• Title/Summary/Keyword: Issue Detection

Search Result 587, Processing Time 0.03 seconds

Statistical division of compressive strength results on the aspect of concrete family concept

  • Jasiczak, Jozef;Kanoniczak, Marcin;Smaga, Lukasz
    • Computers and Concrete
    • /
    • v.14 no.2
    • /
    • pp.145-161
    • /
    • 2014
  • The article presents the statistical method of grouping the results of the compressive strength of concrete in continuous production. It describes the method of dividing the series of compressive strength results into batches of statistically stable strength parameters at specific time intervals, based on the standardized concept of "concrete family". The article presents the examples of calculations made for two series of concrete strength results, from which sets of decreased strength parameters were separated. When assessing the quality of concrete elements and concrete road surfaces, the principal issue is the control of the compressive strength parameters of concrete. Large quantities of concrete mix manufactured in a continuous way should be subject to continuous control. Standardized approach to assessing the concrete strength proves to be insufficient because it does not allow for the detection of subsets of the decreased strength results, which in turn makes it impossible to make adjustments to the concrete manufacturing process and to identify particular product or area on site with decreased concrete strength. In this article two independent methods of grouping the test results of concrete with statistically stable strength parameters were proposed, involving verification of statistical hypothesis based on statistical tests: Student's t-test and Mann - Whitney - U test.

A Study on Network Security Modeling using Single Sign-On (Single Sign-On을 적용한 네트워크 보안 모델링)

  • 서희석;김희완
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.49-56
    • /
    • 2004
  • With the growing usage of the networks, the users in the Internet uses some kinds of web server. They confused that each web server uses the different user ID and passwords. To solve these problems, SSO (Single Sign-On) solution is introduced. We presents the modeling methods which are efficiently constructed the network management models. We constructed the intrusion detection systems and firewalls using the SSO. This architecture is efficient to manage the network usage and control. SSO solution designed on the small scale Intranet. CA server in the 550 that depends on PKI (Public Key Infrastructure) is used to issue the certificates. SHTTP based on SSL (Secure Socket Layer) is used to protect the data between certificate server and the intranet users.

  • PDF

A Logical Model of Collision Response for Simulation of the Virtual Environment (가상환경의 시뮬레이션을 위한 충돌반응 양상의 논리적 모델링)

  • Kim Byung-Ju;Park Jong-Hee
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.821-830
    • /
    • 2004
  • In this paper, we model the downward collision of a falling object to the base. We aim to provide maximum diversity of response to physical. collision. To this end, the primary design concern of the model is to unfold the collision phenomenon in a logical and natural manner, detailed enough to construct an immersive virtual environment. To achieve these requirements, first we determine domains for the characteristic of the material of the falling objects, and select the dominant force of the collision. We formulate the collision phenomena with combination of primitive attributes and their relationships. The formulated function evaluates the results of the collision in qualitative aspects as well as in quantitative aspects. Between the collision issues, 'Collision Detection' and 'Collision Response', this paper focuses on Collision Response issue.

State Of Polarization Tracking Algorithm using Three-Point Measurement Technique for Polarization Mode Dispersion Compensation (펀광모드분산 보상을 위한 세 점 측정 방식의 빛의 편광상태 추적 알고리즘)

  • 송홍석;정현수;신서용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.2B
    • /
    • pp.171-177
    • /
    • 2002
  • As speed and capacity of optical communication system increase dramatically, polarization-mode-dispersion compensation(PMDC) becomes a hot issue in these days. In this paper, we introduce a new state-of-polarization (SOP) tracking algorithm that can be used in a PMDC system. The new SOP tracking algorithm is also based on optical heterodyne coherent detection technique like the previous algorithm that we have reported before. However, unlike the previous algorithm, the new algorithm requires only three times of measurement in any circumstances to find the exact SOP information so that it can effectively be applied to PMDC system where very fast and stable operation is indispensible.

A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks

  • Lee, Myoung-Rak;Lee, Taek;Yoon, Byung-Sik;Kim, Hyo-Gon;In, Hoh Peter
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.626-633
    • /
    • 2009
  • Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

Improving data reliability on oligonucleotide microarray

  • Yoon, Yeo-In;Lee, Young-Hak;Park, Jin-Hyun
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2004.11a
    • /
    • pp.107-116
    • /
    • 2004
  • The advent of microarray technologies gives an opportunity to moni tor the expression of ten thousands of genes, simultaneously. Such microarray data can be deteriorated by experimental errors and image artifacts, which generate non-negligible outliers that are estimated by 15% of typical microarray data. Thus, it is an important issue to detect and correct the se faulty probes prior to high-level data analysis such as classification or clustering. In this paper, we propose a systematic procedure for the detection of faulty probes and its proper correction in Genechip array based on multivariate statistical approaches. Principal component analysis (PCA), one of the most widely used multivariate statistical approaches, has been applied to construct a statistical correlation model with 20 pairs of probes for each gene. And, the faulty probes are identified by inspecting the squared prediction error (SPE) of each probe from the PCA model. Then, the outlying probes are reconstructed by the iterative optimization approach minimizing SPE. We used the public data presented from the gene chip project of human fibroblast cell. Through the application study, the proposed approach showed good performance for probe correction without removing faulty probes, which may be desirable in the viewpoint of the maximum use of data information.

  • PDF

CCTV Monitoring System Development for Safety Management and Privacy in Manufacturing Site

  • Han, Ji Hee;Ok, Sang Hun;Song, Kyu;Jang, Dong Young
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.26 no.3
    • /
    • pp.272-277
    • /
    • 2017
  • CCTV image processing techniques have been developed for safety management in manufacturing sites. However, CCTV growth has become a social problem for video surveillance with regard to privacy. This study aims to manage the safety system efficiently and protect privacy simultaneously. In this study, the CCTV monitoring system is composed of five steps (accident monitoring, detection, notification, management, restoration). De-identified image is observed when we are in a normal situation. De-identified image changes to identified image when it detects an accident. As soon as it detects an accident, the accident information is sent to the safety administrator. Then the administrator could conduct safety measures. Afterward, accumulated accident data could be used for statistical data that could be utilized as analyzing expecting accident.

Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

  • Farooq, Muhammad Umar;Wang, Xingfu;Sajjad, Moizza;Qaisar, Sara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1330-1347
    • /
    • 2018
  • Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.

The Effects of Korean Coda-neutralization Process on Word Recognition in English (한국어의 종성중화 작용이 영어 단어 인지에 미치는 영향)

  • Kim, Sun-Mi;Nam, Ki-Chun
    • Phonetics and Speech Sciences
    • /
    • v.2 no.1
    • /
    • pp.59-68
    • /
    • 2010
  • This study addresses the issue of whether Korean(L1)-English(L2) non-proficient bilinguals are affected by the native coda-neutralization process when recognizing words in English continuous speech. Korean phonological rules require that if liaison occurs between 'words', then coda-neutralization process must come before the liaison process, which results in liaison-consonants being coda-neutralized ones such as /b/, /d/, or /g/, rather than non-neutralized ones like /p/, /t/, /k/, /$t{\int}$/, /$d_{\Im}$/, or /s/. Consequently, if Korean listeners apply their native coda-neutralization rules to English speech input, word detection will be easier when coda-neutralized consonants precede target words than when non-neutralized ones do. Word-spotting and word-monitoring tasks were used in Experiment 1 and 2, respectively. In both experiments, listeners detected words faster and more accurately when vowel-initial target words were preceded by coda-neutralized consonants than when preceded by coda non-neutralized ones. The results show that Korean listeners exploit their native phonological process when processing English, irrespective of whether the native process is appropriate or not.

  • PDF

Automatic Thresholding Selection for Image Segmentation Based on Genetic Algorithm (유전자알고리즘을 이용한 영상분할 문턱값의 자동선정에 관한 연구)

  • Lee, Byung-Ryong;Truong, Quoc Bao;Pham, Van Huy;Kim, Hyoung-Seok
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.6
    • /
    • pp.587-595
    • /
    • 2011
  • In this paper, we focus on the issue of automatic selection for multi-level threshold, and we greatly improve the efficiency of Otsu's method for image segmentation based on genetic algorithm. We have investigated and evaluated the performance of the Otsu and Valley-emphasis threshold methods. Based on this observation we propose a method for automatic threshold method that segments an image into more than two regions with high performance and processing in real-time. Our paper introduced new peak detection, combines with evolution algorithm using MAGA (Modified Adaptive Genetic Algorithm) and HCA (Hill Climbing Algorithm), to find the best threshold automatically, accurately, and quickly. The experimental results show that the proposed evolutionary algorithm achieves a satisfactory segmentation effect and that the processing time can be greatly reduced when the number of thresholds increases.