• Title/Summary/Keyword: chain code

Search Result 220, Processing Time 0.023 seconds

Development of multigroup cross section library generation system TPAMS

  • Lili Wen;Haicheng Wu;Ying Chen;Xiaoming Chai;Xiaofei Wu;Xiaolan Tu;Yuan Liu
    • Nuclear Engineering and Technology
    • /
    • v.56 no.6
    • /
    • pp.2208-2219
    • /
    • 2024
  • Kylin-2 is an advanced neutronics lattice code, developed by Nuclear Power Institute of China. High-precision multigroup cross section library is need for KYLIN-2 to carry out simulation of current pressurized water reactor (PWR) and advanced reactor. In this paper a multigroup cross section library generation system named TPAMS was developed, the methods in TPAMS dealing with resonance data such as subgroup parameters, lambda factor, resonance integral were discussed. Moreover, the depletion chain simplification method was studied. TPAMS can produce multigroup library in binary and ASIIC formats, including detailed data contents for resonance, transport and depletion calculations. A multigroup cross section library has been generated for KYLIN-2 based on TPAMS system. The multigroup cross section library was verified through the analysis of various criticality and burnup benchmarks, the values of multiplication factor and isotope density were compared with the experiment data. Numerical results demonstrate the accuracy of the multigroup cross section library and the reliability of the multigroup cross section library generation system TPAMS.

Purification and Characterization of Recombinant Acetohydroxyacid Synthase Catalytic Subunit in Haemophilus influenzae (Haemophilus influenzae의 Acetohydroxyacid Synthase Catalytic Subunit 재조합 단백질 발현 및 특성)

  • Noh, Kyoung-Mi;Choi, Kyoung-Jae;Park, Joon-Shik;Yoon, Moon-Young
    • Korean Journal of Microbiology
    • /
    • v.43 no.1
    • /
    • pp.19-22
    • /
    • 2007
  • Acetohydroxyacid synthase (E.C.2.2.1.6., AHAS) is the enzyme that catalyses the first step in the synthesis of the branched-chain amino acids valine, leucine and isoleucine. The AHAS gene (TIGR access code HI2585) from Heamophilus influenzae was cloned into the bacterial expression vector pET-28a and expressed in the Escherichia coli strain BL21(DE3). The expressed enzyme was purified by $Ni^{2+}-charged$ HiTrap chelating HP column. The purified enzyme appears as a single band on SDS-PAGE with a molecular mass of about 63.9 kDa. The enzyme exhibits absolute dependence on the three cofactors FAD, $MgCl_{2}$ and thiamine diphosphate for activity. Specific activity of purified enzyme has 3.22 unit/mg and optimum activity in the pH 7.5 at $37^{\circ}C$. This enzyme activity has an effect on the buffer. When comparing the enzyme activity against the organic solvent, it followed in type and the difference it is but even from the aqueous solution where the organic solvent is included with the fact that the enzyme activity is maintained.

Standardization of Identification-number for Processed Food in Food-traceability-system (가공식품에 대한 이력추적관리번호 부여체계의 표준화 방안)

  • Choi, Joon-Ho
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.2
    • /
    • pp.194-201
    • /
    • 2012
  • Facing a number of global food-related accidents, the concept and system for food traceability have been designed and introduced in many countries to manage the food-safety risks. To connect and harmonize the various food traceability-information in food traceability system according to the food supply chain, the coding system of identification-number for food-traceability has to be standardized. The GTIN (Global Trade Item Number) barcode system which has been globally standardized and implemented, is reviewed with the mandatory food-labeling regulation in expiration date of processed foods. The integration of GTIN-13 bar-code system for food-traceability is a crucial factor to expand its function in the food-related industrial areas. In this literature, the standard coding system of identification-number for food-traceability is proposed with 20 digit coding number which is combined with GTIN-13 bar-code (13 digit), expiration date (6 digit), and additional classification code (1 digit). This proposed standard coding system for identification-number has a several advantages in application for prohibiting the sale of hazard goods, food-recall, and inquiring food traceability-information. And also, this proposed coding system could enhance the food traceability system by communicating and harmonizing the information with the national network such as UNI-PASS and electronic Tax-invoice system. For the global application, the identification-number for food-traceability needs to be cooperated with the upcoming global standards such as GTIN-128 bar-code and GS1 DataBar.

A Study on the Allegory in LadyGaGa's Fashion Style(Part 2) - Focused on Music Video - (LadyGaGa의 패션스타일에 나타난 알레고리 연구(제2보) - 뮤직비디오를 중심으로 -)

  • Kim, Hyang-Ja;Kwon, Mi-Jeong
    • Fashion & Textile Research Journal
    • /
    • v.14 no.5
    • /
    • pp.701-712
    • /
    • 2012
  • This study examines the various expressions and immanent value of fashion and beauty style based on Craig Owens's Allegory theory. I analyzed four application elements of Borrow, Site Specificity, Accumulation of Strategy, and Hybridization in? Ladygaga's Music Videos. The results are as follows. 'Borrow' presents a kitsch style and playful Pop-art style, transformation of gender from Mini Mouse body suit, telephone headpiece, and can hair. 'Site specificity' presents the temporarity of fashion material through rebirth, aging, natural extinction from the chain over the black jump suit, crime scene tape, and skull-face makeup with masculine style. 'Accumulation of strategy' presents a futuristic chic fashion style from a layered style, retrospective fashion, repetition and duplication in Music Videos. It shows the physical beauty of an Asian warrior style in Poker Face. 'Hybridization' present Cyborg feminism and 'Will of Power' from iPOD LCD glasses and Pyro-Bra. The Pyro-Bra represents how the female body can be used as a weapon in the outfits of Lady Gaga. In addition, Immanent value is as follows. Textual interaction with high art is accomplished through a combination of contemporary social and cultural significance to understand the cultural code and to extend the value. Combined with high culture, popular music genre is accomplished through musical appreciation by a woman in fashion styling and sensual pleasures of the body as a tool to express a sublime advantage. Fashion style is accomplished by overcoming a self-transcendent body image representation. The way in which mutual coupling dismantling, destruction, and uncertainty is to re-launch the static, with a pluralistic context of Textuality.

Rapid Detection of Viable Cronobacter sakazakii using Propidium Monoazide (PMA) in Combination with Real-Time qPCR (Propidium Monoazide(PMA)와 Real-Time qPCR을 이용한 살아있는 Cronobacter sakazakii의 신속검출)

  • Hwang, Dae-Geun;Chon, Jung-Whan;Kim, Hyun-Sook;Kim, Hong-Seok;Kim, Dong-Hyeon;Song, Kwang-Young;Yim, Jin-Hyuk;Kim, Young-Ji;Kang, Il-Byung;Seo, Kun-Ho
    • Journal of Dairy Science and Biotechnology
    • /
    • v.33 no.3
    • /
    • pp.197-202
    • /
    • 2015
  • While various foodborne pathogenic bacteria can be detected more rapidly via polymerase chain reaction than via conventional plating methods, it is impossible to distinguish between viable and dead cells in DNA-based assays. Hence, propidium monoazide (PMA) treatment has been introduced to detect living cells. The purpose of this study is to evaluate the applicability of the PMA treatment and real-time qPCR method for the detection of Cronobacter sakazakii and to compare it to that of plate counting. Based on our positive results, we suggest the use of PMA treatment and real-time qPCR for the detection of viable Cronobacter sakazakii in various food sources and an update of the Korean Food Code.

  • PDF

A Study on the Development of RFID based Automatic Gate Systems in Container Terminals (RFID 기반의 컨데이너터미널 게이트 자동화 시스템 개발에 관한 연구)

  • Lee Seok-Yong;Seo Chang-Gab;Par Nam-Kyu;Song Bok-Deuk
    • The Journal of Information Systems
    • /
    • v.15 no.3
    • /
    • pp.187-211
    • /
    • 2006
  • As port competitiveness is becoming more important in the global market environment RFID (Radio Frequency Identification) Is also becoming a crucial enabler In implement efficient visible, secure and productive ports. However there Is a lack of practical validated RFID technology acceptance cases in the port logistics industry until now, even though various related projects have been undertaken. In this study, we applied 13.56MHz passive RFID readers, tags, and their applications into existing bar-code based gate systems to improve the port logistics process, and we analyzed results of a pilot test in economic and non-economic perspectives. The main purpose of this study is to develop the RFID based automatic gate passing system in container terminals, and is to validate its economic and non-economic feasibility. In order to accomplish the purpose of this study, first, we examined previous researches on RFID technology acceptance in the port logistics industry, second, we Identified and analyzed the business process of existing gate systems in container terminals, third, we build RFID gate systems with 13.56Mhz tags, readers, and its middle-ware, finally we tested the system and its performance. The results were successful and showed the feasibility of the system in real container terminal gates. Economic and non-economic contribution was confirmed. Although the system has technological limitations with short range passive type, we clearly identified its potential capability and its economic validity in the field, which are the implications of this study.

  • PDF

Compiler Analysis Framework Using SVM-Based Genetic Algorithm : Feature and Model Selection Sensitivity (SVM 기반 유전 알고리즘을 이용한 컴파일러 분석 프레임워크 : 특징 및 모델 선택 민감성)

  • Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.537-544
    • /
    • 2020
  • Advances in detection techniques, such as mutation and obfuscation, are being advanced with the development of malware technology. In the malware detection technology, unknown malware detection technology is important, and a method for Malware Authorship Attribution that detects an unknown malicious code by identifying the author through distributed malware is being studied. In this paper, we try to extract the compiler information affecting the binary-based author identification method and to investigate the sensitivity of feature selection, probability and non-probability models, and optimization to classification efficiency between studies. In the experiment, the feature selection method through information gain and the support vector machine, which is a non-probability model, showed high efficiency. Among the optimization studies, high classification accuracy was obtained through feature selection and model optimization through the proposed framework, and resulted in 48% feature reduction and 53 faster execution speed. Through this study, we can confirm the sensitivity of feature selection, model, and optimization methods to classification efficiency.

Front Classification using Back Propagation Algorithm (오류 역전파 알고리즘을 이용한 영문자의 폰트 분류 방법에 관한 연구)

  • Jung Minchul
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.2
    • /
    • pp.65-77
    • /
    • 2004
  • This paper presents a priori and the local font classification method. The font classification uses ascenders, descenders, and serifs extracted from a word image. The gradient features of those sub-images are extracted, and used as an input to a neural network classifier to produce font classification results. The font classification determines 2 font styles (upright or slant), 3 font groups (serif sans-serif or typewriter), and 7-font names (Postscript fonts such as Avant Garde, Helvetica, Bookman, New Century Schoolbook, Palatine, Times, and Courier). The proposed a priori and local font classification method allows an OCR system consisting of various font-specific character segmentation tools and various mono-font character recognizers. Experiments have shown font classification accuracies reach high performance levels of about 95.4 percent even with severely touching characters. The technique developed for tile selected 7 fonts in this paper can be applied to any other fonts.

  • PDF

Automatic Extraction of Route Information from Road Sign Imagery

  • Youn, Junhee;Chong, Kyusoo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.6
    • /
    • pp.595-603
    • /
    • 2015
  • With the advances of the big-data process technology, acquiring the real-time information from the massive image data taken by a mobile device inside a vehicle will be possible in the near future. Among the information that can be found around the vehicle, the route information is needed for safe driving. In this study, the automatic extraction of route information from the road sign imagery was dealt with. The scope of the route information in this study included the route number, route type, and their relationship with the driving direction. For the recognition of the route number, the modified Tesseract OCR (Optical Character Recognition) engine was used after extracting the rectangular-road-sign area with the Freeman chain code tracing algorithm. The route types (expressway, highway, rural highway, and municipal road) are recognized using the proposed algorithms, which are acquired from colour space analysis. Those road signs provide information about the route number as well as the roads that may be encountered along the way. In this study, such information was called “OTW (on the way)” or “TTW (to the way)” which between the two should be indicated is determined using direction information. Finally, the route number is matched with the direction information. Experiments are carried out with the road sign imagery taken inside a car. As a result, route numbers, route number type, OTW or TTW are successfully recognized, however some errors occurred in the process of matching TTW number with the direction.

Recognition of Car License Plate Using Geometric Information from Portable Device Image (휴대단말기 영상에서의 기하학적 정보를 이용한 차량 번호판 인식)

  • Yeom, Hee-Jung;Eun, Sung-Jong;WhangBo, Taeg-Keun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.10
    • /
    • pp.1-8
    • /
    • 2010
  • Recently, the character image processing technology using portable device camera image at home and abroad are actively conducted, but Practical use are lower rate because of accuracy and time-consuming process problems. In this paper, we propose the license plate recognition method based on geometric information from portable device camera image. In the extracted license plate region we recognize characters using the chain code and the Thickness information through the cumulative projected edge after performing the pre-processing work considering the angle difference, the contrast enhancement and the low resolution from portable device camera image. The proposed algorithm is effective and accurate recognition by light and reducing the processing time. And, the results from the character recognition success rate was 95%. In the future, we will research about license plate recognition algorithm using long distance image or added motion blur image.