• Title/Summary/Keyword: Poison information

Search Result 48, Processing Time 0.028 seconds

Stability analysis in a two-path Temperature coefficient feedback reactor (2로 온도계수 궤환로에서의 안정성 해석)

  • Eun Rae Roh
    • 전기의세계
    • /
    • v.16 no.2
    • /
    • pp.17-21
    • /
    • 1967
  • In reactor operation, it is widely known that the absolute stability may not exist for multiple feedback paths even though the single lumped negative temperature coefficient feedback case is clearly stable at all frequencies above those creating xenon poisoning effects. However, interesting and useful stability information may be obtained from a two-path temperature coefficient feedback which can be represented in a water-cooled, water-moderated hetergeneous reactor. In this paper, the outline of an operating stability of a reactor having two-path temperature coefficient feedback is analyzed and described neglecting poison effects.

  • PDF

Changes of Poison Data Characteristics Collected from Telephone Response in 1339 and 119: Discrepancy in Characteristics of Post-toxin Exposure Data Obtained through Telephone Counselling Provided by 1339 and 119 (119와 1339에 접수되는 중독 상담 정보의 변화 비교: 응급의료정보센터(1339) 통합 이후의 소방구급상황센터(119)에서의 병원 전 독성 물질 노출자료 현황 분석)

  • Park, Kwang Hoon;Park, Jong Su;Lee, Sung-Woo;Kim, Su-Jin;Han, Kap Su;Lee, Eui Jung
    • Journal of The Korean Society of Clinical Toxicology
    • /
    • v.15 no.2
    • /
    • pp.116-121
    • /
    • 2017
  • Purpose: The aim of this study was to compare the toxicologic profiles and outcome of poisoned patients by comparing the data obtained through telephone counselling, each provided by emergency medical information center (1339) and emergency dispatch center (119). Methods: We analyzed the telephone-based poison exposure data before and after Seoul 1339 merged to 119. We compared the Seoul 1339 call response data in 2008 with Seoul and Busan 119 call response data between 2014 and 2016. We analyzed the changes in the trend and quality of data obtained, as well as the quality of service provided by each center before and after this reallocation, by comparing the data each obtained through telephone counselling. Results: The data was collected for a total of 2260 toxin exposure related calls made to Seoul 1339 in 2009, and 1657 calls to 119 in Seoul and Busan between 2014 and 2016. Significant difference was observed for age, sex, and reason for exposure to toxic substance between the two groups. Conclusion: After the integration of 1339 with 119, 119 focused on role of field dispatch and hospital transfer, lacking the consulting on drug poisoning. Moreover, data on exposure to toxic substances at the pre-hospital stage indicate that drug information and counseling are missing or unknown. In addition, first aid or follow-up instructions are not provided. Thus, systematic approach and management are required.

Performance Analysis of a Two-phase Queueing System with Bernoulli Feedback (베르누이 피드백이 있는 2단계서비스 대기모형의 성능분석)

  • Park, Doo-Il;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1C
    • /
    • pp.9-13
    • /
    • 2003
  • We consider a two-phase queueing system with Bernoulli feedback. Customers arrive at the system according to a Poison process and receive batch service in the first phase followed by individual services in the second phase. Each customer who completes the individual service returns to the tail of the second phase service queue with probability 1 -$\sigma$. This type of queueing problem cad be easily found in computer and telecommunication systems. By deriving a relationship between the generating functions for system size at various embedded epochs, we obtain the system size distribution. The exhaustive and gated cases for the batch service are considered.

Classification of Phornographic Videos Using Audio Information (오디오 신호를 이용한 음란 동영상 판별)

  • Kim, Bong-Wan;Choi, Dae-Lim;Bang, Man-Won;Lee, Yong-Ju
    • Proceedings of the KSPS conference
    • /
    • 2007.05a
    • /
    • pp.207-210
    • /
    • 2007
  • As the Internet is prevalent in our life, harmful contents have been increasing on the Internet, which has become a very serious problem. Among them, pornographic video is harmful as poison to our children. To prevent such an event, there are many filtering systems which are based on the keyword based methods or image based methods. The main purpose of this paper is to devise a system that classifies the pornographic videos based on the audio information. We use Mel-Cepstrum Modulation Energy (MCME) which is modulation energy calculated on the time trajectory of the Mel-Frequency cepstral coefficients (MFCC) and MFCC as the feature vector and Gaussian Mixture Model (GMM) as the classifier. With the experiments, the proposed system classified the 97.5% of pornographic data and 99.5% of non-pornographic data. We expect the proposed method can be used as a component of the more accurate classification system which uses video information and audio information simultaneously.

  • PDF

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

Optimization of 'Patterned Ground Shield' of Spiral Inductor using Taguchi's Method (다구찌 실험 계획법을 이용한 나선형 인덕터의 패턴드 그라운드 쉴드 최적 설계 연구)

  • Ko, Jae-Hyeong;Oh, Sang-Bae;Kim, Dong-Hun;Kim, Hyeong-Seok
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.436-439
    • /
    • 2007
  • This paper describes the optimization of PGS(Patterned Ground Shield) of 5.5 turns rectangular spiral inductor using Taguchi's method. PGS is decrease method of parasite component by silicon substrate among dielectric loss reduction method. By using the taguchi's method, each parameter is fixed upon that PGS high poison(A), slot spacing(B), strip width(C) and overlap turn number(D) of PGS design parameter. Then we verified that percentage contribution and design sensitivity analysis of each parameter and level by signal to noise ratio of larger-the-better type. We consider percentage contribution and design sensitivity of each parameter and level, and then verify that model of optimization for PGS is lower inductance decreasing ratio and higher Q-factor increasing ratio by EM simulation.

  • PDF

Exact poisson distribution in the use of NPB with aiming errors

  • Kim, Joo-Hwan
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.967-973
    • /
    • 1995
  • A neutral particle beam(NPB) aimed at the object and receive a small number of neutron signals at the detector to estimate the mass of an object Since there is uncertainty about the location of the axis of the beam relative to the object, we could have aiming errors which may lead to incorrect information about the object. Under the two assumptions that neutral particle scattering distribution and aiming errors have a circular normal distribution respectively, we have derived an exact probability distribution of neutral particles. It becomes a Poison-power function distribution., We proved monotone likelihood ratio property of tlis distribution. This property can be used to find a criteria for the hypothesis testing problem.

  • PDF

The Development of Two-Person Janggi Board Game Using Backpropagation Neural Network and Reinforcement Learning (역전파 신경회로망과 강화학습을 이용한 2인용 장기보드게임 개발)

  • Park, In-Kue;Jung, Kwang-Ho
    • Journal of Korea Game Society
    • /
    • v.1 no.1
    • /
    • pp.61-67
    • /
    • 2001
  • This paper describes a program which learns good strategies for two-poison, deterministic, zero-sum board games of perfect information. The program learns by simply playing the game against either a human or computer opponent. The results of the program's teaming of a lot of games are reported. The program consists of search kernel and a move generator module. Only the move generator is modified to reflect the rules of the game to be played. The kernel uses a temporal difference procedure combined with a backpropagation neural network to team good evaluation functions for the game being played. Central to the performance of the program is the search procedure. This is a the capture tree search used in most successful janggi playing programs. It is based on the idea of using search to correct errors in evaluations of positions. This procedure is described, analyzed, tested, and implemented in the game-teaming program. Both the test results and the performance of the program confirm the results of the analysis which indicate that search improves game playing performance for sufficiently accurate evaluation functions.

  • PDF

Analysis of Secure Remote Access to Virtual Private Home Network with L2TP Tunneling methods (L2TP tunneling 방법을 기반으로 한 가설 사설망의 보안 원격 접속분석)

  • Basukala, Roja Kiran;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2188-2194
    • /
    • 2008
  • Home network is the connection and communication of several electronic and electrical devices at hone with the integration of several technologies like Ethernet, wireless, phone line and power-line at the residential gateway to the internet. This internet based home network can be accessed from any part of the world through any device by any poison via internet. Since home network is developed for comfortable and safe life of home users, the information flow to/from home network needs to be private. Hence the remote access of the home network must be secured. This paper analyses two secure tunneling methods, voluntary and compulsory for L2TP(Layer Two Tunneling Protocol) based VPN(Virtual Private Network) for secure remote access of the home network.