• Title/Summary/Keyword: cluster method

Search Result 2,498, Processing Time 0.038 seconds

Source Estimation of Dioxin in Soil Using a Congener Pattern (이성체 정보를 이용한 토양 중 다이옥신 오염원 해석)

  • Kim, Jong-Guk;Kim, Kyoung-Soo;Kim, Jae-Sik;Shin, Sun-Kyoung;Chung, Young-Hee;Chung, Il-Rok
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.27 no.3
    • /
    • pp.316-322
    • /
    • 2005
  • In this study, the concentration of 17 dioxin congeners in the soil samples near a waste incinerator with respect to distance from incinerator and wind directions were investigated. The effect of PCB source was investigated using the cluster analysis method. The total concentration and I-TEQ concentration of dioxin ranged from 31.065 to 7,257.499 pg/g(dry weight) and from 0.099 to 35.191 pg I-TEQ/g(dry weight.), respectively. There was a weak correlation(not statistically significant) observed between soil concentration and wind direction, and the distance from the incinerator. The reason may be due to the presence of the local combustion sources other than the target incinerator. The fraction of PCDFs and PCDDs was also examined to study the effect of incinerator. The fraction of PCDFs was decreased with the distance from the incinerator. The influence of target incinerator was found within a 500-meter radius. The high concentration in the for site was due to small incinerators and the use of agricultural chemicals such as PCP. To investigate the relationship between soil near the incinerator and the sources, the cluster analysis was conducted using the congener pattern. As a result soil samples were divided into four groups and were qualitatively estimated the influence of sources such as incinerator and PCP by comparing the congener pattern of each roups. It was thought that a cluster analysis was a useful statistical method for the source estimation of dioxin.

UBVI CCD Photometry of the Globular Cluster M30 (구상성단 M30의 UBVI CCD 측광연구)

  • Lee, Ho;Jeon, Young-Beom
    • Journal of the Korean earth science society
    • /
    • v.27 no.5
    • /
    • pp.557-568
    • /
    • 2006
  • We present CCD UBVI photometry for more than 10,000 stars in $20'.5{\times}20'.5$ field of the halo globular cluster M30. From a color-magnitude diagram, main sequence turnoff was obtained when $V_{TO},\;(B-V)_{TO},\;and\;(V-I)_{TO}\;are\;8.63{\pm}0.05,\;0.44{\pm}0.05\;and\;0.63{\pm}0.05$, respectively. From a (U-B)-(B-V) diagram, reddening parameter, E(B-V) equals $0.05{\pm}0.01$ and a UV color excess ${\delta}(U-B)\;is\;0.27{\pm}0.01$. The abundance is derived, where [Fe/H] equals $-2.05{\pm}0.09$ according to the photometric method and spectroscopic data. The observed luminosity function of M30 shows an excess in the number of red giants relative to the number of turnoff stars, when comparing with the predictions of canonical models. Using the Hipparcos parallaxes for subdwarfs, we estimate distance modulus, $(m-M)_o\;as\;14.75{\pm}0.12$. Using the R and R' method, we find helium abundances, Y(R) as $0.23{\pm}0.02$, Y(R') as $0.29{\pm}0.02$, respectively. Finally, the cluster' sage dispersion was deduced from 10.71 Gyr to 17 Gyr.

A Hashing Scheme using Round Robin in a Wireless Internet Proxy Server Cluster System (무선 인터넷 프록시 서버 클러스터 시스템에서 라운드 로빈을 이용한 해싱 기법)

  • Kwak, Huk-Eun;Chung, Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.615-622
    • /
    • 2006
  • Caching in a Wireless Internet Proxy Server Cluster Environment has an effect that minimizes the time on the request and response of Internet traffic and Web user As a way to increase the hit ratio of cache, we can use a hash function to make the same request URLs to be assigned to the same cache server. The disadvantage of the hashing scheme is that client requests cannot be well-distributed to all cache servers so that the performance of the whole system can depend on only a few busy servers. In this paper, we propose an improved load balancing scheme using hashing and Round Robin scheme that distributes client requests evenly to cache servers. In the existing hashing scheme, if a hashing value for a request URL is calculated, the server number is statically fixed at compile time while in the proposed scheme it is dynamically fixed at run time using round robin method. We implemented the proposed scheme in a Wireless Internet Proxy Server Cluster Environment and performed experiments using 16 PCs. Experimental results show the even distribution of client requests and the 52% to 112% performance improvement compared to the existing hashing method.

Narrowband Signal Localization Based on Enhanced LAD Method

  • Jia, Ke Xin;He, Zi Shu
    • Journal of Communications and Networks
    • /
    • v.13 no.1
    • /
    • pp.6-11
    • /
    • 2011
  • In this paper, an enhanced localization algorithm based on double thresholds (LAD) is proposed for localizing narrowband signals in the frequency domain. A simplified LAD method is first studied to reduce the computational complexity of the original LAD method without performance loss. The upper and lower thresholds of the simplified LAD method are directly calculated by running the forward consecutive mean excision algorithm only once. By combining the simplified LAD method and binary morphological operators, the enhanced LAD method is then proposed and its performance is simply discussed. The simulation results verify the correctness of discussion and show that the enhanced LAD method is superior to the LAD with adjacent cluster combining method, especially at low signal-to-noise ratio.

A File/Directory Reconstruction Method of APFS Filesystem for Digital Forensics

  • Cho, Gyu-Sang;Lim, Sooyeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.8-16
    • /
    • 2022
  • In this paper, we propose a method of reconstructing the file system to obtain digital forensics information from the APFS file system when meta information that can know the structure of the file system is deleted due to partial damage to the disk. This method is to reconstruct the tree structure of the file system by only retrieving the B-tree node where file/directory information is stored. This method is not a method of constructing nodes based on structural information such as Container Superblock (NXSB) and Volume Checkpoint Superblock (APSB), and B-tree root and leaf node information. The entire disk cluster is traversed to find scattered B-tree leaf nodes and to gather all the information in the file system to build information. It is a method of reconstructing a tree structure of a file/directory based on refined essential data by removing duplicate data. We demonstrate that the proposed method is valid through the results of applying the proposed method by generating numbers of user files and directories.

A Study on Adaptive Skin Extraction using a Gradient Map and Saturation Features (경사도 맵과 채도 특징을 이용한 적응적 피부영역 검출에 관한 연구)

  • Hwang, Dae-Dong;Lee, Keun-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4508-4515
    • /
    • 2014
  • Real-time body detection has been researched actively. On the other hand, the detection rate of color distorted images is low because most existing detection methods use static skin color model. Therefore, this paper proposes a new method for detecting the skin color region using a gradient map and saturation features. The basic procedure of the proposed method sequentially consists of creating a gradient map, extracting a gradient feature of skin regions, noise removal using the saturation features of skin, creating a cluster for extraction regions, detecting skin regions using cluster information, and verifying the results. This method uses features other than the color to strengthen skin detection not affected by light, race, age, individual features, etc. The results of the detection rate showed that the proposed method is 10% or more higher than the traditional methods.

Development of Fingerprints for Quality Control of Acorus species by Gas Chromatography/Mass Spectrometry

  • Yu, Se-Mi;Kim, Eun-Kyung;Lee, Je-Hyun;Lee, Kang-Ro;Hong, Jong-Ki
    • Bulletin of the Korean Chemical Society
    • /
    • v.32 no.5
    • /
    • pp.1547-1553
    • /
    • 2011
  • An effective analytical method of gas chromatography/mass spectrometry (GC/MS) was developed for the rapid determination of essential oils in the crude extract of Acorus species (Acorus gramineus, Acorus tatarinowii, and Acorus calamus). Major phenypropanoids (${\beta}$,${\alpha}$-asarone isomers, euasarone, and methyleugenol) and ${\beta}$-caryophyllene in Acorus species were used as marker compounds and determined for the quality control of herbal medicines. To extract marker compounds, various extraction techniques such as solvent immersion, mechanical shaking, and sonication were compared, and the greatest efficiency was observed with sonication extraction using petroleum ether. The dynamic range of the GC/MS method depended on the specific analyte; acceptable quantification was obtained between 10 and 2000 ${\mu}g/mL$ for ${\beta}$-asarone, 10 and 500 ${\mu}g/mL$ for ${\alpha}$-asarone, 10 and 200 ${\mu}g/mL$ for methyleugenol, and between 5 and 100 ${\mu}g/mL$ for ${\beta}$-caryophyllene. The method was deemed satisfactory by inter- and intra-day validation and exhibited both high accuracy and precision, with a relative standard deviation < 10%. Overall limits of detection were approximately 0.34-0.83 ${\mu}g/mL$, with a standard deviation (${\sigma}$)-to-calibration slope (s) ratio (${\sigma}$/s) of 3. The limit of quantitation in our experiments was approximately 1.13-3.20 ${\mu}g/mL$ at a ${\sigma}$/s of 10. On the basement of method validation, 20 samples of Acorus species collected from markets in Korea were monitored for the quality control. In addition, principal component analysis (PCA) and hierarchical cluster analysis (HCA) were performed on the analytical data of 20 different Acorus species samples in order to classify samples that were collected from different regions.

Analysis of fast pressure control by the Ziegler-Nichols method for a transport module of a high vacuum cluster tool (고진공 클러스터 장비의 반송모듈에 적용된 Ziegler-Nichols 방법에 의한 고속 압력제어에 관한 해석)

  • 장원익;이종현;백종태
    • Journal of the Korean Vacuum Society
    • /
    • v.5 no.4
    • /
    • pp.284-291
    • /
    • 1996
  • We have implemented a fast pressure control system for the transport chamber of a high vacuum cluster tool for advance semiconductor fabrication and evaluated its performance. To overcome the typically slow response of mass flow controllers, the modified experimental method is used very effectively to optimize the pressure control procedure. We successfully obtained quite fast pressure control by adjusting the starting time and eht tuning constants by the Ziegler-Nichols method. In the transport pressure $10\times 10^{-5}$ torr, actual pressure control starts from 4 sec after an initial gas load of 2.1 sccm. As a result, optimum conditions for the tuning constants are the rise rate of 0.02 torr/sec, the lag time of 0.15 sec, and the sampling period of 0.5 sec. Then the settling time is about 9 sec within about $\pm$0.5% for the referenced value. This settling time is enhanced above 75 percents in comparison with conventional experimental method. To account for the experimental effects observed, a theoretical model was developed. This experimental result has a tendency to fit with the theoretical result of $\omega$=-1.0.

  • PDF

A Proactive Inference Method of Suspicious Domains (선제 대응을 위한 의심 도메인 추론 방안)

  • Kang, Byeongho;YANG, JISU;So, Jaehyun;Kim, Czang Yeob
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.405-413
    • /
    • 2016
  • In this paper, we propose a proactive inference method of finding suspicious domains. Our method detects potential malicious domains from the seed domain information extracted from the TLD Zone files and WHOIS information. The inference process follows the three steps: searching the candidate domains, machine learning, and generating a suspicious domain pool. In the first step, we search the TLD Zone files and build a candidate domain set which has the same name server information with the seed domain. The next step clusters the candidate domains by the similarity of the WHOIS information. The final step in the inference process finds the seed domain's cluster, and make the cluster as a suspicious domain set. In experiments, we used .COM and .NET TLD Zone files, and tested 10 seed domains selected by our analysts. The experimental results show that our proposed method finds 55 suspicious domains and 52 true positives. F1 scores 0.91, and precision is 0.95 We hope our proposal will contribute to the further proactive malicious domain blacklisting research.

A Resource Clustering Method Considering Weight of Application Characteristic in Hybrid Cloud Environment (하이브리드 클라우드 환경에서의 응용 특성 가중치를 고려한 자원 군집화 기법)

  • Oh, Yoori;Kim, Yoonhee
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.481-486
    • /
    • 2017
  • There are many scientists who want to perform experiments in a cloud environment, and pay-per-use services allow scientists to pay only for cloud services that they need. However, it is difficult for scientists to select a suitable set of resources since those resources are comprised of various characteristics. Therefore, classification is needed to support the effective utilization of cloud resources. Thus, a dynamic resource clustering method is needed to reflect the characteristics of the application that scientists want to execute. This paper proposes a resource clustering analysis method that takes into account the characteristics of an application in a hybrid cloud environment. The resource clustering analysis applies a Self-Organizing Map and K-means algorithm to dynamically cluster similar resources. The results of the experiment indicate that the proposed method can classify a similar resource cluster by reflecting the application characteristics.