• Title/Summary/Keyword: rapid processing

Search Result 1,378, Processing Time 0.034 seconds

Capacitively-coupled Resistivity Method - Applicability and Limitation (비접지식 전기비저항 탐사 - 적용성과 한계)

  • Lee Seong Kon;Cho Seong-Jun;Song Yoonho;Chung Seung-Hwan
    • Geophysics and Geophysical Exploration
    • /
    • v.5 no.1
    • /
    • pp.23-32
    • /
    • 2002
  • Capacitively-coupled resistivity (CCR) system is known to be very useful where galvanic contact to earth is impossible, such as the area covered with thick ice, snow, concrete or asphalt. This system injects current non-galvanically, i.e., capacitively to earth through line antenna and measures potential difference in a same manner. We derived geometric factor for two types of antenna configuration and presented the method of processing and converting the data obtained with CCR system suitable to conventional resistivity inversion analysis. The CCR system, however, has limitations on use at conductive area or electrically noisy area since it is very difficult to inject sufficient current to earth with this system as with conventional resistivity system. This causes low SM ratio when acquiring data with CCR system and great care must be taken in acquiring data with this system. Additionally the uniform contact between line antennas and earth is also crucial factor to obtain good S/N ratio data. The CCR method, however, enables one to perform continuous profiling over a survey line by dragging entire system and thus will be useful in rapid investigation of conductivity distribution in shallow subsurface.

Short Heterodimer Partner as a Regulator in OxLDL-induced Signaling Pathway

  • Kimpak, Young-Mi
    • Proceedings of the PSK Conference
    • /
    • 2001.10a
    • /
    • pp.109-113
    • /
    • 2001
  • Oxidized low-density lipoprotein (oxLDL) has been shown to modulate transactivations by the peroxisome proliferator activated receptor (PPAR)$\gamma$ and nuclear factor-kappa B (NF$\kappa$B). In this study, the oxLDL signaling pathways involved with the NF$\kappa$B transactivation were investigated by utilizing a reporter construct driven by three upstream NF$\kappa$B binding sites, and various pharmacological inhibitors. OxLDL and its constituent lysophophatidylcholine (lysoPC) induced a rapid and transient increase of intracellular calcium and stimulated the NF-KB transactivation in resting RAW264.7 macrophage cells in an oxidation-dependent manner. The NF$\kappa$B activation by oxLDL or lysoPC was inhibited by protein kinase C inhibitors or an intracellular calcium chelator. Tyrosine kinase or PI3 kinase inhibitors did not block the NF$\kappa$B transactivation. Furthermore, the oxLDL-induced NF$\kappa$B activity was abolished by the PPAR$\gamma$ ligands. When the endocytosis of oxLDL was blocked by cytochalasin B, the NF$\kappa$B transactivation by oxLDL was synergistically increased, while PPAR transactivation was blocked. These results suggest that oxLDL activates NF-$\kappa$B in resting macrophages via protein kinase C- and/or calcium-dependent pathways, which does not involve the endocytic processing of oxLDL. The endocytosis-dependent PPAR$\gamma$ activation by oxLDL may function as an inactivation route of the oxLDL induced NF$\kappa$B signal. Short heterodimer partner (SHP), specifically expressed in liver and a limited number of other tissues, is an unusual orphan nuclear receptor that lacks the conventional DNA-binding domain. In this work, we found that SHP expression is abundant in murine macrophage cell line RAW 264.7 but suppressed by oxLDL and its constituent I3-HODE, a ligand for peroxisome proliferator-activated receptor y. Furthermore, SHP acted as a transcription coactivator of nuclear factor-$\kappa$B (NF$\kappa$B) and was essential for the previously described NF$\kappa$B transactivation by lysoPC, one of the oxLDL constituents. Accordingly, NF$\kappa$B, transcriptionally active in the beginning, became progressively inert in oxLDL-treated RAW 264.7 cells, as oxLDL decreased the SHP expression. Thus, SHP appears to be an important modulatory component to regulate the transcriptional activities of NF$\kappa$B in oxLDL-treated, resting macrophage cells.

  • PDF

Authentication Mechanism Using Three-Dimensional Optical Memory (3차원 광메모리를 이용한 인증 기법)

  • Park, CheolYong;Ryou, JaeCheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1361-1373
    • /
    • 2016
  • Recently the need for user authentication with increasing, there are a variety of mechanisms, such as password, graphic authentication, token, biometrics and multiple authentication. in particular, the data of the 2-dimensional(2D) factors such as password, graphic authentication, biometrics is used because of the convenience. The stored information is problematic in that additional data recording needs to be performed whenever authentication data is updated. Furthermore, this storage method is problematic in that the time it takes to perform authentication increases because the time it takes to compare storage data with authentication data increases in proportion to an increase in the amount of the storage data. Accordingly, authentication through the rapid comparison of storage data with authentication data is a very important factor in data recording and authentication technology using memory. Using the three-dimensional(3D) optical memory by variously changing the recoding elements during recoding of data constitutes the way that multiple recoding different data storage. This enables high-density recoding in this way, and by applying the possible parallel processing at the time of recording and restoring method, provided that it is possible to quickly record and restore the data. In addition, each time to solve problems that require additional data recorded by a combination of the stored data record in the old data using a combination of the authentication. The proposed mechanism is proposed an authentication method using scheme after the recoding data in 3D optical memory to apply the conditions corresponding to the recoding condition when restoring the recorded data and through the experiment it was confirmed possible application as an authentication mechanism.

Study about Component Identification Method Based On RUP (RUP 기반의 컴포넌트 식별 방법에 관한 연구)

  • Choe, Mi-Suk;Yun, Yong-Ik;Park, Jae-Nyeon
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.91-102
    • /
    • 2002
  • We need a component-based system to reflect software changes in user's requirements, to implement a system at a rapid speed as well as to efficiently manage the system in a maintenance phase and to easily change software. Moreover, the component-based system has a merit in development cost. However, existing component development methodology for implement of component-based system is inefficient in object identification for component identification. Moreover, the existing component development methodology also fails to provide any method to identify system component. It merely provides procedures and methods to identify business component focused on a whole system domain. In addition, it has another problem that it considerably relies on developer's experiences and intuitions for component identification. Therefore, according to this paper, RUP (Rational Unified Process) is applied from a requirement analysis phase to an object identification phase in order to improve the inefficiency of object identification. In addition, this paper procedures and methods for system component identification, and identifies business components based on the identified system component, rather than on the whole system domain. This paper also provides and applies cohesion metric and coupling metric so as to overcome the problem that component identification depends on developer's intuitions and experiences. Accordingly, the component identification method proposed in this paper, may identify components more effectively based on facility of object identification, functional reusability of components, traceability, and independence of components.

Log-Structured B-Tree for NAND Flash Memory (NAND 플래시 메모리를 위한 로그 기반의 B-트리)

  • Kim, Bo-Kyeong;Joo, Young-Do;Lee, Dong-Ho
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.755-766
    • /
    • 2008
  • Recently, NAND flash memory is becoming into the spotlight as a next-generation storage device because of its small size, fast speed, low power consumption, and etc. compared to the hard disk. However, due to the distinct characteristics such as erase-before-write architecture, asymmetric operation speed and unit, disk-based systems and applications may result in severe performance degradation when directly implementing them on NAND flash memory. Especially when a B-tree is implemented on NAND flash memory, intensive overwrite operations may be caused by record inserting, deleting, and reorganizing. These may result in severe performance degradation. Although ${\mu}$-tree has been proposed in order to overcome this problem, it suffers from frequent node split and rapid increment of its height. In this paper, we propose Log-Structured B-Tree(LSB-Tree) where the corresponding log node to a leaf node is allocated for update operation and then the modified data in the log node is stored at only one write operation. LSB-tree reduces additional write operations by deferring the change of parent nodes. Also, it reduces the write operation by switching a log node to a new leaf node when inserting the data sequentially by the key order. Finally, we show that LSB-tree yields a better performance on NAND flash memory by comparing it to ${\mu}$-tree through various experiments.

Real-Time Vehicle License Plate Recognition System Using Adaptive Heuristic Segmentation Algorithm (적응 휴리스틱 분할 알고리즘을 이용한 실시간 차량 번호판 인식 시스템)

  • Jin, Moon Yong;Park, Jong Bin;Lee, Dong Suk;Park, Dong Sun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.9
    • /
    • pp.361-368
    • /
    • 2014
  • The LPR(License plate recognition) system has been developed to efficient control for complex traffic environment and currently be used in many places. However, because of light, noise, background changes, environmental changes, damaged plate, it only works limited environment, so it is difficult to use in real-time. This paper presents a heuristic segmentation algorithm for robust to noise and illumination changes and introduce a real-time license plate recognition system using it. In first step, We detect the plate utilized Haar-like feature and Adaboost. This method is possible to rapid detection used integral image and cascade structure. Second step, we determine the type of license plate with adaptive histogram equalization, bilateral filtering for denoise and segment accurate character based on adaptive threshold, pixel projection and associated with the prior knowledge. The last step is character recognition that used histogram of oriented gradients (HOG) and multi-layer perceptron(MLP) for number recognition and support vector machine(SVM) for number and Korean character classifier respectively. The experimental results show license plate detection rate of 94.29%, license plate false alarm rate of 2.94%. In character segmentation method, character hit rate is 97.23% and character false alarm rate is 1.37%. And in character recognition, the average character recognition rate is 98.38%. Total average running time in our proposed method is 140ms. It is possible to be real-time system with efficiency and robustness.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Studies on the Korean Deep Sea Fishing Industry Administration -Analysis of present situation and prospects- (한국의 해외 원양어업 경영에 관한 연구 - 현황 분석과 전망 중심으로-)

  • 김우성
    • The Journal of Fisheries Business Administration
    • /
    • v.1 no.2
    • /
    • pp.1-22
    • /
    • 1970
  • Our fisheries protucts industry has developed rapidly during past 10 years ; production was about twice: fihing fleets increased twice in number and 3 times in tonnage ; export was 5 times. Govermment is trying to develop deep sea fisheries in order to surmount the depression of coast fisheries. At present more than 270 deep sea fishing boats are working with superior skill to other country at the South Pacific, the Atlantic, the Indian, and the North Pacific Ocean. Our deep sea fisheries is consisted of the tuna long line and the trawler. The tuna long line of them has 230 crafts in 1969 ana the deep sea trawler has 40 crafts, too. Comparing to 1962, the number of the deep sea fishing boats has been increased highly to 54 times, 7.71 times average per year increasing rate. The rate of the tuna long line to the trawler at the end of 1969 shows 85:15, More than half of them are 100~200 (equation omitted), if we classify them according to (equation omitted) or boat craft. 70% of them has less than 5 years ships age. The Korean Marine Industry Development Corporation has more than 1/3 fishing fleets, with 91 crafts, if We consider it according to corporation. Considering it according to the financial resources, dependence upon foreign loan is as high as 88%. Catches was 74, 450 M/T ($24, 663, 000)at the end of November in 1969 and it was increased to 113.5 times in catch amount and 118 times in value, comparing to those of 1962. Considering it according to the ocean, the order is arranged to the Pacific, the Atlantic, and the Indian Ocean. The average production amount of each craft is 250~400 S/T a year. The result of export took up 1/3 of total fisheries product export with $ 22, 398, 000 at the end of november in 1969. Employee cost of fishing coast is 8% higher than other fishing. The profit is highest in our fisheries. Most of the products except the trawler fishing are sofa at the fishing grounds to the processing company, and they lose much money. They buy most of bait from Japan, giving $8~10 for 1C/S(10kg). Fish price is $390~520 according to the kind of fish for S/T at the fishing grounds, and the rapid frozen fishes brought to Japan are about $ 800 for S/T. There is much difference. in price. Problems 1. Want of self capital. 2. To get the refrigeration boats enough. 3. International Fishing Regulation. 4. To get high price and to secure consuming grounds. 5. To get home-production of bait. 6. To exploit new fishing grounds. 7. To get larger boats. 8. To get mariner enough. When the problems mentioned above are solved, the Deep Sea Fisheries of oun courtry will be developed more largely.

  • PDF

EXPERIMENTAL STUDY OF PERIPHERAL NERVE REGENERATION BY USING NON-TUBULAR NATURAL CELLULOSE MEMBRANE NERVE CONDUIT (비관형 천연 셀룰로오스막 도관을 이용한 말초신경 재생에 대한 실험적 연구)

  • Kim, Soung-Min;Lee, Jong-Ho;Lee, Suk-Keun
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.32 no.4
    • /
    • pp.295-307
    • /
    • 2006
  • Styela clava, called non-native tunicate or sea squirt, is habitat which include bays and harbors in Korea and several sites in the sea faced world. We fabricate cellulose membrane nerve conduit (CMNC) from this native sea squirt skin, and evaluate the capacity of promoting peripheral nerve regeneration in the rat sciatic nerve defect model. After processing the pure cellulose membrane from the sea squirt skin as we already published before, CMNC was designed as a non-tubular sheet with 14 mm length and 4 mm width. Total eleven male Spraque-Dawley rats (12 weeks, weighing 250 to 300g) were divided into sham group (n=2), silicone tube grafted control group (n=3) and experimental group (n=6). Each CMNC grafted nerve was evaluated after 4, 8 and 12 weeks in the experimental group, and after 12 weeks, sciatic function was evaluated with sciatic function index (SFI) and gait analysis, and histomorphology of nerve conduit and the innervated tissues of sciatic nerve were all examined using image analyzer and electromicroscopic methods in the all groups. The regenerated axon and nerve sheath were found only in the inner surface of the CMNC after 4 weeks and became more thicker after 8 and 12 weeks. In the TEM study, CMNC grafted group showed more abundant organized myelinated nerve fibers with thickened extracellular matrix than silicone conduit grafted group after 12 weeks. The sciatic function index (SFI) and ankle stance angle (ASA) in the functional evaluation were $-47.2{\pm}3.9$, $35.5^{\circ}{\pm}4.9^{\circ}$ in CMNC grafted group (n=2) and $-80.4{\pm}7.4$, $29.2^{\circ}{\pm}5.3^{\circ}$ in silicone conduit grafted group (n=3), respectively. And the myelinated axon was 41.59% in CMNC group and 9.51% in silicone conduit group to the sham group. The development of a bioactive CMNC to replace autogenous nerve grafts offers a potential and available approach to improved peripheral nerve regeneration. As we already published before, small peptide fragment derived from the basement membrane matrix proteins of squirt skin, which is a kind of anchoring protein composed of glycocalyx, induced the effective axonal regeneration with rapid growth of Schwann cells beneath the inner surface of CMNC. So the possibilities of clinical application as a peripheral nerve regeneration will be able to be suggested.

A Study on the Development of an Assessment Framework for Smart Work Readiness (스마트워크 적합성 평가 프레임워크 개발에 관한 연구)

  • Lee, Jungwoo;Lee, Hyejung;Lee, Seyoon
    • Informatization Policy
    • /
    • v.20 no.2
    • /
    • pp.60-72
    • /
    • 2013
  • Rapid development of information and communication technologies leads firms to take 'smart work' into serious consideration as a new way of working in coming knowledge and information society. However, some jobs may be fit for smart work while some may be not. A $2{\times}2$ framework for smart work readiness assessment is developed in this study through the review of extant literature and a series of focus group activities. Two critical dimensions of smart work are derived and presented as a result: smartness (knowledge versus data) and mobility (mobile versus static). Knowledge intensive jobs with possible mobility seem to be the target group that can be easily converted to smart work while mobile workers with interactive data processing devices seem to be already doing smart work. As mobility is a critical presumption for work to be flexible in terms of time and place, jobs with no mobility are assessed here as not ready for smart work at least at present. This framework is experimentally applied against the published job statistics 2011 in Korea, and used to estimate the number of workers ready for smart work. As a conclusion, discussions on policy implications and further research issues are made at the end.

  • PDF