• Title/Summary/Keyword: Dynamic Link

Search Result 710, Processing Time 0.027 seconds

Study on Daylight Inflow Environment Consequent on the Length of Light Shelf and Slat Angle Control for Fostering Visual Environment in Patient Rooms of Hospital - By Dynamic Daylight Simulation Using Weather Data - (종합병원 병실 내 시환경 조성을 위한 광선반 길이 및 Slat각 제어에 따른 자연채광 유입 환경 연구 - 기상데이터 기반 동적 자연채광 시뮬레이션을 기반으로 -)

  • Cho, Ju Young;Lee, Ki Ho;Lee, Hyo Won
    • KIEAE Journal
    • /
    • v.12 no.6
    • /
    • pp.113-121
    • /
    • 2012
  • A hospital is the most important infra-facility of the places which take care of people's body in social environment. There exist several environmental factors in the ways to heal the human body in hospital ward, but this study tried to look into the improvable pleasant sickroom environment with focus on light environment among the factors. In other words, this study aims at the research on proper daylight inflow into sickroom space as basic data for understanding the link between healing environment and natural lighting. In the simulation analysis through this research, this study completed the initial simulation using Autodesk Revit 2011 with focus on two types of individual multi-bed room units of the two general hospitals located in Gwangju City. This study made a simulation analysis of The two multi-bed rooms looking to the west using the weather data on Gwangju district, which is the strong point of ECOTECT2011. Conclusively, looking into the analysis of the simulation model in time of attaching the length of in & outside light shelf, the angle controlling of light shelf, the daylight factor and DA were found to show the tendency to decrease in the numerical value due to the decrease in sunlight inflow as the simulation model moved more toward the room from the window in comparison with the existing analysis of multi-bed rooms. Particularly, this study was able to read that the daylight factor and DA were more decreasing to improve at the light shelf than the existing bedrooms; conclusively, this study judges that the natural lighting simulation analysis could be helpful in improving the healing environment as basic data.

Development of a Packet-Switched Public computer Communication Network -PART 2: KORNET Design and Development of Network Node Processor(NNP) (Packet Switching에 의한 공중 Computer 통신망 개발 연구 -제2부: KORNET의 설계 및 Network Node Processor(NNP)의 개발)

  • 조유제;김희동
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.22 no.6
    • /
    • pp.114-123
    • /
    • 1985
  • This is the second part of the four-part paper describing the development of a packet-switched computer network named the cORNET In this paper, following the first par paper that describes the concepts of the KORNET and the development of the network management center (NMC), wc present the design of the KORNET and the development of the network node processor (NNP) The initial configuration of the KORNET consists of three NNP's and one NMC. We have developed each NNP as a microprocessor-based (Mc68000) multiprocessor system, and implemented the NMC using a super-mini computer (Mv/8000) For the KORNET we use the virtual circuit (VC) method as the packet service strategy and the distributed adaptive routing algorithm to adapt efficiently the variation of node and link status. Also, we use a dynamic buffer management algorithm for efficient storage management. Thc hardware of the NNP system has been designed with emphasis on modularity so that it may be expanded esily . Also, the software of the NNP system has been developed according to the CCITT recommendations X.25, X.3, X.28 and X.29.

  • PDF

Lateral Stiffness and Natural Period Evaluation of Flat Plate Tall Buildings for Wind Design (내풍설계를 위한 초고층 무량판 건축물의 횡강성 및 고유주기 산정)

  • Park, Je-Woo;Kim, Hong-Jin;Jo, Ji-Seong
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.23 no.1
    • /
    • pp.73-80
    • /
    • 2010
  • Wind-induced vibration is one of the important structural design factors for serviceability of tall buildings. In order to evaluate the reliable wind-loads and wind induced-vibration, it is necessary to obtain the exact natural period of buildings. The discrepancy in the natural period estimation often results in the overestimation of wind loads. In this study, the effectiveness of lateral stiffness estimation method for tall buildings with flat plate system is evaluated. For this purposed, the results of finite element analysis of three recently constructed buildings are compared with those obtained from field measurement. For the analysis, factors affecting on the lateral resistance such as cracked stiffness of vertical members, elastic modulus of concrete, effective slab width, and cracked stiffness of link beam are considered. Form the results, it is found that the use of non-cracked stiffness and application of dynamic modulus of elasticity rather than initial secant modulus yields closer analysis result to the as-built period.

A System of Managing Connection to Science and Technology Information Services (과학기술 학술정보 서비스 연계 관리 시스템)

  • Lee, Mikyoung;Jung, Hanmin;Sung, Won-Kyung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.823-826
    • /
    • 2008
  • This paper shows linkage management for external services. There are many services for specific entities such as DBLP and OntoWorld. OntoFrame, as a Semantic Web-based research information service portal, aims at one-stop service in ways that it connects external services with hyperlinks. For managing the linkage, linkage rules are manually edited by human administrators and automatically verified and tested by linkage management system. It consists of linkage rule management, linkage rule verification, linkage test, and dynamic link generation. Linkage rule management creates and edits linkage rules to connect external services on the Web. After finished rule editing and verification step, linkage management invokes linkage test with entity list. Only valid links are visible to enable users to click on our system, and thus it increases user's reliability on the system.

  • PDF

An Implementation of Internet Protocol Version 6 o Windows NT Kernel Environment (윈도우 NT 커널 환경에서 IPv6 프로토콜 구현 연구)

  • Kang, Shin-Gak;Kim, Dae-Young
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2521-2532
    • /
    • 1997
  • The next generation internet protocol, IPv6, have been developed by the IETF according to the requirements of enhancement of classic IP protocols to satisfy the lack of Internet address space as well as the support of multimedia applications. This paper presents an implementation of IPv6 protocols on the Windows NT kernel environment. In this work, we developed and also tested the basic functions, required for operating as an IPv6 host, such as IPv6 header processing, IPv6 address handling, control message processing, group membership processing and neighbor discovery functions. The implemented IPv6 protocol driver module is connected to the lower network interface card through NDIS, a standard network interface. And this driver module that operates within kernel, is implemented as it is connected to upper user applications and lower NDIS using dispatch and lower-edge functions. The developed IPv6 protocol driver can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library.

  • PDF

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.

PMIP-based Distributed Mobility Management for Tactical Network (전술 기동망의 이동성 지원을 위한 PMIP기반 분산 이동성 관리 적용방안)

  • Sun, Kyoungjae;Kim, Younghan;Noh, Hongjun;Park, Hyungwon;Han, Myounghun;Kwon, Daehoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.5
    • /
    • pp.654-666
    • /
    • 2019
  • The tactical network has several different characteristics compared with commercial internet network such as hierarchical topology, dynamic topology changing and wireless link based connectivity. For considering IP mobility management in the tactical network, current mobility management using Mobile IP(MIP) is not suitable with some reasons such as non-optimal routing paths and single point of failure. Proxy Mobile IP(PMIP) which supporting network-based mobility in hierarchical manner can provide optimal routing path in the tactical network environment, but centralized anchor is still remained a threat to the stability of the tactical network which changes its topology dynamically. In this paper, we propose PMIP-based distributed mobility management for the tactical network environment. From our design, routing paths are always configured in optimized way, as well as path is recovered quickly when the mobility anchor of user is failed. From numerical analysis, comparing to other mobility scheme, result shows that the proposed scheme can reduce packet transmission cost and latency in tactical network model.

Mechanism Design and Control Technique of Duct Cleaning Robot with Self-position Recognition (자기위치 인식 가능한 덕트 청소로봇의 메카니즘 설계 및 제어기법)

  • Jang, Woojin;Seo, Myungin;Ha, Junhwan;Park, Kyongtae;Kim, Dong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.85-95
    • /
    • 2019
  • This work shows how to design a robot structure and to control to overcome obstacles while traveling through ducts of various diameters and shapes by three-legged robot. Circuits are centered in the body to connect the three wheel bodies that are driven around the center body with the 4-section slider link structure. Also, the springs are used to contract and expand the robot legs so that it can be caparable of various environments. Geared motor, spring, and belt were selected based on the static and dynamic calculation to be suitable to horizontal and vertical travels. The center body is equipped with a camera and the distance sensors, and a control algorithms are implemented so that it can be successfully performed in L-type and T-type ducts. Using UWB modules and trilateration algorithm, the location of the duct-cleaning robot inside the duct could be identified successfully.

Design and Implementation of Web-browser based Malicious behavior Detection System(WMDS) (웹 브라우저 기반 악성행위 탐지 시스템(WMDS) 설계 및 구현)

  • Lee, Young-Wook;Jung, Dong-Jae;Jeon, Sang-Hun;Lim, Chae-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.667-677
    • /
    • 2012
  • Vulnerable web applications have been the primary method used by the attackers to spread their malware to a large number of victims. Such attacks commonly make use of malicious links to remotely execute a rather advanced malicious code. The attackers often deploy malwares that utilizes unknown vulnerabilities so-called "zero-day vulnerabilities." The existing computer vaccines are mostly signature-based and thus are effective only against known attack patterns, but not capable of detecting zero-days attacks. To mitigate such limitations of the current solutions, there have been a numerous works that takes a behavior-based approach to improve detection against unknown malwares. However, behavior-based solutions arbitrarily introduced a several limitations that made them unsuitable for real-life situations. This paper proposes an advanced web browser based malicious behavior detection system that solves the problems and limitations of the previous approaches.

Novel nomogram-based integrated gonadotropin therapy individualization in in vitro fertilization/intracytoplasmic sperm injection: A modeling approach

  • Ebid, Abdel Hameed IM;Motaleb, Sara M Abdel;Mostafa, Mahmoud I;Soliman, Mahmoud MA
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.48 no.2
    • /
    • pp.163-173
    • /
    • 2021
  • Objective: This study aimed to characterize a validated model for predicting oocyte retrieval in controlled ovarian stimulation (COS) and to construct model-based nomograms for assistance in clinical decision-making regarding the gonadotropin protocol and dose. Methods: This observational, retrospective, cohort study included 636 women with primary unexplained infertility and a normal menstrual cycle who were attempting assisted reproductive therapy for the first time. The enrolled women were split into an index group (n=497) for model building and a validation group (n=139). The primary outcome was absolute oocyte count. The dose-response relationship was tested using modified Poisson, negative binomial, hybrid Poisson-Emax, and linear models. The validation group was similarly analyzed, and its results were compared to that of the index group. Results: The Poisson model with the log-link function demonstrated superior predictive performance and precision (Akaike information criterion, 2,704; λ=8.27; relative standard error (λ)=2.02%). The covariate analysis included women's age (p<0.001), antral follicle count (p<0.001), basal follicle-stimulating hormone level (p<0.001), gonadotropin dose (p=0.042), and protocol type (p=0.002 and p<0.001 for short and antagonist protocols, respectively). The estimates from 500 bootstrap samples were close to those of the original model. The validation group showed model assessment metrics comparable to the index model. Based on the fitted model, a static nomogram was built to improve visualization. In addition, a dynamic electronic tool was created for convenience of use. Conclusion: Based on our validated model, nomograms were constructed to help clinicians individualize the stimulation protocol and gonadotropin doses in COS cycles.