• Title/Summary/Keyword: topological information

Search Result 404, Processing Time 0.028 seconds

A Study on the Geometrical Figure in Contemporary Fashion - In the Case of Round(${\bigcirc}$), Square(${\square}$) and Triangle(${\triangle}$) - (현대 패션에 나타난 기하도형의 표현 연구 - 원(${\bigcirc}$).방(${\square}$).각(${\triangle}$)을 중심으로 -)

  • Kwen, Jin;Kang, Sook-Nyeo
    • Journal of the Korean Society of Costume
    • /
    • v.61 no.8
    • /
    • pp.85-99
    • /
    • 2011
  • Geometrical figures have been used as artwork motifs from the ancient times to the present day. The area of fashion, being a part of modern art, is also largely influenced by geometry and geometrical shapes are being used as a motif for fashion design now more than ever before. However, studies about geometry in the fashion field are not yet done enough and further research is necessary. This research will therefore investigate the usages of round, square and triangular design in contemporary fashion. The main scope of this research is to look at the type of expression and analyze the intrinsic meanings of these shapes in modern fashion. This research will look profoundly into the general characteristics of these geometrical figures and analyze the effects and uniqueness found in the world collection introduced since 2007. As a result from this study, it was found that round and square objects were perceived in such a straightforward and positive way and these designs, when worn, really completed the final look. On the other hand, the triangular design was used mainly for spatial expansion and was interpreted in a more metaphorical, indirect and abstract way. The intrinsic meaning of round, square and triangle figures in contemporary fashion consists of the informal features that really steps out of the formative clothing structure. The topological changes that is formed from the interactive functions and the wholism that creates a new system through integration of the human body and clothing contains the intrinsic meaning of these geometrical figures. Based on the research results, the method of expression and the characteristics of modern day fashion's geometrical figures was able to be easily understood. This work provides the useful information on the development of fashion design and the extended interpretation of clothing structure.

Key Point Extraction from LiDAR Data for 3D Modeling (3차원 모델링을 위한 라이다 데이터로부터 특징점 추출 방법)

  • Lee, Dae Geon;Lee, Dong-Cheon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.34 no.5
    • /
    • pp.479-493
    • /
    • 2016
  • LiDAR(Light Detection and Ranging) data acquired from ALS(Airborne Laser Scanner) has been intensively utilized to reconstruct object models. Especially, researches for 3D modeling from LiDAR data have been performed to establish high quality spatial information such as precise 3D city models and true orthoimages efficiently. To reconstruct object models from irregularly distributed LiDAR point clouds, sensor calibration, noise removal, filtering to separate objects from ground surfaces are required as pre-processing. Classification and segmentation based on geometric homogeneity of the features, grouping and representation of the segmented surfaces, topological analysis of the surface patches for modeling, and accuracy assessment are accompanied by modeling procedure. While many modeling methods are based on the segmentation process, this paper proposed to extract key points directly for building modeling without segmentation. The method was applied to simulated and real data sets with various roof shapes. The results demonstrate feasibility of the proposed method through the accuracy analysis.

The Case Study : The Efficiency of Using UAV and 3D-model for Mine Reclamation Work Monitoring (무인항공기와 3차원 지표모델의 광해방지사업 모니터링에 대한 효율성 고찰)

  • Kim, Seyoung;Yu, Jaehyung;Shin, Ji Hye;Lee, Gilljae
    • Journal of the Mineralogical Society of Korea
    • /
    • v.30 no.1
    • /
    • pp.1-9
    • /
    • 2017
  • This study investigated the effectiveness of Unmanned Aerial Vehicle (UAV) and 3D modeling on mine reclamation monitoring. The high spatial resolution of 3.8 cm ortho-mosaic image and Digital Elevation Model (DEM) are constructed based on UAV air survey. The ortho-mosaic image effectively shows mine reclamation activities and recognize objects and topological changes in the image. The comparative analysis of 3D models between UAV based DEM and report based DEM reveals that total amount of $268,672m^3$ additional dumping of contaminated soil is equivalent to 710,000 ton. It concludes that a UAV based survey enables high accuracy spatial information extraction for mine reclamation activities with high efficiency. It is expected that UAV survey will be very effectively used for preliminary data acquisition and project monitoring for mine reclamation activities.

Workflow Pattern Extraction based on ACTA Formalism (ACTA 형식론에 기반한 워크플로우 패턴추출)

  • Lee Wookey;Bae Joonsoo;Jung Jae-yoon
    • Journal of KIISE:Databases
    • /
    • v.32 no.6
    • /
    • pp.603-615
    • /
    • 2005
  • As recent business environments are changed and become complex, a more efficient and effective business process management are needed. This paper proposes a new approach to the automatic execution of business processes using Event-Condition-Action (ECA) rules that can be automatically triggered by an active database. First of all, we propose the concept of blocks that can classify process flows into several patterns. A block is a minimal unit that can specify the behaviors represented in a process model. An algorithm is developed to detect blocks from a process definition network and transform it into a hierarchical tree model. The behaviors in each block type are modeled using ACTA formalism. This provides a theoretical basis from which ECA rules are identified. The proposed ECA rule-based approach shows that it is possible to execute the workflow using the active capability of database without users' intervention.

A Connection Management Protocol for Stateful Inspection Firewalls in Multi-Homed Networks

  • Kim, Jin-Ho;Lee, Hee-Jo;Bahk, Sae-Woong
    • Journal of Communications and Networks
    • /
    • v.10 no.4
    • /
    • pp.455-464
    • /
    • 2008
  • To provide network services consistently under various network failures, enterprise networks increasingly utilize path diversity through multi-homing. As a result, multi-homed non-transit autonomous systems become to surpass single-homed networks in number. In this paper, we address an inevitable problem that occurs when networks with multiple entry points deploy firewalls in their borders. The majority of today's firewalls use stateful inspection that exploits connection state for fine-grained control. However, stateful inspection has a topological restriction such that outgoing and incoming traffic of a connection should pass through a single firewall to execute desired packet filtering operation. Multi-homed networking environments suffer from this restriction and BGP policies provide only coarse control over communication paths. Due to these features and the characteristics of datagram routing, there exists a real possibility of asymmetric routing. This mismatch between the exit and entry firewalls for a connection causes connection establishment failures. In this paper, we formulate this phenomenon into a state-sharing problem among multiple fire walls under asymmetric routing condition. To solve this problem, we propose a stateful inspection protocol that requires very low processing and messaging overhead. Our protocol consists of the following two phases: 1) Generation of a TCP SYN cookie marked with the firewall identification number upon a SYN packet arrival, and 2) state sharing triggered by a SYN/ACK packet arrival in the absence of the trail of its initial SYN packet. We demonstrate that our protocol is scalable, robust, and simple enough to be deployed for high speed networks. It also transparently works under any client-server configurations. Last but not least, we present experimental results through a prototype implementation.

Isolation of MLL1 Inhibitory RNA Aptamers

  • Ul-Haq, Asad;Jin, Ming Li;Jeong, Kwang Won;Kim, Hwan-Mook;Chun, Kwang-Hoon
    • Biomolecules & Therapeutics
    • /
    • v.27 no.2
    • /
    • pp.201-209
    • /
    • 2019
  • Mixed lineage leukemia proteins (MLL) are the key histone lysine methyltransferases that regulate expression of diverse genes. Aberrant activation of MLL promotes leukemia as well as solid tumors in humans, highlighting the urgent need for the development of an MLL inhibitor. We screened and isolated MLL1-binding ssRNAs using SELEX (${\underline{S}}ystemic$ ${\underline{E}}volution$ of ${\underline{L}}igands$ by ${\underline{E}}xponential$ enrichment) technology. When sequences in sub-libraries were obtained using next-generation sequencing (NGS), the most enriched aptamers-APT1 and APT2-represented about 30% and 26% of sub-library populations, respectively. Motif analysis of the top 50 sequences provided a highly conserved sequence: 5'-A[A/C][C/G][G/U][U/A]ACAGAGGG[U/A]GG[A/C] GAGUGGGU-3'. APT1, APT2, and APT5 embracing this motif generated secondary structures with similar topological characteristics. We found that APT1 and APT2 have a good binding activity and the analysis using mutated aptamer variants showed that the site information in the central region was critical for binding. In vitro enzyme activity assay showed that APT1 and APT2 had MLL1 inhibitory activity. Three-dimensional structure prediction of APT1-MLL1 complex indicates multiple weak interactions formed between MLL1 SET domain and APT1. Our study confirmed that NGS-assisted SELEX is an efficient tool for aptamer screening and that aptamers could be useful in diagnosis and treatment of MLL1-mediated diseases.

An Efficient Flooding Algorithm for Position-based Wireless Ad hoc Networks (위치 기반 무선 애드 혹 네트워크에서의 효율적인 플러딩 기법)

  • JaeGal, Chan;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.17-28
    • /
    • 2008
  • Rapid transmission of packets is important in mobile ad hoc networks. Therefore, a flooding algorithm which can guarantee a short delay is useful in various ways of packet transmission. Flooding algorithm is one of the packet transmission methods that broadcasts a packet to all nodes within a transmission range. It does not rebroadcast the same packet which is already received from other nodes. Basically, flooding algorithm's advantages are that it simply writes an address and a sequence number in a packet, and it can be adapted for topological changes easily. However, the basic flooding algorithm has a shortcoming that causes excessive traffic because all nodes transmit a packet at least once. To solve this problem, research about flooding algorithms that constrains duplicated transmission of packets based on probabilistic and geographical information is going on. However, the existing algorithm cannot guarantee short delay and low traffic. To reduce a delay, in this paper we propose a flooding scheme where a node which receives a broadcasted packet chooses and allocates a priority to one of its neighbor nodes and then the node transmits the packet promptly to the node to whom the priority was given. Moreover, we propose a totally fresh a roach to constrain duplicated transmission by searching a node that already received the same packet by using node's geographical position information. Lastly, we compare the performance of the proposed algorithm with the existing algorithm through simulation. The results show that the proposed algorithm can distribute packets through a lower number of total packet transmissions and faster delivery time than the existing algorithm.

Design and Implementation of Query Processor for Moving Objects (이동객체를 위한 질의처리 컴포넌트의 설계 및 구현)

  • Kim, Kyoung-Sook;Kwon, O-Je;Byun, Hee-Young;Jo, Dae-Soo;Kim, Tae-Wan;Li, Ki-Joune
    • Journal of Korea Spatial Information System Society
    • /
    • v.6 no.1 s.11
    • /
    • pp.31-50
    • /
    • 2004
  • With the growth of wireless communication networks and mobile devices taking in GPS, Location-Based Service(LBS) is becoming an integral part of mobile applications. LBS can deal with location-aware features such as persons holding mobile phones or vehicles equipped with GPS, and provide the users with the location information of the features. Thus it is necessary to develop moving object database systems to store, manage, and query moving objects which change their locations continuously as time passes. In this paper, we design and implement a query processing component which deals with moving objects as a key data type. For this component, we define a new SQL-like query language(called MOQL) and as a consequence, design and implement modules that analyze and execute queries. It supports various types of operators that process range queries, infer topological relations, compute trajectories, and find k-nearest neighbors. It can be used as a subsystem if other application systems which deal moving objects and also supports ADO.NET interface that can be used to interact end-users.

  • PDF

An Energy Estimation-based Routing Protocol for Maximizing Network Lifetime in Wireless Sensor Networks (무선 센서네트워크에서 네트워크 수명을 최대화하기 위한 에너지 추정 기반의 라우팅 프로토콜)

  • Hong, Ran-Kyung;Kweon, Ki-Suk;Ghim, Ho-Jin;Yoon, Hyun-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.281-285
    • /
    • 2008
  • Wireless sensor networks are closely related with the geometric environment in which they are deployed. We consider the probable case when a routing protocol runs on an environment with many complex obstacles like downtown surroundings. In addition, there are no unrealistic assumptions in order to increase practicality of the protocol. Our goal is to find a routing protocol for maximizing network lifetime by using only connectivity information in the complex sensor network environment. We propose a topology-based routing algorithm that accomplishes good performance in terms of network lifetime and routing complexity as measures. Our routing algorithm makes routing decision based on a weighted graph as topological abstraction of the complex network. The graph conduces to lifetime enhancement by giving alternative paths, distributing the skewed burden. An energy estimation method is used so as to maintain routing information without any additional cost. We show how our approach can be used to maximize network lifetime and by extensive simulation we prove that out approach gives good results in terms of both measures-network lifetime and routing complexity.

3D GIS Network Modeling of Indoor Building Space Using CAD Plans (CAD 도면을 이용한 건축물 내부 공간의 3차원 GIS 네트워크 모델링)

  • Kang Jung A;Yom Jee-Hong;Lee Dong-Cheon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.23 no.4
    • /
    • pp.375-384
    • /
    • 2005
  • Three dimensional urban models are being increasingly applied for various purposes such as city planning, telecommunication cell planning, traffic analysis, environmental monitoring and disaster management. In recent years, technologies from CAD and GIS are being merged to find optimal solutions in three dimensional modeling of urban buildings. These solutions include modeling of the interior building space as well as its exterior shape visualization. Research and development effort in this area has been performed by scientists and engineers from Computer Graphics, CAD and GIS. Computer Graphics and CAD focussed on precise and efficient visualization, where as GIS emphasized on topology and spatial analysis. Complementary research effort is required for an effective model to serve both visualization and spatial analysis purposes. This study presents an efficient way of using the CAD plans included in the building register documents to reconstruct the internal space of buildings. Topological information was built in the geospatial database and merged with the geometric information of CAD plans. as well as other attributal data from the building register. The GIS network modeling method introduced in this study is expected to enable an effective 3 dimensional spatial analysis of building interior which is developing with increasing complexity and size.