• 제목/요약/키워드: checks

검색결과 827건 처리시간 0.028초

Microscopic Patterns of Decay caused by Tyromyces palustris and Gloeophyllum trabeum in Korean Red Pine and Radiata Pine Woods

  • Kim, Hwa Sung;Eom, Young Geun
    • Journal of the Korean Wood Science and Technology
    • /
    • 제34권5호
    • /
    • pp.1-10
    • /
    • 2006
  • The objective of this study was to elucidate the microscopic patterns of decay caused by brown-rot fungi of Tyromyces palustri and Gloeophyllum trabeum in Korean red pine (Pinus densiflora) and radiata pine (Pinus radiata) woods through light and electron microscopies. The ultrastructural changes of cell walls attacked by the two brown-rot fungi were compared in this respect. Macroscopically, radiata pine showed more ring and radial checks than Korean red pine. Microscopically, with the progress of decay, spiral checks associated with cross-field pits and bore holes in the cell wall were more remarkably numerous in the radiata pine than in the Korean red pine. In the radiata pine, G. trabeum produced more spiral checks in the cell wall than T. palustris. In the advanced stages of decay by G. trabeum, the erosions of ray cell walls were identified both in the Korean red pine and radiata pine but $S_3$ layers of tracheid walls were eroded only in the Korean red pine.

Formal Validation Method and Tools for French Computerized Railway Interlocking Systems

  • Antoni, Marc
    • International Journal of Railway
    • /
    • 제2권3호
    • /
    • pp.99-106
    • /
    • 2009
  • Checks and tests before putting safety facilities into service as well as the results of these tests are essential, time consuming and may show great variations between each other. Economic constraints and the increasing complexity associated with the development of computerized tools tend to limit the capacity of the classic approval process (manual or automatic). A reduction of the validation cover rate could result in practice. This is not compatible with the French national plan to renew the interlocking systems of the national network. The method and the tool presented in this paper makes it possible to formally validate new computerized systems or evolutions of existing French interlocking systems with real-time functional interpreted Petri nets. The aim of our project is to provide SNCF with a method for the formal validation of French interlocking systems. A formal proof method by assertion, which is applicable to industrial automation equipment such as interlocking systems, and which covers equally the specification and its real software implementation, is presented in this paper. With the proposed method we completely verify that the system follows all safety properties at all times and does not show superfluous conditions: it replaces all the indoor checks (not the outdoor checks). The advantages expected are a significant reduction of testing time and of the related costs, an increase of the test coverage rate, an answer to the new demand of railway infrastructure maintenance engineering to modify and validate computerized interlocking systems. Formal methods mastery by infrastructure engineers are surely a key to prove that more safety is not necessarily more expensive.

  • PDF

잣나무 간벌(間伐)통나무와 수심재(髓心材)의 가열판식(加熱板式) 진공건조(眞空乾燥) 특성 (The Characteristics of Vacuum Drying Heated by Hot Plates for the Thinned Logs and Pillars of Korean Pine)

  • 정희석;이남호;박정환
    • Journal of the Korean Wood Science and Technology
    • /
    • 제25권4호
    • /
    • pp.51-60
    • /
    • 1997
  • We investigated the characteristics of air-and vacuum-drying heated by hot plates for 8~14cm-diameter logs or 6~12cm-thick pillars of Pinus koraiensis. And we evaluated the effects of longitudinal kerf and vacuum drying heated by hot plates. The vacuum drying times from green to 10.9~18.6% MC were 15 days, and these times were one-fifth compared to the air-drying times. The longitudinal kerfing had no significant, effect on drying rates during both air-drying and vacuum drying. But drying defects such as surface checks and V-shaped cracks were effectively prevented during air-drying and vacuum drying by longitudinal kerfing. The vacuum drying was more advantageous than air-drying for preventing of surface checks, end checks and V-shaped cracks, and especially, the vacuum dried pillars with longitudinal kerf were almost free from drying defects. In accelerated weathering conditions the resin did not exude for all specimens.

  • PDF

A Two-Step Screening Algorithm to Solve Linear Error Equations for Blind Identification of Block Codes Based on Binary Galois Field

  • Liu, Qian;Zhang, Hao;Yu, Peidong;Wang, Gang;Qiu, Zhaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3458-3481
    • /
    • 2021
  • Existing methods for blind identification of linear block codes without a candidate set are mainly built on the Gauss elimination process. However, the fault tolerance will fall short when the intercepted bit error rate (BER) is too high. To address this issue, we apply the reverse algebra approach and propose a novel "two-step-screening" algorithm by solving the linear error equations on the binary Galois field, or GF(2). In the first step, a recursive matrix partition is implemented to solve the system linear error equations where the coefficient matrix is constructed by the full codewords which come from the intercepted noisy bitstream. This process is repeated to derive all those possible parity-checks. In the second step, a check matrix constructed by the intercepted codewords is applied to find the correct parity-checks out of all possible parity-checks solutions. This novel "two-step-screening" algorithm can be used in different codes like Hamming codes, BCH codes, LDPC codes, and quasi-cyclic LDPC codes. The simulation results have shown that it can highly improve the fault tolerance ability compared to the existing Gauss elimination process-based algorithms.

엔드테이핑 처리들이 백합나무 원반의 고주파진공건조 중 건조결함 예방에 미치는 영향 (Effect of End-taping Treatments on Prevention of Drying Defects during Radio-Frequency/Vacuum Drying of Domestic Yellow Poplar Log Cross Section)

  • 이남호;;장세환;신익현
    • Journal of the Korean Wood Science and Technology
    • /
    • 제36권6호
    • /
    • pp.59-68
    • /
    • 2008
  • 본 연구에서는 엔드테이핑(End-taping) 처리가 두께가 20~75 mm이고, 직경이 120~470 mm인 백합나무 원반들의 고주파진공건조중 건조결함 예방 미치는 영향에 대하여 조사하였다. Inside end-taping (Inside-ET)과 Outside end-taping (Outside-ET)의 경우 두께 33 mm, 직경 270 mm 이하 원반에서 할렬의 예방효과가 우수하게 나타났다. 직경이 30 cm 이하이고, 두께 60 mm와 두께 75 mm의 원반에서도 전처리을 통하여 경계할렬을 예방할 수 있을 것으로 기대되었다. 경계할렬의 발생위치는 0.50~0.63 diameter 지점으로서 직경에 따라서 상이하였으며, 따라서 횡단면의 부분 엔드테이핑 처리의 경계선도 원반의 직경 따라 적정하게 선정할 필요가 있는 것으로 조사되었다. 중경재의 경우 0.3 diameter 지점이 경계할렬 예방을 위한 전처리의 경계점일 가능성이 높을 것으로 해석된다. 대경재의 경우 경계할렬과 V형 크랙에 의한 손상이 매우 심하였으며, 이는 방사방향으로의 함수율 분포변이가 극심한 백합나무 고유의 재질특성에 기인한 것으로 해석된다. 따라서 대경재의 경우 원반으로 활용하는 것은 적절하지 않는 것으로 생각된다.

철도테러 예방을 위한 철도경찰 보안검색 강화 방안 연구 (Research on Measures to Enhance Railroad Security Checks of Railroad Police Officers to Prevent Terrorist Attacks)

  • 권현식
    • 시큐리티연구
    • /
    • 제49호
    • /
    • pp.157-183
    • /
    • 2016
  • 유럽 등 세계 곳곳에서 이슬람 무장단체(IS)나 자생적 테러 및 국제 테러조직이 다양한 방법으로 철도교통시설에서 폭발물 테러를 발생시켜 "테러와의 전쟁"을 벌이고 있다. 우리나라가 미국의 중동지역에서의 전쟁에 협력하는데 대해 이슬람권 국가들이 반한 감정을 갖고 있고, 이슬람 무장단체(IS)는 2015.9.9 이후 우리나라를 4번이나 테러 대상국으로 지목했다. 또한 북한은 핵 실험, 미사일 발사 실험으로 국제사회에서 고립 당하고 남 북한 간 긴장을 고조시키며 우리의 중요인사 및 시설에 대한 테러 위협을 하고 있다. 이와 같은 테러가 철도교통시설에서 발생하는 것을 예방 및 차단하지 못할 경우 많은 인명 및 재산피해, 사회혼란, 국 내외적으로 테러 대응 정책실패에 대한 정부의 신뢰 하락으로 관광객 감소, 외국의 투자기피, 자본이탈 등 국가적 위기 상황이 발생할 수도 있을 것으로 예상 된다. 본 연구에서는 철도경찰의 철도보안검색 등의 업무를 바탕으로 국민보호와 공공의 안전을 위해 철도보안검색 강화를 위한 정책적 대응 방안을 제안하고자 함에 목적이 있다. 그 방안으로 첫째, 철도경찰의 인력증원 및 일반경찰과 업무 관할권 조정 둘째, 철도 보안검색의 단계적 확대 셋째, 철도의 중요시설 보안시스템 강화 넷째, 철도안전법 보완 다섯째, 동남아 등 각국의 불법체류자 단속 강화 여섯째, 보안검색요원의 인권침해 예방과 전문화대책 일곱째, 보안검색 및 테러예방 홍보와 테러 발생 시 신속한 대응을 위한 관련 기관들의 선제적 주기적 협력 방안 등이 필요하다.

  • PDF

Test turnaround Time for Complete Blood Cell Count using Delta and Panic Value Checks and the Q-flag Limit

  • Koo, Bon-Kyung;Ryu, Kwang-Hyun;Lim, Dae-Jin;Cho, Young-Kuk;Kim, Hee-Jin
    • 대한임상검사과학회지
    • /
    • 제44권2호
    • /
    • pp.66-74
    • /
    • 2012
  • Test turnaround time (TAT) is the lead time from reception to reporting. In the complete blood cell count (CBC), 4 units of the XE-2100 (Sysmex Corp., Japan) processed around 80% of quantity, 1 unit of the LH-780 (Beckman-Coulter Incorp., USA) processed around 10% and 1 unit of ADVIA-2120 (Siemens AG, Munich, Germany) processed around 10%. We analyzed the change in the TAT for the CBC for over 7 years, from January of 2005 to December of 2011. The delta check made alterations of delta to WBC, hemoglobin, hematocrit, platelet and metamyelocyte, however, did not made them to band neutrophil, eosinophil, basophil and monocyte. The panic value check made alterations of panic value to hemoglobin, hematocrit, platelet and monocyte. In the criteria of currently slide review, LH-780 and ADVI-2120 analyzers prepared suspect flags of "Blast, Imm NE2, Immature granulocyte, Imm NE1, Left shift, Variant lymphocyte, Atypical lymphocyte, Platelet clumps and NRBC". The New slide review in the XE-2100 analyzer altered the preparations of a smear slide more than a "Platelet clumps flag(${\geq}200unit$), a single flag excluding the "Platelet clumps flag (${\geq}250unit$) and a multiple flag (${\geq}200unit$)". Also, below the 240 unit, medical technologists prepared manual slides selectively according to their evaluations. The automatic reporting rate was 33.4% without alterations, whereas it was 41.0% without alterations, and was thus improved by 7.6%. The slide review rate was 15.2% before using the Q-flag limit, whereas it was 12.1% for a reduce 3.1%. TAT was 45 minutes without the creation alterations of the delta and panic value checks, whereas it was 35 minutes after making alterations of the delta and panic value checks and thus was shortened by 10 minutes. We came to the conclusion that the establishment and operation of delta and panic value checks and slide review criteria suitable for laboratory environment can reduce unnecessary smear slides, re-checking, re-sampling, re-testing, telephone inquiries and concentrated workloads during specific times of the day.

  • PDF

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권4호
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

타임스탬프 변화패턴을 근거로 한 평가함수에 의한 디지털 포렌식 방법 (A Digital Forensic Method by an Evaluation Function Based on Timestamp Changing Patterns)

  • 조규상
    • 디지털산업정보학회논문지
    • /
    • 제10권2호
    • /
    • pp.91-105
    • /
    • 2014
  • This paper proposes a digital forensic method by an evaluation function based on timestamp changing patterns. Operations on file or folder leave changed timestamps, which give the ways to know what operations were executed. Changes of timestamps of ten operations of a file and eight operations of a folder were examined. Analyses on the changes on the eight folder operations are newly added in this paper, which are not performed in the previous works. Based on the timestamps changes of the file and the folder, two evaluation functions are proposed. The first evaluation function checks whether timestamps are changed by file and folder operations, and the second evaluation function checks whether timestamps are originated from a source file or other attribute field. By the two output values from these evaluation functions, a digital forensic investigation on the file or the folder is performed. With some cases, i. e. file copy and folder creation operations, the proposed forensic method is tested for its usefulness.

옥내 마이크로셀 개인휴대통신 시스템의 채널할당과 핸드오버를 위한 High quality reassignment 방식 (High quality reassignment (HQR) scheme for indoor microcell PCS systems)

  • 오준환;홍대형
    • 전자공학회논문지A
    • /
    • 제33A권2호
    • /
    • pp.40-49
    • /
    • 1996
  • In this paper, we studied channel assignment and handover schemes for the indoor microcell systems. For efficient frequency spectrum reuse we proposed the high quality reassignment (HQR) scheme. Proposed HQR scheme tries to keep the reuse distances small by monitoring C/I of channels being used. To assign a channel for a new or handove call, the scheme checks C/I of all available channels. Then HQR assigns the channel that has C/I near the threshold value, A_TH. The scheme also checks C/I of ongoing calls and continuously reassigns a new channel when needed. It attempts handover not only when C/I gets below a handover threshold value, HO_TH, but also when C/I becomes above a high quality reassignment threshold, H_TH. The performance of the proposed HQR scheme was analyzed by a computer simulation configuraed. The performance of the scheme was also analyzed for various threshold values selected and the results are presented in this paper. The results show that HQR scheme perfomrs better than the scheme adopted for DECT.

  • PDF