• Title/Summary/Keyword: 결함수 분석기법

Search Result 238, Processing Time 0.023 seconds

A Method of Detecting Short and Protrusion-type FAB Defects Based on Local Binary Pattern Analysis (국부지역 이진 패턴 분석법에 기초한 단락 및 돌기형 FAB불량 검출기법)

  • Kim, Jin-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1018-1020
    • /
    • 2013
  • Conventionally, PCB fabrication processes detects simply electrical characteristics of TCP and COF by automatic manufacturing system and additionally, by introducing human visual detection, those are very ineffective in view of low cost implementation. So, this paper presents an efficient detection algorithm for short and protrusion-type defects based on reference images by using local binary pattern analysis. The proposed methods include several preprocessing techniques such as histogram equalizing, the compensation of spatial position and maximum distortion coordination Through several experiments, it is shown that the proposed method can improve the defect detection performance compared to the conventional schemes.

  • PDF

Investigation of CT Imaging Technique Using Guided Wave (유도초음파를 이용한 판 구조물 CT 영상화 기법)

  • Yoon, Hyun-Woo;Kang, To;Kim, Hak-Joon;Song, Sung-Jin;Shin, Ho-Sang
    • Journal of the Korean Institute of Gas
    • /
    • v.15 no.3
    • /
    • pp.11-18
    • /
    • 2011
  • Ultrasonic guided waves have been widely utilized for long range inspection of structures. Recently, many researchers have paid attention to the tomographic imaging using guided wave for the diagnosis of plate-like structures because group velocity of guided waves is changed by central frequency of transducer and thickness of plate. Currently, Delay and Sum imaging technique and MVDR(Minimum Variance Distortionless Response) imaging technique are performed. So the performance of these two imaging techniques are investigated in this paper.

The Fault Analysis Model for Air-to-Ground Weapon Delivery using Testing-Based Software Fault Localization (소프트웨어 오류 추정 기법을 활용한 공대지 사격 오류 요인 분석 모델)

  • Kim, Jae-Hwan;Choi, Kyung-Hee;Chung, Ki-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.59-67
    • /
    • 2011
  • This paper proposes a model to analyze the fault factors of air-to-ground weapon delivery utilizing software fault localization methods. In the previous study, to figure out the factors to affect the accuracy of air-to-ground weapon delivery, the FBEL (Factor-based Error Localization) method had been proposed and the fault factors were analyzed based on the method. But in the study, the correlation between weapon delivery accuracy and the fault factors could not be revealed because the firing accuracy among several factors was fixed. In this paper we propose a more precise fault analysis model driven through a study of the correlation among the fault factors of weapon delivery, and a method to estimate the possibility of faults with the limited number of test cases utilizing the model. The effectiveness of proposed method is verified through the simulation utilizing real delivery data. and weapons delivery testing in the evaluation of which element affecting the accuracy of analysis that was available to be used successfully.

Exact Security Analysis of Some Designated Verifier Signature Schemes With Defective Security Proof (결함 있는 안전성 증명을 갖는 수신자 지정 서명기법들에 대한 정확한 안전성분석)

  • Kim, Ki-Tae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.37-48
    • /
    • 2010
  • Designated verifier signatures allow a signer to prove the validity of a signature to a specifically designated verifier. The designated verifier can be convinced but unable to prove the source of the message to a third party. Unlike conventional digital signatures, designated verifier signatures make it possible for a signer to repudiate his/her signature against anyone except the designated verifier. Recently, two designated verifier signature schemes, Zhang et al.'s scheme and Kang et al.'s scheme, have been shown to be insecure by concrete attacks. In this paper, we find the essential reason that the schemes open attacks while those were given with its security proofs, and show that Huang-Chou scheme and Du-Wen scheme have the same problem. Indeed, the security proofs of all the schemes reflect no message attackers only. Next, we show that Huang-Chou scheme is insecure by presenting universal forgery attack. Finally, we show that Du-Wen scheme is, indeed, secure by completing its defective security proof.

Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method (이상탐지(Anomaly Detection) 및 오용탐지(Misuse Detection) 분석의 정확도 향상을 위한 개선된 데이터마이닝 방법 연구)

  • Choi Yun-Jeong;Park Seung-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.238-240
    • /
    • 2006
  • 네트워크상에서 발생하는 다양한 형태의 대량의 데이터를 정확하고 효율적으로 분석하기 위해 설계되고 있는 마이닝 시스템들은 목표지향적으로 훈련데이터들을 어떻게 구축하여 다룰 것인지에 대한 문제보다는 대부분 얼마나 많은 데이터 마이닝 기법을 지원하고 이를 적용할 수 있는지 등의 기법에 초점을 두고 있다. 따라서, 점점 더 에이전트화, 분산화, 자동화 및 은닉화 되는 최근의 보안공격기법을 정확하게 탐지하기 위한 방법은 미흡한 실정이다. 본 연구에서는 유비쿼터스 환경 내에서 발생 가능한 문제 중 복잡하고 지능화된 침입패턴의 탐지를 위해 데이터 마이닝 기법과 결함허용방법을 이용하는 개선된 학습알고리즘과 후처리 방법에 의한 RTPID(Refinement Training and Post-processing for Intrusion Detection)시스템을 제안한다. 본 논문에서의 RTPID 시스템은 active learning과 post-processing을 이용하여, 네트워크 내에서 발생 가능한 침입형태들을 정확하고 효율적으로 다루어 분석하고 있다. 이는 기법에만 초점을 맞춘 기존의 데이터마이닝 분석을 개선하고 있으며, 특히 제안된 분석 프로세스를 진행하는 동안 능동학습방법의 장점을 수용하여 학습효과는 높이며 비용을 감소시킬 수 있는 자가학습방법(self learning)방법의 효과를 기대할 수 있다. 이는 관리자의 개입을 최소화하는 학습방법이면서 동시에 False Positive와 False Negative 의 오류를 매우 효율적으로 개선하는 방법으로 기대된다. 본 논문의 제안방법은 분석도구나 시스템에 의존하지 않기 때문에, 유사한 문제를 안고 있는 여러 분야의 네트웍 환경에 적용될 수 있다.더욱 높은성능을 가짐을 알 수 있다.의 각 노드의 전력이 위험할 때 에러 패킷을 발생하는 기법을 추가하였다. NS-2 시뮬레이터를 이용하여 실험을 한 결과, 제안한 기법이 AOMDV에 비해 경로 탐색 횟수가 최대 36.57% 까지 감소되었음을 알 수 있었다.의 작용보다 더 강력함을 시사하고 있다.TEX>로 최고값을 나타내었으며 그 후 감소하여 담금 10일에는 $1.61{\sim}2.34%$였다. 시험구간에는 KKR, SKR이 비교적 높은 값을 나타내었다. 무기질 함량은 발효기간이 경과할수록 증하였고 Ca는 $2.95{\sim}36.76$, Cu는 $0.01{\sim}0.14$, Fe는 $0.71{\sim}3.23$, K는 $110.89{\sim}517.33$, Mg는 $34.78{\sim}122.40$, Mn은 $0.56{\sim}5.98$, Na는 $0.19{\sim}14.36$, Zn은 $0.90{\sim}5.71ppm$을 나타내었으며, 시험구별로 보면 WNR, BNR구가 Na만 제외한 다른 무기성분 함량이 가장 높았다.O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performanc

  • PDF

A Study on the Effect of Rivet Layout on the Stress Variation in Doubler Repair (보강재 수리시 리벳 배열이 응력 변화에 미치는 영향 연구)

  • Moon, Ju-Yeon;Shin, Ki-Su
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.91-102
    • /
    • 2010
  • Doubler repair is one of the frequently applied methods to repair cracks which occur at the structure of aircraft weapon systems. The requirement of the doubler repair for some of aging aircraft has increased more recently. However very few researches have been conducted until now. In this paper, the effect of the various doubler repair methods was evaluated. Especially, the relationship between the array of revet and the effect of stress concentration was investigated. To calculate variation of the stress with different repair methods, commercial FEA program was utilized. As a result, it was shown that the main factor for the variation of stress is pitch and number of revet line. Furthermore the optimized array of revet for the specific geometries of doubler was suggested.

A Study on the Measurement of Axial Cracks in the Magnetic Flux Leakage NDT System (자기누설 비파괴 검사 시스템에서 축방향 미소결함 측정에 관한 연구)

  • Kim, Hui-Min;Park, Gwan-Soo;Rho, Yong-Woo;Yoo, Hui-Ryong;Cho, Sung-Ho;Kim, Dong-Kyu;Koo, Sung-Ja
    • Journal of the Korean Magnetics Society
    • /
    • v.22 no.2
    • /
    • pp.49-57
    • /
    • 2012
  • From among the NDT (Non-Destructive Testing) methods, the MFL (Magnetic Flux Leakage) PIG (Pipeline Inspection Gauge) is especially suitable for testing pipelines because the pipeline has high magnetic permeability. MFL PIG showed high performance in detecting the metal loss and corrosions. However, MFL PIG is difficult to detect the crack which occured by exterior-interior pressure difference in pipelines and the shape of crack is very long and narrow. Therefore, the new PIG is needed to be researched and developed for detecting the cracks. The CMFL (Circumferential MF) PIG performs magnetic fields circumferentially and can maximize the magnetic flux leakage at the cracks. In this paper, CMFL PIG is designed and the distribution of the magnetic fields is analyzed by using 3 dimensional nonlinear finite element method (FEM). By Simulating and Measuring the magnetic leakage field, it is possible to detect of axial cracks in the pipeline.

An Autonomic Self-management Mechanism for High-available Ubiquitous Computing System (고가용성 유비쿼터스 컴퓨팅 시스템을 위한 오토노믹 자가 관리 메커니즘)

  • Choi, Chang-Yeol;Kim, Sung-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.566-577
    • /
    • 2005
  • A ubiquitous computing system could be constructed not only with one computer but with networks of computers (or ether devices with computing power) embedded in everyday objects. For this, dependability must be guaranteed for each single component of a system and for the whole system which might be more than just a sum of its components. This paper proposes an autonomic self-management mechanism that ran operate for 24 hours/day with the minimum human intervention. In addition, we validate the autonomic fault management scheme based on a workload model derived from the system log analysis.

Automatic Noncontact Ultrasonic Inspection Technique (비접촉식 초음파탐상방법 자동화 기술)

  • Kim, Y.G.;Ahn, B.Y.;Lee, S.S.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.13 no.4
    • /
    • pp.25-31
    • /
    • 1994
  • A system for EMAT, which generates ultrasound by electro-magnectic forces and performs nondestructive testing in noncontact, was established. By linking it with a 3 axis scanning system and a data acquisition and processing system the automation of EMAT testing was attempted. A EMAT sensor was fabricated and the directivity pattern of it was measured. To be suitable automation, it has a transmitter and a receiver in one case and the main beam direction of it can be controlled by the frequency of driving signal. A program which controls the EMAT system, the 3 axis scanner and the data acquisition and processing system was developed. It also processes acquired data and displays the processing results. IBM-PC/AT compatible PC was used as main controller and the stratage of the program is emulation of real devices on the PC monitor. To provide the performance of the established EMAT system, two aluminium blocks containing artificial flaws and a welded aluminium block were tested. The result of the tests were satisfactory.

  • PDF

A Study on the Design of RFECT System for Ferromagnetic Pipelines (강자성체 배관 탐상용 RFECT System의 설계에 관한 연구)

  • Lee, Yu Ki;Kim, Hui Min;Park, Gwan Soo
    • Journal of the Korean Magnetics Society
    • /
    • v.24 no.6
    • /
    • pp.171-178
    • /
    • 2014
  • Remote Field Eddy Current Testing (RFECT), one of the ways which is a nondestructive testing using electromagnetic fields, can make up for Magnetic Flux Leakage (MFL) weaknesses and general Eddy Current Testing (ECT) weaknesses which is an occurrence of a huge friction force or disadvantage of detecting defects on the outer wall. So many of institutes and laboratories have studied on RFECT for the past 50 years. But There is a lack of discussion about a study on eddy current and magnetic field distributions in a pipe wall and designing of RFECT exciter coil. In this paper, eddy current and magnetic field distributions in a pipe wall and influence of altering variables are analyzed. Also, the optimal design algorithm about the RFECT Exciter coil are proposed, and influence on defect signals caused by alteration of its shape is analyzed.