• 제목/요약/키워드: State Library

검색결과 488건 처리시간 0.025초

다양한 미속촬영 영상의 배경처리 기법 (Background Treatment Technique of Various Time-Lapse Images)

  • 김종성;김종찬;서영상;송승헌;김응곤
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2008년도 춘계 종합학술대회 논문집
    • /
    • pp.639-643
    • /
    • 2008
  • 시간의 흐름에 따른 계절의 변화, 꽃의 개화 등은 장시간에 걸쳐 이루어지므로 시간을 압축하여 빠르게 볼 수 있도록 미속촬영을 한다. 이러한 미속촬영을 이용하여 장소, 화각, 시간 등 다양한 조건을 동일한 상태에서 정확한 시간 간격을 통해 촬영하는 기법을 인터벌 촬영이라 한다. 미속촬영 기법은 교육, 과학, 다큐, 미디어 매체 등 다양한 분야에서 널리 사용한다. 본 논문에서는 미속촬영 영상을 취득함에 있어 기존과 다르게 꽃과 같은 주 피사체를 제외한 불필요한 배경을 삭제와 조정을 통해 영상처리가 가능하도록 하여 실사촬영 영상을 2D 및 3D상에서 필요한 라이브러리 또는 영상데이터로 폭 넓게 응용이 가능하도록 하여 누구나 쉽고 간편하게 영상제작에 창조성을 부여 할 수 있도록 하는 미속촬영 영상의 배경처리 기법을 제안한다.

  • PDF

관인관리 실태와 발전방안 연구 (Study on Management Condition and Development Plan for an Official Seal)

  • 이봉민;이성숙
    • 정보관리연구
    • /
    • 제40권3호
    • /
    • pp.151-176
    • /
    • 2009
  • 본 연구의 목적은 행정박물 중 기록물의 효력과 진본성을 보장해 주는 관인과 그 연계기록물인 관인대장의 관리 실태를 조사 분석하고, 보다 효율적으로 관리하기 위한 방안을 제시하는 것이다. 이를 위해 중앙행정기관을 대상으로 정보공개 청구, 설문조사, 담당자 면담을 실시하고, 국가기록원을 대상으로 담당자 면담, 관인목록 분석 등을 실시하여 관리 실태를 분석하였다. 그리고 그 결과를 바탕으로 정기적 실태점검 및 교육, 관인의 선별이관, 생산현황 통보, 법령정비, 서식개정, 전자관인시스템 구축 등의 방안을 제시하였다. 본 연구를 통해 관인관리의 중요성을 재인식하고, 제안된 관리방안을 활용하여 관인관리 전반을 체계적으로 개선하는 데 도움이 되기를 기대한다.

DEVELOPMENT OF A SIMPLIFIED MODEL FOR ANALYZING THE PERFORMANCE OF KALIMER-600 COUPLED WITH A SUPERCRITICAL CARBON DIOXIDE BRAYTON ENERGY CONVERSION CYCLE

  • Seong, Seung-Hwan;Lee, Tae-Ho;Kim, Seong-O
    • Nuclear Engineering and Technology
    • /
    • 제41권6호
    • /
    • pp.785-796
    • /
    • 2009
  • A KALIMER-600 concept which is a type of sodium-cooled fast reactor, has been developed at KAERI. It uses sodium as a primary coolant and is a pool-type reactor to enhance safety. Also, a supercritical carbon dioxide ($CO_2$) Brayton cycle is considered as an alternative to an energy conversion system to eliminate the sodium water reaction and to improve efficiency. In this study, a simplified model for analyzing the thermodynamic performance of the KALIMER-600 coupled with a supercritical $CO_2$ Brayton cycle was developed. To develop the analysis model, a commercial modular modeling system (MMS) was adopted as a base engine, which was developed by nHance Technology in USA. It has a convenient graphical user interface and many component modules to model the plant. A new user library for thermodynamic properties of sodium and supercritical $CO_2$ was developed and attached to the MMS. In addition, some component modules in the MMS were modified to be appropriate for analysis of the KALIMER-600 coupled with the supercritical $CO_2$ cycle. Then, a simplified performance analysis code was developed by modeling the KALIMER-600 plant with the modified MMS. After evaluating the developed code with each component data and a steady state of the plant, a simple power reduction and recovery event was evaluated. The results showed an achievable capability for a performance analysis code. The developed code will be used to develop the operational strategy and some control logics for the operation of the KALIMER-600 with a supercritical $CO_2$ Brayton cycle after further studies of analyzing various operational events.

전자인식 시스템에서 택 ID의 원거리 전송 시스템 (Long Distance Transmission System of Tag's ID in RFID System)

  • 김동훈;조형국
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 춘계학술대회
    • /
    • pp.63-67
    • /
    • 2009
  • 전자인식 시스템에서 택의 고유정보는 호스트 컴퓨터 내의 응용 프로그램에 의해 처리된다. 응용 프로그램의 예는 주차관리 프로그램, 도서관리 프로그램 등이 있다. 리더에서 인식된 Tag의 ID는 호스트 컴퓨터로 입력된다. 컴퓨터의 응용 프로그램은 컴퓨터의 DB 내에 Tag ID 같은 데이터를 찾는다. 같은 ID를 찾은 후, 응용 프로그램의 운영 목적에 따라 호스트 컴퓨터는 제어 명령을 해당 H/W에 전달한다. 이러한 과정은 호스트 컴퓨터에 있는 프로그램의 진행이 된다. 그러나 수행과정이 정상적으로 동작이 되는지를 원거리에서 확인할 필요가 있다. 원거리에서 진행과정을 감시할 때에는 2가지의 매체를 사용한다. 일반적으로 유선감시 시스템과 무선 감시 스템이다. 유선방법 중에 유용한 것은 인터넷 통신망이다. 무선을 이용하는 것은 블루투스 통신망이다. 이 두 매개체는 간단히 그리고 에러없이 수행과정을 모니터를 할 수 있다. 본 논문에서는 우선 RFID 시스템을 제작한다. 125KHz를 반송파로 하고 있는 EM4095 칩을 사용하여 RFID 시스템을 구현한다. Tag의 고유 ID는 W3100A 칩을 사용한 모듈을 통하여 원격지에 보내어 진다. 이러한 시스템을 제작하고, 데이터 송수신을 간단한 응용 프로그램을 이용하여 확인하였다. 결과로는 수신율 확인하고, 전체 시스템 및 각 부분을 사진으로 보여 준다. 그리고 각 부분의 제어 프로그램을 설명하였다.

  • PDF

Pharmacological Treatment of Major Depressive Episodes with Mixed Features: A Systematic Review

  • Shim, In Hee;Bahk, Won-Myong;Woo, Young Sup;Yoon, Bo-Hyun
    • Clinical Psychopharmacology and Neuroscience
    • /
    • 제16권4호
    • /
    • pp.376-382
    • /
    • 2018
  • We reviewed clinical studies investigating the pharmacological treatment of major depressive episodes (MDEs) with mixed features diagnosed according to the dimensional criteria (more than two or three [hypo]manic symptoms+principle depressive symptoms). We systematically reviewed published randomized controlled trials on the pharmacological treatment of MDEs with mixed features associated with mood disorders, including major depressive disorder (MDD) and bipolar disorder (BD). We searched the PubMed, Cochrane Library, and ClinicalTrials.gov databases through December 2017 with the following key word combinations linked with the word OR: (a) mixed or mixed state, mixed features, DMX, mixed depression; (b) depressive, major depressive, MDE, MDD, bipolar, bipolar depression; and (c) antidepressant, antipsychotic, mood stabilizer, anticonvulsant, treatment, medication, algorithm, guideline, pharmacological. We followed the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines. We found few randomized trials on pharmacological treatments for MDEs with mixed features. Of the 36 articles assessed for eligibility, 11 investigated MDEs with mixed features in mood disorders: six assessed the efficacy of antipsychotic drugs (lurasidone and ziprasidone) in the acute phase of MDD with mixed features, although four of these were post hoc analyses based on large randomized controlled trials. Four studies compared antipsychotic drugs (olanzapine, lurasidone, and ziprasidone) with placebo, and one study assessed the efficacy of combination therapy (olanzapine+fluoxetine) in the acute phase of BD with mixed features. Pharmacological treatments for MDEs with mixed features have focused on antipsychotics, although evidence of their efficacy is lacking. Additional well-designed clinical trials are needed.

2세대 PT(Processor Trace)를 이용한 동적 코드분석 방법 연구 (A Study on Dynamic Code Analysis Method using 2nd Generation PT(Processor Trace))

  • 김현철
    • 융합보안논문지
    • /
    • 제19권1호
    • /
    • pp.97-101
    • /
    • 2019
  • 운영 체제의 코어에 Intel PT가 포함된 경우, 크래시 발생 시 디버거는 프로그램 상태를 검사할 수 있을 뿐만 아니라 크래시를 발생시킨 제어 플로우를 재구성할 수 있다. 또한, 커널 패닉 및 기타 시스템 정지와 같은 상황을 디버그하기 위해 실행 트레이스 범위를 전체 시스템으로 확장할 수도 있다. 2세대 PT인 WinIPT 라이브러리는 Windows 10 (버전 1809/Redstone 5)에서 제공하는 IOCTL 및 레지스트리 메커니즘을 통해 프로세스 별 및 코어 별 트레이스를 실행할 수 있는 추가 코드가 포함된 Intel PT 드라이버를 포함하고 있다. 즉 기존 1세대 PT에서 비정규화된 방식으로만 제한적인 접근이 가능했던 PT 트레이스 정보를 2세대 PT에서는 운영 체제에서 제공하는 IOCTL 및 레지스트리 메커니즘을 통해 프로세스 별 및 코어 별 트레이스를 실행할 수 있게 되었다. 본 논문에서는 1/2세대 PT를 이용하여 윈도우 환경에서 PT 데이터 패킷의 수집 저장 디코딩 및 악성코드 검출을 위한 방법을 비교 설명하였다.

Systematic Review of Acupuncture Treatment for Mild Cognitive Impairment

  • Kim, Min Wook;Yoo, Jae Hee;Go, Hong Je;Kim, Seon Woo;Jang, Seung Won;Jeong, Hyun Jin;Kim, Jae Hong
    • Journal of Acupuncture Research
    • /
    • 제36권2호
    • /
    • pp.72-79
    • /
    • 2019
  • Background: The aim of this study was to review clinical efficacy of acupuncture treatment of mild cognitive impairment. Methods: Randomized controlled trials that performed acupuncture treatment for mild cognitive impairment were retrieved from 6 online databases (PubMed, Cochrane Library, EMBASE, CNKI, NDSL, OASIS) on September $30^{th}$, 2018. Studies were selected according to inclusion and exclusion criteria, and were reviewed by Risk of Bias assessment. Results: In total, 21 studies were included in this review. All studies were Chinese (19 studies published in Chinese and 2 in English). The sample size, 50 to 100, and the number of treatment times, 20 to 30, were the largest range in all studies. The most treatments performed was 30. The longest treatment period was 56 days, which accounted for 33% of the studies. The most frequently used evaluation index was the Mini Mental State Examination followed by the Montreal Cognitive Assessment, each used 17 times and 15 times, respectively. The most frequently used acupoints were GV20, EX-HN1, GB20, and GV24, which accounted for 47% of total number of acupoints used. In 48% of the studies, needle retention time was 30 minutes. Western medicine treatment was the most common control group. Most studies reported that the intervention group was statistically significantly different to the control group. Conclusion: These results suggest that acupuncture for mild cognitive impairment was effective. However, it is difficult to confirm this conclusion because the quality of most of these studies were of low quality.

Undecanoic Acid, Lauric Acid, and N-Tridecanoic Acid Inhibit Escherichia coli Persistence and Biofilm Formation

  • Jin, Xing;Zhou, Jiacheng;Richey, Gabriella;Wang, Mengya;Choi Hong, Sung Min;Hong, Seok Hoon
    • Journal of Microbiology and Biotechnology
    • /
    • 제31권1호
    • /
    • pp.130-136
    • /
    • 2021
  • Persister cell formation and biofilms of pathogens are extensively involved in the development of chronic infectious diseases. Eradicating persister cells is challenging, owing to their tolerance to conventional antibiotics, which cannot kill cells in a metabolically dormant state. A high frequency of persisters in biofilms makes inactivating biofilm cells more difficult, because the biofilm matrix inhibits antibiotic penetration. Fatty acids may be promising candidates as antipersister or antibiofilm agents, because some fatty acids exhibit antimicrobial effects. We previously reported that fatty acid ethyl esters effectively inhibit Escherichia coli persister formation by regulating an antitoxin. In this study, we screened a fatty acid library consisting of 65 different fatty acid molecules for altered persister formation. We found that undecanoic acid, lauric acid, and N-tridecanoic acid inhibited E. coli BW25113 persister cell formation by 25-, 58-, and 44-fold, respectively. Similarly, these fatty acids repressed persisters of enterohemorrhagic E. coli EDL933. These fatty acids were all medium-chain saturated forms. Furthermore, the fatty acids repressed Enterohemorrhagic E. coli (EHEC) biofilm formation (for example, by 8-fold for lauric acid) without having antimicrobial activity. This study demonstrates that medium-chain saturated fatty acids can serve as antipersister and antibiofilm agents that may be applied to treat bacterial infections.

An Offloading Scheduling Strategy with Minimized Power Overhead for Internet of Vehicles Based on Mobile Edge Computing

  • He, Bo;Li, Tianzhang
    • Journal of Information Processing Systems
    • /
    • 제17권3호
    • /
    • pp.489-504
    • /
    • 2021
  • By distributing computing tasks among devices at the edge of networks, edge computing uses virtualization, distributed computing and parallel computing technologies to enable users dynamically obtain computing power, storage space and other services as needed. Applying edge computing architectures to Internet of Vehicles can effectively alleviate the contradiction among the large amount of computing, low delayed vehicle applications, and the limited and uneven resource distribution of vehicles. In this paper, a predictive offloading strategy based on the MEC load state is proposed, which not only considers reducing the delay of calculation results by the RSU multi-hop backhaul, but also reduces the queuing time of tasks at MEC servers. Firstly, the delay factor and the energy consumption factor are introduced according to the characteristics of tasks, and the cost of local execution and offloading to MEC servers for execution are defined. Then, from the perspective of vehicles, the delay preference factor and the energy consumption preference factor are introduced to define the cost of executing a computing task for another computing task. Furthermore, a mathematical optimization model for minimizing the power overhead is constructed with the constraints of time delay and power consumption. Additionally, the simulated annealing algorithm is utilized to solve the optimization model. The simulation results show that this strategy can effectively reduce the system power consumption by shortening the task execution delay. Finally, we can choose whether to offload computing tasks to MEC server for execution according to the size of two costs. This strategy not only meets the requirements of time delay and energy consumption, but also ensures the lowest cost.

Development of a Forensic Analyzing Tool based on Cluster Information of HFS+ filesystem

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권3호
    • /
    • pp.178-192
    • /
    • 2021
  • File system forensics typically focus on the contents or timestamps of a file, and it is common to work around file/directory centers. But to recover a deleted file on the disk or use a carving technique to find and connect partial missing content, the evidence must be analyzed using cluster-centered analysis. Forensics tools such as EnCase, TSK, and X-ways, provide a basic ability to get information about disk clusters, but these are not the core functions of the tools. Alternatively, Sysinternals' DiskView tool provides a more intuitive visualization function, which makes it easier to obtain information around disk clusters. In addition, most current tools are for Windows. There are very few forensic analysis tools for MacOS, and furthermore, cluster analysis tools are very rare. In this paper, we developed a tool named FACT (Forensic Analyzer based Cluster Information Tool) for analyzing the state of clusters in a HFS+ file system, for digital forensics. The FACT consists of three features, a Cluster based analysis, B-tree based analysis, and Directory based analysis. The Cluster based analysis is the main feature, and was basically developed for cluster analysis. The FACT tool's cluster visualization feature plays a central role. The FACT tool was programmed in two programming languages, C/C++ and Python. The core part for analyzing the HFS+ filesystem was programmed in C/C++ and the visualization part is implemented using the Python Tkinter library. The features in this study will evolve into key forensics tools for use in MacOS, and by providing additional GUI capabilities can be very important for cluster-centric forensics analysis.