• Title/Summary/Keyword: Signature Patterns

Search Result 69, Processing Time 0.025 seconds

Elements and Application of "SmartHome" Concept for Older Adults in USA (미국에서 노인을 위한 "스마트홈(SmartHome)" 개념의 요소와 적용)

  • Moon, Changho
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.17 no.4
    • /
    • pp.7-14
    • /
    • 2011
  • This paper is intended to suggest some reference materials for future elderly housing design, especially smart home, in Korea, by reviewing the elements and applications of smart home concept for older adults in USA. Research method includes collecting materials by attending the regular SmartHome$^{(R)}$ part meeting, the navigation of related homepages, and the analysis of collected materials. Current researches in Korea look initial stage and show some general principles without practical concept & technologies of elderly facilities. SeniorSmart$^{(R)}$ Center in USA started on August 2007 with the 3 parts of SmartHOME$^{(R)}$, SmartWHEELS$^{(R)}$ and SmartBRAIN$^{(R)}$. The Center has been doing various multidisciplinary research projects but slowing down the planned processes due to national economic recession. The major researches of SmartHome$^{(R)}$ part can be summarized as follows; CS-PFP( Continuous Scale Physical Function Performance) laboratory is being in operation to help older adults and families make the difficult decision regarding the ability and safety to live independently. Three levels of necessary laboratories from uninhabited space to senior living environment were accommodated for field research. As core technologies of SmartHome$^{(R)}$, predicting & warning system of fall risk on recognizing gait signature patterns to identify any deviation from the normal patterns of the older adults, home monitoring system which will send alerts to a specified relative and/or health care professional when vital signs of the older adults will not be within normal parameters, and Mobility & Research Clinic for evaluating, treating the older adults & multidisciplinary research are under development. SmartHome$^{(R)}$ has made collaborative research agreements for field laboratory with various retirement communities and also is continuing to work for experimental software engineering with the Fraunhofer Institute, Germany.

A High-speed Pattern Matching Acceleration System for Network Intrusion Prevention Systems (네트워크 침입방지 시스템을 위한 고속 패턴 매칭 가속 시스템)

  • Kim Sunil
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.87-94
    • /
    • 2005
  • Pattern matching is one of critical parts of Network Intrusion Prevention Systems (NIPS) and computationally intensive. To handle a large number of attack signature fattens increasing everyday, a network intrusion prevention system requires a multi pattern matching method that can meet the line speed of packet transfer. In this paper, we analyze Snort, a widely used open source network intrusion prevention/detection system, and its pattern matching characteristics. A multi pattern matching method for NIPS should efficiently handle a large number of patterns with a wide range of pattern lengths and case insensitive patterns matches. It should also be able to process multiple input characters in parallel. We propose a multi pattern matching hardware accelerator based on Shift-OR pattern matching algorithm. We evaluate the performance of the pattern matching accelerator under various assumptions. The performance evaluation shows that the pattern matching accelerator can be more than 80 times faster than the fastest software multi-pattern matching method used in Snort.

Genomic diversity and admixture patterns among six Chinese indigenous cattle breeds in Yunnan

  • Li, Rong;Li, Chunqing;Chen, Hongyu;Liu, Xuehong;Xiao, Heng;Chen, Shanyuan
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.32 no.8
    • /
    • pp.1069-1076
    • /
    • 2019
  • Objective: Yunnan is not only a frontier zone that connects China with South and Southeast Asia, but also represents an admixture zone between taurine (Bos taurus) and zebu (Bos indicus) cattle. The purpose of this study is to understand the level of genomic diversity and the extent of admixture in each Yunnan native cattle breed. Methods: All 120 individuals were genotyped using Illumina BovineHD BeadChip (777,962 single nucleotide polymorphisms [SNPs]). Quality control and genomic diversity indexes were calculated using PLINK software. The principal component analysis (PCA) was assessed using SMARTPCA program implemented in EIGENSOFT software. The ADMIXTURE software was used to reveal admixture patterns among breeds. Results: A total of 604,630 SNPs was obtained after quality control procedures. Among six breeds, the highest level of mean heterozygosity was found in Zhaotong cattle from Northeastern Yunnan, whereas the lowest level of heterozygosity was detected in Dehong humped cattle from Western Yunnan. The PCA based on a pruned dataset of 233,788 SNPs clearly separated Dehong humped cattle (supposed to be a pure zebu breed) from other five breeds. The admixture analysis further revealed two clusters (K = 2 with the lowest cross validation error), corresponding to taurine and zebu cattle lineages. All six breeds except for Dehong humped cattle showed different degrees of admixture between taurine and zebu cattle. As expected, Dehong humped cattle showed no signature of taurine cattle influence. Conclusion: Overall, considerable genomic diversity was found in six Yunnan native cattle breeds except for Dehong humped cattle from Western Yunnan. Dehong humped cattle is a pure zebu breed, while other five breeds had admixed origins with different extents of admixture between taurine and zebu cattle. Such admixture by crossbreeding between zebu and taurine cattle facilitated the spread of zebu cattle from tropical and subtropical regions to other highland regions in Yunnan.

A Proposal for Optical Diagnostics Through the Enhancement of Diffraction Patterns Using Thin-film Interference Filters

  • Stefanita Carmen Gabriela;Shao Yun Feng
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.9 no.6
    • /
    • pp.428-434
    • /
    • 2004
  • Coarse clumping of solid materials within diseased biological cells can have a marked influence on the light scattering pattern. Perturbations in refractive index lead to distinct varia­tions in the cytometric signature, especially apparent over wide scattering angles. The large dynamic range of scattering intensities restricts collection of data to narrow angular intervals be­lieved to have the highest potential for medical diagnosis. We propose the use of an interfer­ence filter to reduce the dynamic range. Selective attenuation of scattering intensity levels is expected to allow simultaneous data collection over a wide angular interval. The calculated angu­lar transmittance of a commercial shortwave-pass filter of cut-off wavelength 580 nm indicates significant attenuation of scattering peaks below ${\~}\;10^{circ}$, and reasonable peak equalization at higher angles. For the three-dimensional calculation of laser light scattered by cells we use a spectral method code that models cells as spatially varying dielectrics, stationary in time. How­ever, we perform preliminary experimental testing with the interference filter on polystyrene microspheres instead of biological cells. A microfluidic toolkit is used for the manipulation of the microspheres. The paper intends to illustrate the principle of a light scattering detection system incorporating an interference filter for selective attenuation of scattering peaks.

Design on the efficient BILBO for BIST allocation of ASIC (ASIC의 BIST 할당을 위한 효과적인 BILBO 설계)

  • 이강현
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.9
    • /
    • pp.53-60
    • /
    • 1997
  • In this paper, an efficient BILBO(named EBILBO) is proposed for batch testing application when a BIST (built-in self test) circuit is implemented on ASIC. In a large and complex circuit, the proposed algorithm of batch testing has one pin-count that can easily control 4 test modes in the normal speed of circuit operation. For the implementation of the BIST cifcuit, the test patern needed is generated by PRTPG(pseudo-random test pattern generator) and the ouput is observed by proposed algorithm is easily modified, such as the modelling of test pattern genration, signature EBILBO area and performance of the implemented BIST are evaluated using ISCAS89 benchmark circuits. As a resutl, in a circuit above 600 gates, it is confirmed that test patterns are genrated flexibly about 500K as EBILBO area is 59%, and the range of fault coverage is from 88.3% to 100%. And the optimized operation frequency of EBILBO designed and the area are 50MHz and 150K respectively. On the BIST circit of the proposed batch testing, the test mode of EBILBO is able to execute as realtime that has te number of s$\^$+/n$\^$+/(2s/2p-1) clocks simultaneously with the normal mode of circuit operation. Also the proposed algorithm is made of the library with VHDL coding thus, it will be widely applied to DFT (design for testability) that satisfies the design and test field.

  • PDF

Event-related potentials reveal neural signatures of cross-modal interaction between visual and tactile stimulation (유발전위신호(ERP)를 통한 시각과 촉각 통합작용의 신경생리적 특징 분석)

  • Ju, Yu-Mi;Lee, Kyoung-Min
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2010.05a
    • /
    • pp.48-54
    • /
    • 2010
  • INTRODUCTION Interaction between temporal events at the millisecond level is important for visual and tactile interaction. OBJECT The aim of the present study is to identify any neural signature, as reflected in event-related potentials (ERP), for the integrative processes when the two sensory modalities are stimulated in synchrony as opposed to when they are stimulated separately. METHOD The basic strategy was to compare ERP signals obtained with simultaneous visual and tactile stimulation with a linear summation of ERP patterns obtained with each modality stimulated separately. Condition were presented, paired with various stimulus-onset-asynchronies (SOA) ranging from - 300 ms (tactile-first) to 300 ms (visual-first), and in trials where only one modality was stimulated alone. RESULT A positive deviation was located in observed ERP at C4 electrode (contralateral to the stimulated hand) at 200-400 ms, in comparison to the predicted ERP. The deviation was present at all SOAs other than -300ms (tactile-first) and 300 ms (visual-first). There was also a positive deviation at occipital leads at the 50-ms SOA (visual-first) trials. DISCUSSION It suggested that neural signatures of cross-modal integration occur within a limited time-window. The deviations were specifically localized at the contralateral somatosensory and visual cortices, indicating that the integration happens at or before the level of the primary cortices.

  • PDF

Detection of Malicious Code using Association Rule Mining and Naive Bayes classification (연관규칙 마이닝과 나이브베이즈 분류를 이용한 악성코드 탐지)

  • Ju, Yeongji;Kim, Byeongsik;Shin, Juhyun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1759-1767
    • /
    • 2017
  • Although Open API has been invigorated by advancements in the software industry, diverse types of malicious code have also increased. Thus, many studies have been carried out to discriminate the behaviors of malicious code based on API data, and to determine whether malicious code is included in a specific executable file. Existing methods detect malicious code by analyzing signature data, which requires a long time to detect mutated malicious code and has a high false detection rate. Accordingly, in this paper, we propose a method that analyzes and detects malicious code using association rule mining and an Naive Bayes classification. The proposed method reduces the false detection rate by mining the rules of malicious and normal code APIs in the PE file and grouping patterns using the DHP(Direct Hashing and Pruning) algorithm, and classifies malicious and normal files using the Naive Bayes.

Intelligent Malicious Web-page Detection System based on Real Analysis Environment (리얼 분석환경 기반 지능형 악성 웹페이지 탐지 시스템)

  • Song, Jongseok;Lee, Kyeongsuk;Kim, Wooseung;Oh, Ikkyoon;Kim, Yongmin
    • Journal of KIISE
    • /
    • v.45 no.1
    • /
    • pp.1-8
    • /
    • 2018
  • Recently, distribution of malicious codes using the Internet has been one of the most serious cyber threats. Technology of malicious code distribution with detection bypass techniques has been also developing and the research has focused on how to detect and analyze them. However, obfuscated malicious JavaScript is almost impossible to detect, because the existing malicious code distributed web page detection system is based on signature and another limitation is that it requires constant updates of the detection patterns. We propose to overcome these limitations by means of an intelligent malicious code distributed web page detection system using a real browser that can analyze and detect intelligent malicious code distributed web sites effectively.

A Study of Alexander McQueen's Jacket (알렉산더 맥퀸(Alexander McQueen)의 재킷에 관한 연구)

  • Lee, Jeong-Eun;Do, Wol-Hee;Lee, Mi-Suk
    • Fashion & Textile Research Journal
    • /
    • v.18 no.2
    • /
    • pp.194-206
    • /
    • 2016
  • This study analyzed jackets by Alexander McQueen that have always pleased customers with traditional tailoring via every season's collection. This study categorized and then analyzed jackets by components such as silhouette, jacket length, collar, lapel, sleeve, shoulder line, and closure methods. To achieve the research goal, the study referred to photographs of 501 jackets introduced in signature brand collections by Alexander McQueen between 1996 and 2010. The analysis results on McQueen's jackets with the general components of the clothes indicated that the frequency of traditional tailoring components (such as lapels, tight sleeves, natural shoulder lines, and a button closing method) was higher than the frequency of designs of dramatic, deconstructive patterns examined by previously-conducted research. This shows that Alexander McQueen was cognizant to the responsibilities as a tailor and the basics of tailoring when developing jacket designs. This study also confirmed how McQueen enjoyed adding exaggerated jacket design components by making various use of details that emphasize drastic shapes like the hourglass silhouette, wing collar (that covers the shoulders), peaked lapel collar, kimono sleeve, bell sleeve, crescent shoulder, and pagoda shoulder.

Comparative review and interpretation of the conventional and new methods in blast vibration analyses

  • Uyar, G. Gulsev;Aksoy, C.O.
    • Geomechanics and Engineering
    • /
    • v.18 no.5
    • /
    • pp.545-554
    • /
    • 2019
  • The customary approach used in the blast vibration analysis is to derive empirical relations between the peak particle velocities of blast-induced waves and the scaled distance, and to develop patterns limiting the amounts of explosives. During the periods when excavations involving blasting were performed at sites far from residential areas and infrastructure works, this method based on empirical correlations could be effective in reducing vibrations. However, blasting procedures applied by the fast-moving mining and construction industries today can be very close to, in particular cities, residential areas, pipelines, geothermal sites, etc., and this reveals the need to minimize blast vibrations not only by limiting the use of explosives, but also employing new scientific and technological methods. The conventional methodology in minimizing blast vibrations involves the steps of i) measuring by seismograph peak particle velocity induced by blasting, ii) defining ground transmission constants between the blasting area and the target station, iii) finding out the empirical relation involving the propagation of seismic waves, and iv) employing this relation to identify highest amount of explosive that may safely be fired at a time for blasting. This paper addresses practical difficulties during the implementation of this conventional method, particularly the defects and errors in data evaluation and analysis; illustrates the disadvantages of the method; emphasizes essential considerations in case the method is implemented; and finally discusses methods that would fit better to the conditions and demands of the present time compared to the conventional method that intrinsically hosts the abovementioned disadvantages.