• 제목/요약/키워드: tent

검색결과 148건 처리시간 0.024초

2중 Tent 사상의 분기트리를 이용한 카오스 랜덤 수 발생기 (A Chaos Random Number Generator based on the Bifurcation Tree of Double Tent Mapping)

  • 김종남;김준형;정영국;임영철
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 춘계학술대회 논문집 전기기기 및 에너지변환시스템부문
    • /
    • pp.203-206
    • /
    • 2005
  • 본 연구에서는 카오스 2중 Tent 사상에 의한 랜덤 주파수 캐리어 발생기를 제안하고 있다. 제안된 방법은 2중 텐트사상의 분기트리(Bifurcation Tree)에서 카오스 발생 영역인 $\lambda$=0.99을 이용하여 랜덤 수글 발생시키고 있다. 제안된 방법과 종전의 LCG(Linear Congruential Generator)에 의한 방법의 고조파 스펙트럼을 실험에 의하여 비교 검토하였다.

  • PDF

한국 전통치마의 착용 실루엣 연구 (A Study on Silhouette of Korean Traditional Skirt, CHIMA)

  • 이수현;조우현
    • 한국의상디자인학회지
    • /
    • 제6권1호
    • /
    • pp.73-87
    • /
    • 2004
  • In the designing stage, the HANBOK CHIMA is created using a flat pattern with linear shapes. However, when worn, the skirt creates a fluid and organic silhouette. According to the wearing method(wrapping), HANBOK CHIMA can create various shapes and movements. In comparison to the general skirt, It is more effective in revealing the wearer's sense of beauty. The method of wrapping the skirt from the rear is a suitable way of wearing the garment in accord with the Korean ON-DOL(온돌) culture and it creates mystique eroticism. We can devide the silhouettes according to six different period of time. The silhouette of HANBOK CHIMA is affected by the following elements: length, width, pleats, textures and the usage of underwear. [1. Koguryo (5C∼6C) - The first Tent silhouette. 2. The South Dynasty Silla (7C∼8C) - The second Tent silhouette. 3. Kyoryo dynasty (l4C) - Cylinder silhouette. 4. The first Chosun dynasty (late 14C∼17C) - Bell silhouette and Cylinder silhouette. 5. The second Chosun dynasty (mid 18C∼mid 19C) - Bell silhouette and Barrel silhouette. 6. The third Chosun dynasty (late 19C∼the beginning of 20C) - Tent, Cylinder and Bell silhouette.]

  • PDF

Surgically assisted rapid palatal expansion with tent screws and a custom-made palatal expander: a case report

  • Park, Kang-Nam;Lee, Chang Youn;Park, In Young;Kim, Jwa Young;Yang, Byoungeun
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • 제37권
    • /
    • pp.11.1-11.5
    • /
    • 2015
  • Rapid palatal expansion(RPE) with the tooth-born appliance is not sufficient to apply to the patients with periodontal problem or insufficient tooth anchorage, and it leads to tipping of the anchorage teeth and increasing teeth mobility and root resorption. To avoid these disadvantages, we present the case using palatal screws and custommade palatal expander. A 23-year-old patient underwent surgically assisted rapid maxillary expansion with the Hyrax expansion using 4 tent screws. The study models were used to measure the pre-/-post surgical width of the anterior and posterior dental arches with a digital sliding caliper. In the result, the custom-made palatal expander with 4 tent screws is suitable for delivering a force to the mid-palatal suture expansion. And it is low cost, small sized and simply applied. The results indicated that maxillary expansion with the custom-made palatal anchorage device is predictable and stable technique without significant complications in patients.

과산화수소증기 시스템을 이용한 야전용 천막 내 Geobacillus stearothermophilus 아포 제독 (Decontamination of Interior of Field Tent Employed Geobacillus stearothermophilus Spores using a Hydrogen Peroxide Vapor System)

  • 윤성녀;김윤기;정정훈;유현상;민경률;김민철;김세계;류삼곤
    • 한국군사과학기술학회지
    • /
    • 제19권5호
    • /
    • pp.669-674
    • /
    • 2016
  • The purpose of this study is to demonstrate the suitability of hydrogen peroxide($H_2O_2$) vapor system for platform interior decontamination. Geobacillus stearothermophilus biological indicator(BI) strips and a field tent were used as a biological simulant and as a simulated platform, respectively. Decontamination was performed based on injection rates and tent sizes with exposure time 60 minutes. We standardized the conditions for the field tent decontamination : 8.0 g/min for $30m^3$($H_2O_2$ vapor concentration of 150~500 ppm, relative humidity of 50 %) and 12.0 g/min for $60m^3$($H_2O_2$ vapor concentration of 250~400 ppm, relative humidity of 55 %). Thus we suggest the system is one of the possible candidates for decontamination of platform interiors.

전동기의 소음 저감을 위한 카오스 2중 텐트 사상 PWM기법 (Chaotic Double Tent Mapping PWM Scheme for Acoustic Noise Reduction of o Motor Drive))

  • 김준형;정영국;임영철
    • 조명전기설비학회논문지
    • /
    • 제22권12호
    • /
    • pp.71-78
    • /
    • 2008
  • 본 연구에서는 전동기 소음 저감을 위한 카오스 2중 텐트 사상(double tent mapping) PWM 기법에 대하여 고찰하였다. 카오스 수 발생은 2중 텐트 사상의 카오스 발생 영역인 ${\lambda}=0.99$에서의 분기 트리(bifurcation tree)를 사용하였다. 카오스 수 발생은 80C196 마이크로 콘트롤러가 담당하고 있으며, 80C196으로부터 발생된 카오스 수와 MAX038 주파수 변조기를 이용하여 카오스 특성을 갖는 삼각파 캐리어가 발생한다. 2.5[A] 부하조건에 대한 1.5[kw]급 유도 전동기 구동 시스템에 제안된 방법과 종전의 고정 주파수 방법을 적용하였으며 각각의 방법에 대하여 캐리어 및 전동기 전압 그리고 3차원 스위칭 소음의 고조파 스펙트럼을 비교 검토하였다. 그 결과 제안된 방법의 고조파 스펙트럼은 특정 주파수에 집중되지 않는 카오스 분포를 하였으며, 이로 인하여 전동기에서 발생하는 날카로운 스위칭 소음이 저감됨을 알 수 있었다.

Structural Behaviors for Pressurized Fabric Leaning Arches

  • Kim, Jae Yeol
    • Architectural research
    • /
    • 제3권1호
    • /
    • pp.45-52
    • /
    • 2001
  • In this paper, a pressurized single vertical arch and a pressurized leaning arch composed of flexible fabric material are considered. These arches have also been considered as a possible support structure for the tent-like structures. Two different boundary conditions are considered in leaning arches with fixed bases and pinned bases. The behaviors of the leaning arches are investigated for two tilt angles as 15, 30. For each angle, two loading conditions are considered as uniformly distributed load and wind loads. The F.E.M. is used through the all analysis procedures. For the results, load-deflection relationships, buckling modes, differences between two boundary conditions and deformed configurations are discussed.

  • PDF

비선형 Tent-Map을 이용한 RFID 인증 프로토콜 설계 (Design of an RFID Authentication Protocol Using Nonlinear Tent-Map)

  • 한규광;임거수
    • 한국전자통신학회논문지
    • /
    • 제9권10호
    • /
    • pp.1145-1152
    • /
    • 2014
  • RFID(Radio-Frequency IDentification)시스템은 무선으로 사물을 식별하는 기술로 물류, 운송, 유통, 재고관리 등과 같은 물품관리를 획기적으로 개선할 수 있는 새로운 방법이다. 그러나 무선을 사용하고 있는 RFID는 통신구간에 대한 보안의 취약성 때문에 정보 누출 및 변조 같은 위험성을 가지고 있다. 우리는 이런 RFID 통신 시스템에 복잡계의 대표적인 계인 Tent-Map을 적용하여 새로운 인증 프로토콜을 설계하였다. 복잡계의 대표적인 특징인 초기치 민감성과 불규칙성을 RFID의 Reader 와 Tag에 적용하여 보다 견고하고 간략한 인증시스템을 설계하였다. 본 논문에서 보인 복잡계를 이용한 RFID 인증 프로토콜 설계는 기존의 Hash 함수나 난수에 의존되었던 인증 시스템에 차별화된 새로운 방법으로 그 활용성을 검증하는데 그 목적이 있다.

An Efficient Image Encryption Scheme Based on Quintuple Encryption Using Gumowski-Mira and Tent Maps

  • Hanchinamani, Gururaj;Kulkarni, Linganagouda
    • International Journal of Contents
    • /
    • 제11권4호
    • /
    • pp.56-69
    • /
    • 2015
  • This paper proposes an efficient image encryption scheme based on quintuple encryption using two chaotic maps. The encryption process is realized with quintuple encryption by calling the encrypt(E) and decrypt(D) functions five times with five different keys in the form EDEEE. The decryption process is accomplished in the reverse direction by invoking the encrypt and decrypt functions in the form DDDED. The keys for the quintuple encryption/decryption processes are generated by using a Tent map. The chaotic values for the encrypt/decrypt operations are generated by using a Gumowski-Mira map. The encrypt function E is composed of three stages: permutation, pixel value rotation and diffusion. The permutation stage scrambles all the rows and columns to chaotically generated positions. This stage reduces the correlation radically among the neighboring pixels. The pixel value rotation stage circularly rotates all the pixels either left or right, and the amount of rotation is based on chaotic values. The last stage performs the diffusion four times by scanning the image in four different directions: Horizontally, Vertically, Principal diagonally and Secondary diagonally. Each of the four diffusion steps performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. This stage ensures the resistance against the differential attacks. The security and performance of the proposed method is investigated thoroughly by using key space, statistical, differential, entropy and performance analysis. The experimental results confirm that the proposed scheme is computationally fast with security intact.