• Title/Summary/Keyword: Real-time analysis system

Search Result 3,097, Processing Time 0.04 seconds

Classification of Metal Scraps Using Laser Induced Breakdown Spectroscopy (레이저유도붕괴분광법을 이용한 폐금속 분류)

  • Shin, Sungho;Lee, Jaepil;Moon, Youngmin;Choi, Jang-Hee;Jeong, Sungho
    • Resources Recycling
    • /
    • v.27 no.1
    • /
    • pp.31-37
    • /
    • 2018
  • To enhance the recycling rate of used metal resources, it is strongly desired to develop a metal sorting system that can automatically identify metal type from mixed metal scraps and sort them separately. Laser-induced breakdown spectroscopy(LIBS) is a technique that enables real time classification of different metals based on multi-elemental and in-air analysis. In this work, we report the results of LIBS elemental analysis of field scrap samples acquired from a recycling company. By applying multivariate analysis, it was found that the LIBS signals of five different metals could be perfectly classified if surface contamination was removed. The classification accuracy degraded for LIBS signals including contaminant emission, which however could be overcome by performing the multivariate analysis using properly selected emission lines of higher correlation only. The significant improvement in classification accuracy and process speed by the selection of proper emission lines demonstrated the feasibility of LIBS technique as an industrial tool for metal scrap sorting.

Analysis of Surveys to Determine the Real Prices of Ingredients used in School Foodservice (학교급식 식재료별 시장가격 조사 실태 분석)

  • Lee, Seo-Hyun;Lee, Min A;Ryoo, Jae-Yoon;Kim, Sanghyo;Kim, Soo-Youn;Lee, Hojin
    • Korean Journal of Community Nutrition
    • /
    • v.26 no.3
    • /
    • pp.188-199
    • /
    • 2021
  • Objectives: The purpose was to identify the ingredients that are usually surveyed for assessing real prices and to present the demand for such surveys by nutrition teachers and dietitians for ingredients used by school foodservice. Methods: A survey was conducted online from December 2019 to January 2020. The survey questionnaire was distributed to 1,158 nutrition teachers and dietitians from elementary, middle, and high schools nationwide, and 439 (37.9% return rate) of the 1,158 were collected and used for data analysis. Results: The ingredients which were investigated for price realities directly by schools were industrial products in 228 schools (51.8%), fruits in 169 schools (38.4%), and specialty crops in 166 schools (37.7%). Moreover, nutrition teachers and dietitians in elementary, middle, and high schools searched in different ways for the real prices of ingredients. In elementary schools, there was a high demand for price information about grains, vegetables or root and tuber crops, special crops, fruits, eggs, fishes, and organic and locally grown ingredients by the School Foodservice Support Centers. Real price information about meats, industrial products, and pickled processed products were sought from the external specialized institutions. In addition, nutrition teachers and dietitians in middle and high schools wanted to obtain prices of all of the ingredients from the Offices of Education or the District Office of Education. Conclusions: Schools want to efficiently use the time or money spent on research for the real prices of ingredients through reputable organizations or to co-work with other nutrition teachers and dietitians. The results of this study will be useful in understanding the current status of the surveys carried out to determine the real price information for ingredients used by the school foodservice.

Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems (이기종의 침입탐지 시스템과 SDMS-RTIR의 실시간 상호연동을 지원하는 침입탐지 메시지 교환 라이브러리 구현)

  • Yun, Il-Sun;Lee, Dong-Ryun;Oh, Eun-Sook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.565-574
    • /
    • 2003
  • This paper implements an intrusion detection message exchange protocol library (IDMEPL) for SDMS-RTIR, which Korea Information Security Agency (KISA) has developed to hierarchically detect and respond to network vulnerability scan attacks. The IDMEPL, based on the IDMEF and the IAP of the IDWG, enables SDMS-RTIR to interact with other intrusion detection systems (IDS) in realtime, and supports the TLS protocol to prevent security threats in exchanging messages between its server and its agents. Especially, with the protocol selection stage, the IDMEPL can support various protocols such as the IDXP besides the IAP. Furthermore, it can allow for agents to choose an appropriate security protocol for their own network, achieving security stronger than mutual authentication. With the IDMEPL, SDMS-RTIR can receive massive intrusion detection messages from heterogeneous IDSes in large-scale networks and analyze them.

Overexpression of TRPM7 is Associated with Poor Prognosis in Human Ovarian Carcinoma

  • Wang, Jing;Xiao, Ling;Luo, Chen-Hui;Zhou, Hui;Hu, Jun;Tang, Yu-Xi;Fang, Kai-Ning;Zhang, Yi
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.9
    • /
    • pp.3955-3958
    • /
    • 2014
  • Background: The melastatin-related transient receptor potential 7 channel (TRPM7) is a nonselective cation channel that has been shown to promote tumor metastasis and progression. In this study, we determined the expression of TRPM7 in ovarian carcinomas and investigated its possible prognostic value. Materials and Methods: Samples were collected from 138 patients with ovarian cancer. Expression of TRPM7 was assessed by real-time PCR and immunohistochemistry, expressed with reference to an established scoring system and related to clinical pathological factors. Kaplan-Meier survival analysis was applied to estimate disease-free survival (DFS) and overall survival (OS). Univariate and multivariate cox regression analyses were performed to correlate TRPM7 expression levels with DFS and OS. Results: TRPM7 was highly expressed in ovarian carcinoma and significantly associated with decreased disease-free survival (DFS: median 20 months vs. 42 months, P=0.0002) and overall survival (OS: median 27 months vs. 46 months, P<0.001). Conclusion: Overexpression of TRPM7 expression is significantly associated with poor prognosis in patients with ovarian cancer.

Optical Microscope Image Processing for Automated Cells Counting (세포 자동 계수를 위한 광학현미경 이미지 처리)

  • Cho, Mi-Gyung;Moon, Sang-Jun;Shim, Jae-Sool
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2493-2499
    • /
    • 2011
  • With growth of nano-bio industry, it is of significant importance to develop an automated system to exploit cell behaviors, including migration, mitosis, apoptosis, shape deformation of individual cells and their interactions among cells in the process of cell growth. In this paper, we proposed preprocessing techniques, a classification method which classifies clusters (overlapping multiple cells) from cells and an automated method which counts the number of cells and clusters in order to analyze 2D or 3D deformations of the cells in the real-time images from microscope in the cell culture. We conducted the 3T3 cell images taken from each thirty-minute interval. It showed the average 99.8% accuracy automatically for separating cells and clusters.

Novel License Plate Detection Method Based on Heuristic Energy

  • Sarker, Md.Mostafa Kamal;Yoon, Sook;Lee, Jaehwan;Park, Dong Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1114-1125
    • /
    • 2013
  • License Plate Detection (LPD) is a key component in automatic license plate recognition system. Despite the success of License Plate Recognition (LPR) methods in the past decades, the problem is quite a challenge due to the diversity of plate formats and multiform outdoor illumination conditions during image acquisition. This paper aims at automatical detection of car license plates via image processing techniques. In this paper, we proposed a real-time and robust method for license plate detection using Heuristic Energy Map(HEM). In the vehicle image, the region of license plate contains many components or edges. We obtain the edge energy values of an image by using the box filter and search for the license plate region with high energy values. Using this energy value information or Heuristic Energy Map(HEM), we can easily detect the license plate region from vehicle image with a very high possibilities. The proposed method consists two main steps: Region of Interest (ROI) Detection and License Plate Detection. This method has better performance in speed and accuracy than the most of existing methods used for license plate detection. The proposed method can detect a license plate within 130 milliseconds and its detection rate is 99.2% on a 3.10-GHz Intel Core i3-2100(with 4.00 GB of RAM) personal computer.

The Study on the implementation of Portable Http Live Streaming Transmitter based the Embedded Linux (임베디드 리눅스 기반의 휴대용 Http 라이브 스트리밍 전송기 구현에 관한 연구)

  • Lee, Jea-Hee;Cho, Tae-Kyung
    • Journal of Digital Convergence
    • /
    • v.13 no.11
    • /
    • pp.141-148
    • /
    • 2015
  • In this paper, for developing and implementing the HLS(Http Live Streaming) transmitter based embedded linux which is operated easily and cheap and lower power, portable in all networks and client environments compared to exist video live streaming transmitters. We design the developed HLS transmitter hardware using the Arm11 core and then porting the Embedded Linux OS(Operating System) and implementing the HLS protocol using the open source FFmpeg and Segmenter. For proving the performance of developed HLS transmitter, we make the testing environment for testing the performance of HLS transmitter including the notebook, iPhone, android Phone, Notebook and then analysis the received video in the client displayer. In this paper, we suggest the developed HLS transmitter performance data values higher than the Apple company's HLS recommended specification values and the picture of developed HLS transmitter operation in the testing environment. The application field of this paper result is that the man who works in the emergency situation take HLS and transmit the live emergency situation to the head quarter using this portable HLS.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.

Development of 'Paldokangsan4', a Walking Game for the Elerly Using 'Kinect2' ('키넥트2'를 이용한 노인용 걷기게임 '팔도강산4'의 개발)

  • Kim, KyungSik;Lee, SeungSeob;Kim, TaeHyung
    • Journal of Korea Game Society
    • /
    • v.16 no.5
    • /
    • pp.149-158
    • /
    • 2016
  • This research is about development and usability test of 'Paldokangsan4' which is a serious game for the elderly to improve their physical and mental health. This game is the next version of last 'Paldokangsan3' developed in 2013. Its motion capture interface 'Kinect' has been stopped for production that we have to develop the next version with 'Kinect2'. We added a personal ID system to accumulate palyers' game histories, and let the player know the the current score comparing to the personal average score every time. Also we added real mart background to the traditional old market background of the game as well as a tutorial level to learn how to play the game personally. In 2016 Play Expo, we have installed and demonstrated it and gathered opinions of 40 volunteers in questionnaire. The result of their analysis showed that we could find the possibility of beneficial effects for the elderly following the last version.