• Title/Summary/Keyword: Detection Coverage

Search Result 204, Processing Time 0.027 seconds

Quality of Breast Cancer Early Detection Services Conducted by Well Woman Clinics in the District of Gampaha, Sri Lanka

  • Vithana, Palatiyana Vithanage Sajeewanie Chiranthika;Ariyaratne, M.A.Y.;Jayawardana, P.L.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.1
    • /
    • pp.75-80
    • /
    • 2013
  • Background: Breast cancer is the most common cancer diagnosed in females in Sri Lanka and early detection can lead to reduction in morbidity and mortality. Aim: To evaluate selected aspects of breast cancer early detection services implemented through well woman clinics (WWCs) in the Gampaha District. Methods: The study consisted of two components. A retrospective descriptive arm assessed clinical breast examination (CBE) coverage of target age group women (TGW) of 35-59 years in all the WWCs in Gampaha district over 2003-2007. A cross sectional descriptive study additionally assessed quality of breast cancer early detection services. The Lot Quality Assurance Sampling (LQAS) technique was used to decide on the lot size and threshold values, which were computed as twenty and six clinics. Checklists were employed in assessing coverage, physical facilities and clinic activities. Client satisfaction on WWC services was assessed among 200 TGW attending 20 WWCs using an interviewer-administered questionnaire. Results: CBE coverage in the Gampaha district increased only from 1.1-2.2% over 2003-2007. With regard to physical facilities, the number of clinics that were rated substandard varied between 7-18 (35-90%). The items that were lacking included dust bins, notice boards, stationary, furniture and linen, and cleanliness of outside premises and toilets. With regard to clinic activities, punctuality of staff, late commencement of clinics, provision of health education, supervision, CBE and breast self-examination (BSE) were substandard in 7-20 clinics (35-100%). Client satisfaction for WWC services was 45.2% (IQR: 38.7-54.8%) and only 11% had a score of ${\geq}70%$, the cut off set for satisfaction. Conclusions: Breast cancer early detection service coverage in the Gampaha district remained low (2.2%) in 2007, 11 years after commencing WWCs. All 20 clinics were substandard for overall CBE and BSE.

FAULT DETECTION COVERAGE QUANTIFICATION OF AUTOMATIC TEST FUNCTIONS OF DIGITAL I&C SYSTEM IN NPPS

  • Choi, Jong-Gyun;Lee, Seung-Jun;Kang, Hyun-Gook;Hur, Seop;Lee, Young-Jun;Jang, Seung-Cheol
    • Nuclear Engineering and Technology
    • /
    • v.44 no.4
    • /
    • pp.421-428
    • /
    • 2012
  • Analog instrument and control systems in nuclear power plants have recently been replaced with digital systems for safer and more efficient operation. Digital instrument and control systems have adopted various fault-tolerant techniques that help the system correctly and safely perform the specific required functions regardless of the presence of faults. Each fault-tolerant technique has a different inspection period, from real-time monitoring to monthly testing. The range covered by each faulttolerant technique is also different. The digital instrument and control system, therefore, adopts multiple barriers consisting of various fault-tolerant techniques to increase the total fault detection coverage. Even though these fault-tolerant techniques are adopted to ensure and improve the safety of a system, their effects on the system safety have not yet been properly considered in most probabilistic safety analysis models. Therefore, it is necessary to develop an evaluation method that can describe these features of digital instrument and control systems. Several issues must be considered in the fault coverage estimation of a digital instrument and control system, and two of these are addressed in this work. The first is to quantify the fault coverage of each fault-tolerant technique implemented in the system, and the second is to exclude the duplicated effect of fault-tolerant techniques implemented simultaneously at each level of the system's hierarchy, as a fault occurring in a system might be detected by one or more fault-tolerant techniques. For this work, a fault injection experiment was used to obtain the exact relations between faults and multiple barriers of faulttolerant techniques. This experiment was applied to a bistable processor of a reactor protection system.

Cluster Based Object Detection in Wireless Sensor Network

  • Rahman, Obaidur;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.56-58
    • /
    • 2006
  • Sensing and coverage are the two relevant tasks for a sensor network. Quality of sensor network totally depends upon the sensing ability of sensors. In a certain monitored region success of detecting or sensing an object with the help of sensor network tells that how efficiently the network coverage perform. Here in this paper we have proposed a clustering algorithm for the deployment of sensors and thus calculated the object detection probability. Actually by this work we can easily identify the present network coverage status and accordingly can take action for its improvement.

  • PDF

Selection of Monitoring Nodes to Maximize Sensing Area in Behavior-based Attack Detection

  • Chong, Kyun-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.73-78
    • /
    • 2016
  • In wireless sensor networks, sensors have capabilities of sensing and wireless communication, computing power and collect data such as sound, movement, vibration. Sensors need to communicate wirelessly to send their sensing data to other sensors or the base station and so they are vulnerable to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic mechanisms. To defend against such attacks, a behavior-based attack detection is used in which some specialized monitoring nodes overhear the communications of their neighbors(normal nodes) to detect illegitimate behaviors. It is desirable that the total sensing area of normal nodes covered by monitoring nodes is as large as possible. The previous researches have focused on selecting the monitoring nodes so as to maximize the number of normal nodes(node coverage), which does not guarantee that the area sensed by the selected normal nodes is maximized. In this study, we have developed an algorithm for selecting the monitoring nodes needed to cover the maximum sensing area. We also have compared experimentally the covered sensing areas computed by our algorithm and the node coverage algorithm.

A Coverage-Based Software Reliability Growth Model for Imperfect Fault Detection and Repeated Construct Execution (불완전 결함 발견과 구문 반복 실행을 고려한 커버리지 기반 신뢰성 성장 모형)

  • Park, Joong-Yang;Park, Jae-Heung;Kim, Young-Soon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1287-1294
    • /
    • 2004
  • Recently relationships between reliability measures and the coverage have been developed for evaluation of software reliability. Particularly the mean value function of the coverage-based software reliability growth model is important because of its key role in rep-resenting the software reliability growth. In this paper, we first review the problems of the existing mean value functions with respect to the assumptions on which they are based. Then a new mean value function is proposed. The new mean value function is developed for a general testing environment in which imperfect fault detection and repeated construct execution are allowed. Finally performance of the proposed model is empirically evaluated by applying it to a real data set.

A Machine Learning-Driven Approach for Wildfire Detection Using Hybrid-Sentinel Data: A Case Study of the 2022 Uljin Wildfire, South Korea

  • Linh Nguyen Van;Min Ho Yeon;Jin Hyeong Lee;Gi Ha Lee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.175-175
    • /
    • 2023
  • Detection and monitoring of wildfires are essential for limiting their harmful effects on ecosystems, human lives, and property. In this research, we propose a novel method running in the Google Earth Engine platform for identifying and characterizing burnt regions using a hybrid of Sentinel-1 (C-band synthetic aperture radar) and Sentinel-2 (multispectral photography) images. The 2022 Uljin wildfire, the severest event in South Korean history, is the primary area of our investigation. Given its documented success in remote sensing and land cover categorization applications, we select the Random Forest (RF) method as our primary classifier. Next, we evaluate the performance of our model using multiple accuracy measures, including overall accuracy (OA), Kappa coefficient, and area under the curve (AUC). The proposed method shows the accuracy and resilience of wildfire identification compared to traditional methods that depend on survey data. These results have significant implications for the development of efficient and dependable wildfire monitoring systems and add to our knowledge of how machine learning and remote sensing-based approaches may be combined to improve environmental monitoring and management applications.

  • PDF

GEP-based Framework for Immune-Inspired Intrusion Detection

  • Tang, Wan;Peng, Limei;Yang, Ximin;Xie, Xia;Cao, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1273-1293
    • /
    • 2010
  • Immune-inspired intrusion detection is a promising technology for network security, and well known for its diversity, adaptation, self-tolerance, etc. However, scalability and coverage are two major drawbacks of the immune-inspired intrusion detection systems (IIDSes). In this paper, we propose an IIDS framework, named GEP-IIDS, with improved basic system elements to address these two problems. First, an additional bio-inspired technique, gene expression programming (GEP), is introduced in detector (corresponding to detection rules) representation. In addition, inspired by the avidity model of immunology, new avidity/affinity functions taking the priority of attributes into account are given. Based on the above two improved elements, we also propose a novel immune algorithm that is capable of integrating two bio-inspired mechanisms (i.e., negative selection and positive selection) by using a balance factor. Finally, a pruning algorithm is given to reduce redundant detectors that consume footprint and detection time but do not contribute to improving performance. Our experimental results show the feasibility and effectiveness of our solution to handle the scalability and coverage problems of IIDS.

Utilization of Remote Sensing and GIS in Aggregate Control of Urban Impervious Coverage (도시의 불투수면 총량규제에서 원격탐사와 GIS의 활용)

  • Um, Jung-Sup
    • Journal of Environmental Impact Assessment
    • /
    • v.13 no.5
    • /
    • pp.263-276
    • /
    • 2004
  • This research is primarily intended to propose a new concept for aggregate control of impervious coverage using remote sensing and GIS. An empirical study for a case study site was conducted to demonstrate how a standard remote sensing and GIS technology can be used to assist in implementing the aggregate control for impervious coverage as intermediary between decision makers and scientists. Guidelines for a replicable methodology are presented to provide a strong theoretical basis for the standardization of factors involved in the aggregate control; the meaningful definition of land mosaic in terms of pervious areas, classification of pervious intensity, change detection for pervious areas. Detailed visual maps (e.g. estimation of impervious surface allowable) can be generated over large areas quickly and easily to increase the scientific and objective decision-making for the aggregate control. It is anticipated that this research output could be used as a valuable reference to confirm the potential of remote sensing and GIS in the aggregate control for impervious coverage.

Study on the Optimal Deployment of the Passive Radar System for Detecting Small Unmanned Aerial Vehicles (소형 무인기 탐지를 위한 패시브 레이더망 최적 배치 연구)

  • Baek, Inseon;Lee, Taesik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.4
    • /
    • pp.443-452
    • /
    • 2016
  • Current low-altitude radar system often fails to detect small unmanned aerial vehicles (UAV) because of their small radar cross section (RCS) compared with larger targets. As a potential alternative, a passive bistatic radar system has been considered. We study an optimal deployment problem for the passive bistatic radar system. We model this problem as a covering problem, and develop an integer programming model. The objective of the model is to maximize coverage of a passive bistatic radar system. Our model takes into account factors specific to a bistatic radar system, including bistatic RCS and transmitter-receiver pair coverage. Considering bistatic RCS instead of constant RCS is important because the slight difference of RCS value for small UAVs could significantly influence the detection probability. The paired radar coverage is defined by using the concept of gradual coverage and cooperative coverage to represent a realistic environment.

Implementation of WLAN Baseband Processor Based on Space-Frequency OFDM Transmit Diversity Scheme (공간-주파수 OFDM 전송 다이버시티 기법 기반 무선 LAN 기저대역 프로세서의 구현)

  • Jung Yunho;Noh Seungpyo;Yoon Hongil;Kim Jaeseok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.5 s.335
    • /
    • pp.55-62
    • /
    • 2005
  • In this paper, we propose an efficient symbol detection algorithm for space-frequency OFDM (SF-OFDM) transmit diversity scheme and present the implementation results of the SF-OFDM WLAN baseband processor with the proposed algorithm. When the number of sub-carriers in SF-OFDM scheme is small, the interference between adjacent sub-carriers may be generated. The proposed algorithm eliminates this interference in a parallel manner and obtains a considerable performance improvement over the conventional detection algorithm. The bit error rate (BER) performance of the proposed detection algorithm is evaluated by the simulation. In the case of 2 transmit and 2 receive antennas, at $BER=10^{-4}$ the proposed algorithm obtains about 3 dB gain over the conventional detection algorithm. The packet error rate (PER), link throughput, and coverage performance of the SF-OFDM WLAN with the proposed detection algorithm are also estimated. For the target throughput at $80\%$ of the peak data rate, the SF-OFDM WLAN achieves the average SNR gain of about 5.95 dB and the average coverage gain of 3.98 meter. The SF-OFDM WLAN baseband processor with the proposed algorithm was designed in a hardware description language and synthesized to gate-level circuits using 0.18um 1.8V CMOS standard cell library. With the division-free architecture, the total logic gate count for the processor is 945K. The real-time operation is verified and evaluated using a FPGA test system.