• Title/Summary/Keyword: design feature

Search Result 2,172, Processing Time 0.027 seconds

Customizing feature analysis for super mario maker (슈퍼마리오 메이커의 커스터마이징 특징 분석)

  • Park, Sang-Tae;Sohn, Jong-Nam;Lee, Chang-Jo
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.339-345
    • /
    • 2016
  • While a game market has been growing consistently world widely, a market of arcade or video game has been detained. In this stagnation, the latest one in 2015, "Super Mario Maker" of Mario series that's been running in good for 30 years, the notable sale and growth of which are extraordinary. As for a study in customizing, a literature of game customizing and studies that are foregone were mostly handling contents about a game character. In the survey that's done in this thesis about knowledge and needs in customizinge game users have, it was shown they want to customize sides of a rule and a character. I analyzed what the main factors are in this game which uses a main concept of customizing and the reason for high profits and popularity. As a result of the analysis, four features, possibility to customize a game rule, share data among users, collaboration in marketing with NFC figure characters, offering updates with sustained and new customizing features were found out. I am certain a game customizing will be helping to meet users and be used for various industries without limit of existing character.

Bayes Stopping Rule for MAC Scheme Wireless Sensor Networks (무선 센서 망에서 MAC 방식을 위한 Bayes 중지 규칙)

  • Park, Jin-Kyung;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.7
    • /
    • pp.53-61
    • /
    • 2008
  • Consider a typical wireless sensor network in which stem nodes form the backbone network of mesh topology while each stem node together with leaf nodes in its vicinity forms a subnetwork of star topology. In such a wireless sensor network, we must heed the following when we design a MAC scheme supporting the packet delivery from a leaf node to a stem node. First, leaf nodes are usually battery-powered and it is difficult to change or recharge their batteries. Secondly, a wireless sensor network is often deployed to collect and update data periodically. Late delivery of a data segment by a sensor node causes the sink node to defer data processing and the data segment itself to be obsolete. Thirdly, extensive signaling is extremely limited and complex computation is hardly supported. Taking account of these facts, a MAC scheme must be able to save energy and support timeliness in packet delivery while being simple and robust as well. In this paper, we propose a version of ALOHA as a MAC scheme for a wireless sensor network. While conserving the simplicity and robustness of the original version of ALOHA, the proposed version of ALOHA possesses a distinctive feature that a sensor node decides between stop and continuation prior to each delivery attempt for a packet. Such a decision needs a stopping rule and we suggest a Bayes stopping rule. Note that a Bayes stopping rule minimizes the Bayes risk which reflects the energy, timeliness and throughput losses. Also, a Bayes stopping rule is practical since a sensor node makes a decision only using its own history of delivery attempt results and the prior information about the failure in delivery attempt. Numerical examples confirm that the proposed version of ALOHA employing a Bayes stopping rule is a useful MAC scheme in the severe environment of wireless sensor network.

Comparison between Numerical Results of 1D Beam and 2D Plane Stress Finite Element Analyses Considering Aspect Ratio of Cantilever Beams (캔틸레버보의 형상비에 따른 1차원 보와 2차원 평면응력 유한요소해석 결과의 비교)

  • Kang, Yoo-Jin;Sim, Ji-Soo;Cho, Hae-Sung;Shin, Sang-Joon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.28 no.5
    • /
    • pp.459-465
    • /
    • 2015
  • There exist different kinds of aircrafts, such as conventional airplane, rotorcraft, fighter, and unmanned aerial vehicle. Their shape and feature are dependent upon their own assigned mission. One of the fundamental analyses performed during the aircraft design is the structural analysis. It becomes more complicated and requires severe computations because of the recent complex trends in aircraft structure. In order for efficiency in the structural analysis, a simplified approach, such as equivalent beam or plate model, is preferred. However, it is not clear which analysis will be appropriate to analyze the realistic configuration, such as an aircraft wing, i.e., between an equivalent beam and plate analysis. It is necessary to assess the limitation for both the one-dimensional beam analysis and the two-dimensional plate theory. Thus, in this paper, the static structural analysis results obtained by EDISON solvers were compared with the three-dimensional results obtained from MSC NASTRAN. Before that, EDISON program was verified by comparing the results with those from MSC NASTRAN program and other analytic solutions.

A System of Audio Data Analysis and Masking Personal Information Using Audio Partitioning and Artificial Intelligence API (오디오 데이터 내 개인 신상 정보 검출과 마스킹을 위한 인공지능 API의 활용 및 음성 분할 방법의 연구)

  • Kim, TaeYoung;Hong, Ji Won;Kim, Do Hee;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.895-907
    • /
    • 2020
  • With the recent increasing influence of multimedia content other than the text-based content, services that help to process information in content brings us great convenience. These services' representative features are searching and masking the sensitive data. It is not difficult to find the solutions that provide searching and masking function for text information and image. However, even though we recognize the necessity of the technology for searching and masking a part of the audio data, it is not easy to find the solution because of the difficulty of the technology. In this study, we propose web application that provides searching and masking functions for audio data using audio partitioning method. While we are achieving the research goal, we evaluated several speech to text conversion APIs to choose a proper API for our purpose and developed regular expressions for searching sensitive information. Lastly we evaluated the accuracy of the developed searching and masking feature. The contribution of this work is in design and implementation of searching and masking a sensitive information from the audio data by the various functionality proving experiments.

A Study on the ZVZCS Three Level DC/DC Converter without Primary Freewheeling Diodes (1차측 환류 다이오드를 제거한 ZVZCS Three Level DC/DC 컨버터에 관한 연구)

  • Bae, Jin-Yong;Kim, Yong;Baek, Soo-Hyun;Kwon, Soon-Do;Kim, Pil-Soo;Gye, Sang-Bum
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.16 no.6
    • /
    • pp.66-73
    • /
    • 2002
  • This paper presents ZVZCS(Zero-Voltage and Zero-Current Switching) Three Level DC/DC Converter without primary freewheeling diodes. The new converter presented in this paper used a phase shirt control with a flying capacitor in the primary side to achieve ZVS for the outer switches. A secondary anxiliary circuit which consists of one small capacitor, two small diodes and one coupled inductor, is added in the secondary to provide ZVZCS conditions to primary switches, ZVS for outer switches and ZCS for inner switches. Many advantages include simple secondary auxiliary circuit topology, high efficiency, and low cost make the new converter attractive for high power applications. Also the circulating current flows through the circuit so that it causes the needless coduction loss to be occurred in the devices and the transformer of the circuit The new converter has no primary auxiliary diodes for freewheeling current. The principle of operation, feature and design considerations are illustrated and verified through the experiment with a 1[㎾] 50[KHz]IGBT based experimental circuit.

Mobile M/VC Application Framework Using Observer/Observable Design Pattern (관찰자/피관찰자 설계 패턴을 이용한 모바일 M/VC 응용 프레임워크)

  • Eum Doo-Hun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.81-92
    • /
    • 2006
  • Recently, the number of mobile phone and PDA users has been rapidly increased. Such monitoring and control applications as geographical and traffic information systems are being used widely with wireless devices. In this paper, we introduce the mobile M/VC application framework that supports the rapid constructions of mobile monitoring and control (M/VC) applications. The mobile M/VC application framework uses the mobile Observer/Observable pattern that extends the Java's Observer/Observable for automatic interactions of server and client objects in wireless environments. It also provides the Multiplexer and Demultiplexer classes that supports the assembly feature of Observer and Observable objects. To construct an application using the framework, developers just need to create necessary objects from the Observable and MobileObserver classes and inter-connect them structurally(like the plug-and-play style) through the Multiplexer and Demultiplexer objects. Then, the state change of Observable objects is notified to the connected Observer objects and user's input with Observer objects is propagated to Observable objects. These mechanism is the main process for monitoring and control applications. Therefore, the mobile M/VC application framework can improve the productivity of mobile applications and enhance the reusability of such components as Observer and Observable objects in wireless environments.

  • PDF

Development of a Software to Evaluate the CPES(Cable Penetration Fire Stop) System in Nuclear Power Plane I (원자력발전소 케이블관통부 충전시스템 평가용 소프트웨어 개발 I)

  • 윤종필;권성필;조재규;윤인섭
    • Fire Science and Engineering
    • /
    • v.18 no.1
    • /
    • pp.24-30
    • /
    • 2004
  • In this work the dynamic heat transfer occurring in a cable penetration fire stop system built in the firewall of nuclear power plants is three-dimensionally investigated to develop a test-simulator that can be used to verify effectiveness of the sealants. Here was carried out an experiment to observe the heat transfer in the cable penetration fire stop system made of DOW CORNING products. The dynamic heat transfer occurring in the fire stop system is formulated in a parabolic partial differential equation subjected to a set of initial and boundary conditions. And it was modeled, simulated, and analyzed. The simulation results were illustrated in three-dimensional graphics and were compared with experimental data. Through the simulations, it was shown clearly that the temperature distribution was influenced very much by the number, position, and temperature of the cable streams. It also was found that the dynamic heat transfer through the cable streams was one of the most dominant factors, and the feature of heat conduction could be understood as an unsteady-state process. It is certain that these numerical results are useful for making a performance-based design for the cable penetration fire stop system.

Design and Evaluation of a High-performance Key-value Storage for Industrial IoT Environments (산업용 IoT 환경을 위한 고성능 키-값 저장소의 설계 및 평가)

  • Han, Hyuck
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.7
    • /
    • pp.127-133
    • /
    • 2021
  • In industrial IoT environments, sensors generate data for their detection targets and deliver the data to IoT gateways. Therefore, managing large amounts of real-time sensor data is an essential feature for IoT gateways, and key-value storage engines are widely used to manage these sensor data. However, key-value storage engines used in IoT gateways do not take into account the characteristics of sensor data generated in industrial IoT environments, and this limits the performance of key-value storage engines. In this paper, we optimize the key-value storage engine by utilizing the features of sensor data in industrial IoT environments. The proposed optimization technique is to analyze the key, which is the input of a key-value storage engine, for further indexing. This reduces excessive write amplification and improves performance. We implement our optimization scheme in LevelDB and use the workload of the TPCx-IoT benchmark to evaluate our proposed scheme. From experimental results we show that our proposed technique achieves up to 21 times better than the existing scheme, and this shows that the proposed technique can perform high-speed data ingestion in industrial IoT environments.

A Study of Relationship Derivation Technique using object extraction Technique (개체추출기법을 이용한 관계성 도출기법)

  • Kim, Jong-hee;Lee, Eun-seok;Kim, Jeong-su;Park, Jong-kook;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.309-311
    • /
    • 2014
  • Despite increasing demands for big data application based on the analysis of scattered unstructured data, few relevant studies have been reported. Accordingly, the present study suggests a technique enabling a sentence-based semantic analysis by extracting objects from collected web information and automatically analyzing the relationships between such objects with collective intelligence and language processing technology. To be specific, collected information is stored in DBMS in a structured form, and then morpheme and feature information is analyzed. Obtained morphemes are classified into objects of interest, marginal objects and objects of non-interest. Then, with an inter-object attribute recognition technique, the relationships between objects are analyzed in terms of the degree, scope and nature of such relationships. As a result, the analysis of relevance between the information was based on certain keywords and used an inter-object relationship extraction technique that can determine positivity and negativity. Also, the present study suggested a method to design a system fit for real-time large-capacity processing and applicable to high value-added services.

  • PDF

New QECCs for Multiple Flip Error Correction (다중플립 오류정정을 위한 새로운 QECCs)

  • Park, Dong-Young;Kim, Baek-Ki
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.907-916
    • /
    • 2019
  • In this paper, we propose a new five-qubit multiple bit flip code that can completely protect the target qubit from all multiple bit flip errors using only CNOT gates. The proposed multiple bit flip codes can be easily extended to multiple phase flip codes by embedding Hadamard gate pairs in the root error section as in conventional single bit flip code. The multiple bit flip code and multiple phase flip code in this paper share the state vector error information by four auxiliary qubits. These four-qubit state vectors reflect the characteristic that all the multiple flip errors with Pauli X and Z corrections commonly include a specific root error. Using this feature, this paper shows that low-cost implementation is possible despite the QECC design for multiple-flip error correction by batch processing the detection and correction of Pauli X and Z root errors with only three CNOT gates. The five-qubit multiple bit flip code and multiple phase flip code proposed in this paper have 100% error correction rate and 50% error discrimination rate. All QECCs presented in this paper were verified using QCAD simulator.