• Title/Summary/Keyword: point supports

Search Result 367, Processing Time 0.029 seconds

Transoceanic Propagation of 2011 East Japan Earthquake Tsunami

  • Choi, Byung Ho;Kim, Kyeong Ok;Min, Byung Il;Pelinovsky, Efim
    • Ocean and Polar Research
    • /
    • v.36 no.3
    • /
    • pp.225-234
    • /
    • 2014
  • The 2011 Tohoku earthquake triggered extremely destructive tsunami waves which propagated over the Pacific Ocean, Atlantic Ocean through Drake Passage and Indian Ocean respectively. A total of 10 tide-gauge records collected from the UNESCO/IOC site were analyzed through a band-pass digital filtering device to examine the observed tsunami characteristics. The ray tracing method and finite-difference model with GEBCO 30 arc second bathymetry were also applied to compare the travel times of the Tohoku-originated tsunami, particularly at Rodrigues in the Indian Ocean and King Edward Point in the Atlantic Ocean with observation-based estimates. At both locations the finite-difference model produced the shortest arrival times, while the ray method produced the longest arrival times. Values of the travel time difference however appear to be within tolerable ranges, considering the propagation distance of the tsunami waves. The observed tsunami at Rodrigues, Mauritius in the west of the Madagascar was found to take a clockwise travel path around Australia and New Zealand, while the observed tsunami at King Edward Point in the southern Atlantic Ocean was found to traverse the Pacific Ocean and then passed into the Atlantic Ocean through the Drake Strait. The formation of icebergs captured by satellite images in Sulzberger in the Antarctica also supports the long-range propagation of the Tohoku-originated tsunami.

Correction of Hook Nail Deformity with Composite Graft (복합조직이식을 이용한 갈고리 손톱 변형 교정의 임상례)

  • Son, Dae Gu;Sohn, Hyung Bin;Kim, Hyun Ji
    • Archives of Plastic Surgery
    • /
    • v.34 no.3
    • /
    • pp.377-382
    • /
    • 2007
  • Purpose: Hook nail deformity is caused by inadequately supported nail bed due to loss of distal phalanx or lack of soft tissue, resulting in a claw-like nail form. A composite graft from the foot bencath the nail bed gives adequate restoration of tip pulp. Methods: From September of 1999 to March of 2004, six patients were treated for hook nail deformity and monitored for long term follow up. Donor sites were the lateral side of the big toe or instep area of the foot. We examined cosmetic appearance and nail hooking and sensory test. The curved nail was measured by the picture of before and after surgery. Results: In all cases, composite grafts were well taken, and hook nail deformities were corrected. The curved nail of the 4 patients after surgery were improved to average $28.7^{\circ}$ from average $55.2^{\circ}$ before surgery. The static two point discrimination average was 6.5mm and the moving two point discrimination average was 5.8mm in the sensory test. Conclusion: Composite graft taken from foot supports the nail bed with the tissue closely resembling the fingertip tissue, making it possible for anatomical and histological rebuilding of fingertip.

Hardware Design of Pipelined Special Function Arithmetic Unit for Mobile Graphics Application (모바일 그래픽 응용을 위한 파이프라인 구조 특수 목적 연산회로의 하드웨어 설계)

  • Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1891-1898
    • /
    • 2013
  • To efficiently execute 3D graphic APIs, such as OpenGL and Direct3D, special purpose arithmetic unit(SFU) which supports floating-point sine, cosine, reciprocal, inverse square root, base-two exponential, and logarithmic operations is designed. The SFU uses second order minimax approximation method and lookup table method to satisfy both error less than 2 ulp(unit in the last place) and high speed operation. The designed circuit has about 2.3-ns delay time under 65nm CMOS standard cell library and consists of about 23,300 gates. Due to its maximum performance of 400 MFLOPS and high accuracy, it can be efficiently applicable to mobile 3D graphics application.

Design of Floating-Point Multiplier for Mobile Graphics Application (모바일 그래픽스 응용을 위한 부동소수점 승산기의 설계)

  • Choi, Byeong-Yoon;Salcic, Zoran
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.547-554
    • /
    • 2008
  • In this paper, two-stage pipelined floating-point multiplier (FP-MUL) is designed. The FP-MUL processor supports single precision multiplication for 3D graphic APIs, such as OpenGL and Direct3D and has area-efficient and low-latency architecture via saturated arithmetic, area-efficient sticky-bit generator, and flagged prefix adder. The FP-MUL has about 4-ns delay time under $0.13{\mu}m$ CMOS standard cell library and consists of about 7,500 gates. Because its maximum performance is about 250 MFLOPS, it can be applicable to mobile 3D graphics application.

An image analysis system Design using Arduino sensor and feature point extraction algorithm to prevent intrusion

  • LIM, Myung-Jae;JUNG, Dong-Kun;KWON, Young-Man
    • Korean Journal of Artificial Intelligence
    • /
    • v.9 no.2
    • /
    • pp.23-28
    • /
    • 2021
  • In this paper, we studied a system that can efficiently build security management for single-person households using Arduino, ESP32-CAM and PIR sensors, and proposed an Android app with an internet connection. The ESP32-CAM is an Arduino compatible board that supports both Wi-Fi, Bluetooth, and cameras using an ESP32-based processor. The PCB on-board antenna may be used independently, and the sensitivity may be expanded by separately connecting the external antenna. This system has implemented an Arduino-based Unauthorized intrusion system that can significantly help prevent crimes in single-person households using the combination of PIR sensors, Arduino devices, and smartphones. unauthorized intrusion system, showing the connection between Arduino Uno and ESP32-CAM and with smartphone applications. Recently, if daily quarantine is underway around us and it is necessary to verify the identity of visitors, it is expected that it will help maintain a safety net if this system is applied for the purpose of facial recognition and restricting some access. This technology is widely used to verify that the characters in the two images entered into the system are the same or to determine who the characters in the images are most similar to among those previously stored in the internal database. There is an advantage that it may be implemented in a low-power, low-cost environment through image recognition, comparison, feature point extraction, and comparison.

Assessing the Differences in Korean View on National Economic Policy with Factor and Cluster Analysis

  • Kim, Hee-Jae;Yun, Young-Jun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.2
    • /
    • pp.451-461
    • /
    • 2008
  • In this study, factor and cluster analysis have been conducted to group the differences in Korean view on national economic policy in the sample of the 2006 Korean General Social Survey (KGSS). According to the 2006 KGSS, the 6 items with a 5-point Likert scale include the questions about whether or the extent to which each respondent supports the specific types of governmental economic policy. In our study, at first, the factor analysis has converted the original 6 items into the 3 composite variables that account for 81% in the total variability. As the second step of factor analysis, factor scores have been computed. Then, the K-means cluster analysis based on the factor scores has been conducted to group the survey respondents into the 3 clusters. In particular, the cross-tabulation analysis has shown that the distribution of the 3 clusters varies with the respondents' socio-demographic characteristics.

  • PDF

A Research on the Management Condition of Group Homes for the Elderly and Their Living Environment (고령자 그룹홈의 운영과 거주자의 생활 실태)

  • Kim Hyun-Jin;An Ok-Hee
    • Journal of the Korean housing association
    • /
    • v.17 no.4
    • /
    • pp.155-163
    • /
    • 2006
  • To investigate the actual management condition of group homes for the elderly and their living environment, four group homes and 26 elderly people living in the group home were surveyed. As the results, the relationships between the administrator and the elderly were acceptable, but the group homes seem suffer from insufficient administrative supports. The most required service in the group homes was a conversational partner service. Moreover, the most satisfactory point for the elderly living in group homes was the settlement of food, clothing, and housing. The unsatisfactory things were the service related to medical, leisure, and house work and an invasion of their private life. The resident elderly in group homes were fully satisfied with their living environment including the relationship with the manager and the people in the facility. They, however, do not have much chance to make an exchange with their neighbor. Overall, the elderly want to stay continuously in the group homes where they are living current.

Downlink-First Scheduling of Real-Time Voice Traffic in IEEE 802.11 Wireless LANs (무선랜 시스템에서의 하향 우선 실시간 음성 트래픽 스케줄링)

  • Jeong, Dong W.;Lee, Chae Y.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.29 no.2
    • /
    • pp.150-156
    • /
    • 2003
  • The IEEE 802.11 MAC (Media Access Control) Protocol supports two modes of operation, a random access mode for nonreal-time data applications processed by Distributed Coordinated Function (DCF), and a polling mode for real-time applications served by Point Coordinated Function (PCF). It is known that the standard IEEE 802.11 is insufficient to serve real-time traffic. To provide Quality of Service (QoS) of real-time traffic, we propose the Downlink-first scheduling with Earliest Due Date (EDD) in Contention Free Period (CFP) with suitable admission control. The capacity and deadline violation probability of the proposed system is analyzed and compared to the standard pair system of downlink and uplink. Analytical and simulation results show that the proposed scheme is remarkably efficient in view of the deadline violation probability.

A Framework for Supporting RFID-enabled Business Processes Automation

  • Moon, Mi-Kyeing
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.712-720
    • /
    • 2011
  • Radio frequency identification (RFID) is an established technology and has the potential, in a variety of applications, to significantly reduce cost and improve performance. As RFID-enabled applications will fulfill similar tasks across a range of processes adapted to use the data gained from RFID tags, they can be considered as software products derived from a common infrastructure and assets that capture specific ions in the domain. This paper discusses a framework that supports the development of RFID-enabled applications based on a business process family model (BPFM), explicitly representing both commonalities and variabilities. To develop this framework, common activities are identified from RFID-enabled applications and the variabilities in the common activities are analyzed in detail using variation point concepts. Through this framework, RFID data is preprocessed, and thus, RFID-enabled applications can be developed without having to process RFID data. Sharing a common model and reusing assets to deploy recurrent services may be considered an advantage in terms of economic significance and the overall product quality afforded.

A Study on the Design and Implementation of an Application Program Reuse System based on common language (범용언어에 의한 응용 프로그램 재사용 시스템의 설계 및 구현)

  • O, Mu-Song;Kim, Hyeong-Tae
    • Asia pacific journal of information systems
    • /
    • v.4 no.2
    • /
    • pp.83-130
    • /
    • 1994
  • Software development of large scale program such as Operating System or University Total Information System is lengthy and costly process. In order to reduce cost, time and risk, there is currentry general acceptance of the need for Software Reuse System during the whole development cycles. In this paper, (from a practical point of view), the problem of existing reuse system methodology is analyzed and an implement method of software reuse system is presented. Also using this method Application Program Reuse System(APRS) which supports all phase of software life cycles is designed and implemented. This application program reuse system which is based on common language is considerably shown to reduce communication Error of requirement specification between systems analyst and end-user.

  • PDF