• Title/Summary/Keyword: Detecting-efficiency

Search Result 421, Processing Time 0.025 seconds

Coincidence summing correction for a voluminous 152Eu source

  • Yoon, Eun Taek;Kang, Min Young;Kim, In Jung;Sun, Gwang Min;Choi, Hee-Dong
    • Nuclear Engineering and Technology
    • /
    • v.52 no.6
    • /
    • pp.1266-1270
    • /
    • 2020
  • A code is developed to correct for the coincidence summing effect in detecting a voluminous gamma source, and this code is applied to a152Eu standard source as a test case. The source is 1000 mL of liquid in a cylindrical shape. To calculate the coincidence summing effect, the cylindrical source is considered as 10(radial) × 8(height) sectional sources. For each sectional source, the peak efficiency and total efficiency are obtained by Monte Carlo simulation at each energy for 10 energies between 50 keV and 2000 keV. The efficiencies of each sector are then expressed as polynomials of gamma energy. To calculate the correction coefficients for the coincidence summing effect, the KORSUM code is used after modification. The magnitudes of correction are 4%-17% for the standard 152Eu source measured in this study. The relative deviation of 4.7% before the coincidence correction is reduced to 0.8% after the correction is applied to the efficiency based on the measured gamma line. Hence, this study has shown that a new method has been developed that is applicable for correcting the coincidence effect in a voluminous source, and the method is applied to the measured data of a standard 152Eu cylinder source.

Idle Slots Skipped Mechanism based Tag Identification Algorithm with Enhanced Collision Detection

  • Su, Jian;Xu, Ruoyu;Yu, ShiMing;Wang, BaoWei;Wang, Jiuru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2294-2309
    • /
    • 2020
  • In this article, a new Aloha-based tag identification protocol is presented to improve the reading efficiency of the EPC C1 Gen2-based UHF RFID system. Collision detection (CD) plays a vital role in tag identification process which determines the efficiency of anti-collision protocols since most Aloha-based protocols optimize the incoming frame length based on the collisions in current frame. Existing CD methods are ineffective in identifying collision, resulting in a degradation of identification performance. Our proposed algorithm adopts an enhanced CD (ECD) scheme based on the EPC C1 Gen2 standard to optimize identification performance. The ECD method can realize timely and effective CD by detecting the pulse width of the randomly sent by tags. According to the ECD, the reader detects the slot distribution and predicts tag cardinality in every collision slot. The tags involved in each collision slot are identified by independently assigned sub-frames. A large number of numerical results show that the proposed solution is superior to other existing anti-collision protocols in various performance evaluation metrics.

A study on the fault detection efficiency of software (소프트웨어의 결함 검출 효과에 관한 연구)

  • Kim, Sun-Il;Che, Gyu-Shik;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.737-743
    • /
    • 2008
  • I compare my parameter estimation methodoloay with existing method, considering both of testing effort and fault detecting rate simultaneously in software reliability modeling. Generally speaking, fault detection/removal mechanism depends on how apply previous fault detection/removal and testing effort of S/W. The fault removal efficiency makes large influence to the reliability growth, testing and removal cost in developing stage S/W. This is very useful measure during all the developing stages and much helpful for the developer to estimate debugging efficiency, and furthermore, to anticipate additional working amount.

The study of PbO's sintering effect for high efficiency x-ray detection sensor (고효율 방사선 검출 센서를 위한 PbO 박막의 소결효과에 대한 연구)

  • Jung, Suk-Hee;Kim, Yoon-Suk;Kim, Young-Bin;Kim, Min-Woo;Oh, Kyung-Min;Yun, Min-Seok;Nam, Sang-Hee;Park, Ji-Koon
    • Journal of the Korean Society of Radiology
    • /
    • v.3 no.3
    • /
    • pp.37-40
    • /
    • 2009
  • In this study, we made a high efficiency x-ray detecting sensor using the lead oxide(PbO) that are used in direct method of x-ray detector. PbO with nano size particles is produced by sol-gel method for high efficiency. The produced PbO with nano size is deposited on ITO(Induim Tin Oxide) glass in several temperature using the PIB(particle-in-binder) method. The thickness of the deposited PbO is about $200{\mu}m$. Through the measurement of dark current, sensitivity and SNR(Signal To Noise Ratio), an electrical properties of the produced PbO film are analyzed. Therefore, we show that an electrical properties are changed according to a temperature and that the PbO film that was treated at $500^{\circ}C$ in O2 atmosphere is the most high efficiency x-ray detecting sensor.

  • PDF

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic (다크넷 트래픽의 목적지 포트를 활용한 블랙 IP 탐지에 관한 연구)

  • Park, Jinhak;Kwon, Taewoong;Lee, Younsu;Choi, Sangsoo;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.821-830
    • /
    • 2017
  • The internet is an important infra resource that it controls the economy and society of our country. Also, it is providing convenience and efficiency of the everyday life. But, a case of various are occurred through an using vulnerability of an internet infra resource. Recently various attacks of unknown to the user are an increasing trend. Also, currently system of security control is focussing on patterns for detecting attacks. However, internet threats are consistently increasing by intelligent and advanced various attacks. In recent, the darknet is received attention to research for detecting unknown attacks. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. In this paper, we proposed an algorithm for finding black IPs through collected the darknet traffic based on a statistics data of port information. The proposed method prepared 8,192 darknet space and collected the darknet traffic during 3 months. It collected total 827,254,121 during 3 months of 2016. Applied results of the proposed algorithm, black IPs are June 19, July 21, and August 17. In this paper, results by analysis identify to detect frequency of black IPs and find new black IPs of caused potential cyber threats.

Understanding the Experience of Visual Change Detection Based on the Experience of a Sensory Conflict Evoked by a Binocular Rivalry (양안경합의 감각적 상충 경험에 기초한 시각적 변화탐지 경험에 대한 이해)

  • Shin, Youngseon;Hyun, Joo-Seok
    • Science of Emotion and Sensibility
    • /
    • v.16 no.3
    • /
    • pp.341-350
    • /
    • 2013
  • The present study aimed to understand the sensory characteristic of change detection by comparing the experience of detecting a salient visual change against the experience of detecting a sensory conflict evoked by a binocular mismatch. In Experiment 1, we used the change detection task where 2, 4, or 6 items were short-term remembered in visual working memory and were compared with following test items. The half of change-present trials were manipulated to elicit a binocular rivalry on the test item with the change by way of monocular inputs across the eyes. The results showed that change detection accuracy without the rivalry manipulation declined evidently as the display setsize increased whereas no such setsize effect was observed with the rivalry manipulation. Experiment 2 tested search efficiency for the search array where the target was designated as an item with the rivalry manipulation, and found the search was very efficient regardless of the rivalry manipulation. The results of Experiment 1 and 2 showed that when the given memory load varies, the experience of detecting a salient visual change become similar to the experience of detecting a sensory conflict by a binocular rivalry.

  • PDF

Face Region Tracking Improvement and Hardware Implementation for AF(Auto Focusing) Using Face to ROI (얼굴을 관심 영역으로 사용하는 자동 초점을 위한 얼굴 영역 추적 향상 방법 및 하드웨어 구현)

  • Jeong, Hyo-Won;Ha, Joo-Young;Han, Hag-Yong;Yang, Hoon-Gee;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.89-96
    • /
    • 2010
  • In this paper, we proposed a method about improving face tracking efficiency of face detection for AF system using the faces to the ROI. The conventional face detection system detecting faces based skin color uses the ratio of skin pixels of the present frame to detected face regions of the past frame to track the faces. The tracking method is superior in the stability of the regions but it is inferior in the face tracking efficiency. We proposed a face tracking method using the area of the overlapping region in the detected face regions of the past frame and the present frame to improve the tracking efficiency. The proposed face tracking efficiency demonstration was performed by making a film of face detection with face tracking in real-time and using the moving traces of the detected faces.

A Design of MAC based SDAP(Secure Data Aggregation Protocol) for security and communication efficiency on VANET (VANET에서 보안과 통신효율을 고려한 MAC기반 SDAP(Secure Data Aggregation Protocol) 설계)

  • Lee, Byung-kwan;Ahn, Heui-hak;Jeong, Eun-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.650-652
    • /
    • 2013
  • As VANET(Vehicular Ad-hoc NETwork) improves road safety, efficiency, and comfort, and provides a value-added service such as commerce information or internet access. it is the most important technology in ITS(Intelligent Transportation System). But, In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. VANETs cannot get started without either of them. Therefore, to solve these problems simultaneously, this paper proposes MAC(Message Authentication Code) based SDAP(Secure Data Aggregation Protocol) which removes redundant data or abnormal data between vehicles and verifies the integrity of message. The MAC based SDAP not only improves the efficiency of data delivery but also enhances the security by detecting malicious attacks such as propagation jamming attack, forgery attack, and disguised attack.

  • PDF

An Analysis and Comparison on Efficiency of Load Distribution Algorithm in a Clustered System (클러스터 시스템의 부하분산 알고리즘의 효율성 비교분석)

  • Kim, Seok-Chan;Rhee, Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.2
    • /
    • pp.111-118
    • /
    • 2006
  • In this thesis, we analyze the efficiency of the algorithm to distribute the load in the clustered system, by comparing with the existed algorithm. PWLC algorithm detects each server's load in the system at weighted period, and following the detection of the loads, a set of weights is given to each server. The system allocates new loads to each server according to its weight. PWLC algorithm is compared with DWRR algorithm in terms of variance, waiting time by varying weighted Period. When the weighted period is too short, the system bears a heavy load for detecting load over time. On the other hand, when the weighted period is too long, the load balancing control of the system becomes ineffective. The analysis shows PWLC algorithm is more efficient than DWRR algorithm for the variance and waiting time.

Characteristics of Magnetostrictive Sensor for Detecting the Flaws in Pipe (배관결함 검출을 위한 자왜형 초음파 센서의 특성)

  • Ahn, Bong-Young;Kim, Young-Joo;Kim, Young-Gil;Lee, Seung-Seok
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.20 no.1
    • /
    • pp.46-53
    • /
    • 2000
  • Magnetostrictive sensors which can be used effectively to detect flaws in pipe were fabricated. The optimal conditions to obtain the maximum generation efficiency of the ultrasonic wave were established. In case of the used steel pipe the optimal magnetic field was $250{\sim}350Oe$ and the coil width of 15mm showed the best efficiency for generating a wave with the frequency of 180 kHz. In the best condition, the wave can propagate further than 50m without serious attenuation. The amplitude of the ultrasonic wave reflected from artificial flaw had a good linear relationship to the cross-sectional area of the flaw.

  • PDF