• Title/Summary/Keyword: Techniques

Search Result 34,254, Processing Time 0.048 seconds

An Investigation of Human Error Analysis Techniques in Various Industries with Implications for the Korean Railway Industry (인적오류 분석기법의 국내외 활용 현황 및 국내 철도 산업에의 적용 방안)

  • Baek, Dong-Hyun;Yoon, Wan-Chul;Kim, Dong-San
    • Journal of the Korean Society for Railway
    • /
    • v.10 no.1 s.38
    • /
    • pp.7-15
    • /
    • 2007
  • Since human errors are being recognized as one of the primary issues in railway safety, there is a definite need for human error analysis techniques that can identify the types of errors and their causes and derive effective countermeasures to help reduce their future probability. But, for some reasons, there are not yet systematic procedures or techniques for analyzing human errors in the Korean railway industry. This paper introduces several techniques that have been developed and utilized for analyzing human errors in Korean and overseas nuclear power aviation railway, offshore oil industry, etc., and summarizes the strengths and weaknesses of each technique. Based on the Investigation of the techniques, the paper also discusses the implications for the development of a human error analysis system for the Korean railway industry.

Acceleration Techniques for Cycle-Based Login Simulation (사이클 기반 논리시뮬레이션 가속화 기법 연구)

  • Park, Young-Ho;Park, Eun-Sei
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.50 no.1
    • /
    • pp.45-50
    • /
    • 2001
  • With increasing complexity of digital logic circuits, fast and accurate verification of functional behaviour becomes most critical bottleneck in meeting time-to-market requirement. This paper presents several techniques for accelerating a cycle-based logic simulation. The acceleration techniques include parallel pattern logic evaluation, circuit size reduction, and the partition of feedback loops in sequential circuits. Among all, the circuit size reduction plays a critical role in maximizing logic simulation speedup by reducing 50% of entire circuit nodes on the average. These techniques are incorporated into a levelized table-driven logic simulation system rather than a compiled-code simulation algorithm. Finally, experimental results are given to demonstrate the effectiveness of the proposed acceleration techniques. Experimental results show more than 27 times performance improvement over single pattern levelized logic simulation.

  • PDF

A Study on the Risk Analysis Techniques for Products: Development of HuBRA (Human Behavior Risk Analysis) (제품의 리스크 분석 기법에 관한 연구: HuBRA 기법 개발)

  • 박경수;조일행;김운회
    • Journal of the Korean Society of Safety
    • /
    • v.18 no.3
    • /
    • pp.141-148
    • /
    • 2003
  • Since the introduction of The Product Liability Law, effective since July 2002, more and more companies and end-users have been giving their attention to the safety of products. A number of existing risk analysis techniques are being implemented to manufacturing sites. However, they have certain restrictions such as incurring different techniques that are to be implemented at each stage of the product development. This is due to their domain of the analysis differing from one to another. Moreover, the results of these analyses are not specific enough, and are subject to further revision. This study proceeds to look at various examinations undertaken on the existing risk analysis techniques. Through implementing them on certain products, investigations on the strengths and weaknesses were ascertained. This has allowed improvements on the existing techniques to be achieved as tell as the development of a new risk analysis technique, 'HuBRA(Human Behavior Risk Analysis)'. Finally the new technique was implemented on products to confirm its effectiveness.

Artificial Intelligence Techniques in Game Contents

  • Ko Sang-Su;Chae Song-Hwa;Nam Byung-Woo;Kim Won-Il
    • International Journal of Contents
    • /
    • v.2 no.3
    • /
    • pp.18-21
    • /
    • 2006
  • Nowadays, many people enjoy playing games in computer. In this kind of game, people often meet NPC (Non Player Character). It is the virtual character in simplified form of real player and exits in most of current computer games. Various NPCs add the reality and atmosphere of the game as well as help players. There are several techniques to embody NPC, but developers generally use AI technique. This paper discusses some artificial intelligence techniques used in game contents. Especially this paper focuses on the AI techniques used in computer games in terms of the two main approaches, symbolic approach and sub-symbolic approach.

  • PDF

Novel Techniques for Remediation of Contaminated Soil with Heavy Metals Using Magnetic Substances (자성체를 사용하는 중금속 오염토양의 새로운 복원기술)

  • Jeon, Choong
    • Journal of the Korea Organic Resources Recycling Association
    • /
    • v.19 no.4
    • /
    • pp.90-96
    • /
    • 2011
  • In order to remediate contaminated soils with heavy metals, many techniques have been developed and proposed. However, weakness for the various techniques has been making application for actual process difficult. They have been led to the necessity for novel techniques. Therefore, in this study, novel techniques which are developing and commercializing recently in domestic/foreign country will be introduced, especially it will be focused on remediation technique for contaminated soil with heavy metals using magnetic material.

Fileless cyberattacks: Analysis and classification

  • Lee, GyungMin;Shim, ShinWoo;Cho, ByoungMo;Kim, TaeKyu;Kim, Kyounggon
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.332-343
    • /
    • 2021
  • With cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection techniques. To combat this trend, security vendors are publishing analysis reports to help manage and better understand fileless malware. However, only fragmentary analysis reports for specific fileless cyberattacks exist, and there have been no comprehensive analyses on the variety of fileless cyberattacks that can be encountered. In this study, we analyze 10 selected cyberattacks that have occurred over the past five years in which fileless techniques were utilized. We also propose a methodology for classification based on the attack techniques and characteristics used in fileless cyberattacks. Finally, we describe how the response time can be improved during a fileless attack using our quick and effective classification technique.

Damage Detection in Truss Structures Using Deep Learning Techniques (딥러닝 기술을 이용한 트러스 구조물의 손상 탐지)

  • Lee, Seunghye;Lee, Kihak;Lee, Jaehong
    • Journal of Korean Association for Spatial Structures
    • /
    • v.19 no.1
    • /
    • pp.93-100
    • /
    • 2019
  • There has been considerable recent interest in deep learning techniques for structural analysis and design. However, despite newer algorithms and more precise methods have been developed in the field of computer science, the recent effective deep learning techniques have not been applied to the damage detection topics. In this study, we have explored the structural damage detection method of truss structures using the state-of-the-art deep learning techniques. The deep neural networks are used to train knowledge of the patterns in the response of the undamaged and the damaged structures. A 31-bar planar truss are considered to show the capabilities of the deep learning techniques for identifying the single or multiple-structural damage. The frequency responses and the elasticity moduli of individual elements are used as input and output datasets, respectively. In all considered cases, the neural network can assess damage conditions with very good accuracy.

A Pragmatic Framework for Predicting Change Prone Files Using Machine Learning Techniques with Java-based Software

  • Loveleen Kaur;Ashutosh Mishra
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.457-496
    • /
    • 2020
  • This study aims to extensively analyze the performance of various Machine Learning (ML) techniques for predicting version to version change-proneness of source code Java files. 17 object-oriented metrics have been utilized in this work for predicting change-prone files using 31 ML techniques and the framework proposed has been implemented on various consecutive releases of two Java-based software projects available as plug-ins. 10-fold and inter-release validation methods have been employed to validate the models and statistical tests provide supplementary information regarding the reliability and significance of the results. The results of experiments conducted in this article indicate that the ML techniques perform differently under the different validation settings. The results also confirm the proficiency of the selected ML techniques in lieu of developing change-proneness prediction models which could aid the software engineers in the initial stages of software development for classifying change-prone Java files of a software, in turn aiding in the trend estimation of change-proneness over future versions.

Quantitative Evaluation of Hepatic Steatosis Using Advanced Imaging Techniques: Focusing on New Quantitative Ultrasound Techniques

  • Junghoan Park;Jeong Min Lee;Gunwoo Lee;Sun Kyung Jeon;Ijin Joo
    • Korean Journal of Radiology
    • /
    • v.23 no.1
    • /
    • pp.13-29
    • /
    • 2022
  • Nonalcoholic fatty liver disease, characterized by excessive accumulation of fat in the liver, is the most common chronic liver disease worldwide. The current standard for the detection of hepatic steatosis is liver biopsy; however, it is limited by invasiveness and sampling errors. Accordingly, MR spectroscopy and proton density fat fraction obtained with MRI have been accepted as non-invasive modalities for quantifying hepatic steatosis. Recently, various quantitative ultrasonography techniques have been developed and validated for the quantification of hepatic steatosis. These techniques measure various acoustic parameters, including attenuation coefficient, backscatter coefficient and speckle statistics, speed of sound, and shear wave elastography metrics. In this article, we introduce several representative quantitative ultrasonography techniques and their diagnostic value for the detection of hepatic steatosis.

Piezoelectric shunt damping by synchronized switching on negative capacitance and adaptive voltage sources

  • Qureshi, Ehtesham Mustafa;Shen, Xing;Chen, JinJin
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.15 no.4
    • /
    • pp.396-411
    • /
    • 2014
  • Synchronized switch damping (SSD) techniques have recently been developed for structural vibration control using piezoelectric materials. In these techniques, piezoelectric materials are bonded on the vibrating structure and shunted by a network of electrical elements. These piezoelectric materials are switched according to the amplitude of the excitation force to damp vibration. This paper presents a new SSD technique called 'synchronized switch damping on negative capacitance and adaptive voltage sources' (SSDNCAV). The technique combines the phenomenon of capacitance transient charging and electrical resonance to effectively dampen the structural vibration. Also, the problem of stability observed in the previous SSD techniques is effectively addressed by adapting the voltage on the piezoelectric patch according to the vibration amplitude of the structure. Analytical expressions of vibration attenuation at the resonance frequency are derived, and the effectiveness of this new technique is demonstrated, for the control of a resonant cantilever beam with bonded piezoelectric patches, by comparing with SSDI, SSDVenh, and SSDNC techniques. Theoretical predictions and experimental results show the remarkable vibration damping capability of SSDNCAV technique, which was better than the previous SSD techniques. The broadband vibration control capabilities of SSDNCAV technique are also demonstrated, which exceed those of previous SSD techniques.