• Title/Summary/Keyword: 코드 재사용

Search Result 475, Processing Time 0.035 seconds

Production of Red-spotted Grouper Nervous Necrosis Virus (RGNNV) Capsid Protein Using Saccharomyces cerevisiae Surface Display (Saccharomyces cerevisiae 표면 발현을 이용한 붉바리 신경괴사 바이러스 외피단백질의 생산)

  • Park, Mirye;Suh, Sung-Suk;Hwang, Jinik;Kim, Donggiun;Park, Jongbum;Chung, Young-Jae;Lee, Taek-Kyun
    • Journal of Life Science
    • /
    • v.24 no.9
    • /
    • pp.995-1000
    • /
    • 2014
  • The studies of marine viruses in terms of viral isolation and detection have been limited due to the high mutation rate and genetic diversity of marine viruses. Of the modern methods currently used to detect marine viruses, serological methods based on enzyme-linked immunosorbent assay (ELISA) are the most common. They depend largely on the quality of the antibodies and on highly purified suitable antigens. Recently, a new experimental system for using viral capsid protein as an antigen has been developed using the yeast surface display (YSD) technique. In the present study, the capsid protein gene of the red-spotted grouper nervous necrosis virus (RGNNV) was expressed and purified via YSD and HA-tagging systems, respectively. Two regions of the RGNNV capsid protein gene, RGNNV1 and RGNNV2, were individually synthesized and subcloned into a yeast expression vector, pCTCON. The expressions of each RGNNV capsid protein in the Saccharomyces cerevisiae strain EBY100 were indirectly detected by flow cytometry with fluorescently labeled antibodies, while recognizing the C-terminal c-myc tags encoded by the display vector. The expressed RGNNV capsid proteins were isolated from the yeast surface through the cleavage of the disulfide bond between the Aga1 and Aga2 proteins after ${\beta}$-mercaptoethanol treatment, and they were directly detected by Western blot using anti-HA antibody. These results indicated that YSD and HA-tagging systems could be applicable to the expressions and purification of recombinant RGNNV capsid proteins.

A Methodology for Translation of Operating System Calls in Legacy Real-time Software to Ada (Legacy 실시간 소프트웨어의 운영체제 호출을 Ada로 번역하기 위한 방법론)

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2874-2890
    • /
    • 1997
  • This paper describes a methodology for translation of concurrent software expressed in operating system (OS) calls to Ada. Concurrency is expressed in some legacy software by OS calls that perform concurrent process/task control. Examples considered in this paper are calls in programs in C to Unix and calls in programs in CMS-2 to the Executive Service Routines of ATES or SDEX-20 other software re/reverse engineering research has focused on translating the OS calls in a legacy software to calls to another OS. In this approach, the understanding of software has required knowledge of the underlying OS, which is usually very complicated and informally documented. The research in this paper has focused on translating the OS calls in a legacy software into the equivalent protocols using the Ada facilities. In translation to Ada, these calls are represented by Ada equivalent code that follow the scheme of a message-based kernel oriented architecture. To facilitate translation, it utilizes templates placed in library for data structures, tasks, procedures, and messages. This methodology is a new approach to modeling OS in Ada in software re/reverse engineering. There is no need of knowledge of the underlying OS for software understanding in this approach, since the dependency on the OS in the legacy software is removed. It is portable and interoperable on Ada run-time environments. This approach can handle the OS calls in different legacy software systems.

  • PDF

Optimized DSP Implementation of Audio Decoders for Digital Multimedia Broadcasting (디지털 방송용 오디오 디코더의 DSP 최적화 구현)

  • Park, Nam-In;Cho, Choong-Sang;Kim, Hong-Kook
    • Journal of Broadcast Engineering
    • /
    • v.13 no.4
    • /
    • pp.452-462
    • /
    • 2008
  • In this paper, we address issues associated with the real-time implementation of the MPEG-1/2 Layer-II (or MUSICAM) and MPEG-4 ER-BSAC decoders for Digital Multimedia Broadcasting (DMB) on TMS320C64x+ that is a fixed-point DSP processor with a clock speed of 330 MHz. To achieve the real-time requirement, they should be optimized in different steps as follows. First of all, a C-code level optimization is performed by sharing the memory, adjusting data types, and unrolling loops. Next, an algorithm level optimization is carried out such as the reconfiguration of bitstream reading, the modification of synthesis filtering, and the rearrangement of the window coefficients for synthesis filtering. In addition, the C-code of a synthesis filtering module of the MPEG-1/2 Layer-II decoder is rewritten by using the linear assembly programming technique. This is because the synthesis filtering module requires the most processing time among all processing modules of the decoder. In order to show how the real-time implementation works, we obtain the percentage of the processing time for decoding and calculate a RMS value between the decoded audio signals by the reference MPEG decoder and its DSP version implemented in this paper. As a result, it is shown that the percentages of the processing time for the MPEG-1/2 Layer-II and MPEG-4 ER-BSAC decoders occupy less than 3% and 11% of the DSP clock cycles, respectively, and the RMS values of the MPEG-1/2 Layer-II and MPEG-4 ER-BSAC decoders implemented in this paper all satisfy the criterion of -77.01 dB which is defined by the MPEG standards.

Performance Improvement Scheme based on Proactive Transmission for Reliable Multicast in Wireless LANs (무선 랜에서 신뢰성 있는 멀티캐스트를 위한 능동적 전송 기반의 성능 향상 방법)

  • Kim, Sun-Myeng;Kim, Si-Gwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.5
    • /
    • pp.16-24
    • /
    • 2011
  • The IEEE 802.11 wireless LAN (Local Area Network) is widely used for wireless access due to its easy deployment and low cost. Multicast in wireless LANs is very useful for transmitting data to multiple receivers compared to unicast to each receiver. In the IEEE 802.11 wireless LAN, multicast transmissions are unreliable since multicast data packets are transmitted without any feedback from receivers. Recently, various protocols have been proposed to enhance the reliability of multicast transmissions. They still have serious problems in reliability and efficiency due to the excessive control overhead by the use of a large number of control packets in the error recovery process, and due to a large number of retransmissions to satisfy all receivers. In this paper, we propose an effective scheme called PTRM(Proactive Transmission based Reliable Multicast). The proposed scheme uses a block erasure code to generate parity packets and to reduce the impact of independent packet error among receivers. After generating parity packets, the PTRM transmits data packets as many as receivers need to recover error, and then requests feedback from them. The simulation results show that the proposed scheme provides reliable multicast while minimizing the feedback overhead.

Research in the Direction of Improvement of the Web Site Utilizing Google Analytics (구글 애널리틱스를 활용한 웹 사이트의 개선방안 연구 : 앱팩토리를 대상으로)

  • Kim, Donglim;Lim, Younghwan
    • Cartoon and Animation Studies
    • /
    • s.36
    • /
    • pp.553-572
    • /
    • 2014
  • In this paper, for the evaluation of the ease of a particular Web site (www.appbelt.net), insert the log tracking code for Google Analytics in a page of the Web site to collect behavioral data of visitor and has studied the improvement measures for the problems of the Web site, after the evaluation of the overall quality of the Web site through the evaluation of Coolcheck. These findings set the target value of the company's priority (importance) companies want to influence the direction of the business judgment are set up correctly, and the user's needs and behavior will be appropriate for the service seems to help improvement.

Automatic Generator for Component-Based Web Database Applications (컴포넌트 기반 웹 데이터베이스 응용의 자동 생성기)

  • Eum, Doo-Hun;Ko, Min-Jeung;Kang, I-Zzy
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.371-380
    • /
    • 2004
  • E-commerce is in wide use with the rapid advance of internet technology. The main component of an e-commerce application is a Web-based database application. Currently, it takes a lot of time in developing Web applications since developers should write codes manually or semi-automatically for user interface forms and query processing of an application. Therefore, the productivity increase of Web-based database applications has been demanded. In this paper, we introduce a software tool, which we call the WebSiteGen2, that automatically generates the forms that we used as user interfaces and the EJB/JSP components that process the query made through the forms for an application that needs a new database or uses an existing database. The WebSiteGen2 thus increases the productivity, reusability, expandibility, and portability of an application by automatically generating a 3-tier application based on component technology. Moreover, one user interface form that are generated by the WebSiteGen2 provides information on an interested entity as well as information on all the directly or indirectly related entities with the interested one. In this paper, we explain the functionality and implementation of the WebSiteGen2 and then show the merits by comparing the WebSiteGen2 to the other commercial Web application generators.

Production and Application of Domestic Input Data for Safety Assessment of Disposal (처분안전성평가를 위한 국내고유 입력자료의 확보와 적용)

  • Park, Chung-Kyun;Lee, Jae-Kwang;Baik, Min-Hoon;Lee, Youn-Myoung;Ko, Nak-Youl;Jeong, Jong-Tae
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.10 no.3
    • /
    • pp.161-170
    • /
    • 2012
  • To provide domestic values of input parameters in a safety assessment of radioactive waste disposal under domestic deep underground environments, various kinds of experiments have been carried out under KURT (KAERI Underground Research Tunnel) conditions. The input parameters were classified, and some of them were selected for this study by the criteria of importance. The domestic experimental data under KURT environments were given top priority in the data review process. Foreign data under similar conditions to KURT were also gathered. The collected data were arranged and the statistical calculations were processed. The properties and distribution of the data were explained and compared to foreign values in view of their validity. The following parameters were analysed: failure time and early time failure rate of a container, solubility of nuclides, porosity and density of the buffer, and distribution coefficients of nuclides in the geomedia, hydraulic conductivity, diffusion depth of nuclides, groundwater flow rate, fracture aperture, length of internal fracture, and width of faulted rock mass in the host rock.

An Ontology-based Data Variability Processing Method (온톨로지 기반 데이터 가변성 처리 기법)

  • Lim, Yoon-Sun;Kim, Myung
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.4
    • /
    • pp.239-251
    • /
    • 2010
  • In modern distributed enterprise applications that have multilayered architecture, business entities are a kind of crosscutting concerns running through service components that implements business logic in each layer. When business entities are modified, service components related to them should also be modified so that they can deal with those business entities with new types, even though their functionality remains the same. Our previous paper proposed what we call the DTT (Data Type-Tolerant) component model to efficiently process the variability of business entities, which are data externalized from service components. While the DTT component model, by removing direct coupling between service components and business entities, exempts the need to rewrite service components when business entities are modified, it incurs the burden of implementing data type converters that mediate between them. To solve this problem, this paper proposes a method to use ontology as the metadata of both SCDTs (Self-Contained Data Types) in service components and business entities, and a method to generate data type converter code using the ontology. This ontology-based DTT component model greatly enhances the reusability of service components and the efficiency in processing data variability by allowing the computer to automatically generate data type converters without error.

Mid-loop 운전중 RHR 기능 상실사고시 최대압력 및 보조급수 공급 여유시간 분석

  • 김원석;정영종;장원표
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.05b
    • /
    • pp.473-480
    • /
    • 1996
  • 영광 3/4호기 mid-loop 운전중 잔열제거(RHR) 기능 상실사고시 열수력적 현상을 최적 전산코드인 CATHARE2를 이용하여 해석하였다. 이러한 사고시 열수력적 현상은 일,이차측 냉각재 방출유로와 계통내 비응축성 가스의 거동에 의해 크게 영향을 받는다. 본 연구에서는 2개의 경우를 모의하였는데, 하나는 계통내 방출유로가 있는 경우이며 다른 하나는 방출유로가 없는 경우를 계산하였다. 이 때 사용된 가정은 다음과 같다. (가) 계통은 부분충수 운전 상태로 상부에 비응축성 가스나 증기로 가득 차 있다. (나) 증기발생기는 1대만이 이용 가능하고 이차측은 습식보관 상태이며, 보조급수는 공급되지 않고 이차측 압력은 대기압 상태이다 (다) 사고는 원자로 정지후 2일후 발생한다. 이와같은 조건하에서 사고시 계통 최대압력은 방출유로가 있는 경우 사고후 6,000 초에 0.27 MPa이며, 방출유로를 통한 유량은 총 2.4 kg/s이다. 이 방출유량을 외삽하여 계통수위가 고온관 바닦까지 도달하는데 걸린 시간은 사고후 약 5.67시간이다. 증기발생기 U-튜브를 통한 열전달에 의해 이차측 증기 발생으로 이차측 수위가 하락하면 증기발생기 reflux cooling은 제한을 받을 수 있다. 이 경우 이차측 수위가 U-튜브의 active 영역 상부까지 도달하는데 걸리는 시간은 사고후 약 10시간으로 계산되었다. 그러므로 이 경우 보조급수 공급 여유시간보다 노심 노출시간이 더 빨리 도달하여 노심을 손상시킨다. 사고시 수위지시계는 계통감압에 큰 영향을 주지 못하기 때문에 가능한 빨리 닫아 계통 inventory를 유지하는 것이 이차측 보조급수공급보다 우선한다.합한 설계방안으로 분석되었다.크다는 단점이 있다.TEX>$_2$O$_3$ 흡착제 제조시 TiO$_2$ 함량에 따른 Co$^{2+}$ 흡착량과 25$0^{\circ}C$의 고온에서 ZrO$_2$$Al_2$O$_3$의 표면에 생성된 코발트 화합물을 XPS와 EPMA로 부터 확인하였다.인을 명시적으로 설명할 수 있다. 둘째, 오류의 시발점을 정확히 포착하여 동기가 분명한 수정대책을 강구할 수 있다. 셋째, 음운 과 정의 분석 모델은 새로운 언어 학습시에 관련된 언어 상호간의 구조적 마찰을 설명해 줄 수 있다. 넷째, 불규칙적이며 종잡기 힘들고 단편적인 것으로만 보이던 중간언어도 일정한 체계 속에서 변화한다는 사실을 알 수 있다. 다섯째, 종전의 오류 분석에서는 지나치게 모국어의 영향만 강조하고 다른 요인들에 대해서는 다분히 추상적인 언급으로 끝났지만 이 분석을 통 해서 배경어, 목표어, 특히 중간규칙의 역할이 괄목할 만한 것임을 가시적으로 관찰할 수 있 다. 이와 같은 오류분석 방법은 학습자의 모국어 및 관련 외국어의 음운규칙만 알면 어느 학습대상 외국어에라도 적용할 수 있는 보편성을 지니는 것으로 사료된다.없다. 그렇다면 겹의문사를 [-wh]의리를 지 닌 의문사의 병렬로 분석할 수 없다. 예를 들어 누구누구를 [주구-이-ν가] [누구누구-이- ν가]로부터 생성되었다고 볼 수 없다. 그러므로 [-wh] 겹의문사는 복수 의미를 지닐 수 없 다. 그러면 단수 의미는 어떻게 생성되는가\

  • PDF

Numerical Analysis of Gas Leakage and Diffusion Behavior in Underground Combined Cycle Power Plant (지하 복합발전 플랜트 내에서의 가스 누출 및 확산 거동에 관한 수치해석 연구)

  • Bang, Joo Won;Lee, Seong Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.118-124
    • /
    • 2017
  • In this study, a numerical simulation was performed using commercial code Fluent(v.17.1). The underground Combined Cycle Power Plant (CCPP) was simplified to analyze the methane gas leakage with the crack size and position. In addition, extensive numerical simulations were carried out for different crack sizes from 10 mm to 20 mm. The crack position is the gas leakage, which is assumed to be near the pipe elbow and the gas turbine. A total of 4 cases were compared and analyzed. To analyze the gas leakage, the concept of the Lower Flammable Limit (LFL) was applied. The leakage distance was defined in the longitudinal direction, and the transverse direction was estimated and quantitatively analyzed. As a result, the leakage distance in the longitudinal direction varies by 52.3 % depending on the crack size at the same crack position. Moreover, the maximum difference was 34.8 % according to the crack position when the crack sizes are identical. As jet flow impacts on the obstacle and changes its direction, the recirculation flows are formed. These results are expected to provide useful data to optimize the location and number of gas detections in confined spaces, such as underground CCPP.