• Title/Summary/Keyword: Missed Approach

Search Result 41, Processing Time 0.03 seconds

The analysis of flight data of B747-400 aircraft with Missed Approach (B747-400 항공기의 Missed Approach 비행자료 분석)

  • Shin, D.W.;Park, J.H.;Eun, H.B.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.11 no.2
    • /
    • pp.93-107
    • /
    • 2003
  • This study is performed to secure the safety of civil aviation by establishing systematic analysis ability of Flight Data Recorder. Through this study, readouting UFDR(Universal Flight Data Recorder) to personal computer, flight data numerical analysis and regulations of Missed Approach. In the analysis, the flight data of B747-400 model aircraft with Missed Approach in San Francisco(KSFO) was selected.

  • PDF

A Study on an Application of the Protection for the Visual Segment of the Approach Procedure focused on Taean Airport (접근절차의 시계구간 보호 적용 연구 - 태안비행장을 중심으로 -)

  • Kim, Dohyun;Hong, Seung Beom
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.22 no.2
    • /
    • pp.9-15
    • /
    • 2014
  • 'Visual segment surface' means a surface that extends from the missed approach point of non precision approaches (or the decision altitude location for approaches with vertical guidance and precision approaches) to the threshold to facilitate the identification of and protection from obstacles in this visual segment of the approach. Validation is the necessary final quality assurance step in the procedure design process, prior to publication. The purpose of validation is the verification of all obstacle and navigation data, and assessment of flyability of the procedure. This paper shows how to apply the protection for the visual segment of the approach procedure, and the results of the validation for visual segment surface conducted at an airport.

An Implementation Architecture for Knowledge Flow Model (지식 흐름 모델의 구현 아키텍처에 관한 연구)

  • Kim, Su-Yeon;Hwang, Hyun-Seok
    • Knowledge Management Research
    • /
    • v.7 no.2
    • /
    • pp.53-68
    • /
    • 2006
  • Knowledge has become an important resource for organization. The manufacturing industry is usually operated on the basis of business processes, and most workers are familiar with their own processes. The process-based approach, therefore, can provide an efficient way to capture and navigate knowledge. In this study, we focus on knowledge which may be missed during knowledge transfer among workers. For this, we propose a method for analyzing knowledge flow, which is passed among business processes. We propose a process-based knowledge management framework for analyzing knowledge flow, which employs a two-phase analysis: process analysis and knowledge flow analysis. A knowledge flow model, represented by Knowledge Flow Diagram, is proposed as a tool for representing knowledge. We formulate several semantics for knowledge flow modeling. We build the three-level schema: conceptual, logical, and physical in order to automate the knowledge model adaptive to knowledge management systems. The proposed approach is verified and illustrated through a case study on the manufacturing process of A Company.

  • PDF

An Improved Multi-resolution image fusion framework using image enhancement technique

  • Jhee, Hojin;Jang, Chulhee;Jin, Sanghun;Hong, Yonghee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.69-77
    • /
    • 2017
  • This paper represents a novel framework for multi-scale image fusion. Multi-scale Kalman Smoothing (MKS) algorithm with quad-tree structure can provide a powerful multi-resolution image fusion scheme by employing Markov property. In general, such approach provides outstanding image fusion performance in terms of accuracy and efficiency, however, quad-tree based method is often limited to be applied in certain applications due to its stair-like covariance structure, resulting in unrealistic blocky artifacts at the fusion result where finest scale data are void or missed. To mitigate this structural artifact, in this paper, a new scheme of multi-scale fusion framework is proposed. By employing Super Resolution (SR) technique on MKS algorithm, fine resolved measurement is generated and blended through the tree structure such that missed detail information at data missing region in fine scale image is properly inferred and the blocky artifact can be successfully suppressed at fusion result. Simulation results show that the proposed method provides significantly improved fusion results in the senses of both Root Mean Square Error (RMSE) performance and visual improvement over conventional MKS algorithm.

A Study on Methodology for Automated Contingency and Remedial Action Analysis based on Practical Approach: Development of Automated Scheduled Outage Analysis Tool (실용적 접근 기반의 전력계통 해석 프로그램 상정고장, 해소방안 자동화 기법: 휴전검토 자동화 툴 개발)

  • Song, Jiyoung;Ko, Baekkyung;Shin, Jeonghoon;Han, Sangwook;Nam, Suchul;Lee, Jaegul;Kim, Taekyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.9
    • /
    • pp.1171-1179
    • /
    • 2014
  • ISO(Independent System Operator) or TSO(Transmission System Operator) use power system analysis program to simulate contingency analysis and remedial actions to operate power system stably. Generally, power system analysis program provides automated analysis functions(or modules) to deal with wide area power system. However, because of missed contingency cases, automated contingency analysis has no practical use or has limitation. And in case of remedial action, it doesn't support automated function or takes a lot of times to study, because of simulation in manual for each cases. This paper suggests that new relation with buses and transmission line properties of power system DB used for power system analysis program to simulate automated contingency including all contingency cases needed in the field without missed cases. And it proposes automated remedial action scheme based on practical approach analysis to alleviate overloading or voltage problems. Finally it deals with automated contingency/remedial action analysis(automated scheduled outage) program which is developed by KEPCO and its performance and proposed schemes are proven by case study for real Korean power system data.

Interdisciplinary approach in esthetic dentistry (심미치과에 있어서의 Interdisciplinary approach)

  • Kim, II-Young
    • Journal of the Korean Academy of Esthetic Dentistry
    • /
    • v.9 no.1
    • /
    • pp.38-41
    • /
    • 2000
  • There are clinical cases that always give us trouble in our daily practice. But, those kind of difficulties may be from our intradisciplinary approach not from interdisciplinary approach. Many dentists are getting good results from interdisciplinary treatments, involving periodontics, operative dentistry and prosthodontics. But, the orthodontics is the discipline can't be missed to the dentists trying to esthetic treatment. Here, I'd like to share the following cases because I couldn't get esthetic outcomes if there was no orthodontic involvement, with periodontics, operative dentistry and prosthodontics.

  • PDF

Escape Analysis for Stack Allocation in Java (자바 객체의 스택 저장 가능성 판별을 위한 정적 분석 기법)

  • 조은선
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.6
    • /
    • pp.840-848
    • /
    • 2004
  • Garbage collecting objects in Java makes memory management easier for the programmer, but it is time consuming. Stack allocation may be an alternative which identifies stack-allocatable objects before the execution, without performance degradation. We suggest an escaping analysis recording the interprocedural movement of the method, to detect an object the method of whose creation may have been already deactivated during the access. Our approach is different from prior works, enables us to handle some cases that are missed in the previous variable - oriented approach.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

Unified Psycholinguistic Framework: An Unobtrusive Psychological Analysis Approach Towards Insider Threat Prevention and Detection

  • Tan, Sang-Sang;Na, Jin-Cheon;Duraisamy, Santhiya
    • Journal of Information Science Theory and Practice
    • /
    • v.7 no.1
    • /
    • pp.52-71
    • /
    • 2019
  • An insider threat is a threat that comes from people within the organization being attacked. It can be described as a function of the motivation, opportunity, and capability of the insider. Compared to managing the dimensions of opportunity and capability, assessing one's motivation in committing malicious acts poses more challenges to organizations because it usually involves a more obtrusive process of psychological examination. The existing body of research in psycholinguistics suggests that automated text analysis of electronic communications can be an alternative for predicting and detecting insider threat through unobtrusive behavior monitoring. However, a major challenge in employing this approach is that it is difficult to minimize the risk of missing any potential threat while maintaining an acceptable false alarm rate. To deal with the trade-off between the risk of missed catches and the false alarm rate, we propose a unified psycholinguistic framework that consolidates multiple text analyzers to carry out sentiment analysis, emotion analysis, and topic modeling on electronic communications for unobtrusive psychological assessment. The user scenarios presented in this paper demonstrated how the trade-off issue can be attenuated with different text analyzers working collaboratively to provide more comprehensive summaries of users' psychological states.

An Online Response System for Anomaly Traffic by Incremental Mining with Genetic Optimization

  • Su, Ming-Yang;Yeh, Sheng-Cheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.375-381
    • /
    • 2010
  • A flooding attack, such as DoS or Worm, can be easily created or even downloaded from the Internet, thus, it is one of the main threats to servers on the Internet. This paper presents an online real-time network response system, which can determine whether a LAN is suffering from a flooding attack within a very short time unit. The detection engine of the system is based on the incremental mining of fuzzy association rules from network packets, in which membership functions of fuzzy variables are optimized by a genetic algorithm. The incremental mining approach makes the system suitable for detecting, and thus, responding to an attack in real-time. This system is evaluated by 47 flooding attacks, only one of which is missed, with no false positives occurring. The proposed online system belongs to anomaly detection, not misuse detection. Moreover, a mechanism for dynamic firewall updating is embedded in the proposed system for the function of eliminating suspicious connections when necessary.