• Title/Summary/Keyword: Set ID

Search Result 89, Processing Time 0.023 seconds

An Extension of MSDL for Obtaining Weapon Effectiveness Data in a Military Simulation (국방 시뮬레이션에서 무기효과 데이터 획득을 위한 MSDL의 확장)

  • Lee, Sangjin;Oh, Hyun-Shik;Kim, Dohyung;Rhie, Ye Lim;Lee, Sunju
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • Many factors such as wind direction, wind strength, temperature, and obstacles affect a munition's trajectory. Since these factors eventually determines the probability of hit and the hitting point of a target, these factors should be considered to obtain reliable weapon effectiveness data. In this study, we propose the extension of the MSDL(Military Scenario Definition Language) to reflect these factors to improve the reliability of weapon effectiveness data. Based on the existing MSDL, which has been used to set the initial condition of a military simulation scenarios, the newly identified subelements are added in ScenarioID, Environment, Organizations, and Installations as a scenario schema. Also, DamageAssessment and DesignOfExperiments element are added to make weapon effectiveness data easily. The extended MSDL enables to automatically generate the simulation scenarios that reflect various factors which affect the probability of hit or kill. This extended MSDL is applied to an integrated simulation software of weapon systems, named AddSIM version 4.0 for generation of weapon effectiveness data.

The Effect of Partially Used High Energy Photon on Intensity-modulated Radiation Therapy Plan for Head and Neck Cancer (두경부암 세기변조방사선치료 계획 시 부분적 고에너지 광자선 사용에 따른 치료계획 평가)

  • Chang, Nam Joon;Seok, Jin Yong;Won, Hui Su;Hong, Joo Wan;Choi, Ji Hun;Park, Jin Hong
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.25 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • Purpose: A selection of proper energy in treatment planning is very important because of having different dose distribution in body as photon energy. In generally, the low energy photon has been used in intensity-modulated radiation therapy (IMRT) for head and neck (H&N) cancer. The aim of this study was to evaluate the effect of partially used high energy photon at posterior oblique fields on IMRT plan for H&N cancer. Materials and Methods: The study was carried out on 10 patients (nasopharyngeal cancer 5, tonsilar cancer 5) treated with IMRT in Seoul National University Bundang Hospital. CT images were acquired 3 mm of thickness in the same condition and the treatment plan was performed by Eclipse (Ver.7.1, Varian, Palo Alto, USA). Two plans were generated under same planing objectives, dose volume constraints, and eight fields setting: (1) The low energy plan (LEP) created using 6 MV beam alone, (2) the partially used high energy plan (PHEP) created partially using 15 MV beam at two posterior oblique fields with deeper penetration depths, while 6 MV beam was used at the rest of fields. The plans for LEP and PHEP were compared in terms of coverage, conformity index (CI) and homogeneity index (HI) for planning target volume (PTV). For organs at risk (OARs), $D_{mean}$ and $D_{50%}$ were analyzed on both parotid glands and $D_{max}$, $D_{1%}$ for spinal cord were analyzed. Integral dose (ID) and total monitor unit (MU) were compared as addition parameters. For the comparing dose to normal tissue of posterior neck, the posterior-normal tissue volume (P-NTV) was set on the patients respectively. The $D_{mean}$, $V_{20Gy}$ and $V_{25Gy}$ for P-NTV were evaluated by using dose volume histogram (DVH). Results: The dose distributions were similar with regard to coverage, CI and HI for PTV between the LEP and PHEP. No evident difference was observed in the spinal cord. However, the $D_{mean}$, $D_{50%}$ for both parotid gland were slightly reduced by 0.6%, 0.7% in PHEP. The ID was reduced by 1.1% in PHEP, and total MU for PHEP was 1.8% lower than that for LEP. In the P-NTV, the $D_{mean}$, $V_{20Gy}$ and $V_{25Gy}$ of the PHEP were 1.6%, 1.8% and 2.9% lower than those of LEP. Conclusion: Dose to some OARs and a normal tissue, total monitor unit were reduced in IMRT plan with partially used high energy photon. Although these reduction are unclear how have a clinical benefit to patient, application of the partially used high energy photon could improve the overall plan quality of IMRT for head and neck cancer.

  • PDF

A Study of Smart Convergence Design of English Vocabulary Learning Contents Applying the Periodic Repetitive Method (주기적 반복법을 적용한 영단어 학습콘텐츠 스마트 융합 설계 연구)

  • Kim, Young-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.133-140
    • /
    • 2016
  • This paper suggests designing how to acquire English vocabularies on the smart devices based on the research that a ground-breaking English Vocabulary Learning Contents needs developing. The method makes it possible to develop the contents which helps the learners to master English vocabularies effectively on the smart phone. The core idea of this paper is as in the following: 1) English learners learn 30 vocabularies for three minutes 10 times (one is for a new learning and the other nine ones are for reviews about the first learning) a day. 2) Considering Ebbinghaus Forgetting Curve, the reflection study proposes to provide the learners with three times' reviews: one day, 10days, and 30days later from which they learn the first 30 vocabularies. This contents is mainly made up of 5 developing sections (1)to generate App ID, (2)to access App, (3)to set up Alarm, (4)to process Word learning, and (5)to monitor the result of learning. This proposed idea is optimized to enhance the memory by Ebbinghaus Periodic Repetitive Method, which makes the learners satisfied with their English vocabulary learning.

The Intelligent Intrusion Detection Systems using Automatic Rule-Based Method (자동적인 규칙 기반 방법을 이용한 지능형 침입탐지시스템)

  • Yang, Ji-Hong;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.6
    • /
    • pp.531-536
    • /
    • 2002
  • In this paper, we have applied Genetic Algorithms(GAs) to Intrusion Detection System(TDS), and then proposed and simulated the misuse detection model firstly. We have implemented with the KBD contest data, and tried to simulated in the same environment. In the experiment, the set of record is regarded as a chromosome, and GAs are used to produce the intrusion patterns. That is, the intrusion rules are generated. We have concentrated on the simulation and analysis of classification among the Data Mining techniques and then the intrusion patterns are produced. The generated rules are represented by intrusion data and classified between abnormal and normal users. The different rules are generated separately from three models "Time Based Traffic Model", "Host Based Traffic Model", and "Content Model". The proposed system has generated the update and adaptive rules automatically and continuously on the misuse detection method which is difficult to update the rule generation. The generated rules are experimented on 430M test data and almost 94.3% of detection rate is shown.3% of detection rate is shown.

Design of the Web based Mini-PACS (웹(Web)을 기반으로 한 Mini-PACS의 설계)

  • 안종철;신현진;안면환;박복환;김성규;안현수
    • Progress in Medical Physics
    • /
    • v.14 no.1
    • /
    • pp.43-50
    • /
    • 2003
  • PACS mostly has been used in large scaled hospital due to expensive initial cost to set up the system. The network of PACS is independent of the others: network. The user's PC has to be connected physically to the network of PACS as well as the image viewer has to be installed. The web based mini-PACS can store, manage and search inexpensively a large quantity of radiologic image acquired in a hospital. The certificated user can search and diagnose the radiologic image using web browser anywhere Internet connected. The implemented Image viewer is a viewer to diagnose the radiologic image. Which support the DICOM standard and was implemented to use JAVA programming technology. The JAVA program language is cross-platform which makes easier upgrade the system than others. The image filter was added to the viewer so as to diagnose the radiologic image in detail. In order to access to the database, the user activates his web browser to specify the URL of the web based PACS. Thus, The invoked PERL script generates an HTML file, which displays a query form with two fields: Patient name and Patient ID. The user fills out the form and submits his request via the PERL script that enters the search into the relational database to determine the patient who is corresponding to the input criteria. The user selects a patient and obtains a display list of the patient's personal study and images.

  • PDF

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

Quality Control of the UHF Wind Profiler Radar (UHF 윈드프로파일러 레이더 자료의 품질 개선)

  • Jo, Won-Gi;Kwon, Byung-Hyuk;Kim, Park-Sa;Kim, Min-Seong;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.277-290
    • /
    • 2018
  • Wind data observed by wind profiler provide wind vectors with the altitudes using PCL1300, wind computation program. As a result of application with parameters set in program currently, it is difficult to compute wind vectors in the upper air over 3 km. This id because a very strict criterion for parameters removes large amounts of data. In this study, therefore, we improve the methods of application by resetting parameters to expand data collection area of wind vectors and reduce underestimation. Although the acquisition rate of the wind vector increased from 72.2% to 92.2%, the RMSE of the wind speed maintained 1.5 m/s - 3.1 m/s, which is less than 15% of the error rate at each altitude.

Efficient Rate Control by Lagrange Multiplier Using Adaptive Mode Selection in Video Coding (비디오 코팅시 Lagrage 승수를 조정하여 적응 모드 선택에 따른 비트율의 제어)

  • Ryu, Chul;Kim, Seung P.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1B
    • /
    • pp.77-88
    • /
    • 2000
  • This paper presents an approach for rate control by adaptively selecting macroblock modes in video coding.The problem of rate control has been investigated by many authors where quantizer level is adjustedbased on the buffer fullness. The proposed approach is different fron the previous ones [4] id that it finds the optimal decision curve rather than finding a set of the modes. Proposed algorithm extends the coding decision options for rate control to motion/no-motion compensation as well as inter/intra decisions. Instead of having a fixed motion/no-notion compensation or inter/intra decision curve, one can utilize an adaptive decision curvebased on the characteristics of input frames so that the PSNR at a given bit rate is maximized. Therefore, the proposed approach provides better rate control than simple quantizer feedback approach interns of visual quality. The curve is obtained by utilizing simulated annealing optimization technique. Thealgorithm is implemented and simulations are compared with other approaches within H.261 video codec.

  • PDF

Quorum-based Key Management Scheme in Wireless Sensor Networks

  • Wuu, Lih-Chyau;Hung, Chi-Hsiang;Chang, Chia-Ming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2442-2454
    • /
    • 2012
  • To ensure the security of wireless sensor networks, it is important to have a robust key management scheme. In this paper, we propose a Quorum-based key management scheme. A specific sensor, called as key distribution server (KDS), generates a key matrix and establishes a quorum system from the key matrix. The quorum system is a set system of subsets that the intersection of any two subsets is non-empty. In our scheme, each sensor is assigned a subset of the quorum system as its pre-distributed keys. Whenever any two sensors need a shared key, they exchange their IDs, and then each sensor by itself finds a common key from its assigned subset. A shared key is then generated by the two sensors individually based on the common key. By our scheme, no key is needed to be refreshed as a sensor leaves the network. Upon a sensor joining the network, the KDS broadcasts a message containing the joining sensor ID. After receiving the broadcast message, each sensor updates the key which is in common with the new joining one. Only XOR and hash operations are required to be executed during key update process, and each sensor needs to update one key only. Furthermore, if multiple sensors would like to have a secure group communication, the KDS broadcasts a message containing the partial information of a group key, and then each sensor in the group by itself is able to restore the group key by using the secret sharing technique without cooperating with other sensors in the group.

Performance Modeling of an EPC Information Service System

  • Kim, So-Jung;Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae;Hong, Sung-Jo
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.285-293
    • /
    • 2010
  • To obtain visible and traceable information from the supply chain, HW/SW standards for the EPC global network, which process electronic product code (EPC) data read from Radio frequency identification (RFID) tags, are regarded as the de facto industry standard. Supply chain participants install information service systems and provide logistics information to partners by following the EPCglobal architecture framework. Although quality of service (QoS) is essential for providing dependable and scalable services as pointed out by Auto-ID Lab, only a few models for the performance analysis of QoS-related work have been developed in the context of EPC information service systems. Specifically, doing so allows alternative design choices to be tested in an easy and cost-effective manner and can highlight potential performance problems in designs long before any construction costs are incurred. Thus, in this study we construct a model of an EPC information service system for the purposes of performance analysis and designing a dependable system. We also develop a set of building blocks for analytical performance models. To illustrate how the model works, we determine the characteristics of an EPC information service system and then select a combination of these proven modeling concepts. We construct a performance model that considers the response time and shows how to derive meaningful performance values. Finally, we compare the analytical results to measurements of the EPC information service system.