• Title/Summary/Keyword: Issue Detection

Search Result 583, Processing Time 0.042 seconds

A Study on the Substation for the Bad Measuring Devices Detection and Correction (변전소 측정기기의 검.교정 알고리즘에 관한 연구)

  • Lee, H.J.;Park, S.M.;Kim, Y.H.;Kim, J.K.
    • Proceedings of the KIEE Conference
    • /
    • 2001.05a
    • /
    • pp.313-315
    • /
    • 2001
  • The power system automation, especially the substation automation is a major issue. so it has been widely studied each country in the world. Since the substation system includes lots of measuring devices. a lot of data and system information are transmitted to operators. The measured values usually have the error that results from the communication process, and it can degrade the reliability of estimated values. So. the detection and correction of measured values at a substation are important factors for substation automation. In this paper, we study the detection and col of measured values at the domestic 154kV/2 distribution substation of double bus structure study will be useful for expected economic dispatch measuring device's inspection and corr management by SCADA system operation, substation automation.

  • PDF

SPC 기법에 의한 밀링공구의 파손분석 및 검색

  • 서석환;전치혁;최용종
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1992.10a
    • /
    • pp.47-51
    • /
    • 1992
  • Automatic detection of tool breakage during NC machining is a key issue not only for improving productivity but to implement the unattended manufacturing system. In this paper, we develop a vibration sensor-based tool breakage detection system for NC milling processes. The system obtains the time-domain vibration signal from the sensor attached on the spindle bracket of our CNC machine and declares tool failures through the on-line monitoring schemes. For on-line detection, our approach is to use the PSC(statistical process control) methods being increasingly used for on-line process control. The main thrust of this paper is to propose and compare the performance of SPC methods including : a) X-bar control scheme, b) S control scheme, c)EWMA (exponentially weighted moving average) scheme, and d) AEWMA (adaptive exponentially weighted moving average) scheme. The performance of the control schemes are compared in terms of the type 1 and 2 error calculated from the experiment data.

In-Process Detection of Flank Wear Width by AE Signals When Machining of ADI (ADI 절삭시 AE신호에 의한 플랭크 마멸폭의 인프로세스 검출)

  • 전태옥
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.8 no.6
    • /
    • pp.71-77
    • /
    • 1999
  • Monitoring of Cutting tool wear is a critical issue in automated machining system and has been extensively studied for many years. An austempered ductile iron(ADI) exhibits the excellent mechanical properties and the wear resistance. ADI has generally the poor machinability due to the characteristic. This paper presents the in-process detection of flank wear of cutting tools using the acoustic emission sensor and the digital oscilloscope. The amplitude level of AE signal(AErms) is mainly affected by cutting speed and it is proportional to cutting speed. There have been the relationship of direct proportion between the amplitude level of AE signals and the flank wear width of cutting tool. The flank wear with corresponding to the tool life is successfully detected with the monitor-ing system used in this study.

  • PDF

Development of Core Technology for Object Detection in Excavation Work Using Laser Sensor (레이저 센서를 이용한 굴삭기 작업의 장애물 탐지 요소기술 개발)

  • Soh, Ji-Yune;Kim, Min-Woong;Lee, Jun-Bok;Han, Choong-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.8 no.4
    • /
    • pp.71-77
    • /
    • 2008
  • Earthwork is very equipment-intensive task and researches related to automated excavation have been conducted. There is an issue to secure the safety for an automated excavating system. Therefore, this paper focuses on how to improve safety for semi- or fully-automated backhoe excavation. The primary objective of this research is to develop the core technology for automated object detection in excavation work. In order to satisfy the research objective, a diverse sensing technologies are investigated and analysed in terms of functions, durability, and reliability. The authors developed detecting algorithm for the objects using laser sensor and verified its performance by several tests. The results of this study would be the basis for developing the automated object detection system.

Intelligent Approach for Android Malware Detection

  • Abdulla, Shubair;Altaher, Altyeb
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2964-2983
    • /
    • 2015
  • As the Android operating system has become a key target for malware authors, Android protection has become a thriving research area. Beside the proved importance of system permissions for malware analysis, there is a lot of overlapping in permissions between malware apps and goodware apps. The exploitation of them effectively in malware detection is still an open issue. In this paper, to investigate the feasibility of neuro-fuzzy techniques to Android protection based on system permissions, we introduce a self-adaptive neuro-fuzzy inference system to classify the Android apps into malware and goodware. According to the framework introduced, the most significant permissions that characterize optimally malware apps are identified using Information Gain Ratio method and encapsulated into patterns of features. The patterns of features data is used to train and test the system using stratified cross-validation methodologies. The experiments conducted conclude that the proposed classifier can be effective in Android protection. The results also underline that the neuro-fuzzy techniques are feasible to employ in the field.

Big Signature Method for Plagiarism Detection (표절 탐지를 위한 비트 시그니처 기법)

  • Kim, Woosaeng;Kang, Kyucheol
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • Recently, the problem of plagiarism has emerged as a big social issue because not only literature but also thesis become the target of plagiarism. Even the government requires conformation for plagiarism of high-ranking official's thesis as a standard of their ethical morality. Plagiarism is not just direct copy but also paraphrasing, rewording, adapting parts, missing references or wrong citations. This makes the problem more difficult to handle adequately. We propose a plagiarism detection scheme called a bit signature in which each unique word of document is represented by 0 or 1. The bit signature scheme can find the similar documents by comparing their absolute and relative bit signatures. Experiments show that a bit signature scheme produces better performance for document copy detection than existing similar schemes.

A Study on Improving the Adaptive Background Method for Outdoor CCTV Object Tracking System

  • Jung, Do-Wook;Choi, Hyung-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.17-24
    • /
    • 2015
  • In this paper, we propose a method to solve ghosting problem. To generate adaptive background, using an exponentially decreasing number of frames, may improve object detection performance. To extract moving objects from the background by using a differential image, detection error may be caused by object rotations or environmental changes. A ghosting problem can be issue-driven when there are outdoor environmental changes and moving objects. We studied that a differential image by adaptive background may reduce the ghosting problem. In experimental results, we test that our method can solve the ghosting problem.

High Embedding Capacity and Robust Audio Watermarking for Secure Transmission Using Tamper Detection

  • Kaur, Arashdeep;Dutta, Malay Kishore
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.133-145
    • /
    • 2018
  • Robustness, payload, and imperceptibility of audio watermarking algorithms are contradictory design issues with high-level security of the watermark. In this study, the major issue in achieving high payload along with adequate robustness against challenging signal-processing attacks is addressed. Moreover, a security code has been strategically used for secure transmission of data, providing tamper detection at the receiver end. The high watermark payload in this work has been achieved by using the complementary features of third-level detailed coefficients of discrete wavelet transform where the human auditory system is not sensitive to alterations in the audio signal. To counter the watermark loss under challenging attacks at high payload, Daubechies wavelets that have an orthogonal property and provide smoother frequencies have been used, which can protect the data from loss under signal-processing attacks. Experimental results indicate that the proposed algorithm has demonstrated adequate robustness against signal processing attacks at 4,884.1 bps. Among the evaluators, 87% have rated the proposed algorithm to be remarkable in terms of transparency.

Design of Intelligent Intrusion Detection System Based on Distributed Intrusion Detecting Agents : DABIDS (분산 임칩 탐지 에이전트를 기반으로 한 지능형 침입탐지시스템 설계)

  • Lee, Jong-Seong;Chae, Su-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1332-1341
    • /
    • 1999
  • Rapid expansion of network and increment of computer system access cause computer security to be an important issue. Hence, the researches in intrusion detection system(IDS)are active to reduce the risk from hackers. Considering IDS, we propose a new IDS model(DABIDS : Distributed Agent Based Intelligent intrusion Detection System) based on distributed intrusion detecting agents. The DABIDS dynamically collects intrusion behavior knowledge from each agents when some doubtable behaviors of users are detected and make new agents codes using intrusion scenario data base, and broadcast the detector codes to the distributed intrusion detecting agent of all node. This DABIDS can efficiently solve the problem to reduce the overhead for training detecting agent for intrusion behavior patterns.

  • PDF

A Study on Outlier Detection in Smart Manufacturing Applications

  • Kim, Jeong-Hun;Chuluunsaikhan, Tserenpurev;Nasridinov, Aziz
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.760-761
    • /
    • 2019
  • Smart manufacturing is a process of integrating computer-related technologies in production and by doing so, achieving more efficient production management. The recent development of supercomputers has led to the broad utilization of artificial intelligence (AI) and machine learning techniques useful in predicting specific patterns. Despite the usefulness of AI and machine learning techniques in smart manufacturing processes, there are many fundamental issues with the direct deployment of these technologies related to data management. In this paper, we focus on solving the outlier detection issue in smart manufacturing applications. More specifically, we apply a state-of-the-art outlier detection technique, called Elliptic Envelope, to detect anomalies in simulation-based collected data.