The area of this study will cover the location-wise seismic response variation of an electrical cabinet in nuclear power point (NPP) based on classical reliability analysis. The location-based seismic ground motion (GM) selection is carried out with the help of probabilistic seismic hazard analysis using PSHRisktool, where the variation of reliability analysis can be understood from the relation between the reliability index and intensity measure. Two different approaches such as the first-order second moment method (FOSM) and Monte Carlo Simulation (MCS) are helped to evaluate and compare the reliability assessment of the cabinet. The cabinet is modeled with material uncertainty utilizing Steel01 as the material model and the fiber section modeling approach is considered to characterize the section's nonlinear reaction behavior. To verify the modal frequency, this study compares the FEM result with recorded data using Least-Squares Complex Exponential (LSCE) method from the impact hammer test. In spite of a few investigations, the main novelty of this study is to introduce the reader to check and compare the seismic reliability assessment variation in different seismic locations and for different earthquake levels. Alongside, the betterment can be found by comparing the result between two considered reliability estimation methods.
The power strength of electric wave of reader looked radiation forms from the gate type RFID system. The more distant from antennas, the weaker of power strength of electric wave. The power strength of electric wave with 3 antennas showed stronger than its with 2 antennas. With 2 antennas, the coefficient of correlation between the power strength of electric wave and response ability of tag was 0.665 (p=0.009), and it showed results at significance level. With 3 antennas, the coefficient of correlation was 0.711 (p=0.004), correlationship between the power strength of electric wave and the response ability of tag showed at significance high level. From the analysis result about tag reading performance on the gate type RFID system, the reading rate was good when tags were attached on a acrylic plate which were located in front of 3 or 4 antennas. As tags were getting away from antennas, the reading rate was decreased. The nearer from antennas, the higher the reading rate at the center. When tags were turned at right angles with antennas, the longer distant from antennas, the lower reading rates at the center, right and left locations. When the number of antennas and distance are constant, respectively, the significant difference of the tag reading rates according to the locations of left, right and center were not found.
Many concerns have been raised for importance of disaster management after 1990's numerous urban disasters in Korea. When the primary function of government is to protect lives and property of citizens, disaster management should be included in the mainstream of public administration and many hazard countermeasures should be carried out for that purpose. The principal purpose of this research is to establish ways and means needed to improve the disaster management system in Korea. This paper is split into five chapters. Chapter I is the introduction part. Chapter II introduces the reader to a disaster management theory, and deals with various disaster management systems of foreign countries such as the U.S.A. and Japan, Chapter III describes and characterizes the Korea's current disaster management system. The Korean disaster management system has been reestablished through the enactment of the Disaster Management Act of 1995 and the full revision of Natural Hazards Management Act of 1995 after series of catastrophic man-made disasters since 1993. Chapter IV is devoted to the establishment of an effective disaster management system in Korea. In this chapter, I discusses measures needed to improve the quality of CDMB(Central Disaster Management Bureau)'s service to the people. I strongly reemphasize the effectiveness of a comprehensive risk-based, all-hazard national emergency management system that addresses preparedness, mitigation, response, and recovery. To that end the Administration should develop legislation, new policies, and organizational plans to invigorate the agency with a refocussed mission. Chapter V is a conclusion. As the demand for citizens'welfare has been continuously increased in the localization, the importance of disaster management is emerging subject in the public sector. The disaster management carries out complicated affairs and manages diverse objects, the cooperation/connection system of the central-local government and citizens, and non-governmental organization should be established.
The purpose of this study is to explore whether reading picturebooks portraying children's play assists adult readers to recall their childhood play memories according to the narrative model of human development. In this study, adult readers recalled their play memories before and after reading a picturebook depicting children's play. Adult readers' responses to the picturebooks were also collected. The types of play from their memories were categorized and the responses were qualitatively analyzed through open coding. The results indicated that first, before reading picturebooks portraying children's play, the type of play that adult readers mostly recalled was games with rules which happened outdoor. Second, after reading a picturebook, adult readers recalled new play memories which contained more detailed elements of narratives. Third, most adult readers responded to picturebooks either emotionally or aesthetically. This study suggests the perspective on picturebooks as a literature and art genre for readers from birth to death. In addition, as an evocative object, a picturebooks could assist adult readers to recall and rediscover their childhood.
Reading postmodern texts certainly situates readers in roles different from the ones we have been used to. Recently, postmodern metafiction forms a significant body of children's literature that is intended to challenge and transform the conventions of books in the digital age. While many studies have been done as to how child readers have capabilities to appreciate and interpret postmodern metafiction picture books, few studies on teachers and preservice teachers' reactions are not readily available. The role of teachers and preservice teachers are crucial for child readers to have access to affluent reading resources. This study discusses how preservice teachers read and respond to postmodern metafiction picture books using a deconstructive approach by means of binary opposites. Data was collected with 14 preservice teachers as to their likes/dislikes, reading levels, and reading paths about postmodern metafiction picture books. Expected pedagogical implications for literacy and language education were requested to address in their reading diaries and response papers. With their likes/ dislikes, since binary opposites always imply the hierarchy of power and value, the likes is apparently more valued and appreciated over their dislikes. This differentiated values are discussed in more detail with three recurring themes-Education, Morals and Behavior, and Tradition. With reading levels, there seems to be a gap existing between the authors' implied reader and literary critics' and the preservice teachers' ideal readers for the postmodern metafiction picture books. Although many studies have already revealed young readers' capability of appreciating postmodern metafiction, it depends a lot more on the teachers and preservice teachers whether children's right to have access to affluent literacy resources is respected or not. Preservice teachers' awareness of the potential of postmodern metafiction will work as an initial step to bring and realize the new reading path and new literacies in classrooms. By challenging metanarratives of children's literature, preservice teachers' readings of postmodern picture books reveals potentials to raise different reading paths and develop new literacies and other educational implications.
The moral instruction expresses and conveys a abstract objects so called moral. And it pursues occurrence of moral meaning contained a emotion. In these respects, there is a resemblance between moral instruction and artistic symbolic language. Meanwhile, the poetry are a typical form of artistic symbolic language, and especially poetic symbolism is a representative and possible way that expresses accepting a meaning of abstract objects. Then a moral instruction needs to be poetic symbolism. The poetic symbolism that a moral instruction intends to resemble is a linguistic expression, but at the same time that is a expression beyond a linguistic limitation for conveying the metaphysical meaning. For this, the poetic symbolism reveals visible and concrete vehicles that imply invisible and metaphysical tenor. At this point, poetic symbolism is characterized with sameness, implicitness, polysemy, context, allness. The poetic symbolism having these characters appears personal symbol of poet as combined with creative imagination, and is experienced poetic meaning as combined with creative imagination of reader. The moral instruction as a poetic symbolism offers learning experience similar to poetic experience. The moral instruction as a poetic symbolism would be constructed not a logical or prosaic explain but symbolic form that can draw various moral meaning. For this construction, first, we might find a symbolic media for materialization of teaching contents. Second, moral teaching should be constructed to be searching moral meaning of symbolic media. Third, moral teaching should be constructed to be interpreting moral meaning of symbolic media. When teacher can construct moral instruction as possible as similar to poetic symbolism, student can learn moral meaning combined with emotion through their response and interpretation to the teaching. It is very similar to good poem that is sympathized and accommodated poet's theme by reader.
An aristolactam-type alkaloid, isolated from Orophea enterocarpa, is enterocarpam-III (10-amino-2,3,4,6-tetramethoxyphenanthrene-1-carboxylic acid lactam). It is cytotoxic to various human and murine cancer cell lines; however, the molecular mechanisms remain unclear. The aims of this study were to investigate cytotoxic effects on and mechanism (s) of human cancer cell death in human hepatocellular carcinoma HepG2 and human invasive breast cancer MDA-MB-231 cells compared to normal murine fibroblast NIH3T3 cells. Cell viability was determined by MTT assay to determine $IC_{10}$, $IC_{20}$ and $IC_{50}$ levels, reactive oxygen species (ROS) production with 2',7'-dichlorohydrofluorescein diacetate and the caspase-3, -8 and -9 activities using specific chromogenic (p-nitroaniline) tetrapeptide substrates, viz., DEVD-NA, IETD-NA and LEHD-NA and employing a microplate reader. Mitochondrial transmembrane potential (MTP) was measured by staining with 3, 3'-dihexyloxacarbocyanine iodide ($DiOC_6$) and using flow cytometry. The compound was cytotoxic to HepG2 and MDA-MB-231 cells with the $IC_{50}$ levels of $26.0{\pm}4.45$ and $51.3{\pm}2.05{\mu}M$, respectively. For murine normal fibroblast NIH3T3 cells, the $IC_{50}$ concentration was $81.3{\pm}10.1{\mu}M$. ROS production was reduced in a dose-response manner in HepG2 cells. The caspase-9 and -3 activities increased in a concentration-dependent manner, whereas caspase-8 activity did not alter, indicating the intrinsic pathway activation. Enterocarpam-III decreased the mitochondrial transmembrane potential (MTP) dose-dependently in HepG2 cells, suggesting that the compound induced HepG2 cell apoptosis via the mitochondrial pathway. In conclusion, enterocarpam-III inhibited HepG2 and MDA-MB-231 cell proliferation and induced human HepG2 cells to undergo apoptosis via the intrinsic (mitochondrial) pathway and induction of caspase-9 activity.
Embryonic stem (ES) cells, derived from preimplantation embryo, are able to differentiate into various types of cells consisting the whole body, or pluripotency. In contrast, terminally differentiated cells do not usually alter their nature but frequently die or transform if they are exposed to inappropriate external stimulations. In addition to the plasticity, ES cells are expected to be different from terminally differentiated cells in very many ways, such as patterns of gene expressions, ability and response of the cells in confronting environmental stimulations, metabolism, and growth rate. As a model system to differentiate these two types of cells, human ES cells (MB03) and terminally differentiated cells (HeLa), we examined the ability of these two types of cells in confronting a severe oxidative insult, that is $H_2O$$_2$. Approximately 1$\times$10$^4$ cells were plated in 96 well plate and serum starved for overnight. The conditioned cells were exposed to a various concentration of $H_2O$$_2$ fur 24 hrs and loaded with neutral red (50$\mu\textrm{g}$/ml) for 4 hrs, washed with PBS for 2 min three times, and entrapped dye was dissolved out using acetic ethanol. Cytotoxicity was determined by reading the amount of dye in the medium using microplate reader. equipped with 575 nm filter. Relative amount of the dye entrapped within MB03 or HeLa were not significantly different when cells were exposed up to 0.4 mM $H_2O$$_2$. However, this sharply decreased down to 0.12% in HeLa cells when the cells were exposed to 0.8 mM $H_2O$$_2$, while it was approximately 54% in MB03 suggesting that this concentration of $H_2O$$_2$ is the defensive threshold for HeLa cells. The resistance to oxidative stimulation reversed, however, when cells were co-treated with BSO (L-buthionine- 〔S, R〕-sulfoximine) which chelates intracellular GSH. This result suggests that cellular GSH is the major defensive mechanism of human ES cells. Induction of enzymes involved in GSH metabolism and type of cell death is currently being studied.
The Journal of Korean Institute of Communications and Information Sciences
/
v.38B
no.6
/
pp.435-445
/
2013
One of the most challenging issues in radio frequency identification (RFID) and near field communications (NFC) is to correctly and quickly recognize a number of tag IDs in the reader's field. Unlike the probabilistic anti-collision schemes, a query tree based protocol guarantees to identify all the tags, where the distribution of tag IDs is assumed to be uniform. However, in real implements, the prefix of tag ID is uniquely assigned by the EPCglobal and the remaining part is sequentially given by a company or manufacturer. In this paper, we propose an enhanced M-ary query tree protocol (EMQT), which effectively reduces unnecessary query-response cycles between similar tag IDs using m-bit arbitration and tag expectation. The theoretical analysis and simulation results show that the EMQT significantly outperforms other schemes in terms of identification time, identification efficiency and communications overhead.
Journal of the Korea Institute of Information Security & Cryptology
/
v.20
no.4
/
pp.117-134
/
2010
A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.