• Title/Summary/Keyword: Pattern of Errors

Search Result 387, Processing Time 0.027 seconds

A Study on On-site Discharge Testing for Carbon Dioxide Fire Extinguishing Systems (이산화탄소 소화설비 현장 방출시험 방법론에 관한 고찰)

  • Park, Jun-Hyun;Kang, Tae-Seok;Kim, Jae-Hwan;Kim, Wee-Kyong
    • Fire Science and Engineering
    • /
    • v.29 no.4
    • /
    • pp.26-32
    • /
    • 2015
  • Carbon dioxide principally extinguishes fires by smothering, but an acceptable amount of extinguishing agent is needed. To assure the performance of carbon dioxide systems in Korea, computer programs certified by NEMA are being applied in system design. But the design errors can occur because the geometry of a model test facility is not the same as that of the actual fire area. Since the discharge rate tends to vary considerably with the flow pattern in a pipe, an on-site discharge test is necessary to ensure the performance of the system, especially with low pressure carbon dioxide. Technical standards for carbon dioxide systems do not give detailed guidelines for discharge tests at present. Based on comparative analysis of standards and practical tests, this paper suggests a methodology for on-site discharge tests.

Rank Correlation Coefficient of Energy Data for Identification of Abnormal Sensors in Buildings (에너지 데이터의 순위상관계수 기반 건물 내 오작동 기기 탐지)

  • Kim, Naeon;Jeong, Sihyun;Jang, Boyeon;Kim, Chong-Kwon
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.417-422
    • /
    • 2017
  • Anomaly detection is the identification of data that do not conform to a normal pattern or behavior model in a dataset. It can be utilized for detecting errors among data generated by devices or user behavior change in a social network data set. In this study, we proposed a new approach using rank correlation coefficient to efficiently detect abnormal data in devices of a building. With the increased push for energy conservation, many energy efficiency solutions have been proposed over the years. HVAC (Heating, Ventilating and Air Conditioning) system monitors and manages thousands of sensors such as thermostats, air conditioners, and lighting in large buildings. Currently, operators use the building's HVAC system for controlling efficient energy consumption. By using the proposed approach, it is possible to observe changes of ranking relationship between the devices in HVAC system and identify abnormal behavior in social network.

Estimating Geometric Transformation of Planar Pattern in Spherical Panoramic Image (구면 파노라마 영상에서의 평면 패턴의 기하 변환 추정)

  • Kim, Bosung;Park, Jong-Seung
    • Journal of KIISE
    • /
    • v.42 no.10
    • /
    • pp.1185-1194
    • /
    • 2015
  • A spherical panoramic image does not conform to the pin-hole camera model, and, hence, it is not possible to utilize previous techniques consisting of plane-to-plane transformation. In this paper, we propose a new method to estimate the planar geometric transformation between the planar image and a spherical panoramic image. Our proposed method estimates the transformation parameters for latitude, longitude, rotation and scaling factors when the matching pairs between a spherical panoramic image and a planar image are given. A planar image is projected into a spherical panoramic image through two steps of nonlinear coordinate transformations, which makes it difficult to compute the geometric transformation. The advantage of using our method is that we can uncover each of the implicit factors as well as the overall transformation. The experiment results show that our proposed method can achieve estimation errors of around 1% and is not affected by deformation factors, such as the latitude and rotation.

Damage Detection of Bridge Structures Considering Uncertainty in Analysis Model (해석모델의 불확실성을 고려한 교량의 손상추정기법)

  • Lee Jong-Jae;Yun Chung-Bang
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.19 no.2 s.72
    • /
    • pp.125-138
    • /
    • 2006
  • The use of system identification approaches for damage detection has been expanded in recent years owing to the advancements in data acquisition system andinformation processing techniques. Soft computing techniques such as neural networks and genetic algorithm have been utilized increasingly for this end due to their excellent pattern recognition capability. In this study, damage detection of bridge structures using neural networks technique based on the modal properties is presented, which can effectively consider the modeling uncertainty in the analysis model from which the training patterns are to be generated. The differences or the ratios of the mode shape components between before and after damage are used as the input to the neural networks in this method, since they are found to be less sensitive to the modeling errors than the mode shapes themselves. Two numerical example analyses on a simple beam and a multi-girder bridge are presented to demonstrate the effectiveness and applicability of the proposed method.

Visual Element Analysis and Guideline of School Web Site Design (학교 웹 사이트의 디자인에 대한 시각적인요소 분석 및 가이드라인)

  • Kwon Kyung-Ran;Kim Young-Bong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.273-279
    • /
    • 2005
  • It is activated a virtual university(digital university) without limitation time and space that the diffusion of internet, the rapid development of information and communicative technologies, web-technology. It is great importance of school-site to support various and qualitative education services, to cut social education spending, to strengthen national competitiveness with breed expert. Many people who are in universities are putting a school-site to the test. So we need study and analysis it to build up a virtual-study-space efficiently on web. This thesis is supposed to help in school-site design to make it reduce errors and save time and efforts. First, it suggests most general design pattern by analysis visual elements using HTML Tag. Second, it suggests a guide-line and a specific of design to use convenience through research on web-design problem and finding out user's favor.

  • PDF

Software-based Encryption Pattern Bootstrap for Secure Execution Environment (보안 실행 환경을 위한 소프트웨어 기반의 암호화 패턴 부트스트랩)

  • Choi, Hwa-Soon;Lee, Jae-Heung
    • Journal of IKEEE
    • /
    • v.16 no.4
    • /
    • pp.389-394
    • /
    • 2012
  • Most current systems have ignored security vulnerability concerned with boot firmware. It is highly likely that boot firmware may cause serious system errors, such as hardware manipulations by malicious programs or code, the operating system corruption caused by malicious code and software piracy under a condition of no consideration of security mechanism because boot firmware has an authority over external devices as well as hardware controls. This paper proposed a structural security mechanism based on software equipped with encrypted bootstrap patterns different from pre-existing bootstrap methods in terms of securely loading an operating system, searching for malicious codes and preventing software piracy so as to provide reliability of boot firmware. Moreover, through experiments, it proved its superiority in detection capability and overhead ranging between 1.5 % ~ 3 % lower than other software security mechanisms.

Mobile Gesture Recognition using Dynamic Time Warping with Localized Template (지역화된 템플릿기반 동적 시간정합을 이용한 모바일 제스처인식)

  • Choe, Bong-Whan;Min, Jun-Ki;Jo, Seong-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.482-486
    • /
    • 2010
  • Recently, gesture recognition methods based on dynamic time warping (DTW) have been actively investigated as more mobile devices have equipped the accelerometer. DTW has no additional training step since it uses given samples as the matching templates. However, it is difficult to apply the DTW on mobile environments because of its computational complexity of matching step where the input pattern has to be compared with every templates. In order to address the problem, this paper proposes a gesture recognition method based on DTW that uses localized subset of templates. Here, the k-means clustering algorithm is used to divide each class into subclasses in which the most centered sample in each subclass is employed as the localized template. It increases the recognition speed by reducing the number of matches while it minimizes the errors by preserving the diversities of the training patterns. Experimental results showed that the proposed method was about five times faster than the DTW with all training samples, and more stable than the randomly selected templates.

Analysis of Wi-Fi Signal Characteristics for Indoor Positioning Measurement (실내 위치 측정을 위한 Wi-Fi 신호 특성 분석)

  • Ha, IlKyu;Zhang, Zhehao;Park, HeeJoo;Kim, ChongGun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2177-2184
    • /
    • 2012
  • A different and effective method for indoor positioning system is needed and increased it's importance compare to the outdoor GPS based method. The FingerPrint positioning method is known as a superior method in indoor positioning system that maintains signal strength patterns for RPs(Reference Points) in database and compare the DB with the measured real-time signals on the mobile device. FingerPrint positioning method is necessary to establish an accurate database, but errors can occur by several factors. In this paper, we analyze the signal patterns of each terminal in accordance with connection state of access point and trace that the error in accordance with connection state of access point can be an important error in FingerPrint DB configuration through an experimental case study.

Exploratory study on the Spam Detection of the Online Social Network based on Graph Properties (그래프 속성을 이용한 온라인 소셜 네트워크 스팸 탐지 동향 분석)

  • Jeong, Sihyun;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.567-575
    • /
    • 2020
  • As online social networks are used as a critical medium for modern people's information sharing and relationship, their users are increasing rapidly every year. This not only increases usage but also surpasses the existing media in terms of information credibility. Therefore, emerging marketing strategies are deliberately attacking social networks. As a result, public opinion, which should be formed naturally, is artificially formed by online attacks, and many people trust it. Therefore, many studies have been conducted to detect agents attacking online social networks. In this paper, we analyze the trends of researches attempting to detect such online social network attackers, focusing on researches using social network graph characteristics. While the existing content-based techniques may represent classification errors due to privacy infringement and changes in attack strategies, the graph-based method proposes a more robust detection method using attacker patterns.

Evaluation of Discharge Current Employing Generalized Energy Method and Integral Ohm's Law Using Finite Element Method (유한요소법을 이용한 일반화된 에너지법과 옴의 적분법에 의한 방전 전류 계산)

  • Lee, Ho-Young;Kim, Hong-Joon;Lee, Se-Hee
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.2
    • /
    • pp.357-361
    • /
    • 2011
  • The terminal current in voltage driven systems is an essential role for characterizing the pattern of electric discharge such as corona, breakdown, etc. Until now, to evaluate this terminal current, Sato's equation has been widely used in areas of high voltage and plasma discharge. Basically Sato's equation was derived by using the energy balance equation and its final form described physical meaning explicitly. To give more general abilities in Sato's equation, we present a generalized approach by directly using the Poynting's theorem incorporating the finite element method. When the magnetic field effect or the time-dependent voltage source is considered, this generalized energy method can be easily applicable to those problems with any dielectric media such as gas, fluid, and solid. As an alternative approach, the integral Ohm's law resulting in small numerical errors has an ability to be applied to multi-port systems. To test the generalized energy method and integral Ohm's law, first, the results from two prosed methods were compared to those from Sato's approach and an analytic solution in parallel plane electrodes. After verification, the generalized method was applied to the tip-sphere electrodes for evaluating the terminal current with three carriers and the Fowler-Nordheim field emission condition. From these results, we concluded that the generalized energy method can be a consistent technique for evaluating the discharge current with various dielectric materials or large magnetic field.