• Title/Summary/Keyword: Graph-based

Search Result 1,784, Processing Time 0.024 seconds

Power Plant Fault Monitoring and Diagnosis based on Disturbance Interrelation Analysis Graph (교란들의 인과관계구현 데이터구조에 기초한 발전소의 고장감시 및 고장진단에 관한 연구)

  • Lee, Seung-Cheol;Lee, Sun-Gyo
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.9
    • /
    • pp.413-422
    • /
    • 2002
  • In a power plant, disturbance detection and diagnosis are massive and complex problems. Once a disturbance occurs, it can be either persistent, self cleared, cleared by the automatic controllers or propagated into another disturbance until it subsides in a new equilibrium or a stable state. In addition to the Physical complexity of the power plant structure itself, these dynamic behaviors of the disturbances further complicate the fault monitoring and diagnosis tasks. A data structure called a disturbance interrelation analysis graph(DIAG) is proposed in this paper, trying to capture, organize and better utilize the vast and interrelated knowledge required for power plant disturbance detection and diagnosis. The DIAG is a multi-layer directed AND/OR graph composed of 4 layers. Each layer includes vertices that represent components, disturbances, conditions and sensors respectively With the implementation of the DIAG, disturbances and their relationships can be conveniently represented and traced with modularized operations. All the cascaded disturbances following an initial triggering disturbance can be diagnosed in the context of that initial disturbance instead of diagnosing each of them as an individual disturbance. DIAG is applied to a typical cooling water system of a thermal power plant and its effectiveness is also demonstrated.

A Semantic Representation Based-on Term Co-occurrence Network and Graph Kernel

  • Noh, Tae-Gil;Park, Seong-Bae;Lee, Sang-Jo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.238-246
    • /
    • 2011
  • This paper proposes a new semantic representation and its associated similarity measure. The representation expresses textual context observed in a context of a certain term as a network where nodes are terms and edges are the number of cooccurrences between connected terms. To compare terms represented in networks, a graph kernel is adopted as a similarity measure. The proposed representation has two notable merits compared with previous semantic representations. First, it can process polysemous words in a better way than a vector representation. A network of a polysemous term is regarded as a combination of sub-networks that represent senses and the appropriate sub-network is identified by context before compared by the kernel. Second, the representation permits not only words but also senses or contexts to be represented directly from corresponding set of terms. The validity of the representation and its similarity measure is evaluated with two tasks: synonym test and unsupervised word sense disambiguation. The method performed well and could compete with the state-of-the-art unsupervised methods.

Design and implementation of malicious comment classification system using graph structure (그래프 구조를 이용한 악성 댓글 분류 시스템 설계 및 구현)

  • Sung, Ji-Suk;Lim, Heui-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.23-28
    • /
    • 2020
  • A comment system is essential for communication on the Internet. However, there are also malicious comments such as inappropriate expression of others by exploiting anonymity online. In order to protect users from malicious comments, classification of malicious / normal comments is necessary, and this can be implemented as text classification. Text classification is one of the important topics in natural language processing, and studies using pre-trained models such as BERT and graph structures such as GCN and GAT have been actively conducted. In this study, we implemented a comment classification system using BERT, GCN, and GAT for actual published comments and compared the performance. In this study, the system using the graph-based model showed higher performance than the BERT.

A Framework for Human Body Parts Detection in RGB-D Image (RGB-D 이미지에서 인체 영역 검출을 위한 프레임워크)

  • Hong, Sungjin;Kim, Myounggyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.12
    • /
    • pp.1927-1935
    • /
    • 2016
  • This paper propose a framework for human body parts in RGB-D image. We conduct tasks of obtaining person area, finding candidate areas and local detection in order to detect hand, foot and head which have features of long accumulative geodesic distance. A person area is obtained with background subtraction and noise removal by using depth image which is robust to illumination change. Finding candidate areas performs construction of graph model which allows us to measure accumulative geodesic distance for the candidates. Instead of raw depth map, our approach constructs graph model with segmented regions by quadtree structure to improve searching time for the candidates. Local detection uses HOG based SVM for each parts, and head is detected for the first time. To minimize false detections for hand and foot parts, the candidates are classified with upper or lower body using the head position and properties of geodesic distance. Then, detect hand and foot with the local detectors. We evaluate our algorithm with datasets collected Kinect v2 sensor, and our approach shows good performance for head, hand and foot detection.

A Study on Didactic Transposition Method and Students' Understanding for Graph's Trail (그래프의 경로에 대한 교수학적 변환 방식과 학생들의 이해 분석)

  • Shin, Bo-Mi
    • Journal of the Korean School Mathematics Society
    • /
    • v.13 no.2
    • /
    • pp.289-301
    • /
    • 2010
  • This study discovered that instructional objectives of graphs which are dealt with in Math I of the revised curriculum are not matched with those of Discrete Mathematics in the 7th Curriculum. Based on the findings, this study analysed didactic transposition method of trail in graph and matrix of Math I and students' understanding about trail. Then this study discovered that though the concept definition of trail in Math I of the revised curriculum, some textbooks and students tend to consider it as the path. The concept definition of trail is significant in systems that deal with Euler Circuits(Euler Closed trail) and Hamilton Cycle. Then it is not easy to find the value of trail in Math I of the revised curriculum.

  • PDF

A Study on Automatic Extraction of Core Sentences from Document using Word Cooccurrence Graph (단어의 공기 관계 그래프를 이용한 문서의 핵심 문장 추출에 관한 연구)

  • Ryu, Je;Han, Kwang-Rok;Sohn, Seok-Won;Rim, Kee-Wook
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3427-3437
    • /
    • 2000
  • In this paper,we propose an method of core sciences extractionusing word cooccrrence graph in order to summarize a document. For automatic extraction of core sentenees, we construct a mean cluster from word cooccurrence graph, and find insistence which corresponds a porposed of author. And then we extract keywords by using relationship between mean cluster and isistence. Finally, core senrences are sclected based on keywords and insitances. The esults are evaluated by comparing with manual extraction, and show that the extraction performance is improved about 10%.

  • PDF

Optimizing Employment and Learning System Using Big Data and Knowledge Management Based on Deduction Graph

  • Vishkaei, Behzad Maleki;Mahdavi, Iraj;Mahdavi-Amiri, Nezam;Askari, Masoud
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.3
    • /
    • pp.13-23
    • /
    • 2016
  • In recent years, big data has usefully been deployed by organizations with the aim of getting a better prediction for the future. Moreover, knowledge management systems are being used by organizations to identify and create knowledge. Here, the output from analysis of big data and a knowledge management system are used to develop a new model with the goal of minimizing the cost of implementing new recognized processes including staff training, transferring and employment costs. Strategies are proposed from big data analysis and new processes are defined accordingly. The company requires various skills to execute the proposed processes. Organization's current experts and their skills are known through a pre-established knowledge management system. After a gap analysis, managers can make decisions about the expert arrangement, training programs and employment to bridge the gap and accomplish their goals. Finally, deduction graph is used to analyze the model.

AIT: A method for operating system kernel function call graph generation with a virtualization technique

  • Jiao, Longlong;Luo, Senlin;Liu, Wangtong;Pan, Limin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2084-2100
    • /
    • 2020
  • Operating system (OS) kernel function call graphs have been widely used in OS analysis and defense. However, most existing methods and tools for generating function call graphs are designed for application programs, and cannot be used for generating OS kernel function call graphs. This paper proposes a virtualization-based call graph generation method called Acquire in Trap (AIT). When target kernel functions are called, AIT dynamically initiates a system trap with the help of a virtualization technique. It then analyzes and records the calling relationships for trap handling by traversing the kernel stacks and the code space. Our experimental results show that the proposed method is feasible for both Linux and Windows OSs, including 32 and 64-bit versions, with high recall and precision rates. AIT is independent of the source code, compiler and OS kernel architecture, and is a universal method for generating OS kernel function call graphs.

A Low Power-Driven Data Path Optimization based on Minimizing Switching Activity (스위칭 동작 최소화를 통한 저전력 데이터 경로 최적화)

  • 임세진;조준동
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.4
    • /
    • pp.17-29
    • /
    • 1999
  • This paper presents a high level synthesis method targeting low power consumption for data-dominated CMOS circuits (e.g., DSP). The high level synthesis is divided into three basic tasks: scheduling, resource and register allocation. For lower power scheduling, we increase the possibility of reusing an input operand of functional units. For a scheduled data flow graph, a compatibility graph for register and resource allocation is formed, and then a special weighted network is then constructed from the compatibility graph and the minimum cost flow algorithm is performed on the network to obtain the minimum power consumption data path assignment. The formulated problem is then solved optimally in polynomial time. This method reduces both the switching activity and the capacitance in synthesized data path. Experimental results show 15% power reduction in benchmark circuits.

  • PDF

A Study on the Design and Implementation of System for Predicting Attack Target Based on Attack Graph (공격 그래프 기반의 공격 대상 예측 시스템 설계 및 구현에 대한 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.79-92
    • /
    • 2020
  • As the number of systems increases and the network size increases, automated attack prediction systems are urgently needed to respond to cyber attacks. In this study, we developed four types of information gathering sensors for collecting asset and vulnerability information, and developed technology to automatically generate attack graphs and predict attack targets. To improve performance, the attack graph generation method is divided into the reachability calculation process and the vulnerability assignment process. It always keeps up to date by starting calculations whenever asset and vulnerability information changes. In order to improve the accuracy of the attack target prediction, the degree of asset risk and the degree of asset reference are reflected. We refer to CVSS(Common Vulnerability Scoring System) for asset risk, and Google's PageRank algorithm for asset reference. The results of attack target prediction is displayed on the web screen and CyCOP(Cyber Common Operation Picture) to help both analysts and decision makers.