• Title/Summary/Keyword: air protocol

Search Result 231, Processing Time 0.031 seconds

Cryopreservation of winter vegetation buds of Betula platyphylla var. japonica in liquid nitrogen (자작나무 동아의 액체질소 내 초저온 보존)

  • 안영희
    • Korean Journal of Plant Resources
    • /
    • v.15 no.2
    • /
    • pp.89-95
    • /
    • 2002
  • In woody plant germplasms, using prefrozen dormant buds for materials is one way to achieve successful cryopreservation. The protocol of cryopreservation for White birch (Betula platyphylla var. japonica) winter vegetative buds is the following. First, the branches of White birch were collected in January 20, when the vegetative buds were still in a state of quiescence. The winter buds with about 5㎜ of xylem tissue were removed from the branches. They were dehydrated to moisture contents about 44% by air dry treatment. The buds were prefrozen, with the temperature being decreased by 5∼-20$\^{C}$ and then transfered to the LN(liquid nitrogen) maintained below -l96$\^{C}$. After cryopreservation, the vegetative buds were rapidly thawed in a water bath at 40$\pm$5$\^{C}$. In this case, the cell survival rate of samples was about 86%. After sterilization, buds were then cultured on MS medium. These results demonstrate the feasibility for cryopreservation of winter vegetation buds of Betula platyphylla var. japonica.

Design of Digital Codec for EPC RFID Protocols Generation 2 Class 1 Codec (EPC RFID 프로토콜 제너레이션 2 클래스 1 태그 디지털 코덱 설계)

  • Lee Yong-Joo;Jo Jung-Hyeon;Kim Hyung-Kyu;Kim Sag-Hoon;Lee Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3A
    • /
    • pp.360-367
    • /
    • 2006
  • In this paper, we designed a digital codec of an RFID tag for EPC global generation 2 class 1. There are a large number of studies on RRD standard and anti-collision algorithm but few studies on the design of digital parts of the RFID tag itself. For this reason, we studied and designed the digital codec hardware for EPC global generation 2 class 1 tag. The purpose of this paper is not to improve former studies but to present the hardware architecture, an estimation of hardware size and power consumption of digital part of the RFID tag. Results are synthesized using Synopsys with a 0.35um standard cell library. The hardware size is estimated to be 111640 equivalent inverters and dynamic power is estimated to be 10.4uW. It can be improved through full-custom design, but we designed using a standard cell library because it is faster and more efficient in the verification and the estimation of the design.

Literary investigation on the origin of poppy and other narcotics Research Articles (아편 유래 약물에 대한 문헌적 고찰)

  • Lim, Chung-San;Han, Young-Ju;Kang, Kye-Sung;Lee, Kwang-Ho;Kim, Doo-Young;Kwon, Ki-Rok
    • Journal of Pharmacopuncture
    • /
    • v.12 no.2
    • /
    • pp.67-75
    • /
    • 2009
  • Objectives : This study was performed to developing orally administered analgesics and locally injected pharmacopuncture analgesics like opioids. Methods : Literary investigation on the origin of poppy (Papaver somniferum L) and other narcotics was conducted to examine the potential of developing orally administered analgesics and locally injected pharmacopuncture analgesics. Opium is a gum-like mass derived from air-dried white fluid of immature fruit of the poppy. Opium contains approximately 20 types of alkaloids including morphine, codeine, thebaine, papaverine and others. Natural opioids and synthetic alkaloid derivatives are the constituents of opioid analgesics and their effects and side-effects depend on the peculiarities of receptors. An extreme caution is required in the selection of proper dosage, proper analgesic types, and indications for successful pain management. Results and Discussion : With the enactment of "Narcotic control protocol", herbs such as cannibis and poppy are no longer available for use by Korean medicine doctors, and these doctors are faced with difficulty in managing severe pain in the clinical environment. A systematic consideration is inevitable for overcoming the limitation on these analgesics.

A study on the Estimation of $CO_2$ Emission in Container Port by using Container O/D Analysis (컨테이너 O/D 분식에 따른 $CO_2$ 배출량 추정)

  • Kim, Hwan-Seong;Jo, Min-Ji;Choi, Se-Kyung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.194-195
    • /
    • 2009
  • According to the issue "global warming", many regulations and agreements with countries in the world are becoming set and it is being fulfill now. Under the progress of Post Kyoto Protocol agreement, It will be sure that Korea rave a duty to reduce $CO_2$ emission from 2013. For them, Korea have to make a strategies about the Climatic Change Convention for all industries. Recently, a great attention about $CO_2$ emission in the world is focused on port, shipping line and airline. Most countries are establishing policies to prevent environment from these industry fields, but Korea has not yet made for them. Thus, Korea need to collect $CO_2$ emission data not only the routes of container from port but also activities in the port. In this paper, an estimation of $CO_2$ emission under the route of container transportation at Korea by using O/D analysis will be addressed. And then, it will be used to make a optimal routes of container transportation which can reduce $CO_2$ emission in future.

  • PDF

Acute Hydrogen Cyanide Poisoning in a Plating Worker and Workplace Measurement (도금 사업장 근로자에게 발생한 시안화수소 급성중독과 작업환경평가)

  • Ham, Seunghon;Choi, Won-Jun;Lee, Junhyung;Lim, Yong su;Kang, Jihyun;Kang, Seong-Kyu
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.29 no.3
    • /
    • pp.336-342
    • /
    • 2019
  • Introduction: An unexpected death was reported in a beginner immediately after starting the work at a plating factory. After the incident, air sampling was performed using a simulation of the situation as it had been at the time. Methods: To evaluate the airborne concentration of hydrogen cyanide, a total of six samples were collected: one personal sample, three area samples, and two background samples (office and outdoors). Hydrogen cyanide measurement was performed according to the standard sampling protocol recommended by the U.S. NIOSH (National Institute of Occupational Safety and Health). Results: The highest concentration of hydrogen cyanide was 0.938 ppm measured in a sample collected from the plating bath area with local exhaust ventilation. This value was approximately 20% of the ceiling occupational exposure limit. The personal sample showed a concentration of 0.135 ppm. Samples collected near the bath in which the incident occurred and a dehydrator showed hydrogen cyanide concentrations of 0.236 ppm and 0.101 ppm, respectively. Hydrogen cyanide was not detected in the background samples (office and outdoors). Conclusions: It is necessary to use proper ventilation systems and respirators in plating factories to prevent acute poisoning. Furthermore, it is important to educate and train new workers dealing with toxic substances.

Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria (위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석)

  • Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.613-628
    • /
    • 2019
  • In-Vehicle Infotainment provides navigation and various functions through the installation of the application. And infotainment is very important to control the entire vehicle by sending commands to the ECU. Infotainment supports a variety of wireless communication protocols to install and update applications. So Infotainment is becoming an attack surface through wireless communcation protocol for hacker's access. If malicious software is installed in infotainment, it can gain control of the vehicle and send a malicious purpose command to the ECU, affecting the life of the driver. Therefore, measures are needed to verify the security and reliability of infotainment software updates, and security requirements must be derived and verified. It must be developed in accordance with SDL to provide security and reliability, and systematic security requirements must be derived by applying threat modeling. Therefore, this paper conducts threat modeling to derive infotainment update security requirements. Also, the security requirements are mapped to the Common Criteria to provide criteria for updating infotainment software.

Prosthetic rehabilitation using an obturator in a fully edentulous patient who had partial maxillectomy (상악골 부분 절제술을 받은 무치악 환자에서의 구강폐쇄장치 수복)

  • Chung, Yoo-Jin;Kim, Jong-Jin;Baik, Jin;Cha, Hyun-Suk;Lee, Joo-Hee
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.34 no.4
    • /
    • pp.331-337
    • /
    • 2018
  • Prosthetic rehabilitation of an edentulous patient who has a maxillary defect is difficult to achieve for many clinicians. The maxillary defect causes leakage of air during pronunciation and compromises denture stability, support and retention by reducing denture-bearing area and breaking peripheral seal. In these patients, the sizes and shapes of defects are very important factors which attribute to prognosis of maxillary obturators. This case report shows the prosthetic rehabilitation of the patient who had maxillectomy on the right maxillary sinus because of squamous cell carcinoma. The patient had a stepwise treatment protocol which started with pre-operative dental examination and followed by surgical, interim and definitive obturation phase. In this case, an acceptable level of retention could be obtained due to well-defined static defects and the preserved premaxillae and the patient was satisfied with the result of the treatment in the aspect of function and esthetics.

In Search of a Performing Seal: Rethinking the Design of Tight-Fitting Respiratory Protective Equipment Facepieces for Users With Facial Hair

  • Meadwell, James;Paxman-Clarke, Lee;Terris, David;Ford, Peter
    • Safety and Health at Work
    • /
    • v.10 no.3
    • /
    • pp.275-304
    • /
    • 2019
  • Background: Air-purifying, tight-fitting facepieces are examples of respiratory protective equipment and are worn to protect workers from potentially harmful particulate and vapors. Research shows that the presence of facial hair on users' face significantly reduces the efficacy of these devices. This article sets out to establish if an acceptable seal could be achieved between facial hair and the facepiece. The team also created and investigated a low-cost "pressure testing" method for assessing the efficacy of a seal to be used during the early design process for a facepiece designed to overcome the facial hair issue. Methods: Nine new designs for face mask seals were prototyped as flat samples. A researcher developed a test rig, and a test protocol was used to evaluate the efficacy of the new seal designs against facial hair. Six of the seal designs were also tested using a version of the conventional fit test. The results were compared with those of the researcher-developed test to look for a correlation between the two test methods. Results: None of the seals performed any better against facial hair than a typical, commercially available facepiece. The pressure testing method devised by the researchers performed well but was not as robust as the fit factor testing. Conclusion: The results show that sealing against facial hair is extremely problematic unless an excessive force is applied to the facepiece's seal area pushing it against the face. The means of pressure testing devised by the researchers could be seen as a low-cost technique to be used at the early stages of a the design process, before fit testing is viable.

Power Allocation and Mode Selection in Unmanned Aerial Vehicle Relay Based Wireless Networks

  • Zeng, Qian;Huangfu, Wei;Liu, Tong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.711-732
    • /
    • 2019
  • Many unmanned aerial vehicle (UAV) applications have been employed for performing data collection in facilitating tasks such as surveillance and monitoring objectives in remote and dangerous environments. In light of the fact that most of the existing UAV relaying applications operate in conventional half-duplex (HD) mode, a full-duplex (FD) based UAV relay aided wireless network is investigated, in which the UAV relay helps forwarding information from the source (S) node to the destination (D). Since the activated UAV relays are always floating and flying in the air, its channel state information (CSI) as well as channel capacity is a time-variant parameter. Considering decode-and-forward (DF) relaying protocol in UAV relays, the cooperative relaying channel capacity is constrained by the relatively weaker one (i.e. in terms of signal-to-noise ratio (SNR) or signal-to-interference-plus-noise ratio (SINR)) between S-to-relay and relay-to-D links. The channel capacity can be optimized by adaptively optimizing the transmit power of S and/or UAV relay. Furthermore, a hybrid HD/FD mode is enabled in the proposed UAV relays for adaptively optimizing the channel utilization subject to the instantaneous CSI and/or remaining self-interference (SI) levels. Numerical results show that the channel capacity of the proposed UAV relay aided wireless networks can be maximized by adaptively responding to the influence of various real-time factors.

A Study on the Construction of MVCT Dose Calculation Model by Using Dosimetry Check™ (Dosimetry Check™를 이용한 MVCT 선량계산 모델 구축에 관한 연구)

  • Um, Ki-Cheon;Kim, Chang-Hwan;Jeon, Soo-Dong;Back, Geum-Mun
    • Journal of radiological science and technology
    • /
    • v.43 no.6
    • /
    • pp.431-441
    • /
    • 2020
  • The purpose of this study was to construct a model of MVCT(Megavoltage Computed Tomography) dose calculation by using Dosimetry Check™, a program that radiation treatment dose verification, and establish a protocol that can be accumulated to the radiation treatment dose distribution. We acquired sinogram of MVCT after air scan in Fine, Normal, Coarse mode. Dosimetry Check™(DC) program can analyze only DICOM(Digital Imaging Communications in Medicine) format, however acquired sinogram is dat format. Thus, we made MVCT RC-DICOM format by using acquired sinogram. In addition, we made MVCT RP-DICOM by using principle of generating MLC(Multi-leaf Collimator) control points at half location of pitch in treatment RP-DICOM. The MVCT imaging dose in fine mode was measured by using ionization chamber, and normalized to the MVCT dose calculation model, the MVCT imaging dose of Normal, Coarse mode was calculated by using DC program. As a results, 2.08 cGy was measured by using ionization chamber in Fine mode and normalized based on the measured dose in DC program. After normalization, the result of MVCT dose calculation in Normal, Coarse mode, each mode was calculated 0.957, 0.621 cGy. Finally, the dose resulting from the process for acquisition of MVCT can be accumulated to the treatment dose distribution for dose evaluation. It is believed that this could be contribute clinically to a more realistic dose evaluation. From now on, it is considered that it will be able to provide more accurate and realistic dose information in radiation therapy planning evaluation by using Tomotherapy.