• Title/Summary/Keyword: data recover

Search Result 490, Processing Time 0.046 seconds

PhysioCover: Recovering the Missing Values in Physiological Data of Intensive Care Units

  • Kim, Sun-Hee;Yang, Hyung-Jeong;Kim, Soo-Hyung;Lee, Guee-Sang
    • International Journal of Contents
    • /
    • v.10 no.2
    • /
    • pp.47-58
    • /
    • 2014
  • Physiological signals provide important clues in the diagnosis and prediction of disease. Analyzing these signals is important in health and medicine. In particular, data preprocessing for physiological signal analysis is a vital issue because missing values, noise, and outliers may degrade the analysis performance. In this paper, we propose PhysioCover, a system that can recover missing values of physiological signals that were monitored in real time. PhysioCover integrates a gradual method and EM-based Principle Component Analysis (PCA). This approach can (1) more readily recover long- and short-term missing data than existing methods, such as traditional EM-based PCA, linear interpolation, 5-average and Missing Value Singular Value Decomposition (MSVD), (2) more effectively detect hidden variables than PCA and Independent component analysis (ICA), and (3) offer fast computation time through real-time processing. Experimental results with the physiological data of an intensive care unit show that the proposed method assigns more accurate missing values than previous methods.

The Analysis of Chloride Penetration at Concrete and Repair Material under Tidal and Splash Zone (조간대와 비말대의 콘크리트와 보수재의 염분침투 특성분석)

  • Lee, Joon-Gu;Cho, Young-Kwoun;Kim, Meyong-Won;Kim, Kwan-Ho;Joo, Jae-Hong;Kim, Han-Joung
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2010.05a
    • /
    • pp.207-208
    • /
    • 2010
  • The building that supply tidal and splash zone was constructed near Seamangeum Gate Bridge. The specimens that will be tested for maintenance of gate bridge were exposed on the tidal and splash zone, totally about 650. The characteristics of strength, salt penetration profile, field application of surface repair material and section recover material will be acquired by periodical test. The program was developed to obtain optimal maintenance strategy of gate bridge as a marine concrete structure and to deposit experimental data, lab. test result, field test result, on its D/B. On this paper, the comparison of concrete and recover material in the salt penetration characteristics was expressed. The quantitative analysis of salt contents in concrete surface was most important so the improvement for the machine of gathering power of concrete and the apparatus of measuring chloride contents was proceeded at this time. The two conclusions were summarized like as - The resistance of chloride attack of concrete was appeared 2.5 times bigger than that of recover material - The resistance of chloride attack of polymer series was appeared more higher than that of others.

  • PDF

Related-Key Differential Attacks on CHESS-64

  • Luo, Wei;Guo, Jiansheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3266-3285
    • /
    • 2014
  • With limited computing and storage resources, many network applications of encryption algorithms require low power devices and fast computing components. CHESS-64 is designed by employing simple key scheduling and Data-Dependent operations (DDO) as main cryptographic components. Hardware performance for Field Programmable Gate Arrays (FPGA) and for Application Specific Integrated Circuits (ASIC) proves that CHESS-64 is a very flexible and powerful new cipher. In this paper, the security of CHESS-64 block cipher under related-key differential cryptanalysis is studied. Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key. To recover 74 bits key, two key recovery algorithms are proposed based on the two types of related-key differential characteristics, and the corresponding data complexity is about $2^{42.9}$ chosen-plaintexts, computing complexity is about $2^{42.9}$ CHESS-64 encryptions, storage complexity is about $2^{26.6}$ bits of storage resources. To break the cipher, an exhaustive attack is implemented to recover the rest 54 bits key. These works demonstrate an effective and general way to attack DDO-based ciphers.

Large Scale Failure Adaptive Routing Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 대규모 장애 적응적 라우팅 프로토콜)

  • Lee, Joa-Hyoung;Seon, Ju-Ho;Jung, In-Bum
    • The KIPS Transactions:PartA
    • /
    • v.16A no.1
    • /
    • pp.17-26
    • /
    • 2009
  • Large-scale wireless sensor network are expected to play an increasingly important role for the data collection in harmful area. However, the physical fragility of sensor node makes reliable routing in harmful area a challenging problem. Since several sensor nodes in harmful area could be damaged all at once, the network should have the availability to recover routing from node failures in large area. Many routing protocols take accounts of failure recovery of single node but it is very hard these protocols to recover routing from large scale failures. In this paper, we propose a routing protocol, which we refer to as LSFA, to recover network fast from failures in large area. LSFA detects the failure by counting the packet loss from parent node and in case of failure detection LSFAdecreases the routing interval to notify the failure to the neighbor nodes. Our experimental results indicate clearly that LSFA could recover large area failures fast with less packets than previous protocols.

Analysis of Material Deformation Behavior in Nanoindentation Process by using 3D Finite Element Analysis and its Experimental Verification (3차원 유한요소해석을 이용한 나노인덴테이션 공정에서의 소재거동해석 및 실험적 검증)

  • 이정우;윤성원;강충길
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.1174-1177
    • /
    • 2003
  • In this study, to achieve the optimal conditions for mechanical hyper-fine pattern fabrication process, deformation behavior of the materials during indentation was studied with numerical method by ABAQUS S/W. Polymer (PMMA) and brittle materials (Si, Pyrex glass) were used as specimens, and forming conditions to reduce the elastic recover and pile-up was proposed. The indenter was modeled a 3D rigid surface. Minimum mesh sizes of specimens are 1-10nm. Comparison between the experimental data and numerical result demonstrated that the finite element approach is capable of reproducing the loading-unloading behavior of a nanoindentation test. The result of the investigation will be applied to the fabrication of the hyper-fine pattern.

  • PDF

Mapping Block Information Recovery

  • Abdulhadi, Alahmadi;Chung, Tae Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.506-507
    • /
    • 2015
  • Our scheme going to use the advanteges of shadow technical and use it in flash memory. With our scheme we can maintain the system from corruption by making a capy table for table mappinng. It is make us to recover the data easily when something unusually happen to the system.

Level Conversion Scheme for Improving Performance of RAID 5 on Single Disk Failure (단일디스크 고장시 RAID 5의 성능개선을 위한 레벨 전환 기법)

  • Jeon, Sang-Hoon;Chung, Hyun-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.2
    • /
    • pp.8-18
    • /
    • 1999
  • It is very important to recover data immediately at a single disk failure for critical applications such as multimedia storage systems. real-time systems and so on. As an efficient solution, this paper proposes that RAID level conversion scheme to improve the performance before a failed disk is replaced with a new disk. By using this scheme, it does not require an additional disk to recover data. Comparing with previous studies, this scheme is appropriate to low cost system that has not additional redundant device. The performance of proposed scheme is evaluated and analyzed with that of RAID level 5 for various requested sizes through the simulation. The results show that the performance of the proposed scheme is improved up to 20 percents compared with that of RAID level 5 at the failure mode and 80 percents at reconfigured mode.

  • PDF

Impossible Differential Cryptanalysis on DVB-CSA

  • Zhang, Kai;Guan, Jie;Hu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1944-1956
    • /
    • 2016
  • The Digital Video Broadcasting-Common Scrambling Algorithm is an ETSI-designated algorithm designed for protecting MPEG-2 signal streams, and it is universally used. Its structure is a typical hybrid symmetric cipher which contains stream part and block part within a symmetric cipher, although the entropy is 64 bits, there haven't any effective cryptanalytic results up to now. This paper studies the security level of CSA against impossible differential cryptanalysis, a 20-round impossible differential for the block cipher part is proposed and a flaw in the cipher structure is revealed. When we attack the block cipher part alone, to recover 16 bits of the initial key, the data complexity of the attack is O(244.5), computational complexity is O(222.7) and memory complexity is O(210.5) when we attack CSA-BC reduced to 21 rounds. According to the structure flaw, an attack on CSA with block cipher part reduced to 21 rounds is proposed, the computational complexity is O(221.7), data complexity is O(243.5) and memory complexity is O(210.5), we can recover 8 bits of the key accordingly. Taking both the block cipher part and stream cipher part of CSA into consideration, it is currently the best result on CSA which is accessible as far as we know.

An Analysis of the Trends in the Arena of Cooperation by the International Research Cooperation Related Experts

  • Noh, Younghee;Ro, Ji Yoon;Kwak, Woojung
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.4
    • /
    • pp.53-86
    • /
    • 2021
  • The International Research Cooperation Information Center has carried out a project to collect the DBs related to the international research cooperation information, and build an online service system. This study seeks to examine and understand the trends of international research cooperation by analyzing the data corresponding to the other international cooperation DBs such as symposium and seminar, which may be said to be the arena of cooperation by the international research cooperation related experts, among the international research cooperation information DBs collected by the International Research Cooperation Information Center. The other international cooperation DBs are divided into the international cooperation consortium, international cooperation symposium, international research cooperation seminar, international training program, international research cooperation workshop, and the international research cooperation equipment / facility. It seems that, based on the research results, it is necessary to hold international cooperation programs, seminars, and workshops, among others, with a focus on the themes to recover the trends of international cooperation as in the past, and recover from the pandemic situation. The results of this study may be utilized as the basic data for the researchers related to the international research cooperation, and furthermore, by analyzing various international research cooperation information DBs in a multi-faceted manner, the studies analyzing the research trends of international research cooperation by field, subject, and type may be conducted, and the facilitation of the international research cooperation in Korea is expected moving forward.

Design of A Clock-and-Data Recovery Circuit for Detection and Reconstruction of Broadband Multi-rate Optical Signals (다중속도의 광신호 추출 및 클락-데이터 복원회로 설계)

  • Kim, Kang-Wook
    • Journal of Sensor Science and Technology
    • /
    • v.12 no.4
    • /
    • pp.191-197
    • /
    • 2003
  • Due to explosive increase of internet usage, broadband data transmission using optical fibers is broadly used. In order to decrease distortion during long distance transmission, the optical signal need to be restored, typically, by converting the optical signal into the electrical signal. The optical signal is converted into the electrical signal using a photo-diode, and then a clock-and-recovery (CDR) circuit is used to recover the clock and retime the data. In this study, a clock-and-data recovery circuit has been designed using a standard 1.8 V $0.18\;{\mu}m$ CMOS process. With this CDR circuit, the improved phase detector and charge pump have been utilized. Also, by using a ring oscillator, the CDR circuit can recover clock and data from broadband multi-rate data ranging between 750 Mb/s and 2.85 Gb/s.