• Title/Summary/Keyword: Source Enumeration

Search Result 14, Processing Time 0.02 seconds

Source Enumeration Method using Eigenvalue Gap Ratio and Performance Comparison in Rayleigh Fading (Eigenvalue Gap의 Ratio를 이용한 신호 개수 추정 방법 및 Rayleigh Fading 환경에서의 신호 개수 추정 성능 비교)

  • Kim, Taeyoung;Lee, Yunseong;Park, Chanhong;Choi, Yeongyoon;Kim, Kiseon;Lee, Dongkeun;Lee, Myung-Sik;Kang, Hyunjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.492-502
    • /
    • 2021
  • In electronic warfare, source enumeration and direction-of-arrival estimation are important. The source enumeration method based on eigenvalues of covariance matrix from received is one of the most used methods. However, there are some drawbacks such as accuracy less than 100 % at high SNR, poor performance at low SNR and reduction of maximum number of estimating sources. We suggested new method based on eigenvalues gaps, which is named AREG(Accumulated Ratio of Eigenvalues Gaps). Meanwhile, FGML(Fast Gridless Maximum Likelihood) which reconstructs the covariance matrix was suggested by Wu et al., and it improves performance of the existing source enumeration methods without modification of algorithms. In this paper, first, we combine AREG with FGML to improve the performance. Second, we compare the performance of source enumeration and direction-of-arrival estimation methods in Rayleigh fading. Third, we suggest new method named REG(Ratio of Eigenvalues Gaps) to reduce performance degradation in Rayleigh Fading environment of AREG.

Design and Implementation of A Weakness Analyzer for Mobile Applications (모바일 애플리케이션을 위한 취약점 분석기의 설계 및 구현)

  • Mun, Il-Yong;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1335-1347
    • /
    • 2011
  • The dissemination and use of mobile applications have been rapidly expanding these days. And in such a situation, the security of mobile applications has emerged as a new issue. Although the safety of general software such as desktop and enterprise software is systematically achieved from the development phase to the verification phase through secure coding, there have been not sufficient studies on the safety of mobile applications yet. This paper deals with deriving weakness enumeration specialized in mobile applications and implementing a tool that can automatically analyze the derived weakness. Deriving the weakness enumeration can be achieved based on CWE(Common Weakness Enumeration) and CERT(Computer Emergency Response Team) relating to the event-driven method that is generally used in developing mobile applications. The analysis tool uses the dynamic tests to check whether there are specified vulnerabilities in the source code of mobile applications. Moreover, the derived vulnerability could be used as a guidebook for programmers to develop mobile applications.

Spring Boot-based Web Application Development for providing information on Security Vulnerabilities and Patches for Open Source Software (Spring Boot 기반의 오픈소스 소프트웨어 보안 취약점 및 패치 정보 제공 웹 어플리케이션 개발)

  • Sim, Wan;Choi, WoongChul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.77-83
    • /
    • 2021
  • As Open Source Software(OSS) recently invigorates, many companies actively use the OSSes in their business software. With such OSS invigoration, our web application is developed in order to provide the safety in using the OSSes, and update the information on the new vulnerabilities and the patches at all times by crawling the web pages of the relevant OSS home pages and the managing organizations of the vulnerabilities. By providing the updated information, our application helps the OSS users and developers to be aware of such security issues, and gives them to work in the safer environment from security risks. In addition, our application can be used as a security platform to greatly contribute to preventing potential security incidents not only for companies but also for individual developers.

Analysis of (K, r) Incomplete Inspection Policy for Minimizing Inspection Cost subject to a Target AOQ (출하 품질목표 조건하에 검사비용을 최소화하는(K, r) 부분검사정책의 분석)

  • Yang, Moon-Hee
    • IE interfaces
    • /
    • v.24 no.1
    • /
    • pp.87-96
    • /
    • 2011
  • In this paper, we address an optimization problem for minimizing the inspection and rework cost in an inspection-rework system, which forms a network of nodes including a K-stage inspection system, storage areas for items, a source inspection shop, and a re-inspection shop. We assume that (n, 0) acceptance sampling is performed in the source inspection shop and that only 100(1-r)% of items of rejected lots are re-inspected in the re-inspection shop. Since all the nodes are interrelated, in order to formulate our steady-state objective function, we make a steady-state network flow analysis between nodes, and derive both the steady-state amount of flows between nodes and the steady-state fraction defectives by solving a nonlinear balance equation. Finally we provide some fundamental properties and an enumeration procedure for determining the optimal values of (K, r) which both minimizes our objective function and attains a given target average outgoing quality.

Minimization of Inspection Cost in an Inspection System Using a Time-based Flow Analysis

  • Yang, Moon-Hee;Kim, Sun-Uk
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.35 no.3
    • /
    • pp.194-202
    • /
    • 2009
  • In this paper, we address an optimization problem and a case study for minimizing the cost of inspections incurred throughout an inspection system, which includes a K-stage inspection system, a source inspection shop, and a re-inspection shop. In order to formulate the inspection cost function, we make a time-based flow analysis between nodes (or shops), and derive the limiting sizes of flows between nodes and limiting defective rates by solving a set of nonlinear balance equations. It turns out that the number of items reworked throughout the inspection system is invariant irrespective of the defective rate of items moved through the K-stage inspection system. Hence we define the inspection cost as the total number of items inspected, and we provide an enumeration method for determining an optimal value of K which minimizes the number of items inspected.

Minimization of Inspection Cost in a BLU Inspection System Using a Steady-State Flow Analysis

  • Yang, Moon-Hee;Kim, Seung-Hyun
    • Management Science and Financial Engineering
    • /
    • v.15 no.2
    • /
    • pp.53-68
    • /
    • 2009
  • In this paper, we address a problem for minimizing the number of items inspected in a back-light-unit (BLU) inspection system, which includes a K-stage inspection system, a source inspection shop, and a re-inspection shop. In order to formulate our objective, we make a steady-state flow analysis between nodes (or shops), and derive the steady-state amount of flows between nodes and defective rates by solving a nonlinear balance equation. We provide an enumeration method for determining an optimal value of K which minimizes the number of items inspected. Our methodology could be applied and extended to similar situations with slight modification.

Minimization of Inspection Cost in an Inspection System Considering the Effect of Lot Formation on AOQ

  • Yang, Moon-Hee
    • Management Science and Financial Engineering
    • /
    • v.16 no.1
    • /
    • pp.119-135
    • /
    • 2010
  • In this paper, we readdress the optimization problem for minimizing the inspection cost in a back-light unit inspection system, which forms a network including a K-stage inspection system, a source inspection shop, and a re-inspection shop. In order to formulate our objective function when the system is in a steady state, assuming that the number of nonconforming items in a lot follows a binomial distribution when a lot is formed for inspection, we make a steady-state network flow analysis between shops, and derive the steady-state amount of flows between nodes and the steady-state fraction defectives by solving a nonlinear balance equation. Finally we provide some fundamental properties and an enumeration method for determining an optimal value of K which minimizes our objective function. In addition, we compare our results numerically with previous ones.

Current Methods of Circulating Tumor Cell Detection (순환종양세포 검출 기술)

  • Lim, Minji;Cho, Yoon-Kyoung
    • The Korean journal of helicobacter and upper gastrointestinal research
    • /
    • v.18 no.3
    • /
    • pp.157-161
    • /
    • 2018
  • Liquid biopsy, the analysis of circulating biomarkers from peripheral blood, such as circulating tumor cells (CTCs) and circulating tumor DNA, and exosomes, offers a less invasive, new source of cancer-derived materials that may reflect the status of the disease better and thereby contribute to personalized treatment. Recent advances in microfluidics and molecular analysis technologies have resulted in greatly improved CTC enumeration and detection. In this article, we review commercially available technologies used to isolate CTCs from peripheral blood, including immunoaffinity and label-free, physical property-based isolation methods. Although enormous technological progress has been made, especially within the last decade, only a few CTC detection methods have been approved for routine clinical use. Here, we provide an overview of the current CTC isolation methods and examples of their potential application for early diagnosis, prognosis, treatment monitoring, and prediction of resistance to cancer therapy. Furthermore, the challenges that remain to be addressed before such tools are implemented for routine use in clinical settings are discussed.

Development of Sample Survey Design for the Industrial Research and Development Statistics (표본조사에 의한 기업 연구개발활동 통계 작성방안)

  • Cho, Seong-Pyo;Park, Sun-Young;Han, Ki-In;Noh, Min-Sun
    • Journal of Technology Innovation
    • /
    • v.17 no.2
    • /
    • pp.1-23
    • /
    • 2009
  • The Survey on the Industrial Research and Development(R&D) is the primary source of information on R&D performed by Korea industrial sector. The results of the survey are used to assess trends in R&D expenditures. Government agencies, corporations, and research organizations use the data to investigate productivity determinants, formulate tax policy, and compare individual company performance with industry averages. Recently, Korea Industrial Technology Association(KOITA) has collected the data by complete enumeration. Koita has, currently, considered sample survey because the number of R&D institutions in industry has been dramatically increased. This study develops survey design for the industrial research and development(R&D) statistics by introducing a sample survey. Companies are divided into 8 groups according to the amount of R&D expenditures and firm size or type. We collect the sample from 24 or 8 sampling strata and compare the results with those of complete enumeration survey. The estimates from 24 sampling strata are not significantly different to the results of complete enumeration survey. We propose the survey design as follows: Companies are divided into 11 groups including the companies of which R&D expenditures are unknown. All large companies are included in the survey and medium and small companies are sampled from 70% and 3%. Simple random sampling (SRS) is applied to the small company partition since they show uniform distribution in R&D expenditures. The independent probability proportionate to size (PPS) sampling procedure may be applied to those companies identified as 'not R&D performers'. When respondents do not provide the requested information, estimates for the missing data are made using imputation algorithms. In the future study, new key variables should be developed in survey questionnaires.

  • PDF

Bacteriocinogenic Potential of Newly Isolated Strains of Enterococcus faecium and Enterococcus faecalis from Dairy Products of Pakistan

  • Javed, Imran;Ahmed, Safia;Ali, Muhammad Ishtiaq;Ahmad, Bashir;Ghumro, Pir Bux;Hameed, Abdul;Chaudry, Ghulam Jilani
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.1
    • /
    • pp.153-160
    • /
    • 2010
  • The present study was carried out for the isolation of bacteriocin-producing enterococci from indigenous sources. Gram-positive enterococci are known for having the ability to produce enterocins with good antimicrobial potential. A total of 34 strains were isolated from processed dairy products of Pakistan and seven out of them were found to be member of genus Enterococcus on selective enumeration. Biochemical and molecular characterization revealed that four of these isolates (IJ-03, IJ-07, IJ-11, and IJ-12) were Enterococcus faecalis and three (IJ-06, IJ-21, and IJ-31) were Enterococcus faecium. Local processed cheese was the source of all enterococcal isolates, except E. faecium IJ-21 and IJ-31, which were isolated from indigenous yoghurt and butter samples, respectively. Bacterial isolates were sensitive to commonly used antibiotics except methicillin and kanamycin. They also lacked critical virulence determinants, mainly cytolysin (cyl), gelatinase (gel), enterococcal surface protein (esp), and vancomycin resistance (vanA and vanB). Polymerase chain reaction amplification identified that enterocin A and P genes were present in the genome of E. faecium IJ-06 and IJ-21, whereas the E. faecium IJ-31 genome showed only enterocin P genes. No amplification was observed for genes that corresponded with the enterocins 31, AS-48, L50A, and L50B, and ent 1071A and 1071B. There were no signals of amplification found for E. faecalis IJ-11, indicating that the antimicrobial activity was because of an enterocin different from those checked by PCR. Hence, the indigenous bacterial isolates have great potential for bacteriocin production and they had antibacterial activity against a variety of closely related species.