• Title/Summary/Keyword: Point Signature

Search Result 77, Processing Time 0.025 seconds

A Study on Loose Part Monitoring System in Nuclear Power Plant Based on Neural Network (원전 금속파편시스템에 신경회로망 적용연구)

  • Kim, Jung-Soo;Hwang, In-Koo;Kim, Jung-Tak;Moon, Byung-Soo;Lyou, Joon
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.05a
    • /
    • pp.227-230
    • /
    • 2002
  • The Loose Part Monitoring System(LPMS) has been designed to detect, locate and evaluate detached or loosened parts and foreign objects in the reactor coolant system. In this paper, at first, we presents an application of the back propagation neural network. At the preprocessing step, the moving window average filter is adopted to reject the low frequency background noise components. And then, extracting the acoustic signature such as Starting point of impact signal, Rising time, Half period, and Global time, they are used as the inputs to neural network. Secondly, we applied the neural network algorithm to LPMS in order to estimate the mass of loose parts. We trained the impact test data of YGN3 using the backpropagation method. The input parameter for training is Rising Time, Half Period, Maximum amplitude. The result showed that the neural network would be applied to LPMS. Also, applying the neural network to the Practical false alarm data during startup and impact test signal at nuclear power Plant, the false alarms are reduced effectively. 1.

  • PDF

Development of Protein Biomarkers for the Authentication of Organic Rice

  • Lee, Ju-Young;Lim, Jinkyu
    • Journal of Applied Biological Chemistry
    • /
    • v.58 no.4
    • /
    • pp.355-361
    • /
    • 2015
  • The rice protein profiles of Oryza sativa L (Koshihikari) grown under organic and conventional cultivation regimes were compared on 2-D gels to develop diagnostic marker proteins for organic rice. The selected proteins, differentially expressed between organic and conventional rice, were compared with the differentially expressed proteins of another organic and conventional rice pairing, produced at a different location. In the first comparison among conventional, no-chemical, and organic rice grown in the same region, Korea, 13 proteins exhibiting differential expression in organic and conventionally grown plants were selected. Eight of the 13 proteins were down-regulated, and the 5 remaining proteins were up-regulated from conventional to organic rice. The second comparison pairing from Kyungju, revealed 12 differentially expressed proteins, with 8 down-regulated and 4 up-regulated proteins. Ten of the differentially expressed proteins that overlapped between the two comparison sets could not be clustered into any functional group using a functional annotation clustering tool. Further comparisons using another set of conventional and organic rice, belonging to a different variety of Oryza sativa L and produced in Sanchung, revealed 8 differentially expressed proteins, 5 of which were down-regulated and 3 of which were upregulated in the organic rice. Overall, 3 differentially expressed proteins were commonly found in all three organic rice crops. These 3 proteins, along with other overlapping differentially expressed proteins, can provide a good starting point for the development of signature proteins that can be used for the authentication of organic rice with a follow-up studies with more comparison sets.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

Accelerated Evolution of the Regulatory Sequences of Brain Development in the Human Genome

  • Lee, Kang Seon;Bang, Hyoeun;Choi, Jung Kyoon;Kim, Kwoneel
    • Molecules and Cells
    • /
    • v.43 no.4
    • /
    • pp.331-339
    • /
    • 2020
  • Genetic modifications in noncoding regulatory regions are likely critical to human evolution. Human-accelerated noncoding elements are highly conserved noncoding regions among vertebrates but have large differences across humans, which implies human-specific regulatory potential. In this study, we found that human-accelerated noncoding elements were frequently coupled with DNase I hypersensitive sites (DHSs), together with monomethylated and trimethylated histone H3 lysine 4, which are active regulatory markers. This coupling was particularly pronounced in fetal brains relative to adult brains, non-brain fetal tissues, and embryonic stem cells. However, fetal brain DHSs were also specifically enriched in deeply conserved sequences, implying coexistence of universal maintenance and human-specific fitness in human brain development. We assessed whether this coexisting pattern was a general one by quantitatively measuring evolutionary rates of DHSs. As a result, fetal brain DHSs showed a mixed but distinct signature of regional conservation and outlier point acceleration as compared to other DHSs. This finding suggests that brain developmental sequences are selectively constrained in general, whereas specific nucleotides are under positive selection or constraint relaxation simultaneously. Hence, we hypothesize that human- or primate-specific changes to universally conserved regulatory codes of brain development may drive the accelerated, and most likely adaptive, evolution of the regulatory network of the human brain.

The Development and Validation of the Korean Strength Scale (한국인 강점 척도의 개발 및 타당화)

  • Jung, Young-Eun;Lee, Ji-Eun;Han, You;Choi, Jeong-Woo;Baek, Kyoung Hee;Park, Joo-Eon;Min, Jung-Ah;Chae, Jeong-Ho
    • Anxiety and mood
    • /
    • v.9 no.1
    • /
    • pp.45-53
    • /
    • 2013
  • Objectives : The purpose of this study was to develop the Korean Strength Scale and to examine its validity and reliability. Methods : The Korean Strength Scale is a self-report questionnaire that measures 25 valued strengths and is comprised of 124 items ; each item had a 0-5 rating on a 6-point scale. In order to test validity and reliability, data were collected from 355 adults. The measures included the Korean Strength Scale, HEXACO Personality Inventory (HEXACO-PI), Satisfaction with life scale (SWLS), Positive Affect and Negative Affect Schedule (PANAS), and Orientations to Happiness Questionnaire (OHQ). Results : The resulting exploratory factor analysis of the Korean Strength Scale suggested 4 factor structures. The Korean Strength Scale was shown to have acceptable psychometric properties, including acceptable internal-consistency reliabilities, factorial validity, and high convergent correlations. Conclusion : Although there is room on improvement for some facet scales, the Korean Strength Scale appears to be a useful tool for assessing an individual's signature strengths.

Efficient Prediction of Aerodynamic Heating of a High Speed Aircraft for IR Signature Analysis (적외선 신호 분석을 위한 고속 항공기의 공력가열에 관한 효율적 예측)

  • Lee, Ji-Hyun;Chae, Jun-Hyeok;Ha, Nam-Koo;Kim, Dong-Geon;Jang, Hyun-Sung;Myong, Rho-Shin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.11
    • /
    • pp.768-778
    • /
    • 2019
  • The ability to calculate aerodynamic heating and surface temperature is essential to ensure proper design of aircraft components in high speed flight. In this study, various empirical formulas for efficiently calculating aerodynamic heating of aircraft were first analyzed. A simple computational code based on empirical formulas was developed and then compared with commercial codes; ANSYS FLUENT based on the Navier-Stokes-Fourier equation, and ThermoAnalytics MUSES based on an empirical formula. The code was found to agree well with the results of FLUENT in the wall and stagnation point temperatures. It also showed excellent agreement with MUSES, within 1% and 5% in temperature and heat flux, respectively.

A whole genomic scan to detect selection signatures between Berkshire and Korean native pig breeds

  • Edea, Zewdu;Kim, Kwan-Suk
    • Journal of Animal Science and Technology
    • /
    • v.56 no.7
    • /
    • pp.23.1-23.7
    • /
    • 2014
  • Background: Scanning of the genome for selection signatures between breeds may play important role in understanding the underlie causes for observable phenotypic variations. The discovery of high density single nucleotide polymorphisms (SNPs) provide a useful starting point to perform genome-wide scan in pig populations in order to identify loci/candidate genes underlie phenotypic variation in pig breeds and facilitate genetic improvement programs. However, prior to this study genomic region under selection in commercially selected Berkshire and Korean native pig breeds has never been detected using high density SNP markers. To this end, we have genotyped 45 animals using Porcine SNP60 chip to detect selection signatures in the genome of the two breeds by using the $F_{ST}$ approach. Results: In the comparison of Berkshire and KNP breeds using the FDIST approach, a total of 1108 outlier loci (3.48%) were significantly different from zero at 99% confidence level with 870 of the outlier SNPs displaying high level of genetic differentiation ($F_{ST}{\geq}0.490$). The identified candidate genes were involved in a wide array of biological processes and molecular functions. Results revealed that 19 candidate genes were enriched in phosphate metabolism (GO: 0006796; ADCK1, ACYP1, CAMK2D, CDK13, CDK13, ERN1, GALK2, INPP1; MAK, MAP2K5, MAP3K1, MAPK14, P14KB, PIK3C3, PRKC1, PTPRK, RNASEL, THBS1, BRAF, VRK1). We have identified a set of candidate genes under selection and have known to be involved in growth, size and pork quality (CART, AGL, CF7L2, MAP2K5, DLK1, GLI3, CA3 and MC3R), ear morphology and size (HMGA2 and SOX5) stress response (ATF2, MSRB3, TMTC3 and SCAF8) and immune response (HCST and RYR1). Conclusions: Some of the genes may be used to facilitate genetic improvement programs. Our results also provide insights for better understanding of the process and influence of breed development on the pattern of genetic variations.

Oscillation of a Small Hα Surge in a Polar Coronal Hole

  • Cho, Kyung-Suk;Cho, Il-Hyun;Nakariakov, V.M.;Yurchyshyn, Vasyl B.;Yang, Heesu;Kim, Yeon-Han;Kumar, Pankaj;Tetsuya, Magara
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.53.2-53.2
    • /
    • 2019
  • $H{\alpha}$ surges (i.e. cool/dense collimated plasma ejections) may act as a guide for a propagation of magnetohydrodynamic waves. We report a high-resolution observation of a surge observed with 1.6m Goody Solar Telescope (GST) on 2009 August 26, from 18:20~UT to 18:45UT. Characteristics of plasma motions in the surge are determined with the normalizing radial gradient filter and the Fourier motion filter. The shape of the surge is found to change from a 'C' shape to an inverse 'C' shape after a formation of a cusp, a signature of reconnection. There are apparent upflows seen above the cusp top and downflows below it. The upflows show rising and rotational motions in the right-hand direction, with the rotational speed decreasing with height. Near the cusp top, we find a transverse oscillation of the surge, with the period of ~2 min. There is no change of the oscillation phase below the cusp top, but above the top a phase change is identified, giving a vertical phase speed about 86kms-1. As the height increases, the initial amplitude of the oscillation increases, and the oscillation damping time decreases from 5.13 to 1.18min. We conclude that the oscillation is a propagating kink wave that is possibly excited by an x-point oscillation.

  • PDF

Security Analysis against RVA-based DPA Countermeasure Applied to $Eta_T$ Pairing Algorithm (RVA 기반의 페어링 부채널 대응법에 대한 안전성 분석)

  • Seo, Seog-Chung;Han, Dong-Guk;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.83-90
    • /
    • 2011
  • Recently, pairings over elliptic curve have been applied for various ID-based encryption/signature/authentication/key agreement schemes. For efficiency, the $Eta_T$ pairings over GF($P^n$) (P = 2, 3) were invented, however, they are vulnerable to side channel attacks such as DPA because of their symmetric computation structure compared to other pairings such as Tate, Ate pairings. Several countermeasures have been proposed to prevent side channel attacks. Especially, Masaaki Shirase's method is very efficient with regard to computational efficiency, however, it has security flaws. This paper examines closely the security flaws of RVA-based countermeasure on $Eta_T$ Pairing algorithm from the implementation point of view.

Cyberattack Goal Classification Based on MITRE ATT&CK: CIA Labeling (MITRE ATT&CK 기반 사이버 공격 목표 분류 : CIA 라벨링)

  • Shin, Chan Ho;Choi, Chang-hee
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.15-26
    • /
    • 2022
  • Various subjects are carrying out cyberattacks using a variety of tactics and techniques. Additionally, cyberattacks for political and economic purposes are also being carried out by groups which is sponsored by its nation. To deal with cyberattacks, researchers used to classify the malware family and the subjects of the attack based on malware signature. Unfortunately, attackers can easily masquerade as other group. Also, as the attack varies with subject, techniques, and purpose, it is more effective for defenders to identify the attacker's purpose and goal to respond appropriately. The essential goal of cyberattacks is to threaten the information security of the target assets. Information security is achieved by preserving the confidentiality, integrity, and availability of the assets. In this paper, we relabel the attacker's goal based on MITRE ATT&CK® in the point of CIA triad as well as classifying cyber security reports to verify the labeling method. Experimental results show that the model classified the proposed CIA label with at most 80% probability.