• Title/Summary/Keyword: A key technique

Search Result 1,745, Processing Time 0.03 seconds

The Study on the RF Transceiver Applied to Cognitive Radio Method (주파수 공유기법을 적용한 RF 송수신기에 대한 연구)

  • Kim, Ki-Jung;Kim, Jong-Sung;Bae, Moon-Kwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1315-1320
    • /
    • 2015
  • In this paper Communication data link equipment on a high speed-hopping method to use the frequency resources efficiently for the frequency environment is introduced such as sensing techniques, using the same frequency band by using the received two-channel technique and the receive filter bank unit applied to be shared with other equipment such as radar and so on. The real-time measurement and analysis were operated for measurement the frequency environment of the operating band in advance. and primarily equipment to develop is analyzed how the interference effect to the radar minimize the operation of radar equipment. In reverse, to use the same frequency band the methods such as frequency sharing techniques are presented in this paper. Finally, by design of the main items of the RF transceiver NF, transmission output, and a simulation of the IMD, such as whether the key is verified prior to meet specifications.

CTQ derived using the new Module device convergence and QFD can be mounted on the dominance Products : Focusing on the sparkling water purifier Case (시장지배제품에 장착 가능한 새로운 Module장치 융합 및 QFD를 활용한 CTQ 도출 : 탄산수 정수기 사례를 중심으로)

  • Song, In-Cheol;Hwang, Dong-Ryong;Lee, Seung-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.195-204
    • /
    • 2015
  • This paper CTQ(Critical to Quality) to draw, aim to derive a key quality factor reflects the customer's requirements by utilizing the QFD technique for sparkling water purifier device that combines the new module. Tasting participants, consumers and New Module device intended for developers who develop and conduct a survey and FGI (Focus Group Interview) VOC(Voice of Customer) to draw, drawn by the EC through the developer VOC and EC (Engineering Characteristic) and charts the relationship between the phases was prepared HOQ(House of Quality). Sparkling water purifier through the HOQ chart certain taste, sound, running water, CO2 cylinder replacement cycle, we obtain results that element is an important quality factors such as ease of use. These factors are closely related to each component regulators and Module device (mixing) associated with the taste of water, booster pumps, and deliver results that the solenoid is considered the most critical part.

Electroless plating of buried contact solar cell (전극함몰형 태양전지의 무전해도금)

  • Dong Seop Kim;Eun Chel Cho;Soo Hong Lee
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.6 no.1
    • /
    • pp.88-97
    • /
    • 1996
  • The metallization is the key to determining cell costs, cell performance, and system reliability. Screen printing technology suffers from several limitations affecting mainly the front grid. The buried contact solar cell (BCSC) was specifically desinged to be compatible with low cost, mass production techniques and avoid the conventional metallization problem. By using electroless plating technique, we performed this metallization inexpensively and reliably. This paper presents the details of the optimization procedure of metallization schemes on laser grooved cell surfaces. Commercially available Ni, Cu and Ag plating solutions were applied for the cell metallization. The application of those solutions on the buried contact front metallization has resulted in an cell efficiency of 18.8%. The cell parameters are an open circuit voltage of 651 mV, short circuit current density of 37.1 mA/$\textrm{cm}^2$, and fill factor of 77.8 %. The efficiency of over 18 % was achieved in the above 90% of the batch.

  • PDF

Hybridization and Use Of Grapes as an Oviposition Substrate Improves the Adaptation of Olive Fly Bactrocera oleae (Rossi) (Diptera: Tephritidae) to Artificial Rearing Conditions

  • Sohel, Ahmad;Viwat, Wornoayporn;Polychronis, Rempoulakis;Emily A., Fontenot;Ul Haq, Ihsan;Carlos, Caceres;Hannes F., Paulus;Marc J.B., Vreysen
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.29 no.2
    • /
    • pp.198-206
    • /
    • 2014
  • The olive fly Bactrocera oleae (Rossi) is the key pest for olive cultivation worldwide. Substantial effort has been invested in the development of the sterile insect technique (SIT) to control this pest. One of the limitations to develop SIT technology for olive fruit fly is the low ability of wild females to lay eggs in other medium than olive fruits, and their slow adaptation to oviposition in artificial substrates. In the present study, fruit grapes were used as an alternative egg collection medium to harvest eggs and young larvae from freshly colonized wild strains originating from France, Italy, Spain and Croatia. The larvae were allowed to develop into the fruits until the second instar, before they were extracted out and further reared on a standard artificial diet. Furthermore, F1 to F4 female flies were alternatively offered wax bottles to oviposit. Finally, the performance of hybrid strains created from crosses between wild and long colonised flies was assessed. The results showed that females of all 4 wild strains readily oviposited eggs in grapes and from the F2 generation onward, females from all strains were adapted to laying eggs in wax bottles. No difference was observed in eggs and pupae production among all strains tested. The findings are discussed for their implications on SIT application against olive fruit fly.

The Developing Strategy for Supply Chain Economics in the East Asia by Center of Gravity Technique (무게중심기법을 이용한 동아시아 공급망 경제(Supply Chain Economics) 발전 전략)

  • Kim, Tae-Ho;Bae, Jung-Mi;Choi, Woo-Seok;Kim, Jin-Cheol;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.3
    • /
    • pp.123-132
    • /
    • 2011
  • Supply chain for the economic development of East Asian economic development model, the study's purpose is to establish. Korea, Japan, China, Russia and Asia, including North Korea and get the status of economic development by focusing on key issues and proposed solutions, within a few years of the coming of a new East Asian economic integration of new supply chain would like to prepare for the era. Weight The weight of the center to the center of East Asia, looking for techniques to approach the supply chain scenario, the economic development strategies and measures were studied. East Asia's economic potential value of the supply chain, identify and recognize the importance and benefits should be Presents detailed country-specific development strategies and leading Asian economies will have to pay the supply chain. Republic of Korea's leading East Asian economies in order to supply the industry, industry development strategy as detailed in the running to move. North and South Korea for economic integration, the era of supply-chain economy, you need to prepare calmly.

Predictive Analysis of Problematic Smartphone Use by Machine Learning Technique

  • Kim, Yu Jeong;Lee, Dong Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.213-219
    • /
    • 2020
  • In this paper, we propose a classification analysis method for diagnosing and predicting problematic smartphone use in order to provide policy data on problematic smartphone use, which is getting worse year after year. Attempts have been made to identify key variables that affect the study. For this purpose, the classification rates of Decision Tree, Random Forest, and Support Vector Machine among machine learning analysis methods, which are artificial intelligence methods, were compared. The data were from 25,465 people who responded to the '2018 Problematic Smartphone Use Survey' provided by the Korea Information Society Agency and analyzed using the R statistical package (ver. 3.6.2). As a result, the three classification techniques showed similar classification rates, and there was no problem of overfitting the model. The classification rate of the Support Vector Machine was the highest among the three classification methods, followed by Decision Tree and Random Forest. The top three variables affecting the classification rate among smartphone use types were Life Service type, Information Seeking type, and Leisure Activity Seeking type.

Human Body Mechanics of Pushing and Pulling: Analyzing the Factors of Task-related Strain on the Musculoskeletal System

  • Argubi-Wollesen, Andreas;Wollesen, Bettina;Leitner, Martin;Mattes, Klaus
    • Safety and Health at Work
    • /
    • v.8 no.1
    • /
    • pp.11-18
    • /
    • 2017
  • The purpose of this review is to name and describe the important factors of musculoskeletal strain originating from pushing and pulling tasks such as cart handling that are commonly found in industrial contexts. A literature database search was performed using the research platform Web of Science. For a study to be included in this review differences in measured or calculated strain had to be investigated with regard to: (1) cart weight/ load; (2) handle position and design; (3) exerted forces; (4) handling task (push and pull); or (5) task experience. Thirteen studies met the inclusion criteria and proved to be of adequate methodological quality by the standards of the Alberta Heritage Foundation for Medical Research. External load or cart weight proved to be the most influential factor of strain. The ideal handle positions ranged from hip to shoulder height and were dependent on the strain factor that was focused on as well as the handling task. Furthermore, task experience and subsequently handling technique were also key to reducing strain. Workplace settings that regularly involve pushing and pulling should be checked for potential improvements with regards to lower weight of the loaded handling device, handle design, and good practice guidelines to further reduce musculoskeletal disease prevalence.

Cultivar Discrimination of Korean and Chinese Boxthorn (Lycium chinense Mill. and Lycium barbarum L.) using SSR Markers (SSR 마커를 이용한 한국산과 중국산 구기자의 품종 판별)

  • Chung, Jong-Wook;Lee, Gi-An;Lee, Sok-Su;Bang, Kyong-Hwan;Park, Chung-Berm;Park, Yong-Jin
    • Korean Journal of Medicinal Crop Science
    • /
    • v.17 no.6
    • /
    • pp.445-451
    • /
    • 2009
  • This study was undertaken to develop a technique of discrimination using SSR makers in boxthorn cultivars. Forty one boxthorn cultivars, which were collected from Korea and China, were evaluated by 10 SSR markers. Total of 61 alleles were detected, ranging from 3 to 13 with an average of 6.1 alleles per locus. The averages of gene diversity and PIC values were 0.482 and 0.428, with a range from 0.25 (GB-LCM-022 and GB-LCM-087) to 0.83 (GB-LCM-167) and from 0.24 (GB-LCM-022 and GB-LCM-087) to 0.81 (GB-LCM-167), respectively. Five markers out of 10 markers, GB-LCM-022, GB-LCM-075, GB-LCM-104, GB-LCM-167 and GB-LCM-217, were selected as key markers for discrimination in boxthorn cultivars. All of boxthorn cultivars were individually distinguished by the combination of five SSR markers.

Secure and Efficient DB Security and Authentication Scheme for RFID System (RFID 시스템을 위한 안전하고 효율적인 DB 보안 및 인증기법)

  • Ahn, Rae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4C
    • /
    • pp.197-206
    • /
    • 2011
  • In the RFID system, bulk tag information is stored into the back-end database as plaintext format not ciphertext. In this case, the tags's private informations can be easily compromised by an external hacker or an insider attacker. If the private informations of tags disclosed by the attackers, it can occur serious privacy invasion problem. Recently the database(DB) security is an important issue to prevent the above DB compromised attack. However, DB security for RFID systeme has not been considered yet. If we use the DB security technique into the RFID system, the above described privacy invasion' problem can be easily prevented. Based on this motivation, this paper proposes a secure and efficient back-end database security and authentication(S-DB) scheme with XOR-based encryption/decryption algorithm. In the proposed scheme, all tag's private information is encrypted and stored by using the DB secret key to protect the DB compromised attack. As a result, the proposed S-DB scheme 'can provide stronger security and more efficiency for the secure RFID system environment.

Generation of Humanoid Walking Motion Adapted to the Ground's Sliding Properties (지면의 미끄러운 정도에 따른 캐릭터의 걷기 동작 생성)

  • Lee KumHee;Song MiYoung;Cho HyungJe
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.157-166
    • /
    • 2005
  • In 3D virtual environment the description of character' s movement that has utilized the conventional key-frame technique is gradually being developed toward the application of motion control method to generate more realistic and natural motion. Even the motion control method, however, has the limitation for expression of character's motion adapted to the ground properties of virtual world. That is, the walking motions of character are not only, for the most part, so uniform simple and repeated often as to feel to be tedious, but also the unnatural motion in which the tips of the toes soak through a plane or float in the air discording with the conditions of terrain lowers the semblance of reality. This paper proposes an adaptive motion control method for human figure locomotion in virtual environments or games, in which the walking motion is dynamiccally adapted to the ground's sliding properties. We compute an optimal parameters for one cycle of walking motion adapted to the ground properties by combining the coefficient of friction and centripetal force, and therefrom we induce a set of nonskid speed corresponding to various sliding properties of the ground.