• Title/Summary/Keyword: $Li^+$ extraction

Search Result 359, Processing Time 0.024 seconds

Design and Implementation of System for Estimating Diameter at Breast Height and Tree Height using LiDAR point cloud data

  • Jong-Su, Yim;Dong-Hyeon, Kim;Chi-Ung, Ko;Dong-Geun, Kim;Hyung-Ju, Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.99-110
    • /
    • 2023
  • In this paper, we propose a system termed ForestLi that can accurately estimate the diameter at breast height (DBH) and tree height using LiDAR point cloud data. The ForestLi system processes LiDAR point cloud data through the following steps: downsampling, outlier removal, ground segmentation, ground height normalization, stem extraction, individual tree segmentation, and DBH and tree height measurement. A commercial system, such as LiDAR360, for processing LiDAR point cloud data requires the user to directly correct errors in lower vegetation and individual tree segmentation. In contrast, the ForestLi system can automatically remove LiDAR point cloud data that correspond to lower vegetation in order to improve the accuracy of estimating DBH and tree height. This enables the ForestLi system to reduce the total processing time as well as enhance the accuracy of accuracy of measuring DBH and tree height compared to the LiDAR360 system. We performed an empirical study to confirm that the ForestLi system outperforms the LiDAR360 system in terms of the total processing time and accuracy of measuring DBH and tree height.

Integration of Headspace Solid Phase Micro-Extraction with Gas Chromatography for Quantitative Analysis of Formaldehyde

  • Lo, Kong Mun;Yung, Yen Li
    • Bulletin of the Korean Chemical Society
    • /
    • v.34 no.1
    • /
    • pp.139-142
    • /
    • 2013
  • A study was carried out to evaluate the solid phase micro-extraction (SPME) for formaldehyde emission analysis of uncoated plywood. In SPME, formaldehyde was on-fiber derivatized through headspace extraction and analyzed by gas chromatography coupled with mass spectrometry (GC/MS). The SPME was compared with desiccators (DC-JAS 233), small-scale chamber (SSC-ASTM D6007) and liquid-liquid extraction (LLE-EPA 556) methods which were performed in accordance with their respective standards. Compared to SSC (RSD 4.3%) and LLE (RSD 5.0%), the SPME method showed better repeatability (RSD 1.8%) and not much difference from DC (RSD 1.4%). The SPME has proven to be highly precise (at 95% confidence level) with better recovery (REC 102%). Validation of the SPME method for formaldehyde quantitative analysis was evidenced. In addition, the SPME by air sampling directly from plywood specimens (SPME-W) correlated best with DC ($r^2$ = 0.983), followed by LLE ($r^2$ = 0.950) and SSC ($r^2$ = 0.935).

UFKLDA: An unsupervised feature extraction algorithm for anomaly detection under cloud environment

  • Wang, GuiPing;Yang, JianXi;Li, Ren
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.684-695
    • /
    • 2019
  • In a cloud environment, performance degradation, or even downtime, of virtual machines (VMs) usually appears gradually along with anomalous states of VMs. To better characterize the state of a VM, all possible performance metrics are collected. For such high-dimensional datasets, this article proposes a feature extraction algorithm based on unsupervised fuzzy linear discriminant analysis with kernel (UFKLDA). By introducing the kernel method, UFKLDA can not only effectively deal with non-Gaussian datasets but also implement nonlinear feature extraction. Two sets of experiments were undertaken. In discriminability experiments, this article introduces quantitative criteria to measure discriminability among all classes of samples. The results show that UFKLDA improves discriminability compared with other popular feature extraction algorithms. In detection accuracy experiments, this article computes accuracy measures of an anomaly detection algorithm (i.e., C-SVM) on the original performance metrics and extracted features. The results show that anomaly detection with features extracted by UFKLDA improves the accuracy of detection in terms of sensitivity and specificity.

Utilizing LiDAR Data to Vehicle Recognition on the Road (도로의 차량 인식을 위한 LiDAR 자료 적용연구)

  • Choi, Yun-Woong;Lee, Geun-Sang;Cho, Gi-Sung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.10 no.4
    • /
    • pp.179-188
    • /
    • 2007
  • Vehicle recognition is very important preprocess to get vehicle information for traffic management. This is a basic study to apply LiDAR data for extracting traffic information. Hence, this study presents two algorithms, one of them is for extracting road points from LiDAR data and then extracting vehicle points on the road, the other is for estimating the size of extracted vehicle. As a result, in the wide area, the number of vehicles on the road and the size of the vehicles were recognized from the LiDAR data.

  • PDF

Buffer Growing Method for Road Points Extraction from LiDAR Data

  • Jiangtao Li;Hyo Jong Lee;Gi Sung Cho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.656-657
    • /
    • 2008
  • Light Detection and Ranging (LiDAR) data has been used to detect the objects of earth surface from huge point clouds gotten from the laser scanning system equipped on airplane. According to the precision of 3~5 points per square meter, objects like buildings, cars and roads can be easily described and constructed. Many various areas, such as hydrological modeling and urban planning adopt this kind of significant data. Researchers have been engaging in finding accurate road networks from LiDAR data recent years. In this paper, A novel algorithm with regard to extracting road points from LiDAR data has been developed based on the continuity and structural characteristics of road networks.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

The Separation and Recovery of Nickel and Lithium from the Sulfate Leach Liquor of Spent Lithium Ion Batteries using PC-88A

  • Nguyen, Viet Tu;Lee, Jae-Chun;Jeong, Jinki;Kim, Byung-Su;Pandey, B.D.
    • Korean Chemical Engineering Research
    • /
    • v.53 no.2
    • /
    • pp.137-144
    • /
    • 2015
  • The present paper deals with the extractive separation and selective recovery of nickel and lithium from the sulfate leachate of cathode scrap generated during the manufacture of LIBs. The conditions for extraction, scrubbing and stripping of nickel from lithium were optimized with an aqueous feed containing $2.54kg{\cdot}m^{-3}$ Ni and $4.82kg{\cdot}m^{-3}$ Li using PC-88A. Over 99.6% nickel was extracted with $0.15kmol{\cdot}m^{-3}$ PC-88A in two counter-current stages at O/A=1 and pH=6.5. Effective scrubbing Li from loaded organic was systematically studied with a dilute $Na_2CO_3$ solution ($0.10kmol{\cdot}m^{-3}$). The McCabe-Thiele diagram suggests two counter-current scrubbing stages are required at O/A=2/3 to yield lithium-scrubbing efficiency of 99.6%. The proposed process showed advantages of simplicity, and high purity (99.9%) nickel sulfate recovery along with lithium to ensure the complete recycling of the waste from LIBs manufacturing process.

Use of Li-K-Cd Alloy to Remove MCl3 in LiCl-KCl Eutectic Salt (Li-K-Cd 합금을 이용한 LiCl-KCl 용융염에서 금속염화물의 제거)

  • Kim, Gha-Young;Kim, Tack-Jin;Jang, Junhyuk;Kim, Si-Hyung;Lee, Chang Hwa;Lee, Sung-Jai
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.16 no.3
    • /
    • pp.309-313
    • /
    • 2018
  • In this study, we prepared Li-K-Cd alloy, which meets the requirement of eutectic ratio of Li:K, to maintain the operating temperature of the drawdown process at $500^{\circ}C$ and to achieve the reuse of LiCl-KCl molten salt. The prepared Li-K-Cd alloys were added to LiCl-KCl salt bearing U and Nd at $500^{\circ}C$ to investigate the removal of $UCl_3$ in the salt. The reduction of $UCl_3$ in the salt was examined by measuring the OCP value of salt and analyzing the salt composition by ICP-OES. Reduction was also visually confirmed by change of salt color from dark purple to white. The experimental results reveal that the prepared Li-K-Cd alloy has reductive extractability for $UCl_3$ in salt. By improving the preparation method, the Li-K-Cd alloy can be applied to the drawdown process.

Effects of Fe layer on Li insertion/extraction Reactions of Fe/Si Multilayer thin Film Anodes for Lithium Rechargeable Batteries

  • Kim, Tae-Yeon;Kim, Jae-Bum;Ahn, Hyo-Jun;Lee, Sung-Man
    • Journal of Electrochemical Science and Technology
    • /
    • v.2 no.4
    • /
    • pp.193-197
    • /
    • 2011
  • The influences of the thickness and microstructure of Fe layer on the electrochemical performances of Fe/Si multilayer thin film anodes were investigated. The Fe/Si multilayer films were prepared by electron beam evaporation, in which Fe layer was deposited with/without simultaneous bombardment of Ar ion. The kinetics of Li insertion/extraction reactions in the early stage are slowed down with increasing the thickness of Fe layer, but such a slowdown seems to be negligible for thin Fe layers less than about $500{\AA}$. When the Fe layer was deposited with ion bombardment, even the $300{\AA}$ thick Fe layer significantly suppress Li diffusion through the Fe layer. This is attributed to the dense microstructure of Fe layer, induced by ion beam assisted deposition (IBAD). It appears that the Fe/Si multilayer films prepared with IBAD show good cyclability compared to the film deposited without IBAD.

Smart Card Based Password Authentication Scheme using Fuzzy Extraction Technology (퍼지추출 기술을 활용한 스마트 카드 기반 패스워드 인증 스킴)

  • Choi, Younsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.125-134
    • /
    • 2018
  • Lamport firstly suggested password base authentication scheme and then, similar authentication schemes have been studied. Due to the development of Internet network technology, remote user authentication using smart card has been studied. Li et al. analyzed authentication scheme of Chen et al. and then, Li et al. found out the security weakness of Chen et al.'s scheme such forward secrecy and the wrong password login problem, and proposed an a new smart card based user password authentication scheme. But Liu et al. found out that Li et al.'s scheme still had security problems such an insider attack and man-in-the-middle attack and then Liu et al. proposed an efficient and secure smart card based password authentication scheme. This paper analyzed Liu et al.'s authentication and found out that Liu et al.'s authentication has security weakness such as no perfect forward secrecy, off-line password guessing attack, smart-card loss attack, and no anonymity. And then, this paper proposed security enhanced efficient smart card based password authentication scheme using fuzzy extraction technology.