• Title/Summary/Keyword: chain code

Search Result 218, Processing Time 0.025 seconds

Comparative Analyses of the Internal Radiation Exposures due to Food Chain Pathway Using FOOD III Code (FOOD III 코드를 이용한 섭식경로 내부피폭 비교해석)

  • Choi, Yong-Ho;Chung, Kyu-Hoi;Kim, Jin-Kyu;Lee, Jeong-Ho
    • Journal of Radiation Protection and Research
    • /
    • v.13 no.2
    • /
    • pp.41-51
    • /
    • 1988
  • In order to develop a food-chain computer code suitable to the environmental conditions of Korea, the FOOD III code was partially modified. The excution results for Korean male-adult were compared to those from the Canadian version of FOOD III to deduce a more realistic approach in dose assessment. The amounts of Mn-54, Co-58, Co-60, I-131 and I-132 released from Kori unit 1 in1984 were used as the source terms for the sample calculation. The maximum atmospheric dispersion factor(X/Q) value on the site boundary was applied. Through the code modification, organ doses decreased by about $20{\sim}70%$ and the effective committed dose equivalent by about 40% to be $7.935{\times}10^{-6}Sv/y$ which is 0.16% of the ICRP limit, $5{\times}10^{-3}Sv/y$.

  • PDF

A Study on Implementation of BlockChain Voting System using Hyperledger Fabric (Hyperledger Fabric을 활용한 블록체인 투표시스템 구현에 관한 연구)

  • Hwang, Won-Yong;Kim, Hyo-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.4
    • /
    • pp.298-305
    • /
    • 2020
  • This paper deals with the implementation of electronic voting system using permissioned block chain technology. Cases studies have recently been under way in many industrial areas to review the application of the blockchain based electronic voting system. The existing electronic voting system was easily exposed by hacking because of its centralized characteristics, making it difficult to ensure the reliability and transparency of the voting system itself. In this study, we proposed key considerations and concepts to ensure the reliability and transparency of voters and voting stakeholder by utilizing a hyperledger fabric which is nowadays widely used as a permissioned blockchain.

Design of Personal Career Records Management and Duistribution using Block Chain (블록체인을 활용한 개인 경력 관리 및 유통 시스템 설계)

  • Bae, Su-Hwan;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.235-242
    • /
    • 2020
  • This paper proposes a system that can manage and verify personal career information through a block chain to solve the problem of getting a job by forging an individual's career when hiring employees. Blockchain network uses private network, and inside the block, the user's academic and career information is kept. The functions of the block chain perform the functions of block creation, block internal data retrieval, career and academic verification, which works through chain code. As a result of the performance evaluation of the proposed system, the processing time per transaction was measured at approximately 110 ms and the search time was measured at 10 ms, and it was applied to the actual system to confirm that it was available.

Algorithm for Finding the Vertex Location of Triangle & Rectangle using the Number of Occurrences of Chain Codes (Chain Code 발생빈도를 이용한 삼각형 및 사각형의 꼭지점 인식 알고리즘)

  • Kim, K.S.;Son, J.R.;Park, C.W.
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1343-1346
    • /
    • 1987
  • This paper proposes a new algorithm for finding the vertex location of triangle and rectangle. The algorithm accumulates the number of occurrences of chain codes which range from 0 to 7 and computes the location of vertices using the accumulated value. Hardware and software system were constructed using IBM-PC/AT and VAX-11/780 for the experiment.

  • PDF

Comparison of graph clustering methods for analyzing the mathematical subject classification codes

  • Choi, Kwangju;Lee, June-Yub;Kim, Younjin;Lee, Donghwan
    • Communications for Statistical Applications and Methods
    • /
    • v.27 no.5
    • /
    • pp.569-578
    • /
    • 2020
  • Various graph clustering methods have been introduced to identify communities in social or biological networks. This paper studies the entropy-based and the Markov chain-based methods in clustering the undirected graph. We examine the performance of two clustering methods with conventional methods based on quality measures of clustering. For the real applications, we collect the mathematical subject classification (MSC) codes of research papers from published mathematical databases and construct the weighted code-to-document matrix for applying graph clustering methods. We pursue to group MSC codes into the same cluster if the corresponding MSC codes appear in many papers simultaneously. We compare the MSC clustering results based on the several assessment measures and conclude that the Markov chain-based method is suitable for clustering the MSC codes.

Parameter Uncertainty and Sensitivity Analysis on a Dose Calculation Model for Terrestrial Food-Chain Pathway (육상식품 섭취경로에 의한 선량계산 모델에서 파라메터의 불확실성 및 민감도 분석)

  • Lee, Chang-Woo;Choi, Yong-Ho;Chun, Ki-Jung;Lee, Jeong-Ho
    • Journal of Radiation Protection and Research
    • /
    • v.16 no.2
    • /
    • pp.67-74
    • /
    • 1991
  • Parameter uncertainty and sensitivity of KFOOD model for calculating the ingestion dose via terrestrial food-chain pathway was analyzed with using Monte-Carlo approach. For the rice ingestion pathway, estimated values from KFOOD code were very conservative. Most sensitive input parameters in model were deposition velocities and soil-to-plant transfer coefficient of radionuclides.

  • PDF

Implementation of Energy Blockchain System (에너지 블록체인 시스템 구현)

  • Jang, Bongseog;Bae, Sang-Hyun
    • Journal of Integrative Natural Science
    • /
    • v.14 no.2
    • /
    • pp.65-72
    • /
    • 2021
  • This paper discusses on the implementation of blockchain system, specifically the private system for Energy trading purpose. Blockchain is records bundled together in blocks and added to the chain after ledger is generated. All the blocks in the entire networks should be same contents and also only the permitted nodes can join the chain in the private blockchain system, thus not that same block and permitted nodes cannot be accepted in terms of proof-of-work phase. We implement the all stages which are necessary to process blockchain system. After coding the whole process, we test and conclude that the system is correctly working in terms of the functions implemented.

A Study on the Expansion of the Global Supply Chain in Southeast Asia Using the FTA Outward Processing (FTA 역외가공방식을 활용한 동남아시아 지역의 글로벌 공급망 확대에 관한 연구)

  • Jin-Kyu Kim
    • Korea Trade Review
    • /
    • v.45 no.5
    • /
    • pp.223-238
    • /
    • 2020
  • In the environment of protectionism and bilateral trade agreements, Korea has promoted the conclusion of FTAs for its export-oriented trading policy, and 16 FTAs have entered into force at present. The main goal of this paper is to introduce the ISI system and its benefits and to extend the preferential rule of origin regime by using the Integrated Sourcing Initiative in the U.S. Code of Federal Regulations. The ISI illustrates with impressive clarity the fact that it considered as a tool of expanding the geographic limit of states and maximizing the global sourcing strategy of multinational corporations, allowing the developing countries to gain access to the market of developed ones that avoid the complexity and costs of many rules of origin regimes. This paper utilizes the literature research and analyzes a case study of FTAs which have adopted the ISI system. In conclusion, it presents several implications of additional measures to satisfy rules of origin in Korea's existing FTAs relating to the global supply chain strategy.

Structural Classification and Enumeration of Pin-Jointed Kinematic Chains (핀 조인트로 구성된 기구학적 연쇄들의 구조적 분류 및 열거)

  • 이종기;신재균
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.3
    • /
    • pp.565-572
    • /
    • 1994
  • A method for the classification of kinematic chains according to the similarity in their structures is proposed. Classifcation code is defined from the contracted graph of the kinematic chain. This method of classifying kinematic chains can be effectively used for the systematic enumeration of structurally distinct kinematic chains given the number of links and degrees of freedom of the kinematic chains. Two separate steps for the enumeration are developed in the study. The first step is to generated all the possible classification codes and the next step is to generate individual kinematic chains belonging to each classification code generated. Using this two step procedure, kinematic chains up to 12 links are successfully enumerated in the present study. It is concluded that the two step method can be efficiently used for the type synthesis of mechanisms.

Reservation and Status Sensing Multiple Access Protocol in Slotted CDMA Systems

  • Lim, In-Taek;Ryu, Young-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.513-518
    • /
    • 2010
  • This paper proposes a medium access control protocol for integrated voice and data services in slotted CDMA systems. The proposed protocol, which is named as RCSSMA (Reservation Code and Status Sensing Multiple Access), adopts a code reservation and status sensing schemes. RCSSMA protocol gives higher access priority to the voice traffic than data traffic for reducing the packet dropping probability. The voice terminal reserves an available spreading code to transmit voice packets during a talkspurt, whereas the data terminal transmits a packet over one of the available spreading codes that are not reserved by the voice terminals. In this protocol, the voice packets never contend with the data packets. Packet dropping probability and average data packet transmission delay are analyzed using a Markov chain model.