• Title/Summary/Keyword: Detecting-efficiency

Search Result 421, Processing Time 0.027 seconds

Workflow based storing model for XML documents (워크플로우 기반의 XML문서의 변경저장 모델)

  • 배혜림
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.139-154
    • /
    • 2004
  • Recent business environments require a company to communicate frequently with other companies. This makes it essential to use XML (eXtensible Markup Language) documents for integration of information systems. Especially in e-Business environments, change management of documents is important to record and trace the history of the documents. In this paper, we propose a new method of storing a document by detecting changes automatically and reconstructing the document version when a user requests. In addition, based on the method, we also propose a model to recover a document into previous state even when system errors occur. A prototype system is implemented on top of a workflow system and an experiment is carried out to present efficiency of our method. Our approach provides efficiency of storage space and convenient management of documents.

  • PDF

Co-saliency Detection Based on Superpixel Matching and Cellular Automata

  • Zhang, Zhaofeng;Wu, Zemin;Jiang, Qingzhu;Du, Lin;Hu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2576-2589
    • /
    • 2017
  • Co-saliency detection is a task of detecting same or similar objects in multi-scene, and has been an important preprocessing step for multi-scene image processing. However existing methods lack efficiency to match similar areas from different images. In addition, they are confined to single image detection without a unified framework to calculate co-saliency. In this paper, we propose a novel model called Superpixel Matching-Cellular Automata (SMCA). We use Hausdorff distance adjacent superpixel sets instead of single superpixel since the feature matching accuracy of single superpixel is poor. We further introduce Cellular Automata to exploit the intrinsic relevance of similar regions through interactions with neighbors in multi-scene. Extensive evaluations show that the SMCA model achieves leading performance compared to state-of-the-art methods on both efficiency and accuracy.

In-Process Control of an Infant Formula with Rice Starch using Rheology (쌀 전분의 유동성을 함유한 영.유아용 조제분유의 공정 관리)

  • Heo, Young-Suk;Konuklar, Gul
    • Journal of Dairy Science and Biotechnology
    • /
    • v.26 no.2
    • /
    • pp.45-49
    • /
    • 2008
  • We studied the feasibility of monitoring and controlling the manufacturing process of an infant formula with rice starch by testing in-process samples using rheology. We used DSC to first determine the gelatinization temperature of the rice starch, a key ingredient of this product. With this characteristic temperature and the process design known, rheological measurements were conducted on the in-process samples for detecting the presence and extent of gelatinization and retrogradation of rice starch; in-process samples were collected from the carbohydrate tank, after the homogenizer, and the finished product tank. The correlation between the rheological measurements on these samples and manufacturing performance proved that rheology is a very sensitive tool for monitoring the structural development of this infant formula during main process, and their influence on sterilization efficiency. We observed that the lower degree of gelatinization during main process, a shorter residence time in the finished product tank, and using caustic flush rather than clean-in-place additively lead to higher sterilization efficiency. These findings can be utilized for a rational design and analysis of the manufacturing process for infant formulas containing rice starch.

  • PDF

A two-stage structural damage detection method using dynamic responses based on Kalman filter and particle swarm optimization

  • Beygzadeh, Sahar;Torkzadeh, Peyman;Salajegheh, Eysa
    • Structural Engineering and Mechanics
    • /
    • v.83 no.5
    • /
    • pp.593-607
    • /
    • 2022
  • To solve the problem of detecting structural damage, a two-stage method using the Kalman filter and Particle Swarm Optimization (PSO) is proposed. In this method, the first PSO population is enhanced using the Kalman filter method based on dynamic responses. Due to noise in the sensor responses and errors in the damage detection process, the accuracy of the damage detection process is reduced. This method proposes a novel approach for solve this problem by integrating the Kalman filter and sensitivity analysis. In the Kalman filter, an approximate damage equation is considered as the equation of state and the damage detection equation based on sensitivity analysis is considered as the observation equation. The first population of PSO are the random damage scenarios. These damage scenarios are estimated using a step of the Kalman filter. The results of this stage are then used to detect the exact location of the damage and its severity with the PSO algorithm. The efficiency of the proposed method is investigated using three numerical examples: a 31-element planer truss, a 52-element space dome, and a 56-element space truss. In these examples, damage is detected for several scenarios in two states: using the no noise responses and using the noisy responses. The results show that the precision and efficiency of the proposed method are appropriate in structural damage detection.

A Novel Technique for Detection of Repacked Android Application Using Constant Key Point Selection Based Hashing and Limited Binary Pattern Texture Feature Extraction

  • MA Rahim Khan;Manoj Kumar Jain
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.141-149
    • /
    • 2023
  • Repacked mobile apps constitute about 78% of all malware of Android, and it greatly affects the technical ecosystem of Android. Although many methods exist for repacked app detection, most of them suffer from performance issues. In this manuscript, a novel method using the Constant Key Point Selection and Limited Binary Pattern (CKPS: LBP) Feature extraction-based Hashing is proposed for the identification of repacked android applications through the visual similarity, which is a notable feature of repacked applications. The results from the experiment prove that the proposed method can effectively detect the apps that are similar visually even that are even under the double fold content manipulations. From the experimental analysis, it proved that the proposed CKPS: LBP method has a better efficiency of detecting 1354 similar applications from a repository of 95124 applications and also the computational time was 0.91 seconds within which a user could get the decision of whether the app repacked. The overall efficiency of the proposed algorithm is 41% greater than the average of other methods, and the time complexity is found to have been reduced by 31%. The collision probability of the Hashes was 41% better than the average value of the other state of the art methods.

DETECTING OF SCUFFING USING ACOUSTIC EMISSION

  • Kim, J.H.;Kim, T.W.;Cho, Y.J.
    • Proceedings of the Korean Society of Tribologists and Lubrication Engineers Conference
    • /
    • 2002.10b
    • /
    • pp.191-192
    • /
    • 2002
  • The scuffing failure is a critical problem in modern machine components, especially for the requirement of high efficiency and small size. In this study. scuffing experiments are conducted using Acoustic Emission(AE) measurement by an indirect sensing approach to detect scuffing failure. Using AE signals we con get and indication about the state of the friction processes, about the quality of solid and liquid layers on the contacting surface in real time. The FFT(Fast Fourier Transform)analyses of the AE signal are used to understand the interfacial interaction and the relationship between the AE signal and the state of contact is presented.

  • PDF

A Study on Pathology Detection for X-Ray Chest Fluoroscopy (2) X-선 간접촬영 흉부영상의 병변패턴 검출)

  • Kim Young seo;Hwang Chung Yeun;Her Man Yong;Yoo Dae In
    • Journal of The Korean Radiological Technologist Association
    • /
    • v.25 no.1
    • /
    • pp.171-176
    • /
    • 1999
  • The detection of X-ray fluoroscopy is tedious and time-consuming for human doing. Lowering of efficiency for chest diagnosis is caused by lots mistakes of radiologist because of detecting the micro pathology from the film of small size. Therefore, in the

  • PDF

Safety Enhancement in Operation of Mobile Robots using Preview Control (예견제어를 이용한 이동로봇 운전의 안전성 향상)

  • Yoon, Sang-Pil;Choi, Gi Sang
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • In industry AGV's(automated guided vehicles) that can detect and follow guidelines drawn on the factory floor using magnetic or optical sensors are widely used. However, such AGV's without preview capability cannot effectively avoid collision with obstacles that may occasionally pass through the guideline. Furthermore, without preview information, they consume much energy at the right angle corners as they have to make sudden directional change. Also, the risk of dropping payloads increases in such situations. In this study, infrared preview sensors were adopted to a mobile robot for detecting not only the current position but also the forward position of the guideline and the preview control technique was applied to optimally control the mobile robot's motion using the information from the infrared preview sensors. Then the effectiveness of this approach was investigated through a series of experiments. The experimental result shows that the proposed approach is effective for safety enhancement as well as for better efficiency.

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

  • Ma, Chuan;Shen, Limin;Wang, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.659-679
    • /
    • 2015
  • Distributed applications are composed of multiple nodes, which exchange information with individual nodes through message passing. Compared with traditional applications, distributed applications have more complex behavior patterns because a large number of interactions and concurrent behaviors exist among their distributed nodes. Thus, it is difficult to detect anomalous behaviors and determine the location and scope of abnormal nodes, and some attacks and misuse cannot be detected. To address this problem, we introduce a method for detecting anomalous behaviors based on process algebra. We specify the architecture of the behavior detection model and the detection algorithm. The anomalous behavior detection and analysis demonstrate that our method is a good discriminator between normal and anomalous behavior characteristics of distributed applications. Performance evaluation shows that the proposed method enhances efficiency without security degradation.

Radar Signal Analysis of Voids under Concrete Using Convolution Technique (컨볼루션 기법을 이용한 콘크리트 배면 공동의 레이더 신호해석)

  • 박석균;한자경
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1999.10a
    • /
    • pp.713-716
    • /
    • 1999
  • The presence of voids under pavements or behind tunnel linings results in the deterioration. One method of detecting such voids by non-destructive means is radar. This research is devoted to quantitatively evaluating the efficiency of such non-destructive tests with radar. As a foundation to this ongoing research, which aims to estimate the thickness of voids using radar, an analysis method based on radar signal processing using convolution technique is carried out with various void thicknesses in embedded layer which has different electromagnetic properties. The computed results were verified by comparing the test results. As a result, a proposed method in this study has a possibilty of estimating the thickness of voids with good accuracy.

  • PDF