• Title/Summary/Keyword: Physical environments

Search Result 1,223, Processing Time 0.021 seconds

Oil Cooler Design Automation on the Cooling of Machine Tool Cutting Oil (공작기계 절삭유 냉각용 오일쿨러 설계 자동화)

  • 권혁홍
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.8 no.1
    • /
    • pp.89-99
    • /
    • 1999
  • The automatic design of shell & tube type oil cooler can be used in real industrial environments. Since the automatic design system is intended to be used in small companies, it is designed to be operated well under environments of CAD package in the personal computer. It has adopted GUI in design system, and has employed DCl language. Design parameters to be considered in the design stage of shell and tube type oil cooler are type of oil cooler, outer diameter, thickness, length of tube, tube arrangement, tube pitch, flow rate, inlet and outlet temperature, physical properties, premissive pressure loss on both sides, type of baffle plate, baffle plate cutting ratio, clearance between baffle plate outer diameter and shell inner diameter and clearance between baffle plate holes. As a result, the automatic design system of shell & tube type oil cooler is constructed by the environment of CAD software using LISP. We have built database of design data for various kinds of shell & tube type oil coolers. The automatic design system have been assessed and compared with existing specification of design. Good agreement with Handbook of heat exchanger and design dta of real industrial environments has been found.

  • PDF

User Mobility Model Based Computation Offloading Decision for Mobile Cloud

  • Lee, Kilho;Shin, Insik
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.3
    • /
    • pp.155-162
    • /
    • 2015
  • The last decade has seen a rapid growth in the use of mobile devices all over the world. With an increasing use of mobile devices, mobile applications are becoming more diverse and complex, demanding more computational resources. However, mobile devices are typically resource-limited (i.e., a slower-speed CPU, a smaller memory) due to a variety of reasons. Mobile users will be capable of running applications with heavy computation if they can offload some of their computations to other places, such as a desktop or server machines. However, mobile users are typically subject to dynamically changing network environments, particularly, due to user mobility. This makes it hard to choose good offloading decisions in mobile environments. In general, users' mobility can provide some hints for upcoming changes to network environments. Motivated by this, we propose a mobility model of each individual user taking advantage of the regularity of his/her mobility pattern, and develop an offloading decision-making technique based on the mobility model. We evaluate our technique through trace-based simulation with real log data traces from 14 Android users. Our evaluation results show that the proposed technique can help boost the performance of mobile devices in terms of response time and energy consumption, when users are highly mobile.

Cubic Tangible User Interface Development for Mobile Environment (모바일 환경을 위한 큐빅형 텐저블 사용자 인터페이스 개발)

  • Ok, Soo-Yol
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.26 no.10
    • /
    • pp.32-39
    • /
    • 2009
  • Most mobile devices provide limited input interfaces in order to maximize the mobility and the portability. In this paper, the author proposes a small cubic-shaped tangible input interface which tracks the location, the direction, and the velocity using MEMS sensor technology to overcome the physical limitations of the poor input devices in mobile computing environments. As the preliminary phase for implementing the proposed tangible input interface, the prototype design and implementation methods are described in this paper. Various experiments such as menu manipulation, 3-dimensional contents control, and sensor data visualization have been performed in order to verify the validity of the proposed interface. The proposed tangible device enables direct and intuitive manipulation. It is obvious that the mobile computing will be more widespread and various kinds of new contents will emerge in near future. The proposed interface can be successfully employed for the new contents services that cannot be easily implemented because of the limitation of current input devices. It is also obvious that this kind of interface will be a critical component for future mobile communication environments. The proposed tangible interface will be further improved to be applied to various contents manipulation including 2D/3D games.

A Case Study on Pedagogical Tasks in Mathematics Curriculum Integrating Dynamic Manipulation Environments and the Role of a Teacher (동적조작 환경이 융합된 수학교과과정에서의 교수-학습 과제 사례 분석과 교사의 역할)

  • Hong, Seong-Kowan
    • School Mathematics
    • /
    • v.11 no.2
    • /
    • pp.281-299
    • /
    • 2009
  • In this paper, we show how dynamic manipulation environments can be integrated in the mathematics curriculum by presenting some pedagogical tasks manufactured by dynamic manipulation. These examples are composed to produce meaningful definitions through inductive experiments, to strengthen the thinking ability on continuity through the visualization, to make mathematics through investigation and finding, and to strengthen the ability of posing and generalizing problems. Through these examples students can observe the process of how mathematics is being invented, and they can experience how to solve mathematical problems using physical experiments in dynamic manipulation environments. When integration of dynamic manipulation into the teaching and learning of mathematics is applied, some difficulties can come out. To resolve such difficulties, a teacher must play the role of a co-worker of students in addition to the role of a scaffolder, coach, or close listener.

  • PDF

Development of a Home Gateway na a Management Server for Home Network Environments (홈 네트워크 환경에서 홈 게이트웨이와 관리 서버 개발)

  • Kwon Jinhyuck;Jung Jaeyun;Kim Hagbae
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.261-266
    • /
    • 2005
  • This paper proposes two systems. One is a Home Gateway(HG) which efficiently connects and controls digital appliances in the home network environments. The other is a Management Server(MS) that overcomes the physical limitation of the HG. The HG supports networking modules(TCP/IP for Ethernet, ADSL), home networking functions(HomePNA, IEEE1394 PLC) and telecommunication system(PSTN/SLT, VoIP, Video Communication). The HG is expected to be a core device for the integrated digital home environments. The MS is a dedicated server which manages and controls individual HG, home appliances and HA devices implemented at an area.

A Study on Mental Health Assessment and Mental Wellbeing Management System (멘탈헬스 측정 및 멘탈웰빙 관리시스템 기술개발 동향)

  • Kim, M.J.;Park, K.H.;Kim, J.S.;Kim, H.S.;Kwon, O.C.;Yoon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.5
    • /
    • pp.32-41
    • /
    • 2021
  • As the COVID-19 crisis continues, working environments and lifestyles have been changed unexpectedly, therefore the importance of mental health in the working environments has been highlighted. When the workers' mental health deteriorates, there will be personal losses but also human resources losses caused productivity decrements of the company or the organization. Many researchers have been tried to solve these issues with the help of ICT technologies such as wearable devices. Most wearable healthcare devices have been designed to detect the physiological status of users and collect the physical activities of users, and their applications are gradually expanding. Those devices may be good candidates to prevent loss of human resources from working environments especially under the COVID-19 situation by continuously monitoring mental health status in connection with mobile devices and managing the mental health on their own by combining mental well-being with support solutions. In this paper, the development trend of mental health measurement and mental well-being support technologies is analyzed, and development prospects are examined.

Virtual In-situ Sensor Calibration and the Application in Unitary Air Conditioners (유닛형 공기조화기 센서의 가상보정 방법 및 적용 특성 분석)

  • Yoon, Sungmin;Kim, Yong-Shik
    • Journal of the Korean Solar Energy Society
    • /
    • v.38 no.6
    • /
    • pp.65-72
    • /
    • 2018
  • Since data-driven building technologies have been widely applied to building energy systems, the accuracy of building sensors has more impacts on the building performance and system performance analysis. Various building sensors, however, can have typical errors including a random error (noise) and a systematic error (bias). The systematic error is indicated by the difference between the mean of measurements and their true value. It may occur due to the sensor's physical condition, measured phenomena, working environments inside the systems. Unfortunately, a conventional calibration method has limitations in calibrating the systematic errors because of the difference between working environments and calibration conditions. In such situations, a novel sensor calibration method is needed to handle various sensor errors, especially for systematic errors, in building energy systems having various thermodynamic environments. This study proposes a building sensor calibration method named Virtual In-situ Calibration (VIC) and shows how it is applied into a real building system and how it solves the sensor errors.

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 익명성을 보장하는 사용자 인증 및 키 동의 프로토콜 설계)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.3-12
    • /
    • 2006
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'smart space' augmented with intelligence and enhanced with services. However, unless privacy concerns are taken into account early in the design process of various ubiquitous devices(e.g. mobile devices, PDAs, sensors, etc.). we will end up crating ubiquitous surveillance infrastructure. Also, it may inappropriate to use public key techniques for computational constrained devices in ubiquitous computing environment. In this paper, we propose efficient user authentication and ky agreement protocol not only to preserve anonymity for protecting personal privacy but also to be suitable for computational constrained devices in ubiquitous computing environments.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey

  • Hong, Sung-Hyuck;Lim, Sun-Ho;Song, Jae-Ki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.805-821
    • /
    • 2011
  • Wireless Sensor Networks (WSNs) are rapidly emerging because of their potential applications available in military and civilian environments. Due to unattended and hostile deployment environments, shared wireless links, and inherent resource constraints, providing high level security services is challenging in WSNs. In this paper, we revisit various security attack models and analyze them by using a well-known standard notation, Unified Modeling Language (UML). We provide a set of UML collaboration diagram and sequence diagrams of attack models witnessed in different network layers: physical, data/link, network, and transport. The proposed UML-based analysis not only can facilitate understanding of attack strategies, but can also provide a deep insight into designing/developing countermeasures in WSNs.