Safety Instrumented Systems (SIS) have wide application area. They are of vital importance at process plants to detect the onset of hazardous events, for instance, a release of some hazardous material, and for mitigating their consequences to humans, material assets, and the environment. The integrated safety systems, where electrical, electronic, and/or programmable electronic (E/E/PE) devices interact with mechanical, pneumatic, and hydraulic systems are governed by international safety standards like IEC 61508. IEC 61508 organises its requirements according to a Safety Life Cycle (SLC). Fulfilling these requirements following the SLC can be complex without the aid of SIS supporting tools. This paper presents simple SIS support tool which can greatly help the user to implement the design phase of the safety lifecycle. This tool is modelled in the form of Android application which can be integrated with a Web-based data reading and modifying system. This tool can reduce the computation time spent on the design phase of the SLC and reduce the possible errors which can arise in the process. In addition, this paper presents an optimization approach to SISs based on cost measures. The multi-objective genetic algorithm has been used for the optimization to search for the best combinations of solutions without enumeration of all the solution space.
Many presentations of documents are rejected because credits have been incorrectly issued. One reason of rejecting the documents is related with error in application stage of L/C. Errors may take the form of mismatches between the terms of the sales contract and the provisions stipulated in the credit. Thus, Article 5 encourages applicants to make their contribution to the smooth running of the letter of credit process by being unambiguous and brief. Another reason that the banks reject the documents relates to the ambiguity of the term "International Standard Banking Practice" That is to say, UCP500 Art.13 introduced the term "International Standard Banking Practice"(ISBP) without the definition so that one wonder what ISBP is or how ISBP apply in daily work of bankers, examination of documents. From hence, International Chamber of Commerce(ICC) started the work to document ISBP at May 2000, finally approved the result last year and published the publication titled "International Standard Banking Practice for the examination of documents under documentary credits." By applying ISBP in document examination stage, I expect that the freqency of rejecting the documents grow less and bankers' work of examination become easy. On the other hand, ISBP is supplement to UCP500 so that the interpretation of ISBP is made on the basis of understanding of UCP and its underlying principles. So, I reviewed each paragraphs of ISBP on this basis and tried to indicate contradiction between ISBP and UCP500. But because of reading not enough, I failed to search the connotative sense many paragraphs have.
The Journal of Korean Institute of Communications and Information Sciences
/
v.33
no.3C
/
pp.281-292
/
2008
A main application of sensor networks are to monitor and to send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power from each sensor, intermediate network nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate network nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. From simulation study, we compare the amount of the energy consumption overhead, the time of key transmission and the ratio of of key process between the proposed method and LHA-SP. The simulation result of proposed protocol is low 3.5% a lord of energy consumption than LHA-SP, the time of key transmission and the ration of key process is get improved result of each 0.3% and 0.6% than LHA-SP.
Proceedings of the Korean Society of Sericultural Science Conference
/
1997.06a
/
pp.73-101
/
1997
Baculoviruses are characterized by large double-stranded circular DNA genomes and rod-shaped enveloped virions. Bombyx mori nucleopolyhedrovirus(BmNPV) is a major pathogen, which causes severe damage in sericulture. Currently, BmNPV is recogtnized as an improtant tool in molecular biology, especially for expression of useful genes in B.mori cells and silkworm larvae. Our laboratories have focused on the studies of the molecular mechanisms of BmNPV replication and the application of BmNPV to agriculture and medicine. The entire nucleotide sequence of the BmNPV genome has recently determined. The BmNPV genome possessed 135 putative genes and 7 homologous repeated sequence (hrs) regions. Relatively little space, a few to a few hundred base-pairs, was observed between the open reading frames and hrs. Termination codons often overlapped. These results showed a compactly packde BmNPV genome. Based on comparative sequence analyses, we speculated that the ancestor of BmNPV was a baculovirus similar to Autographa californica NPV(AcNPV). The function of the BmNPV genes were characterized by gene deletion analysis; p35 was found to be involved in blocking apoptosis and cysteine proteinase was found to be involved in horizontal virus transmission by degrading viral-infected larval host. By AcNPV and BmNPV coinfection experiments, we identified a BmNPV gene involved in expanding host specificity of AcNPV. The identified gene was likely encoded a DNA helicase based on the amino acid sequence analysis; a few amino acid substitutions in the putative DNA helicase gene resulted in the expansion of host range of AcNPV. These findings indicate that BmNPV evolved within a short period from an AcNPV-like ancestral virus due to rapid evolution including specific amino acid substitutions and gene deletions/insertions.
Journal of Korean Library and Information Science Society
/
v.50
no.2
/
pp.169-189
/
2019
The purpose of this study was to elicit the priority of the index of the operation evaluation of the school library, and to present measures for improvement of the evaluation index that reflects the project sites. To this end, the school library evaluation index was analyzed by applying the Analytic Hierarchy Process(AHP) analysis method to teacher librarians who are the representative personnel of the school library. According to the research, the priority of the upper tier evaluation areas was human resources, library services, information resources, library management, facilities and environment, and the priority of the lower tier evaluation items was human resource allocation, human resources expertise, reading education, information literacy education, efforts to activate education, book composition snowflake, the latest book, budget, facility access, book status, appropriateness of facilities and facilities, management plan, proximity accessibility, PR and marketing, school library steering committee, cooperation, use of materials current status. The conclusions drawn from this study could be used as basic data in the application of fieldworked school library assessment indicators.
In order to create a safe and comfortable educational environment and improve the quality of education, the 'Act on the Safety and Maintenance of Educational Facilities' was enacted in 2021. Accordingly, 'Educational Facility Safety Certification Operation Regulations' was established. Safety certification targets are classified into 'kindergarten', 'elementary/middle/high school and special schools', and 'university and other educational facilities'. Other educational facilities include libraries and student training facilities. However, student training facilities and libraries are different from schools as facilities for special activities such as training and reading. Therefore, the unique characteristics of the facility must be reflected in the 'Educational Facility Safety Certification Operation Regulations'. This study analyzed how the 'Educational Facility Safety Certification Operation Regulation' reflects the special characteristics of student training facilities and libraries that are 'other educational facilities'. The previous certification system and guidelines were compared and analyzed, and the on-site survey method was used. Finally, it was confirmed that each of the library and the student training facility needed 9 detailed criteria reviews.
Amirah Syafiqah Zamri;Fatin Nabilah Sahadan;Zarirah Zulperi;Fadhil Syukri;Yuzine Esa
Fisheries and Aquatic Sciences
/
v.27
no.6
/
pp.366-378
/
2024
Application of commercial hormone failed to promote breeding in certain Pangasius species due to the differences of gonadotropin-releasing hormone specific peptide with species-specific bioactivities. Gonadotropin-releasing hormone (GnRH) is a hypothalamic decapeptide in the reproductive system that plays a crucial role in the regulation of reproductive processes. This study was performed to determine and analyse the GnRH genes from commercially important Pangasius sp., Pangasianodon hypophthalmus and Pangasius nasutus. The GnRH1 and GnRH2 genes were amplified and cloned into TOPO vector, followed by phylogenetic analysis of a complete open reading frame (ORF) of GnRH genes. The GnRH1 and GnRH2 genes of P. hypophthalmus and P. nasutus were detected at 300 bp and 360 bp, encoded for 81 and 87 amino acids, respectively. Amino acid sequence identities revealed high homology of P. hypophthalmus and P. nasutus GnRH1 and GnRH2 genes in comparison with other fish and vertebrates. Phylogenetic tree showed that fish from various families were aggregated into a group of the same order due to their highest identity similarities. It revealed that the vertebrate formed clusters and are grouped according to their GnRH decapeptide and GnRH-associated peptide (GAP) region, indicating a close relationship among GnRH decapeptide and GAP in different vertebrate species.
RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.
With the media's shift into the digital era in the 2000s, comic book publishers attempted a transition into the new medium by establishing a distribution structure using internet networks. But that effort shied from escaping the parallel-page reading structure of traditional comics. On the other hand, webtoons are showing divers changes by redesigning the structure of traditional sequential art media; they tend to separate and allot spaces according to the vertical scroll reading method of the internet browser and include animations, sound effects and background music. This trend is also in accordance with the preferences of modern readers. Modern society has complicated social structures with the development of various media; the public is therefore exposed to different stimuli and shows characteristics of differentiated perceptions. In other words, webtoons display more relevant and entertaining characteristics by inserting sounds and using moving texts and characters in specific frames, while traditional comics require an appreciation of withdrawal and immersion like other published media. Motions in webtoons are partially applied for dramatic tension or to create an effective expression of action. For example, hand-drawn animation is adopted to express motions by dividing motion images into many layers. Sounds are also utilized, such as background music with episode-related lyrics, melodies, ambient sounds and motion-related sound effects. In addition, webtoons provide readers with new amusement by giving tactile stimuli via the vibration of a smart phone. As stated above, the vertical direction, time-based nature of animation motions and tactile stimuli used in webtoons are differentiated from published comics. However, webtoons' utilization of innovative techniques hasn't yet reached its full potential. In addition to the fact that the software used for webtoon effects is operationally complex, this is a transitional phenomenon since there is still a lack of technical understanding of animation and sound application amongst the general public. For example, a sound might be programmed to play when a specific frame scrolls into view on the monitor, but the frame may be scrolled faster or slower than the author intended; in this case, sound can end before or after a reader sees the whole image. The motion of each frame is also programmed to start in a similar fashion. Therefore, a reader's scroll speed is related to the motion's speed. For this reason, motions might miss the intended timing and be unnatural because they are played out of context. Also, finished sound effects can disturb the concentration of readers. These problems come from a shortage of continuity; to solve these, naturally activated consecutive sounds or animations, like the simple rotation of joints when a character moves, is required.
Journal of Korean Home Economics Education Association
/
v.30
no.3
/
pp.67-90
/
2018
The purpose of this study was to develop and apply the practical problem-based teaching·learning process plan for 'interacting with neighbors' of home economics subject. The plan consisting of 3 lessons has been developed and implemented according to the ADDIE model. Various activity materials (7 student's activity sheets, 3 reading texts, 1 homework sheet, 3 sets of ppt, 6 videos, and 3 teacher's reading texts) as well as questionnaire were developed for the 3-session lessons. The plans were implemented by the researcher to 204 freshmen, 8 classes, of C middle school in Seoul during september, 2017. The result, of students' lower level of actual participation in interacting with neighbors comparing to their interests in, supported the need of this study. Students were satisfied with the whole 3-lessons in the aspects such as beneficial usage of the contents in their daily life and in building the sense of community, as well as adequacy of materials and activities. Students also reported that they would highly aware to the importance of interacting with neighbors and to practice the contents learned from the lessons in daily life at community. They had an opportunity to reflect one's own attitude to neighbors and recommended to teach it to other schools, too. It can be concluded that the teaching·learning process plan for 'interacting with neighbors' would raise students' housing values living together and attain the overall objective and achievement standards of 2015 home economics middle school curriculum.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.