• Title/Summary/Keyword: detection technique

Search Result 4,105, Processing Time 0.035 seconds

A New Agent Based Fault Tolerant IED System and Its Reliability Analysis (새로운 에이젼트 기반의 결함극복 IED시스템 및 신뢰성 분석)

  • Fan, Weizhong;Lee, Dong-Wook;Lee, Seun-Jae;Lim, Sung-Il;Han, Seung-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2005.07b
    • /
    • pp.1371-1373
    • /
    • 2005
  • Nowadays, Intelligent Electronic Devices(IED) are widely used in power system. In order to improve the selectivity, sensitivity, and reliability of the power system composed by IEDs, A new fault tolerant IED system based on agent technique is presented in this paper. in the presented system, different with existing IED systems, the redundancies are drawn out from IED devices, and compose a standby backup system. And those redundancies are not specified to a particular type of IEDs. By using the agent technique, redundancies can download agents to modify their functions to fit different types of IEDs. As a conclusion, the reliability of the presented system is estimated in this paper.

  • PDF

Ultrasonic Evaluation of Worn Surface (초음파를 이용한 마멸표면 평가)

  • 안효석;김두인
    • Tribology and Lubricants
    • /
    • v.16 no.5
    • /
    • pp.351-356
    • /
    • 2000
  • The feasibility of an ultrasonic technique using a pulse-echo method of normal-incident compressional waves was evaluated for its sensitivity to the worn surface and near surface damage due to wear. Worn surfaces were generated at various oscillation frequency under a given load and amplitude and these surface were in situ monitored using a ultrasonic wave detection system. Analysis of the ultrasonic waves received from the worn surface revealed a close relationship between the surface and near-surface damage and the maximum echo-amplitude of the compressional waves. The ultrasonic technique was successful in assessing the level of severity of the worn surface in real time during the wear process. It is also shown that the wear depth can be easily measured by the calculation of change of the specimen thickness based on the wave speed measured for the specimen medium.

Matching Pursuit Approach for Guided Wave-Based Damage Inspection (유도 초음파 이용 결함 진단을 위한 정합추적 기법)

  • Hong, Jin-Chul;Sun, Kyung-Ho;Kim, Yoon-Young
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2004.11a
    • /
    • pp.615-618
    • /
    • 2004
  • For successful guided-wave damage inspection, the appropriate signal processing of measured wave signals is very important. The objective of this paper is to introduce an efficient signal processing technique especially suitable for the guided-waves used for damage detection. The key idea of this technique is to model guided-waves by chirp functions of special form considering the dispersion phenomenon. To determine the parameter of the chirp functions simulating guided-waves, the matching pursuit algorithm is employed. The damage information in waveguides can be extracted by pulse-characterizing parameters. The effectiveness of present method is checked with the longitudinal wave-based damage inspection.

  • PDF

A Feature Vector Generation Technique through Gradient Correction of an Outline in the Mouth Region (입 영역에서 외곽선의 기울기 보정을 통한 특징벡터 생성 기법)

  • Park, Jung Hwan;Jung, Jong Jin;Kim, Guk Boh
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.10
    • /
    • pp.1141-1149
    • /
    • 2014
  • Recently, various methods to effectively eliminate the noise are researched in image processing techniques. However, the conventional noise filtering techniques, which remove most of the noise, are less efficient for remained noise detection after filtering due to exploiting no face feature information. In this paper, we proposed a feature vector generation technique in the mouth region by distinguishing and revising the remained noise through gradient correction, when the outline is extracted after performing noise filtering.

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.

Optical Image Encryption and Decryption Considering Wireless Communication Channels

  • Cho, Myungjin;Lee, In-Ho
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.215-222
    • /
    • 2014
  • In this paper, we discuss optical encryption and decryption considering wireless communication channels. In wireless communication systems, the wireless channel causes noise and fading effects of the transmitted information. Optical encryption technique such as double-random-phase encryption (DRPE) is used for encrypting transmitted data. When the encrypted data is transmitted, the information may be lost or distorted because there are a lot of factors such as channel noise, propagation fading, etc. Thus, using digital modulation and maximum likelihood (ML) detection, the noise and fading effects are mitigated, and the encrypted data is estimated well at the receiver. To the best of our knowledge, this is the first report that considers the wireless channel characteristics of the optical encryption technique.

Feature Extraction System for Land Cover Changes Based on Segmentation

  • Jung, Myung-Hee;Yun, Eui-Jung
    • Korean Journal of Remote Sensing
    • /
    • v.20 no.3
    • /
    • pp.207-214
    • /
    • 2004
  • This study focused on providing a methodology to utilize temporal information obtained from remotely sensed data for monitoring a wide variety of targets on the earth's surface. Generally, a methodology in understanding of global changes is composed of mapping, quantifying, and monitoring changes in the physical characteristics of land cover. The selected processing and analysis technique affects the quality of the obtained information. In this research, feature extraction methodology is proposed based on segmentation. It requires a series of processing of multitempotal images: preprocessing of geometric and radiometric correction, image subtraction/thresholding technique, and segmentation/thresholding. It results in the mapping of the change-detected areas. Here, the appropriate methods are studied for each step and especially, in segmentation process, a method to delineate the exact boundaries of features is investigated in multiresolution framework to reduce computational complexity for multitemporal images of large size.

Leak Detection in a Water Pipe Network Using the Principal Component Analysis (주성분 분석을 이용한 상수도 관망의 누수감지)

  • Park, Suwan;Ha, Jaehong;Kim, Kimin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.276-276
    • /
    • 2018
  • In this paper the potential of the Principle Component Analysis(PCA) technique that can be used to detect leaks in water pipe network blocks was evaluated. For this purpose the PCA was conducted to evaluate the relevance of the calculated outliers of a PCA model utilizing the recorded pipe flows and the recorded pipe leak incidents of a case study water distribution system. The PCA technique was enhanced by applying the computational algorithms developed in this study. The algorithms were designed to extract a partial set of flow data from the original 24 hour flow data so that the variability of the flows in the determined partial data set are minimal. The relevance of the calculated outliers of a PCA model and the recorded pipe leak incidents was analyzed. The results showed that the effectiveness of detecting leaks may improve by applying the developed algorithm. However, the analysis suggested that further development on the algorithm is needed to enhance the applicability of the PCA in detecting leaks in real-world water pipe networks.

  • PDF

Space-Time Block Coding Techniques for MIMO 2×2 System using Walsh-Hadamard Codes

  • Djemamar, Younes;Ibnyaich, Saida;Zeroual, Abdelouhab
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.1
    • /
    • pp.1-7
    • /
    • 2022
  • Herein, a new space-time block coding technique is proposed for a MIMO 2 × 2 multiple-input multiple output (MIMO) system to minimize the bit error rate (BER) in Rayleigh fading channels with reduced decoding complexity using ZF and MMSE linear detection techniques. The main objective is to improve the service quality of wireless communication systems and optimize the number of antennas used in base stations and terminals. The idea is to exploit the correlation product technique between both information symbols to transmit per space-time block code and their own orthogonal Walsh-Hadamard sequences to ensure orthogonality between both symbol vectors and create a full-rate orthogonal STBC code. Using 16 quadrature amplitude modulation and the quasi-static Rayleigh channel model in the MATLAB environment, the simulation results show that the proposed space-time block code performs better than the Alamouti code in terms of BER performance in the 2 × 2 MIMO system for both cases of linear decoding ZF and MMSE.

Classification of ultrasonic signals of thermally aged cast austenitic stainless steel (CASS) using machine learning (ML) models

  • Kim, Jin-Gyum;Jang, Changheui;Kang, Sung-Sik
    • Nuclear Engineering and Technology
    • /
    • v.54 no.4
    • /
    • pp.1167-1174
    • /
    • 2022
  • Cast austenitic stainless steels (CASSs) are widely used as structural materials in the nuclear industry. The main drawback of CASSs is the reduction in fracture toughness due to long-term exposure to operating environment. Even though ultrasonic non-destructive testing has been conducted in major nuclear components and pipes, the detection of cracks is difficult due to the scattering and attenuation of ultrasonic waves by the coarse grains and the inhomogeneity of CASS materials. In this study, the ultrasonic signals measured in thermally aged CASS were discriminated for the first time with the simple ultrasonic technique (UT) and machine learning (ML) models. Several different ML models, specifically the K-nearest neighbors (KNN), Support Vector Machine (SVM), and Multi-Layer Perceptron (MLP) models, were used to classify the ultrasonic signals as thermal aging condition of CASS specimens. We identified that the ML models can predict the category of ultrasonic signals effectively according to the aging condition.