• Title/Summary/Keyword: problem analysis

Search Result 16,365, Processing Time 0.045 seconds

Applying TRIZ Theory to Fashion Design - Focused on Rei Kawakubo's Fashion Design - (트리즈(TRIZ)이론에 의한 패션디자인의 적용 - 레이 가와쿠보의 패션디자인을 중심으로 -)

  • Kim, Sung Hyon;Kim, Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.62 no.7
    • /
    • pp.79-96
    • /
    • 2012
  • Creativity is a rising topic in the current society. The emphasis on creativity is valued as a key factor for success in all areas including but not limited to politics, economy, culture, arts and design. The field of Fashion design is probably one of the few areas that talk about creativity as a necessary quality to survive. The purpose of this study is to introduce TRIZ(Teoriya Reshniya Izobretatelsskikh Sadatch) as a theoretical tool to generate creativity in fashion design. TRIZ is a creative method of problem solving based on data analysis of outcomes invented by engineering. The fundamental concept of TRIZ has been researched through documentary studies, and practical case studies of product designs are used. Fashion design cases from Comme des Garcons by Rei Kawakubo are used to apply TRIZ in fashion design. Rei Kawakubo's design philosophy has been studied through fashion writings and visual sources in books, exhibition catalog, www. style. com and online shopping mall sites. This study has selected four principles among forty inventive theories of TRIZ: segmentation; asymmetry; consolidation; and preliminary action to apply to Rei Kawakubo's fashion design. As a result, TRIZ can be applicable to fashion design as a creative thinking methodology. By using the four principles of TRIZ, this study shows how Rei Kawakubo's design enhanced its efficiency and aesthetics of the products and was distinguished from existing items. It is meaningful to demonstrate a possibility of adopting engineering based creative methodology in fashion design to widen the perspective and to raise a question for the need of interdisciplinary creative methodology with traditional aesthetic approach in fashion design.

Analysis of Tidal Effect in Hangang Bridge by Automatic Discharge Measurement (자동유량측정에 의한 한강대교 조석영향 분석)

  • Lee, Min-Ho;Kim, Chang-Wan;Yoo, Dong-Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.7
    • /
    • pp.513-523
    • /
    • 2009
  • The measuring point of the Hangang Bridge affected by tide has some special topographic characteristics due to Nodle Island. Furthermore the submerged weirs located on the upstream and downstream. Therefore flow is separated and joined by Nodle Island. Discharge measurement at the point of the Hangang Bridge is very important, because Hangang Bridge is key station in managing the discharge and flood forecasting. In the past, it was too difficult to measure discharge in tidal conditions. HRFCO(Han River Flood Control Office) installed automatic discharge measurement facilities for solving this problem. Measuring equipments operates and measures discharge every 10 minutes at 2 points(southern and northern section close to Nodle Island), and calculates flow discharge using Chiu's velocity law(Chiu, 1988). In order to verify the results of automatic discharge measurements, manual discharge measurements were carried out by ADCP. In addition, the monthly discharge were also compared.

Molecular Taxonomy of a Soil Actinomycete Isolate, KCCM10454 Showing Neuroprotective Activity by 16S rRNA and rpoB Gene Analysis

  • Lee Bong Hee;Kim Hong;Kim Hyun Ju;Lim Yoon Kyu;Byun Kyung Hee;Hutchinson Brian;Kim Chang Jin;Ko Young Hwan;Lee Keun Hwa;Cha Chang Yong;Kook Yoon Hoh;Kim Bum Joon
    • Journal of Microbiology
    • /
    • v.43 no.2
    • /
    • pp.213-218
    • /
    • 2005
  • Epilepsy constitutes a significant public health problem, and even the newest drugs and neurosurgical techniques have proven unable to cure the disease. In order to select a group of isolates which could generate an active compound with neuroprotective or antiepileptic properties, we isolated 517 actinomycete strains from soil samples taken from Jeju Island, in South Korea. We then screened these strains for possible anti-apoptotic effects against serum deprivation-induced hippocampal cell death, using the 3-(4, 5-dimethylthiazol-2-yl)2,5-diphenyl-tetrazolium bromide (MTT) assay as an in vitro test. The excitotoxic glutamate analog, kainic acid (KA), was used to induce seizures in experimental mice in our in vivo tests. As a result of this testing, we located one strain which exhibited profound neuroprotective activity. This strain was identified as a Streptomyces species, and exhibited the rifampinresistant genotype, Asn$(AAC)^$442, according to the results of 16S rRNA and rpoB gene analyses

Detecting Members of P2P Botnets Using Probabilistic Dye-Pumping Algorithm (Probabilistic Dye-Pumping 알고리즘을 이용한 P2P 봇넷 멤버 탐지)

  • Choi, Seung-hwan;Park, Hyo-seong;Kim, Ki-chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.744-748
    • /
    • 2012
  • Botnet is a network that consists of bot hosts infected by malware. The C&C server of centralized botnet, which is being used widely, is relatively easy to detect, while detecting P2P botnet is not a trivial problem because of the existence of many avoiding techniques. In this paper, we separate the network into inner and outer sub-network at the location of the router, and analyze the method of detecting botnet using path of packet and infection probability. We have extended Dye-Pumping algorithm in order to detect P2P botnet members more accurately, and we expect that the analysis of the results can be used as a basis of techniques that detect and block P2P botnet in the networks.

  • PDF

AP and RADIUS server security and vulnerability analysis. (AP와 RADIUS서버 보안 및 취약점 분석)

  • Kim, Hyun Ho;Jang, WonTae;Jo, Jung Bok;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.241-244
    • /
    • 2013
  • These days wireless network devices (smartphones, tablet PC, laptop) are being utilized more frequently. In line with the increasing number of users of a wireless network, the usage of wireless access points is also increasing. Nowadays as nationwide wireless network services being made available, wireless networks are increasingly being used due to the lower costs of building faster and affordable private or carrier networks. However wireless security is not keeping up with this development. Many use open networks where anyone can join, meanwhile for those using wireless security protocols there is the problem of managing the password. In this paper, we analyze the problems of trying to build a user authentication system using an access point and the RADIUS server.

  • PDF

Analysis on the candidate number of channels to transmit second users in the myopic/CA method for dynamic spectrum access (동적 스팩트럼 접속을 위한 myopic/CA 방식에서 이차 사용자가 전송할 후보채널수에 대한 분석)

  • Yang, Geun-ho;Ma, Hwan-gu;Lee, Yutae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.401-403
    • /
    • 2013
  • Myopic method which is one of dynamic spectrum access method is an advantage that it maximizes immediate throughput is not complicated, and the simple and effective. The disadvantage of myopic method is that there may become less efficient because of conflicts between users secondary secondary user becomes many. Between the secondary if the secondary all users, select a channel to maximize the throughput of their own without considering the secondary other users, but it will try transfer secondary most users select the same channel collision will be more. Myopic / CA method has been proposed to solve this problem. Instead of selecting one channel to maximize their performance, select a candidate channels plurality of their advantage, the secondary user transfers to randomly selected channel that one in this way is a scheme. In this paper, we analyze whether it can be defined in a number of the channel number of candidates, depending on the network environment, maximizes the performance of the entire network.

  • PDF

Analysis of NCS Curriculum for Computer Science Major in the 4th Industrial Revolution (4차 산업혁명 시대의 컴퓨터과학 전공자를 위한 NCS 교육과정 분석)

  • Jung, Deok-gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.855-860
    • /
    • 2018
  • The IT technologies applying to IoT(Internet of Things), Big Data, and AI(Artificial Intelligence) are needed in the era of 4th industrial revolution. So, the IT convergence courses of computer science major which will be required in the companies in order to prepare the crises of 4th industry revolution are necessary. And, one approach to cope with this problem is the training of IT convergence man power based on NCS(National Competency Standard) education. In this paper, we propose and analyze the NCS education courses for computer science major in order to teach the students who are needed in the Korean domestic companies preparing the 4th industrial revolution. The skills and applications of Chatbot, Blockchain, and CPS(Cyber Physical System) for the post mobile and post Internet technologies are included in the proposed courses.

The Development of Electromagnetic Field Analysis Software for Virtual Training (가상 교육용 전자장 해석 프로그램 개발)

  • Wee, Sang Bong;Kim, Ki Beom
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.2
    • /
    • pp.55-60
    • /
    • 2010
  • We usually encounter Electro-magnetics phenomenons and only feel some part of that, but it is hard to feel it visually. Moreover understanding physically and quantitatively is not a easy work. These electrostatic field theory, magnetostatic field theory and interchange magnetic field theory combined with electromagnetic field are formulated experimentally and theoretically by James Clerk Maxwell in 1873. Electromagnetic field takes electro-magnetic phenomenons as a expansion of formula originated in Maxwell equations. Since this is based on expansion of formula, it is hard to understand for many students not only middle school and high school students learning it at the first time but also college students studying physics as a elementary class and even majors in electromagnetic field. The program is developed as a visual aid to cope with these problems, and even to deal with complex problem to estimate solution using numerical method.

  • PDF

Design and Implementation of a Protocol for Solving Priority Inversion Problems in Real-time OS (실시간 운영체제의 우선순위 역전현상 해결을 위한 프로토콜 설계 및 구현)

  • Kang, Seong-Goo;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.405-412
    • /
    • 2006
  • Real-time operating systems have been used in various computing environments, where a job must be completed in its deadline, with various conditions, such as effective scheduling policies, the minimum of an interrupt delay, and the solutions of priority inversion problems, that should be perfectly satisfied to design and develop optimal real-time operating systems. Up to now, in order to solve priority inversion problems among several those conditions. There have been two representative protocols: basic priority inheritance protocol and priority ceiling emulation protocol. However, these protocols cannot solve complicated priority inversion problems. In this paper, we design a protocol, called recursive priority inheritance (RPI), protocol that effectively solves the complicated priority inversion problems. Our proposed protocol is also implemented in the Linux kernel and is compared with other existing protocols in the aspect of qualitative analysis.

Tracking Algorithm For Golf Swing Using the Information of Pixels and Movements (화소 및 이동 정보를 이용한 골프 스윙 궤도 추적 알고리즘)

  • Lee, Hong, Ro;Hwang, Chi-Jung
    • The KIPS Transactions:PartB
    • /
    • v.12B no.5 s.101
    • /
    • pp.561-566
    • /
    • 2005
  • This paper presents a visual tracking algorithm for the golf swing motion analysis by using the information of the pixels of video frames and movement of the golf club to solve the problem fixed center point in model based tracking method. The model based tracking method use the polynomial function for trajectory displaying of upswing and downswing. Therefore it is under the hypothesis of the no movement of the center of gravity so this method is not for the amateurs. we proposed method using the information of pixel and movement, we first detected the motion by using the information of pixel in the frames in golf swing motion. Then we extracted the club head and hand by a properties of club shaft that consist of the parallel line and the moved location of club in up-swing and down-swing. In addition, we can extract the center point of user by tracking center point of the line between center of head and both foots. And we made an experiment with data that movement of center point is big. Finally, we can track the real trajectory of club head, hand and center point by using proposed tracking algorithm.