• Title/Summary/Keyword: connection form

Search Result 680, Processing Time 0.027 seconds

A Study on the Characteristic of Interaction Model for Implementation of Richmedia Contents (리치미디어 컨텐츠 구현에 있어 상호작용 모델)

  • 김민수
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.201-210
    • /
    • 2004
  • The web as a sign synthesis text has become a kernel for incorporeal knowledge as well as a communication model through the ubiquitous environment all over the world. The evaluation of the communication model, which is essential for the information structure, acts as an important basis on determining the quality of the web contents. In this study, the development of the progress of the communication of semantic meaning in the construction of the information structure was analyzed in views of the form, the function, and the emotional effect of the rich media contents of the web. The transformation process from the initial access elements through the final selection elements was suggested as the communication model and the effects of the function of the information in the web on the process was assessed by the engineering and linguistic models of Shannon, Weaver, and Roman Jakobson. The results of this study showed that the environments such as the speed, the memory space, data compression technique, and data filtering have influences on the web contents expression and the evaluation of the communication model in connection with the environments is the basis in the information structure.

  • PDF

A method for various RFID reader processing based on Ontology (온톨로지 기반 다양한 RFID 리더 처리 방법)

  • No, Young-sik;Byun, Ji-Yoong;Yang, Moon-seok;Cha, Ji-Yun;Byun, Yung-cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.579-582
    • /
    • 2008
  • Since there are a lot of researches regarding RFID nowadays, the idea of RFID Middleware has great popular appeal to improve the efficiency of most use the data from RFID Readers. Even though, there are many RFID Middleware products and solutions in the developing processing, there are unsatisfied researches to manage RFID equipments effectively. In this paper, highly recommends a solution to support various RFID Readers from ALE-complient RFID Middleware in an efficient path of constructing Middleware Connection Information and data protocol form various RFID Readers as an ontology metadata. Therefore, not only reuses of RFID Reader Ontology, but also, by adding the ontology regarding additional RFID Reader and protocol data as a Middleware in a near future, it is able to extend to be treated easily.

  • PDF

A Study on the Character of Media space in Responses viewd through the Digital poetics (디지털 시학 관점으로 본 뉴미디어 시대 매체공간의 특성 연구)

  • Chung, Jae-Won
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.5
    • /
    • pp.217-226
    • /
    • 2012
  • The purpose of this study had started from trying to look for a new standard in new media era and sounding out possibility of perspective of digital poetry, and had been extracting interpretational elements based on characteristics of otology in digital poetics research in technical method. Through examination of many documentary records, we suggested interpretive elements of medial space based on meaning and the theory of digital poetics. We deduced three perspectives based on relationship between the basic thesis in poetics and interpretive elements of medial space. We used them as tool for analysis of example. We chose as an example that change of program in space is clear through connection of media and space in where new form of creation happens through digital instruments and chose article as subject to which digital technology is applied and had been since 2000, The result of this study is as following: First, epistemological analysis about a space of digital media in new media era requires poetical approach unlike aesthetic approach. We can endow creative action and creation process with significance and pay attention to technical method of manufacturing, stating appropriateness of perspective in digital poetics. Second, the justice of digital poetics and its basic thesis help derive analytic elements from medial space and study purpose of production, technical method, ontological characteristics, which are three perspectives of digital poetics. Third, it analyzed characteristics of example according to three perspectives above and we can analyze characteristics of spacial expression in space of digital media into potential, trans-active, and semiosis space. It would be possible through analyzing examples in digital poetic perspective to overlook new methods of design in 21th and various perspectives and possibilities of medial space design.

  • PDF

Estimation of Leak Frequency Function by Application of Non-linear Regression Analysis to Generic Data (비선형 회귀분석을 이용한 Generic 데이터 기반의 누출빈도함수 추정)

  • Yoon, Ik Keun;Dan, Seung Kyu;Jung, Ho Jin;Hong, Seong Kyeong
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.5
    • /
    • pp.15-21
    • /
    • 2020
  • Quantitative risk assessment (QRA) is used as a legal or voluntary safety management tool for the hazardous material industry and the utilization of the method is gradually increasing. Therefore, a leak frequency analysis based on reliable generic data is a critical element in the evolution of QRA and safety technologies. The aim of this paper is to derive the leak frequency function that can be applied more flexibly in QRA based on OGP report with high reliability and global utilization. For the purpose, we first reviewed the data on the 16 equipments included in the OGP report and selected the predictors. And then we found good equations to fit the OGP data using non-linear regression analysis. The various expectation functions were applied to search for suitable parameter to serve as a meaningful reference in the future. The results of this analysis show that the best fitting parameter is found in the form of DNV function and connection function in natural logarithm. In conclusion, the average percentage error between the fitted and the original value is very small as 3 %, so the derived prediction function can be applicable in the quantitative frequency analysis. This study is to contribute to expand the applicability of QRA and advance safety engineering as providing the generic equations for practical leak frequency analysis.

A Dual Slotted Ring Organization for Reducing Memory Access Latency in Distributed Shared Memory System (분산 공유 메모리 시스템에서 메모리 접근지연을 줄이기 위한 이중 슬롯링 구조)

  • Min, Jun-Sik;Chang, Tae-Mu
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.419-428
    • /
    • 2001
  • Advances in circuit and integration technology are continuously boosting the speed of processors. One of the main challenges presented by such developments is the effective use of powerful processors in shared memory multiprocessor system. We believe that the interconnection problem is not solved even for small scale shared memory multiprocessor, since the speed of shared buses is unlikely to keep up with the bandwidth requirements of new powerful processors. In the past few years, point-to-point unidirectional connection have emerged as a very promising interconnection technology. The single slotted ring is the simplest form point-to-point interconnection. The main limitation of the single slotted ring architecture is that latency of access increase linearly with the number of the processors in the ring. Because of this, we proposed the dual slotted ring as an alternative to single slotted ring for cache-based multiprocessor system. In this paper, we analyze the proposed dual slotted ring architecture using new snooping protocol and enforce simulation to compare it with single slotted ring.

  • PDF

Java API for Native ATM Services (순수 ATM 서비스를 제공하는 자바 API)

  • Seong, Jong-Jin;Lee, Geun-Gu;Kim, Jang-Gyeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1884-1896
    • /
    • 1999
  • In this paper, we propose an ATM API for Java pplication programming. The proposed Java ATM API is an extended form of java.net package of the Java Core API. Our Java ATM API is defined based on the ATM Forum's semantic standard for native ATM services, "Native ATM Service : Semantic Description, Version 1.0". IN order to provide native ATM services, we defined several new classes within the java.net package, including AtmAddress for AtmAddress, AtmSocket, ATM BLLI and AtmBHLI for Atm BLLI and BHLI information, AtmServerSocket, AtmMulticastSocket, AtmSocketImpl for socket programming over native ATM communication, and AtmConnAttr for native ATM connection characteristics. Software structure for construcing the Java ATM API over Winsock 2 environment and its implementation method are also presented.

  • PDF

An Experimental Study on the Behavior of T-type Modular Composite profiled Beams (T형 모듈단면 합성 프로파일보의 거동에 관한 실험적 연구)

  • Ahn, Hyung Joon;Lee, Seong Won;Ryu, Soo Hyun
    • Journal of Korean Society of Steel Construction
    • /
    • v.20 no.4
    • /
    • pp.539-548
    • /
    • 2008
  • This study aims to determine the applicability of the previously published T-type modular profile beam in the manner of producing specimens designed specially for the said purpose, determining their bending and shear behaviors depending on the presence of shear reinforcement, and analyzing the results in comparison with the theoretical equation of plastic deformation. The modular profile beam contributes to bending and shear resistance with the addition of the profile to the form function, and enhances the molding performance through the modular concept. The experimental results showed that the TS series specimens with shear reinforcement have bending behaviors superior to those of the T series specimens without shear reinforcement, which suggests that the used shear reinforcement appropriately bears the shear force. However, it was considered that all the specimens except for the T1-1 specimen failed to have adequate bending performance because of the intermodular slipping caused by the shear failure of the bolts. It is expected that further studies on the T-type modular profile beam, in which shear connectors will be considered as a variable,be performed to develop optimal intermodular connection methods.

The Production Process of Whole Garments and the Development Case of Knitwear - Focused on the SWG-X machine - (홀가먼트의 생산 공정과 니트웨어 개발 사례 - SWG-X 기종을 중심으로 -)

  • Lee, Insuk;Cho, Kyuhwa;Kim, Jiyoun
    • Journal of Fashion Business
    • /
    • v.17 no.1
    • /
    • pp.81-97
    • /
    • 2013
  • The purpose of this study is to summarize systematically and understand the characteristics of the production process of whole garments in order to develop knitwear using a real whole garment machine and propose this as a development case for high value added knitwear design. Concerning research methods, the study looked at existing research into whole garment knitwear and relevant data, data on websites, and the whole garment knitting machine made by Shima Seiki, a Japanese company, which has been the most commonly used machine in Korea. Also the study collected program data concerning a knitting machine and knitting by participating in the production process of whole garment knitwear, and the production line was filmed directly. In addition, the study conducted research into the development of knitwear design using the SWG-X 12 gauge. The conclusions obtained from the production process of whole garments and product development include the following. First, whole garment knitwear is appropriate for expressing a sophisticated look that makes the body appear to be in one form through natural connection without any seam allowance. Second, it is very suitable for response production since it does not go through the pattern, cutting, and processing stages. Furthermore, because of the consistent management of the entire process by computer control, it may be the highest cutting-edge fashion area in which planning and proposal style industry may be realizable. Third, it is easy to approach design through a programming process, and it is possible to develop diverse patterns; thereby, it is appropriate for producing high value added knitwear products.

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

A Study on Automation about Painting the Letters to Road Surface

  • Lee, Kyong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.75-84
    • /
    • 2018
  • In this study, the researchers attempted to automate the process of painting the characters on the road surface, which is currently done by manual labor, by using the information and communication technology. Here are the descriptions of how we put in our efforts to achieve such a goal. First, we familiarized ourselves with the current regulations about painting letters or characters on the road, with reference to Road Mark Installation Management Manual of the National Police Agency. Regarding the graphemes, we adopted a new one using connection components, in Gothic print characters which was within the range of acceptance according to the aforementioned manual. We also made it possible for the automated program to recognize the graphemes by means of the feature dots of the isolated dots, end dots, 2-line gathering dots, and gathering dots of 3 lines or more. Regarding the database, we built graphemes database for plotting information, classified the characters by means of the arrangement information of the graphemes and the layers that the graphemes form within the characters, and last but not least, made the character shape information database for character plotting by using such data. We measured the layers and the arrangement information of the graphemes consisting the characters by using the information of: 1) the information of the position of the center of gravity, and 2) the information of the graphemes that was acquired through vertical exploration from the center of gravity in each grapheme. We identified and compared the group to which each character of the database belonged, and recognized the characters through the use of the information gathered using this method. We analyzed the input characters using the aforementioned analysis method and database, and then converted into plotting information. It was shown that the plotting was performed after the correction.