• Title/Summary/Keyword: Virtual System

Search Result 4,627, Processing Time 0.032 seconds

A study on the design method of tight fit Thorso patterns for adult males using fashion CAD system - Focusing on the sway back somatotype and the bend forward somatotype - (패션 CAD 시스템을 활용한 성인남성의 타이트 핏 토르소원형 설계방법 연구 - 휜체형과 숙인체형을 중심으로 -)

  • Hong, Eun-Hee
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.23 no.4
    • /
    • pp.149-166
    • /
    • 2021
  • This study tried to suggest a drafting method to draft tight fit torso patterns suitable for adult males with a sway back somatotype and a bend forward somatotype by setting and distributing the ease through the completion of the somatic surface pattern using the 3D body surface segment method. It was intended to be presented as a drafting method. As for the research method, the suitability of the somatic surface patterns and the tight fit torso patterns were confirmed by the evaluation of virtual wear, and the patterns were modified and supplemented. The research results are as follows. In the first evaluation of the tight fit torso patterns, the average, for 55 evaluation items, was 3.92 points for the sway back somatotype and 3.89 points for the bend forward somatotype. In the second evaluation, the bend forward somatotype was 4.51 points and the sway back somatotype was 4.62 points. The chest circumference ease amount for the bend forward somatotype and the sway back somatotype are 6.5% (6.8 cm) and 7% (6.8 cm) of the chest circumference, respectively, and the distribution of the front and back ease is the same at 4:6 (2.72 cm:4.08 cm). The waist circumference ease amount is 6.5% (5.8cm) and 6.5% (5.6 cm) of the waist circumference dimensions, and the distribution of the front and backease are 5:5 (1.45 cm: 1.45 cm) and 4:6 (2.24 cm: 3.36 cm), respectively. The completed tight fit torso patterns were converted into institutional formulas and presented as a drafting method.

Thread Block Scheduling for GPGPU based on Fine-Grained Resource Utilization (상세 자원 이용률에 기반한 병렬 가속기용 스레드 블록 스케줄링)

  • Bahn, Hyokyung;Cho, Kyungwoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.49-54
    • /
    • 2022
  • With the recent widespread adoption of general-purpose GPUs (GPGPUs) in cloud systems, maximizing the resource utilization through multitasking in GPGPU has become an important issue. In this article, we show that resource allocation based on the workload classification of computing-bound and memory-bound is not sufficient with respect to resource utilization, and present a new thread block scheduling policy for GPGPU that makes use of fine-grained resource utilizations of each workload. Unlike previous approaches, the proposed policy reduces scheduling overhead by separating profiling and scheduling, and maximizes resource utilizations by co-locating workloads with different bottleneck resources. Through simulations under various virtual machine scenarios, we show that the proposed policy improves the GPGPU throughput by 130.6% on average and up to 161.4%.

Current Status and Challenges of BGP Hijacking Security Threat (BGP 하이재킹 보안 위협 대응 현황 및 과제)

  • Han, Wooyoung;Hong, Yunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1525-1530
    • /
    • 2022
  • BGP(Border Gateway Protocol) is a routing protocol that is actively used in inter-AS routing on the Internet. However, BGP routing protocol is vulnerable to BGP hijacking attacks that hijack the network by impersonating normal BGP sessions. BGP Hijacking attacks can lead to causing intercept IP traffic or interference with the normal service operation. Recently, BGP hijacking attacks, which have often occurred overseas, have also occurred in Korea. It means threatening the security of the Internet. In this paper, we analyze the overall process of attack through representative attack cases and virtual scenarios of BGP hijacking and based on the results of analyzing the application status of security technology to prevent BGP hijacking attacks by Korea and global major ISPs. It covers the technical proposal of ISPs and autonomous system operators should take to defend against BGP hijacking attacks.

Numerical Analysis on Turning and Yaw Checking Abilities of KCS in Calm Water a Based on Free-Running Simulations (가상 자유 항주를 이용한 KCS 선형의 정수 중 선회 및 변침 성능 해석)

  • Yang, Kyung-Kyu;Kim, Yoo-Chul;Kim, Kwang-Soo;Yeon, Seong Mo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.1
    • /
    • pp.1-8
    • /
    • 2022
  • To understand physical phenomena of ship maneuvering deeply, a numerical study based on computational fluid dynamics is required. A computational method that can simulate the interaction between the ship hull, propeller, and rudder will provide informative local flows during ship maneuvering tests. The analysis of local flows can be applied to improve a physical model of ship maneuvering that has been widely used in maneuvering simulations. In this study, the numerical program named as WAVIS that has been developed for ship resistance and propulsion problems is extended to simulate ship maneuvering by free-running tests. The six degree-of-freedom of ship motion is implemented based on Euler angles and the overset technique is applied to treat the moving grid of ship hull and rudder. The propulsion force due to a propeller is calculated by a panel method that is based on the lifting-surface theory. The newly extended code is applied to simulate turning and zig-zag tests of KCS and the comparison with the available experimental data has been made.

Consensus-based Cooperative Control for multiple leaders and single follower with interaction nonlinearities (상호작용 비선형성이 있는 다중 리더와 단일 추종자를 위한 일치 기반의 협력 제어)

  • Tack, Han-Ho;Lim, Young-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1663-1669
    • /
    • 2021
  • This paper considers the cooperative control problem for multiple leaders and a single follower with interactions. The leaders are controllable, and the follower has interactions with all leaders and is controlled by the interactions. Then, we study the cooperative control problem that achieves the consensus by controlling the leaders. The leaders and the follower are modeled by the single-integrator and the double-integrator, respectively, and it is assumed that the interactions have the nonlinearities. The leaders can estimate the interaction between the follower and exchange the estimated information with neighbors. Then, this paper proposes the consensus-based cooperative control algorithm using the information exchange of the estimated interactions and the virtual velocity variables to achieve the velocity consensus. We analyze the convergence of the agents to the common state based on the Lasalle's Invaraince Principle. Finally, we provide the numerical example to validate the theoretical results.

Suggestion of Digital Technology Application for the Acupoints Education in Korean Medicine (한의학에서 경혈학 교육의 디지털 기술 적용에 대한 제안)

  • Kim, Sang Cheol;Kim, Jae Souk
    • Smart Media Journal
    • /
    • v.11 no.8
    • /
    • pp.55-64
    • /
    • 2022
  • In the recent education market, Edutech technology, in which various digital technologies are grafted into the education, is being actively applied due to the 4th industrial revolution and the development of ICT. In particular, realistic experiential learning contents that can provide realistic and immersive learning in a virtual space are in the spotlight and are being expanded to each field. However, in the field of Korean medicine education, the introduction of ICT is delayed due to the nature of Korean medicine, difficulties in apprenticeship education, quantitative education, and the absence of an objective evaluation system. Therefore, in this study, we propose a digital technology application for acupuncture and acupuncture points, where practice is particularly important in Korean medicine. Various methods of acupuncture and acupoints education using AR, MR, IoT and Touch-Display Table will provide an opportunity to change the paradigm of Korean medicine education and further contribute to the globalization of Korean medicine.

Digital Twin Model Design And Implementation Using UBS Process Data (UBS공정 데이터를 활용한 디지털트윈 모델 설계 및 구현)

  • Park, Seon-Hui;Bae, Jong-Hwan;Ko, Ho-Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.3
    • /
    • pp.63-68
    • /
    • 2022
  • Due to COVID-19, many paradigm shifts in existing manufacturing facilities and the expansion of non-face-to-face services are accelerating worldwide. A representative technology is digital twin technology. Such digital twin technology, which existed only conceptually in the past, has recently become feasible with the construction of a 5G-based network. Accordingly, this paper designed and implemented a part of the USB process to enable digital twins based on OPC UA communication, which is a standard interlocking structure, between real object objects and virtual reality-based USB process in accordance with this paradigm change. By reflecting the physical characteristics of real objects together, it is possible to simulate real-time synchronization of these with real objects. In the future, this can be applied to various industrial fields, and it is expected that it will be possible to reduce costs for decision-making and prevent dangerous accidents.

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

Visual Tracking Technique Based on Projective Modular Active Shape Model (투영적 모듈화 능동 형태 모델에 기반한 영상 추적 기법)

  • Kim, Won
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.77-89
    • /
    • 2009
  • Visual tracking technique is one of the essential things which are very important in the major fields of modern society. While contour tracking is especially necessary technique in the aspect of its fast performance with target's external contour information, it sometimes fails to track target motion because it is affected by the surrounding edges around target and weak egdes on the target boundary. To overcome these weak points, in this research it is suggested that PDMs can be obtained by generating the virtual 6-DOF motions of the mobile robot with a CCD camera and the image tracking system which is robust to the local minima around the target can be configured by constructing Active Shape Model in modular base. To show the effectiveness of the proposed method, the experiment is performed on the image stream obtained by a real mobile robot and the better performance is confirmed by comparing the experimental results with the ones of other major tracking techniques.

Development of a Packet-Switched Public Computer Network -PART 4:PAD Protocol and Network Management Software of the KORNET NNP (Packet Switching에 의한 공중 computer 통신망 개발 연구 -제4부:KORNET NNP의 PAD Protocol 및 Network Management Software의 구현)

  • Kim Sang Ryong;Geum Seong;Kim Je Woo;Oh Kyong Ae;Un Chong Kwan;Lee Jong Rak;Seo In Soo;Cho Dong Ho;Choi Jun Kyun
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.23 no.1
    • /
    • pp.10-19
    • /
    • 1986
  • This is the last part of the four-part describing the development of a packet-switched computer communication network named the KORNET. In this paper we describe the design and implementation of the packet assembler/dissassembler (PAD) protocol for the asynchronous channel service, and of the network management softwares. The line processing module-B(LPMB) system supporting the asynchronous line includes a PAD protocol, a packet mode DTE/DCE protocol converting to the X.25 protocol, and the asynchronous receiver/transmitter(ART) software. The network management software is operated in master central processing module(MCPM) which includes virtual circuit management (VCM) managing the user channel, the routing management and the high level protocol for communication between the network management center (NMC) and the network node processor(NNP). In this paper, the design, implementation and operation of the softwares for the above service functions will be described in detail.

  • PDF