• Title/Summary/Keyword: Data Requirement

Search Result 1,795, Processing Time 0.028 seconds

Outlier detection of GPS monitoring data using relational analysis and negative selection algorithm

  • Yi, Ting-Hua;Ye, X.W.;Li, Hong-Nan;Guo, Qing
    • Smart Structures and Systems
    • /
    • v.20 no.2
    • /
    • pp.219-229
    • /
    • 2017
  • Outlier detection is an imperative task to identify the occurrence of abnormal events before the structures are suffered from sudden failure during their service lives. This paper proposes a two-phase method for the outlier detection of Global Positioning System (GPS) monitoring data. Prompt judgment of the occurrence of abnormal data is firstly carried out by use of the relational analysis as the relationship among the data obtained from the adjacent locations following a certain rule. Then, a negative selection algorithm (NSA) is adopted for further accurate localization of the abnormal data. To reduce the computation cost in the NSA, an improved scheme by integrating the adjustable radius into the training stage is designed and implemented. Numerical simulations and experimental verifications demonstrate that the proposed method is encouraging compared with the original method in the aspects of efficiency and reliability. This method is only based on the monitoring data without the requirement of the engineer expertise on the structural operational characteristics, which can be easily embedded in a software system for the continuous and reliable monitoring of civil infrastructure.

A Data-Consistency Scheme for the Distributed-Cache Storage of the Memcached System

  • Liao, Jianwei;Peng, Xiaoning
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.3
    • /
    • pp.92-99
    • /
    • 2017
  • Memcached, commonly used to speed up the data access in big-data and Internet-web applications, is a system software of the distributed-cache mechanism. But it is subject to the severe challenge of the loss of recently uncommitted updates in the case where the Memcached servers crash due to some reason. Although the replica scheme and the disk-log-based replay mechanism have been proposed to overcome this problem, they generate either the overhead of the replica synchronization or the persistent-storage overhead that is caused by flushing related logs. This paper proposes a scheme of backing up the write requests (i.e., set and add) on the Memcached client side, to reduce the overhead resulting from the making of disk-log records or performing the replica consistency. If the Memcached server fails, a timestamp-based recovery mechanism is then introduced to replay the write requests (buffered by relevant clients), for regaining the lost-data updates on the rebooted Memcached server, thereby meeting the data-consistency requirement. More importantly, compared with the mechanism of logging the write requests to the persistent storage of the master server and the server-replication scheme, the newly proposed approach of backing up the logs on the client side can greatly decrease the time overhead by up to 116.8% when processing the write workloads.

Performance Analysis of Switched Ethernets with Different Topologies for Industrial Communications (공장자동화를 위한 토폴로지에 따른 스위칭 이더넷의 성능분석)

  • Kim, Myung-Kyun;Park, Zin-Won
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.99-108
    • /
    • 2004
  • In this paper, the performance of switched ethernet networks with different topologies as an industrial control networks is analyzed. The switched ethernet eliminated data collisions on the network and can be used to transmit real-time data. While the amount of data on the network is small compared to the computer networks, the industrial control networks require the real-time data delivery. In this paper, we analyze and compare the network performance of switched ethernet networks with linear and tree topologies whether they satisfy the real-time data delivery requirement needed to be used as the industrial control networks.

Safety Design and Validation of Mission Equipment Package for Korean Utility Helicopter (KUH 임무탑재시스템의 안전성설계 및 검증)

  • Kim, Yoo-Kyung;Kim, Myung-Chin;Kim, Tae-Hyun;Yim, Jong-Bong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.8
    • /
    • pp.813-822
    • /
    • 2010
  • Integrated data processing for display of flight critical data and mission critical data was conducted without additional display instruments using glass cockpit design. Based on a pre-designed flight critical system and a mission critical system, this paper shows an optimal design of subsystem integration. The design satisfies safety requirements of flight control systems(FCS) and requires minimized modification of pre-designed systems. By conducting integration test using System Integration laboratory(SIL), it is confirmed that the introduced design approach meets the safety requirements of the MEP system.

Atmospheric Stability Evaluation at Different Time Intervals for Determination of Aerial Spray Application Timing

  • Huang, Yanbo;Thomson, Steven J.
    • Journal of Biosystems Engineering
    • /
    • v.41 no.4
    • /
    • pp.337-341
    • /
    • 2016
  • Purpose: Evaluation of atmospheric conditions for proper timing of spray application is important to prevent off-target movement of crop protection materials. Susceptible crops can be damaged downwind if proper application procedure is not followed. In our previous study, hourly data indicated unfavorable conditions, primarily between evening 18:00 hrs in the evening and 6:00 hrs next morning, during clear conditions in the hot summer months in the Mississippi delta. With the requirement of timely farm operations, sub-hourly data are required to provide better guidelines for pilots, as conditions of atmospheric stability can change rapidly. Although hourly data can be interpolated to some degree, finer resolution for data acquisition of the order of 15 min would provide pilots with more accurate recommendations to match the data recording frequency of local weather stations. Methods: In the present study, temperature and wind speed data obtained at a meteorological tower were re-sampled to calculate the atmospheric stability ratio for sub-hour and hourly recommendations. High-precision evaluation of temperature inversion periods influencing atmospheric stability was made considering strength, time of occurrence, and duration of temperature inversion. Results and Discussion: The results indicated that atmospheric stability could be determined at different time intervals providing consistent recommendations to aerial applicators, thereby avoiding temperature inversion with minimal off-target drift of the sprayed liquid.

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.

A Study on Optimal Farming System for Organic Farm Products (유기농산물 생산농가의 최적영농조직)

  • Jang, Hyun-Dong;Kim, Jai-Hong
    • Korean Journal of Agricultural Science
    • /
    • v.24 no.1
    • /
    • pp.94-107
    • /
    • 1997
  • Producing organic farm products is one of the high-payoff farming practices considering the rapid increase of consumer's purchasing power. The purpose of this study is to identify the optimal organic farming system in relation to farm income. To cope with the above objectives, present farming conditions and profitability of 15 farmers producing organic products including rice and leaf vegetables as lettuse and cabbage were surveyed in Hongsung and Ahsan Gun, Chungnam Province. Based on the surveyed data, maximization of organic farm income were analyzed under the constrained conditions such as limited monthly labour inputs and competitive use of land by Linear Programming Model. The results of this study can be summarized as follows. 1. In the profitability analysis of 15 farmers producing organic products, rice farmers could earn their farm income more than that of conventional farmers by 50%. On the other hand, the controlled lettuce farmers could get more about 100% than that of it. But the controlled cabbage farm could get more about 40% of it. These organic farm products were saled at high prices comparing with the prices of conventional farm products by 170% ~ 230% even though the crop yields produced by organic materials had decreased. 2. According to the labor requirement of the organically produced crops, rice cultivation was needed more labour inputs than the conventional farming method by 130%. On the other hand lettuce and cabbage could saved labour requirement by 40% and 80% of those respectively. Especially for the rice cultivation concern, higher labor requirement was due to the activities as organic fertilization, soil preparation and pest and weed controll, etc. 3. With the surveyed data from farmers who produced farm commodities, L.P. analysis was implemented to find out the optimul farming system and the maximum income. According to the results of L.P. analysis, 58% of total farm income could get more than the conventional farming system In the case of rice cultivation, one ha of paddy was recommendable to save more labour inputs than the controlled leaf vegetables such as lettuse and cabbage. However, in the controlled leaf vegatables, only 73% of total upland equivalent to 0.3 ha should be cultivated under the condition of labor shortage as the restricted 4 workers. And increasing the size of hogs raising should be recommened to achieve self-sufficiency of organic fertilizer. As pointed out the possibility of organic farming, present farmers producing organic farm products could be able to maximize their income by expanding organic farm size with regard to all conditions of our organic industry. Of course, there are many difficulties in the course of developing organic agriculture. So Government should effort to support the development of our organic agriculture considering the various aspects of production, marketing, Quality certification of organic produces.

  • PDF

An Experimental Study on the Effects of Risk Cognition of Personal Information and Self-Expression Information on Conation of Privacy Protection (SNS의 개인정보와 자기표현정보의 중요도 인지가 정보보호 행동의지에 미치는 영향에 관한 실험연구)

  • Lim, Jung-Ho;Kwon, Sun-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.681-694
    • /
    • 2018
  • This paper studied the effects of risk cognition of personal information and self-expression information on conation of privacy protection. In the first study, 88 college students who volunteered for this research were surveyed about risk cognition of personal information and conation to protect it. In the second study, after an information-seeking expert collected and organized the self-expression information that 88 volunteers had expressed on SNS, and then showed the organized self-expression information to 88 volunteers, and then 88 volunteers were surveyed about risk cognition of self-expression information and conation to protect it. As results of the first data analysis, the risk cognition of personal information had the greatest influence on non-disclosure of personal information, followed by reduction of the disclosure scope and law institutionalization requirement. As results of the second data analysis, SNS users openly expressed their opinion or life-style, but when they realized that self-expression information can be accumulated and become sensitive information, they had conation to protect their self-expression information such as non-disclosure, reduction of disclosure scope, and law institutionalization requirement. The implication of this study is that we have overcome the limitations of existing researches that can not explain information protection behavior on SNS.

A Study on the Regional Self-sufficiency for In-patient Care Services (입원의료의 진료권별 자체충족도에 관한 연구)

  • Han, Dal-Sun;Kwon, Soon-Ho
    • Journal of Preventive Medicine and Public Health
    • /
    • v.23 no.3 s.31
    • /
    • pp.285-295
    • /
    • 1990
  • The utilization of medical care services has been partly regionalized with the implementation of referral requirement by the government since July 1, 1989 when the health insurance coverage was extended to all the people. For the purpose of regionalization, the whole country has been primarily divided into tertiary care regions, and each of them again into secondary care regions. This study investigates the self-sufficiency for in-patient care services of secondary care regions focusing on why it varies among the regions. In doing so, analysis is performed to examine a model which embodies three sets of hypotheses as follows : 1) The regional self-sufficiency for medical care services would be subject to direct influences of regional characteristics, amount of available services and structural properties of regional medical care system ; 2) The regional characteristics would have indirect effects on the self-sufficiency which are mediated by medical care services ; and 3) The amount of available services would indirectly affect the self-sufficiency by influencing the structure of regional medical care system. The results of analysis were generally consistent with the model. The findings have some practical implications. The regional self-sufficiency for medical care services partly depends upon basic properties of each region which cannot be changed in a short period of time. Thus the self-sufficiency for medical care services can be improved mainly by health policy measures. In some of the regions the self-sufficiency for in-patient care services was much higher or lower than can be predicted from the bed-population ratio. Indication is that the allocation of health resources should be made considering a variety of factors bearing upon the supply of and demand for health care ; not on the basis of just a single criterion like the availability. The self-sufficiency of a certain region is related to not only its own characterstics but also the characteristics of neighboring regions. Therefore, attention should be also directed to the inter-regional relationships in health care when the needs for investment of health resources in a region are assessed. However, it should be noted that this study used the data collected before the referral requirement was imposed. A replication of this analysis using recent data would provide an evaluation of the impact on the self-sufficiency of the referral requirement as well as a confirmation of the findings of this study.

  • PDF

A Study on Methods of the use of Coastal Station for the Analysis of Marine Contamination - Focusing on Busan Coastal Sea Area - (해양오염도 분석을 위한 연안 정점 데이터의 활용방안에 관한 연구 - 부산연안해역을 중심으로 -)

  • Hwang, Jin-Wook;Kim, Ho-Yong;Lee, Sung-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.4
    • /
    • pp.71-80
    • /
    • 2006
  • The land area, which is on the inner side of the water line, is controlled to a certain degree due to the purposes of space utilities controllers' respective roles, but the sea area is not so much controlled as the land area. However, as interest in the security and utility of the marine space, as well as that in the consistent development of the land space, has increased, there has been increase of the requirement for information about marine data and environment. The object of this study, Busan, plays various roles such as a harbor and bay, a tourist resort, and a port unlike coastal seas of other areas, and thus needs systematic control because it has numerous environmental factors. However, there are limitations in the number of data about Busan coastal sea constantly provided while the acquisition of data from main points and many areas is important for the analysis of marine contamination in Busan coastal sea area. Thus, using nautical charts with numerical values in preparing increase of the demand of them according to the degree of information requirement for the analysis of the changes in coastal areas, this study constructs property data and space data by combining vertex data about Busan's 17 coastal sea areas provided by NFRDI, and tries to present the analytical techniques for grasping the environmental conditions and continuity of the coastal areas and methods of their utilities, using GIS Geostatistical Analysis Technique.

  • PDF