• Title/Summary/Keyword: information use

Search Result 31,628, Processing Time 0.059 seconds

Research about CAVE Practical Use Way Through Culture Content's Restoration Process that Utilize CAVE (가상현실시스템(CAVE)을 활용한 문화 Content의 복원 과정을 통한 CAVE활용 방안에 대한 연구)

  • Kim, Tae-Yul;Ryu, Seuc-Ho;Hur, Yung-Ju
    • Journal of Korea Game Society
    • /
    • v.4 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • Virtual reality that we have seen from the movies in 80's and 90's is hawing near based on the rapid progress of science together with a computer technology. Various virtual reality system developments (such as VRML, HMD FishTank, Wall Type, CAVE Type, and so on) and the advancement of those systems make for the embodiment of virtual reality that gives more sense of the real. Virtual reality is so immersive that makes people feel like they are in that environment and enable them to manipulate without experiencing the environment at first hand that is hard to experience in reality. Virtual reality can be applied to the spheres, such as education, high-level programming, remote control, surface exploration of the remote satellite, analysis of exploration data, scientific visualization, and so on. For some connote examples, there are training of a tank and an aeroplane operation, fumiture layout design, surgical operation practice, game, and so on. In these virtual reality systems, the actual operation of the human participant and virtual workspace are connected each other to the hardware that stimulates the five senses adequately to lend the sense of the immersion. There are still long way to go, however, before long it will be possible to have the same feeling in the virtual reality as human being can have by further study and effort. In this thesis, the basic definition, the general idea, and the kind of virtual reality were discussed. Especially, CAVE typed in reality that is highly immersive was analyzed in definition, and then the method of VR programming and modeling in the virtual reality system were suggested by showing the restoration process of Kyongbok Palace (as the content of the original form of the culture) that was made by KISTI(Korea Institute of Science and Technology Information) in 2003 through design process in virtual reality system. Through these processes, utilization of the immersive virtual reality system was discussed and how to take advantage of this CAVE typed virtual reality system at the moment was studied. In closing the problems that had been exposed in the process of the restoration of the cultural property were described and the utilization plan of the virtual reality system was suggested.

  • PDF

A Study for the Methodology of Analyzing the Operation Behavior of Thermal Energy Grids with Connecting Operation (열 에너지 그리드 연계운전의 운전 거동 특성 분석을 위한 방법론에 관한 연구)

  • Im, Yong Hoon;Lee, Jae Yong;Chung, Mo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.143-150
    • /
    • 2012
  • A simulation methodology and corresponding program based on it is to be discussed for analyzing the effects of the networking operation of existing DHC system in connection with CHP system on-site. The practical simulation for arbitrary areas with various building compositions is carried out for the analysis of operational features in both systems, and the various aspects of thermal energy grids with connecting operation are highlighted through the detailed assessment of predicted results. The intrinsic operational features of CHP prime movers, gas engine, gas turbine etc., are effectively implemented by realizing the performance data, i.e. actual operation efficiency in the full and part loads range. For the sake of simplicity, a simple mathematical correlation model is proposed for simulating various aspects of change effectively on the existing DHC system side due to the connecting operation, instead of performing cycle simulations separately. The empirical correlations are developed using the hourly based annual operation data for a branch of the Korean District Heating Corporation (KDHC) and are implicit in relation between main operation parameters such as fuel consumption by use, heat and power production. In the simulation, a variety of system configurations are able to be considered according to any combination of the probable CHP prime-movers, absorption or turbo type cooling chillers of every kind and capacity. From the analysis of the thermal network operation simulations, it is found that the newly proposed methodology of mathematical correlation for modelling of the existing DHC system functions effectively in reflecting the operational variations due to thermal energy grids with connecting operation. The effects of intrinsic features of CHP prime-movers, e.g. the different ratio of heat and power production, various combinations of different types of chillers (i.e. absorption and turbo types) on the overall system operation are discussed in detail with the consideration of operation schemes and corresponding simulation algorithms.

Facial Expression Control of 3D Avatar using Motion Data (모션 데이터를 이용한 3차원 아바타 얼굴 표정 제어)

  • Kim Sung-Ho;Jung Moon-Ryul
    • The KIPS Transactions:PartA
    • /
    • v.11A no.5
    • /
    • pp.383-390
    • /
    • 2004
  • This paper propose a method that controls facial expression of 3D avatar by having the user select a sequence of facial expressions in the space of facial expressions. And we setup its system. The space of expression is created from about 2400 frames consist of motion captured data of facial expressions. To represent the state of each expression, we use the distance matrix that represents the distances between pairs of feature points on the face. The set of distance matrices is used as the space of expressions. But this space is not such a space where one state can go to another state via the straight trajectory between them. We derive trajectories between two states from the captured set of expressions in an approximate manner. First, two states are regarded adjacent if the distance between their distance matrices is below a given threshold. Any two states are considered to have a trajectory between them If there is a sequence of adjacent states between them. It is assumed . that one states goes to another state via the shortest trajectory between them. The shortest trajectories are found by dynamic programming. The space of facial expressions, as the set of distance matrices, is multidimensional. Facial expression of 3D avatar Is controled in real time as the user navigates the space. To help this process, we visualized the space of expressions in 2D space by using the multidimensional scaling(MDS). To see how effective this system is, we had users control facial expressions of 3D avatar by using the system. As a result of that, users estimate that system is very useful to control facial expression of 3D avatar in real-time.

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.

The Factors for Food Service Satisfaction of the Elderly Welfare Center Free Lunch Program Participants in Busan (부산 일부지역 복지관 무료급식 이용노인들의 급식만족도에 영향을 미치는 요인)

  • Lee, Jeong-Sook
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.40 no.1
    • /
    • pp.128-136
    • /
    • 2011
  • This study was carried out to investigate the factors of food service satisfaction of the elderly in Busan. The survey was conducted from September 1 to October 15, 2009 by questionnaires and data analyzed by SPSS program. Fifty point nine percent of the subjects lived alone and the source of living expenses of 70.5% of the subjects was subsidy from government. The most important reason for the elderly to participate in meal service was 'economic difficulty' and 'to meet friend'. The subjects had various chronic degenerative diseases, such as arthritis, hypertension, diabetes, osteoporosis and cardiac disease. Sixty-six point eight percent of the subjects needed diet therapy for their diseases, but 87.1% of them don't want to pay the extra fee. Thirty six point five percent of the subjects attained information about lunch program because it was 'close to home' but 20.7% was 'from public officials'. The reasons for the use of the meal service were 'economic difficulty' (40.0%), 'to meet friends' (22.6%), and 'bother to prepare meal' (16.50%). The services provided by welfare center were health care, physical exam and haircut. The score given by the subjects on the satisfaction of meal service was 3.84 on the 5-point maximum scale. Higher satisfaction on kindness of staff, satisfaction of social support and awareness of support resulted in higher satisfaction of food service. It would be effective to provide food service models that meet specific needs of the elderly according to social welfare service and social community activities.

An Efficient Algorithm for Streaming Time-Series Matching that Supports Normalization Transform (정규화 변환을 지원하는 스트리밍 시계열 매칭 알고리즘)

  • Loh, Woong-Kee;Moon, Yang-Sae;Kim, Young-Kuk
    • Journal of KIISE:Databases
    • /
    • v.33 no.6
    • /
    • pp.600-619
    • /
    • 2006
  • According to recent technical advances on sensors and mobile devices, processing of data streams generated by the devices is becoming an important research issue. The data stream of real values obtained at continuous time points is called streaming time-series. Due to the unique features of streaming time-series that are different from those of traditional time-series, similarity matching problem on the streaming time-series should be solved in a new way. In this paper, we propose an efficient algorithm for streaming time- series matching problem that supports normalization transform. While the existing algorithms compare streaming time-series without any transform, the algorithm proposed in the paper compares them after they are normalization-transformed. The normalization transform is useful for finding time-series that have similar fluctuation trends even though they consist of distant element values. The major contributions of this paper are as follows. (1) By using a theorem presented in the context of subsequence matching that supports normalization transform[4], we propose a simple algorithm for solving the problem. (2) For improving search performance, we extend the simple algorithm to use $k\;({\geq}\;1)$ indexes. (3) For a given k, for achieving optimal search performance of the extended algorithm, we present an approximation method for choosing k window sizes to construct k indexes. (4) Based on the notion of continuity[8] on streaming time-series, we further extend our algorithm so that it can simultaneously obtain the search results for $m\;({\geq}\;1)$ time points from present $t_0$ to a time point $(t_0+m-1)$ in the near future by retrieving the index only once. (5) Through a series of experiments, we compare search performances of the algorithms proposed in this paper, and show their performance trends according to k and m values. To the best of our knowledge, since there has been no algorithm that solves the same problem presented in this paper, we compare search performances of our algorithms with the sequential scan algorithm. The experiment result showed that our algorithms outperformed the sequential scan algorithm by up to 13.2 times. The performances of our algorithms should be more improved, as k is increased.

Design of MAHA Supercomputing System for Human Genome Analysis (대용량 유전체 분석을 위한 고성능 컴퓨팅 시스템 MAHA)

  • Kim, Young Woo;Kim, Hong-Yeon;Bae, Seungjo;Kim, Hag-Young;Woo, Young-Choon;Park, Soo-Jun;Choi, Wan
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.81-90
    • /
    • 2013
  • During the past decade, many changes and attempts have been tried and are continued developing new technologies in the computing area. The brick wall in computing area, especially power wall, changes computing paradigm from computing hardwares including processor and system architecture to programming environment and application usage. The high performance computing (HPC) area, especially, has been experienced catastrophic changes, and it is now considered as a key to the national competitiveness. In the late 2000's, many leading countries rushed to develop Exascale supercomputing systems, and as a results tens of PetaFLOPS system are prevalent now. In Korea, ICT is well developed and Korea is considered as a one of leading countries in the world, but not for supercomputing area. In this paper, we describe architecture design of MAHA supercomputing system which is aimed to develop 300 TeraFLOPS system for bio-informatics applications like human genome analysis and protein-protein docking. MAHA supercomputing system is consists of four major parts - computing hardware, file system, system software and bio-applications. MAHA supercomputing system is designed to utilize heterogeneous computing accelerators (co-processors like GPGPUs and MICs) to get more performance/$, performance/area, and performance/power. To provide high speed data movement and large capacity, MAHA file system is designed to have asymmetric cluster architecture, and consists of metadata server, data server, and client file system on top of SSD and MAID storage servers. MAHA system softwares are designed to provide user-friendliness and easy-to-use based on integrated system management component - like Bio Workflow management, Integrated Cluster management and Heterogeneous Resource management. MAHA supercomputing system was first installed in Dec., 2011. The theoretical performance of MAHA system was 50 TeraFLOPS and measured performance of 30.3 TeraFLOPS with 32 computing nodes. MAHA system will be upgraded to have 100 TeraFLOPS performance at Jan., 2013.

Development and Application of the High Speed Weigh-in-motion for Overweight Enforcement (고속축하중측정시스템 개발과 과적단속시스템 적용방안 연구)

  • Kwon, Soon-Min;Suh, Young-Chan
    • International Journal of Highway Engineering
    • /
    • v.11 no.4
    • /
    • pp.69-78
    • /
    • 2009
  • Korea has achieved significant economic growth with building the Gyeongbu Expressway. As the number of new road construction projects has decreased, it becomes more important to maintain optimal status of the current road networks. One of the best ways to accomplish it is weight enforcement as active control measure of traffic load. This study is to develop High-speed Weigh-in-motion System in order to enhance efficiency of weight enforcement, and to analyze patterns of overloaded trucks on highways through the system. Furthermore, it is to review possibilities of developing overweight control system with application of the HS-WIM system. The HS-WIM system developed by this study consists of two sets of an axle load sensor, a loop sensor and a wandering sensor on each lane. A wandering sensor detects whether a travelling vehicle is off the lane or not with the function of checking the location of tire imprint. The sensor of the WIM system has better function of classifying types of vehicles than other existing systems by detecting wheel distance and tire type such as single or dual tire. As a result, its measurement errors regarding 12 types of vehicle classification are very low, which is an advantage of the sensor. The verification tests of the system under all conditions showed that the mean measurement errors of axle weight and gross axle weight were within 15 percent and 7 percent respectively. According to the WIM rate standard of the COST-323, the WIM system of this study is ranked at B(10). It means the system is appropriate for the purpose of design, maintenance and valuation of road infrastructure. The WIM system in testing a 5-axle cargo truck, the most frequently overloaded vehicle among 12 types of vehicles, is ranked at A(5) which means the system is available to control overloaded vehicles. In this case, the measurement errors of axle load and gross axle load were within 8 percent and 5 percent respectively. Weight analysis of all types of vehicles on highways showed that the most frequently overloaded vehicles were type 5, 6, 7 and 12 among 12 vehicle types. As a result, it is necessary to use more effective overweight enforcement system for vehicles which are seriously overloaded due to their lift axles. Traffic volume data depending upon vehicle types is basic information for road design and construction, maintenance, analysis of traffic flow, road policies as well as research.

  • PDF

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Evaluation of SWAT Applicability to Simulation of Sediment Behaviois at the Imha-Dam Watershed (임하댐 유역의 유사 거동 모의를 위한 SWAT 모델의 적용성 평가)

  • Park, Younshik;Kim, Jonggun;Park, Joonho;Jeon, Ji-Hong;Choi, Dong Hyuk;Kim, Taedong;Choi, Joongdae;Ahn, Jaehun;Kim, Ki-sung;Lim, Kyoung Jae
    • Journal of Korean Society on Water Environment
    • /
    • v.23 no.4
    • /
    • pp.467-473
    • /
    • 2007
  • Although the dominant land use at the Imha-dam watershed is forest areas, soil erosion has been increasing because of intensive agricultural activities performed at the fields located along the stream for easy-access to water supply and relatively favorable topography. In addition, steep topography at the Imha-dam watershed is also contributing increased soil erosion and sediment loads. At the Imha-dam watershed, outflow has increased sharply by the typhoons Rusa and Maemi in 2002, 2003 respectively. In this study, the Soil and Water Assessment Tool (SWAT) model was evaluated for simulation of flow and sediment behaviors with long-term temporal and spatial conditions. The precipitation data from eight precipitation observatories, located at Ilwol, Subi and etc., were used. There was no significant difference in monthly rainfall for 8 locations. However, there was slight differences in rainfall amounts and patterns in 2003 and 2004. The topographical map at 1:5000 scale from the National Geographic Information Institute was used to define watershed boundaries, the detailed soil map at 1:25,000 scale from the National Institute of Highland Agriculture and the land cover data from the Korea Institute of Water and Environment were used to simulate the hydrologic response and soil erosion and sediment behaviors. To evaluate hydrologic component of the SWAT model, calibration was performed for the period from Jan. 2002 to Dec. 2003, and validation for Jan. 2004 to Apr. 2005. The $R^2$ value and El value were 0.93 and 0.90 respectively for calibration period, and the $R^2$ value and El value for validation were 0.73 and 0.68 respectively. The $R^2$ value and El value of sediment yield data with the calibrated parameters was 0.89 and 0.84 respectively. The comparisons with the measured data showed that the SWAT model is applicable to simulate hydrology and sediment behaviors at Imha dam watershed. With proper representation of the Best Management Practices (BM Ps) in the SWAT model, the SWAT can be used for pre-evaluation of the cost-effective and sustainable soil erosion BMPs to solve sediment issues at the Imha-dam watershed. In Korea, the Universal Soil Loss Equation (USLE) has been used to estimate the soil loss for over 30 years. However, there are limitations in the field scale mdel, USLE when applied for watershed. Also, the soil loss changes temporarily and spatially, for example, the Imha-dam watershed. Thus, the SW AT model, capable of simulating hydrologic and soil erosion/sediment behaviors temporarily and spatially at watershed scale, should be used to solve the muddy water issues at the Imha-dam watershed to establish more effective muddy water reduction countermeasure.