• Title/Summary/Keyword: Flow Identification

Search Result 421, Processing Time 0.025 seconds

Domain Analysis and Component Extraction for Defence Software (국방 소프트웨어의 도메인 분석과 컴포넌트 추출)

  • Song, Ho-Jin;Choi, Eun-Man;Jeon, Byung-Kook;Kim, Young-Chul
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.123-132
    • /
    • 2004
  • Defense software has short of interoperability due to the vertical development method which is dependent heavily on application area and development environments. In order to prevent from lack of reusability and operability in application domain software development technology needs component concept and makes shift to the trend of domestic software component industry. This paper covers the research topics such as domain analysis and component architecture to improve and extend reusability and inter-operability for defense information system by two approaches, i.e. CBW (Command Based Work flow) analysis and UML components identification.

A Method to Resolve TCP Packet Out-of-order and Retransmission Problem at the Traffic Collection Point (트래픽 수집지점에서 발생하는 TCP패킷중복 및 역전문제 해결 방법)

  • Lee, Su-Kang;An, Hyun-Min;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.350-359
    • /
    • 2014
  • With the rapid growth of Internet, the importance of application traffic analysis is increasing for efficient network management. The statistical information in traffic flows can be efficiently utilized for application traffic identification. However, the packet out-of-order and retransmission occurred at the traffic collection point reduces the performance of the statistics-based traffic analysis. In this paper, we propose a novel method to detect and resolve the packet out-of-order and retransmission problem in order to improve completeness and accuracy of the traffic identification. To prove the feasibility of the proposed method, we applied our method to a real traffic analysis system using statistical flow information, and compared the performance of the system with the selected 9 popular applications. The experiment showed maximum 4% of completeness growth in traffic bytes, which shows that the proposed method contributes to the analysis of heavy flow.

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.

Generative optical flow based abnormal object detection method using a spatio-temporal translation network

  • Lim, Hyunseok;Gwak, Jeonghwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.11-19
    • /
    • 2021
  • An abnormal object refers to a person, an object, or a mechanical device that performs abnormal and unusual behavior and needs observation or supervision. In order to detect this through artificial intelligence algorithm without continuous human intervention, a method of observing the specificity of temporal features using optical flow technique is widely used. In this study, an abnormal situation is identified by learning an algorithm that translates an input image frame to an optical flow image using a Generative Adversarial Network (GAN). In particular, we propose a technique that improves the pre-processing process to exclude unnecessary outliers and the post-processing process to increase the accuracy of identification in the test dataset after learning to improve the performance of the model's abnormal behavior identification. UCSD Pedestrian and UMN Unusual Crowd Activity were used as training datasets to detect abnormal behavior. For the proposed method, the frame-level AUC 0.9450 and EER 0.1317 were shown in the UCSD Ped2 dataset, which shows performance improvement compared to the models in the previous studies.

A Study on the Noise Emission Characteristics of Turbo Axial Flow Fan by Experimental Method (터보형송풍기의 소음 방사특성에 관한 실험적 연구)

  • 김동규;백종진
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2003.10a
    • /
    • pp.271-277
    • /
    • 2003
  • Recently as the environmental noise getting influential social problem, it is the fact that the demand on noise reduction increases with the advance of the standard of living. Therefore increasing the interest on the noise in common, it is eagerly demanded that the endeavour for reducing the noise of the rotating machinery, especially the machinery related a flowing including the household electric products, which is pointed out the primary noise source in environment. As proceeding study for fan noise, theory of fan noise property is arranged and this control method is shown. Blade passage noise of total noise spectrum. Thus in the aspect of noise reduction, noise source and identification of noise radiation characteristics of axial flow fan are demanded in detail. The sound source is analyzed by using sound pressure and sound intensity. In that time, synchronization of axial flow fan using optical sensor is executed, and to identify the location of exact noise source in the fan profile determination of recording time is proposed. In the rotating of tan, it is explained that the location of noise source exists in and by the directivity, the noise radiation pattern of axial flow fan is determined and the flow of sound is visualized in the figure of contour mapping.

  • PDF

CD Copy Service to Enhance Customer Satisfaction Through Improved Flow Study - Based on QI Use - (CD Copy업무 flow개선을 통한 고객만족도 향상에 관한 연구 - QI 활용을 중심으로 -)

  • Choi, Sung-Hyun;Hwang, Sun-Kwang;Lee, Jong-Woong;Dong, Kyung-Rae;Kweon, Dae-Cheol;Goo, Eun-Hoe;Park, Chang-Hee
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.13 no.3
    • /
    • pp.127-132
    • /
    • 2011
  • This is to improve the complicate process of the existing CD copy flow in Department of Radiology. It is also to improve the medical service of the hospital to secure private information of patients. Survey: The patients who ask for CD copies in the Department of Radiology of this hospital(for 6 months in 2010). Time: Comparing the total amount of time of the previous and the modified CD copy flow. Using the SPSS 12.0 program for testing significance of independent two-samples t-test. Private information: Introducing the identification-system based on the medical law to supplement the security of personal information of patients. There was manifold complaints due to receipt and issuing the prescription in Admission and Discharging office and outpatient department. The time has been approximately 50% reduced from 70 mistunes to 32 mistunes due to simplifying the routes. The security of the personal information has been supplemented by let patients submit documentary evidence based on the medical law. The service in the hospital has been improved as a result of simplifying the whole process of the routes and receipt process. Therefore, the each stage of waiting time has been decreased. In addition, the personal information of the patients has been more secured.

  • PDF

A Study on RFID System Design and Expanded EPCIS Model for Manufacturing Systems (제조 시스템의 RFID System 설계 및 EPCIS 확장모형 연구)

  • Choi, Weon-Yong;Lee, Jong-Tae
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.6
    • /
    • pp.123-135
    • /
    • 2007
  • In the recent years, the companies have manually recorded a production status in a work diary or have mainly used a bar code in order to collect each process's progress status, production performance and quality information in the production and logistics process in real time. But, it requires an additional work because the worker's record must be daily checked or the worker must read it with the bar code scanner. At this time, data's accuracy is decreased owing to the worker's intention or mistake, and it causes the problem of the system's reliability. Accordingly, in order to solve such problem, the companies have introduced RFID which comes into the spotlight in the latest automatic identification field. In order to introduce the RFID technology, the process flow must be analyzed, but the ASME sign used by most manufacturing companies has the difficult problem when the aggregation event occurs. Hence, in this study, the RFID logistic flow analysis Modeling Notation was proposed as the signature which can analyze the manufacturing logistic flow amicably, and the manufacturing logistic flow by industry type was analyzed by using the proposed RFID logistic flow analysis signature. Also, to monitor real-time information through EPCglobal network, EPCISEvent template by industry was proposed, and it was utilized as the benchmarking case of companies for RFID introduction. This study suggested to ensure the decision-making on real-time information through EPCglobal network. This study is intended to suggest the Modeling Notation suitable for RFID characteristics, and the study is intended to establish the business step and to present the vocabulary.

Clinical Observation on Heart Rate Variability and Peripheral Blood Flow by Doppler Ultrasound in Healthy Subjects Stimulated by Cold Stress (정상인의 한냉자극에 대한 심박변이도 및 도플러 초음파 혈류계를 이용한 말초 혈류관찰)

  • Lim, Sung-Keun;Lee, Sang-Hoon;Bae, Young-Min
    • The Journal of Korean Medicine
    • /
    • v.31 no.2
    • /
    • pp.114-123
    • /
    • 2010
  • Objectives: This study was performed to investigate the effect of cold stress on heart rate variability and peripheral blood flow by Doppler ultrasound in healthy subjects. Methods: We classified the subjects by their Yin or Yang tendency using a Yin-Yang questionnaire. Cold stress was taken on the left hand of subjects for 10 seconds. Heart rate variability and peripheral blood flow were measured on the right radial artery before and after cold stress. Results: The Yang tendency group showed a significant decrease of heart rate after cold stress which was not seen in the Yin tendency group. The Yang tendency group showed a decrease of LF, total power, and increase of HF after cold stress, while the Yin tendency group showed the opposite. However, there were no statistically significant differences of heart rate variability analysis between the results of the two groups before and after cold stress. Recovery time of blood flow velocity by ultrasound Doppler was significantly different between the Yin and Yang tendency groups after cold stress. Conclusion: These results suggest that people with Yin or Yang tendency may show different responses in the autonomic nervous system. Further modified studies may include the responses to various manipulation techniques in acupuncture treatment and the individual responses according to pattern identification in traditional Korean medicine.

Transcranial Doppler emboli monitoring for stroke prevention after flow diverting stents

  • Matias Costa;Paul Schmitt;Jaleel N;Matias Baldoncini;Juan Vivanco-Suarez;Bipin Chaurasia;Colleen Douville;Loh Yince;Akshal Patel;Stephen Monteith
    • Journal of Cerebrovascular and Endovascular Neurosurgery
    • /
    • v.26 no.1
    • /
    • pp.23-29
    • /
    • 2024
  • Objective: Flow diverting stents (FDS) are increasingly used for the treatment of intracranial aneurysms. While FDS can provide flow diversion of parent vessels, their high metal surface coverage can cause thromboembolism. Transcranial Doppler (TCD) emboli monitoring can be used to identify subclinical embolic phenomena after neurovascular procedures. Limited data exists regarding the use of TCDs for emboli monitoring in the periprocedural period after FDS placement. We evaluated the rate of positive TCDs microembolic signals and stroke after FDS deployment at our institution. Methods: We retrospectively evaluated 105 patients who underwent FDS treatment between 2012 and 2016 using the Pipeline stent (Medtronic, Minneapolis, MN, USA). Patients were pretreated with aspirin and clopidogrel. All patients were therapeutic on clopidogrel pre-operatively. TCD emboli monitoring was performed immediately after the procedure. Microembolic signals (mES) were classified as "positive" (<15 mES/hour) and "strongly positive" (>15 mES/hour). Clinical stroke rates were determined at 2-week and 6-month post-operatively. Results: A total of 132 intracranial aneurysms were treated in 105 patients. TCD emboli monitoring was "positive" in 11.4% (n=12) post-operatively and "strongly positive" in 4.8% (n=5). These positive cases were treated with heparin drips or modification of the antiplatelet regimen, and TCDs were repeated. Following medical management modifications, normalization of mES was achieved in 92% of cases. The overall stroke rates at 2-week and 6-months were 3.8% and 4.8%, respectively. Conclusions: TCD emboli monitoring may help early in the identification of thromboembolic events after flow diversion stenting. This allows for modification of medical therapy and, potentially, preventionf of escalation into post-operative strokes.

Studies on the Separation of Major Bile Acids in Commercial Crude Bile Drugs (시판(市販) 담즙(膽汁) 생약(生藥)중 주요(主要) 담즙산(膽汁酸)의 분리(分離)에 관한 연구(硏究))

  • Park, Jong-Dae;Yoo, Seung-Jo
    • Korean Journal of Pharmacognosy
    • /
    • v.15 no.3
    • /
    • pp.139-146
    • /
    • 1984
  • High performance liquid chromatographic separation is described for the analysis of bile acids after hydrolysis in seven commercial crude bile drugs and ox and pig galls. They are simultaneously separated with HPLC mobile phase of acetonitrile/0.5% ammonium carbonate (pH 6.7) (25.5 : 74.5) at a flow rate $(1.0{\rightarrow}1.5ml/min.)$ and differential refractometer. The linearity of calibration curve and recovery test are good by using the method. The analysis of major bile acids in seven commercial crude bile drugs using the described method is presented. Sample no. 1 of them is similar to separation pattern of ox gall. Sample no. 6 of them is supposed to be genuine bear gall on the basis of identification of ursodeoxycholic acid. Sample $no.\;2{\sim}5$ and 7 of them are supposed to be pig gall on the basis of identification of hyodeoxycholic acid which is a characteristic component of pig gall.

  • PDF