• 제목/요약/키워드: IT Technique

검색결과 23,059건 처리시간 0.049초

Fashion Design using Art Flower Technique - Based on Transparency Image -

  • Lee Youn-Hee
    • The International Journal of Costume Culture
    • /
    • 제8권1호
    • /
    • pp.32-42
    • /
    • 2005
  • This paper aims to propose fashion designs based on the application of art flower technique to translucent clothing material. For study method, firstly I looked into art flower applications occurred in modern trend since 2000 as well as theoretical research on art flower and transparency expressed as artificial beauty. Second, I attempt to express transparency in a variety of unique ways by using the art flower technique in producing clothes. Third, I utilized transparent flower with translucent clothing material and tried to suggest fashion design attempting mixture of new materials. As a result, firstly transparent image and material are well fitted in with modern trend and especially it was very suitable for expressing feminine beauty. Second, transparency was the element to suggest creative formative world in fashion design in regard to flower's beauty, various shapes and colors and to provide infinite materials as design motive. Third, the combination of knit clothing and plastic art flower displayed a new form of material combination. Especially as translucent material is fitted with trend such as function, lightness and variableness in modern times of the $21^{st}$ century, it presents beautiful combination with transparent flower. Fourth, Silk flower technique is variously used in art flower techniques. Various possibility ranges are presented such as flower was recreated with artificial image by silk flower technique to be newly expressed and various materials like aesthete film can be also expressed with silk flower technique.

  • PDF

POD-based representation of the alongwind Equivalent Static Force for long-span bridges

  • Fiore, Alessandra;Monaco, Pietro
    • Wind and Structures
    • /
    • 제12권3호
    • /
    • pp.239-257
    • /
    • 2009
  • This paper develops and discusses a method by which it is possible to evaluate the Equivalent Static Force (ESF) of wind in the case of long-span bridges. Attention is focused on the alongwind direction. The study herein carried out deals with the classical problems of determining the maximum effects due to the alongwind action and the corresponding ESFs. The mean value of the maximum alongwind displacement of the deck is firstly obtained both by the spectral analysis and the Gust Response Factor (GRF) technique. Successively, in order to derive the other wind-induced effects acting on the deck, the Gust Effect Factor (GEF) technique is extended to long-span bridges. By adopting the GRF technique, it is possible to define the ESF that applied on the structure produces the maximum alongwind displacement. Nevertheless the application of the ESF so obtained does not furnish the correct maximum values of other wind-induced effects acting on the deck such as bending moments or shears. Based on this observation, a new technique is proposed which allows to define an ESF able to simultaneously reproduce the maximum alongwind effects of the bridge deck. The proposed technique is based on the GEF and the POD techniques and represents a valid instrument of research for the understanding of the wind excitation mechanism.

에지와 대역확산기술을 이용한 디지털 워터마킹 기법 (A New Watermarking Algorithm Using the Edge and PN Code)

  • 송상주;이두성
    • 한국컴퓨터정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.13-18
    • /
    • 2004
  • 본 논문은 디지털 콘텐츠 제작자에 대한 저작권관리(DRM:Digital Right Management)의 한 요소기술인 워터마크 기법으로서 주파수 공간에서의 이산웨이브릿변환을 사용하여 새로이 제안한 것이다. 본 논문에서 새로이 제안한 워터마크 삽입 및 검출 알고리즘은 에지와 스팩트럼확산 기술을 사용하여 워터마크 시퀀스를 생성하고, 이산웨이브릿 변환을 이용해서 구성하였다. 본 논문에서 제안한 방법에 대하여 여러 가지 공격을 시도한 결과 Lenna 영상을 이용한 cox의 유사도 측정값은 6이상이고, PSNR은 40dB 이상이었으며, JPEG과 COLLUSION, CLIPPING, SCALING 등에서 워터마크 기술의 다양한 평가기준에 만족하는 것을 보여주었으며, 무감지성, 강인성, 기밀성 그리고 디지틀 콘텐츠 유통의 안정성을 보장하는 방법으로서 타당함을 입증하였다.

  • PDF

Two-Blade Guillotine Technique for Nipple Graft Harvest

  • Wong, Allen Wei-Jiat;Chew, Khong-Yik;Tan, Bien-Keem
    • Archives of Plastic Surgery
    • /
    • 제44권5호
    • /
    • pp.449-452
    • /
    • 2017
  • The nipple-sharing technique for nipple reconstruction offers excellent tissue matching. The method used for nipple graft harvesting determines the quality of the graft and hence, the success of nipple sharing. Here, we described a guillotine technique wherein the nipple is first transfixed with 2 straight needles to stabilise it. Two No. 11 blades are then inserted in the center and simultaneously swept outwards to amputate the distal portion of the nipple. This technique provides good control, resulting in a very evenly cut base. The recipient bed is deepithelialized thinly, and the nipple graft is inset with interrupted 8-0 nylon sutures under magnification. Being a composite graft, it is protected with splint dressings for 6 weeks, and the dressing is regularly changed by the surgeon. The height of the nipple grafts ranges from 4 to 8 mm. This technique was performed in 9 patients with an average follow-up of 2.9 years (range, 1-4.5 years). Apposition between the nipple graft and its bed is crucial for the success of this technique. When correctly applied, we observed rapid revascularization of the graft.

Experimental investigation of novel pre-tightened teeth connection technique for composite tube

  • Li, Fei;Zhao, Qilin;Chen, Haosen;Xu, Longxing
    • Steel and Composite Structures
    • /
    • 제23권2호
    • /
    • pp.161-172
    • /
    • 2017
  • A new composite tube connection method called the pre-tightened teeth connection technique is proposed to improve the composite tube connection efficiency. This paper first introduces the manufacturing process of the proposed technique. It then outlines how the mechanical properties of this technology were tested using four test groups. The factors that influence the load-bearing capacity and damage model of the connection were analyzed, and finally, the transfer load mechanism was investigated. The following conclusions can be obtained from the research results. (1) The new technique improves the compressive connection efficiency by a maximum of 79%, with the efficiency exceeding that of adhesive connections of the same thickness. (2) Changing the depth of teeth results in two types of damage: local compressive damage and shear damage. The bearing capacity can be improved by increasing the depth, length, and number of teeth as well as the pre-tightening force. (3) The capacity of the technique to transfer high loads is a result of both the relatively high interlaminar shear strength of the pultruded composite and the interlaminar shear strength increase provided by the pre-tightening force. The proposed technique shows favorable mechanical properties, and therefore, it can be extensively applied in the engineering field.

Recursive 디지털 필터 모델에 대한 역 필터링 기법 (An inverse filtering technique for the recursive digital filter model)

  • Sung-Jin Kim
    • 융합신호처리학회논문지
    • /
    • 제5권2호
    • /
    • pp.151-158
    • /
    • 2004
  • 본 논문에서는 디지털 필터 모델에 대한 역 필터링 기법을 제안한다. 이 기법은 안정한 non-causal IIR 역 필터를 안정한 causal 역 필터로 변환(근사)시키는 것이다. 실제로 이 역 필터에 대한 FIR 근사 방법을 제안한다. 전역통과 시스템에 대한 역 필터의 임펄스 응답은 그 시스템에 대한 임펄스 응답의 거울 영상(mirror image) 임을 알 수 있다. 특히 전역통과 시스템에 대한 임펄스 응답이 이러한 대칭성을 갖기 때문에, 제안한 기법은 다른 시스템 보다 전역통과 시스템에 더욱 유용하다. 제안한 역 필터링 기법을 설명하기 위하여, 네 개의 예제를 제시한다. 그들 중 둘은 전역통과 필터에 대한 것이며, 다른 두 개의 예제는 IIR과 FIR 필터에 대한 것이다. 또한 컴퓨터 시뮬레이션을 통하여 제안한 기법이 잘 동작함을 보인다.

  • PDF

내장형 시스템의 상호작용 오류 감지를 위한 테스트 데이타 선정 기법 (Test Data Selection Technique to Detect Interaction Faults in Embedded System)

  • 성아영;최병주
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제30권12호
    • /
    • pp.1149-1157
    • /
    • 2003
  • 하드웨어와 소프트웨어가 조합된 내장형 시스템이 복잡해지면서, 내장형 시스템에 탑재되는 내장형 소프트웨어 테스트가 중요하게 인식되고 있다. 특히, 원자력 발전소와 같이 안전 등급이 높은 시스템에 들어가는 소프트웨어 테스트는 필수적이다. 내장형 시스템 테스트의 경우 하드웨어와 소프트웨어의 상호작용에 의해 발생하는 오류를 발견하기 위한 효과적인 테스트 기법이 필요하다. 본 논문에서는, 하드웨어와 소프트웨어 사이의 상호작용에 의해 생성되는 오류를 발견하기 위하여, 오류 삽입 기법을 이용한 테스트 데이타 선정 기법을 제안하고, 이 기법을 Digital Plant Protection System에 적용하였으며, 실험을 통해 제안한 기법의 우수성을 분석한다.

치근피개술의 임상적 효과 비교 (A Comparison of Clinical Effect for Root Coverage)

  • 한종수;홍기석;정진형;임성빈
    • Journal of Periodontal and Implant Science
    • /
    • 제38권3호
    • /
    • pp.483-492
    • /
    • 2008
  • Purpose: The purpose of this study was to compare clinical effect of the Langer & Langer technique, the modified Langer & Langer technique and Bruno technique. Material and Methods: 30 patients who have gingiva recession(Miller class I or class II) were carried root coverage. Langer & Langer technique(14 patients/32 tooth), modified Langer & Langer technique(5 patients/10 tooth) and Bruno technique(11 patients/18 tooth) was carried. At baseline and average 3 months after operation, it was estimated clinical index(Pocket depth, gingiva recession, clinical attachment level, keratinized gingiva, scar tissue, root coverage rate) by Williams style probe. Result: Root coverage rate is indicated Langer & Langer technique(8S%), Modified Langer & Langer technique(86%) and Bruno technique(90%). Conclusion: All three of the procedures were effective in gingival recession and improved clinical parameters.

폴리곤 분할 기법을 사용한 해안선 지도 전시 성능개선 (Performance Improvement of Coastline Map Using Polygon Splitting Technique)

  • 장택수;나범철;홍동호;박근국
    • 한국군사과학기술학회지
    • /
    • 제23권5호
    • /
    • pp.494-501
    • /
    • 2020
  • When we develop an OpenGL-based coastline map that displays the high resolution data of GSHHG, it takes tens of seconds until the first scene is rendered. That is because it takes time to tessellate polygons with a huge number of vertices. A commonly used solution is that it converts original data to a customized data in advance, and it displays these. But if we should use original data to display a coastline map, we need to find another solution. In this paper we suggest using a polygon splitting technique to minimize tessellation time. In order to prove its effectiveness, we implemented a software applied this technique and measured its performance. The software applied this technique took a few seconds to display the first scene and we confirmed its effectiveness.

Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구 (A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.