• Title/Summary/Keyword: Reader's Response

Search Result 38, Processing Time 0.025 seconds

Variation of reliability-based seismic analysis of an electrical cabinet in different NPP location for Korean Peninsula

  • Nahar, Tahmina Tasnim;Rahman, Md Motiur;Kim, Dookie
    • Nuclear Engineering and Technology
    • /
    • v.54 no.3
    • /
    • pp.926-939
    • /
    • 2022
  • The area of this study will cover the location-wise seismic response variation of an electrical cabinet in nuclear power point (NPP) based on classical reliability analysis. The location-based seismic ground motion (GM) selection is carried out with the help of probabilistic seismic hazard analysis using PSHRisktool, where the variation of reliability analysis can be understood from the relation between the reliability index and intensity measure. Two different approaches such as the first-order second moment method (FOSM) and Monte Carlo Simulation (MCS) are helped to evaluate and compare the reliability assessment of the cabinet. The cabinet is modeled with material uncertainty utilizing Steel01 as the material model and the fiber section modeling approach is considered to characterize the section's nonlinear reaction behavior. To verify the modal frequency, this study compares the FEM result with recorded data using Least-Squares Complex Exponential (LSCE) method from the impact hammer test. In spite of a few investigations, the main novelty of this study is to introduce the reader to check and compare the seismic reliability assessment variation in different seismic locations and for different earthquake levels. Alongside, the betterment can be found by comparing the result between two considered reliability estimation methods.

Development of Gate Type RFID System Using UHF Band for Food and Agricultural Products Logistics (농식품 물류관리를 위한 UHF 대역의 게이트형 RFID 시스템 개발)

  • Kim, J.H.;Jeong, J.W.;Kwen, K.H.;Kang, J.S.
    • Journal of Biosystems Engineering
    • /
    • v.33 no.3
    • /
    • pp.204-209
    • /
    • 2008
  • The power strength of electric wave of reader looked radiation forms from the gate type RFID system. The more distant from antennas, the weaker of power strength of electric wave. The power strength of electric wave with 3 antennas showed stronger than its with 2 antennas. With 2 antennas, the coefficient of correlation between the power strength of electric wave and response ability of tag was 0.665 (p=0.009), and it showed results at significance level. With 3 antennas, the coefficient of correlation was 0.711 (p=0.004), correlationship between the power strength of electric wave and the response ability of tag showed at significance high level. From the analysis result about tag reading performance on the gate type RFID system, the reading rate was good when tags were attached on a acrylic plate which were located in front of 3 or 4 antennas. As tags were getting away from antennas, the reading rate was decreased. The nearer from antennas, the higher the reading rate at the center. When tags were turned at right angles with antennas, the longer distant from antennas, the lower reading rates at the center, right and left locations. When the number of antennas and distance are constant, respectively, the significant difference of the tag reading rates according to the locations of left, right and center were not found.

The Effective Policy for the Establishment of Disaster Management System in Korea (우리나라의 효과적(效果的)인 재난관리체제(災難管理體制) 구책방안(構策方案)에 관한 연구(硏究))

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.83-116
    • /
    • 2000
  • Many concerns have been raised for importance of disaster management after 1990's numerous urban disasters in Korea. When the primary function of government is to protect lives and property of citizens, disaster management should be included in the mainstream of public administration and many hazard countermeasures should be carried out for that purpose. The principal purpose of this research is to establish ways and means needed to improve the disaster management system in Korea. This paper is split into five chapters. Chapter I is the introduction part. Chapter II introduces the reader to a disaster management theory, and deals with various disaster management systems of foreign countries such as the U.S.A. and Japan, Chapter III describes and characterizes the Korea's current disaster management system. The Korean disaster management system has been reestablished through the enactment of the Disaster Management Act of 1995 and the full revision of Natural Hazards Management Act of 1995 after series of catastrophic man-made disasters since 1993. Chapter IV is devoted to the establishment of an effective disaster management system in Korea. In this chapter, I discusses measures needed to improve the quality of CDMB(Central Disaster Management Bureau)'s service to the people. I strongly reemphasize the effectiveness of a comprehensive risk-based, all-hazard national emergency management system that addresses preparedness, mitigation, response, and recovery. To that end the Administration should develop legislation, new policies, and organizational plans to invigorate the agency with a refocussed mission. Chapter V is a conclusion. As the demand for citizens'welfare has been continuously increased in the localization, the importance of disaster management is emerging subject in the public sector. The disaster management carries out complicated affairs and manages diverse objects, the cooperation/connection system of the central-local government and citizens, and non-governmental organization should be established.

  • PDF

Adult Readers' Responses to Picturebooks Portraying Play (놀이를 소재로 한 그림책에 대한 성인 독자의 반응)

  • Hyun, Eunja;Lee, Jiun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.603-614
    • /
    • 2021
  • The purpose of this study is to explore whether reading picturebooks portraying children's play assists adult readers to recall their childhood play memories according to the narrative model of human development. In this study, adult readers recalled their play memories before and after reading a picturebook depicting children's play. Adult readers' responses to the picturebooks were also collected. The types of play from their memories were categorized and the responses were qualitatively analyzed through open coding. The results indicated that first, before reading picturebooks portraying children's play, the type of play that adult readers mostly recalled was games with rules which happened outdoor. Second, after reading a picturebook, adult readers recalled new play memories which contained more detailed elements of narratives. Third, most adult readers responded to picturebooks either emotionally or aesthetically. This study suggests the perspective on picturebooks as a literature and art genre for readers from birth to death. In addition, as an evocative object, a picturebooks could assist adult readers to recall and rediscover their childhood.

Preservice Teachers' Responses to Postmodern Picture Books and Deconstructive Reading

  • Yun, Eunja
    • Journal of English Language & Literature
    • /
    • v.57 no.6
    • /
    • pp.1111-1130
    • /
    • 2011
  • Reading postmodern texts certainly situates readers in roles different from the ones we have been used to. Recently, postmodern metafiction forms a significant body of children's literature that is intended to challenge and transform the conventions of books in the digital age. While many studies have been done as to how child readers have capabilities to appreciate and interpret postmodern metafiction picture books, few studies on teachers and preservice teachers' reactions are not readily available. The role of teachers and preservice teachers are crucial for child readers to have access to affluent reading resources. This study discusses how preservice teachers read and respond to postmodern metafiction picture books using a deconstructive approach by means of binary opposites. Data was collected with 14 preservice teachers as to their likes/dislikes, reading levels, and reading paths about postmodern metafiction picture books. Expected pedagogical implications for literacy and language education were requested to address in their reading diaries and response papers. With their likes/ dislikes, since binary opposites always imply the hierarchy of power and value, the likes is apparently more valued and appreciated over their dislikes. This differentiated values are discussed in more detail with three recurring themes-Education, Morals and Behavior, and Tradition. With reading levels, there seems to be a gap existing between the authors' implied reader and literary critics' and the preservice teachers' ideal readers for the postmodern metafiction picture books. Although many studies have already revealed young readers' capability of appreciating postmodern metafiction, it depends a lot more on the teachers and preservice teachers whether children's right to have access to affluent literacy resources is respected or not. Preservice teachers' awareness of the potential of postmodern metafiction will work as an initial step to bring and realize the new reading path and new literacies in classrooms. By challenging metanarratives of children's literature, preservice teachers' readings of postmodern picture books reveals potentials to raise different reading paths and develop new literacies and other educational implications.

A study on a the poetic symbol and moral instruction (시적 상징과 도덕과수업)

  • Song, Young-min
    • The Journal of Korean Philosophical History
    • /
    • no.35
    • /
    • pp.415-443
    • /
    • 2012
  • The moral instruction expresses and conveys a abstract objects so called moral. And it pursues occurrence of moral meaning contained a emotion. In these respects, there is a resemblance between moral instruction and artistic symbolic language. Meanwhile, the poetry are a typical form of artistic symbolic language, and especially poetic symbolism is a representative and possible way that expresses accepting a meaning of abstract objects. Then a moral instruction needs to be poetic symbolism. The poetic symbolism that a moral instruction intends to resemble is a linguistic expression, but at the same time that is a expression beyond a linguistic limitation for conveying the metaphysical meaning. For this, the poetic symbolism reveals visible and concrete vehicles that imply invisible and metaphysical tenor. At this point, poetic symbolism is characterized with sameness, implicitness, polysemy, context, allness. The poetic symbolism having these characters appears personal symbol of poet as combined with creative imagination, and is experienced poetic meaning as combined with creative imagination of reader. The moral instruction as a poetic symbolism offers learning experience similar to poetic experience. The moral instruction as a poetic symbolism would be constructed not a logical or prosaic explain but symbolic form that can draw various moral meaning. For this construction, first, we might find a symbolic media for materialization of teaching contents. Second, moral teaching should be constructed to be searching moral meaning of symbolic media. Third, moral teaching should be constructed to be interpreting moral meaning of symbolic media. When teacher can construct moral instruction as possible as similar to poetic symbolism, student can learn moral meaning combined with emotion through their response and interpretation to the teaching. It is very similar to good poem that is sympathized and accommodated poet's theme by reader.

Enterocarpam-III Induces Human Liver and Breast Cancer Cell Apoptosis via Mitochondrial and Caspase-9 Activation

  • Banjerdpongchai, Ratana;Wudtiwai, Benjawan;Pompimon, Wilart
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.5
    • /
    • pp.1833-1837
    • /
    • 2015
  • An aristolactam-type alkaloid, isolated from Orophea enterocarpa, is enterocarpam-III (10-amino-2,3,4,6-tetramethoxyphenanthrene-1-carboxylic acid lactam). It is cytotoxic to various human and murine cancer cell lines; however, the molecular mechanisms remain unclear. The aims of this study were to investigate cytotoxic effects on and mechanism (s) of human cancer cell death in human hepatocellular carcinoma HepG2 and human invasive breast cancer MDA-MB-231 cells compared to normal murine fibroblast NIH3T3 cells. Cell viability was determined by MTT assay to determine $IC_{10}$, $IC_{20}$ and $IC_{50}$ levels, reactive oxygen species (ROS) production with 2',7'-dichlorohydrofluorescein diacetate and the caspase-3, -8 and -9 activities using specific chromogenic (p-nitroaniline) tetrapeptide substrates, viz., DEVD-NA, IETD-NA and LEHD-NA and employing a microplate reader. Mitochondrial transmembrane potential (MTP) was measured by staining with 3, 3'-dihexyloxacarbocyanine iodide ($DiOC_6$) and using flow cytometry. The compound was cytotoxic to HepG2 and MDA-MB-231 cells with the $IC_{50}$ levels of $26.0{\pm}4.45$ and $51.3{\pm}2.05{\mu}M$, respectively. For murine normal fibroblast NIH3T3 cells, the $IC_{50}$ concentration was $81.3{\pm}10.1{\mu}M$. ROS production was reduced in a dose-response manner in HepG2 cells. The caspase-9 and -3 activities increased in a concentration-dependent manner, whereas caspase-8 activity did not alter, indicating the intrinsic pathway activation. Enterocarpam-III decreased the mitochondrial transmembrane potential (MTP) dose-dependently in HepG2 cells, suggesting that the compound induced HepG2 cell apoptosis via the mitochondrial pathway. In conclusion, enterocarpam-III inhibited HepG2 and MDA-MB-231 cell proliferation and induced human HepG2 cells to undergo apoptosis via the intrinsic (mitochondrial) pathway and induction of caspase-9 activity.

Glutathione is the Major Defensive Mechanism against Oxidative Stress in Human Embryonic Stem Cell

  • 이건섭;이영재;김은영;박세필;임진호
    • Proceedings of the KSAR Conference
    • /
    • 2003.06a
    • /
    • pp.78-78
    • /
    • 2003
  • Embryonic stem (ES) cells, derived from preimplantation embryo, are able to differentiate into various types of cells consisting the whole body, or pluripotency. In contrast, terminally differentiated cells do not usually alter their nature but frequently die or transform if they are exposed to inappropriate external stimulations. In addition to the plasticity, ES cells are expected to be different from terminally differentiated cells in very many ways, such as patterns of gene expressions, ability and response of the cells in confronting environmental stimulations, metabolism, and growth rate. As a model system to differentiate these two types of cells, human ES cells (MB03) and terminally differentiated cells (HeLa), we examined the ability of these two types of cells in confronting a severe oxidative insult, that is $H_2O$$_2$. Approximately 1$\times$10$^4$ cells were plated in 96 well plate and serum starved for overnight. The conditioned cells were exposed to a various concentration of $H_2O$$_2$ fur 24 hrs and loaded with neutral red (50$\mu\textrm{g}$/ml) for 4 hrs, washed with PBS for 2 min three times, and entrapped dye was dissolved out using acetic ethanol. Cytotoxicity was determined by reading the amount of dye in the medium using microplate reader. equipped with 575 nm filter. Relative amount of the dye entrapped within MB03 or HeLa were not significantly different when cells were exposed up to 0.4 mM $H_2O$$_2$. However, this sharply decreased down to 0.12% in HeLa cells when the cells were exposed to 0.8 mM $H_2O$$_2$, while it was approximately 54% in MB03 suggesting that this concentration of $H_2O$$_2$ is the defensive threshold for HeLa cells. The resistance to oxidative stimulation reversed, however, when cells were co-treated with BSO (L-buthionine- 〔S, R〕-sulfoximine) which chelates intracellular GSH. This result suggests that cellular GSH is the major defensive mechanism of human ES cells. Induction of enzymes involved in GSH metabolism and type of cell death is currently being studied.

  • PDF

EMQT : A Study on Enhanced M-ary Query Tree Algorithm for Sequential Tag IDs (연속적인 태그 ID들을 위한 M-ary 쿼리 트리 알고리즘의 향상에 관한 연구)

  • Yang, Dongmin;Shin, Jongmin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.435-445
    • /
    • 2013
  • One of the most challenging issues in radio frequency identification (RFID) and near field communications (NFC) is to correctly and quickly recognize a number of tag IDs in the reader's field. Unlike the probabilistic anti-collision schemes, a query tree based protocol guarantees to identify all the tags, where the distribution of tag IDs is assumed to be uniform. However, in real implements, the prefix of tag ID is uniquely assigned by the EPCglobal and the remaining part is sequentially given by a company or manufacturer. In this paper, we propose an enhanced M-ary query tree protocol (EMQT), which effectively reduces unnecessary query-response cycles between similar tag IDs using m-bit arbitration and tag expectation. The theoretical analysis and simulation results show that the EMQT significantly outperforms other schemes in terms of identification time, identification efficiency and communications overhead.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.