• Title/Summary/Keyword: Pattern damage

Search Result 782, Processing Time 0.028 seconds

A Study on the Design of Prediction Model for Safety Evaluation of Partial Discharge (부분 방전의 안전도 평가를 위한 예측 모델 설계)

  • Lee, Su-Il;Ko, Dae-Sik
    • Journal of Platform Technology
    • /
    • v.8 no.3
    • /
    • pp.10-21
    • /
    • 2020
  • Partial discharge occurs a lot in high-voltage power equipment such as switchgear, transformers, and switch gears. Partial discharge shortens the life of the insulator and causes insulation breakdown, resulting in large-scale damage such as a power outage. There are several types of partial discharge that occur inside the product and the surface. In this paper, we design a predictive model that can predict the pattern and probability of occurrence of partial discharge. In order to analyze the designed model, learning data for each type of partial discharge was collected through the UHF sensor by using a simulator that generates partial discharge. The predictive model designed in this paper was designed based on CNN during deep learning, and the model was verified through learning. To learn about the designed model, 5000 training data were created, and the form of training data was used as input data for the model by pre-processing the 3D raw data input from the UHF sensor as 2D data. As a result of the experiment, it was found that the accuracy of the model designed through learning has an accuracy of 0.9972. It was found that the accuracy of the proposed model was higher in the case of learning by making the data into a two-dimensional image and learning it in the form of a grayscale image.

  • PDF

Predicting Habitat Suitability of Carnivorous Alert Alien Freshwater Fish (포식성 유입주의 어류에 대한 서식처 적합도 평가)

  • Taeyong, Shim;Zhonghyun, Kim;Jinho, Jung
    • Ecology and Resilient Infrastructure
    • /
    • v.10 no.1
    • /
    • pp.11-19
    • /
    • 2023
  • Alien species are known to threaten regional biodiversity globally, which has increased global interest regarding introduction of alien species. The Ministry of Environment of Korea designated species that have not yet been introduced into the country with potential threat as alert alien species to prevent damage to the ecosystem. In this study, potential habitats of Esox lucius and Maccullochella peelii, which are predatory and designated as alert alien fish, were predicted on a national basis. Habitat suitability was evaluated using EHSM (Ecological Habitat Suitability Model), and water temperature data were input to calculate Physiological Habitat Suitability (PHS). The prediction results have shown that PHS of the two fishes were mainly controlled by heat or cold stress, which resulted in biased habitat distribution. E. lucius was predicted to prefer the basins at high latitudes (Han and Geum River), while M. peelii preferred metropolitan areas. Through these differences, it was expected that the invasion pattern of each alien fish can be different due to thermal preference. Further studies are required to enhance the model's predictive power, and future predictions under climate change scenarios are required to aid establishing sustainable management plans.

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

Volcanological Interpretation of Historic Record of AD 79 Vesuvius eruption (베수비오 화산의 79년 분화 기록에 대한 화산학적 해석)

  • Eun Jeong Yang;Sung-Hyo Yun
    • Journal of the Korean earth science society
    • /
    • v.44 no.2
    • /
    • pp.148-160
    • /
    • 2023
  • The Pliny Letter, the first historical record of volcanic eruptions and disasters on Earth, was studied to better understand the Vesuvius' eruption patterns in 79 AD. The two-day eruption, which began at 1 a.m. on August 24th 79 AD, produced large amounts of volcanic ash and pumice, which were carried by the wind and fell on nearby cities. Furthermore, during the eruption, fast-moving pyroclastic flows flowed down the volcano's sides, and several phenomena such as earthquakes and tsunamis occurred. Cities near Mount Vesuvius were buried and destroyed by volcanic ash and pyroclastic flows. Previous studies were collected, analyzed, and investigated and the scope of damage was chosen from Pompeii, Herculaneum, Stabiae, and Oplontis. The sedimentary stratigraphy and thickness vary according to location and distance from Vesuvius in each region. Within the depositional layers, the remains of residents who died during the eruption were also discovered, and 1,150 remains have been discovered in Pompeii, 306 in Herculaneum, 111 in Stabiae, and 54 in Oplontis, but the exact number of people who killed is unknown. The eruption that exhibited the pattern seen in AD 79 was named the Plinian eruption after Pliny and classified as a new type of eruption as a result of Pliny's detailed description of the eruption.

Comparison of Hsp90 and CYP1A Expression Patterns by Water Temperature Stress in Atlantic Salmon (Salmo salar) (대서양 연어(Salmo salar)의 수온 스트레스에 의한 Hsp90 및 CYP1A 발현 양상 비교)

  • Kang, Han Seung;Song, Jae-Hee;Kang, Hee Woong
    • Journal of Marine Life Science
    • /
    • v.3 no.2
    • /
    • pp.51-58
    • /
    • 2018
  • Variations in water temperature are known to affect almost every part of fish physiology. The rise in water temperature due to climate change can physically damage fish. This study was conducted to evaluate the health status of the Atlantic salmon (Salmo salar) at high water temperature (20℃) than the optimum water temperature (15℃). Liver tissue exerts important metabolic functions in thermal adaptation. Therefore, liver tissue was used in this study. The evaluation method is to develop the biomarker gene using NGS RNAseq analysis and to examine the expression pattern using RT-qPCR analysis. The NGS RNAseq analysis revealed 1,366 differentially expressed genes, among which 880 genes were increase expressed and 486 genes were decrease expressed. The biomarker genes are such as heat shock protein 90 alpha (Hsp90α), heat shock protein 90 beta (Hsp90β) and cytochrome P450 1A (CYP1A). The selected genes are sensitive to changes in water temperature through NGS RNAseq analysis. Expression patterns of these genes through RT-qPCR were similar to those of NGS RNAseq analysis. The results of this study can be applied to other fish species and it is considered to be useful industrially.

Spatial analysis of water shortage areas considering spatial clustering characteristics in the Han River basin (공간군집특성을 고려한 한강 유역 물부족 지역 분석)

  • Lee, Dong Jin;Son, Ho-Jun;Yoo, Jiyoung;Kim, Tae-Woong
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.5
    • /
    • pp.325-336
    • /
    • 2023
  • In August 2022, even though flood damage occurred in the metropolitan area due to heavy rain, drought warnings were issued in Jeolla province, which indicates that the regional drought is intensified recent years. To cope with regarding intensified regional droughts, many studies have been conducted to identify spatial patterns of the occurrence of meteorological drought, however, case studies of spatial clustering for water shortage are not sufficient. In this study, using the estimations of water shortage in the Han River Basin in 2030 of the Master Plans for National Water Management, the spatial characteristics of water shortage were analyzed to identify the hotspot areas based on the Local Moran's I and Getis-Ord Gi*, which are representative indicators of spatial clustering analysis. The spatial characteristics of water shortage areas were verified based on the p-value and the Moran scatter plot. The overall results of for three anayisis periods (S0(1967-1983), S1(1984-2000), S2(2001-2018)) indicated that the lower Imjin River (#1023) was the hotspot for water shortage, and there are moving patterns of water shortage from the east of lower Imjin River (#1023) to the west during S2 compared to S0 and S1. In addition, the Yangyang-namdaecheon (#1301) was the HL area that is adjacent to a high water shortage area and a low water shortage area, and had water shortage pattern in S2 compared to S0 and S1.

A Machine Learning-Based Encryption Behavior Cognitive Technique for Ransomware Detection (랜섬웨어 탐지를 위한 머신러닝 기반 암호화 행위 감지 기법)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.55-62
    • /
    • 2023
  • Recent ransomware attacks employ various techniques and pathways, posing significant challenges in early detection and defense. Consequently, the scale of damage is continually growing. This paper introduces a machine learning-based approach for effective ransomware detection by focusing on file encryption and encryption patterns, which are pivotal functionalities utilized by ransomware. Ransomware is identified by analyzing password behavior and encryption patterns, making it possible to detect specific ransomware variants and new types of ransomware, thereby mitigating ransomware attacks effectively. The proposed machine learning-based encryption behavior detection technique extracts encryption and encryption pattern characteristics and trains them using a machine learning classifier. The final outcome is an ensemble of results from two classifiers. The classifier plays a key role in determining the presence or absence of ransomware, leading to enhanced accuracy. The proposed technique is implemented using the numpy, pandas, and Python's Scikit-Learn library. Evaluation indicators reveal an average accuracy of 94%, precision of 95%, recall rate of 93%, and an F1 score of 95%. These performance results validate the feasibility of ransomware detection through encryption behavior analysis, and further research is encouraged to enhance the technique for proactive ransomware detection.

Development of deep learning algorithm for classification of disc cutter wear condition based on real-time measurement data (실시간 측정데이터 기반의 디스크커터 마모상태 판별 딥러닝 알고리즘 개발)

  • Ji Yun Lee;Byung Chul Yeo;Ho Young Jeong;Jung Joo Kim
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.26 no.3
    • /
    • pp.281-301
    • /
    • 2024
  • The power cable tunnels which are part of the underground transmission line project, are constructed using the shield TBM method. The disc cutter among the shield TBM components plays an important role in breaking rock mass. Efficient tunnel construction is possible only when appropriate replacement occurs as the wear limit is reached or damage such as uneven wear occurs. A study was conducted to determine the wear conditions of disc cutter using a deep learning algorithm based on real-time measurement data of wear and rotation speed. Based on the results of full-scaled tunnelling tests, it was confirmed that measurement data was obtained differently depending on the wear conditions of disc cutter. Using real-time measurement data, an algorithm was developed to determine disc cutter wear characteristics based on a convolutional neural network model. Distributional patterns of data can be learned through CNN filters, and the performance of the model that can classify uniform wear and uneven wear through these pattern features.

A Study on the Meaning of Shengmaisan -Focusing on the argument of Zhangyuansu and Lidongyuan- (생맥산(生脈散)의 방의(方義)에 대한 고찰(考察) - 장원소(張元素)와 이동원(李東垣)의 논설을 중심으로 -)

  • Ahn Jinhee
    • Journal of Korean Medical classics
    • /
    • v.37 no.3
    • /
    • pp.83-106
    • /
    • 2024
  • Objectives : This paper aims to examine the meaning of Shengmaisan in relation to original qi based on the discussion of Zhangyuansu, Lidongyuan and other doctors. Methods : Discussion of Shengmaisan made by Zhang, Li and others were examined. Afterwards, the medicinal properties of renshen, maimendong, and wuweizi as written in the Bencaogangmu, Donguibogam, Benjingshuzheng and texts of Zhang and Li were studied in relation to original qi. Related concepts such as '肺中伏火'·'補肺中元氣不足'·'補天眞元氣'·'夏食寒' were analyzed as well. Results & Conclusions : 1. Various pathology related to deficiency in original qi could act as internal pathogen for Shengmaisan application with which external factors such as summerheat and dampness heat meet results in most damage in the Lung metal. Therefore the upper body Lung is emphasized as pathogen. 2. The pathology of Shengmaisan application is depletion of humor, which should be refined, due to summer or dampness heat in a state of original qi deficiency which damages the Lungs, disabling its function of managing clear and pure qi. 3. The disease pattern for Shengmaisan in relation to original qi, according to other doctors, includes symptoms related to the Lungs such as dryness in the mouth due to excessive perspiration, blankness, loss of consciousness, shortness of breath, coughing, fast breathing, along with general bodily symptoms such as heavy sensation of the body, lethargy, difficulty walking, limping. These general bodily symptoms are due to either qi deficiency of the Lung, or humor deficiency due to failure of qi convergence in the lower body, or symptoms caused by Jing deficiency in severe cases. Symptoms related to problems in the lower body could manifest as dysfunction in urination and defecation, weakness in the limbs caused by original qi deficiency. 4. The Lungs circulate the clear and pure qi, converging qi and creating humor to assist the Triple Burner's Qi-Humor metabolism, enabling smooth communication of original qi throughout the body. With the original qi well tonified, the shen mechanism which is rooted in original qi allows for autonomous and consistent qi circulation within the body. Therefore, both Zhang and Li emphasized the importance of original qi. The property of Shengmaisan is explained as 'supplement qi/create liquid, convergence of yin/stop perspiration'. Zhang and Li explained its property as managing the circulation of original qi, to tonify Lungs' original qi and origin of water-humor.

Skin Damage Sustained During Head-and-Neck and Shoulder Radiotherapy Due to the Curvature of Skin and the Use of Immobilization Mask (머리-목 그리고 어깨의 방사선 치료 시 피부곡면과 고정장치로 인한 피부손상연구)

  • Kim, Soo-Kil;Jeung, Tae-Sig;Lim, Sang-Wook;Park, Yeong-Mouk;Park, Dahl
    • Progress in Medical Physics
    • /
    • v.21 no.1
    • /
    • pp.86-92
    • /
    • 2010
  • The purpose of this study was to measure curvature contour skin dose using radiochromic film and TLD for a conventional open field. We also attempted to quantify the degradation of skin sparing associated with use of immobilization devices for high energy photon beams and to calculate the skin dose with a help of Monte Carlo (MC) simulation. To simulate head-and-neck and shoulder treatment, a cylindrical solid water phantom 11 cm in diameter was irradiated with 6 MV x-rays using $40{\times}40\;cm^2$ field at 100 cm source axis distance (SAD) to the center of the phantom. Aquaplastic mesh mask was placed on the surface of the cylindrical phantom that mimicked relevant clinical situations. The skin dose profile was obtained by taking measurements from $0^{\circ}$ to $360^{\circ}$ around the circumference of the cylindrical phantom. The skin doses obtained from radiochromic film were found to be 47% of the maximum dose of $D_{max}$ at the $0^{\circ}$ beam entry position and 61% at the $90^{\circ}$ oblique beam position without the mask. Using the mask (1.5 mm), the skin dose received was 59% at $0^{\circ}$ incidence and 78% at $80^{\circ}$ incidence. Skin dose results were also gathered using thin thermoluminescent dosimeters (TLD). With the mask, the skin dose was 66% at $0^{\circ}$ incidence and 80% at $80^{\circ}$ incidence. This method with the mask revealed the similar pattern as film measurement. For the treatments of the head-and-neck and shoulder regions in which immobilization mask was used, skin doses at around tangential angle were nearly the same as the prescription dose. When a sloping skin contour is encountered, skin doses may be abated using thinner and more perforated immoblization devices which should still maintain immoblization.