• Title/Summary/Keyword: problem analysis

Search Result 16,360, Processing Time 0.042 seconds

The Degree of Musculoskeletal Discomfort of Officers (사무직근로자의 신체부위별 근골격계 증상과 관련요인)

  • Sim, Mi-Jung;Son, In-A;Hong, Sung-Gi
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.249-258
    • /
    • 2009
  • The purpose of this study is to identify the factors influencing the musculoskeletal discomfort and the physical region related symptoms. The outcome of the study uses KOSHA Code H-30-2003 which defines possible symptoms into different categories. Symptom I, ll showing the highest occurrence rate in shoulder and neck regions and most of Symptom III, IV come from back region. Analysis of the factors influencing the musculoskeletal discomfort vary in different parts of the body. In the neck region, the discomfort related to rest and the computer keyboard. Gender affects the magnitude of pain in the shoulder region. Wrist pain is related to the chairs being used and back discomfort is influenced by shoulder exercise and the degree of rest taken. Physical fatigue due to work affects all the regions mentioned above. Conclusively, office workers are prone to the musculoskeletal discomfort due to their work environment. To alleviate this problem, the workers need to be educated with proper long-term musculoskeletal related health programs and exercise program containing various stretching methods. In addition, the effort to improve the variables in this study would help to reduce the rate of musculoskeletal discomfort.

Analysis of Facial Movement According to Opposite Emotions (상반된 감성에 따른 안면 움직임 차이에 대한 분석)

  • Lee, Eui Chul;Kim, Yoon-Kyoung;Bea, Min-Kyoung;Kim, Han-Sol
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.1-9
    • /
    • 2015
  • In this paper, a study on facial movements are analyzed in terms of opposite emotion stimuli by image processing of Kinect facial image. To induce two opposite emotion pairs such as "Sad - Excitement"and "Contentment - Angry" which are oppositely positioned onto Russell's 2D emotion model, both visual and auditory stimuli are given to subjects. Firstly, 31 main points are chosen among 121 facial feature points of active appearance model obtained from Kinect Face Tracking SDK. Then, pixel changes around 31 main points are analyzed. In here, local minimum shift matching method is used in order to solve a problem of non-linear facial movement. At results, right and left side facial movements were occurred in cases of "Sad" and "Excitement" emotions, respectively. Left side facial movement was comparatively more occurred in case of "Contentment" emotion. In contrast, both left and right side movements were occurred in case of "Angry" emotion.

Performance Improvement of the Statistic Signature based Traffic Identification System (통계 시그니쳐 기반 트래픽 분석 시스템의 성능 향상)

  • Park, Jin-Wan;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.243-250
    • /
    • 2011
  • Nowadays, the traffic type and behavior are extremely diverse due to the appearance of various services on Internet, which makes the need of traffic identification important for efficient operation and management of network. In recent years traffic identification methodology using statistical features of flow has been broadly studied. We also proposed a traffic identification methodology using payload size distribution in our previous work, which has a problem of low completeness. In this paper, we improved the completeness by solving the PSD conflict using IP and port. And we improved the accuracy by changing the distance measurement between flow and statistic signature from vector distance to per-packet distance. The feasibility of our methodology was proved via experimental evaluation on our campus network.

Real Time Lip Reading System Implementation in Embedded Environment (임베디드 환경에서의 실시간 립리딩 시스템 구현)

  • Kim, Young-Un;Kang, Sun-Kyung;Jung, Sung-Tae
    • The KIPS Transactions:PartB
    • /
    • v.17B no.3
    • /
    • pp.227-232
    • /
    • 2010
  • This paper proposes the real time lip reading method in the embedded environment. The embedded environment has the limited sources to use compared to existing PC environment, so it is hard to drive the lip reading system with existing PC environment in the embedded environment in real time. To solve the problem, this paper suggests detection methods of lip region, feature extraction of lips, and awareness methods of phonetic words suitable to the embedded environment. First, it detects the face region by using face color information to find out the accurate lip region and then detects the exact lip region by finding the position of both eyes from the detected face region and using the geometric relations. To detect strong features of lighting variables by the changing surroundings, histogram matching, lip folding, and RASTA filter were applied, and the properties extracted by using the principal component analysis(PCA) were used for recognition. The result of the test has shown the processing speed between 1.15 and 2.35 sec. according to vocalizations in the embedded environment of CPU 806Mhz, RAM 128MB specifications and obtained 77% of recognition as 139 among 180 words were recognized.

Risk Perception and Correlates of Tobacco Use among Young People Outside of Formal School Settings in Lagos State, Nigeria

  • Odukoya, OO;Dada, MR;Olubodun, T;Igwilo, UA;Ayo-Yusuf, OA
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.6
    • /
    • pp.2833-2839
    • /
    • 2016
  • Background: Tobacco use among youth is a major public health problem. Youth outside of formal school settings are often understudied but may be at increased risk. Materials and Methods: A descriptive cross-sectional study was carried out among 326 young people aged 15-24 years in four randomly selected motor parks in Lagos state. Interviewer-administered questionnaires were used to collect data. Results: The mean age of the respondents was $21.0{\pm}2.3yrs$. Many 252 (77.3%) dropped out before the end of the third year of secondary schooling. The majority were aware that active (78.2%), and passive smoking (77.3%) are harmful to health. Nearly two-thirds of the respondents disagreed with an outright ban of cigarettes (63.2%) and restriction of cigarette sales to persons below 18 years (67.9%) while 254 (66.8%) supported a ban on tobacco smoking in enclosed public places. One hundred and fifty (46.0%) respondents had experimented with smoking of which 106 (32.5%) had progressed to become current smokers. Half of the current smokers, 54 (50.9%), felt the need for a cigarette first thing in the morning. A multivariate analysis for smoking initiation, showed that for every increasing year of age, respondents were 1.08 times more likely to have initiated cigarette smoking; males and respondents who lived alone or with peers were 2.34 times and 1.77 times more likely to have initiated smoking respectively; those who consume alcohol and marijuana were 7.27 and 1.89 times respectively more likely to have initiated smoking while those who consumed alcohol were 6.17 times more likely to be current smokers.

Seismic Retrofitting of Cabinet Structures in Nuclear Power Plant (원자력 발전소 캐비닛구조물의 내진보강)

  • 이계희;김재민;김상윤
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.7 no.4
    • /
    • pp.31-37
    • /
    • 2003
  • This paper presents the methodologies for seismic retrofitting of cabinet equipment which can be employed to resolve the USI A-46 problem related to seismic qualification of old nuclear power plant. To obtain accurate dynamic characteristics of a cabinet structure, three types of structural modeling are introduced and the their free vibration modes are compared. Three types of seismic retrofitting scenarios, such as 1) the installation of bracing, 2) installation of damper, 3) installation of tuned mass damper(TMD), are established and evaluated for the decrease of ICRS(In Cabinet Reponse Spectrum). In the cases of 1) & 2), since the retrofitted structures show larger ICRS than that of the original structure, the careful considerations are need in the application of these methods. Though the installation of TMD shows the best retrofitting result, the construction of analysis model that indicate the accurate vibration modes of real structure is estimated the essential step of this retrofitting method.

Application of Multiple Parks Vector Approach for Detection of Multiple Faults in Induction Motors

  • Vilhekar, Tushar G.;Ballal, Makarand S.;Suryawanshi, Hiralal M.
    • Journal of Power Electronics
    • /
    • v.17 no.4
    • /
    • pp.972-982
    • /
    • 2017
  • The Park's vector of stator current is a popular technique for the detection of induction motor faults. While the detection of the faulty condition using the Park's vector technique is easy, the classification of different types of faults is intricate. This problem is overcome by the Multiple Park's Vector (MPV) approach proposed in this paper. In this technique, the characteristic fault frequency component (CFFC) of stator winding faults, rotor winding faults, unbalanced voltage and bearing faults are extracted from three phase stator currents. Due to constructional asymmetry, under the healthy condition these characteristic fault frequency components are unbalanced. In order to balanced them, a correction factor is added to the characteristic fault frequency components of three phase stator currents. Therefore, the Park's vector pattern under the healthy condition is circular in shape. This pattern is considered as a reference pattern under the healthy condition. According to the fault condition, the amplitude and phase of characteristic faults frequency components changes. Thus, the pattern of the Park's vector changes. By monitoring the variation in multiple Park's vector patterns, the type of fault and its severity level is identified. In the proposed technique, the diagnosis of faults is immune to the effects of unbalanced voltage and multiple faults. This technique is verified on a 7.5 hp three phase wound rotor induction motor (WRIM). The experimental analysis is verified by simulation results.

Route Optimization Using a Limited Prefix Delegation Method in Multi-level Nested Mobile Network Environments (다단 중첩된 이동네트워크 환경에서 제한된 프리픽스 위임 방법을 이용한 경로최적화)

  • Song, Jung-Wook;Han, Sun-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.309-321
    • /
    • 2009
  • Nowadays, requests of connecting to the Internet while moving are increasing more and more, and various technologies have been developed for satisfying those requests. The IETF nemo WG standardized "Network Mobility Basic Support Protocol" for supporting mobile network through extending existing MIPv6 protocol for supporting host mobility. But, mobile networks can be nested while they are changing their location. And if they are multi -level nested, that causes some problems because of protocol characteristic. In this paper, we try to solve the problem that is complicated routing path caused by multi-level nesting of mobile networks with our limited prefix delegation method. We give a little modification to the standard protocol and add some functions to mobile router. With results from analysis, we could say that our method has better performance than other proposed methods.

Analysis of Smart Grid Network Vulnerability Using Smart Phone (Smart Phone을 통한 Smart Grid 네트워크 접속에서 취약성)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.240-243
    • /
    • 2010
  • Smart Phone supplies are diffused and substitute the Internet PC with Mobile communications which they are applied. Smart Phone in Smart Grid where electric power watch and the IT of existing amalgamate are used with business. Consequently from Smart Grid network connections which lead Smart Phone in about connection and control in about security vulnerabilities and Smart Grid networks the research is necessary in about vulnerability. It uses Smart Phone from the present paper and when approaching electric power watch systems which lead Smart Grid networks, it researches in about connection vulnerability. Also it uses Smart Phone and after connecting in Smart Grid networks a vulnerability in seizure possibility and, electric power information and control information, about private data etc. access authority it analyzes with the problem point which occurs it confronts it researches. And the research direction for a security reinforcement under presenting boil in about Smart Grid network security vulnerabilities which lead Smart Phone.

  • PDF

Efficient Algorithms for Causal Message Logging and Revoery (인과적 메시지 로그 및 복구를 위한 효율적인 알고리즘)

  • Lee, Byeong-Ju;Park, Tae-Sun;Yeom, Heon-Yeong;Jo, Yu-Geun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.767-777
    • /
    • 1999
  • 인과적 메시지 로깅 기법은 정상프로세스를 역전(roll-back)시키거나 메시지의 저장을 위해 프로세스의 수행을 중단시키지 않는 장점을 지니고 있지만, 메시지의 크기가 지나치게 커진다는 단점을 지니고 있다. 본 논문에서는 인과적 메시지 로깅 기법의 이러한 문제점을 해결하기 위하여 로그 상속의 개념을 정의하고 로그 연혁을 이용하여 로그 비용, 특히 로그 크기 면에서 효율적인 로깅 기법을 제안한다. 또한 이 로깅 알고리즘을 이용하여 복구시 메시지의 수와 크기를 줄여 복구시간을 줄이는 효율적인 복구 알고리즘을 제안하고, 제안한 알고리즘이 메시지 로그 크기 면에서 효율적임을 증명한다. 또 제안한 알고리즘의 성능을 검증하기 위하여 두 가지 종류의 모의 실험을 수행하여 기존의 로깅 프로토콜과 메시지 크기 면에서의 성능을 비교한 결과를 제시하였다.Abstract Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging algorithm based on the new message log structure, LogOn, which represents the causal inter-process dependency relation with much smaller overhead compared to the existing algorithms. The proposed algorithm is efficient in the sense that it entails no additional information other than LogOn to be carried in each message, while other existing algorithms require extra information other than the message logs. This paper also presents an efficient recovery algorithm to solve the problem of a large amount of data exchanges during the recovery. To verify the performance of our algorithm, we give an analysis of the algorithm and perform two simulations and compare the log size with other causal logging protocols.