• Title/Summary/Keyword: Checkpoints

Search Result 106, Processing Time 0.023 seconds

A Factory Automation S/W Design for Quality Control (품질관리(品質管理) 지원(支援)을 위한 공장자동화(工場自動化) S/W 설계(設計))

  • Kim, Man-Gi;Kim, Seong-Tae
    • Journal of Korean Society for Quality Management
    • /
    • v.21 no.1
    • /
    • pp.44-54
    • /
    • 1993
  • Factory Automation is being implemented rapidly in almost of industries. This new trend and technology have a great influence on even traditional quality control system, and make it be changed with new approaches and methodologies. In these environments, this study has brief review on automation and quality control system, gives checkpoints of the automation system design with the viewpoint of quality control. Also this study proposes a detail system configuration and specifications of each system conponent in the configuration. In the last, a brief implementation guideline for the automation system in the scope of information technology is also presented.

  • PDF

Benchmark for Deep Learning based Visual Odometry and Monocular Depth Estimation (딥러닝 기반 영상 주행기록계와 단안 깊이 추정 및 기술을 위한 벤치마크)

  • Choi, Hyukdoo
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.2
    • /
    • pp.114-121
    • /
    • 2019
  • This paper presents a new benchmark system for visual odometry (VO) and monocular depth estimation (MDE). As deep learning has become a key technology in computer vision, many researchers are trying to apply deep learning to VO and MDE. Just a couple of years ago, they were independently studied in a supervised way, but now they are coupled and trained together in an unsupervised way. However, before designing fancy models and losses, we have to customize datasets to use them for training and testing. After training, the model has to be compared with the existing models, which is also a huge burden. The benchmark provides input dataset ready-to-use for VO and MDE research in 'tfrecords' format and output dataset that includes model checkpoints and inference results of the existing models. It also provides various tools for data formatting, training, and evaluation. In the experiments, the exsiting models were evaluated to verify their performances presented in the corresponding papers and we found that the evaluation result is inferior to the presented performances.

Ozone Inhalation with 4-(N-methyl-N-nitrosamino)-1-(3-pyridyl)- 1-butanone and/or Dibutyl Phthalate Induced Cell Cycle Alterations via Wild-type p53 Instability in B6C3F1 Mice

  • Kim, Min-Young;Song, Kyung-Suk;Park, Gun-Ho;Kim, Hyun-Woo;Park, Jin-Hong;Kim, Jun-Sung;Jin, Hwa;Kook-Jong, Eu;Cho, Hyun-Sun
    • Toxicological Research
    • /
    • v.20 no.1
    • /
    • pp.71-82
    • /
    • 2004
  • Changes in cell cycle control in the lungs and liver of the B6C3F1 mice (20 males per each group) exposed to ozone (0.5 ppm), 4-(N-methyl-N-nitrosamino)-1-(3-pyridyl)-1-butanone (NNK, 1.0 mg/kg), and dibutyl phthalate (DBP, 5,000 ppm) after 52 weeks were examined through Western, Northern blot, and immunohistochemistry based on alterations in protein expression levels of G1/S checkpoints (cyclin D1, cyclin E, and PCNA), G2/M checkpoints (cyclin B1, cyclin G, and cyclin A), negative regulators (p53, p21, GADD45, and p27), and positive regulator (mdm2). Expression levels of cyclins D1, E, G, PCNA, mutant p53, and mdm2 proteins were higher in the lungs and livers treated with combination of toxicants than in those treated with ozone only. Expression levels of the wild-type and mutant p53, p21, GADD45, p27, and mdm2 proteins and mRNAs were higher in toxicant-treated groups than those of the control. Immunohistochemical analysis revealed staining intensities of the PCNA, cyclin D1, c-myc and mdm2 protein- treated lungs and livers were stronger than those of the control group. Our results showed that combined treatment of ozone with NNK/DBP altered the cell cycle control through instability of the wild-type p53 gene. Such pivotal p53-mediated cell cycle alterations may be responsible for the toxicity observed under our experimental condition. These results may be applied to risk assessment of mixture-induced toxicity.

Gravity-Geologic Prediction of Bathymetry in the Drake Passage, Antarctica (Gravity-Geologic Method를 이용한 남극 드레이크 해협의 해저지형 연구)

  • 김정우;도성재;윤순옥;남상헌;진영근
    • Economic and Environmental Geology
    • /
    • v.35 no.3
    • /
    • pp.273-284
    • /
    • 2002
  • The Gravity-Geologic Method (GGM) was implemented for bathymetric determinations in the Drake Passage, Antarctica, using global marine Free-air Gravity Anomalies (FAGA) data sets by Sandwell and Smith (1997) and local echo sounding measurements. Of the 6548 bathymetric sounding measurements, two thirds of these points were used as control depths, while the remaining values were used as checkpoints. A density contrast of 9.0 gm/㎤ was selected based on the checkpoints predictions with changes in the density contrast assumed between the seawater and ocean bottom topographic mass. Control depths from the echo soundings were used to determine regional gravity components that were removed from FAGA to estimate the gravity effects of the bathymetry. These gravity effects were converted to bathymetry by inversion. In particular, a selective merging technique was developed to effectively combine the echo sounding depths with the GGM bathymetiy to enhance high frequency components along the shipborne sounding tracklines. For the rugged bathymetry of the research area, the GGM bathymetry shows correlation coefficients (CC) of 0.91, 0.92, and 0.85 with local shipborne sounding by KORDI, GEODAS, and a global ETOPO5 model, respectively. The enhanced GGM by selective merging shows imploved CCs of 0.948 and 0.954 with GEODAS and Smith & Sandwell (1997)'s predictions with RMS differences of 449.8 and 441.3 meters. The global marine FAGA data sets and other bathymetric models ensure that the GGM can be used in conjunction with shipborne bathymetry from echo sounding to extend the coverage into the unmapped regions, which should generate better results than simply gridding the sparse data or relying upon lower resolution global data sets such as ETOPO5.

A study on the User Experience at Unmanned Checkout Counter Using Big Data Analysis (빅데이터 분석을 통한 무인계산대 사용자 경험에 관한 연구)

  • Kim, Ae-sook;Jung, Sun-mi;Ryu, Gi-hwan;Kim, Hee-young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.343-348
    • /
    • 2022
  • This study aims to analyze the user experience of unmanned checkout counters perceived by consumers using SNS big data. For this study, blogs, news, intellectuals, cafes, intellectuals (tips), and web documents were analyzed on Naver and Daum, and 'unmanned checkpoints' were used as keywords for data search. The data analysis period was selected as two years from January 1, 2020 to December 31, 2021. For data collection and analysis, frequency and matrix data were extracted through Textom, and network analysis and visualization analysis were conducted using the NetDraw function of the UCINET 6 program. As a result, the perception of the checkout counter was clustered into accessibility, usability, continuous use intention, and others according to the definition of consumers' experience factors. From a supplier's point of view, if unmanned checkpoints spread indiscriminately to solve the problem of raising the minimum wage and shortening working hours, a bigger employment problem will arise from a social point of view. In addition, institutionalization is needed to supply easy and convenient unmanned checkout counters for the elderly and younger generations, children, and foreigners who are not familiar with unmanned calculation.

Impact Analysis of Buildings for KOMPSAT-3 Image Co-registration (KOMPSAT-3 위성영상의 상대기하보정에 대한 건물의 영향 분석)

  • Park, Jueon;Kim, Taeheon;Yun, Yerin;Lee, Chabin;Lee, Jinmin;Lee, Changno;Han, Youkyung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.4
    • /
    • pp.293-304
    • /
    • 2022
  • In this study, to analyze the effect of buildings on the image co-registration performance, co-registration results are compared according to the presence or absence of matching points extracted from buildings. To remove the matching points extracted from buildings, a building mask generated by extracting building objects from the digital topographic map was used. In addition, matching points extraction performance and image co-registration accuracy were analyzed according to the magnitude of the convergence angle. Image co-registration results were compared by applying the affine and piecewise linear transformation models, respectively. According to the experimental results, the affine transformation model showed an overall improvement in accuracy after removing the matching points extracted from buildings. On the other hand, the piecewise linear transformation model improved the accuracy at the checkpoints including the surrounding buildings, but the accuracy improvement was not significant at checkpoints in the flat area without the existence of buildings. In addition, when the piecewise linear transformation model was applied, stable accuracy of less than 2 pixels was derived from images with a convergence angle of 20° or less.

Wearing Conditions of Protective Clothing and Protective Gear for FMD Prevention (구제역 방역보호복 및 보호구의 착용실태)

  • Moon, Jee-Hyun;Jeon, Eun-Kyung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.36 no.1
    • /
    • pp.46-55
    • /
    • 2012
  • Foot and Mouth Disease (FMD) is highly contagious and highly lethal to cloven-hoofed animals. In the winter of 2010, an outbreak of FMD in Korea caused a great deal of economic damage as well as serious mental and physical damage to people who participated in preventive activities. This study provides preliminary data for designing safe and functional protective clothing and gear for individuals who participate in FMD preventive activities. This study was accomplished with multilateral methods such as a documentary survey, field trips, sample analysis of protective clothing and gear, questionnaire studies and focus interviews. As a result, we found that most workers wore low-priced protective clothing that was low in safety functions and rarely wore extra protective gear. Also pointed out was dissatisfaction with: protective clothing and gear, problems related to damage, discomfort, contamination, problems in protective gear related to waterproof functions, protection against harmful substances, discomfort, coldness, and damage. Safe protective clothing could be developed that protects the actual wearers if these results are reflected in the improvement of protective clothing and gear.

Significance of Cell Cycle and Checkpoint Cnotrol (세포주기조절에 관한 최근 연구)

  • 최영현;최혜정
    • Journal of Life Science
    • /
    • v.11 no.4
    • /
    • pp.362-370
    • /
    • 2001
  • Regulation of cell proliferation is a complex process involving the regulated expression and /or modification of discrete gene products. which control transition between different stages of the cycle. The purpose of this short review is to provide an overview of somatic cell cycle events and their controls. Cycline have appeared as major positive regulators in this network, because their association to the cyclin-dependent kinases(Cdks) allows the subsequent activation on the Cdk/cyclin complexes and their catalatic activity. In mammalian cells, early to mid G1 progression and late G1 progression leading to S phase entry are directed by D-type cyclins-Cdk4, 6 and cyclin E-Cdk 2 both of which can phosphorylate the retinoblastoma protein (pRB). pRB is a transcriptional repressor which, in its unphosphorylated state, binds to members of the E2F transcription factor family and blocks E2F-dependent transcription of genes controlling the G1 to S phase transition an subsequent DNA synthesis. Cyclin A is produced in late G1 and expressed during S and G2 phae, and expression of B-type cyclins is typically maximal during the G2 to M phase transition and it controls the passage through M phase. They primarily associate with the activate Cdk2, and Cdc2, respectively. On the other hand, the Cdk inhibitors negatively control the activity of C아/cyclin complex by coordinating internal and/or external signals and impending proliferation at several key checkpoints. These current and further findings will provide novel approaches to understanding and treating major diseases.

  • PDF

A Preliminary Study on the Current Condition of University Library Facebook Pages : around Korean & USA University Libraries (도서관 페이스북 페이지의 운영 실태에 관한 기초연구: 한국과 미국의 대학도서관 사례를 중심으로)

  • Lee, Soo-Sang
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.4
    • /
    • pp.347-372
    • /
    • 2012
  • This paper explores the current condition of facebook pages in order to provide university libraries with practical ideas in using facebook services. A total of 20 facebook pages of 20 selected Korean and USA university libraries were examined and analyzed in various ways. The research questions for this study are: (1) how well do library operate the facebook page? (2) what are the category and nature of wall posts of library facebook pages. To get the answers to this questions, various checkpoints are developed and applied. The most significant findings are that there are a quite different data of operation and there are similar patterns of posts communication to the Korean and USA university library pages.

A Verification of Replicated Operation In P2P Computing (P2P 컴퓨팅에서 중복 수행 결과의 정확성 검증 기법)

  • Park, Chan Yeol
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.3
    • /
    • pp.35-43
    • /
    • 2004
  • Internet-based P2P computing with independent machines suffers from frequent disconnections and security threats caused by leaving, failure, network diversity, or anonymity of participated machines. Replication schemes of shared resources are used for solving these issues in many studies and implementations. We propose an operational replication scheme in P2P computing to share computing resources, and the scheme verifies the correctness of operation against faults and security threats. This verifications are carried out periodically on replicated and dependent working units without global message exchanges over the whole system. The verified working units are treated as checkpoints, and thus they could be put to practical use for fault-tolerance with rollback recovery.

  • PDF