• Title/Summary/Keyword: process event detection

Search Result 74, Processing Time 0.025 seconds

RADIAL AND AZIMUTHAL OSCILLATIONS OF HALO CORONAL MASS EJECTIONS

  • Lee, Harim;Moon, Y.J.;Nakariakov, V.M.
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.1
    • /
    • pp.66.1-66.1
    • /
    • 2015
  • We present the first observational detection of radial and azimuthal oscillations in full halo coronal mass ejections (HCMEs). We analyze nine HCMEs well-observed by LASCO from Feb 2011 to Jun 2011. Using the LASCO C3 running difference images, we estimated the instantaneous apparent speeds of the HCMEs in different radial directions from the solar disk center. We find that the development of all these HCMEs is accompanied with quasi-periodic variations of the instantaneous radial velocity with the periods ranging from 24 to 48 mins. The amplitudes of the instant speed variations reach about a half of the projected speeds. The amplitudes are found to anti-correlate with the periods and correlate with the HCME speed, indicating the nonlinear nature of the process. The oscillations have a clear azimuthal structure in the heliocentric polar coordinate system. The oscillations in seven events are found to be associated with distinct azimuthal wave modes with the azimuthal wave number m=1 for six events and m=2 for one event. The polarization of the oscillations in these seven HCMEs is broadly consistent with those of their position angles with the mean difference of $42.5^{\circ}$. The oscillations may be connected with natural oscillations of the plasmoids around a dynamical equilibrium, or self-oscillatory processes, e.g. the periodic shedding of Alfvenic vortices. Our results indicate the need for advanced theory of oscillatory processes in CMEs.

  • PDF

Exhibition Monitoring System using USN/RFID based on ECA (USN/RFID를 이용한 ECA기반 전시물 정보 모니터링 시스템)

  • Kim, Gang-Seok;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.95-100
    • /
    • 2009
  • Nowadays there are many studies and there's huge development about USN/RFID which have great developmental potential to many kinds of applications. More and more real time application apply USN/RFID technology to identify data collect and locate objects. Wide deployment of USN/RFID will generate an unprecedented volume of primitive data in a short time. Duplication and redundancy of primitive data will affect real time performance of application. Thus, security applications must filter primitive data and correlate them for complex pattern detection and transform them to events that provide meaningful, actionable information to end application. In this paper, we design a ECA Rule system for security monitoring of exhibition. This system will process USN/RFID primitive data and event and perform data transformation. It's had applied each now in exhibition hall through this study and efficient data transmission and management forecast that is possible.

  • PDF

Breakage Detection of Small-Diameter Tap Using Vision System in High-Speed Tapping Machine with Open Architecture Controller

  • Lee, Don-Jin;Kim, Sun-Ho;Ahn, Jung-Hwan
    • Journal of Mechanical Science and Technology
    • /
    • v.18 no.7
    • /
    • pp.1055-1061
    • /
    • 2004
  • In this research, a vision system for detecting breakages of small-diameter taps, which are rarely detected by the indirect in-process monitoring methods such as acoustic emission, cutting torque and motor current, was developed. Two HMI (Human Machine Interface) programs to embed the developed vision system into a Siemens open architecture controller, 840D, were developed. They are placed in sub-windows of the main window of the 840D and can be activated or deactivated either by a softkey on the operating panel or the M code in the NC part program. In the event that any type of tool breakage is detected, the HMI program issues a command for an automatic tool change or sends an alarm signal to the NC kernel. An evaluation test in a high-speed tapping machine showed that the developed vision system was successful in detecting breakages of small-diameter taps up to M1.

Implementation of an Export System for GIS Arrester Facilities (GIS 피뢰설비 전문가 시스템 구현)

  • Kim, Il-Kwon;Song, Jae-Yong;Moon, Seung-Bo;Cha, Myung-Soo;Rhyu, Keel-Soo;Kil, Gyung-Suk
    • Proceedings of the KIEE Conference
    • /
    • 2006.07c
    • /
    • pp.1465-1466
    • /
    • 2006
  • The monitoring and diagnosing technique for lightning arresters is important to assure the reliability of power supply in GIS-substation. In this paper, we described the implementation of an expert system for GIS arrester facilities. The proposed system consists of a data acquisition module (DAM), a wireless communication module, and a personal computer. The DAM detects system voltages, total leakage currents and its harmonic components, and includes an algorithm to calculate the resistive leakage current by the principle that the magnitudes of resistive leakage current are equal at the same level of the system voltage applied to the arrestor. Also, we designed a surge event detection circuit which can acquire the date, the polarity, and the amplitude of surge events. All the acquired data are transmitted after correction by many algorithms to the remote station through the ZigBee protocol. The expert system is based on the Jave Expert System Shell (JESS) and make more reliable decision by using an exclusive inference process.

  • PDF

A Review of AI-based Automobile Accident Prevention Systems (인공지능 기반의 자동차사고 감지 시스템 적용 사례 분석)

  • Choi, Jae Gyeong;Kong, Chan Woo;Lim, Sunghoon
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.1
    • /
    • pp.9-14
    • /
    • 2020
  • Artificial intelligence (AI) has been applied to most industries by enhancing automation and contributing greatly to efficient processes and high-quality production. This research analyzes the applications of AI-based automobile accident prevention systems. It deals with AI-based collision prevention systems that learn information from various sensors attached to cars and AI-based accident detection systems that automatically report accidents to the control center in the event of a collision. Based on the literature review, technological and institutional changes are taking place at the national levels, which recognize the effectiveness of the systems. In addition, start-ups at home and abroad as well as major car manufacturers are in the process of commercializing auto parts equipped with AI-based collision prevention technology.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.

A Model-based Test Approach and Case Study for Weapon Control System (모델기반 테스트 기법 및 무장통제장치 적용 사례)

  • Bae, Jung Ho;Jang, Bucheol;Koo, Bongjoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.688-699
    • /
    • 2017
  • Model-based test, a well-known method of the black box tests, is consisted of the following four steps : model construction using requirement, test case generation from the model, execution of a SUT (software under test) and detection failures. Among models constructed in the first step, state-based models such as UML standard State Machine are commonly used to design event-based embedded systems (e.g., weapon control systems). To generate test cases from state-based models in the next step, coverage-based techniques such as state coverage and transition coverage are used. Round-trip path coverage technique using W-Method, one of coverage-based techniques, is known as more effective method than others. However it has a limitation of low failure observability because the W-Method technique terminates a testing process when arrivals meet states already visited and it is hard to decide the current state is completely same or not with the previous in the case like the GUI environment. In other words, there can exist unrevealed faults. Therefore, this study suggests a Extended W-Method. The Extended W-Method extends the round-trip path to a final state to improve failure observability. In this paper, we compare effectiveness and efficiency with requirement-item-based technique, W-Method and our Extended W-Method. The result shows that our technique can detect five and two more faults respectively and has the performance of 28 % and 42 % higher failure detection probability than the requirement-item-based and W-Method techniques, respectively.

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Slip-Related Changes in Plantar Pressure Distribution, and Parameters for Early Detection of Slip Events

  • Choi, Seungyoung;Cho, Hyungpil;Kang, Boram;Lee, Dong Hun;Kim, Mi Jung;Jang, Seong Ho
    • Annals of Rehabilitation Medicine
    • /
    • v.39 no.6
    • /
    • pp.897-904
    • /
    • 2015
  • Objective To investigate differences in plantar pressure distribution between a normal gait and unpredictable slip events to predict the initiation of the slipping process. Methods Eleven male participants were enrolled. Subjects walked onto a wooden tile, and two layers of oily vinyl sheet were placed on the expected spot of the 4th step to induce a slip. An insole pressure-measuring system was used to monitor plantar pressure distribution. This system measured plantar pressure in four regions (the toes, metatarsal head, arch, and heel) for three events: the step during normal gait; the recovered step, when the subject recovered from a slip; and the uncorrected, harmful slipped step. Four variables were analyzed: peak pressure (PP), contact time (CT), the pressure-time integral (PTI), and the instant of peak pressure (IPP). Results The plantar pressure pattern in the heel was unique, as compared with other parts of the sole. In the heel, PP, CT, and PTI values were high in slipped and recovered steps compared with normal steps. The IPP differed markedly among the three steps. The IPPs in the heel for the three events were, in descending order (from latest to earliest), slipped, recovered, and normal steps, whereas in the other regions the order was normal, recovered, and slipped steps. Finally, the metatarsal head-to-heel IPP ratios for the normal, recovered, and slipped steps were $6.1{\pm}2.9$, $3.1{\pm}3.0$, and $2.2{\pm}2.5$, respectively. Conclusion A distinctive plantar pressure pattern in the heel might be useful for early detection of a slip event to prevent slip-related injuries.

A Route Repair Scheme for Reducing DIO Poisoning Overhead in RPL-based IoT Networks (RPL 기반 IoT 네트워크에서 DIO Poisoning 오버헤드를 감소시키는 경로 복구 방법)

  • Lee, Sung-Jun;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1233-1244
    • /
    • 2016
  • In the IoT network environments for LLNs(Low power and Lossy networks), IPv6 Routing Protocol for Low Power and Lossy networks(RPL) has been proposed by IETF(Internet Engineering Task Force). The goal of RPL is to create a directed acyclic graph, without loops. As recommended by the IETF standard, RPL route recovery mechanisms in the event of a failure of a node should avoid loop, loop detection, DIO Poisoning. In this process, route recovery time and control message might be increased in the sub-tree because of the repeated route search. In this paper, we suggested RPL route recovery method to solve the routing overhead problem in the sub-tree during a loss of a link in the RPL routing protocol based on IoT wireless networks. The proposed method improved local repair process by utilizing a route that could not be selected as the preferred existing parents. This reduced the traffic control packet, especially in the disconnected node's sub tree. It also resulted in a quick recovery. Our simulation results showed that the proposed RPL local repair reduced the recovery time and the traffic of control packets of RPL. According to our experiment results, the proposed method improved the recovery performance of RPL.