• Title/Summary/Keyword: Metric

Search Result 2,899, Processing Time 0.031 seconds

Scalar Perturbation and Stability of a New Wormhole in Einstein-Born-Infeld Gravity (아인슈타인-본-인펠트 중력 이론에서 새로운 웜홀의 스칼라장 섭동과 안정성)

  • Kim, Jin Young
    • New Physics: Sae Mulli
    • /
    • v.68 no.11
    • /
    • pp.1262-1267
    • /
    • 2018
  • We introduce a new method to construct wormholes without adopting exotic matters in Einstein-Born-Infeld gravity with a negative cosmological constant. Contrary to the conventional method, the throat of the wormhole is located at the point where the metric solutions are joined smoothly. Thus, exotic matters are not needed to sustain the throat. We consider the behavior of a minimally coupled scalar field to study the stability of the new wormhole. If we define the quasinormal mode of the scalar field as the purely ingoing flux at the throat of the wormhole, the stability of wormhole can be discussed in analogy with the argument that we use for the stability of a black hole. Because an analytic solution can not be found, we suggest a formalism to find quasinormal modes numerically. The crucial difference from the black hole case is that the coefficient of the second-order derivative term of the radial equation is expanded from n = -1, which is contrary to the black hole case where it is expanded from n = 0.

Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis (시스템 취약점 분석을 통한 침투 경로 예측 자동화 기법)

  • Kim, Ji Hong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1079-1090
    • /
    • 2012
  • As the number of information asset and their vulnerabilities are increasing, it becomes more difficult for network security administrators to assess security vulnerability of their system and network. There are several researches for vulnerability analysis based on quantitative approach. However, most of them are based on experts' subjective evaluation or they require a lot of manual input for deriving quantitative assessment results. In this paper, we propose HRMS(Hacking and Response Measurement System) for enumerating attack path using automated vulnerability measurement automatically. HRMS can estimate exploitability of systems or applications based on their known vulnerability assessment metric, and enumerate attack path even though system, network and application's information are not fully given for vulnerability assessment. With this proposed method, system administrators can do proactive security vulnerability assessment.

Fast Sampling Set Selection Algorithm for Arbitrary Graph Signals (임의의 그래프신호를 위한 고속 샘플링 집합 선택 알고리즘)

  • Kim, Yoon-Hak
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1023-1030
    • /
    • 2020
  • We address the sampling set selection problem for arbitrary graph signals such that the original graph signal is reconstructed from the signal values on the nodes in the sampling set. We introduce a variation difference as a new indirect metric that measures the error of signal variations caused by sampling process without resorting to the eigen-decomposition which requires a huge computational cost. Instead of directly minimizing the reconstruction error, we propose a simple and fast greedy selection algorithm that minimizes the variation differences at each iteration and justify the proposed reasoning by showing that the principle used in the proposed process is similar to that in the previous novel technique. We run experiments to show that the proposed method yields a competitive reconstruction performance with a substantially reduced complexity for various graphs as compared with the previous selection methods.

Effect of geography and altitude on the community characteristics of epigeic spiders in rice field levees (지형 및 고도에 따른 토양성 논거미 군집특성)

  • Eo, Jinu;Kim, Myung-Hyun;Kim, Min-Kyeong;Choi, Soon-Kun
    • Korean Journal of Environmental Biology
    • /
    • v.38 no.4
    • /
    • pp.594-602
    • /
    • 2020
  • This study investigated the effect of geography and altitude on epigeic spider communities in rice field levees in Jeollabuk-do. Spider communities in the mountainous and plain areas were compared to determine the effect of geography on the cultivation periods. The effect of altitude was compared between the Jeongeup and Jangsu areas during non-cultivation periods. Analysis using nMDS (non-metric multidimensional scaling), MRPP (multiple response permutation procedure), and ANOSIM (analysis of similarity) revealed differences in spider community structures between the two types of study areas. Lycosidae predominated at the family level, and its abundance was greater in the mountainous area than in the plains area. The total abundance did not differ between the two areas with different altitudes, but the abundance of three Pardosa species was greater at lower altitudes than at higher altitudes. Geography and altitude had a minimal effect on species richness and diversity indices at the community level. However, several Lycosidae species showed species-specific responses to both geography and altitude in the rice fields.

Stability Analysis of a Stereo-Camera for Close-range Photogrammetry (근거리 사진측량을 위한 스테레오 카메라의 안정성 분석)

  • Kim, Eui Myoung;Choi, In Ha
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.3
    • /
    • pp.123-132
    • /
    • 2021
  • To determine 3D(three-dimensional) positions using a stereo-camera in close-range photogrammetry, camera calibration to determine not only the interior orientation parameters of each camera but also the relative orientation parameters between the cameras must be preceded. As time passes after performing camera calibration, in the case of non-metric cameras, the interior and relative orientation parameters may change due to internal instability or external factors. In this study, to evaluate the stability of the stereo-camera, not only the stability of two single cameras and a stereo-camera were analyzed, but also the three-dimensional position accuracy was evaluated using checkpoints. As a result of evaluating the stability of two single cameras through three camera calibration experiments over four months, the root mean square error was ±0.001mm, and the root mean square error of the stereo-camera was ±0.012mm ~ ±0.025mm, respectively. In addition, as the results of distance accuracy using the checkpoint were ±1mm, the interior and relative orientation parameters of the stereo-camera were considered stable over that period.

Object detection in financial reporting documents for subsequent recognition

  • Sokerin, Petr;Volkova, Alla;Kushnarev, Kirill
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.1-11
    • /
    • 2021
  • Document page segmentation is an important step in building a quality optical character recognition module. The study examined already existing work on the topic of page segmentation and focused on the development of a segmentation model that has greater functional significance for application in an organization, as well as broad capabilities for managing the quality of the model. The main problems of document segmentation were highlighted, which include a complex background of intersecting objects. As classes for detection, not only classic text, table and figure were selected, but also additional types, such as signature, logo and table without borders (or with partially missing borders). This made it possible to pose a non-trivial task of detecting non-standard document elements. The authors compared existing neural network architectures for object detection based on published research data. The most suitable architecture was RetinaNet. To ensure the possibility of quality control of the model, a method based on neural network modeling using the RetinaNet architecture is proposed. During the study, several models were built, the quality of which was assessed on the test sample using the Mean average Precision metric. The best result among the constructed algorithms was shown by a model that includes four neural networks: the focus of the first neural network on detecting tables and tables without borders, the second - seals and signatures, the third - pictures and logos, and the fourth - text. As a result of the analysis, it was revealed that the approach based on four neural networks showed the best results in accordance with the objectives of the study on the test sample in the context of most classes of detection. The method proposed in the article can be used to recognize other objects. A promising direction in which the analysis can be continued is the segmentation of tables; the areas of the table that differ in function will act as classes: heading, cell with a name, cell with data, empty cell.

Risk Analysis of Aircraft Operations in Seoul TMA Based on DAA Well Clear Metrics using Recorded ADS-B Data (ADS-B 데이터를 이용한 서울 TMA에서의 DAA Well Clear 기반 위험도 분석)

  • Lee, Hak-Tae;Lee, Hyeonwoong
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.527-532
    • /
    • 2020
  • Seoul terminal maneuvering area (TMA) that includes Incheon International Airport (ICN) and Gimpo International Airport is a very congested airspace with around 1,000 daily flights and the airspace blocked at the boundary between Incheon flight information region (FIR) and Pyongyang FIR. Consequently, with frequency radar vectorings, separation assurance in this airspace is complicated thus resulting in higher controller workload. In this paper, the conflict and collision risks in Seoul TMA are analyzed using recorded ADS-B data for past three years. Using the recorded trajectories, original flight plan procesures and routes are reconstructed and the risks are quantified using detect and avoid well clear (DWC) metric that is developed for large unmanned aircraft system. The region west of ICN was found to be the highest risk area regardless of the runway directions. In addition, merge and crossing points between procedures displayed relatively high risks.

Meat Value Chain Losses in Iran

  • Ranaei, Vahid;Pilevar, Zahra;Esfandiari, Changiz;Khaneghah, Amin Mousavi;Dhakal, Rajan;Vargas-Bello-Perez, Einar;Hosseini, Hedayat
    • Food Science of Animal Resources
    • /
    • v.41 no.1
    • /
    • pp.16-33
    • /
    • 2021
  • To stop hunger, reducing food losses is a potential movement towards saving food. A large portion of these losses could be avoided and reduced through the improved food chain in many countries. Raising awareness on how and where food losses occur will help recovering foods such as meat by identifying solutions and convincing people to implement those solutions. This, in turn, will lead to private and public efforts to recover meat that might be otherwise wasted. After highlighting the importance of food saving benefits and relevant statistics, this paper explains the possible ways to reduce meat loss and waste in abattoirs and presents a framework for prevention according to the estimates of meat losses in Iran meat supply. The current article answers the questions of where do we have the meat loss in Iran and what approaches are most successful in reducing losses in the meat industry. The national average loss and waste in meat production are about 300,000 metric tonnes (about 15%). Many segments and players are involved with this huge amount of losses in the meat value chain, a large portion of these losses could be avoided and reduced by about 25% through using by-products with the mechanization of design and manufacturing. The production amount of mechanically deboned meat (MDM) is 105,091,000 kg, concluding the major waste (88.33%) of total poultry losses. Ensuring appropriate actions by exploiting the full potential of engaged Iranian associations and institutes is considered to reduce the losses.

Risk Analysis of Flight Procedures at Incheon International Airport and Gimpo International Airport (인천국제공항과 김포국제공항의 비행 절차 위험도 분석)

  • Lee, Hyeonwoong;Lee, Hak-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.500-507
    • /
    • 2020
  • This paper presents a risk assessment methodology for standard flight procedures using recorded automatic dependent surveillance-broadcast (ADS-B) data. Utilizing the proposed methodology, the results of risk analyses in RKSI (incheon international airport) and RKSS (gimpo international airport) using trajectories that are regenerated based on 100 days of ADS-B data are presented. For the risk metric, detect and avoid well clear (DWC) is used. With this index, each procedure was evaluated for the sections with highest level of risk. Among the standard instrument departure (SID) of RKSI, the section between SI712 and RANOS of RNAV BOPTA 1L showed the highest level of risk. For the standard terminal arrival route (STAR) of RKSI, section between SI947 and DANAN of RNAV GUKDO 1N wasthe one with the highest level of risk. For RKSS, the segment between SS726 and SS727 of RNAV BULTI 1X and the segment between KAKSO and KALMA of RNAV OLMEN 1D showed the highest level of risk among the SIDs and STARs, respectivly.

Analysis technique to support personalized English education based on contents (맞춤형 영어 교육을 지원하기 위한 콘텐츠 기반 분석 기법)

  • Jung, Woosung;Lee, Eunjoo
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.55-65
    • /
    • 2022
  • As Internet and mobile technology is developing, the educational environment is changing from the traditional passive way into an active one driven by learners. It is important to construct the proper learner's profile for personalized education where learners are able to study according to their learning levels. The existing studies on ICT-based personalized education have mostly focused on vocabulary and learning contents. In this paper, learning profile is constructed with not only vocabulary but grammar to define a learner's learning status in more detailed way. A proficiency metric is defined which shows how a learner is accustomed to the learning contents. The simulational results present the suggested approach is effective to the evaluation essay data with each learner's proficiency that is determined after pre-learning process. Additionally, the proposed analysis technique enables to provide statistics or graphs of the learner's status and necessary data for the learner's learning contents.