• 제목/요약/키워드: Li extraction

검색결과 358건 처리시간 0.031초

Design and Implementation of System for Estimating Diameter at Breast Height and Tree Height using LiDAR point cloud data

  • Jong-Su, Yim;Dong-Hyeon, Kim;Chi-Ung, Ko;Dong-Geun, Kim;Hyung-Ju, Cho
    • 한국컴퓨터정보학회논문지
    • /
    • 제28권2호
    • /
    • pp.99-110
    • /
    • 2023
  • 논문은 LiDAR 점군 데이터를 사용하여 흉고 직경과 수고를 예측하는 ForestLi 시스템을 제안한다. ForestLi 시스템이 LiDAR 점군 데이터를 처리하는 과정은 다음과 같이 여러 단계로 진행된다. 다운샘플링, 이상점 제거, 지표면 분할, 지표면 정규화, 수간 추출, 개체목 분할, 흉고 직경 측정, 수고 측정. LiDAR 점군 데이터를 처리하는 상용 시스템 LiDAR360은 하측 식생과 개체목 분할 오류를 사용자가 직접 수정해야 한다. ForestLi 시스템은 하측 식생에 해당하는 LiDAR 점군 데이터를 자동으로 제거한다. 결과적으로 ForestLi 시스템이 LiDAR360보다 전체 수행시간을 줄이고, 흉고 직경과 수고 예측의 정확성을 높였다. 실험을 통해서 제안된 ForestLi가 LiDAR360 시스템보다 흉고 직경과 수고 측정의 정확성과 전체 실행시간 측면에서 우수하다는 것을 보여주었다.

Integration of Headspace Solid Phase Micro-Extraction with Gas Chromatography for Quantitative Analysis of Formaldehyde

  • Lo, Kong Mun;Yung, Yen Li
    • Bulletin of the Korean Chemical Society
    • /
    • 제34권1호
    • /
    • pp.139-142
    • /
    • 2013
  • A study was carried out to evaluate the solid phase micro-extraction (SPME) for formaldehyde emission analysis of uncoated plywood. In SPME, formaldehyde was on-fiber derivatized through headspace extraction and analyzed by gas chromatography coupled with mass spectrometry (GC/MS). The SPME was compared with desiccators (DC-JAS 233), small-scale chamber (SSC-ASTM D6007) and liquid-liquid extraction (LLE-EPA 556) methods which were performed in accordance with their respective standards. Compared to SSC (RSD 4.3%) and LLE (RSD 5.0%), the SPME method showed better repeatability (RSD 1.8%) and not much difference from DC (RSD 1.4%). The SPME has proven to be highly precise (at 95% confidence level) with better recovery (REC 102%). Validation of the SPME method for formaldehyde quantitative analysis was evidenced. In addition, the SPME by air sampling directly from plywood specimens (SPME-W) correlated best with DC ($r^2$ = 0.983), followed by LLE ($r^2$ = 0.950) and SSC ($r^2$ = 0.935).

UFKLDA: An unsupervised feature extraction algorithm for anomaly detection under cloud environment

  • Wang, GuiPing;Yang, JianXi;Li, Ren
    • ETRI Journal
    • /
    • 제41권5호
    • /
    • pp.684-695
    • /
    • 2019
  • In a cloud environment, performance degradation, or even downtime, of virtual machines (VMs) usually appears gradually along with anomalous states of VMs. To better characterize the state of a VM, all possible performance metrics are collected. For such high-dimensional datasets, this article proposes a feature extraction algorithm based on unsupervised fuzzy linear discriminant analysis with kernel (UFKLDA). By introducing the kernel method, UFKLDA can not only effectively deal with non-Gaussian datasets but also implement nonlinear feature extraction. Two sets of experiments were undertaken. In discriminability experiments, this article introduces quantitative criteria to measure discriminability among all classes of samples. The results show that UFKLDA improves discriminability compared with other popular feature extraction algorithms. In detection accuracy experiments, this article computes accuracy measures of an anomaly detection algorithm (i.e., C-SVM) on the original performance metrics and extracted features. The results show that anomaly detection with features extracted by UFKLDA improves the accuracy of detection in terms of sensitivity and specificity.

도로의 차량 인식을 위한 LiDAR 자료 적용연구 (Utilizing LiDAR Data to Vehicle Recognition on the Road)

  • 최연웅;이근상;조기성
    • 한국지리정보학회지
    • /
    • 제10권4호
    • /
    • pp.179-188
    • /
    • 2007
  • 차량 인식의 문제는 교통관리나 차량검색 등의 분야에서 자동차가 포함하고 있는 중요한 정보를 얻기 위해 필수적으로 수행해야 하는 과정이다. 본 연구는 LiDAR 자료를 교통정보 추출에 활용하기 위한 기초 연구로써 LiDAR 자료로부터 도로포인트를 추출하고 이중 도로 상의 차량을 분류하기 위한 알고리즘을 제시하고 인식된 차량의 크기를 추정하기 위한 알고리즘을 제시하였으며 광범위한 지역에서 LiDAR 자료를 이용하여 도로상의 차량 댓수를 파악하고 크기를 추정하였다.

  • PDF

Buffer Growing Method for Road Points Extraction from LiDAR Data

  • Jiangtao Li;Hyo Jong Lee;Gi Sung Cho
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2008년도 추계학술발표대회
    • /
    • pp.656-657
    • /
    • 2008
  • Light Detection and Ranging (LiDAR) data has been used to detect the objects of earth surface from huge point clouds gotten from the laser scanning system equipped on airplane. According to the precision of 3~5 points per square meter, objects like buildings, cars and roads can be easily described and constructed. Many various areas, such as hydrological modeling and urban planning adopt this kind of significant data. Researchers have been engaging in finding accurate road networks from LiDAR data recent years. In this paper, A novel algorithm with regard to extracting road points from LiDAR data has been developed based on the continuity and structural characteristics of road networks.

Li-K-Cd 합금을 이용한 LiCl-KCl 용융염에서 금속염화물의 제거 (Use of Li-K-Cd Alloy to Remove MCl3 in LiCl-KCl Eutectic Salt)

  • 김가영;김택진;장준혁;김시형;이창화;이성재
    • 방사성폐기물학회지
    • /
    • 제16권3호
    • /
    • pp.309-313
    • /
    • 2018
  • Li-Cd 합금을 이용한 환원추출방식을 LiCl-KCl 기반의 drawdown 공정에 적용하게 되면, LiCl-KCl 공융염의 조성이 파괴되므로 공정온도를 높여야 하며, 전해정련 및 전해제련과 같은 공정에 LiCl-KCl 용융염을 재사용할 수 없게 된다. 따라서, 본 연구에서는 공융염 조성에 적합한 Li-K-Cd 합금을 제조하였으며, 이를 이용하여 U와 Nd가 포함된 LiCl-KCl 염에 투입하여 용융염 내 $UCl_3$의 제거가 가능한지 평가하였다.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

The Separation and Recovery of Nickel and Lithium from the Sulfate Leach Liquor of Spent Lithium Ion Batteries using PC-88A

  • Nguyen, Viet Tu;Lee, Jae-Chun;Jeong, Jinki;Kim, Byung-Su;Pandey, B.D.
    • Korean Chemical Engineering Research
    • /
    • 제53권2호
    • /
    • pp.137-144
    • /
    • 2015
  • The present paper deals with the extractive separation and selective recovery of nickel and lithium from the sulfate leachate of cathode scrap generated during the manufacture of LIBs. The conditions for extraction, scrubbing and stripping of nickel from lithium were optimized with an aqueous feed containing $2.54kg{\cdot}m^{-3}$ Ni and $4.82kg{\cdot}m^{-3}$ Li using PC-88A. Over 99.6% nickel was extracted with $0.15kmol{\cdot}m^{-3}$ PC-88A in two counter-current stages at O/A=1 and pH=6.5. Effective scrubbing Li from loaded organic was systematically studied with a dilute $Na_2CO_3$ solution ($0.10kmol{\cdot}m^{-3}$). The McCabe-Thiele diagram suggests two counter-current scrubbing stages are required at O/A=2/3 to yield lithium-scrubbing efficiency of 99.6%. The proposed process showed advantages of simplicity, and high purity (99.9%) nickel sulfate recovery along with lithium to ensure the complete recycling of the waste from LIBs manufacturing process.

Effects of Fe layer on Li insertion/extraction Reactions of Fe/Si Multilayer thin Film Anodes for Lithium Rechargeable Batteries

  • Kim, Tae-Yeon;Kim, Jae-Bum;Ahn, Hyo-Jun;Lee, Sung-Man
    • Journal of Electrochemical Science and Technology
    • /
    • 제2권4호
    • /
    • pp.193-197
    • /
    • 2011
  • The influences of the thickness and microstructure of Fe layer on the electrochemical performances of Fe/Si multilayer thin film anodes were investigated. The Fe/Si multilayer films were prepared by electron beam evaporation, in which Fe layer was deposited with/without simultaneous bombardment of Ar ion. The kinetics of Li insertion/extraction reactions in the early stage are slowed down with increasing the thickness of Fe layer, but such a slowdown seems to be negligible for thin Fe layers less than about $500{\AA}$. When the Fe layer was deposited with ion bombardment, even the $300{\AA}$ thick Fe layer significantly suppress Li diffusion through the Fe layer. This is attributed to the dense microstructure of Fe layer, induced by ion beam assisted deposition (IBAD). It appears that the Fe/Si multilayer films prepared with IBAD show good cyclability compared to the film deposited without IBAD.

퍼지추출 기술을 활용한 스마트 카드 기반 패스워드 인증 스킴 (Smart Card Based Password Authentication Scheme using Fuzzy Extraction Technology)

  • 최윤성
    • 디지털산업정보학회논문지
    • /
    • 제14권4호
    • /
    • pp.125-134
    • /
    • 2018
  • Lamport firstly suggested password base authentication scheme and then, similar authentication schemes have been studied. Due to the development of Internet network technology, remote user authentication using smart card has been studied. Li et al. analyzed authentication scheme of Chen et al. and then, Li et al. found out the security weakness of Chen et al.'s scheme such forward secrecy and the wrong password login problem, and proposed an a new smart card based user password authentication scheme. But Liu et al. found out that Li et al.'s scheme still had security problems such an insider attack and man-in-the-middle attack and then Liu et al. proposed an efficient and secure smart card based password authentication scheme. This paper analyzed Liu et al.'s authentication and found out that Liu et al.'s authentication has security weakness such as no perfect forward secrecy, off-line password guessing attack, smart-card loss attack, and no anonymity. And then, this paper proposed security enhanced efficient smart card based password authentication scheme using fuzzy extraction technology.