• Title/Summary/Keyword: growth simulation

Search Result 1,085, Processing Time 0.024 seconds

Real-time Rendering of Realistic Grasses Using Fractal and Shader-Instancing (프랙탈과 셰이더 인스턴싱 기법을 이용한 자연스러운 잔디의 실시간 렌더링)

  • Kim, Jin-Mo;Cho, Hyung-Je
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.298-307
    • /
    • 2010
  • The grass is one of important components that cover the wide surfaces in the application such as game or real time simulation. Actually, it not easy to render effectively numerous grasses that grow over the wide terrain. To solve the difficulty, we must find a solution to the two contradictions in terms : quality and calculation cost. As a solution to the above-mentioned task, in this paper, we propose an efficient method to represent the natural grasses by introducing fractal theory and instancing technique. Although the existing grass representation methods make use of a simple rule of applying a basic grass model repeatedly in rendering process, on the contrary we take advantage of the basic property of fractal's self-similarity and we devise a natural representation method suited to the given environment by introducing two important growth factors such as nature of terrain and quantity of light, and finally we apply a GPU-based shader instancing technique to rendering numerous grass models in real-time.

Design and Implementation of File System Using Local Buffer Cache for Digital Convergence Devices (디지털 컨버전스 기기를 위한 지역 버퍼 캐쉬 파일 시스템 설계 및 구현)

  • Jeong, Geun-Jae;Cho, Moon-Haeng;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.8
    • /
    • pp.21-30
    • /
    • 2007
  • Due to the growth of embedded systems and the development of semi-conductor and storage devices, digital convergence devises is ever growing. Digital convergence devices are equipments into which various functions such as communication, playing movies and wave files and electronic dictionarys are integrated. Example are portable multimedia players(PMPs), personal digital assistants(PDAs), and smart phones. Therefore, these devices need an efficient file system which manages and controls various types of files. In designing such file systems, the size constraint for small embedded systems as well as performance and compatibility should be taken into account. In this paper, we suggest the partial buffer cache technique. Contrary to the traditional buffer cache, the partial buffer cache is used for only the FAT meta data and write-only data. Simulation results show that we could enhance the write performance more than 30% when the file size is larger than about 100 KBytes.

A Study on the Mutual Coexistence between Virtual Reality Bluetooth Devices and WLAN on the Monte-Carlo (몬테카를로 기반의 가상현실 블루투스 기기와 무선랜 사이의 상호 공존 연구)

  • Yun, Hye-Ju;Yu, Chul-Hee;Kim, Byung-Duk;Jo, Young-Do
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • As a communications system and using the wireless devices is increased at the world, the interference among devices at 2.4GHz band become issue. New complex content technology as education, concert, broadcast, thema-park are developed between Virtual Reality technology and tradition. That is expect an annual growth rate of more than 14%. Almost Virtual Reality devices use motion sense or a wireless joystick. Therefore it is necessarily to analyze the coexistence between Virtual Reality devices and Wi-Fi in the ISM band. The interference scenario and propagation of the Extended Hata Model was established to analyze the interference from WLAN into Virtual Reality devices. Through simulation results based on Monte-Carlo principle, separation frequency was obtained to protect WLAN interference from Virtual Reality devices.

Soft-Decision Algorithm with Low Complexity for MIMO Systems Using High-Order Modulations (고차 변조 방식을 사용하는 MIMO 시스템을 위한 낮은 복잡도를 갖는 연판정 알고리즘)

  • Lee, Jaeyoon;Kim, Kyoungtaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.981-989
    • /
    • 2015
  • In a log likelihood ratio(LLR) calculation of the detected symbol, multiple-input multiple-output(MIMO) system applying an optimal or suboptimal algorithm such as a maximum likelihood(ML) detection, sphere decoding(SD), and QR decomposition with M-algorithm Maximum Likelihood Detection(QRM-MLD) suffers from exponential complexity growth with number of spatial streams and modulation order. In this paper, we propose a LLR calculation method with very low complexity in the QRM-MLD based symbol detector for a high order modulation based $N_T{\times}N_R$ MIMO system. It is able to approach bit error rate(BER) performance of full maximum likelihood detector to within 1 dB. We also analyze the BER performance through computer simulation to verify the validity of the proposed method.

WELDING-INDUCED BUCKLING INSTABILITIES IN THIN PLATES

  • Han, Myoung-Soo;Tsai, Chon-Liang
    • Proceedings of the KWS Conference
    • /
    • 2002.10a
    • /
    • pp.661-667
    • /
    • 2002
  • Welding-induced buckling distortion is one of the most problematic concerns in both design and fabrication of welded thin-plate structures. This paper deals with experimental and numerical results of the welding-induced longitudinal and/or buckling distortion occurring in welding of 6mm-thick AH36 high strength steel plates. Effects of the heat input and the plate size on the distortion were experimentally evaluated for square plates. Bead-on-plate welding was performed with the submerged arc welding process along the middle line of plate specimens. Experimental results showed that the longitudinal distortion made a single curvature in the plate, and the distortion magnitude along the weld centerline was proportional to the heat input and the plate size. The experimental results were used to examine the validity of the numerical simulation procedure for welding-induced distortion where the longitudinal distortion mode and magnitude were numerically quantified. Three-dimensional, large deformation, welding simulations were performed for selected weld models. Numerical results of the distortion mode and magnitude were in a good agreement with experimental ones. Depending on the presence of halting the distortion growth during the cooling cycle of welding, the condition discriminating buckling distortion from longitudinal distortion was established. Eigenvalue analyses were performed to check the buckling instability of tested plates with different sizes subjected to different heat inputs. The perturbation load pattern for the analysis was extracted from longitudinal inherent strain distributions. Critical buckling curve from the eigenvalue analyses revealed that the buckling instability is manifested when plate size or heat input increases.

  • PDF

An Adaptive UDT Rate Control Method on Network Traffic Condition (네트워크 트래픽 상태에 적응적인 UDT Rate Control 기법)

  • An, Do-Sik;Wang, Gi-Cheol;Kim, Seung-Hae;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.19-27
    • /
    • 2011
  • Due to the growth of optical fiber network technologies, most networks recently support several tens of Gb/s bandwidth. UDT(UDP-based Data Transfer protocol) is an optimized protocol for bulk data transmission on the network, which has the high bandwidth and long delay time. It periodically controls the sending rate on the fixed sync-interval, 0.01 sec. Here, if the network traffic status varies quickly, available network bandwidth is not able to be properly utilized in-between the sync-intervals. In this paper, we propose an adaptive rate control method with considering the network traffic status in-between the sync-interval periods. The network traffic status is determined based on the RTT variances. With dividing the network status into four classes, the proposed method performs a new rate control by adjusting the inter-packet sending period for a corresponding class. As a simulation result, the proposed method improves the message delivery throughput as well as stability than that of the existing UDT Protocol.

An advanced key distribution mechanism and security protocol to reduce a load of the key management system (키 관리시스템의 부하절감을 위한 향상된 키 분배 메커니즘과 보안프로토콜)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.35-47
    • /
    • 2006
  • In an Ubiquitous Environment, the growth of various services and equipment is forecasted to increase both the multicast users and diverse hacking attacks of the multicast key. Rapid increasing of multicast users and application security protocols reduce the performance of the Central key management system. Accordingly. We propose to elevate the functionality of the key management mechanism for greater efficiency and stability of the multicast services. in this paper The existing key management mechanism comparison and simulation will analyze these problems. We propose the advanced SMKD (Secure Multicast Key Distribution) mechanism application of the small group and key length control new security protocol by methods to solve these problems. The SMKD Model in this paper will help reduce loading the key distribution and encryption execution of a central key management system, and this model can also ensure stability to a central key management system by efficient key management.

  • PDF

A Big Data Application for Anomaly Detection in VANETs (VANETs에서 비정상 행위 탐지를 위한 빅 데이터 응용)

  • Kim, Sik;Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.175-181
    • /
    • 2014
  • With rapid growth of the wireless mobile computing network technologies, various mobile ad hoc network applications converged with other related technologies are rapidly disseminated nowadays. Vehicular Ad Hoc Networks are self-organizing mobile ad hoc networks that typically have moving vehicle nodes with high speeds and maintaining its topology very short with unstable communication links. Therefore, VANETs are very vulnerable for the malicious noise of sensors and anomalies of the nodes in the network system. In this paper, we propose an anomaly detection method by using big data techniques that efficiently identify malicious behaviors or noises of sensors and anomalies of vehicle node activities in these VANETs, and the performance of the proposed scheme is evaluated by a simulation study in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

Prediction of the Effects of the Ship's Heel and Trim Conditions on the Fire Development Characteristics (선박의 종경사 및 횡경사 변화가 화재 확산에 미치는 영향 예측)

  • Kim, Byeol;Hwang, Kwang-Il
    • Journal of Navigation and Port Research
    • /
    • v.42 no.4
    • /
    • pp.283-290
    • /
    • 2018
  • Due to the environmental factors of the sea, ship accidents always contain an inclination angle. The change in the ship affects not only the evacuation speed of passengers but also the fire growth in the ship. For this reason, when analyzing the fire, it is necessary to analyze the risks by considering conditions of inclination. In this study, the temperature that affects the fire was calculated by alteration of ship's heel and trim angle and analyzed using FLUENT. Based on fire occurrence position, evacuation should be done within 37 seconds under the condition of $-10^{\circ}$ heeling angle and 36 seconds under the condition of $-10^{\circ}$ trim angle. However, it was predicted that the evacuation will not be affected under the conditions of $+10^{\circ}$ heel angle and $+10^{\circ}$ trim angle. For these reasons, it is confirmed that when the ship is on fire, evacuation measures should be considered based on the heel and trim conditions as per the location of the fire.

Multiuser Resource Allocation Scheme Considering Link Layer Effective Capacity in OFDMA Systems (직교 주파수 분할 다원 접속 시스템에서 실효 링크 계층 용량을 고려한 다중 사용자 자원 할당 기법)

  • Sung Si-Hwan;Yoo Myung-Sik;Shin Yo-An;Lee Won-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.508-516
    • /
    • 2006
  • The explosive growth of wireless network users and the existence of various wireless services have demanded high rate throughput as well as user's QoS guarantees. Towards this, this paper proposes QoS-oriented subcarrier allocation scheme considering the QoS provisioning of multiple users, which is major requirement for wireless network design point of view. This paper introduces joint RR/K&H combined with M-LWDF(Modified Largest Weighted Delay First) scheme throughout observing statistical channel behavior and real time queuing analysis for appropriate resource allocation tightly connected to multiuser scheduling. Accordingly, the system throughput can be enhanced, and the QoS demanded for delay sensitive services can be satisfied. Furthermore, the proposed scheme is applied for OFDMA(Orthogonal Frequency Division Multiple Access) systems to allocate sub-carriers in optimal way. The simulation results verify plausible performances of proposed resource allocation scheme via showing superior effective capacity under time-varying physical-layer channel behaviors.