model. We studied relations between various dimensional parameters and proposed an iterative approach to obtain the required geometry of a grinding wheel and the CL data fer machining an end-milling cutter satisfying the design parameters. This research has been implemented on a commercial CAD system by use of the API function programming, and is currently used by a tool maker in Korea. It can eliminate producing a physical prototype during the design stage, and it can be used fur virtual cutting test and analysis as well.

  • PDF