• Title/Summary/Keyword: n-screen

Search Result 533, Processing Time 0.025 seconds

The Performance of Heavy Ion CT System with Fluorescent Screen and CCD Camera

  • Tomida, Tetsuya;Nishimura, Katsuyuki;Abe, Shinji;Sato, Hitoshi;Muraishi, Hiroshi;Inada, Tetsuo;Tazawa, Shuichi;Kanai, Tatsuaki;Yusa, Ken;Kawachi, Kiyomitsu
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2002.09a
    • /
    • pp.432-435
    • /
    • 2002
  • We have developed and proposed the heavy ion CT system which consists of fluorescent screen and CCD camera equipped with image intensifier. In our system, we have measured the residual range of particles that passed a phantom and reconstructed the CT image for the distribution of relative stopping power by filtered back projection method with Shepp '||'&'||' Logan filter. The heavy ion $\^$12/C accelerated up to 400 MeV/u by HIMAC (Heavy Ion Medical Accelerator in Chiba) was used. Intensity of the beam output changes like macro pulse, the period being 3.3 sec and the width being 2 sec. The series of data was acquired in synchronizing with the pulse, leading to the improvement of S/N in the CT image. The fundamental performance was experimentally evaluated in the proposed system. The spatial resolution was estimated to be about 1 mm and the density resolution (electron density referred to water) to be about 0.01.

  • PDF

The Design and Implementation of a Multi-Session Processing Between RMA and RCP within a Vehicle Tracking System (차량 추적 시스템에서 RMA와 RCP 사이의 다중세션 설계 및 구현)

  • Jang, Chung Ryong;Lee, Yong Kwon;Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.127-141
    • /
    • 2014
  • A Vehicle Tracking System consists of GPS tracking device which fits into the vehicle and captures the GPS location information at regular intervals to a central GIS server, and GIS tracking server providing three major responsibilities: receiving data from the GPS tracking unit, securely storing it, and serving this information on demand of the user. GPS based tracking systems supporting a multi-session processing among RMA, RM, and RCP can make a quick response to various services including other vehicle information between RSU and OBU on demand of the user. In this paper we design RSU lower layers and RCP applications in OBU for a multisession processing simulation and test message processing transactions among RMA-RM and RM-RCP. Furthermore, we implement the additional functions of handling access commands simultaneously on multiple service resources which are appropriate for the experimental testing conditions. In order to make a multi-session processing test, it reads 30 resource data,0002/0001 ~ 0002/0030, in total and then occurs 30 session data transmissions simultaneously. We insert a sequence number field into a special header of dummy data as a corresponding response to check that the messages are received correctly. Thus, we find that GIS service system with a multi-session processing is able to provide additional 30 services in a same speed of screen presentation loading while identifying the number of session processing of Web GIS service, the number of OBU service, and the speed of screen presentation loading by comparing a single session and a multi-session of GIS service system.

In Vitro Wheat Immature Spike Culture Screening Identified Fusarium Head Blight Resistance in Wheat Spike Cultured Derived Variants and in the Progeny of Their Crosses with an Elite Cultivar

  • Huang, Chen;Gangola, Manu P.;Kutcher, H. Randy;Hucl, Pierre;Ganeshan, Seedhabadee;Chibbar, Ravindra N.
    • The Plant Pathology Journal
    • /
    • v.36 no.6
    • /
    • pp.558-569
    • /
    • 2020
  • Fusarium head blight (FHB) is a devastating fungal disease of wheat (Triticum aestivum L.). The lack of genetic resources with stable FHB resistance combined with a reliable and rapid screening method to evaluate FHB resistance is a major limitation to the development of FHB resistant wheat germplasm. The present study utilized an immature wheat spike culture method to screen wheat spike culture derived variants (SCDV) for FHB resistance. Mycotoxin concentrations determined by liquid chromatography-tandem mass spectrometry (LC-MS/MS) correlated significantly (P < 0.01) with FHB severity and disease progression during in vitro spike culture. Selected SCDV lines assessed for FHB resistance in a Fusarium field disease nursery in Carman, Manitoba, Canada in 2016 showed significant (P < 0.01) correlation of disease severity to the in vitro spike culture screening method. Selected resistant SCDV lines were also crossed with an elite cv. CDC Hughes and the progeny of F2 and BC1F2 were screened by high resolution melt curve (HRM) analyses for the wheat UDP-glucosyl transferase gene (TaUGT-3B) single nucleotide polymorphism to identify resistant (T-allele) and susceptible (G-allele) markers. The progeny from the crosses were also screened for FHB severity using the immature spike culture method and identified resistant progeny grouped according to the HRM genotyping data. The results demonstrate a reliable approach using the immature spike culture to screen for FHB resistance in progeny of crosses in early stage of breeding programs.

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Intranet을 위한 방화벽 시스템구현에 관한 연구

  • 최석윤;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.103-123
    • /
    • 1997
  • This dissertation provides a theoretic study on the network security in general , the firewall in particular. In fact the firewall has been recognized as a very promising option to obtain the security inthe real work network environment . The dissertation provides a throuth theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procddure to make analysis and plans of the firewall configuration . Based on the above investigation and analysis, this dissertation provides two approaches to network security , which address anumber of issuesboth at the network and at applicatino level. At the network level, a new method is proposed which uses packet filtering based on the analysis of the counter plot about the screen router.On the other hand, at the application level, a novel method is explored which employs secureity software. Firewall-1 , on Bastion host. To demonstrate the feasibililty and the effectiveness of the proposed methodologties , a prototype implementation is made The experiment result shows that the screen router employing the proposed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegal packets entering form external hackers. Meanwhile , at the application level, the proposed software approach employing Firewall-1 is proved to be robust enugh to prevent hackings from the outer point the point protocal connnection . Theoretically, it is not possible to provide complete security to the network system, because the network security involve a number of issues raised form low level network equipments form high level network protocol. The result inthis dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

The Validation of a Measurement for Assessing the Capacity of Korean Older Adults to Consent to Research (한국노인의 연구참여를 위한 동의능력평가척도의 타당성 연구)

  • Lee, Min-Hong
    • Korean Journal of Social Welfare
    • /
    • v.61 no.3
    • /
    • pp.55-76
    • /
    • 2009
  • This study tested the psychometric properties of the Korean version of the Capacity-to-Consent Screen: K-CCS) scale. A total of 404 South Korean older adults were e Cruited using the purposive sampling method. The participants were asked to res-Cod to a structured questiConaire which included older adults' characteristics, ADLs, IADLs, cognitive impairments and creen: K-CCS) scale. A total of. Item analysis, explonalory factor analysis(EFA), and ) sfirmalory factor analysis(CFA) were cCoducted to verifK-Che psychometric properties of the Korean Version of CCS. The sample was divided into two groups: one group for EFA(n=202) alysis(Eois(r group for CFA(n=202). The totults revealeysisae. he final version of the 8-item K-CCS with two dimensions had a excellent internof. Itemstencyonofpha value=.f) alysa CFA) sfirmed the acceptaas diviof the modef.fdi(RMSEA=.057, NNFI=.f4, IFI=.f6, CFI=.f6) to twaddition, claims for the convergent and criterion-related validdiviwere demItetnaled. Ity-tnclusion, the K-CCS can be rmed for professi sams to asersioolder participants' capacity to consent to clinical or survey research.

  • PDF

Use of a Transformed Diode Equation for Characterization of the Ideality Factor and Series Resistance of Crystalline Silicon Solar Cells Based on Light I-V Curves (Light I-V 곡선을 이용한 결정질 태양전지의 이상계수와 직렬 저항 특성 분석)

  • Jeong, Sujeong;Kim, Soo Min;Kang, Yoonmook;Lee, Hae-seok;Kim, Donghwan
    • Korean Journal of Materials Research
    • /
    • v.26 no.8
    • /
    • pp.422-426
    • /
    • 2016
  • With the increase in installed solar energy capacity, comparison and analysis of the physical property values of solar cells are becoming increasingly important for production. Therefore, research on determining the physical characteristic values of solar cells is being actively pursued. In this study, a diode equation, which is commonly used to describe the I-V behavior and determine the electrical characteristic values of solar cells, was applied. Using this method, it is possible to determine the diode ideality factor (n) and series resistance ($R_s$) based on light I-V measurements. Thus, using a commercial screen-printed solar cell and an interdigitated back-contact solar cell, we determined the ideality factor (n) and series resistance ($R_s$) with a modified diode equation method for the light I-V curves. We also used the sun-shade method to determine the ideality factor (n) and series resistance ($R_s$) of the samples. The values determined using the two methods were similar. However, given the error in the sun-shade method, the diode equation is considered more useful than the sun-shade method for analyzing the electrical characteristics because it determines the ideality factor (n) and series resistance ($R_s$) based on the light I-V curves.

Activated Phenoloxidase Interacts with A Novel Glycine-rich Protein on the Yeast Two-hybrid System

  • Lee, Sun-Woo;Lee, Hyun-Seong;Kim, Eun-Jun;Yoo, Mi-Ae;Lee, Bok-Luel
    • BMB Reports
    • /
    • v.34 no.1
    • /
    • pp.15-20
    • /
    • 2001
  • One of the innate immune reactions in invertebrates is the pro-phenoloxidase (pro-PO) activation system that is involved in the generation of superoxide, melanin synthesis, and the subsequent sequestration of foreign matter entering the hemocoel of the invertebrates. However, the molecular mechanism of this biological reaction is still obscure. To expand our understanding of the biological roles of the pro-PO activation system in invertebrates, we performed a yeast two-hybrid screening by using three regions of pro-PO as bait and a yeast two-hybrid cDNA library from Tenebrio molitor larvae as prey We isolated a novel partial cDNA clone that encodes a glycine-rich protein that interacted with the active phenoloxidase (termed phenoloxidase interacting protein, POIP). POIP consists of two domains: One is an N-terminal unique domain and the other is a C-terminal glycine-rich domain. The C-terminal glycine-rich domain showed sequential homology with those of insect antifungal proteins. Also, the yeast two-hybrid screen in a reverse orientation (using POIP as bait) yielded PO, suggesting that the PO-POIP interaction is specific. By using a 315 bP PCR fragment of the N-terminal unique region of POIP, we cloned the full-length cDNA of POIP from the Tenebruo cDNA library constructed by using E. coli injected larvae. The interaction analysis between PO, and a truncated fragment lacking the N-terminal unique region of POIP, indicated that the N-terminal unique region is necessary for interaction between PO and POIP. The expression level of the POIP mRNA is increased by bacterial injection into T. molitor larvae. This suggests that POIP might be engaged in the humoral defense reaction.

  • PDF

Formation of ultra-shallow $p^+-n$ junction through the control of ion implantation-induced defects in silicon substrate (이온 주입 공정시 발생한 실리콘 내 결함의 제어를 통한 $p^+-n$ 초 저접합 형성 방법)

  • 이길호;김종철
    • Journal of the Korean Vacuum Society
    • /
    • v.6 no.4
    • /
    • pp.326-336
    • /
    • 1997
  • From the concept that the ion implantation-induced defect is one of the major factors in determining source/drain junction characteristics, high quality ultra-shallow $p^+$-n junctions were formed through the control of ion implantation-induced defects in silicon substrate. In conventional process of the junction formation. $p^+$ source/drain junctions have been formed by $^{49}BF_2^+$ ion implantation followed by the deposition of TEOS(Tetra-Ethyl-Ortho-Silicate) and BPSG(Boro-Phospho-Silicate-Glass) films and subsequent furnace annealing for BPSG reflow. Instead of the conventional process, we proposed a series of new processes for shallow junction formation, which includes the additional low temperature RTA prior to furnace annealing, $^{49}BF_2^+/^{11}B^+$ mixed ion implantation, and the screen oxide removal after ion implantation and subsequent deposition of MTO (Medium Temperature CVD oxide) as an interlayer dielectric. These processes were suggested to enhance the removal of ion implantation-induced defects, resulting in forming high quality shallow junctions.

  • PDF

Macrozoobenthic Communities of the Deep Sea Sediments in the Northeastern Pacific Ocean (북동태평양 심해저 퇴적물에 서식하는 대형저서동물의 군집)

  • Choi, Jin-Woo;Kim, Dong-Sung;Hyun, Jung-Ho;Lee, Chang-Hoon
    • Ocean and Polar Research
    • /
    • v.26 no.2
    • /
    • pp.367-376
    • /
    • 2004
  • Macrobenthos were collected at 7 stations located from $5^{\circ}N$ to $10^{\circ}N$ with 1o interval along the longitude of $131^{\circ}W$ using a box corer with sampling area of $0.25\;m^2$ in July, 1999. In order to see the vertical distribution of macrobenthos in sediments, each subcore sample was divided into 5 layers with 1 cm interval up to 6 cm depth. Each subcore sample was sieved through 0.3 mm mesh screen and fixed with 10% Rose Bengal added formalin. A total of 22 faunal groups in 11 phyla were sampled and the average density was $959\;{\pm}\;584\;ind./m^2$. Foraminiferans comprised 34.8% of total specimens were the most abundant fauna, and followed by nematodes (27.5%), polychaete worms (15.7%), and benthic harpactoid copepods (10.4%). A latitudinal trend was shown in the distribution of macrobenthos; the maximum density of $1,832\;ind./m^2$ appeared at station N06 and the most poverished community occurred at station N09 with the density of $248\;ind./m^2$. The density of typical macrofaunal taxa except foraminiferans and nematods was $116\;ind./m^2$. In the vertical distribution of macrobenthos, more than 70% of macrobenthos occurred in the upper 2 cm layer, and upper 4 cm layer contained about 90% of macrofauna. Polychaete worms consisted of 22 families, and cirratulid and paraonid worms were dominant polychaete species. The prominant feeding guilds of polychaete worms were SDT (surface, descretely motile, tenaculate feeding) and SMX (surface, motile, non-jawed); they comprised more than 50% of polychaete abundance. These feeding guilds of polychaete worms suggests that the deep sea benthos should be well adapted the newly settled deposits from water column, but this should be clarified by the further studies.