• Title/Summary/Keyword: Execution Detection

Search Result 205, Processing Time 0.021 seconds

The Effect of Knee Strategy on Limits of Stability in Standing Balance (기립균형시 슬관절 전략이 안정성 한계에 미치는 영향)

  • Kwon, Hyuk-Cheol;Jeong, Dong-Hoon
    • Physical Therapy Korea
    • /
    • v.6 no.3
    • /
    • pp.11-21
    • /
    • 1999
  • Human balance is maintained through a complex process involving sensory detection of body motions, integration of sensorimotor information within the central nervous system, and execution of appropriate musculoskeletal responses. The basic task of balance is to position the body center of gravity (COG) over some portion of the support base. When the COG extends beyond the base of support, the person has exceeded the limits of stability (LOS). At this point, a step or stumble is required to prevent a fall. Automatic postural responses operate to keep the COG over the base of support. They are a set of functionally organized, long-loop responses that act to keep the body in a state of equilibrium. There are four commonly identified automatic postural responses, or strategies. These are ankle strategy, hip strategy, suspensory (knee) strategy, and stepping strategy. Thus, the purpose of this study was to evaluate the LOS using various knee strategies. Forty subjects participated in this study. The subjects were comprised of 20 males and 20 females who were without neurologic, orthopaedic or balance performance impairments. The LOS was measured with a Balance Performance Monitor (BPM) Dataprint Software Version 5.3. The results of this study were as follows: 1) Knee joint angle which is to increase stability of standing balance with using knee strategy was at mid-range. 2) There were statistically significant differences in anteroposterior LOSs according to the knee strategy. 3) There were no statistically significant differences in mediolateral LOSs according to the knee strategy. 4) There were statistically significant differences of anteroposterior LOSs with using knee strategy according to gender. 5) There were no statistically significant differences in mediolateral LOSs with using knee strategy according to gender.

  • PDF

Implementation of Digital Mammogram CAD Algorithm (디지털 유방영상의 CAD 알고리즘 구현)

  • Lee, Byungchea;Choi, Guirack;Jung, Jaeeun;Lee, Sangbock
    • Journal of the Korean Society of Radiology
    • /
    • v.8 no.1
    • /
    • pp.27-33
    • /
    • 2014
  • Medical imaging has increased rapidly in the increase of interest in health, with the development of computer technology, digitization of medical imaging is rapidly advancing, PACS has been introduced to the medical field. Increase in the production of medical images by these phenomena made increased the workload of radiologist who must read a medical image. in response to the need for secondary diagnosis using a computer, The term of CAD in medical radiology field was introduced. In this study, we have proposed a CAD algorithm for the interpretation of the image obtained by the digital X-ray mammography equipment. The experiments were performed by programmed in Visual C++ for the proposed algorithm. A result of the execution of the CAD algorithm seven sample images, the results of five samples was confirmed in breast cancer and benign tumors, both the images sample was error processing. If you use a program that implements this with the algorithm proposed in this study it is helpful to reading breast images, and it is considered to contribute significantly to the early detection of breast cancer.

A Study on Cost Benefit Analysis Optimization Model for Water Distribution Network Rehabilitation Project of Taebaek Region (태백권 배수관망 개량사업의 비용효과분석 최적화 모델 연구)

  • Kim, Taegon;Choi, Taeho;Kim, Kyoungpil;Koo, Jayong
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.29 no.3
    • /
    • pp.395-406
    • /
    • 2015
  • This research carried out an analysis on input cost and leakage reduction effect by leakage reduction method, focusing on the project for establishing an optimal water pipe network management system in the Taebaek region, which has been executed annually since 2009. Based on the result, optimal cost-benefit analysis models for water distribution network rehabilitation project were developed using DEA(data envelopment analysis) and multiple regression analysis, which have been widely utilized for efficiency analysis in public and other projects. DEA and multiple regression analysis were carried out by applying 4 analytical methods involving different ratios and costs. The result showed that the models involving the analytical methods 2 and 4 were of low significance (which therefore were excluded), and only the models involving the analytical methods 1 and 3 were suitable. From the result it was judged that the leakage management method to be executed with the highest priority for the improvement of revenue water ratio was installation of pressure reduction valve, followed by replacement of water distribution pipe, replacement of water supply pipe, and then leakage detection and repair; and that the execution of leakage management methods in this order would be most economical. In addition, replacement of water meter was also shown to be necessary in case there were a large number of defective water meters.

MPIRace-Check V 1.0: A Tool for Detecting Message Races in MPI Parallel Programs (MPIRace-Check V 1.0: MPI 병렬 프로그램의 메시지경합 탐지를 위한 도구)

  • Park, Mi-Young;Chung, Sang-Hwa
    • The KIPS Transactions:PartA
    • /
    • v.15A no.2
    • /
    • pp.87-94
    • /
    • 2008
  • Message races should be detected for debugging effectively message-passing programs because they can cause non-deterministic executions of a program. Previous tools for detecting message races report that message races occur in every receive operation which is expected to receive any messages. However message races might not occur in the receive operation if each of messages is transmitted through a different logical communication channel so that their incorrect detection makes it a difficult task for programmers to debug programs. In this paper we suggest a tool, MPIRace-Check, which can exactly detect message races by checking the concurrency between send/receive operations, and by inspecting the logical communication channels of the messages. To detect message races, this tool uses the vector timestamp to check if send and receive operations are concurrent during an execution of a program and it also uses the message envelop to inspect if the logical communication channels of transmitted messages are the same. In our experiment, we show that our tool can exactly detect message races with efficiency using MPI_RTED and a benchmark program. By detecting message races exactly, therefore, our tool enables programmers to develop reliable parallel programs reducing the burden of debugging.

Remote Fault Detection in Conveyor System Using Drone Based on Audio FFT Analysis (드론을 활용하고 음성 FFT분석에 기반을 둔 컨베이어 시스템의 원격 고장 검출)

  • Yeom, Dong-Joo;Lee, Bo-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.101-107
    • /
    • 2019
  • This paper proposes a method for detecting faults in conveyor systems used for transportation of raw materials needed in the thermal power plant and cement industries. A small drone was designed in consideration of the difficulty in accessing the industrial site and the need to use it in wide industrial site. In order to apply the system to the embedded microprocessor, hardware and algorithms considering limited memory and execution time have been proposed. At this time, the failure determination method measures the peak frequency through the measurement, detects the continuity of the high frequency, and performs the failure diagnosis with the high frequency components of noise. The proposed system consists of experimental environment based on the data obtained from the actual thermal power plant, and it is confirmed that the proposed system is useful by conducting virtual environment experiments with the drone designed system. In the future, further research is needed to improve the drone's flight stability and to improve discrimination performance by using more intelligent methods of fault frequency.

A Study on a Scenario-based Information Leakage Risk Response Model Associated with the PC Event Detection Function and Security Control Procedures (PC 이벤트 탐지 기능과 보안 통제 절차를 연계시킨 시나리오 기반 금융정보유출 위험 대응 모델에 관한 연구)

  • Lee, Ig Jun;Youm, Heung Youl
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.137-152
    • /
    • 2018
  • It is a measure to overcome limitations that occur in the activity of detecting and blocking abnormal information leakage activity by collecting the activity log generated by the security solution to detect the leakage of existing financial information and analyzing it by pattern analysis. First, it monitors real-time execution programs in PC that are used as information leakage path (read from the outside, save to the outside, transfer to the outside, etc.) in the PC. Second, it determines whether it is a normal controlled exception control circumvention by interacting with the related security control process at the time the program is executed. Finally, we propose a risk management model that can control the risk of financial information leakage through the process procedure created on the basis of scenario.

A Study on Hybrid Fuzzing using Dynamic Analysis for Automatic Binary Vulnerability Detection (바이너리 취약점의 자동 탐색을 위한 동적분석 정보 기반 하이브리드 퍼징 연구)

  • Kim, Taeeun;Jurn, Jeesoo;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.541-547
    • /
    • 2019
  • Recent developments in hacking technology are continuing to increase the number of new security vulnerabilities. Approximately 80,000 new vulnerabilities have been registered in the Common Vulnerability Enumeration (CVE) database, which is a representative vulnerability database, from 2010 to 2015, and the trend is gradually increasing in recent years. While security vulnerabilities are growing at a rapid pace, responses to security vulnerabilities are slow to respond because they rely on manual analysis. To solve this problem, there is a need for a technology that can automatically detect and patch security vulnerabilities and respond to security vulnerabilities in advance. In this paper, we propose the technology to extract the features of the vulnerability-discovery target binary through complexity analysis, and select a vulnerability-discovery strategy suitable for the feature and automatically explore the vulnerability. The proposed technology was compared to the AFL, ANGR, and Driller tools, with about 6% improvement in code coverage, about 2.4 times increase in crash count, and about 11% improvement in crash incidence.

Improved Quality Keyframe Selection Method for HD Video

  • Yang, Hyeon Seok;Lee, Jong Min;Jeong, Woojin;Kim, Seung-Hee;Kim, Sun-Joong;Moon, Young Shik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3074-3091
    • /
    • 2019
  • With the widespread use of the Internet, services for providing large-capacity multimedia data such as video-on-demand (VOD) services and video uploading sites have greatly increased. VOD service providers want to be able to provide users with high-quality keyframes of high quality videos within a few minutes after the broadcast ends. However, existing keyframe extraction tends to select keyframes whose quality as a keyframe is insufficiently considered, and it takes a long computation time because it does not consider an HD class image. In this paper, we propose a keyframe selection method that flexibly applies multiple keyframe quality metrics and improves the computation time. The main procedure is as follows. After shot boundary detection is performed, the first frames are extracted as initial keyframes. The user sets evaluation metrics and priorities by considering the genre and attributes of the video. According to the evaluation metrics and the priority, the low-quality keyframe is selected as a replacement target. The replacement target keyframe is replaced with a high-quality frame in the shot. The proposed method was subjectively evaluated by 23 votes. Approximately 45% of the replaced keyframes were improved and about 18% of the replaced keyframes were adversely affected. Also, it took about 10 minutes to complete the summary of one hour video, which resulted in a reduction of more than 44.5% of the execution time.

Efficient Flash Memory Access Power Reduction Techniques for IoT-Driven Rare-Event Logging Application (IoT 기반 간헐적 이벤트 로깅 응용에 최적화된 효율적 플래시 메모리 전력 소모 감소기법)

  • Kwon, Jisu;Cho, Jeonghun;Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.2
    • /
    • pp.87-96
    • /
    • 2019
  • Low power issue is one of the most critical problems in the Internet of Things (IoT), which are powered by battery. To solve this problem, various approaches have been presented so far. In this paper, we propose a method to reduce the power consumption by reducing the numbers of accesses into the flash memory consuming a large amount of power for on-chip software execution. Our approach is based on using cooperative logging structure to distribute the sampling overhead in single sensor node to adjacent nodes in case of rare-event applications. The proposed algorithm to identify event occurrence is newly introduced with negative feedback method by observing difference between past data and recent data coming from the sensor. When an event with need of flash access is determined, the proposed approach only allows access to write the sampled data in flash memory. The proposed event detection algorithm (EDA) result in 30% reduction of power consumption compared to the conventional flash write scheme for all cases of event. The sampled data from the sensor is first traced into the random access memory (RAM), and write access to the flash memory is delayed until the page buffer of the on-chip flash memory controller in the micro controller unit (MCU) is full of the numbers of the traced data, thereby reducing the frequency of accessing flash memory. This technique additionally reduces power consumption by 40% compared to flash-write all data. By sharing the sampling information via LoRa channel, the overhead in sampling data is distributed, to reduce the sampling load on each node, so that the 66% reduction of total power consumption is achieved in several IoT edge nodes by removing the sampling operation of duplicated data.

Modeling and Simulation for Performance Evaluation of VoIP Spam Detection Mechanism (VoIP 스팸 탐지 기술의 성능 평가를 위한 모델링 및 시물레이션)

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Kim, Myuhng-Joo;Jeong, Jong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.95-105
    • /
    • 2009
  • Spam call is one of the main security threat in VoIP services. In this paper, we have designed simulation model for performance evaluation of VoIP spam defense mechanism. The simulation model has functions for performance evaluation such as calls generation and input/output comparison. Four representative caller models have been developed for performance evaluation and each model has its own characteristics as statistical parameters. The target mechanism of performance evaluation is SPIT(Spam over Internet Telephony) level decision algorithm, and we have derived SPIT levels of caller models. The performance evaluation model is designed using the DEVS formalism and DEVSJAVA$^{TM}$ is exploited for development and execution of simulation models.