• Title/Summary/Keyword: 코드추적

Search Result 264, Processing Time 0.031 seconds

Automated Bacterial Cell Counting Method in a Droplet Using ImageJ (이미지 분석 프로그램을 이용한 액적 내 세포 계수 방법)

  • Jingyeong Kim;Jae Seong Kim;Chang-Soo Lee
    • Korean Chemical Engineering Research
    • /
    • v.61 no.2
    • /
    • pp.247-257
    • /
    • 2023
  • Precise counting of cell number stands in important position within clinical and research laboratories. Conventional methods such as hemocytometer, migration/invasion assay, or automated cell counters have limited in analytical time, cost, and accuracy., which needs an alternative way with time-efficient in-situ approach to broaden the application avenue. Here, we present simple coding-based cell counting method using image analysis tool, freely available image software (ImageJ). Firstly, we encapsulated RFP-expressing bacteria in a droplet using microfluidic device and automatically performed fluorescence image-based analysis for the quantification of cell numbers. Also, time-lapse images were captured for tracking the change of cell numbers in a droplet containing different concentrations of antibiotics. This study confirms that our approach is approximately 15 times faster and provides more accurate number of cells in a droplet than the external analysis program method. We envision that it can be used to the development of high-throughput image-based cell counting analysis.

Study on a Method for Performance Evaluation and Analysis of TWSTFT Modems (TWSTFT 모뎀의 성능평가방안 및 성능분석)

  • Juhyun Lee;Ju-Ik Oh;Joon Hyo Rhee;Gyeong Won Choi;Jong Koo Lee;Sung-hoon Yang;Youn-Jeong Heo;Dai-Hyuk Yu;Myoung-Sun Heo;Young Kyu Lee
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.3
    • /
    • pp.355-363
    • /
    • 2024
  • Time synchronization is crucial for ensuring the reliable operation of modern economic and social infrastructures. Techniques such as Global Navigation Satellite System (GNSS)-based methods and Two-Way Satellite Time and Frequency Transfer (TWSTFT) play key roles in precise time comparison and synchronization. TWSTFT, in particular, is recognized for its ability to achieve sub-nanosecond accuracy in time transfer, making it indispensable in fields such as satellite navigation. This paper proposes a comprehensive performance evaluation method for TWSTFT modems, emphasizing pre-validation in controlled environments to mitigate operational challenges. Using the proposed evaluation method, the study presents the standard deviation of RTT according to C/N0 and compares it with the datasheet of a commercial TWSTFT modem. Through this approach, the aim of this study is to enhance the reliability and accuracy of TWSTFT-based time synchronization across diverse applications.

Tracing the Development and Spread Patterns of OSS using the Method of Netnography - The Case of JavaScript Frameworks - (네트노그라피를 이용한 공개 소프트웨어의 개발 및 확산 패턴 분석에 관한 연구 - 자바스크립트 프레임워크 사례를 중심으로 -)

  • Kang, Heesuk;Yoon, Inhwan;Lee, Heesan
    • Management & Information Systems Review
    • /
    • v.36 no.3
    • /
    • pp.131-150
    • /
    • 2017
  • The purpose of this study is to observe the spread pattern of open source software (OSS) while establishing relations with surrounding actors during its operation period. In order to investigate the change pattern of participants in the OSS, we use a netnography on the basis of online data, which can trace the change patterns of the OSS depending on the passage of time. For this, the cases of three OSSs (e.g. jQuery, MooTools, and YUI), which are JavaScript frameworks, were compared, and the corresponding data were collected from the open application programming interface (API) of GitHub as well as blog and web searches. This research utilizes the translation process of the actor-network theory to categorize the stages of the change patterns on the OSS translation process. In the project commencement stage, we identified the type of three different OSS-related actors and defined associated relationships among them. The period, when a master commences a project at first, is refined through the course for the maintenance of source codes with persons concerned (i.e. project growth stage). Thereafter, the period when the users have gone through the observation and learning period by being exposed to promotion activities and codes usage respectively, and becoming to active participants, is regarded as the 'leap of participants' stage. Our results emphasize the importance of promotion processes in participants' selection of the OSS for participation and confirm the crowding-out effect that the rapid speed of OSS development retarded the emergence of participants.

  • PDF

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

Characteristics of 'Modern Cyborg' in Animation - Focused on Animations of and - (애니메이션에 나타난 '현대 사이보그' 특성 - <공각기동대>와 <이노센스>를 중심으로-)

  • Seo, Soo-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.150-159
    • /
    • 2007
  • The remark by Andy Clark that the cleverer our world is, the more difficult we perceive our world and ourselves, is very significant to us living in digital world. As the huge power of Technology are dominating the world, the people are drifting with their body fragmented in diverse kinds of chaos, being are faced with the situation that they should reorganize themselves about personal life and ways of thinking in a new technological environment. This paper approach some characteristics of contemporary society through 'Cyborg' which is the product of limitless human desire and technology. The characteristics in modern times, such as boundary disjoint, hybridity, transformation, fusion, communication with image, digital sensitivity, womanness correspond to those of the Cyborg. This paper also investigates the history of modern Cyborg through animation, one of the remarkable medium in digital age and analyze the cyber punk animation, and by Oshii Mamoru, which provoked the extension of the concept of Cyborg. This paper will give a moment to diagnose what this age is like and to present a reference line of our contemporaries exposed to the surplus images and technology.

A Study on the Technology Development of User-based Home Automation Service (사용자 위치기반 홈오토메이션 서비스 기술 개발에 관한 연구)

  • Lee, Jung-Gi;Lee, Yeong-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.327-332
    • /
    • 2017
  • As Internet of Things (IoT) technology advances, there is a growing demand for location-based services (LBSs) to identify users' mobility and identity. The initial LBS system was mainly used to measure position information by measuring the phase of a signal transmitted from a global positioning system (GPS) satellite or by measuring distance to a satellite by tracking the code of a carrier signal. However, the use of GPS satellites is ineffective, because it is difficult to receive satellite signals indoors. Therefore, research on wireless communications systems like ultra-wide band (UWB), radio frequency identification (RFID), and ZigBee are being actively pursued for location recognition technology that can be utilized in an indoor environment. In this paper, we propose an LBS system that includes the 2.45GHz band for chirp spread spectrum (CSS), and the 3.1-10.6GHz band and the 250-750MHz bands for UWB using the IEEE 802.15.4a standard for low power-based location recognition. As a result, we confirmed that the 2.45GHz Industrial, Scientific and Medical (ISM) band RF transceiver and the ranging function can be realized in the hardware and has 0dBm output power.

Research in the Direction of Improvement of the Web Site Utilizing Google Analytics (구글 애널리틱스를 활용한 웹 사이트의 개선방안 연구 : 앱팩토리를 대상으로)

  • Kim, Donglim;Lim, Younghwan
    • Cartoon and Animation Studies
    • /
    • s.36
    • /
    • pp.553-572
    • /
    • 2014
  • In this paper, for the evaluation of the ease of a particular Web site (www.appbelt.net), insert the log tracking code for Google Analytics in a page of the Web site to collect behavioral data of visitor and has studied the improvement measures for the problems of the Web site, after the evaluation of the overall quality of the Web site through the evaluation of Coolcheck. These findings set the target value of the company's priority (importance) companies want to influence the direction of the business judgment are set up correctly, and the user's needs and behavior will be appropriate for the service seems to help improvement.

Application of MPI Technique for Distributed Rainfall-Runoff Model (분포형 강우유출모형 병렬화 처리기법 적용)

  • Chung, Sung-Young;Park, Jin-Hyeog;Hur, Young-Teck;Jung, Kwan-Sue
    • Journal of Korea Water Resources Association
    • /
    • v.43 no.8
    • /
    • pp.747-755
    • /
    • 2010
  • Distributed Models have relative weak points due to the amount of computer memory and calculation time required for calculating water flow using a numerical analysis based on kinematic wave theory when compared to the conceptual models used so far. Typically, the distributed models have been mainly applied to small basins. It was necessary to decrease the resolution of the grid to make it applicable for large scale watersheds, and because it would take up too much time to calculate using a higher resolution. That has been one of the more difficult factors in applying the model for actual work. In this paper, MPI (Message Passing Interface) technique was applied to solve the problem of calculation time as it is one of the demerits of the distributed model for performing physical and complicated numerical calculations for large scale watersheds. The comparison studies were performed a single domain and a divided small domain in Yongdam Dam watershed in case of typoon 'Ewiniar' at 2006. They were compared to analyze the application effects of parallelization technique. As a result, a maximum of 10 times the amount of calculation time was saved but keeping the level of quality for discharge by using parallelization code rather than a single processor.

Analysis of the Engagement Effects of DIRCM against a Man Portable Air Defense System (휴대용대공유도탄에 대응하는 지향성적외선방해장비의 교전효과 분석)

  • Jeong, Chunsik
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A MANPADS(Man Portable Air Defense System), which tracks infrared energy, is light enough for individuals to carry and can against to a variety of aircraft, making it widely deployed around the world, posing a major threat to aircraft. A flare has been developed as an IRCM(Infrared Countermeasures) that protects the life of friendly aircraft and combatants by deceiving such guided missiles. However, DIRCM, which can overcome the problems of existing IRCM, is being developed mainly in some developed countries, and the need for it has been increasing gradually. This paper modeled first generation IR seeker of AM modulation method, the second generation IR seeker of FM modulation method, and the third generation IR seeker of pulse modulation method among various MANPADS, and modeled the scattering light phenomenon in the seeker when laser beams are investigated in DIRCM. Using this, jamming simulations were performed in various engagement environments of the MANPADS and aircraft equipped with DIRCM, and the miss distance of the guided missiles and aircraft were analyzed. Simulation results show that DIRCM, which irradiates a modulated laser beam with one jamming code, deceives both first, second and third generation MANPADS at 1km and 2km of engagement distance. In particular, the survival rate of aircraft equipped with DIRCM increased when the distance of engagement increased from 1km to 2km, and the survival rate was at least 99% at 2km of engagement distance.

Sequential Use of COMSOL Multiphysics® and PyLith for Poroelastic Modeling of Fluid Injection and Induced Earthquakes (COMSOL Multiphysics®와 PyLith의 순차 적용을 통한 지중 유체 주입과 유발지진 공탄성 수치 모사 기법 연구)

  • Jang, Chan-Hee;Kim, Hyun Na;So, Byung-Dal
    • The Journal of Engineering Geology
    • /
    • v.32 no.4
    • /
    • pp.643-659
    • /
    • 2022
  • Geologic sequestration technologies such as CCS (carbon capture and storage), EGS (enhanced geothermal systems), and EOR (enhanced oil recovery) have been widely implemented in recent years, prompting evaluation of the mechanical stability of storage sites. As fluid injection can stimulate mechanical instability in storage layers by perturbing the stress state and pore pressure, poroelastic models considering various injection scenarios are required. In this study, we calculate the pore pressure, stress distribution, and vertical displacement along a surface using commercial finite element software (COMSOL); fault slips are subsequently simulated using PyLith, an open-source finite element software. The displacement fields, are obtained from PyLith is transferred back to COMSOL to determine changes in coseismic stresses and surface displacements. Our sequential use of COMSOL-PyLith-COMSOL for poroelastic modeling of fluid-injection and induced-earthquakes reveals large variations of pore pressure, vertical displacement, and Coulomb failure stress change during injection periods. On the other hand, the residual stress diffuses into the remote field after injection stops. This flow pattern suggests the necessity of numerical modeling and long-term monitoring, even after injection has stopped. We found that the time at which the Coulomb failure stress reaches the critical point greatly varies with the hydraulic and poroelastic properties (e.g., permeability and Biot-Willis coefficient) of the fault and injection layer. We suggest that an understanding of the detailed physical properties of the surrounding layer is important in selecting the injection site. Our numerical results showing the surface displacement and deviatoric stress distribution with different amounts of fault slip highlight the need to test more variable fault slip scenarios.