• Title/Summary/Keyword: Witch

Search Result 141, Processing Time 0.026 seconds

Experimental Research on Basic design and protection of High-$T_c$ Heater Triggered Switch in Liquid Helium

  • Kim, Young-Jae;Yang, Seong-Eun;Park, Dong-Keun;Chang, Ki-Sung;Na, Jin-Bae;Yoon, Yong-Soo;Ko, Tae-Kuk
    • Progress in Superconductivity and Cryogenics
    • /
    • v.10 no.4
    • /
    • pp.13-17
    • /
    • 2008
  • This paper presents experimental and characteristic analysis of hgh-$T_c$ eater-triggered witch using coated conductor (CC) in liquid and gas helium. The high temperature superconducting insert coil which can be installed in a low temperature superconducting (LTS) magnet has been proposed and researched to generate higher magnetic field for MR. Since CC could be an attractive option for HTS insert, it is important to research he characteristics of heater-triggered switch employing CC. We performed the heater test and constructed simulation model using finite element method (FEM.) We performed a protection test and observed normal zone propagation (NZP) signals to evaluate the witch with protection of magnet.

A Study on the Mimesis Type of the Costume in MMORPG Diablo 3 (MMORPG 디아블로 III 캐릭터 의상에 나타난 미메시스 특성)

  • Yoo, Seon A;Ko, Hyun-Zin
    • Journal of the Korean Society of Costume
    • /
    • v.64 no.3
    • /
    • pp.126-141
    • /
    • 2014
  • The purpose of this study is to analyze the specific mimesis types of common character costumes in MMORPGs, which have stories that are very similar in structure to ancient myths and fantasy novels. As the subject of the research I have selected "Diablo 3" created by the American video game developer, Blizzard Entertainment Images of 5 characters, for both genders - Barbarian, Witch Doctor, Monk, Demon hunter, Wizard - were compiled for a total of 10 images, and these images were compared to popular archetypes in mythology, religion and literature. analyzed them separately according to the mimesis type. For this study, Articles and books containing the Aesthetics, Mimesis and Digital culture were researched in order to study the costume features and the Mimesis types and compare them to the costumes in the MMORPG. Firstly, the character Barbarian is a successor of the barbarian character of the previous product. The outfit worn by the game figure is based on the common images expressed in the movie . The makers created an analogous-imitation mimesis by replicating the image in an exaggerated and grand form. Second, the character Witch Doctor derived its motif from the Voodoo cult, and was expressed in analogous-imitation mimesis, using the very shades and patterns used in real life. Third, the character Monk, blending the image of a priest in Eastern Europe and images of its oriental counterparts, was expressed in transposition-diversion mimesis. Fourth, the Demon Hunter took the source of its inspiration from the image of a Witch hunter in the medieval times. The game character has a sharper sleeker figure than its model, and uses more acute shapes and darker gloomier colors expressed in an analogous-imitation mimesis. Finally, the character Magician took a formless character and expressed it in transposition-diversion mimesis taking as its basis some fantasy novels.

A Study on the Mobile Context Awareness Algorithms Modeling (모바일 상태 결정 알고리즘 구현에 관한 연구)

  • Kang, Myoung-Goo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.1
    • /
    • pp.19-25
    • /
    • 2008
  • In order to realize future ubiquitous, it needs to establish an environment witch service is provided to an user without user's awareness. This study suggests the mobile context awareness algorithm for that. With DB collected using LBS technology, it aims to recognize service status of a terminal and to maximize user's convenience by offering service through continuous inter-operability for various demand and environment of users against the status of a terminal. To realize the algorithm, it adds a terminal status deduction process to MSC. And then, it suggests the algorithm witch determines terminal status depending on status parameter defined by analyzing LBS-based short information by MSC. It realize C code.

  • PDF

A Study on the Modern Adaptation of Traditional Thatched Roof House -Special Reference to Interior Elements of Restaurants and Cafes- (전통 초가의 현대적 적용 사례에 관한 연구 -식음료 판매 공간의 실내구성요소를 중심으로-)

  • 오혜경
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.11
    • /
    • pp.137-149
    • /
    • 2000
  • The Purpose of this study was to investigate actual condition about the modem adaptation of interior elements(floor, wall, ceiling, door & window) in traditional thatched roof house. The examined objects were interior space of 36 restaurants and cafes in Seoul and Kyung-Ki Do area. 1. Floor: Jang-pan was mostly alternated with linoleum which huts Jang-pan pattem. Wumul-maru was adapted from the original and Jang-maru was alternated with wood or linolium which has western state Jang-maru pattern. Mud was adapted from the original or alternated with slate stone or rough finish cement. 2. Wall: Rice proper was alternated with rice paper book witch has chinese character, paper for parcels or modem wall paper. Plaster-white paint or white handy coat. Mud-mud color paint or bamboo stick witch located in the mud wall orginal. Log-half cut log. Wooden board-without cross bar or irregular form. 3. Ceiling: Yondung-Chongang was mostly adapted from the original and Banja-Chonjang was alternated with rice paper book which has Chinese character or modem wall paper. 4. Door and Window: Ttisal-mun and Panjang-mun were adapted from the original. Wan and A’character door and window were simplified character itself.

  • PDF

A Study on the Mobile Context construct Algorism Modeling for Ubiquitous (유비쿼터스 이동통신 한경 구축 알고리즘 구현에 관한 연구)

  • Kang, Myoung-Ku
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1883-1889
    • /
    • 2008
  • In order to realize future ubiquitous, it needs to establish an environment witch service is provided to an user without user's awareness. This study suggests the mobile context awareness algorithm for that. With DB collected using LBS technology, it aims to recognize service status of a terminal and to maximize user's convenience by offering service through continuous inter-operability for various demand and environment of users against the status of a terminal. To realize the algorithm, it adds a terminal status deduction process to MSC. And then, it suggests the algorithm witch determines terminal status depending on status parameter defined by analyzing LBS-based short information by MSC. It realize C code.

A Study on Various Effecting Factors on Water Proofing Properties of Cement Mortar (시멘트 몰탈의 방수성능에 미치는 제반 영향인자에 관한 연구)

  • 신도철;이종열
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1995.04a
    • /
    • pp.100-105
    • /
    • 1995
  • The aim of this study is to developed water proofing properties of cement mortar this study the effect of mix proportion on the basic characteristics of cement mortar was investigated. Also water absorption and permeability properties of mortar using several admixtures were tested. from this results, Physical properties of mortar is improved by using the sand witch has a broad particle size distribution. Also the sililca alumina powder is effective for decreasing the water permeability of mortar and zinc stearate is in creasing the water repellence property.

  • PDF

Program of Development on Protection Coordination for Impedance Fault in Power Transmission System (송전선로 지락사고 보호협조 프로그램 개발)

  • Kim, Hong-Suk;Lee, Seung-Jae;Choi, Myeo-Song
    • Proceedings of the KIEE Conference
    • /
    • 1999.07c
    • /
    • pp.1133-1135
    • /
    • 1999
  • In this paper we propose to develop program witch can improve the detecting capability of impedance fault in power transmission system. It is difficult to setting relay because the different type relays have many setting values to coordinate with each other. The proposed program assist a user in setting relay with convenience grapic environment and database.

  • PDF

Improvement Method of Supplying Reliability on the Electric Railway Power Distribution System (전기철도 고압배전시스템의 공급신뢰도 향상 방안 연구)

  • Kim Young-Sun;Chang Sang-Hoon;Kim Wang-Gon
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.682-687
    • /
    • 2005
  • High quality power supplying of power distribution system in electric railway system is the important function. Power feeding system is complicated witch is compose with distribution line, circuit break, protection facilities and so on. Among this components, role of substation is most important for elevation of reliability in electric power system. Therefore, the enhanced reliability considering the preventive inspection, repair work, replacement is necessary. In this study, a proposed the enhanced reliability method through a calculation of fault probability in power feeding system.

  • PDF

A Software Power Analysis Countermeasure Using Secrete Intermediate Key (비밀 중간키를 이용한 소프트웨어적 전력분석공격 방어대책)

  • Park, YoungGoo;Kim, HyeongRag;Lee, HoonJae;Han, DeokChan;Pak, UiYoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2883-2890
    • /
    • 2013
  • Correlation power analysis attack takes place at the point of operating a known value and a hidden value from a master key as an input. The hidden value can be found by analyzing a correlation between the result value and the measured power signal during the operation, witch makes it possible to estimate the master key from the hidden value. However, the correlation power analysis attack can be very difficult by changing the conditions that make the power analysis possible, when the known value and the operation is hidden, when it is impossible to estimate the master key from the hidden value, or when the correlation between the result value and the power signal is considerably lowered. Therefore this study proposes a software countermeasure using a secrete intermediate key to witch these conditions are applied.

Key Frame Detection Using Contrastive Learning (대조적 학습을 활용한 주요 프레임 검출 방법)

  • Kyoungtae, Park;Wonjun, Kim;Ryong, Lee;Rae-young, Lee;Myung-Seok, Choi
    • Journal of Broadcast Engineering
    • /
    • v.27 no.6
    • /
    • pp.897-905
    • /
    • 2022
  • Research for video key frame detection has been actively conducted in the fields of computer vision. Recently with the advances on deep learning techniques, performance of key frame detection has been improved, but the various type of video content and complicated background are still a problem for efficient learning. In this paper, we propose a novel method for key frame detection, witch utilizes contrastive learning and memory bank module. The proposed method trains the feature extracting network based on the difference between neighboring frames and frames from separate videos. Founded on the contrastive learning, the method saves and updates key frames in the memory bank, witch efficiently reduce redundancy from the video. Experimental results on video dataset show the effectiveness of the proposed method for key frame detection.