• Title/Summary/Keyword: space-time domain

Search Result 479, Processing Time 0.025 seconds

3/4-rate SFBC SSB SC FDMA System with 4 Transmit Antennas (4개의 송신 안테나를 갖는 3/4 비율의 주파수 공간 블록 부호 단일 측대 파형 SC FDMA 시스템)

  • Won, HuiChul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.6
    • /
    • pp.1-9
    • /
    • 2021
  • In order to increase frequency transmission efficiency, single side band(SSB) transmission systems with the complex conjugate symmetry characteristics on a frequency domain have been studied. In addition, orthogonal block codes(space-time or space-frequency block code(SFBC)) for the diversity performance gain of transmission systems have been widely researched. In this paper, we implement a 3/4-rate SFBC SSB single-carrier(SC) frequency division multiple access(FDMA) system with 4 transmit antennas. It can be shown from the simulation results that the proposed SFBC SSB SC FDMA system using the 3/4-rate 4×4 orthogonal block code outperforms the conventional SSB SC FDMA system and the 2×2 SFBC SSB SC FDMA system with 2 transmit antennas.

The Crisis of Painting and Its Response (회화의 위기, 회화의 대안)

  • Bhak, Young-Taik
    • The Journal of Art Theory & Practice
    • /
    • no.2
    • /
    • pp.7-26
    • /
    • 2004
  • Since the 20th century, it was often announced that a painting was dead, but it is still alive. Even in the epoch of recently increasing virtuality, painting is still appealing, consistently pursed by many with a thirst. Thus, it is said that the mission of a picture is to maintain its reality without being trapped in virtuality. In the history of Western painting spanning over several hundreds of years the myriad of techniques and styles have emerged, going though a huge variety of changes: namely, its not possible any longer to find the new ways of expression in painting. Hence, painters today feel that it becomes more gradually difficult for them to execute something. In the midst of swiftly changing, diversely evolving trends of contemporary art, the painters incessantly pose a question why they go on working on painting, and seek to find its answer. Why the painters still try to say something about painting? Is that because they consider it the quintessence of fine arts or think that it is in no way possible or meaningful to comment on fine arts without relying on painting? If then, is there any avenue of escape for the painting? The question of the 'crisis of painting' is still raised, when reviewing the rapidly changing conditions of inventing artworks. That is also why the recent works failed to offer a conceptually unified, universally shared perspective of painting. Moreover, painting is left to shrink comparatively with the pervasive existence of videos and installations briskly employing digital images and technologies in their creations. Whats more problematic is the fact that there is a growing sense of crisis not only in the sphere of painting hut also in the entire realm of art. As the organizers and curators of big-scale exhibitions and art projects tend to exploit their space spectacularly, focusing primarily on their abilities to control the space, there is a pervasive notion amongst them that painting is a medium that is not properly to suit such purposes and requests. Today, the death of painting is, in fact, the death of modernist painting, which assumed a central role in the history of art for a considerable amount of time, rather than the death of painting itself. Employing a new paradigm of invention, a picture is now entering a new domain which is perhaps unknown to us. Moving beyond the stereotypical concepts of painting, physical property and flatness, pictures today reveal the introduction of time and space and the penetration of new media such as installation, photography, video and the Internet. Despite such trends, the dexterity and tactile capability of painters is still to be considered significant in the future. The renewal of painting is made in an entirely unexpected manner and place.

  • PDF

Application of non-destructive method for evaluation of soil nail length (쏘일네일의 길이평가를 위한 비파괴 기법의 적용)

  • Kim, Ki-Hong;Kim, Nag-Young;Lee, Jong-Sub;Yu, Jung-Doung
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.17 no.2
    • /
    • pp.75-90
    • /
    • 2015
  • As soil nails support a ground by the friction between nails and soils being reinforced, the length of soil nails is important factor for a ground stability. Thus, the soil nail length has to be accurately evaluated in order to secure a ground stability. The goal of this study is to suggest the applicability of the non-destructive method as the basic research for the evaluation of the soil nail length. First, the elastic and electromagnetic waves are adopted to select an applicable method for the soil nails connected by the coupler. Test results show that while the ultrasonic waves are not detected due to the coupler, the electromagnetic waves are free for the influence of the coupler. Second, electromagnetic waves are measured for combined soil nails with the length of 1 m~15 m for the investigation of the characteristics of electromagnetic waves. The travel time of the electromagnetic wave increases with an increase in the soil nail length. In addition, the ground cable is used to apply the electromagnetic waves to pre-installed soil nails. Test results show that the travel time of the electromagnetic wave by using the ground cable increases with an increase in soil nail length. This study demonstrates that the electromagnetic wave may be a promising method for the evaluation of the soil nail length.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on Electrode Array for Measurement of Induced Polarization of Rock Samples (암석 시료의 유도분극 측정을 위한 전극배열 비교)

  • Man-ho Han;Jung-hwan Lee;Keun-Soo Lee;Myeong-Jong Yi
    • Tunnel and Underground Space
    • /
    • v.33 no.6
    • /
    • pp.483-494
    • /
    • 2023
  • Measurement of the physical properties of rocks or minerals is an important factor in determining the distribution of the underground medium as well as mineral resource investigations. Resistivity and induced polarization, which are widely used in Korea, are methods for measuring electrical properties, which are representative properties of obtaining subsurface information. In order to precisely analyze the exploration data obtained from various sites, it is important to accurately measure the material properties. Electrical properties of rock is measured using two-electrode or four-electrode method. Compared to the four-electrode method, the two-electrode method is generally used because it is very easy to contact the sample and the electrode, but there is a problem in that the impedance of the electrode and the sample is measured together. In this study, the time-domain the induced polarization effects were measured using the 2-electrode method and the 4-electrode method for artificial samples mixed with graphite and cement having induced polarization characteristics, and the results were compared. Although the 4-electrode method has difficulties in installing potential electrodes, it was confirmed that it is effective in measuring electrical properties because it can reduce the problem caused by the impedance of potential electrodes compared to the 2-electrode method.

How does the General Public Understand Science and Technology Issues?: A Case on the Nuclear Power Issue Using Topic Modeling Approach (과학기술이슈에 대한 일반인의 인식분석: 토픽모델링을 활용한 원자력발전 사례)

  • Choi, Hyundo;Ahn, Jongwuk
    • Journal of Technology Innovation
    • /
    • v.23 no.4
    • /
    • pp.151-175
    • /
    • 2015
  • The general public is a key stakeholder in the science and technology domain. However, traditional approaches require substantial efforts and resources to analyze how does the general public understand science and technology issues. We applied the topic modeling, a form of text clustering, to the texts about the nuclear power which were posted on an online space in order to explore the general public's thoughts on the issue. This study investigates the extent to which macro-level events influence understandings of the general public on the science and technology issues and weather these changes in understandings are sustained over time. It examines the possibility of applying topic modeling in narrowing a perception gap between the general public and the experts through a near-real-time monitoring of the public interests and perceptions about the science and technology issues.

An Audit Model for Information Protection in Smartwork (스마트워크 기반의 정보보호 감리 모형)

  • Han, Ki-Joon;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.229-239
    • /
    • 2014
  • Smartwork technology, using teleworking, smartwork centers and mobile terminal, provides a flexible work environments without constraints of time and space. Smartwork system to increase the work efficiency has the information protection threats according to their convenience. Thus, in order to build smartwork, it is proper to provide information protection audit to help ensure the information protection. In this paper, we have proposed an infortaion protection audit model at the practical and technical level for building a smartwork environment. We were classified as a terminal, network and server area for information protection, and derived a professional information protection check items. Further, by establishing a smartwork information protection audit time to map ISMS control items, we have proposed an audit model so that it is possible to improve the security and efficiency. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check items correspond with the purpose of the smartwork information protection audit to auditors and IT specialists. As the result, this study was 97% satisfaction out of 13 check items.

Analysis of Output Irregularity from the Transient Behavior of Bundle in a Flow Field (유동계 내 집속체의 과도적 거동에 따른 출력 불균제 해석)

  • Huh Y.;Kim J.S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.965-968
    • /
    • 2005
  • Roll drafting operation causes variations in the linear density of bundles because the bundle flow cannot be controlled completely by roll pairs. Defects occurring in this operation bring about many problems successively in the next processes. In this paper, we attempt to analyze the draft dynamics and the linear density irregularity based on the governing equation of a bundle motion that has been suggested in our previous studies. For analyzing the dynamic characteristics of the roll drafting operation, it is indispensable to investigate a transient state in time domain before the bundle flux reaches a steady state. However, since governing equations of bundle flow consisting of continuity and motion equations turn out to be nonlinear, and coupled between variables, the solutions for a transient state cannot be obtained by an analytical method. Therefore, we use the Finite Difference Method(FDM), particularly, the FTBS(Forward-Time Backward-Space) difference method. Then, the total equations system yields to an algebraic equations system and is solved under given initial and boundary conditions in an iterative fashion. From the simulation results, we confirm that state variables show different behavior in the transient state; e.g., the velocity distribution in the flow field changes more quickly the linear density distribution. During a transient flow in a drafting zone, the output irregularity is influenced differently by the disturbances, e.g., the variation in input bundle thickness, the drafting speed, and the draft ratio.

  • PDF

An Improved Fractal Color Image Decoding Based on Data Dependence and Vector Distortion Measure (데이터 의존성과 벡터왜곡척도를 이용한 개선된 프랙탈 칼라영상 복호화)

  • 서호찬;정태일;류권열;권기룡;문광석
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.3
    • /
    • pp.289-296
    • /
    • 1999
  • In this paper, an improved fractal color image decoding method using the data dependence parts and the vector distortion measure is proposed. The vector distortion measure exploits the correlation between different color components. The pixel in RGB color space can be considered as a 30dimensional vector with elements of RGB components. The root mean square error(rms) in RGB color for similarity measure of two blocks R and R' was used. We assume that various parameter necessary in image decoding are stored in the transform table. If the parameter is referenced in decoding image, then decoding is performed by the recursive decoding method. If the parameter is not referenced in decoding image, then the parameters recognize as the data dependence parts and store its in the memory. Non-referenced parts can be decoded only one time, because its domain informations exist in the decoded parts by the recursive decoding method. Non-referenced parts are defined the data dependence parts. Image decoding method using data dependence classifies referenced parts and non-referenced parts using information of transform table. And the proposed method can be decoded only one time for R region decoding speed than Zhang & Po's method, since it is decreased the computational numbers by execution iterated contractive transformations for the referenced range only.

  • PDF

Suppression of aerodynamic response of suspension bridges during erection and after completion by using tuned mass dampers

  • Boonyapinyo, Virote;Aksorn, Adul;Lukkunaprasit, Panitan
    • Wind and Structures
    • /
    • v.10 no.1
    • /
    • pp.1-22
    • /
    • 2007
  • The suppression of aerodynamic response of long-span suspension bridges during erection and after completion by using single TMD and multi TMD is presented in this paper. An advanced finite-element-based aerodynamic model that can be used to analyze both flutter instability and buffeting response in the time domain is also proposed. The frequency-dependent flutter derivatives are transferred into a time-dependent rational function, through which the coupling effects of three-dimensional aerodynamic motions under gusty winds can be accurately considered. The modal damping of a structure-TMD system is analyzed by the state-space approach. The numerical examples are performed on the Akashi Kaikyo Bridge with a main span of 1990 m. The bridge is idealized by a three-dimensional finite-element model consisting of 681 nodes. The results show that when the wind velocity is low, about 20 m/s, the multi TMD type 1 (the vertical and horizontal TMD with 1% mass ratio in each direction together with the torsional TMD with ratio of 1% mass moment of inertia) can significantly reduce the buffeting response in vertical, horizontal and torsional directions by 8.6-13%. When the wind velocity increases to 40 m/s, the control efficiency of a multi TMD in reducing the torsional buffeting response increases greatly to 28%. However, its control efficiency in the vertical and horizontal directions reduces. The results also indicate that the critical wind velocity for flutter instability during erection is significantly lower than that of the completed bridge. By pylon-to-midspan configuration, the minimum critical wind velocity of 57.70 m/s occurs at stage of 85% deck completion.