• 제목/요약/키워드: Application Identification

Search Result 1,615, Processing Time 0.025 seconds

THE PROBLEMS OF MODELLING AND IDENTIFICATION OF SOURCES OF NOISE IN MACHINES

  • Zbigniew Dabrowski;Stanilaw Radkowski
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06a
    • /
    • pp.758-763
    • /
    • 1994
  • The work discusses the problems of modelling of the process of acoustic signal generation in machines. We have pointed out that in the task of minimizing of both moise and vibration, the key problem is identification of sources and paths of propagation, both in terms of their location and of definition of their characteristic features. Properly conducted identification makes possible the use of relatively simple mathematical models and this fact is particularly important for a broad application of the proposed methods in practice.

  • PDF

Color Space Exploration and Fusion for Person Re-identification (동일인 인식을 위한 컬러 공간의 탐색 및 결합)

  • Nam, Young-Ho;Kim, Min-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.10
    • /
    • pp.1782-1791
    • /
    • 2016
  • Various color spaces such as RGB, HSV, log-chromaticity have been used in the field of person re-identification. However, not enough studies have been done to find suitable color space for the re-identification. This paper reviews color invariance of color spaces by diagonal model and explores the suitability of each color space in the application of person re-identification. It also proposes a method for person re-identification based on a histogram refinement technique and some fusion strategies of color spaces. Two public datasets (ALOI and ImageLab) were used for the suitability test on color space and the ImageLab dataset was used for evaluating the feasibility of the proposed method for person re-identification. Experimental results show that RGB and HSV are more suitable for the re-identification problem than other color spaces such as normalized RGB and log-chromaticity. The cumulative recognition rates up to the third rank under RGB and HSV were 79.3% and 83.6% respectively. Furthermore, the fusion strategy using max score showed performance improvement of 16% or more. These results show that the proposed method is more effective than some other methods that use single color space in person re-identification.

Detection and parametric identification of structural nonlinear restoring forces from partial measurements of structural responses

  • Lei, Ying;Hua, Wei;Luo, Sujuan;He, Mingyu
    • Structural Engineering and Mechanics
    • /
    • v.54 no.2
    • /
    • pp.291-304
    • /
    • 2015
  • Compared with the identification of linear structures, it is more challenging to conduct identification of nonlinear structure systems, especially when the locations of structural nonlinearities are not clear in structural systems. Moreover, it is highly desirable to develop methods of parametric identification using partial measurements of structural responses for practical application. To cope with these issues, an identification method is proposed in this paper for the detection and parametric identification of structural nonlinear restoring forces using only partial measurements of structural responses. First, an equivalent linear structural system is proposed for a nonlinear structure and the locations of structural nonlinearities are detected. Then, the parameters of structural nonlinear restoring forces at the locations of identified structural nonlinearities together with the linear part structural parameters are identified by the extended Kalman filter. The proposed method simplifies the identification of nonlinear structures. Numerical examples of the identification of two nonlinear multi-story shear frames and a planar nonlinear truss with different nonlinear models and locations are used to validate the proposed method.

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

THE APPLICATION OF PSA TECHNIQUES TO THE VITAL AREA IDENTIFICATION OF NUCLEAR POWER PLANTS

  • HA JAEJOO;JUNG WOO SIK;PARK CHANG-KUE
    • Nuclear Engineering and Technology
    • /
    • v.37 no.3
    • /
    • pp.259-264
    • /
    • 2005
  • This paper presents a vital area identification (VAI) method based on the current fault tree analysis (FTA) and probabilistic safety assessment (PSA) techniques for the physical protection of nuclear power plants. A structured framework of a top event prevention set analysis (TEPA) application to the VAI of nuclear power plants is also delineated. One of the important processes for physical protection in a nuclear power plant is VAI that is a process for identifying areas containing nuclear materials, structures, systems or components (SSCs) to be protected from sabotage, which could directly or indirectly lead to core damage and unacceptable radiological consequences. A software VIP (Vital area Identification Package based on the PSA method) is being developed by KAERI for the VAI of nuclear power plants. Furthermore, the KAERI fault tree solver FTREX (Fault Tree Reliability Evaluation eXpert) is specialized for the VIP to generate the candidates of the vital areas. FTREX can generate numerous MCSs for a huge fault tree with the lowest truncation limit and all possible prevention sets.

Analyses of Security Issues for Internet of Things in Healthcare Application (헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.

Structural identification of a steel frame from dynamic test-data

  • Morassi, A.
    • Structural Engineering and Mechanics
    • /
    • v.11 no.3
    • /
    • pp.237-258
    • /
    • 2001
  • Structural identification via modal analysis in structural mechanics is gaining popularity in recent years, despite conceptual difficulties connected with its use. This paper is devoted to illustrate both the capabilities and the indeterminacy characterizing structural identification problems even in quite simple instances, as well as the cautions that should be accordingly adopted. In particular, we discuss an application of an identification technique of variational type, based on the measurement of eigenfrequencies and mode shapes, to a steel frame with friction joints under various assembling conditions. Experience has suggested, so as to restrict the indeterminacy frequently affecting identification issues, having resort to all the a priori acknowledged information on the system, to the symmetry and presence of structural elements with equal stiffness, to mention one example, and mindfully selecting the parameters to be identified. In addition, considering that the identification techniques have a local character and correspond to the updating of a preliminary model of the structure, it is important that the analytical model on the first attempt should be adequately accurate. Secondly, it has proved determinant to cross the results of the dynamic identification with tests of other typology, for instance, static tests, so as to fully understand the structural behavior and avoid the indeterminacy due to the nonuniqueness of the inverse problem.

The Study Application of Identification Based on Small Units USN(Ubiquitous Sensor Network) (소부대급 USN 기반 전장감시체계 적용 방안)

  • Kim, Do-Heon;Kim, Do-Yeob
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.283-295
    • /
    • 2010
  • Although some large units, upper than division, have a identification system, most of them depend on US military. Especially, the company unit can not but execute GOP(General OutPost) guidance and battles inefficiently because they apply the method of conventional identification system. urrently, North Korea causes the high tension of peninsular by experimenting nuclear weapons and launching ICBM(Intercontinental Ballistic Missile). In addition, ROK military will reduce the number of personnel and division through reorganizing the structure into NCW (Network Centric Warfare) until 2020. These unstable situation and future tendency require the high technical identification system based on USN(Ubiquitous Sensor Network) in company unit level. his study suggests the method that the company unit apply the identification system based on USN which distinguish between friend and foe in the warfare. The identification system concludes the results through experiment of military analysis model (AWAM; Army Weapon effectiveness Analysis Model). After analyzing the experiment results, it indicates the budget requirement and operational operability of identification system. This will be able to improves battle efficiency and to prevent damages of friendly forces.

Read Rate Analysis of RFID Gen 2 Tag in Frozen Seafood Traceability Systems (냉동수산물 이력제 식별수단으로써의 RFID Gen 2 태그의 인식률 분석)

  • Kim, Jin-Baek;Lee, Dong-Ho
    • The Journal of Fisheries Business Administration
    • /
    • v.38 no.1 s.73
    • /
    • pp.115-132
    • /
    • 2007
  • Implementing the automatic identification in supply chain management is essential for effective and efficient process control. Though the GTIN based bar code system is generally used as an automatic identification method in most industries, it can not identify individual item, and is not appropriated for products' reliability and safety management. So the RFID system with EPC is considered as a better solution for resolving those problems. This study reviewed automatic identification code systems and the attributes and characteristics of RFID Gen 2 which became a global standard recently for supply chain management. Particularly, this study analyzed RFID Gen 2 systems' read rates on various conditions including distances between tags and readers and between antennas, condensation, and several packing materials in practical supply chain environment. The results of this study showed that the RFID Gen 2 had high read ratio in practical application and would be adopted as a new automatic identification means for traceability systems.

  • PDF