Purpose: The goal of this paper is to present the design and performance of a position encoding circuit for $16{\times}16$ array of position sensitive multi-anode photomultiplier tube for small animal PET scanners. This circuit which reduces the number of readout channels from 256 to 4 channels is based on a charge division method utilizing a resistor array. Materials and Methods: The position encoding circuit was simulated with PSpice before fabrication. The position encoding circuit reads out the signals from H9500 flat panel PMTs (Hamamatsu Photonics K.K., Japan) on which $1.5{\times}1.5{\times}7.0\;mm^3$$L_{0.9}GSO$ ($Lu_{1.8}Gd_{0.2}SiO_{5}:Ce$) crystals were mounted. For coincidence detection, two different PET modules were used. One PET module consisted of a $29{\times}29\;L_{0.9}GSO$ crystal layer, and the other PET module two $28{\times}28$ and $29{\times}29\;L_{0.9}GSO$ crystal layers which have relative offsets by half a crystal pitch in x- and y-directions. The crystal mapping algorithm was also developed to identify crystals. Results: Each crystal was clearly visible in flood images. The crystal identification capability was enhanced further by changing the values of resistors near the edge of the resistor array. Energy resolutions of individual crystal were about 11.6%(SD 1.6). The flood images were segmented well with the proposed crystal mapping algorithm. Conclusion: The position encoding circuit resulted in a clear separation of crystals and sufficient energy resolutions with H9500 flat-panel PMT and $L_{0.9}GSO$ crystals. This circuit is good enough for use in small animal PET scanners.
The Transactions of the Korea Information Processing Society
/
v.5
no.10
/
pp.2575-2583
/
1998
The productionof the highly relible softwae systems and theirs performance evaluation hae become important interests in the software industry. The software evaluation has been mainly carried out in ternns of both reliability and performance of software system. Software reliability is the probability that no software error occurs for a fixed time interval during software testing phase. These theoretical software reliability models are sometimes unsuitable for the practical testing phase in which a software error at a certain testing stage occurs by causes of the imperfect debugging, abnornal software correction, and so on. Such a certatin software testing stage needs to be considered as an outlying stage. And we can assume that the software reliability does not improve by means of muisance factor in this outlying testing stage. In this paper, we discuss Bavesian software reliability growth modeling and estimation procedure in the presence of an imidentitied outlying software testing stage by the modification of Jehnski Moranda. Also we derive the Bayes estimaters of the software reliability panmeters by the assumption of prior information under the squared error los function. In addition, we evaluate the proposed software reliability growth model with an unidentified outlying stage in an exchangeable model according to the values of nuisance paramether using the accuracy, bias, trend, noise metries as the quantilative evaluation criteria through the compater simulation.
Variable Message Sign (VMS), which provides drivers with direct information about state of traffic congestion and for prevent an accident, is the most effective method among the methods of providing information in Advanced Transportation Management System. Currently establishment and the VMS which is operated foundation lets in Guidelines on the use of Variable message sign (a book of the VMS) of 1999 November the Ministry Construction & Transportation, these contents mean main viewpoint on physical part such as message special quality variable (font, character size and line space, word interval) and position mainly among standard about establishment in general. But, it is true that using without effect verification on the character of VMS display and that using mode of stationary-centered. In this paper, it executed significance test to effort verification on the character of VMS display for more practical and effective information transmission based on the driver viewpoint For the researches; develop 3D-Simulation, select characteristics of driver's visual cognition behavior (the conspicuity, the legibility and the comprehensibility), evaluation each issue (day or night, 80km/h or 100km/h). Especially, that used the Eye Marker Recorder to measure of reading-time (legibility) thus, confirmed objectivity and reduce an observational error. The results showed that the conspicuity is Flashing> Stationary>Scroll. The legibility is not deference that Flashing between stationary form. Also the comprehensibility result showed that Flashing> Stationary>Stroll form.
KSCE Journal of Civil and Environmental Engineering Research
/
v.36
no.6
/
pp.1075-1082
/
2016
In order to calculate the optimum installation interval between a speed hump and hump type crosswalk that are installed continuously in succession, this study examined the speed of a vehicle that passes different intervals between speed humps and hump type crosswalks from the approach section of a roundabout having a maximum speed limit of 30km/h; analyzed the effects of speed humps and hump type crosswalks installed continuously in succession on vehicle driving speed; and simulated the optimum installation height of hump type crosswalk. As a result, the following conclusion was drawn. First, it was found that the optimum interval between a speed hump and hump type crosswalk, which are the representative traffic calming techniques for reducing vehicle speed, to control vehicle speed under 30km/h is 30m. Second, as a result of comparing the deceleration of a vehicle that pass hump type crosswalks, it was found that if the installation interval is 65 m and above, a speed hump and hump type crosswalk had no effect. Therefore, it is desirable that the maximum installation interval between a speed hump and hump type crosswalk for controlling vehicle speed within a fixed road section should not exceed 65m. Third, the analysis showed that the optimum installation height of hump type crosswalk is 6-8cm in case vehicle speed at the approach section is 20km/h or lower, 8-10cm in case of 30km/h, and 10cm in case of 30km/h or higher, respectively. Fourth, even at a road section on which a speed hump and hump type crosswalk are installed, speed reduction effects may sometimes be insignificant due to a driver's studying effect, traffic conditions and so on. Thus, it is judged that speed reduction effects will be greater if several traffic calming techniques such as speed hump, chicane, and choker are applied at the same time. Therefore, in case of applying traffic calming techniques for the purpose of reducing vehicle speed in order to promote pedestrian safety, the composite application of several techniques should be considered.
Journal of the Korean Society for Marine Environment & Energy
/
v.18
no.2
/
pp.94-101
/
2015
To mitigate the greenhouse gas emission, many carbon capture and storage projects are underway all over the world. In Korea, many studies focus on the storage of $CO_2$ in the offshore sediment. Assurance of safety is one of the most important issues in the geological storage of $CO_2$. Especially, the assessment of possibility of leakage and amount of leaked $CO_2$ is very crucial to analyze the safety of marine geological storage of $CO_2$. In this study, the leakage of injected $CO_2$ through fault was numerically studied. TOUGH2-MP ECO2N was used to simulate the subsurface behavior of injected $CO_2$. The storage site was 150 m thick saline aquifer located 825 m under the continental shelf. It was assumed that $CO_2$ leak was happened through the fault located 1,000 m away from the injection well. The injected $CO_2$ could migrate through the aquifer by both pressure difference driven by injection and buoyancy force. The enough pressure differences made it possible the $CO_2$ to migrate to the bottom of the fault. The $CO_2$ could be leaked to seabed through the fault due to the buoyancy force. Prior to leakage of the injected $CO_2$, the formation water leaked to seabed. When $CO_2$ reached the seabed, leakage of formation water stopped but the same amount of sea water starts to flow into the underground as the amount of leaked $CO_2$. To analyze the effect of injection rate on the leakage behavior, the injection rate of $CO_2$ was varied as 0.5, 0.75, and $1MtCO_2/year$. The starting times of leakage at 1, 0.75 and $0.5MtCO_2/year$ injection rates are 11.3, 15.6 and 23.2 years after the injection, respectively. The leakage of $CO_2$ to the seabed continued for a period time after the end of $CO_2$ injection. The ratios of total leaked $CO_2$ to total injected $CO_2$ at 1, 0.75 and $0.5MtCO_2/year$ injection rates are 19.5%, 11.5% and 2.8%, respectively.
This paper specifically discusses the risk assessment on the pesticide residues in vegetables collected from traditional markets, big marts and departments in the southern part of Seoul. Vegetable samples were 6,583 cases from January to December in 2009. Monte-Carlo simulation was used to calculate the uncertainty for the risk index using pesticide residues, average dietary intake for vegetables and acceptable daily intake. Deterministic risk indexes were 7.33% of diethofencarb, 5.13% of indoxacarb, 3.96% of EPN, 3.92% of diniconazole and 3.09% of chlorothalonil, respectively. And other pesticides were below 3%. Distributions of risk indexes obtained by the Monte-Carlo simulations were similar to the deterministic values, even though the confidence intervals for 95% were very wide. We confirmed that health risks caused by eating vegetables exceeded maximum residue limits of pesticide are very low and the population is generally safe, judging from the risk indexes located between 0.07 to 9.49%.
For the application of the diffusion equation, slope height and maximum slope angle are calculated from the plotted slope profile. Using denudation rate as a solution for the diffusion equation, an apparent age index can be calculated, which is the total amount of denudation through total time. Plots of slope angle versus slope height and apparent age index versus slope height are useful for determining relative or absolute ages and denudation rates. Mathematical simulation plots of slope angle versus slope height can generate equal denudation-rate lines for a given age. Mathematical simulations of slope angle versus age for a given slope height, for equal denudation-rate at a particular profile site, and for comparing to other sites having controlled ages.
Journal of the Korean Institute of Traditional Landscape Architecture
/
v.36
no.2
/
pp.30-37
/
2018
The uniformed regulations for control of the height of buildings owned by individuals to protect landscape of cultural properties are causing serious social conflicts by limiting the development of landowners. It is urgent need of introducing indicators that can resolve such conflicts and evaluate the regulations of buildings, which can satisfy urban development as well as landscape management of cultural properties. Therefore, the purpose of this study is to simulate landscape changes according to the Cultural Heritage Protection Act and National Land Planning and Utilization Act by using Unity3D in the Pungnammun Gate(Treasure No. 308) of Jeonju and its surroundings, where architectural cultural property forms the symbolic landscape of the city. Then some items such as view points, target points were introduced and the quantitative evaluation of landscapes was attempted by applying the indicator of 3D Visual Exposure. As a result, the viewing opportunity and viewing area of Pungnammun Gate were not significantly influenced by changes in landscape according to the two laws. However, the change of the height of buildings by the National Land Planning and Utilization Act, which has the greatest development capacity, confirmed the possibility of weakening the identification of the Pungnammun Gate by increasing 3D Visual Exposure of the background buildings more than two times. Finally, it was confirmed that the skyline of Pungnammun Gate was clearly infringed upon development under the National Land Planning and Utilization Act, but the skyline was maintained similar to the current situation in the regulation by the Cultural Heritage Protection Act. Thus, this study is meaningful in that the application of 3D Visual Exposure showed the possibility of utilization as an indicator for quantitatively evaluating the protection of view on cultural property and skyline according to the changes of building heights.
Around the turn of 21st century, there has been a major technological shift in the animation industry. With development of reality-based computer graphics, major American animation studios replaced hand-drawn method with the new 3D computer graphics. Traditional animation was known for its simplified shapes such as circles and triangle that makes characters' movements distinctive from non-animated feature films. Computer-generated animation has largely replaced it, but is under continuous criticism that automated movements and reality-like graphics devaluate the aesthetics of animation. Although hand-drawn animation is still produced, 3D computer graphics have taken commercial lead and there has been many changes to acting of animated characters, which calls for detailed investigation. Firstly, the changes in acting of 3D characters can be traced from looking at human-like rigging method that mimics humanistic moving mechanism. Also, if hair and clothing was part of hand-drawn characters' acting, it has now been hidden inside mathematical simulation of 3D graphics, leaving only the body to be used in acting. Secondly, looking at "Stretch and Squash" method, which represents the distinctive movements of animation, through the lens of media, a paradox arises. Hand-drawn animation are produced frame-by-frame, and a subtle change would make animated frames shiver. This slight shivering acts as an aesthetic distinction of animated feature films, but can also require exaggerated movements to hide the shivering. On the contrary, acting of 3D animation make use of calculated movements that may seem exaggerated compared to human acting, but seem much more moderate and static compared to hand-drawn acting. Moreover, 3D computer graphics add the third dimension that allows more intuitive movements - maybe animators no longer need fine drawing skills; what they now need is directing skills to animate characters in 3D space intuitively. On the assumption that technological advancement and change of artistic expressionism are inseparable, this paper compares acting of 3D animation studio Pixar and classical drawing studio Disney to investigate character acting style and movements.
Since database management systems(DBMSS) have limited lock resources, transactions requesting locks beyond the limit mutt be aborted. In the worst carte, if such transactions are aborted repeatedly, the DBMS can become paralyzed, i.e., transaction execute but cannot commit. Lock escalation is considered a solution to this problem. However, existing lock escalation methods do not provide a complete solution. In this paper, we prognose a new lock escalation method, adaptive lock escalation, that selves most of the problems. First, we propose a general model for lock escalation and present the concept of the unescalatable look, which is the major cause making the transactions to abort. Second, we propose the notions of semi lock escalation, lock blocking, and selective relief as the mechanisms to control the number of unescalatable locks. We then propose the adaptive lock escalation method using these notions. Adaptive lock escalation reduces needless aborts and guarantees that the DBMS is not paralyzed under excessive lock requests. It also allows graceful degradation of performance under those circumstances. Third, through extensive simulation, we show that adaptive lock escalation outperforms existing lock escalation methods. The results show that, compared to the existing methods, adaptive lock escalation reduces the number of aborts and the average response time, and increases the throughput to a great extent. Especially, it is shown that the number of concurrent transactions can be increased more than 16 ~256 fold. The contribution of this paper is significant in that it has formally analysed the role of lock escalation in lock resource management and identified the detailed underlying mechanisms. Existing lock escalation methods rely on users or system administrator to handle the problems of excessive lock requests. In contrast, adaptive lock escalation releases the users of this responsibility by providing graceful degradation and preventing system paralysis through automatic control of unescalatable locks Thus adaptive lock escalation can contribute to developing self-tuning: DBMSS that draw a lot of attention these days.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.