• Title/Summary/Keyword: Round Architecture

Search Result 171, Processing Time 0.023 seconds

Evaluation on Non-liturgical Space of Catholic Churches from the Perspective of Universal Design - Focused on 6 Cases in Busan Parish - (유니버설 디자인 관점에서 성당 비전례공간 평가 - 부산교구 6개 사례를 중심으로 -)

  • Cho, Youn-Joo;Nam, Kyung-Hwa;Shin, Kyung-Joo
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.3
    • /
    • pp.38-47
    • /
    • 2015
  • This study evaluated non-liturgical space of catholic churches based on the four principles of universal design; accessible design, supportive design, safety-oriented design, and adaptable design. To design those spaces in terms of supportive design principle, diaper exchanging station needs to be placed in the restroom. Findings of this study are as follows: In terms of accessible design, valid width of entrance door to each room(more than 800mm), installation of elevator, height of riser in the stair, and width of step board were appropriate, but there were many spaces where door sils were not removed. In terms of supportive design, notice board at teacher's room and installation of storage closet, and width of passage to office(more than 1,200mm) were also appropriate, but storage closet at a meeting and prayer room, and space for storing flowers appeared inappropriate. To design those spaces in terms of supportive design principle, diaper exchanging station needs to be placed in the restroom. In terms of safety-oriented design, installation of round-edged furniture, use of non-slip flooring material, installation of safety emergency bell at a restroom, and installation of wall handle were required. In terms of adaptable design, space for wheelchair users at each room, installation of the furniture that can adjust the height, installation of desk with different height at an office, installation of toilet and basin considering children were considered to be necessary.

Design for Carbon Neutral Arboretum in Gwangju Metropolitan City (광주광역시 탄소중립 수목원 설계)

  • Kim, Hoon Hee
    • KIEAE Journal
    • /
    • v.9 no.3
    • /
    • pp.61-68
    • /
    • 2009
  • Gwangju Metropolitan Government & Ministry of Environment have signed a model city in response to Climate Change agreement. The agreement calls for Gwangju to cut greenhouse gas emissions 10% below 2005 levels by 2015. Gwangju has seen this agreement as an opportunity to cut pollution and conserve the environment as well as to reinvigorate local economy. According to policy of Gwangju, Gwangju held design competition for Gwangju City Arboretum on march, 2009. The purpose of design competition was to give a wide publicity to Gwangju as Hub City of Asian Culture and construct carbon-neutral arboretum in accordance with the policy of 'Low-Carbon and Green Growth'. First of all, a design concept of arboretum is 'winding, round, overlay 'to reflect the landscape of Nam-do which is surrounded by mountains and river flows through the village. Second, the arboretum has five different places with these themes - Forest of Festivals, Health, Nature, Nostalgia, Education and Future. Each place has a symbolic theme park and different flow planning respectively. Third, the most critical point is that the arboretum is a carbon-neutral park. Gwangju arboretum will soon be developed in metropolitan sanitary landfill and constructed as the O2 arboretum based on low carbon strategy. Fourth, the O2 arboretum suggests specialized issue : 'Energy Saving', 'Recycling System', 'Green Network', 'Water System(rainwater maintenance and wetland development)'. Besides, main buildings(greenhouse, visitor center, Nam-do experience exhibition hall, and forest museum) is designed in consideration of harmony with topography character, surroundings. Also, planting will be a multilayer plant based on native landscape trees in consideration of function and the growth characteristics.

A novel approach to the form-finding of membrane structures using dynamic relaxation method

  • Labbafi, S. Fatemeh;Sarafrazi, S. Reza;Gholami, Hossein;Kang, Thomas H.K.
    • Advances in Computational Design
    • /
    • v.2 no.3
    • /
    • pp.123-141
    • /
    • 2017
  • Solving a system of linear or non-linear equations is required to analyze any kind of structures. There are many ways to solve a system of equations, and they can be classified as implicit and explicit techniques. The explicit methods eliminate round-off errors and use less memory. The dynamic relaxation method (DR) is one of the powerful and simple explicit processes. The important point is that the DR does not require to store the global stiffness matrix, for which it just uses the residual loads vector. In this paper, a new approach to the DR method is expressed. In this approach, the damping, mass and time steps are similar to those of the traditional method of dynamic relaxation. The difference of this proposed method is focused on the method of calculating the damping. The proposed method is expressed such that the time step is constant, damping is equal to zero except in steps with maximum energy and the concentrated damping can be applied to minimize the energy of system in this step. In this condition, the calculation of damping in all steps is not required. Then the volume of computation is reduced. The DR method for form-finding of membrane structures is employed in this paper. The form-finding of the three plans related to the membrane structures with different loading is considered to investigate the efficiency of the proposed method. The numerical results show that the convergence rate based on the proposed method increases in all cases than other methods.

A High-Speed Hardware Design of IDEA Cipher Algorithm by Applying of Fermat′s Theorem (Fermat의 소정리를 응용한 IDEA 암호 알고리즘의 고속 하드웨어 설계)

  • Choi, Young-Min;Kwon, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.696-702
    • /
    • 2001
  • In this paper, we design IDEA cipher algorithm which is cryptographically superior to DES. To improve the encryption throughput, we propose an efficient design methodology for high-speed implementation of multiplicative inverse modulo $2^{15}$+1 which requires the most computing powers in IDEA. The efficient hardware architecture for the multiplicative inverse in derived from applying of Fermat's Theorem. The computing powers for multiplicative inverse in our proposal is a decrease 50% compared with the existing method based on Extended Euclid Algorithm. We implement IDEA by applying a single iterative round method and our proposal for multiplicative inverse. With a system clock frequency 20MGz, the designed hardware permits a data conversion rate of more than 116 Mbit/s. This result show that the designed device operates about 2 times than the result of the paper by H. Bonnenberg et al. From a speed point of view, out proposal for multiplicative inverse is proved to be efficient.

  • PDF

A Giant Sebaceous Epithelioma on the Scalp: A Case Report (두피에 발생한 거대 피지샘 상피종 1례)

  • Kim, Eun Yeon;Kim, Sun Goo;Kim, Yu Jin;Lee, Se Il
    • Archives of Craniofacial Surgery
    • /
    • v.13 no.1
    • /
    • pp.76-79
    • /
    • 2012
  • Purpose: Sebaceous epithelioma (sebaceoma) is a benign tumor with sebaceous differentiation. It presents primarily as a yellowish papule or nodule on the face and scalp. It must be differentiated from basal cell carcinoma and other appendageal tumors. We report a giant sebaceous epithelioma on the scalp and describe the immunohistochemical character of the cells in sebaceous epithelioma to epithelial membrane antigen (EMA). Methods: A 55-year-old-man who presented with 5-cm-diameter 2-cm-height, round shape exophytic ulcerated tumor on his head presented for treatment. The patient had noticed the lesion 40 years prior as a small yellowish plaque and 18 months ago, the plaque started to grow progressively larger. We excised the lesion with 1 cm resection margin, considering the possibility of malignancy because this lesion grossly resembled basal cell carcinoma (BCC). The defect was repaired with the use of a splitthickness skin graft. Results: When we excised the lesion, the margin was clear. Histology showed nodules that consisted of an admixture of basaloid cells and mature adipocytes lacking an organized lobular architecture. Strong expression of EMA on mature adipose cells confirmed the differential diagnosis from BCC with sebaceous differentiation because of the absence of a nuclear palisade pattern and cleft-like spaces on the hematoxylin and eosin (H&E) section. Conclusion: We treated the giant sebaceous epithelioma on the scalp with surgical excision and a split-thickness skin graft. It is important to know that the diagnosis of sebaceous epithelioma should be made based on the histologic pattern of the H&E section. Immunohistochemistry with EMA can help to confirm the differential diagnosis between sebaceous epithelioma and BCC.

DEVS 형식론을 이용한 다중프로세서 운영체제의 모델링 및 성능평가

  • 홍준성
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1994.10a
    • /
    • pp.32-32
    • /
    • 1994
  • In this example, a message passing based multicomputer system with general interdonnedtion network is considered. After multicomputer systems are developed with morm-hole routing network, topologies of interconecting network are not major considertion for process management and resource sharing. Tehre is an independeent operating system kernel oneach node. It communicates with other kernels using message passingmechanism. Based on this architecture, the problem is how mech does performance degradation will occur in the case of processor sharing on multicomputer systems. Processor sharing between application programs is veryimprotant decision on system performance. In almost cases, application programs running on massively parallel computer systems are not so much user-interactive. Thus, the main performance index is system throughput. Each application program has various communication patterns. and the sharing of processors causes serious performance degradation in hte worst case such that one processor is shared by two processes and another processes are waiting the messages from those processes. As a result, considering this problem is improtant since it gives the reason whether the system allows processor sharingor not. Input data has many parameters in this simulation . It contains the number of threads per task , communication patterns between threads, data generation and also defects in random inupt data. Many parallel aplication programs has its specific communication patterns, and there are computation and communication phases. Therefore, this phase informatin cannot be obtained random input data. If we get trace data from some real applications. we can simulate the problem more realistic . On the other hand, simualtion results will be waseteful unless sufficient trace data with varisous communication patterns is gathered. In this project , random input data are used for simulation . Only controllable data are the number of threads of each task and mapping strategy. First, each task runs independently. After that , each task shres one and more processors with other tasks. As more processors are shared , there will be performance degradation . Form this degradation rate , we can know the overhead of processor sharing . Process scheduling policy can affects the results of simulation . For process scheduling, priority queue and FIFO queue are implemented to support round-robin scheduling and priority scheduling.

  • PDF

A Review of the Survey Method of the Korean National Household Travel Survey: Focusing on the Comparison of International Cases

  • Gim, Tae-Hyoung Tommy;Cho, Hyung-Wook;Kim, Moon-Hyun;Park, Jae-Hee;Bayarsaikhan, Tsolmon;Joo, Hee-Soo
    • Land and Housing Review
    • /
    • v.13 no.1
    • /
    • pp.85-98
    • /
    • 2022
  • The increasing use of various types of data to capture travel behavior relatively discredits the utility of traditional national-scale household travel surveys. However, the surveys are still arguably meaningful in their clarification of purposes and means of travel. Accordingly, this study reviews travel survey cases and related literature, to identify the status of the Korean National Household Travel Survey (KNHTS). It discusses improving the KNHTS's survey method, focusing on its long investigation cycle, short survey period, reduction in sample size, and questionnaire format biased toward mandatory travel. To address these issues, this study suggests reducing the survey cycle, conducting a year-round survey, combining weekday and weekend surveys, and specifying items on nonmandatory travel. These practical suggestions duly consider the validity and reliability of the KNHTS within budget constraints and its applicability to related fields, such as tourism, public health, and sociology.

A Study on the Quality Deviation of High-Strength Concrete from Multiple Ready Mixed Concrete Companies (다수 레미콘사에서 납품된 콘크리트 품질 편차에 관한 연구)

  • Park, Dong-Cheon;Seok, Won-Kyun;Jeon, Hyun-Soo;Kim, Young-Sun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.6
    • /
    • pp.577-583
    • /
    • 2022
  • On large-scale sites, concrete is often delivered from a number of ready-mixed concrete companies, but even if the same concrete mixture table is used, it is thought that there will be a difference in quality due to differences in materials and manufacturing equipment. Due to a lack of previous research in this area, this study measured the properties of fresh concrete, compressive strength, and chlorine ion diffusion coefficient using the concrete supplied by 12 ready-mixed companies in Busan. The fresh concrete properties met the criteria. The compressive strength increased by 137% for 30MPa, 131% for 45MPa, and 117% for 80MPa by specified compressive strength. For the chlorine ion diffusion coefficient, the average value for each specified compressive strength could be derived without significant variation. The higher the compressive strength, the greater the deviation , and the lower the compressive strength, the greater the deviation in the chlorine ion diffusion coefficient.

Performance Evaluation of SDN Controllers: RYU and POX for WBAN-based Healthcare Applications

  • Lama Alfaify;Nujud Alnajem;Haya Alanzi;Rawan Almutiri;Areej Alotaibi;Nourah Alhazri;Awatif Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.219-230
    • /
    • 2023
  • Wireless Body Area Networks (WBANs) have made it easier for healthcare workers and patients to monitor patients' status continuously in real time. WBANs have complex and diverse network structures; thus, management and control can be challenging. Therefore, considering emerging Software-defined networks (SDN) with WBANs is a promising technology since SDN implements a new network management and design approach. The SDN concept is used in this study to create more adaptable and dynamic network architectures for WBANs. The study focuses on comparing the performance of two SDN controllers, POX and Ryu, using Mininet, an open-source simulation tool, to construct network topologies. The performance of the controllers is evaluated based on bandwidth, throughput, and round-trip time metrics for networks using an OpenFlow switch with sixteen nodes and a controller for each topology. The study finds that the choice of network controller can significantly impact network performance and suggests that monitoring network performance indicators is crucial for optimizing network performance. The project provides valuable insights into the performance of SDN-based WBANs using POX and Ryu controllers and highlights the importance of selecting the appropriate network controller for a given network architecture.

Analysis on Decryption Failure Probability of TiGER (TiGER의 복호화 실패율 분석)

  • Seungwoo Lee;Jonghyun Kim;Jong Hwan Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.157-166
    • /
    • 2024
  • Probability of decryption failure of a public key cryptography based on LWE(learning with errors) is determined by its architecture and parameter settings. Since large decryption failure probability leads to attacks[1] on scheme as well as degradation of performance, TiGER[2], a Ring-LWE(R)-based KEM proposed for the first round of KpqC, tried to reduce the decryption failure probability by using error correction code Xef and D2 encoding method. However, D'Anvers et al. has shown that the commonly assumed independence of each bit error is not established since in the case of an encryption scheme based on Ring-LWE(R) using an error correction code, there is error dependency which is not negligible[3]. In this paper, since TiGER does not consider the error dependency, we calcualte the decryption failure probability of TiGER by considering the error dependency. In addition, we found that the bit error probability is incorrectly calculated in TiGER, so we present the correct calculation.