• Title/Summary/Keyword: digital capacity

Search Result 710, Processing Time 0.032 seconds

A Study on the Culture Marketing Using the "Digital Costume Avatar"

  • Kim, Young-Sam
    • Proceedings of the Korea Society of Costume Conference
    • /
    • 2003.10a
    • /
    • pp.77-77
    • /
    • 2003
  • If we look closely to the power shift of the powerful countries historically. during the 16th century Spain's power came from gold, colony trade, the mercenary force, close relation with the thrown, 17th century Netherlands owes their power to trade, capital market, the marines, 18th century France owes it to population, agriculture, public administration, and the army. Also, England had their industry, political unity, finance and trust, the marines, liberalistic principles, a geographical merit of being an island which can be defended well and the 20th century America has their cosmopolitan culture, supernational communication, the capacity of the economy, science technology, military strength, alliances, liberalism international formation. But in the 21st century culture and art will prevail over the information age where technology and knowledge was the key, and it is predicted that this will be the source of power for a strong country. Rolfe Yesson, the head of The Copenhagen Research Center for future studies said, "Information age has ended and in the future Dream Society will arrive which focuses on making distinctions by delivering dreams and emotions to consumers". As cyberspace gradually substitutes reality, cyberspace has become more than an information search engine and has become a place where people fulfill their desires and exchange culture. And as a medium for diffusing culture, the importance of the digital dress-up avatar is predicted to increase gradually.gradually.

  • PDF

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

Generalized User Selection Algorithm im Downlink Multiuser MIMo System (하향링크 다중 사용자 MIMO 시스템에서의 일반화된 사용자 선택 알고리즘)

  • Kang, Dae Geun;Shin, Change Ui;Kuem, Dong Hyun;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.99-105
    • /
    • 2012
  • Recently, there are many user selection algorithms in multi user multiple-input multiple-output (MU-MIMO) systems. One of well-known user selection methods is Semi orthogonal user selection (SUS). It is an algorithm maximizing channel capacity. However, it is applicable only when user's antenna is one. We propose a generalized user selection algorithm regardless of the number of user's antennas. In the proposed scheme, Base station (Bs) selects the first user who has the highest determinant of channel and generates a user group that correlation with first user's channel is less than allowance of correlation. Then, each determinant of channels made up of first user's channel and a user's channel in the generated group is calculated and BS selects the next user who has the highest determinant of that. BS selects following users by repeating above procedure. In this paper, we get better performance because of selecting users who have the highest determinant of channel as well as allowance of correlation optimally calculated through matrix operations.

Evaluation on the Horizontal Alignment of Road Centerline using GIS Programming (GIS 프로그래밍을 이용한 도로중심선 평면선형 평가)

  • Kim, Dong-Ki;Choi, Se-Hyu
    • International Journal of Highway Engineering
    • /
    • v.14 no.1
    • /
    • pp.1-8
    • /
    • 2012
  • The horizontal alignment of road is deeply related with the stability of the road and traffic capacity. It is necessary to analyze horizontal alignment of road accurately for efficient maintenance of the road and relevance judgment about the standard. Recently the study on horizontal alignment of road using Lidar data and GPS was concluded, but they were many problem analyzing horizontal alignment radius of curvature in wide area. In this study, the tool which the radius of curvature can evaluate the suitability about "Rules about the Road Structure & Facilities Standards" by using center lines of the road of the digital map tries to implement on GIS. The interface was designed and implemented which can automatically estimate the Road Centerline Horizontal Alignment by using $ESRI^{(R)}$ $ArcObject^{TM}$.

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks (무선 센서 네트워크를 위한 에너지 효율적인 계층적 클러스터링 알고리즘)

  • Cha, Si-Ho;Lee, Jong-Eon;Choi, Seok-Man
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.29-37
    • /
    • 2008
  • Clustering allows hierarchical structures to be built on the nodes and enables more efficient use of scarce resources, such as frequency spectrum, bandwidth, and energy in wireless sensor networks (WSNs). This paper proposes a hierarchical clustering algorithm called EEHC which is more energy efficient than existing algorithms for WSNs, It introduces region node selection as well as cluster head election based on the residual battery capacity of nodes to reduce the costs of managing sensor nodes and of the communication among them. The role of cluster heads or region nodes is rotated among nodes to achieve load balancing and extend the lifetime of every individual sensor node. To do this, EEHC clusters periodically to select cluster heads that are richer in residual energy level, compared to the other nodes, according to clustering policies from administrators. To prove the performance improvement of EEHC, the ns-2 simulator was used. The results show that it can reduce the energy and bandwidth consumption for organizing and managing WSNs comparing it with existing algorithms.

Hash Tree based Communication Protocol in V2X Environments Including Internet of Vehicles for Providing Secure Vehicular Communication Services (차량인터넷을 포함한 V2X 환경에서 안전한 차량 통신 서비스 제공을 위한 해시 트리 기반 통신 프로토콜)

  • Jin, Byungwook;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.27-34
    • /
    • 2018
  • Various messages generated in vehicles are transmitted based on the wireless telecommunication which is a core technology of vehicle to everything (V2X). However, the hackers attack them upon penetration to the system and network to cause the generation of users' inconveniences for vehicular communication. Moreover, huge damage could be occurred in terms of physical and materialistic areas if the users in the vehicles were attacked in the communication environment. Therefore, this study was to design the safe communication protocol using hash tree technique in the V2X environments. Using hash tree technique, processes of issuing certificate and registration and communication protocol were designed, and safety analysis was performed on the attacking technique which is occurred in the existing vehicles. Approximately 62% of decrease in the capacity analysis was found upon comparative analysis of telecommunication processes with the system to issue the certificate which is used in the existing vehicles.

Construction of Multichannel Analyser with Successive Approximation Type ADC (방사선 에너지 분석을 위한 MCA시스템 제작에 관한 연구)

  • Yook, Chong-Chul;Oh, Byung-Hoon;Kim, Young-Gyoon
    • Journal of Radiation Protection and Research
    • /
    • v.12 no.1
    • /
    • pp.12-25
    • /
    • 1987
  • A basic multichannel analyser (MCA) system have been designed and constructed with the successive approximation type ADC (Analog to Digital Converter). Linear Gate, window, and palse stretcher consist of mainly linear and logic IC's, and are properly combined together to achieve short dead time and good linearity of the system. ADC 1211 (analysing time: $120{\mu}sec$) and S-RAM (static random acess memory) 6264 are used in ADC module. Two 6264 memories are connected in parallel in order to-provide enough counting capacity ($2^{16}-1$). Interfaced microcomputer Apple II controls this system and analizes the counted data. The system is tested by input pulses between 0V to 10V from oscillator.

  • PDF

A Study on the PBL Based Teaching-Learning Model Using BIM Tools for Interior Architecture Design Studio (BIM활용 문제중심학습기반 실내건축 설계수업 교수-학습모형에 관한 연구)

  • Han, Young-Cheol
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.12 no.3
    • /
    • pp.67-79
    • /
    • 2012
  • The purpose of this study is to suggest the interior architecture design studio through the pedagogical method of educational technology for college students who lack self-directed learning. The pedagogical method has been organized to make a student-centered class based on the operation of existing architectural design studios. This teaching and learning method emphasizes the role of teachers as facilitators to help students lacking in self-directed learning in the design process, the BIM visualization to give students an expression of design project and the critics to give students an experience of working circumstances. The results of this study can be summarized as follows. First, This pedagogical model can improve the self-directed learning of students, accomplish the design process well through teamwork, and provide problem based learning (PBL) to settle obstacles that come up during the project. Second, through this model, students can improve their field design capacity by instructor, design feedback and criticism. Finally, This model can suggest new pedagogical methods for interior architectural design studios and management of student-centered studios.

Estimation of Strength and Pore Structure of Alkali-Activated Fire Protection Materials at High Temperature (고온에서의 알칼리 활성화 내화성 결합재의 강도 및 공극구조 평가)

  • Song, Hun;Kim, Young-Ho;Kim, Wan-Ki;So, Hyung-Suk
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.12 no.4
    • /
    • pp.59-66
    • /
    • 2012
  • This study is interested in identifying the effectiveness of alkali-activated fire protection material compounds including the alkali-activator such as potassium hydroxide, sodium silicate and fly ash as the fire resistant finishing materials. Also, this paper is concerned with change in compressive strength and pore structure of the alkali-activated fire protection material at high temperatures. The testing methods of fire protection materials in high temperature properties are make use of TG-DSC and mercury intrusion porosimetry measurements. This study results show that compressive strength is rapidly degraded depending on a rise of heating temperature. Porosity showed a tendency to increase irrespective of specimen types. This is due to both the outbreak of collapse of gel comprising the cement and a micro crack by heating. However, alkali-activated fire protection material composed of potassium hydroxide, sodium silicate and fly ash has the thermal stability of the slight decrease of compressive strength and porosity at high temperature. These thermal stability is caused by the ceramic binding capacity induced by alkali activation reaction by the reason of the thermal analysis result not showing the decomposition of calcium hydrate.

Development of a Real-time Simulation Method for the Utility Application of Superconducting power Devices (PART 1 : HIS Power Cable) (초전도 전력기기의 계통적용을 위한 실시간 시뮬레이션 기법 개발 (PART 1 : 고온초전도 전력 케이블))

  • Kim, Jae-Ho;Park, Min-Won;Park, Dae-Jin;Kang, Jin-Ju;Cho, Jeon-Wook;Sim, Ki-Deok;Yu, In-Keun
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.19 no.11
    • /
    • pp.1055-1060
    • /
    • 2006
  • High temperature superconducting(HTS) power cable is expected to be used for power transmission lines supplying electric power for densely populated cities in the near future. Since HTS power cable is capable of the high current density delivery with low power loss, the cable size can be compact comparing with the conventional cable whose capacity is same. In this paper, the authors propose the real time simulation method which puts a teal HTS wire into the simulated 22.9 kV utility grid system using Real Time Digital Simulator (RTDS). For the simulation analysis, test sample of HTS wire was actually manufactured. And the transient phenomenon of the HTS wire was analyzed in the simulated utility power grid. This simulation method is the world first trial in order to obtain much better data for installation of HTS power device into utility network.