• Title/Summary/Keyword: Issue Detection

Search Result 587, Processing Time 0.026 seconds

Performance Improvement of the Linear BLDC Generator in a NASA Deep Space Explorer

  • Lee, Hyung-Woo
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.4B no.3
    • /
    • pp.108-113
    • /
    • 2004
  • This paper presents methods to improve performance of the power supply system in a NASA deep space explorer. In the Stirling engine driven reciprocating Brushless DC (BLDC) generator, the accurate position information of the prime mover is important to diagnose the performance of the engine and prevent distortion of the output power. Since sensors to detect the position are fragile and unreliable, and conventional sensorless techniques have drawbacks in the low speed region, a novel sensorless position detection technique for the prime mover has been proposed and verified. Another major issue of the generator for the spacecraft is power density maximization. The mass of the power system is important to the mass of the satellite. Therefore, the components of the spacecraft should be lightweight. Conventional rectification methods cannot achieve the maximum power possible due to non-optimal current waveforms. The optimal current waveform for maximizing power density and minimizing machine size and weight in a nonsinusoidal power supply system has been derived, incorporated in a control system, and verified by simulation work.

Design and Implementation of an Enhanced Secure Android-Based Smartphone using LIDS

  • Lee, Sang Hun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.49-55
    • /
    • 2012
  • Recently, with the rapid development of android-based smartphones, it is becomes a major security issue that the case of Android platform is an open platform. so it is easy to be a target of mobile virus penetration and hacking. Even there are a variety of security mechanisms to prevent the vulnerable points of the Android platform but the reason of most of the security mechanisms were designed at application-level that highly vulnerable to the attacks directly to the operating system or attacks using the disadvantages of an application's. It is necessary that the complementary of the android platform kernel blocks the kernel vulnerability and the application vulnerability. In this paper, we proposed a secure system using linux-based android kernel applied to LIDS(Linux Intrusion Detection and Defense System) and applied a smart phone with s5pc110 chip. As a result, the unauthorized alteration of the application was prevented with a proposed secure system.

Enhanced Inter-Symbol Interference Cancellation Scheme for Diffusion Based Molecular Communication using Maximum Likelihood Estimation

  • Raut, Prachi;Sarwade, Nisha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5035-5048
    • /
    • 2016
  • Nano scale networks are futuristic networks deemed as enablers for the Internet of Nano Things, Body area nano networks, target tracking, anomaly/ abnormality detection at molecular level and neuronal therapy / drug delivery applications. Molecular communication is considered the most compatible communication technology for nano devices. However, connectivity in such networks is very low due to inter-symbol interference (ISI). Few research papers have addressed the issue of ISI mitigation in molecular communication. However, many of these methods are not adaptive to dynamic environmental conditions. This paper presents an enhancement over original Memory-1 ISI cancellation scheme using maximum likelihood estimation of a channel parameter (λ) to make it adaptable to variable channel conditions. Results of the Monte Carlo simulation show that, the connectivity (Pconn) improves by 28% for given simulation parameters and environmental conditions by using enhanced Memory-1 cancellation method. Moreover, this ISI mitigation method allows reduction in symbol time (Ts) up to 50 seconds i.e. an improvement of 75% is achieved.

Validation of a new magnetometric survey for mapping 3D subsurface leakage paths

  • Park, DongSoon;Jessop, Mike L.
    • Geosciences Journal
    • /
    • v.22 no.6
    • /
    • pp.891-902
    • /
    • 2018
  • Techniques for more reliable detection of 3D subsurface flow paths are highly important for most water-related geotechnical projects. In this case study, a magnetometric resistivity method with a new approach and state-of-the-art technology ("Willowstick survey") was applied to the testbed dam (YD dam) site, and its applicability was validated by geotechnical investigation techniques including borehole drilling and sampling, Lugeon test, flow direction and velocity test, and seismic tomography. In addition to the magnetometric survey, a 3D electrical resistivity survey was performed independently and the results were compared and discussed. The electrical resistivity survey was effective in detecting groundwater levels, but it was limited in mapping leakage paths. On the other hand, the Willowstick magnetometric survey effectively detected geologic weaknesses (e.g., fault fracture) and potential leakage paths of the dam site foundation rocks. The results of this research are expected to be effective for water infrastructures where leakage is an important issue.

Structural Health Monitoring for Trains: A review of damage detection methods (철도차량 구조건전성모니터링: 손상 감지 기술 분석)

  • Chong, See-Yenn;Lee, Jung-Ryul;Kim, Jung-Seok;Yoon, Hyuk-Jin
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1545-1561
    • /
    • 2008
  • Among all transportations, railway transports have been promisingly offering excellent energy conservation and travelling time. Inevitably, they become a main role in not only transport goods but also passengers. With leap in development of technology, trains have tremendously enhanced their services in terms of speed, accessibility and comfort. However, the safety and ride quality have become a main issue as the train speed increased. The higher speeds have led the structural dynamics and health must be monitored from time to time to ensure that they are in good condition to provide reliable ride. Among all monitoring systems, the structural health monitoring (SHM) systems are imperative important due to its capability of in-situ monitoring and inherently reduce the maintenance frequencies and the huge associated cost. In this paper, SHM systems and the related non-destructive test and evaluation methods were discussed. The types of damages related to train vehicles as well as the damage hot spots are also included in this paper.

  • PDF

Social WISDOM: A Issue Detection/Monitoring System (소셜위즈덤: 소셜미디어 이슈 탐지/모니터링 시스템)

  • Lee, Chung-Hee;Kim, Hyun-Jin;Oh, Hyo-Jung;Hur, Jeong;Ryu, Pum-Mo;Kim, Hyun-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.431-434
    • /
    • 2012
  • 본 논문에서는 소셜 빅데이터에 대한 심층적 언어분석을 통해 이슈를 탐지하고 모니터링하는 소셜위즈덤 시스템을 소개한다. 소셜위즈덤은 키워드의 단순 빈도 정보 외에도 이슈의 신규성, 중요성, 파급력, 관심도, 신뢰도 등을 수치화한 이슈성지수에 기반한 이슈성 측정이 가능하여 정확한 이슈탐지가 가능하다. 또한, 추가적인 정보로 단순 긍부정 분석이 아닌 17 개의 세부감성을 분석해서 제공하고 긍부정에 대한 호불호의 원인분석 정보도 제공하므로, 소셜미디어 분석에 기반한 깊은 인사이트를 제공하여 사용자의 의사결정에 많은 도움을 줄 수 있다.

Bias Detection on Opposition Issue (대립 관계에 있는 이슈에서의 바이어스 탐지)

  • Kwon, A-Rong;Tsolmon, Bayar;Lee, Kyung-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.398-401
    • /
    • 2012
  • 사람들은 기업이나 제품에 대해 자신의 생각이 긍정적인지 부정적인지 표현하고자 한다. 트위터 사용자들은 트윗을 통해 자신의 생각을 표현한다. 본 논문에서는 트위터 데이터를 대상으로 대립관계에 있는 이슈에서의 바이어스 탐지 방법을 제안한다. 비지도학습 방법을 이용하여 트윗 패턴을 통해 세부자질을 추출하며, 세부자질에 대한 감정에 따른 확률 테이블을 구축하여 바이어스 탐지를 수행한다. 제안 방법의 유효성을 검증하기 위해 4 개의 대립 이슈에 대해 평가를 하였으며, 제안 모델이 기존의 모델보다 우수한 성능을 보였다.

Problems of Regulatory and Legal Support of Polygraph Application in Ukraine

  • Irkha, Yurii;Butenko, Oleksii;Pogrebytskyi, Mykola;Manzhai, Oleksandr;Krushynskyi, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.203-206
    • /
    • 2021
  • The article is devoted to the study of the problems of polygraphic research to obtain forensically significant information. An analysis of the legal basis for the use of the polygraph in Ukraine. Problematic issues concerning the appropriateness of using a polygraph in the investigation and detection of crimes have been studied. The domestic legal norms that regulate this issue, as well as foreign experience are analyzed. The article reveals the essence of the polygraph, the legal basis and requirements for its use. Attention is drawn to the main difficulties of using a polygraph and ways to solve them.

Effect of oxide film on ECT detectability of surface IGSCC in laboratory-degraded alloy 600 steam generator tubing

  • Lee, Tae Hyun;Ryu, Kyung Ha;Kim, Hong Deok;Hwang, Il Soon;Kim, Ji Hyun;Lee, Min Ho;Choi, Sungyeol
    • Nuclear Engineering and Technology
    • /
    • v.51 no.5
    • /
    • pp.1381-1389
    • /
    • 2019
  • Stress corrosion cracking (SCC) widely found in both primary and secondary sides of steam generator (SG) tubing in pressurized water reactors (PWR) has become an important safety issue. Using eddy-current tests (ECTs), non-destructive evaluations are performed for the integrity management of SG tubes against intergranular SCC. To enhance the reliability of ECT, this study investigates the effects of oxide films on ECT's detection capabilities for SCC in laboratory-degraded SG tubing in high temperature and high pressure aqueous environment.

Identifying SDC-Causing Instructions Based on Random Forests Algorithm

  • Liu, LiPing;Ci, LinLin;Liu, Wei;Yang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1566-1582
    • /
    • 2019
  • Silent Data Corruptions (SDCs) is a serious reliability issue in many domains of computer system. The identification and protection of the program instructions that cause SDCs is one of the research hotspots in computer reliability field at present. A lot of solutions have already been proposed to solve this problem. However, many of them are hard to be applied widely due to time-consuming and expensive costs. This paper proposes an intelligent approach named SDCPredictor to identify the instructions that cause SDCs. SDCPredictor identifies SDC-causing Instructions depending on analyzing the static and dynamic features of instructions rather than fault injections. The experimental results demonstrate that SDCPredictor is highly accurate in predicting the SDCs proneness. It can achieve higher fault coverage than previous similar techniques in a moderate time cost.