• Title/Summary/Keyword: ITS장비

Search Result 1,249, Processing Time 0.028 seconds

Verification of Skin Dose in Tomotherapy Using the Developed Phantom for Image Based Radiation Treatment System (영상 기반 치료 장비용 팬톰을 이용한 토모테라피 피부 선량 검증)

  • Park, Ji-Yeon;Chang, Ji-Na;Oh, Seung-Jong;Kang, Dae-Gyu;Jung, Won-Gyun;Lee, Jeong-Woo;Jang, Hong-Suk;Kim, Hoi-Nam;Park, Hae-Jin;Kim, Sung-Hwan;Suh, Tae-Suk
    • Progress in Medical Physics
    • /
    • v.20 no.2
    • /
    • pp.88-96
    • /
    • 2009
  • Radiation treatment for skin cancer has recently increased in tomotherapy. It was reported that required dose could be delivered with homogeneous dose distribution to the target without field matching using electron and photon beam. Therapeutic beam of tomotherapy, however, has several different physical characteristic and irradiation of helical beam is involved in the mechanically dynamic factors. Thus verification of skin dose is requisite using independent tools with additional verification method. Modified phantom for dose measurement was developed and skin dose verification was performed using inserted thermoluminescent dosimeters (TLDs) and GafChromic EBT films. As the homogeneous dose was delivered to the region including surface and 6 mm depth, measured dose using films showed about average 2% lower dose than calculated one in treatment planning system. Region indicating about 14% higher and lower absorbed dose was verified on measured dose distribution. Uniformity of dose distribution on films decreased as compared with that of calculated results. Dose variation affected by inhomogeneous material, Teflon, little showed. In regard to the measured dose and its distribution in tomotherapy, verification of skin dose through measurement is required before the radiation treatment for the target located at the curved surface or superficial depth.

  • PDF

Mushroom growth and cultivation environment at cultivation house of vinyl bag cultivation Shiitake mushroom on high-temperature period (고온기 표고 톱밥재배용 재배사 내의 환경 제어시스템과 버섯생육 온도)

  • Jhune, Chang-Sung;Kong, Won Sik;Park, Hye-Sung;Cho, Jae-Han;Lee, Kang-Hyo
    • Journal of Mushroom
    • /
    • v.12 no.4
    • /
    • pp.263-269
    • /
    • 2014
  • Although sawdust cultivation of shiitake (Lentinula edodes) is becoming more common, it is insufficiently competitive in spring and autumn, the best time to breed shiitake. Thus, it is urgently needed to develop a technique for all year round cultivation of shiitake using mushroom growing beds. In the present study, the temperature changes according to the location of shiitake cultivation facilities were investigated. We confirmed that a refrigerator, an air conditioner, triple membranes, shiitake cultivation beds, fog nozzles which were installed in the shiitake cultivation facilities play an important role in keeping the low temperature. Bag cultivation of shiitake was tested in temperature variation from $14^{\circ}C$ to $29^{\circ}C$ with a $3^{\circ}C$ interval to know its cultivating temperature range in hot summer season. In summary, the sawdust cultivation of shiitake is possible when the temperature difference between top and bottom is maintained below $1^{\circ}C$. And the temperature of the shiitake cultivation facilities should be maintained below $23^{\circ}C$ in the induction period for fruitbody formation.

Utility Estimation of the Application of Auditory-Visual-Tactile Sense Feedback in Respiratory Gated Radiation Therapy (호흡동조방사선치료 시 Real Time Monitor와 Ventilator의 유용성 평가)

  • Jo, Jung Hun;Kim, Byeong Jin;Roh, Shi Won;Lee, Hyeon Chan;Jang, Hyeong Jun;Kim, Hoi Nam;Song, Jae Hun;Kim, Young Jae
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.25 no.1
    • /
    • pp.33-40
    • /
    • 2013
  • Purpose: The purpose of this study was to evaluate the possibility to optimize the gated treatment delivery time and maintenance of stable respiratory by the introduction of breath with the assistance of auditory-visual-tactile sense. Materials and Methods: The experimenter's respiration were measured by ANZAI 4D system. We obtained natural breathing signal, monitor-induced breathing signal, monitor & ventilator-induced breathing signal, and breath-hold signal using real time monitor during 10 minutes beam-on-time. In order to check the stability of respiratory signals distributed in each group were compared with means, standard deviation, variation value, beam_time of the respiratory signal. Results: The stability of each respiratory was measured in consideration of deviation change studied in each respiratory time lapse. As a result of an analysis of respiratory signal, all experimenters has showed that breathing signal used both Real time monitor and Ventilator was the most stable and shortest time. Conclusion: In this study, it was evaluated that respiratory gated radiation therapy with auditory-visual-tactual sense and without auditory-visual-tactual sense feedback. The study showed that respiratory gated radiation therapy delivery time could significantly be improved by the application of video feedback when this is combined with audio-tactual sense assistance. This delivery technique did prove its feasibility to limit the tumor motion during treatment delivery for all patients to a defined value while maintaining the accuracy and proved the applicability of the technique in a conventional clinical schedule.

  • PDF

Makeup Cleansing Formulation with Lamellar Liquid Crystal Phase (라멜라 액정상 메이크업 클렌징 제형)

  • Yeo, Hye Lim;Lee, Ji Hyun;Kim, Su Ji;Noh, Minjoo;Jang, Ji Hui;Kim, Youn Joon;Yoon, Moung Seok;Yoo, Kweon Jong;Lee, Jun Bae
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.43 no.1
    • /
    • pp.79-86
    • /
    • 2017
  • This study is related to a lamellar liquid crystal make-up cleansing formulation with a hologram-like unique appearance between two polarizing plates. Make-up cleansing formulations with a lamellar liquid crystal phase have been extensively studied for a long time, but there have been limitations in practical commercialization because of increasing turbidity and viscosity. In this study, to solve this problem, alkyl chains of surfactants were modified to increase the fluidity of the liquid crystal phase, and electrostatic repulsion force was increased by introducing anionic surfactant. The lamellar liquid crystal make-up cleansing formulation which introduced anionic surfactants can easily inhibit crystallization through electrostatic repulsion force, thereby showing excellent stability overtime, maintaining transparent appearance and viscosity. In addition, we have newly introduced an in vitro cleansing evaluation method using fluorescent material and in vivo imaging system (IVIS) for objective and quantitative cleansing ability evaluation. The excellent cleansing ability of lamellar liquid crystal cleansing formulation has been confirmed by newly developed evaluation method. On the other hand, when lamellar liquid crystal make-up cleansing formulation was placed between orthogonally arranged two polarizing plates, a specific pattern like a hologram can be observed. This phenomenon is presumably interpreted as the interference between the visible light passing through the liquid crystal formulation and the lamellar structure. The lamellar structure of cleansing formulation was confirmed by SAXS analysis, exhibiting Bragg spacing ratio of 1 : 2. The lamellar liquid crystal make-up cleansing formulation prepared in this study would be useful for future application in make-up cleansing due to its excellent stability, cleansing ability, and unique hologram-like pattern placed between two polarizing plates.

An Exploratory Study on the Media Experience of Village Community Media Producers Focusing on the Production, Tasks and Policy Implications of Community Media in Jeju (마을공동체미디어 생산자의 미디어 경험에 관한 탐색적 연구 제주지역 공동체미디어의 생산과 과제, 정책적 함의를 중심으로)

  • Jung, Yong Bok
    • Korean journal of communication and information
    • /
    • v.81
    • /
    • pp.153-186
    • /
    • 2017
  • The purpose of this study was to identify the characteristics of village community media in Jeju by looking at the value that it's participants have experienced in the production process. Therefore, this study focused on the creation and production process of village community media, the specific value reflected in this process as well as how to activate and operate it sustainably through in-depth interviews with 12 media participants in Jeju community. As a result of the analysis, firstly, we were able to see that the migrants who are not the indigenous became the center of village community media creation in Jeju and they felt very personal 'fun', 'enthusiasm' and 'satisfaction'. It was also completely open to access and participate in village community media and its contents were filled with stories of everyday life of village residents and hidden stories of old people in the village that were not recorded. The characteristic of the production process of village community media was the horizontal communication and it reflected well the opinions of individual media participants even if it had a joint meeting. Second, as a result of examining the values applied to the production process by village community media participants, they regarded the connection of communication by voluntary participation and restoration of communities through activation of communication in functionalism as an important value. Finally, as a result of examining the challenges and development plans for sustainable management of community media in Jeju, it was required the active participation of village residents, ensuring space for village community media, providing insufficient broadcasting equipment, and the budget support from local governments, etc. It was once again confirmed that the provision of a support system for the stable activities of local governments is an urgent task for sustainable village community media.

  • PDF

Investigation into influence of sound absorption block on interior noise of high speed train in tunnel (터널 내부 도상 블록형 흡음재의 고속철도차량 내부 소음에 미치는 영향에 대한 고찰)

  • Lee, Sang-heon;Cheong, Cheolung;Lee, Song-June;Kim, Jae-Hwan;Son, Dong-Gi;Sim, Gyu-Cheol
    • The Journal of the Acoustical Society of Korea
    • /
    • v.37 no.4
    • /
    • pp.223-231
    • /
    • 2018
  • Recently, due to various environmental problems, blast tracks in tunnel are replaced with concrete tracks, but they have more adverse effects on noise than blast tracks so that additional noise measures are needed. Among these measures, sound-absorbing blocks start to be used due to its easy and quick installation. However, the performance of sound absorption blocks need to be verified under real environmental and operational conditions. In this paper, interior noise levels in KTX train cruising in Dalseong tunnel are measured before and after the installation of sound-absorbing blocks and the measured data are analyzed and compared. Additionally, noise reduction are estimated by modeling the high speed train, the tunnel and absorption blocks. Measurement devices and methods are used according to ISO 3381 and the equivalent sound pressure levels during the cruising time inside the tunnel are computed. In addition to overall SPLs(Sound Pressure Levels), 1/3-octave-band levels are also analyzed to account for the frequency characteristics of sound absorption and equipment noise in a cabin. In addition, to consider the effects of train cruising speeds and environmental conditions on the measurements, the measured data are corrected by using those measured during the train-passing through the tunnels located before and behind the Dalseong tunnel. Analysis of measured results showed that the maximum noise reduction of 6.8 dB (A) can be achieved for the local region where the sound-absorbing blocks are installed. Finally, through the comparison of predicted 1/3-octave band SPLs for the KTX interior noise with the measurements, the understanding of noise reduction mechanism due to sound-absorbing blocks is enhanced.

A standardized procedure on building spectral library for hazardous chemicals mixed in river flow using hyperspectral image (초분광 영상을 활용한 하천수 혼합 유해화학물질 표준 분광라이브러리 구축 방안)

  • Gwon, Yeonghwa;Kim, Dongsu;You, Hojun
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.10
    • /
    • pp.845-859
    • /
    • 2020
  • Climate change and recent heat waves have drawn public attention toward other environmental issues, such as water pollution in the form of algal blooms, chemical leaks, and oil spills. Water pollution by the leakage of chemicals may severely affect human health as well as contaminate the air, water, and soil and cause discoloration or death of crops that come in contact with these chemicals. Chemicals that may spill into water streams are often colorless and water-soluble, which makes it difficult to determine whether the water is polluted using the naked eye. When a chemical spill occurs, it is usually detected through a simple contact detection device by installing sensors at locations where leakage is likely to occur. The drawback with the approach using contact detection sensors is that it relies heavily on the skill of field workers. Moreover, these sensors are installed at a limited number of locations, so spill detection is not possible in areas where they are not installed. Recently hyperspectral images have been used to identify land cover and vegetation and to determine water quality by analyzing the inherent spectral characteristics of these materials. While hyperspectral sensors can potentially be used to detect chemical substances, there is currently a lack of research on the detection of chemicals in water streams using hyperspectral sensors. Therefore, this study utilized remote sensing techniques and the latest sensor technology to overcome the limitations of contact detection technology in detecting the leakage of hazardous chemical into aquatic systems. In this study, we aimed to determine whether 18 types of hazardous chemicals could be individually classified using hyperspectral image. To this end, we obtained hyperspectral images of each chemical to establish a spectral library. We expect that future studies will expand the spectral library database for hazardous chemicals and that verification of its application in water streams will be conducted so that it can be applied to real-time monitoring to facilitate rapid detection and response when a chemical spill has occurred.

Modified QuEChERS Multi-Residue Analysis Method for 61 pesticides in Fruits using with HPLC and GC-ECD/NPD (HPLC 및 GC-ECD/NPD를 이용한 과일 중 61종 농약의 QuEChERS 전처리 다성분 분석법 개발)

  • Lee, Ju-Young;Hong, Su-Myeong;Kim, Taek-Kyum;Min, Zaw Win;Kim, Yang-Hyeon;Song, Kyung-Ae;Kwon, Hye-Yong;Lee, Hee-Dong;Im, Geon-Jae;Kim, Doo-Ho;Kim, Jang-Eok
    • The Korean Journal of Pesticide Science
    • /
    • v.16 no.3
    • /
    • pp.242-256
    • /
    • 2012
  • QuEChERS (Quick, Easy, Cheap, Effective, Rugged and Safe) method has been a lot of research for pesticide analysis, because it is very simple and fast. However, this method requires high sensitivity instrument such as LC-MS/MS because of the use of small sample volume and many impurities compared to the conventional method. So, QuEChERS method needs to be modified for using with HPLC and GC-ECD/NPD. The aim of this work was to study the application of the QuEChERS method as well as its modification for the extraction and preconcentration of 5 groups of 61 pesticides from 4 fruits prior to their determination by HPLC-PDA, GC-ECD/NPD, and LC-MS/MS. The method was validated using spiking levels at 0.1 mg/kg (or 0.01 mg/kg) in apple, grapes, pear and persimmon. The average recovery by QuEChERS AOAC Official 2007. 01 version using the LC-MS/MS varied from 71.1127.4% for 61 pesticides. The average recovery rates using modified QuEChERS varied from 70.9~126% for 61 pesticides by HPLC-PDA and GC-ECD/NPD. The results satisfied the criteria of multiple pesticide residue analysis, setting 70~130% for recovery rates and below 30% for CV.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF