• Title/Summary/Keyword: Engineering

Search Result 348,382, Processing Time 0.294 seconds

The Design and Implementation of GSA(Grid System Account) for an Effective Analyzation of Enterprise Grid Computing system (Enterprise Grid Computing 시스템의 효율적 분석을 위한 GSA 시스템의 설계와 구현)

  • Chung, Moon-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.540-543
    • /
    • 2007
  • 최근의 그리드 컴퓨팅 시스템 환경은 단일 환경에서 작게는 2~4CPU, 많게는 수백 CPU 이상의 시스템으로 구축되고 있고, 더욱이 지역적으로도 멀리 떨어져 있다. 따라서 이를 운용하는 기업에서는 시스템의 사용 현황을 신속하게 분석할 필요가 있다. 그러나 이렇게 혼재된 이 기종 및 컴퓨팅 환경하에서의 각 지역별 시스템 사용현황을 효과적으로 분석 한다는 것은 매우 어려운 일이다. 기존에 사용되어 온 그리드 컴퓨팅 시스템 환경에서의 사용율 관리 방법들은 Queueing 시스템이 가지고 있는 Accounting 분석 명령어로 text 형태의 Accounting raw data 의 결과를 추출하여 가공 처리하므로 데이터 증가 시 반응 속도가 현격하게 느려지는 상황이 발생한다. 또한 원격지 그리드 컴퓨팅 시스템 군의 사용율 분석은 데이터 분석 시 매번 원격지접근 절차를 사용하여 그리드 컴퓨팅 시스템 군에 접근한 후 해당 로컬 시스템 분석을 해야 하고 각 원격지시스템군별로 추출 된 데이터를 통합 관리해야 하는 문제점을 가지고 있다. 따라서 이러한 문제점을 해결하고자 하는 것이 본 논문에서 제안하는 3-tier 구조의 GSA(Grid System Account)이다. 제안한 GSA 는 각 원격지 별 데이터를 객체화하여 Database 에 저장 함으로써 데이터 분석 시 효과적으로 처리할 수 있으며, 다수의 원격지 그리드 컴퓨팅 시스템 군에 대한 복합적인 분석이 필요할 때 효율적으로 대처할 수 있다. 본 논문에서는 GSA 의 설계방법을 제안하고 구현하여 실 성능을 시험함으로써 보다 효율적인 그리드 컴퓨팅 시스템의 사용율 분석 관리가 가능함을 보였다.포는 감수성을 보이지 않았다. 따라서 위의 결과로부터 SLT-I에 감수성을 보이지 않은 Raw264.7세포를 대상으로 Gb3 발현 정도와 SLT-I의 세포독성의 관계를 규명하고자 Gb3의 발현을 증가시킨 후 SLT-I의 세포독성을 재차 평가하였다. 이 결과 $TNF-{\alpha}$의 처리에 의하여 6 hrs에 Gb3의 발현이 정점(43.5%)에 이르렀으며 36 hrs에 정상 수준(25.0%)으로 환원되었다. 그러나, Gb3의 발현이 증가함에도 불구하고 SLT-I의 세포독성에는 변화가 관찰되지 않았다. 따라서, SLT-I에 의한 세포독성은 세포의 종류에 따라서 다르며 또한, Gb3의 발현정도에만 의존적이지는 않을 것으로 생각된다. 이와 같은 결과는 E. coli 0157의 감염증 병인 연구에 있어 SLT-I과 Gb3의 발현의 상관관계에 대한 보다 심도 있는 연구가 필요함을 시사한다.만 분할률, 배반포 형성률 및 배반포의 세포수를 증가시키는 것으로 사료된다.수의 유출입 지점에 온도센서를 부착하여 냉각수의 온도를 측정하고 냉각수의 공급량과 대기의 온도 등을 측정하여 대사열의 발생을 추정할 수 있었다. 동시에 이를 이용하여 유가배양시 기질을 공급하는 공정변수로 사용하였다 [8]. 생물학적인 폐수처리장치인 활성 슬러지법에서 미생물의 활성을 측정하는 방법은 아직 그다지 개발되어있지 않다. 본 연구에서는 슬러지의 주 구성원이 미생물인 점에 착안하여 침전시 슬러지층과 상등액의 온도차를 측정하여 대사열량의 발생량을 측정하고 슬러지의 활성을 측정할 수 있는 방법을 개발하였다.enin과 Rhaponticin의 작용(作用)에 의(依)한 것이며, 이

Development of a Java Compiler for Verification System of DTV Contents (DTV 콘텐츠 검증 시스템을 위한 Java 컴파일러의 개발)

  • Son, Min-Sung;Park, Jin-Ki;Lee, Yang-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1487-1490
    • /
    • 2007
  • 디지털 위성방송의 시작과 더불어 본격적인 데이터 방송의 시대가 열렸다. 데이터방송이 시작 되면서 데이터방송용 양방향 콘텐츠에 대한 수요가 급속하게 증가하고 있다. 하지만 양방향 콘텐츠 개발에 필요한 저작 도구 및 검증 시스템은 아주 초보적인 수준에 머물러 있는 것이 현실이다. 그러나 방송의 특성상 콘텐츠 상에서의 오류는 방송 사고에까지 이를 수 있는 심각한 상황이 연출 될 수 있다. 본 연구 팀은 이러한 DTV 콘텐츠 개발 요구에 부응하여, 개발자의 콘텐츠 개발 및 사업자 또는 기관에서의 콘텐츠 검증이 원활이 이루어 질수 있도록 하는 양방향 콘텐츠 검증 시스템을 개발 중이다. 양방향 콘텐츠 검증 시스템은 Java 컴파일러, 디버거, 미들웨어, 가상머신, 그리고 IDE 등으로 구성된다. 본 논문에서 제시한 자바 컴파일러는 양방향 콘텐츠 검증 시스템에서 데이터 방송용 자바 애플리케이션(Xlet)을 컴파일하여 에뮬레이팅 하거나 런타임 상에서 디버깅이 가능하도록 하는 바이너리형태의 class 파일을 생성한다. 이를 위해 Java 컴파일러는 *.java 파일을 입력으로 받아 어휘 분석과 구문 분석 과정을 거친 후 SDT(syntax-directed translation)에 의해 AST(Abstract Syntax Tree)를 생성한다. 클래스링커는 생성된 AST를 탐색하여 동적으로 로딩 되는 파일들을 연결하여 AST를 확장한다. 의미 분석과정에서는 확장된 AST를 입력으로 받아 참조된 명칭의 사용이 타당한지 등을 검사하고 코드 생성이 용이하도록 AST를 변형하고 부가적인 정보를 삽입하여 ST(Semantic Tree)를 생성한다. 코드 생성 단계에서는 ST를 입력으로 받아 이미 정해 놓은 패턴에 맞추어 Bytecode를 출력한다.ovoids에서도 각각의 점들에 대한 선량을 측정하였다. SAS와 SSAS의 직장에 미치는 선량차이는 실제 임상에서의 관심 점들과 가장 가까운 25 mm(R2)와 30 mm(R3)거리에서 각각 8.0% 6.0%였고 SAS와 FWAS의 직장에 미치는 선량차이는 25 mm(R2) 와 30 mm(R3)거리에서 각각 25.0% 23.0%로 나타났다. SAS와 SSAS의 방광에 미치는 선량차이는 20 m(Bl)와 30 mm(B2)거리에서 각각 8.0% 3.0%였고 SAS와 FWAS의 방광에 미치는 선량차이는 20 mm(Bl)와 30 mm(B2)거리에서 각각 23.0%, 17.0%로 나타났다. SAS를 SSAS나 FWAS로 대체하였을 때 직장에 미치는 선량은 SSAS는 최대 8.0 %, FWAS는 최대 26.0 %까지 감소되고 방광에 미치는 선량은 SSAS는 최대 8.0 % FWAS는 최대 23.0%까지 감소됨을 알 수 있었고 FWAS가 SSAS 보다 차폐효과가 더 좋은 것으로 나타났으며 이 두 종류의 shielded applicator set는 부인암의 근접치료시 직장과 방광으로 가는 선량을 감소시켜 환자치료의 최적화를 이룰 수 있을 것으로 생각된다.)한 항균(抗菌) 효과(效果)를 나타내었다. 이상(以上)의 결과(結果)로 보아 선방활명음(仙方活命飮)의 항균(抗菌) 효능(效能)은 군약(君藥)인 대황(大黃)의 성분(成分) 중(中)의 하나인 stilbene 계열(系列)의 화합물(化合物)인 Rhapontigenin과 Rhaponticin의 작용(作用)에 의(依)한 것이며, 이는 한의학(韓醫學) 방제(方劑) 원리(原理)인 군신좌사(君臣佐使) 이론(理論)에서 군약(君藥)이 주증(主症)에 주(主)로 작용(作用)하는 약물(藥物)이라는 것을 밝혀주는 것이라고

Analysis of E-Waste Disposal Trends in a Security Perspective (보안관점의 전자폐기물 처리동향 분석 연구)

  • Juno Lee;Yuna Han;Yeji Choi;Yurim Choi;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.11 no.6
    • /
    • pp.56-67
    • /
    • 2023
  • The increased demand for electronic components, spurred by the Fourth Industrial Revolution and the COVID-19 pandemic, has facilitated human life but also escalated the production of e-waste. Discussions on the impact of e-waste have primarily revolved around environmental, health, and social issues, with global legislations focusing on addressing these concerns. However, e-waste poses unique security risks, such as potential technological and personal information leaks, unlike conventional waste. Current discourse on e-waste security is notably insufficient. This study aims to empirically analyze the relatively overlooked trends in e-waste security, employing three methodologies. Firstly, it assesses the general trend in discussions on e-waste by analyzing year-wise documents and media reports. Secondly, it identifies key trends in e-waste security by examining documents on the subject. Thirdly, the study reviews national security guidelines related to e-waste disposal to assess the necessity of designing security strategies for e-waste management. This research is significant as it is one of the first in korea to address e-waste from a security perspective and offers a multi-dimensional analysis of e-waste security trends. The findings are expected to enhance domestic awareness of e-waste and its security issues, providing an opportunity for proactive response to these security risks.

  • PDF

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

Research on Optimized Operating Systems for Implementing High-Efficiency Small Wind Power Plants (고효율 소형 풍력 발전소 구현을 위한 최적화 운영 체계 연구)

  • Young-Bu Kim;Jun-Mo Park
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.25 no.2
    • /
    • pp.94-99
    • /
    • 2024
  • Recently, wind power has been gaining attention as a highly efficient renewable energy source, leading to various technological developments worldwide. Typically, wind power is operated in the form of large wind farms with many wind turbines installed in areas rich in wind resources. However, in developing countries or regions isolated from the power grid, off-grid small wind power systems are emerging as an efficient solution. To efficiently operate and expand off-grid small-scale power systems, the development of real-time monitoring systems is required. For the efficient operation of small wind power systems, it is essential to develop real-time monitoring systems that can actively respond to excessive wind speeds and various environmental factors, as well as ensure the stable supply of produced power to small areas or facilities through an Energy Storage System (ESS). The implemented system monitors turbine RPM, power generation, brake operation, and more to create an optimal operating environment. The developed small wind power system can be utilized in remote road lighting, marine leisure facilities, mobile communication base stations, and other applications, contributing to the development of the RE100 industry ecosystem.

Structural analysis, anti-inflammatory activity of the main water-soluble acidic polysaccharides (AGBP-A3) from Panax quinquefolius L berry

  • Zhihao Zhang;Huijiao Yan;Hidayat Hussain;Xiangfeng Chen;Jeong Hill Park;Sung Won Kwon;Lei Xie;Bowen Zheng;Xiaohui Xu;Daijie Wang;Jinao Duan
    • Journal of Ginseng Research
    • /
    • v.48 no.5
    • /
    • pp.454-463
    • /
    • 2024
  • Background: Panax quinquefolius L, widely recognized for its valuable contributions to medicine, has aroused considerable attention globally. Different from the extensive research has been dedicated to the root of P. quinquefolius, its berry has received relatively scant focus. Given its promising medicinal properties, this study was focused on the structural characterizations and anti-inflammatory potential of acidic polysaccharides from the P. quinquefolius berry. Materials and methods: P. quinquefolius berry was extracted with hot water, precipitated by alcohol, separated by DEAE-52-cellulose column to give a series of fractions. One of these fractions was further purified via Sephadex G-200 column to give three fractions. Then, the main fraction named as AGBP-A3 was characterized by methylation analysis, NMR spectroscopy, etc. Its anti-inflammatory activity was assessed by RAW 264.7 cell model, zebrafish model and molecular docking. Results: The main chain comprised of α-L-Rhap, α-D-GalAp and β-D-Galp, while the branch consisted mainly of α-L-Araf, β-D-Glcp, α-D-GalAp, β-D-Galp. The RAW264.7 cell assay results showed that the inhibition rates against IL-6 and IL-1β secretion at the concentration of 625 ng/mL were 24.83 %, 11.84 %, while the inhibition rate against IL-10 secretion was 70.17 % at the concentration of 312 ng/mL. In the zebrafish assay, the migrating neutrophils were significantly reduced in number, and their migration to inflammatory tissues was inhibited. Molecular docking predictions correlated well with the results of the anti-inflammatory assay. Conclusion: The present study demonstrated the structure of acidic polysaccharides of P. quinquefolius berry and their effect on inflammation, providing a reference for screening anti-inflammatory drugs.

Danggwisu-san ameliorates acute inflammatory responses via NF-κB and MAPK pathway (당귀수산(當歸鬚散)의 in vitro 및 in vivo에서의 염증억제효과)

  • Chang Wook Lee;Sang Mi Park;Hyo Jeong Jin;Ye Lim Kim;Dae Hwa Jung;Sung Hui Byun;Sang Chan Kim
    • Herbal Formula Science
    • /
    • v.32 no.2
    • /
    • pp.155-179
    • /
    • 2024
  • Objective : Danggwisu-san (DGSS) is an herbal formula that has been mainly used in the East Asia for the treatment of bruise, sprain and external injury. The cause of this pain is that Qi and blood become tangled and do not circulate well. DGSS can improve the tangled situation and make it well-circulated. The present study evaluated the anti-inflammatory effects of DGSS on Raw 264.7 cells and in rats with paw edema. Methods : Cell viability was measured using the MTT assay. The amount of nitric oxide (NO) production was measured the amount of nitrite content in the cultured medium using Griess reagent. The amount of tumor necrosis factor-α, monocyte chemoattractant protein 1, interleukin (IL)-1βand IL-6 in the cultured supernatant were measured by ELISA kit. Proteins expression were detected by Western blot. Furthermore, the effect of DGSS on acute inflammation was observed in rat paw edema model. Results : The DGSS ameliorates the lipopolysaccharide-activated changes in NO production, iNOS expression and pro-inflammatory cytokines. Additionally, DGSS significantly suppressed expression of p-JNK, p-ERK and nuclear NF-κB. As expected, in rat paw edema study, 1.0 g/kg of DGSS significantly reduced the carrageenan-induced paw edema and iNOS expression for 1-4 h. Moreover, administration of 1.0 g/kg (4 days) of DGSS used in this study did not show any significant change on ALT and AST. Conclusion : These results demonstrate that DGSS has anti-inflammatory effects in vitro and in vivo. Therefore, this present study can put scientific evidences up for the anti-inflammatory effect of DGSS.

Lateral Resistance Behavior Analysis of Drilled Shafts in Multi-layered Soil (다층지반에 근입된 현장타설말뚝의 수평 지지거동분석)

  • Jang, Seo-Yong;Jeong, Jae-Hoon;Kim, Jong-Ryeol
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.12 no.4
    • /
    • pp.61-70
    • /
    • 2008
  • In this research, load-transfer-function method was selected, because that is widely used in geotechnical engineering among the analysis methods to verify the behavior of load-lateral displacement. Lateral loading test of field scale was conducted, this measured data was analyzed. From the analysis, the model of load-lateral displacement was suggested. The test results were studied and compared to the commercial programs, 'LPILE', which contain the load transfer functions proposed before. By analysis of measure data of load-lateral displacement that expressed to several functions, $y=ae^{bx}$ model was the simplest and applicable to the field. In that case a value converged about 1.3, b value had a tendency to converge about 0.02. From the comparison analysis between measured data and load transfer function by 'LPILE', it is examined that if the lateral load is small, calculated displacements of them show a similar value compared to measured values. Furthermore, the bigger lateral loads, the bigger calculated values compared to the measured data. If the results are compared by Matlock-Reese method and Matlock-API method, Matlock-Reese method shows result of safe side because lateral displacement is calculated greatly relatively.

Comparative Analysis of Citation Patterns between Journals and Conferences: A Case Study Based on the JKIISC

  • Byungkyu Kim;Min-Woo Park;Beom-Jong You;Jun Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.171-190
    • /
    • 2024
  • This paper conducts a comparative analysis of citation patterns between journals and conferences using bibliometric and social network analysis on references from the 'Journal of the Korea Institute of Information Security and Cryptology (JKIISC)'. The results indicate that conference references slightly exceed journal references, with around 80% being international publications, highlighting Korean researchers' high dependency on overseas publications. Analysis of citation age shows trends of increasing immediacy citation rate, lengthening citing half-life, and shortening peak time, with domestic publications having higher immediacy citation rate and international publications having slower citing half-life. Mapping SCOPUS journals and ICORE conferences revealed that journal citations mainly come from 'Computer science' (32.3%), 'Engineering' (23.5%), 'Mathematics' (16.7%), and 'Social Cciences' (12.8%), along with other research fields (25.6%), while conference citations are predominantly in 'Cybersecurity and Privacy' with recent increases in 'Computer Vision and Multimedia Computation' and 'Machine Learning'. Co-citation network analysis shows higher degree centrality for conference groups and international publications. The co-citation frequency between different types of literature was highest between journals and conferences (36.9%), compared to within journals (34.3%) or within conferences (28.8%). Lastly, network visualization maps are presented to explore the structural connections among co-cited publications and their research fields. The results of this study suggest that the field of information security research in Korea effectively balances the use of journal and conference literature, indicating that the field is developing through a complementary relationship between these sources.

In a Time of Change: Reflections on Humanities Research and Methodologies (변화의 시대, 인문학적 변화 연구와 방법에 대한 고찰)

  • Kim Dug-sam
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.49
    • /
    • pp.265-294
    • /
    • 2024
  • This study begins with a question about research methods in humanities. It is grounded in the humanities, focusing on the changes that have brought light and darkness to the humanities, and focusing on discourse regarding research methods that explore those changes. If the role of the humanities is to prevent the proverbial "gray rhino," unlike the sciences, and if the humanities have a role to play in moderating the uncontrollable development of the sciences, what kind of research methods should humanities pursue. Furthermore, what kind of research methods should be pursued in the humanities, in line with the development of the sciences and the changing environment? This study discusses research methods in the humanities as follows: first, in Section 2, I advocate for the collaboration between humanities and scientific methods, utilizing accumulated assets produced by humanities and continuously introducing scientific methods. Prediction of change is highly precise and far-reaching in engineering and the natural sciences. However, it is difficult to approach change in these fields in a macro or integrated manner. Because they are not precise, they are not welcome in disciplines that deal with the real world. This is primarily the responsibility of humanities. Where science focuses on precision, humanities focuses on questions of essence. This is because while the ends of change have varied throughout history, the nature of change has not varied that much. Section 3 then discusses the changing environment, proposals for changes to humanistic research methods, reviews and proposals inductive change research methods, and makes some suggestions for humanistic change research. The data produced by the field of humanities accumulated by humankind in the past is abundant and has a wide range of applications. In the future, we should not only actively accept the results of scientific advances but also actively seek systematic humanistic approaches and utilize them across disciplinary boundaries to find solutions at the intersection of scientific methods and humanistic assets.