• Title/Summary/Keyword: redundant data

Search Result 442, Processing Time 0.026 seconds

VALIDATION OF ON-LINE MONITORING TECHNIQUES TO NUCLEAR PLANT DATA

  • Garvey, Jamie;Garvey, Dustin;Seibert, Rebecca;Hines, J. Wesley
    • Nuclear Engineering and Technology
    • /
    • v.39 no.2
    • /
    • pp.133-142
    • /
    • 2007
  • The Electric Power Research Institute (EPRI) demonstrated a method for monitoring the performance of instrument channels in Topical Report (TR) 104965, 'On-Line Monitoring of Instrument Channel Performance.' This paper presents the results of several models originally developed by EPRI to monitor three nuclear plant sensor sets: Pressurizer Level, Reactor Protection System (RPS) Loop A, and Reactor Coolant System (RCS) Loop A Steam Generator (SG) Level. The sensor sets investigated include one redundant sensor model and two non-redundant sensor models. Each model employs an Auto-Associative Kernel Regression (AAKR) model architecture to predict correct sensor behavior. Performance of each of the developed models is evaluated using four metrics: accuracy, auto-sensitivity, cross-sensitivity, and newly developed Error Uncertainty Limit Monitoring (EULM) detectability. The uncertainty estimate for each model is also calculated through two methods: analytic formulas and Monte Carlo estimation. The uncertainty estimates are verified by calculating confidence interval coverages to assure that 95% of the measured data fall within the confidence intervals. The model performance evaluation identified the Pressurizer Level model as acceptable for on-line monitoring (OLM) implementation. The other two models, RPS Loop A and RCS Loop A SG Level, highlight two common problems that occur in model development and evaluation, namely faulty data and poor signal selection

Implementation of an Audio Broadcasting Service over the Internet (인터넷상의 실시간 오디오 방송 서비스 구현)

  • 박준석;고대식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.6
    • /
    • pp.1496-1502
    • /
    • 1998
  • In this paper, a real-time audio broadcasting service system which is robust to loaded traffic on the Internet is developed. For implementing reliable real-time data transfer, the transfer characteristics of TCP/IP and UDP/IP was compared and analyzed. For lost packet recovery, redundant audio data algorithm was used and interleaving technique was applied for scattering consecutive packet loss. Test results showed, when using TCP/IP, pause occurred during playback, and when using UDP/IP, a stable receive rate was noticeable but the quality of the sound was lower than that of uisng TCP/IP. The recovery rate using redundant audio data and interleaving technique is shown in Fig. 9 and the delay is shown in Fig 4.

  • PDF

Data prediction Strategy for Sensor Network Clustering Scheme (센서 네트워크 클러스터링 기법의 데이터 예측 전략)

  • Choi, Dong-Min;Shen, Jian;Moh, Sang-Man;Chung, Il-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.9
    • /
    • pp.1138-1151
    • /
    • 2011
  • Sensor network clustering scheme is an efficient method that prolongs network lifetime. However, when it is applied to an environment in which collected data of the sensor nodes easily overlap, sensor node unnecessarily consumes energy. Accordingly, we proposed a data prediction scheme that sensor node can predict current data to exclude redundant data transmission and to minimize data transmission among the cluster head node and member nodes. Our scheme excludes redundant data collection by neighbor nodes. Thus it is possible that energy efficient data transmission. Moreover, to alleviate unnecessary data transmission, we introduce data prediction graph whether transmit or not through analyze between prediction and current data. According to the result of performance analysis, our method consume less energy than the existing clustering method. Nevertheless, transmission efficiency and data accuracy is increased. Consequently, network lifetime is prolonged.

A Novel Redundant Data Storage Algorithm Based on Minimum Spanning Tree and Quasi-randomized Matrix

  • Wang, Jun;Yi, Qiong;Chen, Yunfei;Wang, Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.227-247
    • /
    • 2018
  • For intermittently connected wireless sensor networks deployed in hash environments, sensor nodes may fail due to internal or external reasons at any time. In the process of data collection and recovery, we need to speed up as much as possible so that all the sensory data can be restored by accessing as few survivors as possible. In this paper a novel redundant data storage algorithm based on minimum spanning tree and quasi-randomized matrix-QRNCDS is proposed. QRNCDS disseminates k source data packets to n sensor nodes in the network (n>k) according to the minimum spanning tree traversal mechanism. Every node stores only one encoded data packet in its storage which is the XOR result of the received source data packets in accordance with the quasi-randomized matrix theory. The algorithm adopts the minimum spanning tree traversal rule to reduce the complexity of the traversal message of the source packets. In order to solve the problem that some source packets cannot be restored if the random matrix is not full column rank, the semi-randomized network coding method is used in QRNCDS. Each source node only needs to store its own source data packet, and the storage nodes choose to receive or not. In the decoding phase, Gaussian Elimination and Belief Propagation are combined to improve the probability and efficiency of data decoding. As a result, part of the source data can be recovered in the case of semi-random matrix without full column rank. The simulation results show that QRNCDS has lower energy consumption, higher data collection efficiency, higher decoding efficiency, smaller data storage redundancy and larger network fault tolerance.

COMS System Bus Design and Analysis using MIL-STD-1553B (MIL-STD-1553B 버스를 이용한 통신해양기상위성의 시스템 버스 설계 및 분석)

  • Cho, Young-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.7
    • /
    • pp.1285-1289
    • /
    • 2008
  • In this paper, we design COMS system bus that the 1553 Data Bus is able to link all the units of the satellite managed by the SCU using one Prime Data Bus and on Redundant Data Bus. Also we analyze MIL-STD-1553B bus load and relevant exchange memory budgets in system bus of the COMS satellite. This data is used in the satellite mission and software design by system engineer.

Simplification of LIDAR Data for Building Extraction Based on Quad-tree Structure

  • Du, Ruoyu;Lee, Hyo Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.355-356
    • /
    • 2011
  • LiDAR data is very large, which contains an amount of redundant information. The information not only takes up a lot of storage space but also brings much inconvenience to the LIDAR data transmission and application. Therefore, a simplified method was proposed for LiDAR data based on quad-tree structure in this paper. The boundary contour lines of the buildings are displayed as building extraction. Experimental results show that the method is efficient for point's simplification according to the rule of mapping.

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.

A Medium Access Control Scheme for Reducing Energy Consumption through Avoiding Receipt of Redundant Messages in Wireless Sensor Networks (무선 센서 네트워크에서 중복 메세지 순신 회피를 통한 에너지 소비절감 매체 접근 제어)

  • Han, Jung-An;Lee, Moon-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.13-24
    • /
    • 2005
  • The sensor network is a key component of the ubiquitous computing system which is expected to be widely utilized in logistics control, environment/disaster control, medical/health-care services, digital home and other applications. Nodes in the sensor network are small-sized and exposed to adverse environments. They are demanded to perform their missions with very limited power supply only. Also the sensor network is composed of much more nodes than the wireless ad hoc networks are. In case that some nodes consume up their power capacity, the network topology should change, and rerouting/retransmission is necessitated. Communication protocols studied for conventional wireless networks or ad hoc networks are not suited for the sensor network resultantly. Schemes should be devised to control the efficient usage of node power in the sensor network. This paper proposes a medium access protocol to enhance the efficiency of energy consumption in the sensor network node. Its performance is analyzed by simulation.

  • PDF

Inconsistency in Fuzzy Rulebase: Measure and Optimization

  • Shounak Roychowdhury;Wang, Bo-Hyeun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.1 no.1
    • /
    • pp.75-80
    • /
    • 2001
  • Rule inconsistency is an important issue that is needed to be addressed while designing efficient and optimal fuzzy rule bases. Automatic generation of fuzzy rules from data sets, using machine learning techniques, can generate a significant number of redundant and inconsistent rules. In this study we have shown that it is possible to provide a systematic approach to understand the fuzzy rule inconsistency problem by using the proposed measure called the Commonality measure. Apart from introducing this measure, this paper describes an algorithm to optimize a fuzzy rule base using it. The optimization procedure performs elimination of redundant and/or inconsistent fuzzy rules from a rule base.

  • PDF

Position Estimation of Free-Ranging AGV Systems Using the Extended Kalman Filter Technique (Extended Kalman Filter방법을 이용한 자유주행 무인 방송차의 위치 평가)

  • Lee, Sang-Ryong
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.38 no.12
    • /
    • pp.971-982
    • /
    • 1989
  • An integrating position estimation algorithm has been developed for the navigation system of a free-ranging AGV system. The navigation system focused in this research work consists of redundant wheel encoders for the relative position measurement and a vision sensor for the absolute position measurement. A maximum likelihood method and an extended Kalman filter are implemented for enhancing the performance of the position estimator. The maximum likelihood estimator processes noisy, redundant wheel encoder measurements and yields efficient estimates for the AGV motion between each sampling interval. The extended Kalman filter fuses inharmonious positional data from the deadreckoner and the vision sensor and computes the optimal position estimate. The simulation results show that the proposed position estimator solves a generalized estimation problem for locating the vehicle accurately in space.

  • PDF