• Title/Summary/Keyword: key exposure

Search Result 449, Processing Time 0.034 seconds

The study of Right Portrait Exposure Setting in Digital Cameras;Focusing on the Cognitive Preference in Representation of Skin Tones (인물 촬영을 위한 디지털 카메라의 적정 노출 설정 연구;피부톤 재현 선호도를 중심으로)

  • Noh, Yeon-Sook;Har, Dong-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.111-118
    • /
    • 2008
  • Nowadays, people get images from various media like TV, magazines, newspaper, internet. Such images directly influence people's thoughts and lives, either consciously or unconsciously. In the past, reproduction devices have been mainly used in reproducing an original scene accurately. Lately, the cognitive preference became a key value in the scene reproduction, and it was affected by the surrounding media. Recently, the most commonly used device in reproducing an original scene is the camera. The core of an image is the light, in other words, the exposure. Most digital cameras are set to adjust exposure automatically in order to reproduce a scene physically as identical as possible. However, physically right exposure does not always give images that people prefers. Numbers of tests were done to find the exposure value that makes an image cognitively more preferred. Skin tones which are highly sensitive to color and changes in density has been used in the tests. A male and a female model have been used to classify changes in cognitive preference due to gender differences.

Measurement of Finger Blood Flow in Raynaud's Phenomenon by Radionuclide Angiography (레이노드 현상에서 수지혈류 측정에 관한 연구)

  • Lim, Sang-Moo;Chung, June-Key;Lee, Myung-Chul;Choi, Sung-Jae;Koh, Chang-Soon;Kim, Sang-Joon
    • The Korean Journal of Nuclear Medicine
    • /
    • v.21 no.2
    • /
    • pp.183-190
    • /
    • 1987
  • In Raynaud's phenomenon, the authors measured finger blood flow after ice water exposure by analyzing the time activity curve of radionuclide angiography on both hands. The results were as follows: 1) The digital blood flow did not decrease after ice water exposure in normal subjects. 2) In the patients with Raynaud's phenomenon, there were two groups: the one had decreased digital blood flow after cold exposure, and the other had paradoxically increased digital blood flow after cold exposure. 3) There was no difference in the digital blood flow of hand in room temperature between the normal and the patients with reduced digital blood flow after cold exposure, but the digital blood flow of the hand in room temperature was markedly reduced in the patients with paradoxically increased flow after cold exposure. 4) In the static image the difference was not significant in comparision with the dynamic study, because it represents pooling of the blood in the vein rather than flow. 5) After the treatment with nifedipine, the digital blood flow increased. In conclusion, the radionuclide angiography was useful in measuring the digital blood flow in Raynaud's phenomenon, and further studies with various drugs is expected.

  • PDF

The Burdens of Occupational Heat Exposure-related Symptoms and Contributing Factors Among Workers in Sugarcane Factories in Ethiopia: Heat Stress Wet Bulb Globe Temperature Meter

  • Mitiku B. Debela;Achenef M. Begosaw;Negussie Deyessa;Muluken Azage
    • Safety and Health at Work
    • /
    • v.14 no.3
    • /
    • pp.325-331
    • /
    • 2023
  • Background: Heat stress is a harmful physical hazard in many occupational settings. However, consequences of occupational heat exposure among workers in a sugarcane factory in Ethiopia are not well characterized. This study aimed to assess the level of occupational heat exposure-related symptoms and contributing factors. Methods: In this cross-sectional study, five workstations were selected for temperature measurement. Heat stress levels were measured using a wet-bulb globe temperature index meter. A stratified random sampling technique was used to select 1,524 participants. Heat-related symptoms were assessed using validated questionnaires. Results: The level of occupational heat exposure was 72.4% (95% CI: 70.2%-74.8%), while 71.6% (95% CI: 69.3%-74.9%) of participants experienced at least one symptom related to heat stress. The most common heat-related symptoms were swelling of hands and feet (78%), severe thirst (77.8%) and dry mouth (77.4%). The identified risk factors were a lack of reflective shields (AOR: 2.20, 95% CI: 1.53, 3.17), not-enclosed extreme heat sources (AOR: 1.76, 95% CI: 1.23, 2.51), a lack of access to shade (AOR: 9.62, 95% CI: 6.20, 14.92), and inappropriate protective clothing provision (AOR: 1.58, 95% CI: 1.27, 2.71). Conclusions: The burden of occupational heat exposure and heat-induced symptoms was high. Lack of reflective shields, the absence of enclosed extreme heat sources, a lack of access to shade, and inappropriate protective clothing provision were considerable attributes of heat stress. Therefore, the use of mechanical solutions to stop heat emissions at their sources and the key factors identified were areas for future intervention.

CORROSION BEHAVIOR OF NI-BASE ALLOYS IN SUPERCRITICAL WATER

  • Zhang, Qiang;Tang, Rui;Li, Cong;Luo, Xin;Long, Chongsheng;Yin, Kaiju
    • Nuclear Engineering and Technology
    • /
    • v.41 no.1
    • /
    • pp.107-112
    • /
    • 2009
  • Corrosion of nickel-base alloys (Hastelloy C-276, Inconel 625, and Inconel X-750) in $500^{\circ}C$, 25MPa supercritical water (with 10 wppb oxygen) was investigated to evaluate the suitability of these alloys for use in supercritical water reactors. Oxide scales formed on the samples were characterized by gravimetry, scanning electron microscopy/energy dispersive spectroscopy, X-ray diffraction, and X-ray photoelectron spectroscopy. The results indicate that, during the 1000h exposure, a dense spinel oxide layer, mainly consisting of a fine Cr-rich inner layer ($NiCr_{2}O_{4}$) underneath a coarse Fe-rich outer layer ($NiFe_{2}O_{4}$), developed on each alloy. Besides general corrosion, nodular corrosion occurred on alloy 625 possibly resulting from local attack of ${\gamma}$" clusters in the matrix. The mass gains for all alloys were small, while alloy X -750 exhibited the highest oxidation rate, probably due to the absence of Mo.

CORROSION BEHAVIOR OF AUSTENITIC AND FERRITIC STEELS IN SUPERCRITICAL WATER

  • Luo, Xin;Tang, Rui;Long, Chongsheng;Miao, Zhi;Peng, Qian;Li, Cong
    • Nuclear Engineering and Technology
    • /
    • v.40 no.2
    • /
    • pp.147-154
    • /
    • 2008
  • The general corrosion behavior of austenitic and ferritic steels(316L, 304, N controlled 304L, and 410) in supercritical water is investigated in this paper. After exposure to deaerated supercritical water at $480^{\circ}C$/25 MPa for up to 500 h, the four steels studied were characterized using gravimetry, scanning electron microscopy/energy dispersive X-ray spectroscopy(SEM/EDS), X-ray photoelectron spectroscopy(XPS), and X-ray diffraction(XRD). The results show that the 316L steel with a higher Cr and Ni content has the best corrosion-resistance performance among the steels tested. In addition to the oxide layer mixed with $Fe_{3}O_{4}$ and $(Fe,Cr)_{3}O_{4}$ that formed on all the samples, a $Fe_{3}O_{4}$ loose outer layer was observed on the 410 steel. The corrosion mechanism of stainless steels in supercritical water is discussed based on the above results.

The Analysis of the TETRA Authentication Protocol (TETRA 인증 프로토콜 분석)

  • Park Yong-Seok;Ahn Jae-Hwan;Jung Chang-Ho;Ahn Joung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1070-1075
    • /
    • 2006
  • TETRA system provides the radio authentication service which permits only authorized radio to access network. Radio authentication is the process which checks the sameness of authentication-key(K) shared between radio and authentication center by challenge-response protocol. TETRA standard authentication protocol can prevent the clone radio to copy ISSI from accessing network, but can't prevent the clone radio to copy ISSI & authentication-key. This paper analyzes authentication-key generation/delivery/infection model in TETRA authentication system and analyzes the threat of clone radio caused by authentication-key exposure. Finally we propose the new authentication protocol which prevent the clone radio to copy ISSI & authentication-key from accessing network.

Flutter and buffeting responses of the Shantou Bay Bridge

  • Gu, M.;Chen, W.;Zhu, L.D.;Song, J.Z.;Xiang, H.F.
    • Wind and Structures
    • /
    • v.4 no.6
    • /
    • pp.505-518
    • /
    • 2001
  • Shantou Bay Bridge is the first long-span suspension bridge in China. Because of its location near the Shantou Seaport and its exposure to high typhoon winds, wind-resistant studies are necessary to be made. In this paper, critical flutter wind speeds and buffeting responses of this bridge at its operation and main construction stages are investigated. The Buffeting Response Spectrum method is first briefly presented. Then the sectional model test is carried out to directly obtain the critical flutter wind speed and to identify the flutter derivatives, which are adopted for the later analysis of the buffeting responses using the Buffeting Response Spectrum method. Finally the aeroelastic full bridge model is tested to further investigate the dynamic effects of the bridge. The results from the tests and the computations indicate that the flutter and buffeting behaviors of the Shantou Bay Bridge are satisfied.

Atomistic simulations of defect accumulation and evolution in heavily irradiated titanium for nuclear-powered spacecraft

  • Hai Huang;Xiaoting Yuan;Longjingrui Ma;Jiwei Lin;Guopeng Zhang;Bin Cai
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2298-2304
    • /
    • 2023
  • Titanium alloys are expected to become one of the candidate materials for nuclear-powered spacecraft due to their excellent overall performance. Nevertheless, atomistic mechanisms of the defect accumulation and evolution of the materials due to long-term exposure to irradiation remain scarcely understood by far. Here we investigate the heavy irradiation damage in a-titanium with a dose as high as 4.0 canonical displacements per atom (cDPA) using atomistic simulations of Frenkel pair accumulation. Results show that the content of surviving defects increases sharply before 0.04 cDPA and then decreases slowly to stabilize, exhibiting a strong correlation with the system energy. Under the current simulation conditions, the defect clustering fraction may be not directly dependent on the irradiation dose. Compared to vacancies, interstitials are more likely to form clusters, which may further cause the formation of 1/3<1210> interstitial-type dislocation loops extended along the (1010) plane. This study provides an important insight into the understanding of the irradiation damage behaviors for titanium.

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.

Data Cleaning and Integration of Multi-year Dietary Survey in the Korea National Health and Nutrition Examination Survey (KNHANES) using Database Normalization Theory (데이터베이스 정규화 이론을 이용한 국민건강영양조사 중 다년도 식이조사 자료 정제 및 통합)

  • Kwon, Namji;Suh, Jihye;Lee, Hunjoo
    • Journal of Environmental Health Sciences
    • /
    • v.43 no.4
    • /
    • pp.298-306
    • /
    • 2017
  • Objectives: Since 1998, the Korea National Health and Nutrition Examination Survey (KNHANES) has been conducted in order to investigate the health and nutritional status of Koreans. The food intake data of individuals in the KNHANES has also been utilized as source dataset for risk assessment of chemicals via food. To improve the reliability of intake estimation and prevent missing data for less-responded foods, the structure of integrated long-standing datasets is significant. However, it is difficult to merge multi-year survey datasets due to ineffective cleaning processes for handling extensive numbers of codes for each food item along with changes in dietary habits over time. Therefore, this study aims at 1) cleaning the process of abnormal data 2) generation of integrated long-standing raw data, and 3) contributing to the production of consistent dietary exposure factors. Methods: Codebooks, the guideline book, and raw intake data from KNHANES V and VI were used for analysis. The violation of the primary key constraint and the $1^{st}-3rd$ normal form in relational database theory were tested for the codebook and the structure of the raw data, respectively. Afterwards, the cleaning process was executed for the raw data by using these integrated codes. Results: Duplication of key records and abnormality in table structures were observed. However, after adjusting according to the suggested method above, the codes were corrected and integrated codes were newly created. Finally, we were able to clean the raw data provided by respondents to the KNHANES survey. Conclusion: The results of this study will contribute to the integration of the multi-year datasets and help improve the data production system by clarifying, testing, and verifying the primary key, integrity of the code, and primitive data structure according to the database normalization theory in the national health data.