• Title/Summary/Keyword: Information Source Selection

Search Result 304, Processing Time 0.021 seconds

The Infrared Medium-deep Survey. VII. Optimal selection for faint quasars at z ~ 5 and preliminary results

  • Shin, Suhyun;Im, Myungshin;Kim, Yongjung;Hyun, Minhee
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.75.1-75.1
    • /
    • 2019
  • The universe has been ionized in the post-reionization by several photon contributors. The dominant source to produce the hydrogen ionizing photons is not revealed so far. Faint quasars have been expected to generate UV photon budgets required to maintain ionization state of universe. Observational limits, however, hinder to discover them despite their higher number density than bright one. Consequently, the influence of faint quasars on post-reionization are not considered sufficiently. Therefore, a survey to find faint quasars at z ~ 5 is crucial to determine the main ionizing source in the post-reionization era. Deep images from the Hyper Suprime-Cam Subaru Strategic Program (HSC SSP) allow us to search for quasar swith low luminosities in the ELAIS-N1 field. J band information are obtained by the Infrared Medium-deep Survey (IMS) and the UKIRT Infrared Deep Sky Survey (UKIDSS) - Deep ExtragalacticSurvey (DXS). Faint quasar candidates were selected from several multi-band color cut criteria based on simulated quasars on color-color diagram. To choose the reliable candidates with possible Lyman break, we have performed medium-bands observations. Whether a candidate is a quasar or a dwarf star contamination was decided by results from chi-square minimization of quasar/dwarf model fitting. Spectroscopic follow-up observations confirm three quasars at z ~ 5. 100% spectral confirmation success rate implies that the medium-band observations effectively select faint quasars with strong Lyman alpha emission.

  • PDF

Usability Testing of Open Source Software for Digital Archiving (디지털 아카이브 구축을 위한 공개 소프트웨어 사용성 평가)

  • Jeon, Kyungsun;Chang, Yunkeum
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.3
    • /
    • pp.247-271
    • /
    • 2018
  • This research aims to explore the possibility of open source software for creating digital archives of small organizations or ordinary people that run short of budget and professional workforce and may easily create digital archives without the help of a professional. To do so, this study suggested three open source software, AtoM, ArchivesSpace, and Omeka, for such use, and conducted usability tests with system designers and users who had no experience with open source software. The results of the usability testing was that AtoM, which was developed to support the records management system and user services of small organizations, proved satisfactory to both system designers and users. ArchivesSpace had too many required fields with it to create archives. Omeka greatly satisfied the system designers because it is possible to create archives with simple inputs on the item level. However, Omeka, which focuses on exhibition functions while neglecting search functions, registered low satisfaction among the users. Based on the results of the usability testing, this study suggested selection criteria of open source software for small organizations or ordinary individuals, namely, purposes, license, characteristics, service creation environment, advantages and disadvantages, functions, metadata, file type, and interoperability.

An Optimal Selection of Frame Skip and Spatial Quantization for Low Bit Rate Video Coding (저속 영상부호화를 위한 최적 프레임 율과 공간 양자화 결정)

  • Bu, So-Young;Lee, Byung-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6C
    • /
    • pp.842-847
    • /
    • 2004
  • We present a new video coding technique to tradeoff frame rate and picture quality for low bit rate video coding. We show a model equation for selecting the optimal frame rate from the motion content of the source video. We can determine DCT quantization parameter (QP) using the frame rate and bit rate. For objective video quality measurement we propose a simple and effective error measure for skipped frames. The proposed method enhances the video quality up to 2 ㏈ over the H.263 TMN5 encoder.

Half Load-Cycle Worked Dual SEPIC Single-Stage Inverter

  • Chen, Rong;Zhang, Jia-Sheng;Liu, Wei;Zheng, Chang-Ming
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.1
    • /
    • pp.143-149
    • /
    • 2016
  • The two-stage converter is widely used in traditional DC/AC inverter. It has several disadvantages such as complex topology, large volume and high loss. In order to overcome these shortcomings, a novel half load-cycle worked dual SEPIC single-stage inverter, which is based on the analysis of the relationship between input and output voltages of SEPIC converters operating in the discontinuous conduction mode (DCM), is presented in this paper. The traditional single-stage inverter has remarkable advantages in small and medium power applications, but it can’t realize boost DC/AC output directly. Besides one pre-boost DC/DC converter is needed between the DC source and the traditional single-stage inverter. A novel DC/AC inverter without pre-boost DC/DC converter, which is comprised of two SEPIC converters, is studied. The output of dual SEPIC converters is connected with anti-parallel and half load-cycle control is used to realize boost and buck DC/AC output directly and work properly, whatever the DC input voltage is higher or lower than the AC output voltage. The working principle, parameter selection and the control strategy of the inverters are analyzed in this paper. Simulation and experiment results verify the feasibility of the new inverter.

Suggestions on the Selection Method of Priority Monitoring Sites for Hazardous Air Pollutants in Megacities (유해대기오염물질 모니터링을 위한 대도시 우선순위 측정지점 선정기법 제안)

  • Kwon, Hye-Ok;Kim, Seong-Joon;Kim, Yong Pyo;Kim, Sang-Kyun;Hong, Ji-Hyung;Choi, Sung-Deuk
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.33 no.6
    • /
    • pp.544-553
    • /
    • 2017
  • There is an overall guideline of the installation of air quality monitoring stations in Korea, but specified steps for the selection of monitoring sites for hazardous air pollutants(HAPs) are not provided. In this study, we proposed a systematic method for the selection of monitoring sites for HAPs using geographic information system (GIS). As a case study, the Seoul metropolitan area (Seoul, Incheon, and Gyeonggi Province) was chosen, and 15 factors including population, vehicle registration, and emission data were compiled for each grid cell ($7km{\times}7km$). The number of factors above the top 30% of individual data for each grid cell was used to select priority monitoring sites for HAPs. In addition, several background sites were added for data comparison and source identification. Three scenarios were suggested: Scenario 1 with 7 sites, Scenario 2 with 17 sites, and Scenario 3 with 30 sites. This proposal is not the final result for an intensive monitoring program, but it is an example of method development for selecting appropriate sampling sites. These results can be applied not only to HAPs monitoring in megacities but also to the national HAPs monitoring network.

Candidate Path Selection Method for TCP Performance Improvement in Fixed Robust Routing

  • Fukushima, Yukinobu;Matsumura, Takashi;Urushibara, Kazutaka;Yokohira, Tokumi
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.6
    • /
    • pp.445-453
    • /
    • 2016
  • Fixed robust routing is attracting attention as routing that achieves high robustness against changes in traffic patterns without conducting traffic measurement and performing dynamic route changes. Fixed robust routing minimizes the worst-case maximum link load by distributing traffic of every source-destination (s-d) router pair onto multiple candidate paths (multipath routing). Multipath routing, however, can result in performance degradation of Transmission Control Protocol (TCP) because of frequent out-of-order packet arrivals. In this paper, we first investigate the influence of multipath routing on TCP performance under fixed robust routing with a simulation using ns-2. The simulation results clarify that TCP throughput greatly degrades with multipath routing. We next propose a candidate path selection method to improve TCP throughput while suppressing the worst-case maximum link load to less than the allowed level under fixed robust routing. The method selects a single candidate path for each of a predetermined ratio of s-d router pairs in order to avoid TCP performance degradation, and it selects multiple candidate paths for each of the other router pairs in order to suppress the worst-case maximum link load. Numerical examples show that, provided the worst-case maximum link load is less than 1.0, our proposed method achieves about six times the TCP throughput as the original fixed robust routing.

Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model

  • Kanti Singh Sangher;Archana Singh;Hari Mohan Pandey
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.99-109
    • /
    • 2023
  • The darknet is frequently referred to as the hub of illicit online activity. In order to keep track of real-time applications and activities taking place on Darknet, traffic on that network must be analysed. It is without a doubt important to recognise network traffic tied to an unused Internet address in order to spot and investigate malicious online activity. Any observed network traffic is the result of mis-configuration from faked source addresses and another methods that monitor the unused space address because there are no genuine devices or hosts in an unused address block. Digital systems can now detect and identify darknet activity on their own thanks to recent advances in artificial intelligence. In this paper, offer a generalised method for deep learning-based detection and classification of darknet traffic. Furthermore, analyse a cutting-edge complicated dataset that contains a lot of information about darknet traffic. Next, examine various feature selection strategies to choose a best attribute for detecting and classifying darknet traffic. For the purpose of identifying threats using network properties acquired from darknet traffic, devised a hybrid deep learning (DL) approach that combines Recurrent Neural Network (RNN) and Bidirectional LSTM (BiLSTM). This probing technique can tell malicious traffic from legitimate traffic. The results show that the suggested strategy works better than the existing ways by producing the highest level of accuracy for categorising darknet traffic using the Black widow optimization algorithm as a feature selection approach and RNN-BiLSTM as a recognition model.

Time Delay Estimation Using LASSO (Least Absolute Selection and Shrinkage Operator) (LASSO를 사용한 시간 지연 추정 알고리즘)

  • Lim, Jun-Seok;Pyeon, Yong-Guk;Choi, Seok-Im
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.10
    • /
    • pp.715-721
    • /
    • 2014
  • In decades, many researchers have studied the time delay estimation (TDE) method for the signals in the two different receivers. The channel estimation based TDE is one of the typical TDE methods. The channel estimation based TDE models the time delay between two receiving signals as an impulse response in a channel between two receivers. In general the impulse response becomes sparse. However, most conventional TDE algorithms cannot have utilized the sparsity. In this paper, we propose a TDE method taking the sparsity into consideration. The performance comparison shows that the proposed algorithm improves the estimation accuracy by 10 dB in the white gaussian source. In addition, even in the colored source, the proposed algorithm doesn't show the estimation threshold effect.

Authorship Attribution Framework Using Survival Network Concept : Semantic Features and Tolerances (서바이벌 네트워크 개념을 이용한 저자 식별 프레임워크: 의미론적 특징과 특징 허용 범위)

  • Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1013-1021
    • /
    • 2020
  • Malware Authorship Attribution is a research field for identifying malware by comparing the author characteristics of unknown malware with the characteristics of known malware authors. The authorship attribution method using binaries has the advantage that it is easy to collect and analyze targeted malicious codes, but the scope of using features is limited compared to the method using source code. This limitation has the disadvantage that accuracy decreases for a large number of authors. This study proposes a method of 'Defining semantic features from binaries' and 'Defining allowable ranges for redundant features using the concept of survival network' to complement the limitations in the identification of binary authors. The proposed method defines Opcode-based graph features from binary information, and defines the allowable range for selecting unique features for each author using the concept of a survival network. Through this, it was possible to define the feature definition and feature selection method for each author as a single technology, and through the experiment, it was confirmed that it was possible to derive the same level of accuracy as the source code-based analysis with an improvement of 5.0% accuracy compared to the previous study.

A Study on the Structural Efficiency Evaluation of Naval Weapon Systems through DEA Method (DEA기법을 이용한 함정무기체계의 구조적 효율성 평가방안 연구)

  • You, Youn-Jin;Choi, Seok-Cheol
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.3
    • /
    • pp.1-13
    • /
    • 2010
  • DEA method has been widely applied on civilian and defense side for efficiency analysis of organizations and programs(project). For many years Defense Industry, military hospital and military construction parts have been analyzed by using DEA method. In this paper we review and propose a method of warship evaluation through DEA method. The evaluation method proposed above can provide plenty of proper information for ROC decision, AOA and source selection on weapon acquisition.