• Title/Summary/Keyword: system identification

Search Result 5,875, Processing Time 0.028 seconds

Visualization of 3D Terrain Information on Smartphone using HTML5 WebGL (HTML5 WebGL을 이용한 스마트폰 3차원 지형정보 시각화)

  • Kim, Kwang-Seob;Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.2
    • /
    • pp.245-253
    • /
    • 2012
  • The public and civilian demands regarding 3D geo-spatial information processing on mobile device including smartphone are increasing. But there are few actual implementations or application cases. This work is to present some results by a prototype implementation of 3D terrain information visualization function with satellite image and DEM using HTML5 WebGL, which is a web-based graphic library under the standardization process. This is a useful standard for cross-platform operation for 3D graphic rendering without other plug-in modules. As the results, in the different types of operating system or browser in a personal computer or a smartphone, it shows same rendering results, as long as they support HTML5 WebGL. As well;geo-metadata search and identification functions for data sets for 3D terrain visualization process are added in this implementation for the practical aspect.

Identification of a Domain in Yeast Chitin Synthase 3 Required for Biogenesis of Chitin Ring, But Not Cellular Chitin Synthesis

  • Park Hyun-Sook;Park Mee-Hyun;Kim Chi-Hwa;Woo Jeeun;Lee Jee-Yeon;Kim Sung-Uk;Choi Wonja
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2000.10a
    • /
    • pp.39-45
    • /
    • 2000
  • It hab been proposed that CHS3-mediated chitin synthesis during the vegitative cell cycle is regulated by CHS4. To investigate direct protein-protein interaction between their coding products, we used yeast two hybrid system and found that a domain of Chs3p was responsible for interaction with Chs4p. This domain, termed MIRC3-4 (maximum interacting region of chs3p with chs4p), spans from 647 to 700 residues. It is well conserved among CHS3 homologs of various fungi such as Candida albicans, Emericella nidulans, Neurospora crassa, Magnaporthe grisea, Ustilago maydis, Glomus versiforme, Exophiala dermatitidis, Rhizopus microsporus. A series of mutaion in the MIRC3-4 resulted in no appearance of chitin ring at the early G 1 phase but did not affect chitin synthesis in the cell wall after cytokinesis. Absence of chitin ring could be caused either by delocalization of Chs3p to the septum or by improper interaction with Chs4p. To discriminate those two, not mutually exclusive, alternatives, mutants cells were immunostained with Chs3p-specific antibody. Some exhibited localization of chs3p to the septum, while others failed. These results indicate that simultaneous localization and activation Chs3p by Chs4p is required for chitin ring synthesis.

  • PDF

Phenomenological Study of the Lived Experience of Elderly People (현상학적 접근을 통한 노인의 삶의 경험)

  • Huang, Bo-Sun;Shin, Yu-Sun;Yun, Suk-Ok;Lee, Ji-Hyun;Jung, Kyung-Yim;Kim, Jung-Soon;Kim, Lee-Soon;Kim, Bok-Yong;Kang, Young-Mee
    • Research in Community and Public Health Nursing
    • /
    • v.6 no.2
    • /
    • pp.133-160
    • /
    • 1995
  • The purpose of this study was to understand the structure of the lived experience by poor elderly people. The research question was 'What is the structure of the lived experience of life of a poor elderly people.' The sample consisted of 21 single poor elderly persons in Pusan. The unstructured interviews were audio-recorded and analyzed using the Van Kaam method. This study was 368 responses which yielded of descriptive expressions and priority classifications. The result generated 74 common elements, 18 syntheses of hypothetical definitions and 5 identifications of the structural definition. The structural definitions and hypothetical definitions were as follows; 1. physical discomfort ; complaints of severe pain ; dysfunction of physical organs 2. emotional cognition ; despair ; resignation ; attitude toward death 3. support system ; interaction with family ; thinking about God ; economical difficulties ; expectancy of social services ; opinions about health service ; leisure ; interaction with neighborhood ; dissatisfaction due to inadequate environment 4. past reminiscence ; negative reminiscence of one's past ; past regret ; positive reminiscence of one's past 5. desire ; desire of unrealization life ; self satisfaction The significance of this study for nursing are; Comprehension of the lived experience of client and identification' of nursing approach method concerning the lifestyle of client.

  • PDF

DL Radio Transmission Technologies for WRAN Applications : Adaptive Sub-channel Allocation and Stationary Beamforming Algorithms for OFDMA CR System (WRAN 응용을 위한 하향링크 무선전송 방식 : OFDMA 상황인식 시스템에서의 적응 부채널 할당 및 고정 빔 형성 기법)

  • Kim Jung-Ju;Ko Sang-Jun;Chang Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3A
    • /
    • pp.291-303
    • /
    • 2006
  • In this paper, we analyze functional requirements of the IEEE 802.22 WRAN, and propose a downlink 프레임 structure satisfying the requirements. The proposed downlink 프레임 structure maximizes e transmission efficiency by adopting the cognative radio to assign the sub-channel by reflecting the channel environment of WRAN. We also calculate the signalling overhead for both downlink and uplink, and analyze the performances of time synchronization, frequency synchronization and cell identification based on the 프리앰블 in downlink and suggest the channel estimation method tough 프리앰블 or pilot. As a final result, e stationary beamforming (SBF) algorithm with dynamic channel allocation(DCA) is proposed. The proposed OFDMA downlink 프레임 structure with channel adaptive sub-channel allocation for cognitive radio applications is verified to meet the requirements of IEEE 802.22 WRAN, by computer simulations.

A Node Scheduling Control Scheme in Wireless Sensor Networks Inspired by Inter-Cell Signaling (생체 내 셀 간 신호 전달 체계를 모사한 지역적 협력 및 시스템 요구 성능 보장을 위한 무선 센서망의 노드 스케쥴링 제어)

  • Byun, Heejung;Son, Sugook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.3
    • /
    • pp.143-150
    • /
    • 2014
  • In this paper, we propose an energy efficient and delay guaranteed node scheduling scheme inspired by biological systems, which have gained considerable attention as a computing and problem solving technique. With the identification of analogies between cellular signaling systems and WSN systems, we formulate a new mathematical model that considers the networking challenges of WSNs. The proposed bio-inspired algorithm determines the state of the sensor node, as required by each application and as determined by the local environmental conditions and the states of the adjacent nodes. A control analysis shows that the proposed bio-inspired scheme guarantees the system stability by controlling the parameters of each node. Simulation results also indicate that the proposed scheme provides significant energy savings, as well as reliable delay guarantees by controlling the states of the sensor nodes.

An Energy Saving Protocol to Eliminate Overhearing Problem in Active RFID System (능동형 RFID 시스템에서 태그의 Overhearing을 제거하기 위한 에너지 절약 프로토콜)

  • Lee, Chae-Seok;Kim, Dong-Hyun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.1-11
    • /
    • 2013
  • Reducing the energy that consumed by tag is a key requirement for the wider acceptance of the active RFID systems that use battery constrained tags. When the reader is not interrogating, the active RFID standard protocols try to reduce energy consumption of tags by using sleep mode. On sleep mode tags is active by receiving a specific signals from reader, until tag receive a sleep mode command from the reader, a tag waste energy for remaining in RX mode. Overhearing is a state of a tag in which it wastes energy for maintaining active RX state while there is no frame destined to it. According to our analysis, the amount of energy consumed by a tag due to overhearing is several time larger than that consumed by the effective communication. We propose RANO(Reservation Aloha for No Overhearing) that is designed to inform a tag of its effective communication intervals to eliminate overhearing problem in active RFID communication. The performance of the proposed protocol was evaluated through the real world by changing the number of tags and size of data. The result of an experiment, the proposed protocol performed saving about 22 times less than the standard protocol did.

A Study on the Optimal Design of Polynomial Neural Networks Structure (다항식 뉴럴네트워크 구조의 최적 설계에 관한 연구)

  • O, Seong-Gwon;Kim, Dong-Won;Park, Byeong-Jun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.49 no.3
    • /
    • pp.145-156
    • /
    • 2000
  • In this paper, we propose a new methodology which includes the optimal design procedure of Polynomial Neural Networks(PNN) structure for model identification of complex and nonlinear system. The proposed PNN algorithm is based on GMDA(Group Method of Data handling) method and its structure is similar to Neural Networks. But the structure of PNN is not fixed like in conventional Neural Networks and can be generated. The each node of PNN structure uses several types of high-order polynomial such as linear, quadratic and cubic, and is connected as various kinds of multi-variable inputs. In other words, the PNN uses high-order polynomial as extended type besides quadratic polynomial used in GMDH, and the number of input of its node in each layer depends on that of variables used in the polynomial. The design procedure to obtain an optimal model structure utilizing PNN algorithm is shown in each stage. The study is illustrated with the aid of pH neutralization process data besides representative time series data for gas furnace process used widely for performance comparison, and shows that the proposed PNN algorithm can produce the model with higher accuracy than previous other works. And performance index related to approximation and prediction capabilities of model is evaluated and also discussed.

  • PDF

Design and Analysis of Social Network Service Model Using a Ubiquitous Business Card (RFID가 내재된 비즈니스 카드를 활용한 유비쿼터스 사회 연결망 서비스 모델 설계 및 분석)

  • Oh, Jae-Suhp;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.75-95
    • /
    • 2009
  • The aim of this research is to design and analyze a social network service model using mobile RFID based business card. This paper suggests how the behavior of exchanging business cards will be changed in ubiquitous environment and designs a social networking service model using a ubiquitous business card, which embeds a RFID tag. We describe the scenarios and analyze a role, value and potential benefits of participants of the u-SNS service model. For the proof of the superiority and the feasibility of our model, we compare it with its related researches and products based on the calculation of the benefits and costs of the alternatives.

  • PDF

Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks (무선 센서 네트워크에서 다중 공격 방어를 위한 보안 라우팅 기법)

  • Moon, Soo-Young;Cho, Tae-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.45-56
    • /
    • 2010
  • Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.

Detection Probability Evaluation of ORCOMM LEO Satellite AIS for Maritime-Terrestrial Integrated Wireless Communications (해상육상통합 무선통신환경에서 오브컴 저궤도위성 AIS시스템 성능평가)

  • Moon, Min-Woo;Kim, Kyung-Sung;Lee, Jin-Seok;Lee, Yeon-Woo;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.868-877
    • /
    • 2011
  • In this paper, the feasibility of ORBCOMM satellite-based automatic identification system (SAT-AIS) is evaluated in the context of ship AIS slot collision probability depending on reporting rate, We evaluate detection probability evaluation of ORBCOMM satellite-based AIS considering link budget, SOTDMA protocol and satellite's swath width. The simulation determines the total number of vessels served by ORBCOMM satellite according to satellite's swath width, AIS slot allocation and reporting rate. By simulation results, the ORBCOMM satellite-based AIS slot collision is increased directly proportional to the total number of vessels and the more detection probability evaluation of ORBCOMM satellite-based AIS degrader, the more sip AIS reporting rate shorter.