• Title/Summary/Keyword: Event Filtering

Search Result 96, Processing Time 0.025 seconds

Comparison of CNN and GAN-based Deep Learning Models for Ground Roll Suppression (그라운드-롤 제거를 위한 CNN과 GAN 기반 딥러닝 모델 비교 분석)

  • Sangin Cho;Sukjoon Pyun
    • Geophysics and Geophysical Exploration
    • /
    • v.26 no.2
    • /
    • pp.37-51
    • /
    • 2023
  • The ground roll is the most common coherent noise in land seismic data and has an amplitude much larger than the reflection event we usually want to obtain. Therefore, ground roll suppression is a crucial step in seismic data processing. Several techniques, such as f-k filtering and curvelet transform, have been developed to suppress the ground roll. However, the existing methods still require improvements in suppression performance and efficiency. Various studies on the suppression of ground roll in seismic data have recently been conducted using deep learning methods developed for image processing. In this paper, we introduce three models (DnCNN (De-noiseCNN), pix2pix, and CycleGAN), based on convolutional neural network (CNN) or conditional generative adversarial network (cGAN), for ground roll suppression and explain them in detail through numerical examples. Common shot gathers from the same field were divided into training and test datasets to compare the algorithms. We trained the models using the training data and evaluated their performances using the test data. When training these models with field data, ground roll removed data are required; therefore, the ground roll is suppressed by f-k filtering and used as the ground-truth data. To evaluate the performance of the deep learning models and compare the training results, we utilized quantitative indicators such as the correlation coefficient and structural similarity index measure (SSIM) based on the similarity to the ground-truth data. The DnCNN model exhibited the best performance, and we confirmed that other models could also be applied to suppress the ground roll.

S-wave Velocity Structure and Radial Anisotropy of Saudi Arabia from Surface Wave Tomography (표면파 토모그래피를 이용한 사우디아라비아의 S파 속도구조 및 이방성 연구)

  • Kim, Rinhui;Chang, Sung-Joon;Mai, Martin;Zahran, Hani
    • Geophysics and Geophysical Exploration
    • /
    • v.22 no.1
    • /
    • pp.21-28
    • /
    • 2019
  • We perform a 3D tomographic inversion using surface wave dispersion curves to obtain S-velocity model and radial anisotropy beneath Saudi Arabia. The Arabian Peninsula is geologically and topographically divided into a shield and a platform. We used event data with magnitudes larger than 5.5 and epicentral distances shorter than $40^{\circ}$ during 2008 ~ 2014 from the Saudi Geological Survey. We obtained dispersion curves by using the multiple filtering technique after preprocessing the event data. We constructed SH- and SV-velocity models and consequently radial anisotropy model at 10 ~ 60 km depths by inverting Love and Rayleigh group velocity dispersion curves with period ranges of 5 ~ 140 s, respectively. We observe high-velocity anomalies beneath the Arabian shield at 10 ~ 30 km depths and low-velocity anomalies beneath the Arabian platform at 10 km depth in the SV-velocity model. This discrepancy may be caused by the difference between the Arabian shield and the Arabian platform, that is, the Arabian shield was formed in Proterozoic thereby old and cold, while the Arabian platform is covered by predominant Paleozoic, Mesozoic, and Cenozoic sedimentary layers. Also we obtained radial anisotropy by estimating the differences between SH- and SV-velocity models. Positive anisotropy is observed, which may be generated by lateral tension due to the slab pull of subducting slabs along the Zagros belt.

Modeling and Implementation of Firewall and IPS for Security Simulation on Large-scale Network Using SSFNet (SSFNet을 이용한 대규모 네트워크상에서의 보안 시뮬레이션을 위한 방화벽과 IPS모듈의 모델링 및 구현)

  • Kim, Yong-Tak;Kwon, Oh-Jun;Kim, Tai-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1037-1044
    • /
    • 2006
  • It's difficult to check cyber attacks and the performance of a security system in a real large-scale network. Generally, a new security system or the effect of a new security attack are checked by simulation. We use SSFNet to simulate our security system and cyber attack. SSFNet is an event-driven simulation tools based on process, which has a strength to be capable of expressing a large-scale network. But it doesn't offer any API's which can manipulate not only the related function of security but also the packet. In this paper, we developed a firewall and IPS class, used for a security system, and added to them components of SSFNet. The firewall is modelled a security system based on packet filtering. We checked the function of the firewall and the IPS with network modelled as using our SSFNet. The firewall blocks packets through rules of an address and port of packets. The result of this simulation shows that we can check a status of packets through a log screen of IPS installed in a router and confirm abnormal packet to be dropped.

  • PDF

Intelligent Multi-Agent Distributed Platform based on Dynamic Object Group Management using Fk-means (Fk means를 이용한 동적객체그룹관리기반 지능형 멀티 에이전트 분산플랫폼)

  • Lee, Jae-wan;Na, Hye-Young;Mateo, Romeo Mark A.
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.101-110
    • /
    • 2009
  • Multi-agent systems are mostly used to integrate the intelligent and distributed approaches to various systems for effective sharing of resources and dynamic system reconfigurations. Object replication is usually used to implement fault tolerance and solve the problem of unexpected failures to the system. This paper presents the intelligent multi-agent distributed platform based on the dynamic object group management and proposes an object search technique based on the proposed filtered k-means (Fk-means). We propose Fk-means for the search mechanism to find alternative objects in the event of object failures and transparently reconnect client to the object. The filtering range of Fk-means value is set only to include relevant objects within the group to perform the search method efficiently. The simulation result shows that the proposed mechanism provides fast and accurate search for the distributed object groups.

  • PDF

Design of U-Health System based on Embedded Event Filtering (EEF 기반의 U-Health 시스템 설계)

  • Kim, Jae-In;Na, Chul-Su;Han, Dae-Young;Kim, Dae-In;Hwang, Bu-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.2
    • /
    • pp.88-96
    • /
    • 2009
  • In this paper we suggest the EEF technique to improve the performance of U-Health System. The idea of the EEF technique is that a sensor node sends only the abnormal data of patients to the base node. This technique reduces the amount of data transfer between a base node and sensor nodes, and so the power consumption of sensor nodes will be saved. And also the processing cost of base node will be reduced. In the suggested U-Health System based on EEF technique, electrocardiogram sensors and GPS sensors are used to send the electrocardiogram and position information of patients to a server. The server analyzes the health state of patients from base nodes and sends the information about the patients in the emergent state to the nearest hospital. Through the simulation, we have confirmed the suitability of EEF technique for U-Health System.

Processing of Sensor Data Stream for OSGi Frameworks (OSGi를 위한 실시간 센서 데이터스트림 처리 방법)

  • Cha, Ji-Yun;Byun, Yung-Cheol;Lee, Dong-Cheal
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.1014-1021
    • /
    • 2009
  • In an environment of home network where a number of technologies including heterogeneous hardware platforms, networking and protocols, middleware systems, and etc, exist, OSGi provides a platform for deployment and sharing of services managed in hardware and guarantees compatibility among applications. However, only simple control and processing of event data are considered in a home network using OSGi, and the consideration about real time processing of data stream generated by sensors is not enough. Therefore, researches allowing users to effectively develop OSGi applications by using various kinds of sensors generating data streams in the home network environment using OSGi are needed. In this paper, we propose an effective method of processing various types of real time data streams supplied to OSGi applications, including filtering, grouping, and counting, etc.

Enhancement of Evoked Potential Waveform using Delay-compensated Wiener Filtering (지연보상 위너 필터링에 의한 유발전위 파형개선)

  • Lee, JeeEun;Yoo, Sun K.
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.261-269
    • /
    • 2013
  • In this paper, the evoked potential(EP) was represented by additive delay model to comply with the variational noisy response of stimulus-event synchronization. The hybrid method of delay compensated-Wiener filtered-ensemble averaging(DWEA) was proposed to enhance the EP signal distortion occurred during averaging procedure due to synchronization timing mismatch. The performance of DWEA has been tested by surrogated simulation, which is composed of synthesized arbitrary delay and arbitrary level of added noise. The performance of DWEA is better than those of Wiener filtered-ensemble averaging and of conventional ensemble averaging. DWEA is endurable up to added noise gain of 7 for 10 % mean square error limit. Throughout the experimentation observation, it has been demonstrated that DWEA can be applied to enhance the evoked potential having the synchronization mismatch with added noise.

Design of Push Agent Model for transmission of the Efficient Information (효율적인 정보 전송을 위한 푸시 에이전트 모델 설계)

  • 최은실;김광종;이연식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.545-549
    • /
    • 2002
  • For the efficient method for acquisition of informations suitable to user's preferences and objectives in distributed environment, various researches on push agent which automatically processes its roles and sends the results to users are continued. The existing push agent models have induced increasing network overheads and traffics by continuous transmission of informations in the network environment of limitative bandwidth. In this paper, for the solution of the problems on these existing push agent systems and their interoperability, we design a push agent model based on CORBA event service. The proposed model solves the above problems and provides the retrieved results which are more suitable for user's requirement more fast and stably through the optimal path searching and controling method. And, it also supports the filtering technique for processing the duplicated or useless data that comes from the various distributed information systems.

  • PDF

A Short Seismic Reflection Survey for Delineating the Basement and the Upper Units of the Gomso Bay, Yellow Sea (곰소만 지역의 기반암 및 상부 층서 파악을 위한 시험 탄성파반사법 탐사)

  • Kim Ji-Soo;Ryang Woo-Hun;Han Soo-Hyung;Kim Hak-Soo
    • The Journal of Engineering Geology
    • /
    • v.16 no.2 s.48
    • /
    • pp.161-169
    • /
    • 2006
  • A short seismic reflection survey was performed to map the basement and the upper units in the Gomso Bay. This research was mainly aimed at clarifying the basement by improving the signal-to-noise ratio in data processing steps. The strategies employed in this research included enhancement of the signal interfered with large-amplitude noise, through pre- and post-stack processing such as time-variant filtering, bad trace edit, careful muting after f-k filter and NMO correction. The subsurface structure mapped from this survey mainly consists of the top of basement and the upper three units, which were well correlated to the result from the previously conducted MT survey. Furthermore seismic section clarifies approximately 30m deep subhorizontal event of the top of the basement, which was not shown in the central portion of the MT section due to data qualify.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.