• Title/Summary/Keyword: 생명 주기

Search Result 595, Processing Time 0.04 seconds

Fixed Partitioning Methods for Extending lifetime of sensor node for Wireless Sensor Networks (WSN환경에서 센서노드의 생명주기 연장을 위한 고정 분할 기법)

  • Han, Chang-Su;Cho, Young-Bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.942-948
    • /
    • 2016
  • WSN based on wireless sensor nodes, Sensor nodes can not be reassigned and recharged if they once placed. Each sensor node comes into being involved to a communication network with its limited energy. But the existing proposed clustering techniques, being applied to WSN environment with irregular dispersion of sensor nodes, have the network reliability issues which bring about a communication interruption with the local node feature of unbalanced distribution in WSN. Therefore, the communications participation of the sensor nodes in the suggested algorithm is extended by 25% as the sensor field divided in the light of the non-uniformed distribution of sensor nodes and a static or a dynamic clustering algorithm adopted according to its partition of sensor node density in WSN. And the entire network life cycle was extended by 14% to ensure the reliability of the network.

An Object-Oriented Modeling of Object-Oriented Software Development Methods : OMOS(Object-oriented software development Method for Object-oriented software System) (객체지향 소프트웨어 개발 방법론의 객체지향 모델링 : OMOS(Object-oriented software development Method for Object-oriented software System))

  • Choi, Sung-Woon
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.401-408
    • /
    • 2001
  • Object-oriented software development methods are used to develop object-oriented software systems. Object-oriented systems are believed to habe better modularity, reusability, maintainability, and extensibility than systems modeled in conventional methods. Current object-oriented software development methods, however, are modeled in terms of procedural, functional, and structural models. There models cause problems such as tight coupling among activities, and uncontrolled access to global artifacts. In this paper, were introduce OMOS(Object-oriented software development Method for Object-oriented software System), an object-oriented modeling of object-oriented software development methods. Artifacts and their related activities are modeled as classes and objects. Development lifecycles are modeled as interactions among the objects. By modeling the software development method in an object-oriented way, OMOS achieves better reusability, flexibility, extensibility, and maintainability.

  • PDF

A Study on the Systems Engineering Process for Effectively Carrying Out LRT Project (경량전철사업의 효과적인 수행을 위한 시스템엔지니어링프로세스 연구)

  • Han, Seok-Youn;Kim, Joo-Uk;Baek, Jong-Hyun
    • Transactions of the KSME C: Technology and Education
    • /
    • v.1 no.1
    • /
    • pp.139-145
    • /
    • 2013
  • Light rail transit(LRT) is a public transportation and mainly has an automatic driverless operation system. LRT project is a large scaled project which a construction cost is tens of billions of won per km. Systems engineering(SE) is an interdisciplinary approach and means to enable realization of successful systems. In this paper, we propose the systems engineering processes and their outputs list for the LRT project. And then, we present template and sample case of process output. We also present a case which carried out SE process by SE tool.

Effect of Suicidal Risk, Meaning in Life on Age-dependent Life Respect in Patients at Public Hospital (자살위험성과 생의 의미가 생의 주기별 생명존중인식에 미치는 영향 -공공의료기관 이용환자를 중심으로-)

  • Wang, Mi-Suk;Hwang, Sun-Suk;Jung, Hyun-Chul;Han, Suk-Jung;Kang, Kyung-Ah
    • Journal of Korean Public Health Nursing
    • /
    • v.27 no.1
    • /
    • pp.113-128
    • /
    • 2013
  • Purpose: The purpose of this study was to investigate the degree of suicidal risk, meaning in life, and life respect in various ages of patients and identify factors influencing their life respect. Method: The participants were 229 patients in a public hospital who completed questionnaires. Data were analyzed using descriptive statistics, t-test, Fisher's exact test, ANOVA with Duncan post hoc test, and multiple regression. Results: There was a negative correlation between the meaning of life and life respect in the old age group (r=-.23, p=.02) and all subjects (r=-.14, p=.01) after controlling for age. Factors significantly influencing life respect were gender (${\beta}$=0.11, p=.050) and educational status (${\beta}$=-0.17, p=.022), and the multiple regression model explained 16.7% of the variance in all subjects (p<.001). In the early adulthood group, factors significantly influencing the life respect were gender (${\beta}$=0.18, p<.001) and suicidal thoughts (${\beta}$=0.21, p=.028), and the multiple regression model explained 6.8% of variance in all subjects (p=.001). Conclusion: The results of this study suggest that suicidal prevention and educational programs for increasing an appreciation of life should consider subject's characteristics, such as gender and educational status.

The Procedure for Improving Structural Methodology or Information engineering Methodology (구조적 또는 정보공학 소프트웨어 개발 방법론 개선 절차)

  • Jung, Byung-Kwon;Yoon, Seok-Min
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1083-1090
    • /
    • 2002
  • The software development methodology has not caught up with the rapid change of information technology. Most of the software development projects use structural methodology or information engineering methodology. If established software development methodologies don't reflect technologies applied to the project, the project may be performed ineffectively. This paper describes a model in which we can apply a new information technology to an already existed structural methodology or information engineering methodology. This model uses the technique of the divide and conquer that software development life cycle is divided into phases, each phase is divided into viewpoint- areas and the software development processes of a new information technology are applied to each small area. By using the design phase this paper shows application example, in which I applied web-based development processes to CS@RoadMap Methodology of KCC Information & Communication, a system provider in Korea. The CS@RoadMap Methodology reflecting the Web technology, Web@RoadMap Methodology, has been applied to the public-domain projects.

A Study on the X-ray Diffraction of Rabbit Glycerin Muscle by Spin Labeled on SH (SH에 Spin Label한 Rabbit Glycerin처리근육의 X선 회절에 관한 연구)

  • 김덕술;송주영
    • Journal of Life Science
    • /
    • v.8 no.6
    • /
    • pp.681-686
    • /
    • 1998
  • IASL(iodo acetamide) and MSL(maleimide) disordered the orderly helix arrangement of myosin in the rest state of spin level. Especially the effect of IASL was great. Equatorial reflection(10,11) change inferred that myosin head was moved to the vicinity of actin filament by spin level. The intensity change of 143 $\AA$ and 72 $\AA$ could offer infor-mation of the mass projection of population of myosin heads along the filament axis. The slope of intensity profile of the mass projection of 143 $\AA$ and reflection of IASL is appeared and that of MSL is appeared sharply. The dec-rease of 215 $\AA$ reflection intensity the periodical characteristic of 143 $\AA$ reflection by spin label. The raise of MSL actin reflection at 51 $\AA$ and 59 $\AA$ in the actin reflection change refers that the shifted myosin head binds a certain actin or changes an actin structure by spin label effect. Because iodo acetamide has a tendency to decease the actin reflection, actin dose not bind myosin head. From this result, we could conclude that LASL and MSL are spin labeled on SH of myosin head and disordered the helix arrangement of actin.

  • PDF

A case study of Privacy Impact Assessment for C-Shopping Mall (C쇼핑몰 개인정보 영향평가 사례연구)

  • Jeon, Dong-Jin;Jeong, Jin-Hong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.73-82
    • /
    • 2012
  • This paper reviews Privacy Impact Assessments in order to perform preventing and diagnosis against potential threats focused on the C-Shopping mall case. The quality of protection in C-shopping mall shows that the corporations itself is 29.2, the system is 68.8, the life cycle of the privacy is 25.5 and CCTV is 60.0. The lowest levels are the corporation's management 16.7, the life-cycle's saving and keeping 12.5, usage and offer 11.5 and destruction 16.7 among the life cycle of the privacy. The result of risk analysis shows that the highest levels are saving and keeping 13.3 and destruction 13.0. From the result, dangerous duplications are saving and keeping and destructions.

Antiproliferative and Apoptotic Effects of Sasa quelpaertensis Nakai in Human Cancer Cells (제주조릿대의 인간 암세포 증식 저해와 자연사멸 효과)

  • Kim, Ji Hye;Kim, Min Young
    • Journal of Life Science
    • /
    • v.24 no.8
    • /
    • pp.903-909
    • /
    • 2014
  • Plants are an invaluable source of potential new anti-cancer drugs. Sasa quelpaertensis Nakai (Korean name, Jeju-Joritdae) is one of these plants with medical value, which is a bamboo grass widely distributed in Mt. Halla on Jeju Island, Korea. Here, we investigated the apoptotic effects of S. quelpaertensis leaf extracts in six human cancer cell lines (A549, MCF-7, HepG-2, Hela, HCT116 and A375). MTT assay signified the antiproliferative nature of S. quelpaertensis extracts against all tested cancer cells: S. quelpaertensis displayed slight cytotoxicity against A549, MCF-7 and HepG-2 cells, whereas it was exclusively cytotoxic to Hela, HCT116 and A375 cells. Apoptotic cells were evaluated using PI staining of DNA fragmentation by flow cytometry (sub-G1 peak). PI staining indicated increasing accumulation of Hela, HCT116 and A375 cells at sub-G1 phase. Further events like generation of nitric oxide ($NO^{\bullet}$) were accompanied in the S. quelpaertensis Nakai-induced apoptosis. Augmented $NO^{\bullet}$ generation resulted in the DNA fragmentation of Hela, HCT116 and A375 cells by treatment with S. quelpaertensis leaf extracts. These results suggest that S. quelpaertensis may be a potential natural resource for treating cancer cell. To identify the exact mechanisms of molecular mechanism of S. quelpaertensis induced apoptosis awaits further investigation.

XMI based Design-Pattern Composition (XMI 기반의 디자인패턴 합성)

  • Lee, Don-Yang;Choi, Han-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.235-242
    • /
    • 2006
  • Many researches have achieved to reuse existent experience at each step of software life cycle. It is achieved various study about Design Pattern serving that abstract level solves design problem at high level. But, design step is not supplying design information that is abstracted so that new designers may reuse standardizing defined good design information. Therefore, in this paper, to do so that can reuse existent design information because composes Design Pattern can solve problem at design step, and extend design information that also is standardized XMI to base meta model of Design Pattern. And I did so that can compose Design Pattern utilizing MetaModel of Design Pattern standardized by XMI. Therefore, software designer can reuse composing existent design information that is could standardize problem at design because uses MetaData of standardized Design Pattern, and designs by Design Pattern base.

  • PDF

Security-Reverse-Attack Engineering Life-cycle Model for Attack System and Attack Specification Models (공격시스템을 위한 보안-역-공격공학 생명주기 모델과 공격명세모델)

  • Kim, Nam-Jeong;Kong, Mun-Soo;Lee, Gang-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.17-27
    • /
    • 2017
  • Recently, as cyber attacks have been activated, many such attacks have come into contact with various media. Research on security engineering and reverse engineering is active, but there is a lack of research that integrates them and applies attack systems through cost effective attack engineering. In this paper, security - enhanced information systems are developed by security engineering and reverse engineering is used to identify vulnerabilities. Using this vulnerability, we compare and analyze lifecycle models that construct or remodel attack system through attack engineering, and specify structure and behavior of each system, and propose more effective modeling. In addition, we extend the existing models and tools to propose graphical attack specification models that specify attack methods and scenarios in terms of models such as functional, static, and dynamic.