• Title/Summary/Keyword: Performance Monitoring

Search Result 3,638, Processing Time 0.084 seconds

Adversarial learning for underground structure concrete crack detection based on semi­supervised semantic segmentation (지하구조물 콘크리트 균열 탐지를 위한 semi-supervised 의미론적 분할 기반의 적대적 학습 기법 연구)

  • Shim, Seungbo;Choi, Sang-Il;Kong, Suk-Min;Lee, Seong-Won
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.22 no.5
    • /
    • pp.515-528
    • /
    • 2020
  • Underground concrete structures are usually designed to be used for decades, but in recent years, many of them are nearing their original life expectancy. As a result, it is necessary to promptly inspect and repair the structure, since it can cause lost of fundamental functions and bring unexpected problems. Therefore, personnel-based inspections and repairs have been underway for maintenance of underground structures, but nowadays, objective inspection technologies have been actively developed through the fusion of deep learning and image process. In particular, various researches have been conducted on developing a concrete crack detection algorithm based on supervised learning. Most of these studies requires a large amount of image data, especially, label images. In order to secure those images, it takes a lot of time and labor in reality. To resolve this problem, we introduce a method to increase the accuracy of crack area detection, improved by 0.25% on average by applying adversarial learning in this paper. The adversarial learning consists of a segmentation neural network and a discriminator neural network, and it is an algorithm that improves recognition performance by generating a virtual label image in a competitive structure. In this study, an efficient deep neural network learning method was proposed using this method, and it is expected to be used for accurate crack detection in the future.

Systematic Review of Smoking Initiation among Asian Adolescents, 2005-2015: Utilizing the Frameworks of Triadic Influence and Planned Behavior

  • Talip, Tajidah;Murang, Zaidah;Kifli, Nurolaini;Naing, Lin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.7
    • /
    • pp.3341-3355
    • /
    • 2016
  • Background: A recent WHO data report on mortality attributable to tobacco use including cigarette smoking indicated a very high burden of deaths in Asia and that people often initiate smoking as early as young adolescents. The objectives of this study were to systematically review peer-reviewed articles on cigarette smoking initiation among Asian adolescents and to develop a conceptual model of factors influencing smoking initiation by integrating all relevant factors based on existing data. Materials and Methods: Following a PRISMA guideline, a systematic review of articles published between 2005 and June 2015 was conducted using 5 databases on cigarette smoking initiation among adolescents (aged 10-19 years) living in Asia. We summarized the main findings of each study according to our research questions and data that emerged during the data extraction process. Analysis and categorization were based on the TTI and TPB models and classification of factors extracted from the study, were as follows: personal factors, social factors, broader environmental factors, mediators, and intention to initiate smoking and smoking behavior. Results: Of 1,227 identified studies, only 20 were included in this review. Our findings found that the mean age of cigarette smoking initiation ranged from 10 to 14 years and those who are more likely to initiate smoking are male, older adolescents, adolescents with low parental SES, individuals with low parental monitoring, low parental education level and having no discussion on smoking at home, those living in public housing and those exhibiting health-risk behavior. Our study also revealed that the risk of smoking initiation increased when they are exposed to smokers, influenced by peers, exposed to tobacco advertisements, receive pocket money, have lack of knowledge about smoking, have poor school performance, have a family conflict and have psychological problems. The conceptual model developed demonstrated complex networks of factors influencing initiation. Conclusions: This systematic review presents various factors influencing smoking initiation of the Asian adolescents and provides a conceptual framework to further analyze factors. Future studies should have a standard measure of smoking initiation, should analyze interactions and the intensity of relationships between different factors or variables in the conceptual model. This will in turn consolidate the understanding of the different factors affecting smoking initiation and will help to improve interventions in this area.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

Dynamic Polling Algorithm Based on Line Utilization Prediction (선로 이용률 예측 기반의 동적 폴링 기법)

  • Jo, Gang-Hong;An, Seong-Jin;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.489-496
    • /
    • 2002
  • This study proposes a new polling algorithm allowing dynamic change in polling period based on line utilization prediction. Polling is the most important function in network monitoring, but excessive polling data causes rather serious congestion conditions of network when network is In congestion. Therefore, existing multiple polling algorithms decided network congestion or load of agent with previously performed polling Round Trip Time or line utilization, chanced polling period, and controlled polling traffic. But, this algorithm is to change the polling period based on the previous polling and does not reflect network conditions in the current time to be polled. A algorithm proposed in this study is to predict whether polling traffic exceeds threshold of line utilization on polling path based on the past data and to change the polling period with the prediction. In this study, utilization of each line configuring network was predicted with AR model and violation of threshold was presented in probability. In addition, suitability was evaluated by applying the proposed dynamic polling algorithm based on line utilization prediction to the actual network, reasonable level of threshold for line utilization and the violation probability of threshold were decided by experiment. Performance of this algorithm was maximized with these processes.

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks (WDM 망에서 인공면역체계 기반의 네트워크 공격 탐지 제어 모델 및 대응 기법 설계)

  • Yoo, Kyung-Min;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.566-575
    • /
    • 2010
  • In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.

Object Segmentation for Detection of Moths in the Pheromone Trap Images (페로몬 트랩 영상에서 해충 검출을 위한 객체 분할)

  • Kim, Tae-Woo;Cho, Tae-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.157-163
    • /
    • 2017
  • The object segmentation approach has the merit of reducing the processing cost required to detect moths of interest, because it applies a moth detection algorithm to the segmented objects after segmenting the objects individually in the moth image. In this paper, an object segmentation method for moth detection in pheromone trap images is proposed. Our method consists of preprocessing, thresholding, morphological filtering, and object labeling processes. Thresholding in the process is a critical step significantly influencing the performance of object segmentation. The proposed method can threshold very elaborately by reflecting the local properties of the moth images. We performed thresholding using global and local versions of Ostu's method and, used the proposed method for the moth images of Carposina sasakii acquired on a pheromone trap placed in an orchard. It was demonstrated that the proposed method could reflect the properties of light and background on the moth images. Also, we performed object segmentation and moth classification for Carposina sasakii images, where the latter process used an SVM classifier with training and classification steps. In the experiments, the proposed method performed the detection of Carposina sasakii for 10 moth images and achieved an average detection rate of 95% of them. Therefore, it was shown that the proposed technique is an effective monitoring method of Carposina sasakii in an orchard.

Reproducibility of Nutrient Intake Estimated by Three-Day 24-Hour Dietary Recall of Middle-Aged Subjects for 6 Month Intervals (자기기록식 3일간의 24시간 회상법의 신뢰도 연구 -서울지역 중년 자원자를 대상으로-)

  • 이미숙;우미경;김성애;오세인;곽충실
    • Korean Journal of Community Nutrition
    • /
    • v.8 no.4
    • /
    • pp.603-609
    • /
    • 2003
  • This study examined the reproducibility of nutrient intakes estimated by the 24-hour recall method in a prospective cohort study (Longitudinal study of aging and health monitoring of Korean elderly) of middle-aged volunteer subjects (42 males and 49 females) in the Seoul area. The three-day 24-hour recall was administered twice at an interval of approximately 6 months. The first data were collected and a corrective procedure was performed by interviewing of the subjects and a trained dietitian. The second data were collected by mail from the subjects without the performance of any corrective procedure. The mean age of the subjects was 53.5 $\pm$ 9.6 for the males and 52.2 $\pm$ 8.9 for the females. The subjects who had above college education were 95% in the case of the males and 60% in the case of the females. The characteristics of the male subjects in this study were that they were highly educated and held professional jobs and were from the middle or upper class. Comparing the first and second 24-hour recall data, the second data showed relatively lower intakes of all nutrients, except vitamin A, vitamin Bi and cholesterol. There was no difference in the nutrients of the first and the second data with respect to vitamin A, vitamin B$_1$ and cholesterol in the males and calcium, iron, sodium, vitamin A, vitamin B$_1$, vitamin B$_2$ and cholesterol in the females. This data may indicate that the 24 hour retail method without a dietitian's help may result in lower reporting of the subject's intakes. The men had a tendency to remember less than the women. Pearson's correlation coefficients with unadjusted nutrient intakes values were ranged from 0.24 to 0.66. When energy intake was adjusted, there was a slight increase (from 0.26 to 0.71). Intra-class correlation coefficients with nutrient-unadjusted values ranged from 0.22 to 0.66, and the energy-adjusted values were ranged from 0.23 to 0.69. The weighted Kappa statistical values ranged from 0.10 to 0.40. On the average,46.3% of the subjects who were found in the lowest quartile of the nutrient intake levels based on the first 24-hour recall, were in the lowest quartile based on the second 24-hour recall. Therefore, there was a low reproducibility between the first and the second 24-hour recall. We should examine the factors influencing low reproducibility. Also, strategies should be developed to maximize the reliability of the assessment, with regard to portion-size training and telephone validation. (Korean J Community Nutrition 8(4) : 603∼609, 2003)

A Study on the Utilization Method through the Analysis of the Women Leaders Database (여성 인재 데이터베이스 분석을 통한 활용 방안에 관한 연구)

  • Hong, Hee-Jeong
    • Journal of Digital Convergence
    • /
    • v.18 no.2
    • /
    • pp.37-46
    • /
    • 2020
  • The purpose of the study is to look at the status of the women's leaders databases designed to expand women's participation in the public sector, and to come up with measures for the utilization of the women's leaders databases. For this purpose, this study analyzed the current status of the women's leaders databases that have been established and managed by the Ministry of Gender Equality and Family and Incheon Metropolitan Government. And In order to find ways to utilize the database of women leaders, the results of a survey conducted by the Incheon Metropolitan Government were analyzed and policy implications were drawn. The policy implications for utilizing the women's leaders database are as follows: First, systematic management such as the reorganization of the women's leaders database and the updating of the latest information are necessary. Second, it is necessary to disclose the current status of women's leaders and trends in utilization through the website. Third, the follow-up is needed through active monitoring at the national level. And if possible, the results need to be reflected in the agency performance assessment. Fourth, regular and long-term public relations strategies are needed so that the women's leaders database can be used not only for career-breaking women but also for emerging talent. Based on this study, further research on how women who entered the society through the women's leaders database will be representative as social minorities will be needed.

Fire Suppression Test using the Automatic Monitor System for Double-Deck Tunnel (복층터널 자동 모니터 소화설비를 이용한 화재진압 실험)

  • Park, Jin-Ouk;Yoo, Yong-Ho;Kim, Hwi-Seung;Park, Byoung-Jik;Kim, Yang-Kyun
    • Fire Science and Engineering
    • /
    • v.31 no.6
    • /
    • pp.40-46
    • /
    • 2017
  • As one of the solutions to deal with economic loss caused by traffic congestion in metropolitan area, a deep underground road has been planned and implemented at home and abroad. The part of them has been pushed ahead with a double-deck scheme which has an advantage in constructability and cost efficiency comparing to traditional road tunnel. However, the double-deck tunnel has a lower floor height than the general road tunnel due to the special structure used as the upper and lower lines by installing the middle slab on one excavation section. Therefore, it is relatively weak against fire accidents and ventilation problems occurring in tunnels. Thus study to develop the life safety system optimized to a double-deck tunnel has been systematically carried out in order to overcome their weak point. In this study, automatic monitoring fire extinguisher (AMFE) is developed to suppress a fire and prevent its spread at early stage of tunnel fire, conducting the performance test through vehicle fire tests as verification. The tests were conducted with AMFE being 30 m apart from the vehicle and 10 m apart from engine room. As a results, it was confirmed that AMFE enables to suppress a fire and prevent its spread in both cases.

Removal of Nitrate in Column Reactors Using Surfactant Modified Zeolite (SMZ를 이용한 컬럼반응조 내 질산성 질소의 제거)

  • 박규홍;이동호
    • Journal of Soil and Groundwater Environment
    • /
    • v.8 no.2
    • /
    • pp.55-61
    • /
    • 2003
  • The objective of this study was to investigate the characteristics of nitrate removal by conducting the column test in order to see the performance of surfactant modified zeolite (SMZ) as a permeable reactive barrier material. The prediction of nitrate removal was tested using the one-dimensional advective-dispersive model fitted to the experimental breakthrough curve. A methodology for scaling up to in-situ permeable reactive barrier was also proposed. The breakthrough of nitrate in the column packed with SMZ was well predicted using linear equilibrium adsorption model. The breakthrough time and half-life obtained by breakthrough experiment with variation of flowrates were decreased with the increase of flowrates. When 10㎥/day of groundwater containing the 50 mg/l of nitrate is to be treated to satisfy the potable water quality criteria (10 mg/l) by SMZ reactive barrier, 300 tons of SMZ and about 6 years of breakthrough time will be required, suggesting that 165 million wons are needed as barrier material expenses in each 6 years besides the initial design and construction expenses and the minimal monitoring and maintenance expenses.