• Title/Summary/Keyword: 상대편의

Search Result 33, Processing Time 0.029 seconds

A Design and Implementation of Prototype of Dual Screen Platform on Android (듀얼 스크린 안드로이드 플랫폼 프로토타입의 설계 및 구현)

  • Hwang, Ki-Tae;Cho, Hye-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.163-169
    • /
    • 2012
  • Since only one application has monopoly on LCD device of the mobile device in Android platform, the user can not see two screens together displayed by two applications running simultaneously. In this paper, a dual-app has been defined as two mobile applications running on each device of a pair of two mobile devices and DSAP or Dual Screen Android Platform has been implemented. DSAP does remote-execution of the peer application of a dual-app on the peer mobile device when either application of the dual-app starts to run and supports communication of the pair app over the network. This paper describes details of design and implementation of DSAP and shows a sample case utilizing DSAP.

A Study on the Design of Synchronization Protocol for Multimedia Communication (멀티미디어 통신을 위한 동기 프로토콜의 설계에 관한 연구)

  • 우희곤;김대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.8
    • /
    • pp.1612-1627
    • /
    • 1994
  • There is a synchronization function which deals with only single media of text in the OSI Session Layer. So new synchronization schem and synchronization protocol are required for multimedia communications which include audio, video and graphic as well as text information. In this paper, conceptional Multmedia Synchronization Layer(MS layer) environment is composed and its service primitives and protocols based on 'multi-channel, base media scheme' are designed and proposed for multimedia synchronization services. This MS layer Manager (MSM) establishes the MS layer connection to the peer MS layer and manages each media channel which is created in MS layer media by media. The MSM also finds the synch-position through the media frame number by utilizing it like the time stamp to provide inter-media synchronization services as well as intra-media synchronization services.

  • PDF

Development of a Precision BLDC Servo Position Controller for Composite Smoke Bomb Azimuth Driving System (복합연막탄 선회구동장치를 위한 정밀 BLDC 서보 위치 제어기 개발)

  • Koo, Bon-Min;Choi, Sung-Jin;Choi, Jung-Keyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.467-472
    • /
    • 2006
  • This study has been done to design a precise system and develop position control algorithm to control a Composite Smoke Bomb Azimuth driving apparatus of a BLDC servo motor. Having to Blind the sight of opposite tank. the Smoke Bomb Rotational driving system needs instant response that is able to detect opponent appearance and blast the bomb at a short time. So a design that shows fast current response capability or $300[Hz]\sim500[Hz]$ is proposed. in the MIN-MAX PWM technology is used to increase the operational speed. in order to control the blasting position, a precision position control algorithm that utilizes the integral value of speed trajectory is suggested. Also these characteristics are monitored and assessed by the PC based monitoring program which shows the graphs of current, voltage, position, and speed parameters. The main controller is based on a TMS320VC33 high performance floating-point DSP(Digital Signal Process) and the PWM generator utilizes EPM7128 CPLD.

가축(家畜 Domestic Animal)들의 의사전달(意思傳達 Communication) 행동(1)

  • 김진석
    • Journal of the korean veterinary medical association
    • /
    • v.34 no.10
    • /
    • pp.715-725
    • /
    • 1998
  • 우리 사람들은 자신의 생각을 다른 사람들에게 전하고자 할 때 언어를 주로 이용하고 보조적인 수단으로 몸짓을 한다. 사용하는 언어가 달라 소통이 어려울 때는 부득이 몸짓으로만 서로 의견을 나누게 되는데 손짓과 발짓은 물론 얼굴의 표정까지 동원된다. 물론 언어를 이용한 의사전달 만큼 정확하지도 못하고 시간적으로도 효율적이지 못하지만 그런 대로 급한 문제는 해결할 수 있는 경우가 않다. 동물들이 서로의 의사소통을 위하여 어떤 형태의 언어 및 언어에 가까운 음성기호를 이용할 능력이 있는지에 대하여는 학자들 간에도 논란이 계속되고 있으나 분명한 것은 어떤 방법으로든 동물들도 제나름대로 자신의 의사를 전달하고 또한 상대편이 전하고자 하는 뜻을 파악하여 이에 적절히 대처를 한다는 점이다. 이런 점에서 동물들을 대상으로 하는 학문인 수의분야에서는 우리 인간들에게 익숙한 언어와 행동이 아닌 동물들의 독특한 의사전달 방법을 정확히 이해하는 것이 무엇보다도 중요하다는 점을 인식하는 것이 필요하다 동물의 행동 하나 하나는 인간의 행동과 마찬가지로 나름대로의 의미를 지니고 있다. 이러한 동물의 행동을 인간의 눈 높이에서가 아닌 동물이 표현하고자 하는 행동 언어적인 측면에서의 이해가 필요한 것이다. 야생동물의 행동양식에 대한 연구는 생래학적으로 비교적 많이 이루어진 편이나 가축화된 동물들에 대하여는 체계적이고 비교학적인 연구가 아직도 부족한 실정이다. 특히 우리 나라에서는 이 분야에 대한 연구는 물론 외국의 연구내용에 대하여도 적극적인 소개가 이루어지지 못하였고 아울러 여러 분야에 실제 적용은 더욱 어려웠다. 동물의 건강을 책임지고 있는 우리 수의 분야는 물론, 가축을 사양하는 축산학 분야 및 모든 동물관련 분야에서 효율적이고 바람직한 동물과 인간의 관계를 구축하기 위하여는 무엇보다도 동물의 행동을 인간의 언어사용 측면에서 이해하려는 노력이 필요하다 하겠다. 이러한 일차적인 필요성에 조금이나마 도움이 되고자 하는 바람으로 외국문헌을 중심으로 인간의 생활과 밀접한 관계를 지닌 여러 동물들의 행동과 그 의미를 소개하고자 한다. 아울러, 소개되는 내용은 Domestic Animal Behavior for Veterinarians and Animal Scientists (제3판, Katherine A. Houpt 지음), Animal Behavior (Tim Halliday 지음), Canine and Feline Behavior Problems(Stefanie Schwartz 지음), Journal of Conpendium on Continuing Education for the Practicing Veterinarian,그리고The Merck Veterinary Manual의 Behavior와 같은 참고문헌에 크게 의존하여 기술된 것임을 밝힌다.

  • PDF

Study on the Case of the Asymmetric War (비대칭전 주요사례 연구)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.25-32
    • /
    • 2016
  • We can not respond asymmetric warfare effectively. The asymmetric operation is performed in asymmetric methods and means with different characteristics and functions to their enemy. And the character of the asymmetric operation have 'heterogeneity' and 'superiority' in principle. The type of asymmetric strategy is complex and diverse. Since we can classify the type of the asymmetric strategy in many different way and we must study in many ways and aspects. When we study asymmetric war previous cases from modern to ancient era, we can find that the key factors of the victory have superiority of the asymmetric strategy and discriminatory measures. The asymmetry is created when one party has to adapt to the strategic environment. If we want to secure a strategic advantage, we must take a number of case studies and countermeasures for asymmetric warfare.

Frequency Analysis of Daily Rainfall in Han River Basin Based on Regional L-moments Algorithm (L-모멘트법을 이용한 한강유역 일강우량자료의 지역빈도해석)

  • Lee, Dong-Jin;Heo, Jun-Haeng
    • Journal of Korea Water Resources Association
    • /
    • v.34 no.2
    • /
    • pp.119-130
    • /
    • 2001
  • At-site and regional frequency analyses of annual maximum 1-, 2-, and 3-days rainfall in Han River basin was performed and compared based on the regional L-moments algorithm. To perform regional frequency analysis, Han River basin was subdivided into 3 sub-basins such as South Han River, North Han River, and downstream regions. For each sub-basin, the discordancy and homogeneity tests were performed. As the results of goodness of fit tests, lognormal model was selected as an appropriate probability distribution for both South Han River and downstream regions and gamma-3 model for North han River region. From Monte carlo simulation, RBIAS and RRMSE of the estimated quantiles from regional frequency analysis and at-site frequency analysis were calculated and compared each other. Regional frequency analysis shows less RRMSE of the estimated quantiles than at-sites frequency analysis in overall return periods. The differences of BRMSE between two approaches increase as the return period increases. As a result, it is shown that regional frequency analysis performs better than at-site analysis for annual maximum rainfall data in Han River basin.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Study of Examples for Air Bag Non-deployment Including Rear Collision and Failure Phenomenon by Damage of Control Parts in Vehicle Air Bag (자동차 에어백의 제어부품 불량에 의한 고장현상 및 후방 추돌에 관련된 에어백 미전개에 대한 사례 연구)

  • Lee, Il Kwon;Kim, Young Gyu;Moon, Hak Hook
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.6
    • /
    • pp.102-106
    • /
    • 2012
  • The purpose of this paper is to study the failure cases in relation to system of Air Bag in vehicle happened in the field. In the first example, it was separated the soldering parts connected the wire pin between air bag module and clock spring of air bag. Whenever the pin shake by the car's vibration, the driver verified the malfunction phenomenon appeared air bag warning lamp on instrument panel in front of driver's seat. in car inside room. The second example, it verified the warning lamp lighting phenomenon of air bag by produced the circuit plate non-contacting of single an element in air bag electronic control unit. The third example, it verified the light of air bag warning indicator lamp by separated with soldering parts connecting inner pin and resistance terminal of seat belt pretensioner using passenger seat. The fourth example, when the passenger car crash a back of truck, the former bumper get jammed under the latter as the roof height of car low less than that. Therefore, the impact of Car's collision verified that don't transfer with body frame of vehicle because of no attachment impact sensor in it.

Study of the determination of 226Ra in soil using liquid scintillation counter (액체섬광계수기를 이용한 토양 중 226Ra 분석 방법 연구)

  • Jung, Yoonhee;Kim, Hyuncheol;Chung, Kun Ho;Kang, Mun Ja
    • Analytical Science and Technology
    • /
    • v.29 no.2
    • /
    • pp.65-72
    • /
    • 2016
  • This study presented an analytical method for detecting radium in soils using a liquid scintillation counter (LSC). The isotope 226Ra was extracted from soil using the fusion method and then separated from interfering radionuclides using the precipitation method. Radium was coprecipitated as sulfate salts with barium (Ba) and then converted into Ba(Ra)CO3, which is soluble in an acidic solution. The isotope 222Rn, the decay progeny of 226Ra, was trapped in a water immiscible cocktail and analyzed by LSC. The pulse shape analysis (PSA) level was estimated using 90Sr and 226Ra standard solutions. The figure of merit was the highest at PSA 80, while the alpha spillover was the lowest at PSA 80. The counting efficiency was 243 ± 2% in a glass vial. This analytical method was verified with International Atomic Energy Agency (IAEA) reference materials, including IAEA-312, IAEA-314, and IAEA-315. The recovery ranged from 60–82%, while the relative bias between the measured value and the recommended value was less than 10%. The minimum detectable activity was 2.1 Bq kg−1 with dry mass 1 g, the background count rate of 0.02 cpm, the recovery rate of 70% and counting time of 30 min.

Crystallization Behavior and Mechanical Properties of High Density Polyethylene/metallocene catalyzed Poly(ethylene-co-octene) Blends (고밀도 폴리에틸렌/폴리에틸렌-옥텐 공중합체 블렌드의 결정화 거동 및 기계적 물성에 관한 연구)

  • Son, Younggon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.6
    • /
    • pp.3108-3113
    • /
    • 2013
  • Compatibility between mLLDPE and HDPE was investigated by observing the crystallization behavior and mechanical properties of their blends. HDPE and mLLDPE blends were prepared by a melt-blending with compositions of 100/0, 80/20, 60/40, 40/60/ 20/80 and 0/100. Four different mLLDPEs containing various octene contents (4.1, 6.8, 9.8 및 12.5 mol.%) were investigated. The melting temperature and crystallization peak temperature of the blends were measured by DSC and the mechanical properties were measured in an universal testing machine. By observation that the melting and crystallization peak temperatures of one component were affected by its counterparts, it was revealed that HDPE and mLLDPE are miscible or at leat partially miscible at molten state. It was also found that the crystalline phase of mLLDPE contains HDPE crystals. However. it was not clear that mLLDPE was cocrystalized in the crystalline phase of HDPE. By various investigation with DSC and mechanical properties, it was concluded that the compatibility between mLLDPE and HDPE decreases with the octene content in the mLLDPE.