• Title/Summary/Keyword: Kwang-ju

Search Result 2,653, Processing Time 0.035 seconds

Intercomparison of Wedge factor for Symmetric field and Asymmetric field used 6MV Linac (6 MV Linac을 이용한 Symmetric field와 Asymmetric field에서 Wedge factor의 비교 고찰)

  • Ji, Youn-Sang;Han, Jae-Jin
    • Journal of radiological science and technology
    • /
    • v.22 no.2
    • /
    • pp.57-60
    • /
    • 1999
  • Therapy equipment have taken progress for Cancer make use of Radiation for the normal tissue system make much of important for shielding. In modern times independent jaw setting to used equipment as possible make use of asymmetric field. Therefore, the asymmetric field be leave out of consideration wedge factor because of with used wedge for the most of part. These experimentation find out have an effect on the dosimetry of out put compared with of the difference between the symmetric field and asymmetic field for the wedge factor.

  • PDF

Security in the Password-based Identification

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.346-350
    • /
    • 2007
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBSI(Password Based Secure Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBSI is also excellent in the aspect of the performance.

ML/RBBAC (Multi-Level/Role-Behavior Based Access Control) (ML/RBBAC (Multi-Level/Role-Behavior Based Access Control) 접근통제)

  • Shin, Wook;Lee, Dong-Ik
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.396-400
    • /
    • 2001
  • 본 논문은 현재 안전한 운영체제 개발에 사용되고 있는 강제 접근통제(MAC)와 역할행위 기반 접근통제(RBBAC)의 혼합 기법인 다중 등급 역할 행위 기반 접근통제 (ML/RBBAC)를 제안하고, 접근통제 모델을 기술한다. ML/RBBAC은 안전한 운영체제가 MAC과 RBBAC을 동시 지원하기 위한 최적의 방법이며, 기존 MAC의 단점인 지나치게 엄격한 정보흐름 통제 및 보안 관리 부담의 증대 문제를 해결한다.

  • PDF

Credit cards use of consumers in Kwang-ju (소비자의 신용카드 사용행동 분석 -광주시 소비자를 중심으로-)

  • 노채영
    • Journal of Family Resource Management and Policy Review
    • /
    • v.6 no.2
    • /
    • pp.65-78
    • /
    • 2002
  • The proposes of this study were designed to practical use of credit cards on consumers in Kwang-ju. The 371 subjects formatted questionnaires were analyzed to frequency, percentage, crosstabulation and chi-square test by SPSS WIN 10.0. The main results of this study were as following : First, it is analyzed that most consumers have had more than credit cards. Second, it is tended that consumers have influenced to practical use of credit cards by sex, age, marriage, income and living expenses. Third, consumer is use to the spur of credit card, requirement about businessman, credit card connection system and distinction of sex, age, marriage, income, showed difference of relevant distribution between living expenses all. Based on the above, to make the use of credit cards practical and active, it needs more attention from consumers as well as it needs continuous efforts from the authorities concerned. Accordingly, to prevent consumers from overconsuming possibly by imprudent use of credit cards, it suggests systematic consumer training, from which consumers will learn responsible life as a consumer.

  • PDF

Patterns in the Outbreaks of Senile Diseases of Industrial Workers in Kwang-ju and Ghon-nam Area (일부 산업체 근로자의 성인병 발생양상)

  • 정희곤
    • The Korean Journal of Food And Nutrition
    • /
    • v.5 no.2
    • /
    • pp.99-103
    • /
    • 1992
  • Patterns in the outbreaks of senile diseases were investigated on 1, 264 workers by special examination among the 43, 210 industrial workers by the screening test performed in Kwang-ju and Chon-nam Branch of Korean Industrial Health Association from January 4 to December 31 in 1991. The results are summarized as follows : 1) Prevalence rate of senile diseases of industrial workers was 2.9%. And prevalence rate according to the kinds of senile diseases was observed in the order of hepatitis (0.9%), hypertension(0.7%), diabetes mellitus(0.5%), anemia(0.4%). 2) Prevalence rate of complicated senile diseases of industrial workers was 0.5%. And prevalence rate according to kinds of complicated senile diseases was observed in the order of others hypertension and arteriosclerosis (0.1%), HBV and others chronic hepatitis(0.1%), essential hypertension and arteriosclerosis(0.03%), iron deficiency anemia and leukopenia(0.03%).

  • PDF

A Study on Sensitivity Analysis for Process Parameters in GMA Welding Processes

  • Kim, Ill-Soo;Park, Chang-Eun;An, Young-Ho;Park, Ju-Seog;Chon, Kwang-Suk;Jeong, Young-Jae
    • Proceedings of the KWS Conference
    • /
    • 2003.05a
    • /
    • pp.29-31
    • /
    • 2003
  • Generally, the Quality of a weld joint is strongly influenced by process parameters during the welding process. In order to achieve high quality welds, mathematical models that can predict the bead geometry to accomplish the desired mechanical properties of the weldment should be developed. To achieve this objectives, a sensitivity analysis has been conducted and compared the relative impact of three process parameters on bead geometry in order to verify the measurement errors on the values of the uncertainty in estimated parameters. The results obtained show that developed mathematical models can be applied to estimate the effectiveness of process parameters for a given bead geometry, and a change of process parameters affects the bead width and bead height more strongly than penetration relatively.

  • PDF

Colocalization of ${\alpha}$of Gq Protein with Actin Filaments in L8E63 Cells

  • Chae, Sungsuk;Park, Dongeun
    • Animal cells and systems
    • /
    • v.1 no.1
    • /
    • pp.93-98
    • /
    • 1997
  • The present study investigated the cellular localization of a-subunit of Gq (Gaq) protein in developing L8E63, rat skeletal muscle cell line. The colocalization of Gaq with actin cytoskeleton was demonstrated by double-labeling experiments. In mononucleated myoblasts, the immuno-fluorescence staining pattern of Gaq was almost identical with that of F-actin visualized with rhodamine-conjugated phalloidin. However, this colocalization of Gaq with cytoskeleton was not maintained in multinucleated myotubes. The staining pattern of Gaq in myotubes did not match with any specific subcellular structure, but appeared as a uniformly distributed diffuse staining throughout the whole cell surface. Interestingly, change in the expression level of Gaq was not detected during myoblast differentiation, suggesting that actin-associated Gaq protein might dissociate from the cytoskeleton as cells differentiate. Immunocytochemical experiments using specific antibodies directed against several G proteins indicated that the subcellular localizations of Gai1, Gai2, Gai3, and Gao were different from those obtained with Gaq.

  • PDF

Test Generation for Speed-Independent Asynchronous Circuits with Undetectable Faults Identification

  • Eunjung Oh;Lee, Dong-Ik;Park, Ho-Yong
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.359-362
    • /
    • 2000
  • In this paper, we propose a test pattern generation algorithm on the basis of the identification of undetectable faults for Speed-Independent(SI) asynchronous control circuits. The proposed methodology generates tests from the specification of a target circuit, which describes the behavior of the circuit in the form of Signal Transition Graph (STG). The proposed identification method uses only topological information of a target circuit and reachability information of a fault-free circuit, which is generated in the form of Binary Decision Diagram(BDD) during pre-processing. Experimental results show that high fault coverage over single input stuck-at fault model is obtained for several synthesized SI circuits and the use of the identification process as a preprocessing decreases execution time of the proposed test generation with negligible costs.

  • PDF

Effect of Power Control Step Size on the Performance of the SIC Scheme in Power-Controlled DS/CDMA Systems

  • Lee, Chiho;Kim, Kiseon
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1701-1704
    • /
    • 2002
  • In this paper, we investigate the effect of power control step size on the performance of the SIC scheme in DS/CDMA systems. We investigate the average power control iteration and its standard deviation and evaluate the outage performance for several different values of power control step size. Because the SIC scheme requires fine control in the received signal power, the better outage performance is obtained fer the smaller power control step size. However, the smaller power control step size requires larger amount of power control iteration in order to make the power control converge to the steady state. Under the simulated environment, the proper power control step size is about 0.3-0.4dB from both convergence speed of power control algorithm and outage performance points of view.

  • PDF