• Title/Summary/Keyword: 근거리

Search Result 1,475, Processing Time 0.026 seconds

Investigation of genetic variability in commercial and invaded natural populations of red swamp crayfish(Procambarus clarkii) from South Korea (미국가재(Procambarus clarkii) 수족관 개체군 및 국내 침입 자연개체군의 유전적 변이 연구)

  • Ji Hyoun Kang;Jeong Mi Hwang;Soon-Jik Kwon;Min Jeong Baek;Sun-Jae Park;Changseob Lim;Yeon Jae Bae
    • Korean Journal of Environmental Biology
    • /
    • v.41 no.3
    • /
    • pp.325-334
    • /
    • 2023
  • The invasive red swamp crayfish, Procambarus clarkii, is native to south-central United States and northeastern Mexico. Recently, it has been being spreading in the wild in South Korea. However, its primary sources, introduction routes, establishment, and expansion in South Korea remain unclear. Here, we analyzed genetic diversity and population genetic structures of its domestic natural populations during early invasion, commercial stock from local aquaria (a suspected introduction source), and original United States population using mitochondrial COI gene sequences for 267 individuals and eight microsatellite markers for 158 individuals. Natural and commercial populations of P. clarkii showed reduced genetic diversity (e.g., haplotype diversity and allelic richness). The highest genetic diversity was observed in one original source population based on both genetic markers. Despite a large number of individuals in commercial aquaria, we detected remarkably low genetic diversity and only three haplotypes among 226 individuals, suggesting an inbred population likely originating from a small founder group. Additionally, the low genetic diversity in the natural population indicates a small effective population size during early establishment of P. clarkii in South Korea. Interestingly, genetic differentiation between natural populations and the United States population was lower than that between natural populations and aquarium populations. This suggests that various genetic types from the United States likely have entered different domestic aquariums, leading to distinct natural populations through separate pathways. Results of our study will provide an insight on the level of genetic divergence and population differentiation during the initial stage of invasion of non-indigenous species into new environments.

The Consideration of nuclear medicine technologist's occupational dose from patient who are undergoing 18F-FDG Whole body PET/CT : Aspect of specific characteristic of patient and contact time with patient (18F-FDG Whole Body PET/CT 수검자의 거리별 선량 변화에 따른 방사선 작업종사자의 유효선량 고찰: 환자 고유특성 및 응대시간 측면)

  • Kim, Sunghwan;Ryu, Jaekwang;Ko, Hyunsoo
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.22 no.1
    • /
    • pp.67-75
    • /
    • 2018
  • Purpose The purpose of this study is to investigate and analyze the external dose rates of $^{18}F-FDG$ Whole Body PET/CT patients by distance, and to identify the main factors that contribute to the reduction of radiation dose by checking the cumulative doses of nuclear medicine technologist(NMT). Materials and Methods After completion of the $^{18}F-FDG$ Whole Body PET/CT scan($75.4{\pm}3.3min$), the external dose rates of 106 patients were measured at a distance of 0, 10, 30, 50, and 100 cm from the chest. Gender, age, BMI(Body Mass Index), fasting time, diabetes mellitus, radiopharmaceutical injection information, creatine value were collected to analyze individual factors that could affect external dose rates from a patient's perspective. From the perspective of NMT, personal pocket dosimeters were worn on the chest to record accumulated dose of NMT who performed the injection task($T_1$, $T_2$ and $T_3$) and scan task($T_4$, $T_5$ and $T_6$). In addition, patient contact time with NMT was measured and analyzed. Results External dose rates from the patient for each distance were calculated as $246.9{\pm}37.6$, $129.9{\pm}16.7$, $61.2{\pm}9.1$, $34.4{\pm}5.9$, and $13.1{\pm}2.4{\mu}Sv/hr$ respectively. On the patient's aspect, there was a significant difference in the proximity of gender, BMI, Injection dose and creatine value, but the difference decreased as the distance increased. In case of dialysis patient, external dose rates for each distance were exceptionally higher than other patients. On the NMT aspect, the doses received from patients were 0.70, 1.09, $0.55{\mu}Sv/person$ for performing the injection task($T_1$, $T_2$, and $T_3$), and were 1.25, 0.82, $1.23{\mu}Sv/person$ for performing the scan task($T_4$, $T_5$, $T_6$). Conclusion we found that maintaining proper distance with patient and reducing contact time with patient had a significant effect on accumulated doses. Considering those points, efforts such as sufficient water intake and encourage of urination, maintaining the proper distance between the NMT and the patient(at least 100 cm), and reducing the contact time should be done for reducing dose rates not only patient but also NMT.

Strategy for Store Management Using SOM Based on RFM (RFM 기반 SOM을 이용한 매장관리 전략 도출)

  • Jeong, Yoon Jeong;Choi, Il Young;Kim, Jae Kyeong;Choi, Ju Choel
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.93-112
    • /
    • 2015
  • Depending on the change in consumer's consumption pattern, existing retail shop has evolved in hypermarket or convenience store offering grocery and daily products mostly. Therefore, it is important to maintain the inventory levels and proper product configuration for effectively utilize the limited space in the retail store and increasing sales. Accordingly, this study proposed proper product configuration and inventory level strategy based on RFM(Recency, Frequency, Monetary) model and SOM(self-organizing map) for manage the retail shop effectively. RFM model is analytic model to analyze customer behaviors based on the past customer's buying activities. And it can differentiates important customers from large data by three variables. R represents recency, which refers to the last purchase of commodities. The latest consuming customer has bigger R. F represents frequency, which refers to the number of transactions in a particular period and M represents monetary, which refers to consumption money amount in a particular period. Thus, RFM method has been known to be a very effective model for customer segmentation. In this study, using a normalized value of the RFM variables, SOM cluster analysis was performed. SOM is regarded as one of the most distinguished artificial neural network models in the unsupervised learning tool space. It is a popular tool for clustering and visualization of high dimensional data in such a way that similar items are grouped spatially close to one another. In particular, it has been successfully applied in various technical fields for finding patterns. In our research, the procedure tries to find sales patterns by analyzing product sales records with Recency, Frequency and Monetary values. And to suggest a business strategy, we conduct the decision tree based on SOM results. To validate the proposed procedure in this study, we adopted the M-mart data collected between 2014.01.01~2014.12.31. Each product get the value of R, F, M, and they are clustered by 9 using SOM. And we also performed three tests using the weekday data, weekend data, whole data in order to analyze the sales pattern change. In order to propose the strategy of each cluster, we examine the criteria of product clustering. The clusters through the SOM can be explained by the characteristics of these clusters of decision trees. As a result, we can suggest the inventory management strategy of each 9 clusters through the suggested procedures of the study. The highest of all three value(R, F, M) cluster's products need to have high level of the inventory as well as to be disposed in a place where it can be increasing customer's path. In contrast, the lowest of all three value(R, F, M) cluster's products need to have low level of inventory as well as to be disposed in a place where visibility is low. The highest R value cluster's products is usually new releases products, and need to be placed on the front of the store. And, manager should decrease inventory levels gradually in the highest F value cluster's products purchased in the past. Because, we assume that cluster has lower R value and the M value than the average value of good. And it can be deduced that product are sold poorly in recent days and total sales also will be lower than the frequency. The procedure presented in this study is expected to contribute to raising the profitability of the retail store. The paper is organized as follows. The second chapter briefly reviews the literature related to this study. The third chapter suggests procedures for research proposals, and the fourth chapter applied suggested procedure using the actual product sales data. Finally, the fifth chapter described the conclusion of the study and further research.

On the vibration influence to the running power plant facilities when the foundation excavated of the cautious blasting works. (노천굴착에서 발파진동의 크기를 감량 시키기 위한 정밀파실험식)

  • Huh Ginn
    • Explosives and Blasting
    • /
    • v.9 no.1
    • /
    • pp.3-13
    • /
    • 1991
  • The cautious blasting works had been used with emulsion explosion electric M/S delay caps. Drill depth was from 3m to 6m with Crawler Drill ${\phi}70mm$ on the calcalious sand stone (soft -modelate -semi hard Rock). The total numbers of test blast were 88. Scale distance were induced 15.52-60.32. It was applied to propagation Law in blasting vibration as follows. Propagtion Law in Blasting Vibration $V=K(\frac{D}{W^b})^n$ were V : Peak partical velocity(cm/sec) D : Distance between explosion and recording sites(m) W : Maximum charge per delay-period of eight milliseconds or more (kg) K : Ground transmission constant, empirically determind on the Rocks, Explosive and drilling pattern ets. b : Charge exponents n : Reduced exponents where the quantity $\frac{D}{W^b}$ is known as the scale distance. Above equation is worked by the U.S Bureau of Mines to determine peak particle velocity. The propagation Law can be catagorized in three groups. Cubic root Scaling charge per delay Square root Scaling of charge per delay Site-specific Scaling of charge Per delay Plots of peak particle velocity versus distoance were made on log-log coordinates. The data are grouped by test and P.P.V. The linear grouping of the data permits their representation by an equation of the form ; $V=K(\frac{D}{W^{\frac{1}{3}})^{-n}$ The value of K(41 or 124) and n(1.41 or 1.66) were determined for each set of data by the method of least squores. Statistical tests showed that a common slope, n, could be used for all data of a given components. Charge and reduction exponents carried out by multiple regressional analysis. It's divided into under loom over loom distance because the frequency is verified by the distance from blast site. Empirical equation of cautious blasting vibration is as follows. Over 30m ------- under l00m ${\cdots\cdots\cdots}{\;}41(D/sqrt[2]{W})^{-1.41}{\;}{\cdots\cdots\cdots\cdots\cdots}{\;}A$ Over 100m ${\cdots\cdots\cdots\cdots\cdots}{\;}121(D/sqrt[3]{W})^{-1.66}{\;}{\cdots\cdots\cdots\cdots\cdots}{\;}B$ where ; V is peak particle velocity In cm / sec D is distance in m and W, maximLlm charge weight per day in kg K value on the above equation has to be more specified for further understaring about the effect of explosives, Rock strength. And Drilling pattern on the vibration levels, it is necessary to carry out more tests.

  • PDF

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.