• 제목/요약/키워드: Data Act3

검색결과 598건 처리시간 0.029초

SPICE를 이용한 16-BIT ALU의 회로 해석 및 설계에 관한 연구 (A Study on the Analysis and Design of 16-BIT ALU by Using SPICE)

  • 강희조
    • 한국통신학회논문지
    • /
    • 제15권3호
    • /
    • pp.197-212
    • /
    • 1990
  • 빠른 설계 시간 및 재 설계 가능성 부여 등에 주안점을 두어 고성능의 단일 칩 16-bit data path를 설계하였다. 원칙적인 설계 방법의 체계적인 연구를 위하여 module화의 개념을 근간으로한 설계방법을 도입하였으며, 이에 따라 각 내부블럭이 bus에 연결되어 독립적으로 동작하는 subsystem이 되도록 이를 결합하여 전체 시스템의 설계를 완성하였다. 시스템은 data path이다. Data path는 16-bit의 데이터를 처리하는 부분으로 ALU(Arithmetic Logic Unit), register file, barrel shifter 및 bus 회로로 구성된다. 이 회로에서의 게이트의 폭과 길이는 spice2를 사용하여서 결정하였다. 회로 시뮬레이션의 결과는 기대하였던 회로 특성과 잘 일치하였다.

  • PDF

화평법에 따른 급성 수생독성 예측을 위한 QSAR 모델의 활용 가능성 연구 (Applicability of QSAR Models for Acute Aquatic Toxicity under the Act on Registration, Evaluation, etc. of Chemicals in the Republic of Korea)

  • 강동진;장석원;이시원;이재현;이상희;김필제;정현미;성창호
    • 한국환경보건학회지
    • /
    • 제48권3호
    • /
    • pp.159-166
    • /
    • 2022
  • Background: A quantitative structure-activity relationship (QSAR) model was adopted in the Registration, Evaluation, Authorization, and Restriction of Chemicals (REACH, EU) regulations as well as the Act on Registration, Evaluation, etc. of Chemicals (AREC, Republic of Korea). It has been previously used in the registration of chemicals. Objectives: In this study, we investigated the correlation between the predicted data provided by three prediction programs using a QSAR model and actual experimental results (acute fish, daphnia magna toxicity). Through this approach, we aimed to effectively conjecture on the performance and determine the most applicable programs when designating toxic substances through the AREC. Methods: Chemicals that had been registered and evaluated in the Toxic Chemicals Control Act (TCCA, Republic of Korea) were selected for this study. Two prediction programs developed and operated by the U.S. EPA - the Ecological Structure-Activity Relationship (ECOSAR) and Toxicity Estimation Software Tool (T.E.S.T.) models - were utilized along with the TOPKAT (Toxicity Prediction by Komputer Assisted Technology) commercial program. The applicability of these three programs was evaluated according to three parameters: accuracy, sensitivity, and specificity. Results: The prediction analysis on fish and daphnia magna in the three programs showed that the TOPKAT program had better sensitivity than the others. Conclusions: Although the predictive performance of the TOPKAT program when using a single predictive program was found to perform well in toxic substance designation, using a single program involves many restrictions. It is necessary to validate the reliability of predictions by utilizing multiple methods when applying the prediction program to the regulation of chemicals.

국내 제조업 화재감시자 운영 실태 분석 - 개정 산업안전보건법 중심 (Analysis of the Operation of Fire Observers in the Domestic Manufacturing Industry - Focusing on the Revised Occupational Safety and Health Act)

  • 김경민;서용윤;이종빈;장성록
    • 한국안전학회지
    • /
    • 제38권3호
    • /
    • pp.77-84
    • /
    • 2023
  • Welding and cutting, which are representative tasks in handling firearms at industrial sites, are the basis for production and maintenance processes across all industries. They are also essential in the root industry. Specifically, they are widely used in the manufacturing industry, including equipment industries such as shipbuilding, automobiles, and chemicals, and subsequent maintenance work and general facility repair. However, such hot work carries a high fire risk owing to sparks scattering and inadequate management, resulting in a high occurrence of accidents. In response, the government and relevant organizations have recently revised the Occupational Safety and Health Act to prevent accidents during hot work. These revisions impose more stringent regulations than before, which are expected to help prevent actual fire accidents. However, whether the fire observer system, which is the core element of the revision, would be practically applied and maintained is unclear. Therefore, this study compared the fire observer system in the revised Occupational Safety and Health Act with those in the laws and systems of developed countries, conducted interviews with safety and health experts to assess the suitability of the new system for fire observer operations, and improvement plans were derived accordingly. Therefore, the laws and systems of developed countries grant more authority to fire observers compared with those of Korea. Moreover, professional training in handling emergency is required. Interviews with safety and health experts revealed that regardless of company size, the same operating standards were applied, and standards for deploying fire observers in various locations were unclear. Furthermore, there was a lack of professional education and training, and the role and authority of fire observers were limited. These findings revealed a problem in this sector. The results of this study are expected to serve as basic data for establishing a practical system for placing fire observers and supplementing laws, guidelines, and systems for preventing fire accidents.

Kinetic Analysis of the MAPK and PI3K/Akt Signaling Pathways

  • Suresh, Babu CV;Babar, Sheikh Md. Enayetul;Song, Eun Joo;Oh, Eulsik;Yoo, Young Sook
    • Molecules and Cells
    • /
    • 제25권3호
    • /
    • pp.397-406
    • /
    • 2008
  • Computational modeling of signal transduction is currently attracting much attention as it can promote the understanding of complex signal transduction mechanisms. Although several mathematical models have been used to examine signaling pathways, little attention has been given to crosstalk mechanisms. In this study, an attempt was made to develop a computational model for the pathways involving growth-factor-mediated mitogen-activated protein kinase (MAPK) and phosphatidylinositol 3'-kinase/protein kinase B (PI3K/Akt). In addition, the dynamics of the protein activities were analyzed based on a set of kinetic data. The simulation approach integrates the information on several levels and predicts systems behavior. The in-silico analysis conducted revealed that the Raf and Akt pathways act independently.

데이터 3법 개정에 따른 농업분야의 대응방안 연구 (A Study on the Countermeasures in the Agricultural Sector by Revising the Data 3 Act)

  • 이원석;김동희;설수진;신용태
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2020년도 추계학술발표대회
    • /
    • pp.511-514
    • /
    • 2020
  • 그동안 4차 산업혁명에 따른 신산업 성장이나 데이터 활용에 걸림돌이 되고 있다는 비판을 받아온 이른바 데이터 3법이 개정됨에 따라 데이터 경제 시대를 본격적으로 맞이하는 마중물이 되리라는 기대가 커지고 있다. 이에 따라 금융권 등 민간영역은 물론이고 중앙부처 등 공공영역에서도 데이터 3법의 개정에 따른 대응 방안을 모색하는 등 분주히 준비하는 상황이다. 따라서 농업분야에서도 데이터 경제 활성화를 목표로 데이터 3법 개정에 따른 대응 방안을 연구하고자 한다.

여고생의 문제행동에 따른 성태도 유형 및 성관련 경험에 대한 연구 (Study on the Sexual Attitudes Type and Sexual Experiences as Regards Risk Behaviors in Girls High School Students)

  • 손정남
    • 여성건강간호학회지
    • /
    • 제9권2호
    • /
    • pp.113-127
    • /
    • 2003
  • The purpose of this study is to identify the relationship between sexual attitude and risk behaviors, between risk behavior and sexual experiences in Korean girls high school students. The subjects for this study were 522 girls, who were samples from a target population of 63,375 11th grade students from 200 regular high schools and 70 vocational high schools in Seoul. The data were collected from June 22 to July 18, 2002. A structured questionnaire was used that included measurement of general characteristics, sexual attitudes, risk behaviors and sexual experiences. The data were processed with the SAS program, which uses descriptive statistics, t-test, and ANOVA in its an alyses. The results of this study are as follows : 1. The frequency of sexual experience is as follows ; 'holding hands' had the highest percentage, 57.4 7%, followed in order by 'arms around' 50.19%, 'act of embracing' 50.19%, 'kiss' 37.74%, 'french kiss' 30.84%, 'touch breasts' 8.62%, 'touch sexual organs' 3.26%, 'coitus' 2.30%, 'contraception' 0.77%, 'pregnancy' 0.19%, 'abortion' 0.19%, and 'prostitution' 0.19%. 2. The score of conservatives types was significantly different depending upon exposure to pornographic material and drinking. In comparison, the score of permissiveness types was significantly different depending upon exposure to pornographic material, drinking, and running away from home. But the score of pleasure seeking types was not significantly different than that of the risk behaviors types. 3. There was statistically significant difference in the sexual experience depending upon exposure to pornographic material, drinking, smoking, and running away from home. 4. In the relationship between sexual attitude types and sexual experience, there was a negative correlation between the conservatives types and sexual experiences such as 'holding hands', 'arms around', 'act of embracing', 'kiss', 'french kiss', 'touch breasts', 'touch sexual organs', and 'coitus'. There was a positive correlation between the permissiveness types and sexual experiences such as 'holding hands', 'arms around', 'act of embracing', 'kiss', 'french kiss', 'touch breasts', 'touch sexual organs', and 'coitus'. There was also a positive correlation between the pleasure-seeking types and sexual experiences such as 'touch sexual organ', 'contraceptions', 'pregnancy', and 'prostitution'. Based on the finding of this study, this society should develop a integrated program to prevent risk behaviors and sexual experiences in girls high school students.

  • PDF

디지털도서관의 저작권보호 환경 평가 연구 (An Evaluation Study on the Copyright Protection Environment for Digital Libraries)

  • 이종문
    • 정보관리학회지
    • /
    • 제19권3호
    • /
    • pp.211-326
    • /
    • 2002
  • 본 연구는 디지털도서관의 복제.전송과 관련된 저작권보호 환경을 조사하여 분석 평가하고, 제반문제점을 식별하여 개선방안을 제시하는 데 있다. 데이터수집은 저작권법에 의하여 디지털복제 전송이 허용된 50개 도서관을 대상으로, 시스템 도입 및 복제 \ulcorner전송 현황을 조사하고, 저작권법에서 의무화한 6개 기술조치를 이행한 5개 도서관 이용자를 표집하여 디지털자료의 이용 및 저작권에 대한 인식을 조사하였고, 기초통계량을 고찰하고 빈도분석과 교차분석을 수행하였다. 분석결과, 산업대학 도서관을 제외한 거의 모든 도서관이 디지털도서관시스템을 도입하고 있으나. 디지털복제(68.0%) .전송시스템(84.0%) 도입비율은 높은 반면, 저작권보호시스템(26.0%) 도입비율은 낮다. 조사대상 도서관의 84.0%가 전문을 디지털화하고 있으나, 대부분 5천건 미만의 자료를 디지털화하였으며. 저작권을 확보하여 터지털화하는 도서관은 33.3%로 낮게 나타났다. 저작권보호를 위한 법적 규제가 제대로 이행되지 못하고 이행 수준도 낮으며, 이용자의 전자책에 대한 인지도와 이용률은 낮은 편이며 저작권에 대한 인식 또한 낮다.

A Study on the Public Data Activation Strategy based on App Developed by Non-Profession User

  • Chang, Young-Hyun
    • International journal of advanced smart convergence
    • /
    • 제6권1호
    • /
    • pp.32-38
    • /
    • 2017
  • In Korea, the act for promoting use of the public data has been enforced since 2013. The Key Government 3.0 Strategy was established for providing the public data as an obligation of public authorities for users to use them free of charge. The aim of open public data and using them targeted by the government is creation of a solution for vitalizing the economy by using the public data. However, the reason for low usability and tangible outcomes despite unlimited provision of open government data is as follows. That is, it is essential to address the issue of difficult software technology required to access public data for using the data. However, with the open API method currently provided, the development procedure is not easy even for IT students or specialized software developers. Therefore, strategies for each step ideal for the level of developers are required to vitalize applications based on the public data and developed by ordinary users. Two strategic methods can be used for facilitating the use of public data and applications developed by ordinary users suggested in this paper on the basis of the public data portal organized by the Ministry of the Interior and provided to all ordinary users. That is, they are applications developed in the web browser environment and those developed in the PC environment. They allow ordinary users to develop and distribute applications based on the public data to contribute to enforcing the policy for facilitating the use of public data of the government just with basic training and basic knowledge from the training without using program coding knowledge of open API which requires the knowledge of development professionals.

척추의 3차원 수학적 척추 모델 개발 (Developement of Three-Dimensional Mathematical Spinal Model)

  • 한정수;안태정;이태희
    • 대한의용생체공학회:의공학회지
    • /
    • 제21권2호
    • /
    • pp.189-201
    • /
    • 2000
  • Mechanical factors in the human body are considered to play a dominant role in low back problems. Various spinal structures. including muscles, act in unison to resist the external load. An estimation of the muscle forces in this structure requires a knowledge of the orientation, location and area of cross-section of the muscles to complete the formulation of a truly three-dimensional mathematical model of the spine. The geometric parameters which are calculated were the line of action, the centroid and physiologic area of cross-section of each muscle as a function of the spinal level. This geometric data were obtained from CT scans of 11 subjects participating in this study.

  • PDF

Hybrid Fuzzy Adaptive Wiener Filtering with Optimization for Intrusion Detection

  • Sujendran, Revathi;Arunachalam, Malathi
    • ETRI Journal
    • /
    • 제37권3호
    • /
    • pp.502-511
    • /
    • 2015
  • Intrusion detection plays a key role in detecting attacks over networks, and due to the increasing usage of Internet services, several security threats arise. Though an intrusion detection system (IDS) detects attacks efficiently, it also generates a large number of false alerts, which makes it difficult for a system administrator to identify attacks. This paper proposes automatic fuzzy rule generation combined with a Wiener filter to identify attacks. Further, to optimize the results, simplified swarm optimization is used. After training a large dataset, various fuzzy rules are generated automatically for testing, and a Wiener filter is used to filter out attacks that act as noisy data, which improves the accuracy of the detection. By combining automatic fuzzy rule generation with a Wiener filter, an IDS can handle intrusion detection more efficiently. Experimental results, which are based on collected live network data, are discussed and show that the proposed method provides a competitively high detection rate and a reduced false alarm rate in comparison with other existing machine learning techniques.