• Title/Summary/Keyword: unique

Search Result 11,469, Processing Time 0.039 seconds

Analysis of a Random Shock Model for a System and Its Optimization

  • Park, Jeong-Hun;Choi, Seung-Kyoung;Lee, Eui-Yong
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2004.10a
    • /
    • pp.33-42
    • /
    • 2004
  • In this paper, a random shock model for a system is considered. Each shock arriving according to a Poisson process decreases the state of the system by a random amount. A repairman arriving according to another Poisson process of rate $\lambda$ repairs the system only if the state of the system is below a threshold $\alpha$. After assigning various costs to the system, we calculate the long-run average cost and show that there exist a unique value of arrival rate $\lambda$ and a unique value of threshold $\alpha$ which minimize the long-run average cost per unit time.

  • PDF

Inhaled Nanoparticles and Occupational Health: A Review (흡입된 나노입자와 건강: 고찰)

  • Ku, Bon-Ki
    • Journal of Environmental Health Sciences
    • /
    • v.36 no.4
    • /
    • pp.255-263
    • /
    • 2010
  • In many fields, nanotechnology is leading to the development of purposely-engineered nanoparticles and devices demonstrating new, unique and non-scalable properties. However, concern has been expressed that these same properties may present unique challenges in terms of the potential health impact. Airborne particles associated with engineered nanoparticles are of particular concern, as they can readily enter the body through inhalation. Research into the potential occupational health risks associated with inhaling engineered nanoparticles is actively being conducted in the U.S. and globally. In this article, the potential occupational health effects of inhaled nanoparticles and methods for measuring exposure to nanoparticles are discussed. Critical research needs in this field are also briefly addressed.

A Study of Emotional Design Method of Steven Holl (스티븐 홀의 감성적 디자인 방법론에 관한 연구)

  • 김명옥
    • Korean Institute of Interior Design Journal
    • /
    • no.22
    • /
    • pp.53-60
    • /
    • 2000
  • The subject of 'Emotional Design' is appeared recently as one of the important issues in design field. 'Emotion', which has been underestimated since Kant and should be reevaluated from now on, is one of the basic two elements with reason which constitutes human nature. The purpose of this study is to research emotional design method appeared in the works of Steven Holl who is considered one of the influencing architects because of his unique methodology in developing the emotional design. The results of this study are as follows; 1) Emotional aspects were implied in his concepts by the way of emphasis on phenomenology in dealing with question of perception. 2) Emotional aspects were interwoven in his form and space as related to his concept. 3) Emotional aspects were shown in his way of developing his ideas with water coloring, in deriving his concept from other genre(especially from literature) and in the articulation of details. As a result, his unique way of implying emotional aspects which is coming from in-depth research of human nature as well as his own instinct were all interwoven in concept, form, and space together as a total way of thinking.

  • PDF

STABILITY LIMIT PROPERTIES OF CONTROL SYSTEMS ON THE SPACE OF ADJUSTING PARAMETERS (조정파라미터 공간에서의 제어계 안정한계 특성)

  • 최순만
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2000.11a
    • /
    • pp.135-142
    • /
    • 2000
  • The adjusting parameter set which enable control systems to locate on stability limit can be derived from theoretical or trial methods for an existing real system. The data from the results are much available to keep a system in the Proper stability condition even to site engineers who are inexperienced in the control system. In this paper, a general one loop control system was adopted for a model system the process of which was assumed to consist of a time-delay element and a first order-lag element in series. After obtaining the corresponding parameter set for the model system by mathematical procedures, their loci on the parameter space was taken according to frequency change. The parameter set loci of stability limit showed unique pattern, and particularity , the curves on the Kg-Ti parameter space were able to be generalized in the form of, an unique exponential formula. These properties were also compared with the results taken from experimental procedures by Nyquist response method and Ziegler & Nichols method on the time domain, and both results were confirmed to be nearly same.

  • PDF

A Study on 'Yeonji' Cosmetics and Make-up II - Focusing on diffusion and aspects of 'Yeonji' make-up in China - (연지화장(化粧) 연구 II - 중국(中國)에서의 연지화장 전파(傳播)와 양상(樣相) -)

  • Park, Chun-Soon;Jung, Bock-Hee
    • Korean Journal of Human Ecology
    • /
    • v.15 no.3
    • /
    • pp.425-437
    • /
    • 2006
  • The focus of this study is on the diffusion and aspects of Yoenji make-up in China. The diffusion of Yoenji make-up into China was achieved by Zhuang-Kun's departure for the West of China, after Emperor Moo of Han Dynasty defeated the Huns (B.C. 121). The Yoenji make-up is basically used as a unique sign and from the result of excessive development from the facial beauty point in accordance with luxurious Court culture and opening door of culture. It can diversely express kinds, names, ways, types and patterns, places and bodily parts, the colors of materials for use, and time zones of a make-up.

  • PDF

DEFINABLE Cr FIBER BUNDLES AND DEFINABLE CrG VECTOR BUNDLES

  • Kawakami, Tomohiro
    • Communications of the Korean Mathematical Society
    • /
    • v.23 no.2
    • /
    • pp.257-268
    • /
    • 2008
  • Let G and K be compact subgroups of orthogonal groups and $0{\leq}r<x<{\infty}$. We prove that every topological fiber bundle over a definable $C^r$ manifold whose structure group is K admits a unique strongly definable $C^r$ fiber bundle structure up to definable $C^r$ fiber bundle isomorphism. We prove that every G vector bundle over an affine definable $C^rG$ manifold admits a unique strongly definable $C^rG$ vector bundle structure up to definable $C^rG$ vector bundle isomorphism.

A Study on Design Development of Embroidered Fur Muffler (자수를 이용한 모피 머플러 디자인 개발)

  • Lee, Hee-Jung;Choy, Hyon-Sook
    • Journal of the Korean Society of Costume
    • /
    • v.61 no.6
    • /
    • pp.74-85
    • /
    • 2011
  • In modern fashion, accessories are recognized as indispensable articles for the completion of a look. Scarf and muffler has attained significance as a main fashion item. The purpose of study was to analyze the motifs of special material for muffler design on special material, and to seek unique and decorative effect using three dimensional method on the flat surfaced textile to give novelty. This study introduced technique of applying embroidery onto special materials such as fur and leather to achieve variety of texture effect. The results are as follows: Six designs were proposed. Each work has different detail and silhouette, and the unique motif design using embroidery with cotton, nylon, and bead on fur, leather, wool, and satin. This will be a method to develop value-added products in fashion and formative arts.

Design of Integrated Security Framework for Open Wireless Networking Architecture (공개 무선 통신망 구조를 위한 복합 보안 프레임워크 설계)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.288-289
    • /
    • 2013
  • An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. Optimized security protocols and mechanisms are employed for the high performance and security. Finally, a challenge in the near future will converge the integration of Open Ubiquitous Sensor Network (OUSN) with security protocols for applying the their applications. We analysed unique network-centric features and security mechanism of various heterogeneous wireless networks.

  • PDF

A Study on the closed-form solutions to image flow equations for 3D structure and motion (3차원 물체의 이동방향 측정에 관한 연구)

  • Lee, Hyun-Jung;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 1990.07a
    • /
    • pp.546-549
    • /
    • 1990
  • This study introduces the three-dimensional information about moving objects. Relative motion between textured objects and observer generates a time varying optic array at the image, from which image motion of contours can be extracted. Closed-form solutions are proposed for the structure and motion of planar and curved surface patches. The analytic solution for curved surface patches combines the transformation of Longuet-Higgins with the planar surface solution of Subbarao and Waxman. Ovoid patches are shown to construct a unique transform angle. Thus, ovoid patches almost always yield a unique 3D interpretation.

  • PDF

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.