• Title/Summary/Keyword: Block Division

Search Result 918, Processing Time 0.028 seconds

Prestack Reverse Time Migration for Seismic Reflection data in Block 5, Jeju Basin (제주분지 제 5광구 탄성파자료의 중합전 역시간 구조보정)

  • Ko, Chin-Surk;Jang, Seong-Hyung
    • Economic and Environmental Geology
    • /
    • v.43 no.4
    • /
    • pp.349-358
    • /
    • 2010
  • For imaging complex subsurface structures such as salt dome, faults, thrust belt, and folds, seismic prestack reverse-time migration in depth domain is widely used, which is performed by the cross-correlation of shot-domain wavefield extrapolation with receiver-domain wavefield extrapolation. We apply the prestack reverse-time migration, which had been developed at KIGAM, to the seismic field data set of Block 5 in Jeju basin of Korea continental shelf in order to improve subsurface syncline stratigraphy image of the deep structures under the shot point 8km at the surface. We performed basic data processing for improving S/N ratio in the shot gathers, and constructed a velocity model from stack velocity which was calculated by the iterative velocity spectrum. The syncline structure of the stack image appears as disconnected interfaces due to the diffractions, but the result of the prestack migration shows that the syncline image is improved as seismic energy is concentrated on the geological interfaces.

Properties and Characteristics of Jacket Matrices (Jacket 행렬의 성질과 특성)

  • Yang, Jae-Seung;Park, Ju-Yong;Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.25-33
    • /
    • 2015
  • As a reversible Jacket is having the compatibility of two sided wearing, the matrix that both the inside and the outside are compatible is called Jacket matrix, and the matrix is having both inside and outside by the processes of element-wise inverse and block-wise inverse. This concept had been completed by one of the authors Moon Ho Lee in 1989, and finally that resultant matrix has been christened as Jacket matrix, in 2000. This is the most generalized extension of the well known Hadamard matrices, which includes both orthogonal and non-orthogonal matrices. This matrix addresses many problems in information and communication theories. we investigate the properties of the Jacket matrix, i.e. determinants, eigenvalues, and kronecker product. These computations are very useful for signal processing and orthogonal codes design. In our proposal, we provide some results to calculate these values by using a very simple mathematical model with less complexity.

A Dual-Input Energy Harvesting Charger with MPPT Control (MPPT 제어 기능을 갖는 이중 입력 에너지 하베스팅 충전기)

  • Jeong, Chan-ho;Kim, Yong-seung;Jeong, Hyo-bum;Yang, Min-jae;Yoon, Eun-jung;Yu, Chong-gun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.484-487
    • /
    • 2015
  • This paper describes a dual-input battery charger with MPPT control using photovoltaic and piezoelectric energy. Each energy is harvested from photovoltaic cells and piezoelectric cells and is stored to each capacitor. The battery voltage is boosted by charger block and two energy sources are used as input to charge battery capacitor. A DC-DC boost converter is designed to boost the battery voltage, and inductor sharing technique is employed such that only one inductor is required. The time division ratio for piezoelectric cell and photovoltaic cell is set to 8:1. The proposed circuit is designed in a 0.35um CMOS process technology. The condition of battery capacitor is managed by battery management block and the battery voltage can be boosted up to 3V. The maximum efficiency of the designed entire system is 88.56%, and the chip area including pads is $1230um{\times}1330um$.

  • PDF

Secure file distribution method using distribution P2P system (분산 P2P 시스템을 활용한 안전한 파일 분산 방안)

  • Kim, Jin-Hong;Kim, Seon-Young;Lee, Yoon-Jin;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.545-548
    • /
    • 2005
  • Recently, the computing environment of P2P come out to solve the excessive load of the server in the computing environment of the client/server. Currently, operated computing environment of P2P is mainly spreading out P2P system of read name or anonymity base about a publisher, sender and receiver of the file. But, to the current file protection there is three problem. The first problem is to a host become attack target. The second is to received file loose attack of Brute Force. The third is to define target of attack of DOS. To solve the this problem. it divide file into block unit. Each block is safely scattered peers. This paper propose the distribution P2P system of file division. Both proposing system solve the this problem and promote efficiency of file application.

  • PDF

Observation of Fatigue Crack Growth Behavior in 1Cr-1Mo-0.25V Steel Using Image Processing Technology (영상처리기법을 이용한 1Cr-1Mo-0.25V 강의 피로균열 성장거동 관찰)

  • Nahm, Seung-Hoon;Kim, Yong-Il;Ryu, Dae-Hyun
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.22 no.1
    • /
    • pp.14-21
    • /
    • 2002
  • The development of a new experimental method is required to easily observe the growth behavior of fatigue cracks. To satisfy the requirement, an image processing technique was introduced to fatigue testing. The length of surface fatigue crack could be successfully measured by the image processing system. At first, the image data of cracks were stored into the computer while the cyclic loading was interrupted. After testing, crack length was determined using an image processing software which was developed by authors. Various image processing techniques like a block matching method was applied tc the detection of surface fatigue cracks. By comparing the data measured by the image processing system with those by the manual measurement with a microscope, the effectiveness of the image processing system was established. If the proposed method is used to monitor and observe the crack growth behavior automatically, the time and efforts for fatigue test could be dramatically reduced.

A Cell Search with Reduced Complexity in a Mobile Station of OFCDM Systems (OFCDM 시스템의 이동국에서의 복잡도 감소 셀 탐색)

  • Kim, Dae-Yong;Park, Yong-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.139-149
    • /
    • 2007
  • Asynchronous OFCDM(Orthogonal Frequency and Code Division Multiplexing) systems must have a cell search process necessarily unlike synch개nous systems. this process is hewn initial synchronization and a three-step cell search algorithm is performed for the initial synchronization in the following three steps: OFCDM symbol timing, i.e., Fast Fourier Transform(FFT) window timing is estimated employing guard interval (GI) correlation in the first step, then the frame timing and CSSC(Cell Specific Scrambling Code) group is detected by taking the correlation of the CPICH(Common Pilot Channel) based on the property yielded by shifting the CSSC phase in the frequency domain. Finally, the CSSC phase within the group is identified in the third step. This paper proposes a modification group code with two or three block of the conventional CPICH based cell search algorithm in the second step which offers MS(Mobile Station) complexity reductions. however, the effect of the reduction complexity leads to degradation of the performance therefore, look for combination to have the most minimum degradation. the proposed block type group code with suitable combinations is the nearly sane performance as conventional group code and has a complexity reduction that is to be compared and verified through the computer simulation.

Antipsychotics for patients with pain

  • Shin, Sang Wook;Lee, Jin Seong;Abdi, Salahadin;Lee, Su Jung;Kim, Kyung Hoon
    • The Korean Journal of Pain
    • /
    • v.32 no.1
    • /
    • pp.3-11
    • /
    • 2019
  • Going back to basics prior to mentioning the use of antipsychotics in patients with pain, the International Association for the Study of Pain (IASP) definition of pain can be summarized as an unpleasant experience, composed of sensory experience caused by actual tissue damage and/or emotional experience caused by potential tissue damage. Less used than antidepressants, antipsychotics have also been used for treating this unpleasant experience as adjuvant analgesics without sufficient evidence from research. Because recently developed atypical antipsychotics reduce the adverse reactions of extrapyramidal symptoms, such as acute dystonia, pseudo-parkinsonism, akathisia, and tardive dyskinesia caused by typical antipsychotics, they are expected to be used more frequently in various painful conditions, while increasing the risk of metabolic syndromes (weight gain, diabetes, and dyslipidemia). Various antipsychotics have different neurotransmitter receptor affinities for dopamine (D), 5-hydroxytryptamine (5-HT), adrenergic (${\alpha}$), histamine (H), and muscarinic (M) receptors. Atypical antipsychotics antagonize transient, weak $D_2$ receptor bindings with strong binding to the $5-HT_{2A}$ receptor, while typical antipsychotics block long-lasting, tight $D_2$ receptor binding. On the contrary, antidepressants in the field of pain management also block the reuptake of similar receptors, mainly on the 5-HT and, next, on the norepinephrine, but rarely on the D receptors. Antipsychotics have been used for treating positive symptoms, such as delusion, hallucination, disorganized thought and behavior, perception disturbance, and inappropriate emotion, rather than the negative, cognitive, and affective symptoms of psychosis. Therefore, an antipsychotic may be prescribed in pain patients with positive symptoms of psychosis during or after controlling all sensory components.

Analysis of Distributed Cryptocurrency Exchange Model and Issues (분산 암호화폐 거래소 모델 및 이슈 분석)

  • Lee, Tae-Gyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.583-590
    • /
    • 2022
  • With the release of the Bitcoin source in 2009, cryptocurrencies are continuously developing and expanding the market. Recently, new applicability is expanding centered on NFT coin and metaverse payment service. In particular, the Central Cryptocurrency Exchange actively supports relay transactions between cryptocurrencies or between traditional fiat currencies and cryptocurrencies. The cryptocurrency trading market based on such a central exchange encouraged speculative factors of cryptocurrencies, strongly arousing speculation and futility of cryptocurrencies. In addition, the central cryptocurrency exchange induces the centralization of users and virtual assets, thereby hindering the decentralization and security enhancement strategies of the block chain. Therefore, this study describes the current status and problems of centrally controlled centralized cryptocurrency exchanges in service, and presents a distributed cryptocurrency exchange modeling strategy and major issues as a decentralization model of the exchange. This research can strengthen the anonymity, decentralization, and autonomy of cryptocurrency based on blockchain.

A Design of SSD Dedicated RAID System for Efficient Resource Management (효율적인 자원관리를 위한 SSD 전용 RAID 시스템 설계)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.109-114
    • /
    • 2024
  • Enterprise storage systems that require high data reliability are applying RAID (Redundant Array of Independent Disks) systems to recover from data loss and failure. In particular, RAID 5 ensures space efficiency and reliability by distributing parity across multiple storage devices. However, when storage devices have different capacities, RAID is built based on the smallest capacity storage device, resulting in wasted storage space. Therefore, research is needed to solve this resource management problem. In this paper, we propose a method for RAID grouping of each independent NAND flash memory block in a RAID consisting of SSD (Solid State Disk) with external SSDs as well as internal SSDs. This method is divided into a policy for delivering block information inside SSDs to the RAID system and a policy for RAID grouping of physical addresses delivered from the RAID system. This method allows us to maintain a RAID that does not waste resources when SSDs of different capacities are grouped into RAID5. Finally, we demonstrate the effectiveness of the proposed method through experiments.

Channeling of Intermediates Derived from Medium-Chain Fatty Acids and De novo-SYnthesized Fatty Acids to Polyhydroxyalkanoic Acid by 2-Bromooctanoic Acid in Pseudomonas fluorescens BM07

  • LEE, HO-JOO;RHO, JONG-KOOK;KAMBIZ AKBARI NOGHABI,;LEE, SEUNG-EUN;CHOI, MUN-HWAN;YOON, SUNG-CHUL
    • Journal of Microbiology and Biotechnology
    • /
    • v.14 no.6
    • /
    • pp.1256-1266
    • /
    • 2004
  • 2-Bromooctanoic acid (2-BrOA) is known to block the formation of polyhydroxyalkanoic acid (PHA) in Pseudomonasfluorescens BM07 without any influence on the cell growth when grown on fructose, but it inhibits the cell growth when grown on octanoate (OA) (Lee et al., Appl. Environ. Microbiol. 67: 4963- 4974, 2001). We investigated the role of 2-BrOA in the PHA synthesis of the bacterium grown with mixtures of fructose and fatty acids. OA, 11­phenoxyundecanoic acid (1 1-POU), and 5-phenylvaleric acid (5-PV) were selected as model substrates. When supplemented with 50 mM fructose, all these carboxylic acids suppressed the formation of PHA from fructose, however, the ~-oxidation coenzyme A monomers derived from the carboxylic acids were efficiently polymerized, but the conversion yield [(mol of carboxylate substrate converted into PHA)/(mol of carboxylate substrate in the feed)] was low (e.g., maximally $\~53\%$ for 5 mM 11-POU). Addition of 2-BrOA (up to 5 mM) to the mixed carbon sources raised the conversion yield sensitively and effectively only at low levels of the acid substrates (e.g., 2 mM 1 1-POU or 5 mM OA): For instance, $100\%$ of 2 mM ll-POU were converted into PHA in the presence of 5 mM 2-BrOA, whereas only $\~10\%$ of the 1 1-POU were converted in the absence of 2-BrOA. However, at highly saturated suppressing levels (e.g., 5 mM ll-POU), 2-BrOA inhibitor showed no significant additional effect on the conversion ($60- 70\%$ conversion irrespective of 2-BrOA level). The existence of competitive and compensative relationship between 2­BrOA and all the carboxylic acid substrates used may indicate 'Present address: Section on Brain Physiology and Metabolism, Bldg. 10, Rm. 6N202, National Institute on Agmg, National Institute of Health, Bethesda, MD 20892, U.S.A. that all the acid substrate-derived inhibiting species bind to the same site as the 2-BrOA inhibiting species does. We, therefore, suggest that 2-BrOA can be used for efficiently increasing the yield of conversion of expensive substituted fatty acids into PHA and then substituted 3-hydroxyacids by hydrolyzing it.