• Title/Summary/Keyword: Event Monitoring

Search Result 656, Processing Time 0.024 seconds

Home monitoring system based on sound event detection for the hard-of-hearing (청각장애인을 위한 사운드 이벤트 검출 기반 홈 모니터링 시스템)

  • Kim, Gee Yeun;Shin, Seung-Su;Kim, Hyoung-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.4
    • /
    • pp.427-432
    • /
    • 2019
  • In this paper, we propose a home monitoring system using sound event detection based on a bidirectional gated recurrent neural network for the hard-of-hearing. First, in the proposed system, packet loss concealment is used to recover a lost signal captured through wireless sensor networks, and reliable channels are selected using multi-channel cross correlation coefficient for effective sound event detection. The detected sound event is converted into the text and haptic signal through a harmonic/percussive sound source separation method to be provided to hearing impaired people. Experimental results show that the performance of the proposed sound event detection method is superior to the conventional methods and the sound can be expressed into detailed haptic signal using the source separation.

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF

Runoff Characteristics of Nonpoint Pollutants Source in Urban Area (중소도시지역 비점오염물질의 유출 특성)

  • Lee, Geon-Jik;Seong, Jin-Uk;Park, Ju-Hyun;Joe, Gyu-Soo;Park, Je-Chul
    • Journal of Environmental Science International
    • /
    • v.19 no.7
    • /
    • pp.819-827
    • /
    • 2010
  • This study was conducted to investigate runoff characteristics of non-point pollutants source at the urban area in boeun area, Chungbuk Province. The monitoring site covering the watershed of $2.11\;km^2$ contains about 40.3 % of total watershed with the urban area. The monitoring was conducted with six events for five months and Event Mean Concentration(EMC) and Site Mean Concentration(SMC) of SS, BOD, CODMn, T-N, T-P were calculated on the result of the water quality parameters. As a result of the comparion between Arithmetic Mean Concentration and Event Mean Concentration, it showed that over all Event Mean Concentration was higher than Arithmetic Mean Concentration. And it showed that SS, BOD, T-P featured the first-flushing effect, showing relatively high concentration in early-stage storm event.

Monitoring and Tracking of Time Series Security Events using Visualization Interface with Multi-rotational and Radial Axis (멀티 회전축 및 방사축 시각화 인터페이스를 이용한 시계열 보안이벤트의 감시 및 추적)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.33-43
    • /
    • 2018
  • In this paper, we want to solve the problems that users want to search the progress of attack, continuity of attack, association between attackers and victims, blocking priority and countermeasures by using visualization interface with multi-rotational axis and radial axis structure. It is possible to effectively monitor and track security events by arranging a time series event based on a multi-rotational axis structured by an event generation order, a subject of an event, an event type, and an emission axis, which is an objective time indicating progress of individual events. The proposed interface is a practical visualization interface that can apply attack blocking and defense measures by providing the progress and progress of the whole attack, the details and continuity of individual attacks, and the relationship between attacker and victim in one screen.

  • PDF

Development of a Data Structure for Effective Monitoring of Power Plant Start-up Sequences (화력 발전소의 기동 시퀀스 진행 모니터링을 위한 자료구조 개발)

  • Lee, Seung-Chul;Han, Seung-Woo;Kim, Seung-Jin
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.12
    • /
    • pp.224-232
    • /
    • 2009
  • Power plant start-up is a complicate process involving hundreds of operations that should be performed either automatically or manually. Several major operations should be proceeded in parallel and each major operation is again broken down into detailed operations that must be carried out in a strict sequence. Even though most of the operations are automated, still substantial portions of the operations are carried out manually and the operational status should be monitored by the crew members, which are quite stressful tasks to be performed in real time. In this paper, a data structure called an Event Sequence Monitoring Graph(ESMG) is proposed for monitoring a sequence of events involved in the power plant start-up process. The ESMG is currently being applied to a thermal power plant with a rated output of 500MW. An application example is shown with the boiler feed water pump system start-up process, which exhibits a good potential for future applications.

Science Festival and Science Communication: A Case Study for the April 1997's Science Month in Korea (과학축전과 과학커뮤니케이션 : 1997년 4월‘과학의 달’행사를 중심으로)

  • 김학수
    • Journal of Technology Innovation
    • /
    • v.6 no.1
    • /
    • pp.99-127
    • /
    • 1998
  • The purposes of this study are first, to plan communication strategies for promoting the 1st National Science Festival and other events of the April 1997's Science Month in Koreas; second, to monitor communication activities done for those events; third, to evaluate effects of communication activities. Both the Ministry of Science and Technology and the Korea Science Foundation were arranged to execute our planned communication strategies. Basically we utilized the three sequences of human behavioral condition : Exposure, attention, and cognition. For planning, we suggested concrete communication strategies for each sequence, for example, first, those for bringing exposure to every event, second, those for bringing attention to the event, and third, those for bringing cognition of the event. Those communication strategies were suggested to use specifics of newspapers, television programs, radio programs, commercial and corporate magazines, electric visual sign advertisements on the street, and computer communication. For monitoring and evaluation, we used the same three sequences as the criteria. For example, we monitored and evaluated how much exposure, attention or cognition an event got or which specific medium contributed to exposure to, cognition of an event. For monitoring, graduate students were dispatched to examine each event through watching and interviewing. For evaluation, about 950 of event participants and non-participants were surveyed by means of face-to-face interview. Overall, we found that newspaper articles and television programs contributed a lot to people's exposure to events of the April 1997's Science Month. Especially, newspaper played a major role of heightening exposure. However, most events and/or their science and technology content failed to get salient attention and its following active cognition. The 1st National Science Festival attracted much exposure, but had some problems of disorder and commercialism. This sharp increase of exposure and some attention were believed to have reinforced people's, especially event participants' positive opinion of science and technology which is part of scientific culture.

  • PDF

Optical Network Monitoring Systems for Special Ships (특수 선박용 광 네트워크 모니터링 시스템)

  • Lee, Seong-Real
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.560-563
    • /
    • 2012
  • Hardware and software of optical network monitoring system for optical network installed in ship for providing massive information are designed and fabricated. And, we investigated whether the fabricated system will accurately monitoring three events of optical cable extension, macrobanding and ferrule dust, which are related with special situation of ship, or not through the experiment. We used the combined method of chained branch and dark fiber for designing and fabricating hardware of optical network monitoring system for optimal corresponding with network configuration in ship. And, we confirmed that the proposed system excellently trace within 5 m range of event point in all three cases by investigating each event experiments.

  • PDF

Micro-seismic monitoring in mines based on cross wavelet transform

  • Huang, Linqi;Hao, Hong;Li, Xibing;Li, Jun
    • Earthquakes and Structures
    • /
    • v.11 no.6
    • /
    • pp.1143-1164
    • /
    • 2016
  • Time Delay of Arrival (TDOA) estimation methods based on correlation function analysis play an important role in the micro-seismic event monitoring. It makes full use of the similarity in the recorded signals that are from the same source. However, those methods are subjected to the noise effect, particularly when the global similarity of the signals is low. This paper proposes a new approach for micro-seismic monitoring based on cross wavelet transform. The cross wavelet transform is utilized to analyse the measured signals under micro-seismic events, and the cross wavelet power spectrum is used to measure the similarity of two signals in a multi-scale dimension and subsequently identify TDOA. The offset time instant associated with the maximum cross wavelet transform spectrum power is identified as TDOA, and then the location of micro-seismic event can be identified. Individual and statistical identification tests are performed with measurement data from an in-field mine. Experimental studies demonstrate that the proposed approach significantly improves the robustness and accuracy of micro-seismic source locating in mines compared to several existing methods, such as the cross-correlation, multi-correlation, STA/LTA and Kurtosis methods.

Design and Implementation of Performance Analysis Tool For User-Defined Performance Analysis (사용자 정의 성능 분석을 지원하는 성능 감시 도구의 설계 및 구현)

  • Ma, Dai-Sung;Kim, Byung-Ki
    • Journal of The Korean Association of Information Education
    • /
    • v.2 no.2
    • /
    • pp.245-251
    • /
    • 1998
  • This paper designs RDL/PAL interface and performance monitoring tool with providing the Event Expressions. RDL/PAL suggests interface of instrumentation layer and performance analysis layer so that it can extract event data from various trace formats. Also, the Event Expressions is similar to the normal program language, which make possible to obtain result of performance analysis. The programmer can analyze performance regardless of trace format by using the performance monitoring tool which has so much merits.

  • PDF

Topological Locating of Power Quality Event Source

  • Won Dong-Jun;Moon Seung-Il
    • Journal of Electrical Engineering and Technology
    • /
    • v.1 no.2
    • /
    • pp.170-176
    • /
    • 2006
  • This paper proposes a topological locating algorithm to determine the location of the power quality event source. This algorithm makes use of the information on the topology of the monitored network and on the direction of PQ events. As a result, the bus incidence matrix is modified using monitor location and the direction matrix is constructed. With this information, the algorithm determines the suspected locations of the PQ events. To reduce suspicious areas, it utilizes event cause and related equipment. In case of line fault event, it calculates the distance from the monitor to the location of event source. The overall algorithm is applied to the IEEE test feeder and accurately identifies the event source location.