• Title/Summary/Keyword: Event Identification

Search Result 226, Processing Time 0.029 seconds

Development of Power Quality Management System with Power Quality Diagnosis Functions

  • Chung Il-Yop;Won Dong-Jun;Ahn Seon-Ju;Kim Joong-Moon;Moon Seung-Il;Seo Jang-Cheol;Choe Jong-Woong;Jang Gil-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.1 no.1
    • /
    • pp.28-34
    • /
    • 2006
  • Recently, in accordance with the development of IT technology, it is prevalent for power quality monitors to be connected to each other via networks and share their data because such networks provide system-wide insights to customers concerning power quality. Those systems can alarm and display power quality events for the convenience of customers. However, if a power quality event occurs, it is difficult for customers to determine its cause and solution because the systems do not provide appropriate power quality diagnosis functions. The power quality management system presented in this paper has been developed to provide customers with various power quality diagnosis functions so that they can cope well with power quality problems with the right measure in the right place. This paper presents the structure and functions of the developed power quality management system and shows some results of the power diagnosis functions.

AE Source Location in Planar Defects using Spot Excitation (Spot 가진을 이용한 평면결함의 음향방출 위치표정)

  • Rhee Zhang-Kyu;Park Sung-Oan;Woo Chang-Ki
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.13 no.5
    • /
    • pp.87-95
    • /
    • 2004
  • From the results of AE(Acoustic Emission) source location occurred by the spot exciting as suggested in this research, it has been confirmed that AE technique is quite fruitful in figuring out the location of the occurrence, form, size and direction of the defects. As the results of examining the distribution of event for the angle of crack $\alpha$ to Xs and Ys, as the increases from $0^{\circ}$ ~ $90^{\circ}$, gradually changes its width from the axis Xs to the axis Ys. So event appears approximately similar in its size at the angle of crack $\alpha$=$45^{\circ}$, yet opposite when $\alpha$ is lager. It is believed that this is a phenomenon where its crack legnth $\alpha$, assumed as a planar defect, is to be prcjected toward the direction with a larger size. Thus, it is expected that the application of the experimental method suggested in this study would make it possible to identify the location of the defect in the material in the nondestructive way.

Micro-seismic monitoring in mines based on cross wavelet transform

  • Huang, Linqi;Hao, Hong;Li, Xibing;Li, Jun
    • Earthquakes and Structures
    • /
    • v.11 no.6
    • /
    • pp.1143-1164
    • /
    • 2016
  • Time Delay of Arrival (TDOA) estimation methods based on correlation function analysis play an important role in the micro-seismic event monitoring. It makes full use of the similarity in the recorded signals that are from the same source. However, those methods are subjected to the noise effect, particularly when the global similarity of the signals is low. This paper proposes a new approach for micro-seismic monitoring based on cross wavelet transform. The cross wavelet transform is utilized to analyse the measured signals under micro-seismic events, and the cross wavelet power spectrum is used to measure the similarity of two signals in a multi-scale dimension and subsequently identify TDOA. The offset time instant associated with the maximum cross wavelet transform spectrum power is identified as TDOA, and then the location of micro-seismic event can be identified. Individual and statistical identification tests are performed with measurement data from an in-field mine. Experimental studies demonstrate that the proposed approach significantly improves the robustness and accuracy of micro-seismic source locating in mines compared to several existing methods, such as the cross-correlation, multi-correlation, STA/LTA and Kurtosis methods.

Identification of Contaminant Injection in Water Distribution Network

  • Marlim, Malvin Samuel;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.114-114
    • /
    • 2020
  • Water contamination in a water distribution network (WDN) is harmful since it directly induces the consumer's health problem and suspends water service in a wide area. Actions need to be taken rapidly to countermeasure a contamination event. A contaminant source ident ification (CSI) is an important initial step to mitigate the harmful event. Here, a CSI approach focused on determining the contaminant intrusion possible location and time (PLoT) is introduced. One of the methods to discover the PLoT is an inverse calculation to connect all the paths leading to the report specification of a sensor. A filtering procedure is then applied to narrow down the PLoT using the results from individual sensors. First, we spatially reduce the suspect intrusion points by locating the highly suspicious nodes that have similar intrusion time. Then, we narrow the possible intrusion time by matching the suspicious intrusion time to the reported information. Finally, a likelihood-score is estimated for each suspect. Another important aspect that needs to be considered in CSI is that there are inherent uncertainties, such as the variations in user demand and inaccuracy of sensor data. The uncertainties can lead to overlooking the real intrusion point and time. To reflect the uncertainties in the CSI process, the Monte-Carlo Simulation (MCS) is conducted to explore the ranges of PLoT. By analyzing all the accumulated scores through the random sets, a spread of contaminant intrusion PLoT can then be identified in the network.

  • PDF

U.S. Monetary Policy and Investor Reactions: Korean Evidence (미국의 통화정책과 국내 주식 투자자의 반응)

  • Jongho Park
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.4
    • /
    • pp.135-149
    • /
    • 2022
  • Purpose - The primary objective of this article is to investigate the impact of U.S. monetary policy on institutional / individual / foreign investor reactions in the Korean stock market. Design/methodology/approach - This study employs a high frequency event study methodology to identify U.S. monetary policy shocks and quantify the impact of identified shocks on investor reactions. The dependent variable in the regression model is net stock purchase, while the explanatory variables are U.S. monetary policy shocks. The model is estimated for the period 2000-2019, including 156 FOMC meetings. Findings - Foreign investors immediately sell stocks in response to contractionary U.S. monetary shocks. They do not, however, react to anticipated changes in monetary policy rates, confirming the rationality of foreign investors. Individual investors demonstrate the opposite response, indicating that a non-trivial proportion of individual investors are irrational. Research implications or Originality - This study adds to the current literature on the effect of U.S. monetary policy on the Korean stock market. This study demonstrates a heterogeneous response to U.S. monetary policy shocks, validating the rational investment behavior of foreign investors, while individual investors exhibit a certain degree of irrationality. Methodologically, this study adds to the literature by quantifying the impact of U.S. monetary policy employing a sharper identification method allowing a simple and consistent estimation.

A study on the event processing methods for ubiquitous sensor network (유비쿼터스 센서 네트워크를 위한 이벤트 처리 기법에 관한 연구)

  • Cho, Yang-Hyun;Park, Yong-Min;Kim, Hyeon-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.137-147
    • /
    • 2013
  • The RFID(Radio Frequency Identification) and the WSN(Wireless Sensor Network) have technical similarities and mutual effects, they have been recognized to be studied separately, and sufficient studies have not been conducted on the technical integration of the RFID and the WSN. Therefore, EPC global which realized the issue proposed the EPC(Electronic Produce Code) Sensor Network to efficiently integrate and interoperate the RFID and WSN technologies based on the international standard EPC global network. The proposed EPC Sensor Network technology uses the Complex Event Processing method in the middleware to integrate data occurring through the RFID and the WSN in a single environment and to interoperate the events based on the EPC global network. However, as the EPC Sensor Network technology continuously performs its operation even in the case that the minimum conditions are not to be met to find complex events in the middleware, its operation cost rises. Therefore, to address the problems of the existing system, we defined the minimum conditions of the complex events to detect unnecessary complex events in the middleware, and proposed an algorithm that can extract complex events only when the minimum conditions are to be met. To examine the minimum conditions, a index and a query index are used to extract complex events. To evaluate the performance of the proposed methods, In the case of the method of extracting complex events based on a bitmap index, we used the existing extraction method and NS2 simulation to evaluate its performance and thus to show its good performance in terms of the number of operation and the processing time for the complex events.

Feasibility Study on the Risk Quantification Methodology of Railway Level Crossings (철도건널목 위험도 정량평가 방법론 적용성 연구)

  • Kang, Hyun-Gook;Kim, Man-Cheol;Park, Joo-Nam;Wang, Jong-Bae
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.605-613
    • /
    • 2007
  • In order to overcome the difficulties of quantitative risk analysis such as complexity of model, we propose a systematic methodology for risk quantification of railway system which consists of 6 steps: The identification of risk factors, the determination of major scenarios for each risk factor by using event tree, the development of supplementary fault trees for evaluating branch probabilities, the evaluation of event probabilities, the quantification of risk, and the analysis in consideration of accident situation. In this study, in order to address the feasibility of the propose methodology, this framework is applied to the prototype risk model of nation-wide railway level crossings. And the quantification result based on the data of 2005 in Korea will also be presented.

  • PDF

Development of Case Review Form for Detecting Adverse Events (위해사건 확인을 위한 증례검토지 개발)

  • Ock, Min-su;Lee, Sang-il;Kim, Yoon;Lee, Jae-ho;Lee, Jin-yong;Jo, Min-woo;Kim, Seon-ha;Son, Woo-seung;Kim, Hyun-joo
    • Quality Improvement in Health Care
    • /
    • v.21 no.1
    • /
    • pp.66-76
    • /
    • 2015
  • Objectives: The purpose of this study is to develop a case review form for detecting adverse events through a medical records review in hospitalized patients in South Korea. Methods: To develop the case review form, several literatures were reviewed, first. Through the clinical expert meeting, screening criteria were selected and case review form was developed. Result: The Korean version of case review form consisted of the review form-1 for adverse event screening and form-2 for adverse event identification. The applied methodology for the case review form is determined according to the previous studies. For example, the method used in the first stage review is nurse review. Furthermore, the National Coordinating Council for Medication Errors Reporting and Prevention index is used to categorize disability, and a scale of 1 to 6 was used in the causation scores and preventability scores, respectively. Through the clinical expert meeting, a total of 41 screening criteria were selected. Conclusion: The Korean specific case review form was developed for detecting adverse events in hospitalized patients. The results from this study can be used in a large-scale study regarding the nationwide incidence of adverse events.

A real-time sorting algorithm for in-beam PET of heavy-ion cancer therapy device

  • Ke, Lingyun;Yan, Junwei;Chen, Jinda;Wang, Changxin;Zhang, Xiuling;Du, Chengming;Hu, Minchi;Yang, Zuoqiao;Xu, Jiapeng;Qian, Yi;She, Qianshun;Yang, Haibo;Zhao, Hongyun;Pu, Tianlei;Pei, Changxu;Su, Hong;Kong, Jie
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3406-3412
    • /
    • 2021
  • A real-time digital time-stamp sorting algorithm used in the In-Beam positron emission tomography (In-Beam PET) is presented. The algorithm is operated in the field programmable gate array (FPGA) and a small amount of registers, MUX and memory cells are used. It is developed for sorting the data of annihilation event from front-end circuits, so as to identify the coincidence events efficiently in a large amount of data. In the In-Beam PET, each annihilation event is detected by the detector array and digitized by the analog to digital converter (ADC) in Data Acquisition Unit (DAQU), with a resolution of 14 bits and sampling rate of 50 MS/s. Test and preliminary operation have been implemented, it can perform a sorting operation under the event count rate up to 1 MHz per channel, and support four channels in total, count rate up to 4 MHz. The performance of this algorithm has been verified by pulse generator and 22Na radiation source, which can sort the events with chaotic order into chronological order completely. The application of this algorithm provides not only an efficient solution for selection of coincidence events, but also a design of electronic circuit with a small-scale structure.

Intelligent Video Event Detection System Used by Image Object Identification Technique (영상 객체인식기법을 활용한 지능형 영상검지 시스템)

  • Jung, Sang-Jin;Kim, Jeong-Jung;Lee, Dong-Yeong;Jo, Sung-Jea;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.171-178
    • /
    • 2010
  • The surveillance system in general, has been sufficiently studied in the field of wireless semiconductor using basic sensors and its study of image surveillance system mainly using camera as a sensor has especially been fully implemented. In this paper, we propose 'Intelligent Image Detection System' used by image object identification technique based on the result analysis of various researches. This 'Intelligent Image Detection System' can easily trace and judge before and after a particular incident and ensure affirmative evidence and numerous relative information. Therefore, the 'Intelligent Image Detection System' proposed in this paper can be effectively used in the lived society such as traffic management, disaster alarm system and etc.