• Title/Summary/Keyword: parallel system

Search Result 4,288, Processing Time 0.031 seconds

A Study on the Atomizing Mechanism for the Swirl Nozzle (와권(渦卷) 노즐의 무화기구(霧化機構)에 관(關)한 연구(硏究))

  • Lee, Sang Woo;Sakai, Jun;Ishihara, Akira
    • Korean Journal of Agricultural Science
    • /
    • v.14 no.1
    • /
    • pp.81-97
    • /
    • 1987
  • Two nozzles with different size (Figure 2) were particularly designed to supply air through the swirl core into the central part of the liquid stream in the same parallel direction to produce a well-mixed air and water in the whirl chamber as spray liquid in bubble formation. Atomization was attempted to improve by using both the preliminary break-up process with less viscosity and less surface tension in the whirl chamber and the effects of increased frequency of the band of drops with the raised ambient air density in front of the nozzle orifice. The volumetric ratio between spray liquid and air on four levels was used to investigate the effects of air as a component of the mixture on atomization. The results of the experiment were summarized as follows; Droplet size became progressively finer as the operating pressure was increased in the range of $0.70kg/cm^2$ to $6.33kg/cm^2$, which was similar to the previous works. The new atomizing mechanism so-called 'air-center nozzle' gave a narrower range in droplet size distribution with smaller volumetric median diameter (VMD) than that of the existing spray system at a given pressure, which showed the possibility of improvement of atomization in a certain limit. The volumetric median diameter produced by the new atomizing mechanism was decreased from the central region toward the exterior edges across the spray pattern.

  • PDF

Optical Design of an Integrated Two-Channel Optical Transmitter for an HDMI interface (광 HDMI 인터페이스용 2채널 광송신기 광학 설계)

  • Yoon, Hyun-Jae;Kang, Hyun-Seo
    • Korean Journal of Optics and Photonics
    • /
    • v.26 no.5
    • /
    • pp.269-274
    • /
    • 2015
  • In this paper we design the optical system for an integrated two-channel TO-type optical transmitter to apply the HDMI interface using the code V simulator. The proposed integrated two-channel optical transmitter has two VCSELs attached in parallel on an 8-pin TO-CAN package, on top of which is a lens filter block ($1mm{\times}2mm{\times}4mm$) composed of hemispherical lenses and WDM filters. Considering two-channel transmitters manufactured with wavelength combinations of 1060nm/1270nm and 1330nm/1550nm, we obtain the optimum value of the diameter of the hemispherical lens as 0.6 mm for both combinations, and the distances L between the lens filter block and ball lens as 1.7 mm and 2.0 mm for the 1060nm/1270nm and 1330nm/1550nm wavelength combinations, respectively. At this time, the focal length f0 of the lens filter blocks for wavelengths of 1060, 1270, 1330, and 1550 nm are 0.351, 0.354, 0.355, and 0.359 mm, respectively, and the focal lengths F of light passing through the lens filter block and ball lens are 0.62 mm for 1060nm/1270nm and 0.60-0.66 mm for 1330nm/1550nm wavelength combinations.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

An Application of Artificial Intelligence System for Accuracy Improvement in Classification of Remotely Sensed Images (원격탐사 영상의 분류정확도 향상을 위한 인공지능형 시스템의 적용)

  • 양인태;한성만;박재국
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.20 no.1
    • /
    • pp.21-31
    • /
    • 2002
  • This study applied each Neural Networks theory and Fuzzy Set theory to improve accuracy in remotely sensed images. Remotely sensed data have been used to map land cover. The accuracy is dependent on a range of factors related to the data set and methods used. Thus, the accuracy of maps derived from conventional supervised image classification techniques is a function of factors related to the training, allocation, and testing stages of the classification. Conventional image classification techniques assume that all the pixels within the image are pure. That is, that they represent an area of homogeneous cover of a single land-cover class. But, this assumption is often untenable with pixels of mixed land-cover composition abundant in an image. Mixed pixels are a major problem in land-cover mapping applications. For each pixel, the strengths of class membership derived in the classification may be related to its land-cover composition. Fuzzy classification techniques are the concept of a pixel having a degree of membership to all classes is fundamental to fuzzy-sets-based techniques. A major problem with the fuzzy-sets and probabilistic methods is that they are slow and computational demanding. For analyzing large data sets and rapid processing, alterative techniques are required. One particularly attractive approach is the use of artificial neural networks. These are non-parametric techniques which have been shown to generally be capable of classifying data as or more accurately than conventional classifiers. An artificial neural networks, once trained, may classify data extremely rapidly as the classification process may be reduced to the solution of a large number of extremely simple calculations which may be performed in parallel.

90/150 RCA Corresponding to Maximum Weight Polynomial with degree 2n (2n 차 최대무게 다항식에 대응하는 90/150 RCA)

  • Choi, Un-Sook;Cho, Sung-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.819-826
    • /
    • 2018
  • The generalized Hamming weight is one of the important parameters of the linear code. It determines the performance of the code when the linear codes are applied to a cryptographic system. In addition, when the block code is decoded by soft decision using the lattice diagram, it becomes a measure for evaluating the state complexity required for the implementation. In particular, a bit-parallel multiplier on finite fields based on trinomials have been studied. Cellular automata(CA) has superior randomness over LFSR due to its ability to update its state simultaneously by local interaction. In this paper, we deal with the efficient synthesis of the pseudo random number generator, which is one of the important factors in the design of effective cryptosystem. We analyze the property of the characteristic polynomial of the simple 90/150 transition rule block, and propose a synthesis algorithm of the reversible 90/150 CA corresponding to the trinomials $x^2^n+x^{2^n-1}+1$($n{\geq}2$) and the 90/150 reversible CA(RCA) corresponding to the maximum weight polynomial with $2^n$ degree by using this rule block.

Call-Site Tracing-based Shared Memory Allocator for False Sharing Reduction in DSM Systems (분산 공유 메모리 시스템에서 거짓 공유를 줄이는 호출지 추적 기반 공유 메모리 할당 기법)

  • Lee, Jong-Woo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.349-358
    • /
    • 2005
  • False sharing is a result of co-location of unrelated data in the same unit of memory coherency, and is one source of unnecessary overhead being of no help to keep the memory coherency in multiprocessor systems. Moreover. the damage caused by false sharing becomes large in proportion to the granularity of memory coherency. To reduce false sharing in a page-based DSM system, it is necessary to allocate unrelated data objects that have different access patterns into the separate shared pages. In this paper we propose call-site tracing-based shared memory allocator. shortly CSTallocator. CSTallocator expects that the data objects requested from the different call-sites may have different access patterns in the future. So CSTailocator places each data object requested from the different call-sites into the separate shared pages, and consequently data objects that have the same call-site are likely to get together into the same shared pages. We use execution-driven simulation of real parallel applications to evaluate the effectiveness of our CSTallocator. Our observations show that by using CSTallocator a considerable amount of false sharing misses can be additionally reduced in comparison with the existing techniques.

Analysis of Factors for Korean Women's Cancer Screening through Hadoop-Based Public Medical Information Big Data Analysis (Hadoop기반의 공개의료정보 빅 데이터 분석을 통한 한국여성암 검진 요인분석 서비스)

  • Park, Min-hee;Cho, Young-bok;Kim, So Young;Park, Jong-bae;Park, Jong-hyock
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1277-1286
    • /
    • 2018
  • In this paper, we provide flexible scalability of computing resources in cloud environment and Apache Hadoop based cloud environment for analysis of public medical information big data. In fact, it includes the ability to quickly and flexibly extend storage, memory, and other resources in a situation where log data accumulates or grows over time. In addition, when real-time analysis of accumulated unstructured log data is required, the system adopts Hadoop-based analysis module to overcome the processing limit of existing analysis tools. Therefore, it provides a function to perform parallel distributed processing of a large amount of log data quickly and reliably. Perform frequency analysis and chi-square test for big data analysis. In addition, multivariate logistic regression analysis of significance level 0.05 and multivariate logistic regression analysis of meaningful variables (p<0.05) were performed. Multivariate logistic regression analysis was performed for each model 3.

Groundwater Flow Modeling in a Riverbank Filtration Area, Deasan-Myeon, Changwon City (창원시 대산면 강변여과수 취수부지 주변의 지하수 유동 모델링)

  • Hamm, Se-Yeong;Cheong, Jae-Yeol;Kim, Hyoung-Su;Hahn, Jeong-Sang;Cha, Yong-Hoon
    • Economic and Environmental Geology
    • /
    • v.38 no.1
    • /
    • pp.67-78
    • /
    • 2005
  • Riverbank filtration has been used in advanced countries for 150 years. In Korea, investigations for producing riverbank filtrate started in the Han River, Nakdong River, Geum River, Yeongsan River and Seomjin River basins in the 1990s. The lower part of the Nakdong River has a poorer water quality than the upper part of the river. A water balance analysis and groundwater flow modeling were conducted for the riverbanks of the Nakdong River in Daesan-Myeon, Changwon City. The results of the water balance analysis revealed the groundwater infiltration rate into the aquifer to be 245.26 mm/year (19.68% of the average annual precipitation, 1,251.32 mm). Direct runoff accounts for 153.49 mm/year, evapotranspiration is 723.95 mm/year and baseflow is 127.63 mm/year. According to the groundwater flow modeling, 65% of the total inflow to the pumping wells originates from the Nakdong River, 13% originates from the aquifer in the rectilinear direction, and 22% originates from the aquifer in the parallel direction. The particle tracking model shows that a particle moving from the river toward the pumping wells travels 100 m in 50 days and a particle from the aquifer toward the pumping wells travels 100 m in 100 days.

Korean Characteristics of OkJoongHwa and J. S. Gale's Translation Practices in "Choon Yang" (『옥중화(獄中花)』의 한국적 고유성과 게일의 번역 실천 - J. S. Gale, "Choon Yang"(The Korea Magazine 1917.9~1918.8)의 번역용례를 중심으로)

  • Lee, Sang Hyun;Lee, Jin Sook
    • Cross-Cultural Studies
    • /
    • v.38
    • /
    • pp.145-190
    • /
    • 2015
  • The objective of this paper is to investigate translated individual words in J. S. Gale's "Choon Yang" in comparison with its original OkJoongHwa("獄中花") while referring to early modern bilingual dictionaries and missionaries' ethnography. Gale faced a lot of translation difficulties because the source text had a very different cultural system from the object text. OkJoongHwa was a Korean pansori novel which meant it included many Korean characteristics. However, Gale considered its Korean characteristics were deeply connected with Chinese classics. Even famous people and place names cited from the Chinese classics in OkJoongHwa represented the Korean thinking. Gale tried to faithfully translate the source text as much as possible whether the words were Chinese or Korean. In this paper, we deal with mostly various translation aspects of the Chinese-letter words in OkJoongHwa. Gale's first method to translate words made of Chinese Character is transliteration, the examples of which are the name of Chinese famous people and places, and Chinese poems. The second method is to parallel transliteration and English interpretation equivalent to the Chinese Character. The examples are the names of main characters like "Spring Fragrance or Choonyang," "Mongyong, or Dream-Dragon" and in his translation of word play in Osa (Commissioner), or Kamsa (Governor), kaiksa (a dead beggar). The third is literal translation of Chinese idiomatic phrases as Gale translated 侵魚落雁 into "She'd make the fishes to sink and the wild-geese to drop from the sky." The fourth is a little free translation of the title of public office, the various names of Korean yamen servants and the unique Korean clothing and ornaments. We expect Gale's many translation difficulties as we can see the translated long list of yamen clerks and Korean clothing and ornaments. After our investigation of his translation practices in "Choon Yang" we conclude that he tried to translate its literary language very faithfully though he could not avoid inevitable loss caused by the cultural difference involved in two languages. Gale's "Choon Yang" contributed to introducing the uniqueness of the classical Korean novel and Korean culture to the world more than any other English translation works of that time through his faithful translation.

Improvement of legal systems of automobile in the era of the 4th industrial revolution (4차 산업혁명 시대의 자동차 관련 법제의 합리적 개선방안)

  • Park, Jong-Su
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.269-310
    • /
    • 2017
  • This article aims at the study on Improvement of legal System which is related to automated vehicles in the era of the 4th industrial revolution. Legal aspects of driving automation have two view points. One is to permit a automated vehicle, the other is to regulate the behavior of driver on the road. Signifying elements of the 4th industrial revolution are IoT, AI, big data, cloud computing etc. Automated vehicles are the imbodiment of those new ICT technologies. The vehicle management act(VMA) rules about vehicle registration and approval of vehicle types. VMA defines a automated vehicle as a vehicle which can be self driven without handling of driver or passenger. Vehicle makers can take temporary driving permission for testing and research the driving automation. Current definition of automated vehicle of VMA is not enough for including all levels of SAE driving automation. In the VMA must be made also a new vehicle safty standard for automated vehicle. In the national assembly is curruntly pending three draft bills about legislation of artificial intelligence. Driving automation and AI technologies must be parallel developed. It is highly expected that more proceeding research of driving automation can be realized as soon as possible.