• Title/Summary/Keyword: 성능평가 지표

Search Result 625, Processing Time 0.024 seconds

Improvement of Reservoir Turbidity Prediction Model with Considering Particle Sizes of Suspended Sediments (부유물질 크기분포를 고려한 저수지 탁도 예측 모델 개선)

  • Lee, Heung-Soo;Chung, Se-Woong;Liu, Huan;Jeong, Hee-Young
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.1378-1383
    • /
    • 2008
  • 댐 저수지에서 지속적인 탁도를 유발하는 물질은 쉽게 침강되지 않는 $20{\mu}m$이하의 작은 부유물질(SS)이며, 가을 수직혼합 시기까지 침강되지 않은 부유물질은 다시 재부상하는 경우도 발생한다. 저수지내 탁수의 장기 체류는 수자원 이용과 하류하천의 수생태계에 다양한 문제를 야기하고 있어 일부 댐에서는 실시간 탁도 감시 장치를 설치하고 취수설비를 개선하는 등의 탁수저감 대책의 노력을 기울이고 있으나, 시설의 최적 운영을 지원할 수 있는 탁수 거동 및 탁도 예측에 관한 연구는 아직 부족한 실정이다. 특히, 탁도는 물 속에 존재하는 부유물질의 광학적 특성(light attenuation)을 나타내는 지표로써 SS와는 물리적인 물성이 달라 실시간 계측자료(탁도)와 모델의 모의 변수(SS)가 다른 문제점 때문에 모델링에 어려움이 있었다. 지금까지 탁도 모델링은 대부분 탁도와 SS의 상관관계를 이용하는 방법을 사용하였다. 그러나 이 방법은 탁도-SS 관계가 실측지점과 입자크기분포에 따라 달라지는 특성 때문에 변환과정에 예측결과의 불확실성이 내재한다는 지적을 받아왔다. 본 연구의 목적은 저수지로 유입한 탁수의 보다 과학적이고 정확한 탁도 예측을 위해 탁도를 유발하는 부유물질의 입자크기 분포와 공간적으로 변하는 탁도-SS의 상관관계를 고려할 수 있는 표준화된 탁도 모델링 방법을 개발하고, 실측자료를 사용하여 제시된 탁도 모델링 방법의 예측 성능을 평가하는데 있다. 부유물질의 이송-확산-침강 모델은 2차원 횡방향 평균 수리 모델과 연결(coupling)되어 수행되며, 저수지 수면을 통한 열 교환, 바람과 바닥 조도에 의한 난류혼합과 성층해석, 하천 유입수의 저수지내 밀도류 유동, 그리고 입자 크기별 부유물질의 독립침강을 해석한다. 부유입자의 크기분포와 공간적으로 서로 다른 탁도-SS 관계를 고려한 탁도 예측모델은 기존의 탁도를 종속변수로 사용한 예측 방법 또는 단일 입자크기를 사용한 모델보다 개선된 모의결과를 보여주었다. 본 연구에서 제시된 탁도 예측 알고리즘은 실시간 탁수감시와 예측 모델링, 그리고 댐 방류수 탁도 관리를 위한 선택취수 설비의 운영을 위한 의사결정지원시스템에 적용 가능할 것으로 사료된다.

  • PDF

An Predictive Analytics based on Goal-Scenario for Self-adaptive System (자가적응형 시스템을 위한 목표 시나리오 기반 예측 분석)

  • Baek, Su-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.77-83
    • /
    • 2017
  • For efficient predictive analysis, self-healing research is needed that enables the system to recover autonomously by self-cognition and diagnosing system problems. However, software development does not provide formal contextual information analysis and appropriate presentation structure according to external situation. In this paper, we propose a prediction analysis method based on the change contents by applying the extraction rule to the functions that can act, data, and transaction based on the new Goal-scenario. We also evaluated how well the predictive analysis met through the performance indicators for achieving the requirements goal. Compared with the existing methods, the proposed method has a maximum 32.8% higher matching result through performance measurement, resulting in a 28.9% error rate and a 45.8% reduction in the change code. This shows that it can be processed into a serviceable form through rules, and it shows that performance can be expanded through predictive analysis of changes.

Performance Analysis of DSRC Transmission Efficiency at MAC Layer (MAC 계층에서의 DSRC 전송 효율 분석)

  • Kwag Su-Jin;Ahn Jin-Ho;Lee Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.527-533
    • /
    • 2006
  • In this paper, we analyze the performance of MAC (Media Access Control) layer in DSRC (Dedicated Short Range Communication). It will be widely applied for ITS (Intelligent Transportation System) services; for example ETC (Electric Toll Control), BIS (Bus Information System) etc., needed to small packet size. But If ITS service is evolving to advance ITS, ADIS (Advanced Driver Information Systems) and AVHS (Advanced Vehicle Highway System) etc, be needed larger packet size. In the future, it may offer more various services such as traffic information, collection, and multimedia information. There are two kind of physical media, IR(Infrared) and RF(Radio frequency). And each system has their own protocol that is adaptive in special characteristics of physical medium for using efficiently limited radio resources. In this paper, we analyze the special characteristics of each system. And we study practical use of some related services expected to be used in the near future, by analyzing the transmission efficiency in each DSRC system.

The Risk Assessment and Prediction for the Mixed Deterioration in Cable Bridges Using a Stochastic Bayesian Modeling (확률론적 베이지언 모델링에 의한 케이블 교량의 복합열화 리스크 평가 및 예측시스템)

  • Cho, Tae Jun;Lee, Jeong Bae;Kim, Seong Soo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.16 no.5
    • /
    • pp.29-39
    • /
    • 2012
  • The main objective is to predict the future degradation and maintenance budget for a suspension bridge system. Bayesian inference is applied to find the posterior probability density function of the source parameters (damage indices and serviceability), given ten years of maintenance data. The posterior distribution of the parameters is sampled using a Markov chain Monte Carlo method. The simulated risk prediction for decreased serviceability conditions are posterior distributions based on prior distribution and likelihood of data updated from annual maintenance tasks. Compared with conventional linear prediction model, the proposed quadratic model provides highly improved convergence and closeness to measured data in terms of serviceability, risky factors, and maintenance budget for bridge components, which allows forecasting a future performance and financial management of complex infrastructures based on the proposed quadratic stochastic regression model.

Study on Collecting Server Information through Banner Grabbing (배너 그래빙을 통한 서버 정보 수집에 관한 연구)

  • Kang, HongGoo;Kim, HyeonHak;Lee, HyunSeung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1317-1330
    • /
    • 2017
  • To collect server information and construct network map enable us to prevent security breach, prepare for national cyber warfare and make effective policies. In this paper, we analyze well-known network scanners, Nmap and ZMap, and construct network map using banner grabbing. We use multiple threads in order to increase scanning speed and arrange IP lists by specific order to reduce the load on information gathering targets. Also, we applied performance tests to compare the real-time banner grabbing tool with the existing network scanners. As a result, we gathered server information from domestic and overseas servers and derived a risk index based on the collected database. Although there are slight differences among countries, we can identify the risky situation that many users in every country are exposed to several security breaches.

Development of HCS(High Contents Screening) Software Using Open Source Library (오픈 소스 라이브러리를 활용한 HCS 소프트웨어 개발)

  • Na, Ye Ji;Ho, Jong Gab;Lee, Sang Joon;Min, Se Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.6
    • /
    • pp.267-272
    • /
    • 2016
  • Microscope cell image is an important indicator for obtaining the biological information in a bio-informatics fields. Since human observers have been examining the cell image with microscope, a lot of time and high concentration are required to analyze cell images. Furthermore, It is difficult for the human eye to quantify objectively features in cell images. In this study, we developed HCS algorithm for automatic analysis of cell image using an OpenCV library. HCS algorithm contains the cell image preprocessing, cell counting, cell cycle and mitotic index analysis algorithm. We used human cancer cell (MKN-28) obtained by the confocal laser microscope for image analysis. We compare the value of cell counting to imageJ and to a professional observer to evaluate our algorithm performance. The experimental results showed that the average accuracy of our algorithm is 99.7%.

Structural Stability Analysis Study for Existing Subway Tunnels Using a 3D Stress-Pore Pressure Coupled Finite Element Modelling of NATM Tunneling (NATM 터널굴착시 응력-간극수압 연계 3차원 유한요소모델링을 통한 기존 지하철터널의 구조적 안정성 해석연구)

  • Kong, Byung-Seung
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.13 no.6 s.58
    • /
    • pp.192-203
    • /
    • 2009
  • In the new Seoul-Busan high speed railroad construction specially in area of city center passage the roadbed establishment is recommended the staibility for the existing subway tunnel segments of Busan subway 1st and 2nd lines regarding the appearance condition, a quality condition and the durability of the objective facility, and it evaluates the numerical analysis using MIDAS/GTS which leads the stability of the objective facility and investigatesd tunnels. Fundamental issues in tunneling under high groundwater table are discussed and the effect of groundwater on tunnel excavation was examined using a 3D stress-pore pressure coupled Finite-Element Method. Based on the results the interaction mechanism between the tunnelling and groundwater is identified. In the both of 1st and 2nd Line the maximum sinkage, unequal sinkage and the lining stress from numerical analysis are within permission and the damage degree is appearing to be disregarded. But it enforces necessary Pre-grouting in order to minimize an actual tunnel face conduct and when the tunnel is excavated it is also necessary to minimize the outflow possibility.

Federated Learning Privacy Invasion Study in Batch Situation Using Gradient-Based Restoration Attack (그래디언트 기반 재복원공격을 활용한 배치상황에서의 연합학습 프라이버시 침해연구)

  • Jang, Jinhyeok;Ryu, Gwonsang;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.987-999
    • /
    • 2021
  • Recently, Federated learning has become an issue due to privacy invasion caused by data. Federated learning is safe from privacy violations because it does not need to be collected into a server and does not require learning data. As a result, studies on application methods for utilizing distributed devices and data are underway. However, Federated learning is no longer safe as research on the reconstruction attack to restore learning data from gradients transmitted in the Federated learning process progresses. This paper is to verify numerically and visually how well data reconstruction attacks work in various data situations. Considering that the attacker does not know how the data is constructed, divide the data with the class from when only one data exists to when multiple data are distributed within the class, and use MNIST data as an evaluation index that is MSE, LOSS, PSNR, and SSIM. The fact is that the more classes and data, the higher MSE, LOSS, and PSNR and SSIM are, the lower the reconstruction performance, but sufficient privacy invasion is possible with several reconstructed images.

The Algorithm of Angular Mode Selection for High Performance HEVC Intra Prediction (고성능 HEVC 화면내 예측을 위한 Angular 모드 선택 알고리즘)

  • Park, Seungyong;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.969-972
    • /
    • 2016
  • In this paper, we propose an algorithm of angular mode selection for high-performance HEVC intra prediction. HEVC intra prediction is used to remove the spatial redundancy. Intra prediction has a total of 35 modes and block size of $64{\times}64$ to $4{\times}4$. Intra prediction has a high amount of calculation and operational time due to performing all 35 modes for each block size for the best cost. The angular mode algorithm proposed has a simple difference between pixels of the original image and the selected angular mode. A decision is made to select one angular mode plus planar mode and DC mode to perform the intra prediction and determine the mode with the best cost. In effect, only three modes are executed compared to the traditional 35 modes. Performance evaluation index used are BD-PSNR and BD-Bitrate. For the proposed algorithm, BD-PSNR results averagely increased by 0.035 and BD-Bitrate decreased by 0.623 relative to the HM-16.9 intra prediction. In addition, the encoding time is decreased by about 6.905%.

  • PDF

CNN based dual-channel sound enhancement in the MAV environment (MAV 환경에서의 CNN 기반 듀얼 채널 음향 향상 기법)

  • Kim, Young-Jin;Kim, Eun-Gyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1506-1513
    • /
    • 2019
  • Recently, as the industrial scope of multi-rotor unmanned aerial vehicles(UAV) is greatly expanded, the demands for data collection, processing, and analysis using UAV are also increasing. However, the acoustic data collected by using the UAV is greatly corrupted by the UAV's motor noise and wind noise, which makes it difficult to process and analyze the acoustic data. Therefore, we have studied a method to enhance the target sound from the acoustic signal received through microphones connected to UAV. In this paper, we have extended the densely connected dilated convolutional network, one of the existing single channel acoustic enhancement technique, to consider the inter-channel characteristics of the acoustic signal. As a result, the extended model performed better than the existed model in all evaluation measures such as SDR, PESQ, and STOI.