• Title/Summary/Keyword: multitude

Search Result 225, Processing Time 0.026 seconds

Effects of Ga Substitution in LaFe1-xGaxO3 (χ= 0, 0.1, 0.3, 0.5, and 0.7)

  • Yoon, Sung-Hyun;Park, Seung-Jin;Cha, Deok-Joon;Min, Byung-Ki;Kim, Chul-Sung
    • Journal of Magnetics
    • /
    • v.7 no.2
    • /
    • pp.40-44
    • /
    • 2002
  • Crystallographic and magnetic properties of ;$LaFe_{1-x}Ga_xO_3$($\chi$= 0, 0.1, 0.3, 0.5, and 0.7) were studied using XRD and Mossbauer spectroscopy. The crystal structures were found to be orthorhombic and the lattice parameters $\alpha$, b, and c were found to decrease with increasing Ga substitution. M$\ddot{o}$ssbauer spectra were obtained at various absorber temperatures ranging from 20 K to 750 K. The M$\ddot{o}$ssbauer spectra were all sextets below $T_N$ and were all singlets above $T_N$. Asymmetric broadening of the M$\ddot{o}$ssbauer spectral lines at 20 K was explained by the multitude of possible environments for an iron nucleus. As the temperature increases to $T_N$, a systematic line broadening in M$\ddot{o}$ssbauer spectra was observed and interpreted to originate from different temperature dependencies of the magnetic hyperfine fields at various iron sites.

Connection Alternatives and Integrated Architecture (SDR 기반 무선 혼합망에서 연결성 대안 및 통합 아키텍쳐)

  • Jang, Suk-Ki;Park, Kwang-Chae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.589-592
    • /
    • 2005
  • The ubiquitous environment of the future has to exploit this multitude of connectivity alternatives resulting from diverse wireless communication systems and different access technologies to provide useful services with guaranteed quality to users. New applications require a ubiquitous environment capable of accessing information from different potable devices at any time and everywhere. This has motivated researchers to integrate various wireless platforms such as cellular networks., WLANs, and MANETs. Integration of different technologies with different capabilities and functionalities is an extremely complex task and involves issues at all layer of the protocol stack. This article compares and discusses a connection alternatives and integrated architecture in network layer for a SDR-based heterogeneous wireless network.

  • PDF

A Study of an Efficient Retrieval System Algorithm using a Text Mining (텍스트마이닝 기술을 이용한 효율적인 검색시스템 알고리즘에 대한 연구)

  • Kim, Je-Seok;Kim, Jang-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.531-534
    • /
    • 2005
  • Currently some problems are presented by the enlargement of network range and hardware upgrade for the solutions for network traffic and treatment speed of server processing, as well as the resource of networks and increasing speed of on-line information that is exceeding in operation limit of existing information systems. The study proposes the Architecture, an organic unification system of optimized content for retrieval, which is adapted to variable points of view of users or content changes of document aggregation by the study of algorithm, which offers easy retrieval of the location of documents on a multitude of on-line data.

  • PDF

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

A Study on the Scythian Buckle

  • Kim, Moon-Ja
    • Journal of Fashion Business
    • /
    • v.10 no.6
    • /
    • pp.38-51
    • /
    • 2006
  • In Scythian art the multitude of animal representations well illustrates the preoccupation of this nomadic people with animals in their environment. Usually only wild animals are represented. The purpose and meaning of the animal motifs used in Scythian ornaments appears that in some cases the work was intended to be purely ornamental, while many times the motifs had symbolic meaning (such as the successful dominance of the aggressor over the victim portrayed in the attack scenes). Following earlier Scythian migrations, Sarmatian animal-style art is distinguished by complex compositions in which stylized animals are depicted twisted or turned back upon themselves or in combat with other animals. Without copying nature, they accurately conveyed the essence of every beast depicted. Scythian bound the leather belts that was hanged a hook that shaped of different kinds at the end on the upper garment. Through the antique records and tombs bequests the styles of Scythian Buckles was divided into six groups, animal-shaped, animal's head shaped, animal fight-shaped, rectangle-shaped, rectangle openwork-shaped, genre scene shaped Buckle. In Korea, through the antique records and tombs bequests the styles of Buckles was horse-shaped and tiger-shaped Buckles that were influenced by scythe style.

Software Effort Estimation Using Artificial Intelligence Approaches (인공지능 접근방법에 의한 S/W 공수예측)

  • Jun, Eung-Sup
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.616-623
    • /
    • 2003
  • Since the computing environment changes very rapidly, the estimation of software effort is very difficult because it is not easy to collect a sufficient number of relevant cases from the historical data. If we pinpoint the cases, the number of cases becomes too small. However if we adopt too many cases, the relevance declines. So in this paper we attempt to balance the number of cases and relevance. Since many researches on software effort estimation showed that the neural network models perform at least as well as the other approaches, so we selected the neural network model as the basic estimator. We propose a search method that finds the right level of relevant cases for the neural network model. For the selected case set, eliminating the qualitative input factors with the same values can reduce the scale of the neural network model. Since there exists a multitude of combinations of case sets, we need to search for the optimal reduced neural network model and corresponding case set. To find the quasi-optimal model from the hierarchy of reduced neural network models, we adopted the beam search technique and devised the Case-Set Selection Algorithm. This algorithm can be adopted in the case-adaptive software effort estimation systems.

  • PDF

Effects of Eco-Friendly School Project Activity on Middle School Students' Environmental Awareness (친환경학교 가꾸기 프로젝트 활동이 중학생의 환경 인식에 미치는 영향)

  • Son, Mi-Hee;Park, Hye-Gyeong;Cheong, Cheol
    • Hwankyungkyoyuk
    • /
    • v.24 no.3
    • /
    • pp.34-43
    • /
    • 2011
  • Project-based learning is an innovative approach to learning that teaches a multitude of strategies critical for success in the twenty-first century. Students drive their own learning through inquiry activity, as well as work collaboratively to research and create projects that reflect their knowledge. The purpose of this study was to investigate the effects of eco-friendly school project activity which is applied from one of project-based learning approach on learning outcomes of students in ninth-grade environment course in middle school. The participants were given a questionnaire before and after the environmental project activities. In solving the school environment issues themselves, students have practiced invaluable problem solving skills. This study indicates that school students' awareness about the environment has positively changed by experiencing the eco-friendly school project. In addition, this project affects students' variety of environmental awareness. This project could be applied to school environmental education programs and to environment lessons, developmental activities or club activities for a positive impact on students' environmental awareness.

  • PDF

The use of mobile computing devices in microsurgery

  • Pafitanis, Georgios;Hadjiandreou, Michalis;Miller, Robert;Mason, Katrina;Theodorakopoulou, Evgenia;Sadri, Amir;Taylor, Kirsten;Myers, Simon
    • Archives of Plastic Surgery
    • /
    • v.46 no.2
    • /
    • pp.102-107
    • /
    • 2019
  • Mobile computing devices (MCDs), such as smartphones and tablets, are revolutionizing medical practice. These devices are almost universally available and offer a multitude of capabilities, including online features, streaming capabilities, high-quality cameras, and numerous applications. Within the surgical field, MCDs are increasingly being used for simulations. Microsurgery is an expanding field of surgery that presents unique challenges to both trainees and trainers. Simulation-based training and assessment in microsurgery currently play an integral role in the preparation of trainee surgeons in a safe and informative environment. MCDs address these challenges in a novel way by providing valuable adjuncts to microsurgical training, assessment, and clinical practice through low-cost, effective, and widely accessible solutions. Herein, we present a review of the capabilities, accessibility, and relevance of MCDs for technical skills acquisition, training, and clinical microsurgery practice, and consider the possibility of their wider use in the future of microsurgical training and education.

Enhancing Work Trade Image Classification Performance Using a Work Dependency Graph (공정의 선후행관계를 이용한 공종 이미지 분류 성능 향상)

  • Jeong, Sangwon;Jeong, Kichang
    • Korean Journal of Construction Engineering and Management
    • /
    • v.22 no.1
    • /
    • pp.106-115
    • /
    • 2021
  • Classifying work trades using images can serve an important role in a multitude of advanced applications in construction management and automated progress monitoring. However, images obtained from work sites may not always be clean. Defective images can damage an image classifier's accuracy which gives rise to a needs for a method to enhance a work trade image classifier's performance. We propose a method that uses work dependency information to aid image classifiers. We show that using work dependency can enhance the classifier's performance, especially when a base classifier is not so great in doing its job.

An Efficient Detection and Management Technique of Misbehavior nodes in Ad-hoc Networks (Ad-hoc 네트워크에서의 효율적인 비정상행위 노드 탐지 및 관리 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.71-80
    • /
    • 2009
  • Ad-hoc network consists f mobile nodes, which they are together in the communication. However, if some misbehaving nodes are in network, it is faced to many threats. Therefore, detection and management of misbehaving node are necessary to make confident in Ad-hoc networks. To solve this problem, we use Node Weight Management Server(NWMS), which it manage each node's weight in local area. When NWMS detect misbehaving node, it adds the node's weight and if the node's weight exceeds threshold then NWMS broadcasts the node's information to isolate in network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.