• Title/Summary/Keyword: modern applications

Search Result 514, Processing Time 0.036 seconds

Brief comparison of the mechanism of modern medicine and traditional medicine in neuronal cell death

  • Kim, Young-Sick;Jeong, Hyun-Ja;Kim, Hyung-Min;Cho, Seung-Hun
    • CELLMED
    • /
    • v.1 no.1
    • /
    • pp.1.1-1.7
    • /
    • 2011
  • Medicine has a past, a present, and will have a future; the same can be said for many diseases. Even with the surprising development of modern medicine, traditional medicine, especially eastern Asian traditional medicines still exist and are widely used in those regions. But modern medicine and western pacific traditional medicines have different theories and applications for the same disease. In this review, traditional medical theory, used together with modern medicine, can be combined to shed light on the area of neuronal death.

Modern Housing Complexes in South Korea. An Educational Analysis to Evaluate the Typological Evolution and Urban Adaptations

  • Pedrabissi, Dario
    • Journal of Practical Engineering Education
    • /
    • v.9 no.1
    • /
    • pp.85-90
    • /
    • 2017
  • The contemporary South Korean landscape is characterised by a massive display of modern apartment buildings. They are omnipresent in their monotonous manifestation and represent the dream of the Korean population. Serial mass housing is a typology that has had a great diffusion all over the world, but how has modern housing developed in South Korea? To this end, what are the resulting local adaptations?. This paper retraces these key evolutional aspects. Methodologically, it draws on a scholarly literature review as well as on-site photographic surveys, developed in connection with an educational program at the Korea Tech University. The result is the analysis of both the urban and architectural transformation from the early modernisation period to the present condition of contemporary housing. A historical background introduces Korean traditional urban houses, to be used as a context to describe the contemporary modern city that has developed since the 1960s. The main emphasis is then placed on the urbanisation process that fully matured during the 1980s together with a focus on the mass housing typology as the main pivot in the urban transformation. Finally, the paper will draw a parallel between modern Western theories and Korean applications.

A New General Purpose On-Line Digital Controller For Power Electronic Applications Using TMS320C31 (전력전자 응용을 위한 TMS320C31 범용 실시간 제어기의 개발)

  • Seok, Jool-Ki;Sul, Seung-Ki
    • Proceedings of the KIEE Conference
    • /
    • 1994.07a
    • /
    • pp.441-443
    • /
    • 1994
  • Modern control theory and high speed switching device such as IGBT have been developed day by day, but it hardly has been applicated practically to the various fields of industry, specially power electronic fields, because there is no cost effective hardware that accommodates modern control theory. Thus, in our study, DSP based ultra high speed general controller which may be exclusively used for power electronic applications is developed.

  • PDF

Development of General High Performance Digital Controller Using TMS320C30 for Power Electronic Applications (전력전자 응용을 위한 TMS320C30 범용제어기의 개발)

  • Kim, Joohn-Sheok;Sul, Seung-Ki;Park, Min-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1992.07a
    • /
    • pp.508-511
    • /
    • 1992
  • Modern control theory has been developed day by day, but it hardly has been applicated practically to the various fields of industry, specially power electronic field, because there is no cost effective hardware that accommodates modern control theory. Thus, in our study, DSP based ultra high speed general controller which may be exclusively used for power electronic applications is developed.

  • PDF

Blast Damage Assessment to a Modern Steel Structures

  • Mestreau Eric;Baum Joseph D.;Charman Chuck;Lee Seung;Sohn Young
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.292-295
    • /
    • 2006
  • The terrorist attack of September $11^{th}$ 2001 has enforced a new examination of the response of modern steel structures, such as those found in large warehouses, auditoriums and airport terminals, to terrorist bomb attack. The effort described in this paper assesses the potential damage to such a newly designed structure form a medium-size car bomb. The structure is mostly composed of a lightweight complex beam structure with large windows and skylights piercing through a corrugated roof. The structural response to the terrorist attack requires the modelling of various physics phenomena including bomb detonation, blast wave propagation, reflections, and refractions and resulting blast impact on the structure. Hence, a fluid/structure coupled methodology is used to perform the assessment.

  • PDF

Hybrid Indoor Position Estimation using K-NN and MinMax

  • Subhan, Fazli;Ahmed, Shakeel;Haider, Sajjad;Saleem, Sajid;Khan, Asfandyar;Ahmed, Salman;Numan, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4408-4428
    • /
    • 2019
  • Due to the rapid advancement in smart phones, numerous new specifications are developed for variety of applications ranging from health monitoring to navigations and tracking. The word indoor navigation means location identification, however, where GPS signals are not available, accurate indoor localization is a challenging task due to variation in the received signals which directly affect distance estimation process. This paper proposes a hybrid approach which integrates fingerprinting based K-Nearest Neighbors (K-NN) and lateration based MinMax position estimation technique. The novel idea behind this hybrid approach is to use Euclidian distance formulation for distance estimates instead of indoor radio channel modeling which is used to convert the received signal to distance estimates. Due to unpredictable behavior of the received signal, modeling indoor environment for distance estimates is a challenging task which ultimately results in distance estimation error and hence affects position estimation process. Our proposed idea is indoor position estimation technique using Bluetooth enabled smart phones which is independent of the radio channels. Experimental results conclude that, our proposed hybrid approach performs better in terms of mean error compared to Trilateration, MinMax, K-NN, and existing Hybrid approach.

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

A Study for Protecting the Virtual Memory of Applications (어플리케이션의 가상 메모리 보호를 위한 연구)

  • Kim, Dong-Ryul;Moon, Jong-sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.6
    • /
    • pp.335-341
    • /
    • 2016
  • As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.

A Verified Formal Specification of A Secured Communication Method For Smart Card Applications

  • Kim, Donald D.
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.172-187
    • /
    • 2021
  • In remote villages without access to modern IT technology, simple devices such as smartcards can be used to carry out business transactions. These devices typically store multiple business applications from multiple vendors. Although devices must prevent malicious or accidental security breaches among the applications, a secure communication channel between two applications from different vendors is often required. In this paper, first, we propose a method of establishing secure communication channels between applications in embedded operating systems that run on multi-applet smart cards. Second, we enforce the high assurance using an intransitive noninterference security policy. Thirdly, we formalize the method through the Z language and create the formal specification of the proposed secure system. Finally, we verify its correctness using Rushby's unwinding theorem.