• Title/Summary/Keyword: Command Center

Search Result 237, Processing Time 0.028 seconds

Water Solubilities and Vapor Pressures of Chlorothalonil and Command (농약 Chlorothalonil 과 Command 의 수용성 및 증기압)

  • Kim, Kyun;Kim, Yong-Bae;Kim, Yong-Hwa;Roh, Jung-Koo
    • Korean Journal of Environmental Agriculture
    • /
    • v.6 no.2
    • /
    • pp.84-93
    • /
    • 1987
  • The water solubilities and vapor pressures of chlorothalonil and Command were measured following the guidelines of the U.S. EPA and OECD. Water solubility of the two compounds is consistent with respective values in the literature. However, the vapor pressures of Chlorothalonil and Command were 5,000 times$(2{\times}10^{-7}\;torr\;at\;25^{\circ}C)$ and 100 times$(<1{\times}10^{-6}\;torr\;at\;45^{\circ}C)$ lower than the literature values, respectively. Courteous use of the vapor pressure values in the handbooks is suggested. With this study, experimental difficulties involved were recognized. Based on the low vapor pressure of Command, the cause of the accidental bleach of non-target plants in the United States might not be attributed to the volatilization of Command, but to the drift during the application of the herbicide. These approaches will be utilized to predict the environmental fate of new chemicals under development, to screen the potential environmental pollutants among chemicals already in use, and to assess measures to minimize the hazards.

  • PDF

DESIGN AND IMPLEMENTATION OF THE MISSION PLANNING FUNCTIONS FOR THE KOMPSAT-2 MISSION CONTROL ELEMENT

  • Lee, Byoung-Sun;Kim, Jae-Hoon
    • Journal of Astronomy and Space Sciences
    • /
    • v.20 no.3
    • /
    • pp.227-238
    • /
    • 2003
  • Spacecraft mission planning functions including event prediction, mission scheduling, command planning, and ground track display have been developed for the KOMPSAT-2 mission operations. Integrated event prediction functions including satellite orbital events, user requested imaging events, and satellite operational events have been implemented. Mission scheduling functions have been realized to detect the mission conflicts considering the user specified constraints and resources, A conflict free mission scheduling result is mapped into the spacecraft command sequences in the command planning functions. The command sequences are directly linked to the spacecraft operations using eXtensible Markup Language(XML) for command transmission. Ground track display shows the satellite ground trace and mission activities on a digitized world map with zoom capability.

The Clinical and Prognostic Significance of Command Hallucinations in Schizophrenic Patients (정신분열병 환자에서 명령환각의 임상적 및 예후적 의의)

  • Yun, Kyu-Wol
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.5 no.1
    • /
    • pp.82-88
    • /
    • 1997
  • Background : Patients with command hallucinations are commonly assumed to be at high risk for dangerous behavior. However the issue of whether command hallucinations hold any clinical relevance in schizophrenic patients has not been established. Method : The author analyzed the clinical and research records of schizophrenic patients with auditory hallucinations who participated in outpatient research follow-up for 9 months after discharge. Patients with auditory hallucinations were classified as experiencing or not experiencing command hallucinations based on clinical psychiatric assessment. Results : Of 63 patients with auditory hallucinations, 29(46%) reported the command hallucinations and these hallucinations often were violent in content(44.8%). Patients with command hallucinations were not significantly different from patients without command hallucinations on sociodemographic and clinical characteristics, and clinical or prognostic course variables, but patients with command hallucinations had significantly more short hospitalizations(less than one month) than patients without command hallucinations. 3 of the patients with command hallucinations who committed suicide during the follow up periods were died. Conclusion : Command hallucinations may be frequent, and in most cases they have minimal influence on the outcome of schizophrenia, but if the patients with command hallucinations have a history of suicide attempts before admission, the possibility of suicide attempts by command hallucinations should be considered.

  • PDF

Comparison of Voltage Oriented Control and Direct Power Control under Command Mode Transition for PMSG Wind Turbines

  • Kwon, Gookmin;Suh, Yongsug
    • Proceedings of the KIPE Conference
    • /
    • 2016.07a
    • /
    • pp.173-174
    • /
    • 2016
  • This paper proposes a comparison of Voltage Oriented Control (VOC) and Direct Power Control (DPC) under command mode transition for PMSG Wind Turbines (WT). Based on a neutral point clamped three level back to back type Voltage Source Converter (VSC), proposed control scheme automatically control the generated output power to satisfy a grid requirement from the hierarchical wind farm controller. Automatic command mode transition based on the dc-link voltage error provides a command mode changing between grid command and MPPT mode. It is confirmed through PLECS simulations in Matlab. Simulation result shows that proposed control scheme of VOC and DPC achieves a much shorter transient time of generated output power than the conventional control scheme of MPPT with optimal torque control and VOC under a step response. The proposed control scheme makes it possible to provide a good dynamic performance for PMSG wind turbines in order to generate a high quality output power.

  • PDF

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

  • Goo, Young-Hoon;Shim, Kyu-Seok;Baek, Ui-Jun;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4310-4330
    • /
    • 2020
  • With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command-oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.

Action Selection by Voting with Loaming Capability for a Behavior-based Control Approach (행동기반 제어방식을 위한 득점과 학습을 통한 행동선택기법)

  • Jeong, S.M.;Oh, S.R.;Yoon, D.Y.;You, B.J.;Chung, C.C.
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.163-168
    • /
    • 2002
  • The voting algorithm for action selection performs self-improvement by Reinforcement learning algorithm in the dynamic environment. The proposed voting algorithm improves the navigation of the robot by adapting the eligibility of the behaviors and determining the Command Set Generator (CGS). The Navigator that using a proposed voting algorithm corresponds to the CGS for giving the weight values and taking the reward values. It is necessary to decide which Command Set control the mobile robot at given time and to select among the candidate actions. The Command Set was learnt online by means as Q-learning. Action Selector compares Q-values of Navigator with Heterogeneous behaviors. Finally, real-world experimentation was carried out. Results show the good performance for the selection on command set as well as the convergence of Q-value.

  • PDF

Direct Power Control Scheme of Improved Command Tracking Capability for PMSG MV Wind turbines

  • Kwon, Gookmin;Suh, Yongsug
    • Proceedings of the KIPE Conference
    • /
    • 2015.07a
    • /
    • pp.361-362
    • /
    • 2015
  • This paper proposes a Direct Power Control (DPC) scheme of improved command tracking capability for Permanent Magnet Synchronous Generator (PMSG) Medium Voltage (MV) Wind Turbines. Benchmarking is performed based on a neutral point clamped three-level back-to-back type voltage source converter. It is introduced to design the DPC modeling and propose DPC scheme of a three-level NPC (3L-NPC) converter. During the fault condition in wind farms, the proposed control scheme directly controls the generated output power to the command value from the hierarchical wind farm controller. The proposed control scheme is compared with conventional control scheme as respect to loss and thermal analysis. The DPC scheme of improved command tracking capability is confirmed through PLECS simulations. Simulation result shows that proposed control scheme achieves a much shorter transient time in a step response of generated output power. The proposed control scheme makes it possible to provide a good dynamic performance for PMSG MV wind turbine to generate a high quality output power under grid fault condition.

  • PDF

Up-regulation of Thy-1 Promotes Invasion and Metastasis of Hepatocarcinomas

  • Cheng, Bian-Qiao;Jiang, Yi;Li, Dong-Liang;Fan, Jing-Jing;Ma, Ming
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.4
    • /
    • pp.1349-1353
    • /
    • 2012
  • Increasing evidence has revealed that thy-1 was a potential stem cell marker of liver cancer, but no data have been shown on how thy-1 regulates the pathophysiology of liver cancer, such as proliferation, apoptosis, invasion and migration. We previously demonstrated that thy-1 was expressed in about 1% of hepg2 cells, thy-1+hepg2 cells, but not thy-1-, demonstrating high tumorigenesis on inoculation $0.5{\times}10^5$ cells per BACA/LA mouse after 2 months. In the present study, our results showed that higher expression of thy-1 occurs in 72% (36/50 cases) of neoplastic hepatic tissues as compared to 40% (20/50 cases) of control tissues, and the expression of thy-1 is higher in poorly differentiated liver tumors than in the well-differentiated ones. In addition, thy-1 expression was detected in 85% of blood samples from liver cancer patients, but none in normal subjects or patients with cirrhosis or hepatitis. There was a significant negative correlation between thy-1expression and E-cadherin expression (a marker of invasion and migraton), but not between thy-1 expression and AFP expression in all the liver cancer and blood samples. We further investigated the relationship between thy-1 and E-cadherin in liver cancer hepg2 cell line which was transfected with pReceiver-M29/thy-1 eukaryotic expression vector followed by aspirin treatment. Lower expression of E-cadherin but higher expressions of thy-1 were detected in hepg2 cells transfected with pReceiver-M29/thy-1. Taken together, our study suggested that thy-1 probably regulates liver cancer invasion and migration.

Quantitative Methodology for Analyzing Propriety of Complement and Salary on Military Organization - Concentrating on Army Doctrine Research Institution - (군(軍) 내 민간인력 적정 규모 및 임금 분석을 위한 정량적 방법론 - 육군 교리업무조직을 중심으로 -)

  • Beak, Byungho;Kim, Yeekhyun;Lee, Yong-Bok;Min, Seunghee;Jee, Yonghoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.1
    • /
    • pp.34-41
    • /
    • 2020
  • There has not been any scientific analysis on appropriate size of workforce and salary for civilian workers in military so far. Thus, this paper conducted analysis on propriety in employment size of military doctrine researchers using system dynamic methodology based on annual military doctrine workload. Vensim software was mainly used to measure complement of the research group based on data from job analysis. Secondly, a multiple regression analysis was performed to study an appropriate wage for researchers based on their expertise and working condition. The data from twenty public research institutions and twenty eight job positions that are performing similar duty with military doctrine researchers was obtained and utilized to create a salary-estimation regression equation in the analysis. Finally, with cost-benefit analysis method this paper studied financial effectiveness of hiring military doctrine researchers. Contingent valuation method, which has been recognized as one of the most effective methodologies in cost-benefit analysis on intangible value, was utilized to measure benefit of hiring the researchers. The methodology presented in this paper can be applied to measure and improve the efficiency of military organization not only in military doctrine research area but also in several military functional area (military training, logistics, administration, combat development, and combat support).

Design of WAN Sync for Large Data Distribution System Based on DDS (DDS 기반 대규모 데이터 분산시스템을 위한 WAN Sync 설계)

  • Kimg, Ju-Hyun;Lee, Jung-Ung;Kim, Jong-Won;Yu, Suk-Dea
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.153-155
    • /
    • 2019
  • 국방무기체계 분야 중 단일 센터에 대규모 분산시스템을 구성하는 경우 신속한 데이터 처리를 위해 통신 미들웨어로 사용되는 DDS의 패킷을 튜닝하여 사용하고 있다. 하지만 향후 국방무기체계는 생존성 보장을 위해 분산시스템의 장소를 주/예비 센터로 이원화하면서 센터간에도 신속한 데이터 동기화 및 비상시 OO초 내 센터 임무전환까지 함께 요구하고 있다. 따라서 단일 센터에서 적용한 DDS 패킷 전송 방식을 WAN 환경에 적용 시 데이터 송수신간 패킷의 순서가 바뀌는 현상이 발생하여 데이터 공유가 제한될 수 있다. 본 연구에서는 이와같은 제한사항을 극복하기 위해 DDS를 적용한 LAN 구간의 기존 성능을 유지하면서 WAN 구간 데이터의 신뢰성 보장을 위한 TCP/IP 기반의 WAN Sync 설계를 제시하였다.