• Title/Summary/Keyword: Convergence technique

Search Result 2,414, Processing Time 0.041 seconds

Study on Convergence Technique due to the Shape of Cruiser Board through Structural Analysis (구조 해석을 통한 크루저 보드의 형상에 따른 융합 기술연구)

  • Lee, Jung-Ho;Cho, Jae-Ung
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • In order to prevent the environmental pollution nowadays, the mobile device for one person of cruiser board not used with the fossil oil has been noticed. This study aims to analyze the property of cruiser board due to the shape by carrying out the structural analysis for the safe design of cruiser board. Two models of the existing cruiser board and the cruiser board with new configuration are designed. As the structural analysis was carried out by using the finite element analysis program, the durability by deformation, stress and fatigue life was investigated. In the study result, the model of cruiser board with new configuration has the maximum deformation of 0.000971mm, the maximum stress of 0.936MPa and the fatigue life from 1827.7Cycle to $1.887{\times}105Cycle$. As all study result values at the new model became better than the existing model, the new model was seen to become more adequate at using than the existing model. This study result can be contributed to the safer and durable design of cruiser board. And it is possible to be grafted onto the convergence technique at design and show the esthetic sense.

Effect of Stabilizing Reversal Technique of Proprioceptive Neuromuscular Facilitation and Taping Convergence on Wrist Pain and Grip Strength (고유수용성신경근촉진법의 안정적 반전기법과 테이핑 융합이 손목통증과 악력에 미치는 영향)

  • Kim, Beom-Ryong;Yi, Dong-Hyun;Yim, JongEun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.117-124
    • /
    • 2018
  • This study investigated the effect of wrist taping (WT) after application of stabilizing reversal technique (SRT) of proprioceptive neuromuscular facilitation (PNF) on pain and grip strength (GS) in patients with wrist pain (WP). Twenty patients with WP were randomly assigned to an experimental group (n=10) that received WT after application of SRT, and a control group (n=10) that received WT after application of stretching. The total intervention time consisted of a maximum of 10 minutes including breaks, and was performed 5 times a week for 2 weeks. Pain reduction was measured using a visual analogue scale. GS was measured using a dynamometer. Within group changes in pain and GS were significant in both experimental and control groups (p<0.01). Between group changes in pain and GS were greater in the experimental group than in the control group (p<0.01). This findings indicate that SRT of PNF and WT convergence can be an effective intervention for patients with WP. Continued development of convergence interventions for patients with WP various conditions in practice, is suggested.

An adaptive analysis in the element-free Galerkin method using bubble meshing technique

  • 이계희;최창근;정홍진
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2000.04b
    • /
    • pp.371-378
    • /
    • 2000
  • In this study an adaptive node generation procedure in the Element-free Galerkin (EFG) method using bubble-meshing technique is proposed. Based on the error function that obtained by projected error estimation method, the initial node arrangement is defined along the background cell that is used in the numerical integration. To obtain the smooth nodal configuration, the nodal configuration are regenerated by bubble-meshing technique. This bubble meshing technique was originally developed to generate a set of well-shaped triangles and tetrahedra. Its basic idea is packing circles or spheres, called bubble, into the specified area or space naturally using some dynamic equations with attracting and repelling force. To demonstrate the performance of proposed scheme, the convergence behaviors are investigated for several problems.

  • PDF

ACCELERATION OF MACHINE LEARNING ALGORITHMS BY TCHEBYCHEV ITERATION TECHNIQUE

  • LEVIN, MIKHAIL P.
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.22 no.1
    • /
    • pp.15-28
    • /
    • 2018
  • Recently Machine Learning algorithms are widely used to process Big Data in various applications and a lot of these applications are executed in run time. Therefore the speed of Machine Learning algorithms is a critical issue in these applications. However the most of modern iteration Machine Learning algorithms use a successive iteration technique well-known in Numerical Linear Algebra. But this technique has a very low convergence, needs a lot of iterations to get solution of considering problems and therefore a lot of time for processing even on modern multi-core computers and clusters. Tchebychev iteration technique is well-known in Numerical Linear Algebra as an attractive candidate to decrease the number of iterations in Machine Learning iteration algorithms and also to decrease the running time of these algorithms those is very important especially in run time applications. In this paper we consider the usage of Tchebychev iterations for acceleration of well-known K-Means and SVM (Support Vector Machine) clustering algorithms in Machine Leaning. Some examples of usage of our approach on modern multi-core computers under Apache Spark framework will be considered and discussed.

An Efficient Visualization Technique of Large-Scale Nodes Structure with Linked Information

  • Mun Su-Youl;Ha Seok-Wun
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.1
    • /
    • pp.49-55
    • /
    • 2005
  • This study is to suggest a visualization technique to display the relations of associated data in an optimal way when trying to display the whole data on a limited space by dealing with a large amount of data with linked information. For example, if you track an IP address through several steps and display the data on a screen, or if you visualize the human gene information on a 3-dimensional space, then it becomes even easier to understand the data flow in such cases. In order to simulate the technique given in this study, the given algorithm was applied to a large number of nodes made in a random fashion to optimize the data and we visually observed the result. According to the result, the technique given in this study is more efficient than any previous method in terms of visualization and utilizing space and allows to more easily understand the whole structure of a node because it consists of sub-groups.

Numerical modeling and simulation technique in time-domain for multibeam echo sounder

  • Jung, Donghwan;Kim, Jeasoo;Byun, Gihoon
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.10 no.2
    • /
    • pp.225-234
    • /
    • 2018
  • A Multibeam Echo Sounder (MBES) is commonly used for rapid seafloor mapping. We herein present a time-domain integrated system simulation technique for MBES development. The Modeling and Simulation (M&S) modules consist of four parts: sensor array signal transmission, propagation and backscattering modeling in the ocean environment, beamforming of the received signals, and image processing. Also, the simulation employs a ray-theory-based algorithm to correct the reconstructed bathymetry, which has errors due to the refraction caused by the vertical sound velocity profile. The developed M&S technique enables design parameter verification and system parameter optimization for MBES. The framework of this technique can also be potentially used to characterize the seabed properties. Finally, typical seafloor images are presented and discussed.

Convergence of Related Standard of CC and ISO for Security Evaluation of VPN (VPN의 보안성 평가를 위한 CC와 ISO 관련 표준의 융합)

  • Lee, Ha-Young;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.341-348
    • /
    • 2016
  • Because VPN(Virtual Private Network) uses internet network, the security technique should support it and evaluation technique based on standard should support it. Therefore the method should be organized that can evaluate the security of VPN based on the related standard. In this study, we intended to construct the security evaluation model through combining CC(Common Criteria) which is a evaluation standard and a part of security(Confidentiality, Integrity, Non-repudiation, Accountability, Authenticity) evaluation of ISO which is the standard of software quality evaluation. For this, we analyzed the quality requirements about intra-technology and security of VPN and constructed the evaluation model related to the quality characteristics of two international standard. Through this, we are able to construct a convergence model for security evaluation of VPN. Through accumulating the evaluation practices for VPN in the future, the suitability and validity of the evaluation model must be improved.

Hydrothermal Synthesis and Exfoliation of Mg/Al Layered Double Hydroxide with Tailored Aspect Ratio (수열 합성 및 박리에 의한 Mg/Al 층상 이중 수산화물의 종횡비 제어)

  • Hwang, Sung-Hwan;Kim, Donghyun;Kim, Yewon;Jung, Hyunsung
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.30 no.12
    • /
    • pp.822-827
    • /
    • 2017
  • Mg/Al layered double hydroxide with two-dimensional (2D) nanostructures was synthesized by a hydrothermal technique. The morphology and aspect ratio of $Mg_4Al_2(OH)_{14}3H_2O$ were controlled by the concentration and kinds of the hydrolysis agent, and temperature. The aspect ratio of $Mg_4Al_2(OH)_{14}3H_2O$ layered double hydroxides with the 2D hexagonal crystal structure was tailored from about 12.6 to about 45.7. The intercalated $CO{_3}^{2-}$ anions of the synthesized 2D $Mg_4Al_2(OH)_{14}3H_2O$ layered double hydroxides were exchanged to $NO_3{^-}$ anions. The bulk 2D $Mg_4Al_2(OH)_{14}3H_2O$ layered double hydroxides with the increased space between two layers due to the anion exchange were exfoliated in a formamide solution. The aspect ratio of the exfoliated 2D $Mg_4Al_2(OH)_{14}3H_2O$ layered double hydroxides increased to 570.3.

Analysis of Vocational Training Needs Using Big Data Technique (빅데이터 기법을 활용한 직업훈련 요구분석)

  • Sung, Bo-Kyoung;You, Yen-Yoo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.21-26
    • /
    • 2018
  • In this study, HRD-NET (http://hrd.go.kr), a vocational and training integrated computer network operated by the Ministry of Employment and Labor, is used to confirm whether job training information required by job seekers is being provided smoothly The question bulletin board was extracted using 'R' program which is optimized for big data technique. Therefore, the effectiveness, appropriateness, visualization, frequency analysis and association analysis of the vocational training system were conducted through this, The results of the study are as follows. First, the issue of vocational training card, video viewing, certificate issue, registration error, Second, management and processing procedures of learning cards for tomorrow 's learning cards are complicated and difficult. In addition, it was analyzed that the training cost system and the refund structure differentiated according to the training occupation, the process, and the training institution in the course of the training. Based on this paper, we will study not only the training system of the Ministry of Employment and Labor but also the improvement of the various training computer system of the government department through the analysis of big data.

A Study on Convergence of Cyber Security Monitoring and Industrial Security (기밀유출방지를 위한 융합보안 관리 체계)

  • Lee, Chang-Hun;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.61-67
    • /
    • 2010
  • Information communication the dazzling development life was convenient with to join in and planned an industrial technical advance. Not only the nation with technical security of the enterprise between the description competition keenly in the present point of view which rushes to technical competitive time of the nation between is become accomplished. The damage which is caused by with outflow of industrial secrecy that company prevents this effectively because is threatening at the degree which will threaten the existence of the nation and the technique which manages is become accomplished with the domestic foreign enemy. Prevents an industrial secret outflow the research for on a large scale with physical security technique and information security to be divided, is researched.