• Title/Summary/Keyword: Value function network

Search Result 346, Processing Time 0.027 seconds

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

Intelligent Tuning of the Two Degrees-of-Freedom Proportional-Integral-Derivative Controller On the Distributed Control System for Steam Temperature Control of Thermal Power Plant

  • Dong Hwa Kim;Won Pyo Hong;Seung Hack Lee
    • KIEE International Transaction on Systems and Control
    • /
    • v.2D no.2
    • /
    • pp.78-91
    • /
    • 2002
  • In the thermal power plant, there are six manipulated variables: main steam flow, feedwater flow, fuel flow, air flow, spray flow, and gas recirculation flow. There are five controlled variables: generator output, main steam pressure, main steam temperature, exhaust gas density, and reheater steam temperature. Therefore, the thermal power plant control system is a multinput and output system. In the control system, the main steam temperature is typically regulated by the fuel flow rate and the spray flow rate, and the reheater steam temperature is regulated by the gas recirculation flow rate. However, strict control of the steam temperature must be maintained to avoid thermal stress. Maintaining the steam temperature can be difficult due to heating value variation to the fuel source, time delay changes in the main steam temperature versus changes in fuel flow rate, difficulty of control of the main steam temperature control and the reheater steam temperature control system owing to the dynamic response characteristics of changes in steam temperature and the reheater steam temperature, and the fluctuation of inner fluid water and steam flow rates during the load-following operation. Up to the present time, the Proportional-Integral-Derivative Controller has been used to operate this system. However, it is very difficult to achieve an optimal PID gain with no experience, since the gain of the PID controller has to be manually tuned by trial and error. This paper focuses on the characteristic comparison of the PID controller and the modified 2-DOF PID Controller (Two-Degrees-Freedom Proportional-Integral-Derivative) on the DCS (Distributed Control System). The method is to design an optimal controller that can be operated on the thermal generating plant in Seoul, Korea. The modified 2-DOF PID controller is designed to enable parameters to fit into the thermal plant during disturbances. To attain an optimal control method, transfer function and operating data from start-up, running, and stop procedures of the thermal plant have been acquired. Through this research, the stable range of a 2-DOF parameter for only this system could be found for the start-up procedure and this parameter could be used for the tuning problem. Also, this paper addressed whether an intelligent tuning method based on immune network algorithms can be used effectively in tuning these controllers.

  • PDF

Development of Neutron, Gamma ray, X-ray Radiation Measurement and Integrated Control System (중성자, 감마선, 엑스선 방사선 측정 및 통합 제어 시스템 개발)

  • Ko, Tae-Young;Lee, Joo-Hyun;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.21 no.4
    • /
    • pp.408-411
    • /
    • 2017
  • In this paper, we propose an integrated control system that measures neutrons, gamma ray, and x-ray. The proposed system is able to monitor and control the data measured and analyzed on the remote or network, and can monitor and control the status of each part of the system remotely without remote control. The proposed system consists of a gamma ray/x-ray sensor part, a neutron sensor part, a main control embedded system part, a dedicated display device and GUI part, and a remote UI part. The gamma ray/x-ray sensor part measures gamma ray and x-ray of low level by using NaI(Tl) scintillation detector. The neutron sensor part measures neutrons using Proportional Counter Detector(low-level neutron) and Ion Chamber Type Detector(high-level neutron). The main control embedded system part detects radiation, samples it in seconds, and converts it into radiation dose for accumulated pulse and current values. The dedicated display device and the GUI part output the radiation measurement result and the converted radiation amount and radiation amount measurement value and provide the user with the control condition setting and the calibration function for the detection part. The remote UI unit collects and stores the measured values and transmits them to the remote monitoring system. In order to evaluate the performance of the proposed system, the measurement uncertainty of the neutron detector was measured to less than ${\pm}8.2%$ and the gamma ray and x-ray detector had the uncertainty of less than 7.5%. It was confirmed that the normal operation was not less than ${\pm}15$ percent of the international standard.

The Aspectual Theory of the Cybercharacter (사이버캐릭터의 위상론)

  • 이선교
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.182-190
    • /
    • 1999
  • There has been the rapid change of paradigm with the overflow of terms related to computers such as information, digital, cyber, virtual world and the change of time concept on the ground that it is common to change the world into virtual time. This study is about cybercharacters working in air-broadcasting with rapidly-developing internet, The cybercharacters including 3D animation developed from 2D animation are know to be manufactured with use of electronic mediun and computers and to exist in electronics. Though the emergence of the cybercharacters has a lot of gflnetic roots according to their objectives, they have in common that they are made by 3D graphics and they work in the virtual space, The great traits of the cybercharaters lie in the extension of interfacial function and ecological growth. In the cyberspace the interface, the meeting point between a computer and its users is the most important, The cybercharacters as medium providing new ruman interface become effective with growing interest in virtual reality, The cybercharacters also keep the ecological traits, They can also bring about added value with infusion of image and development of the network, These cybercharacters can also play the important parts in the continually developing cyberspace, The successful birth of the cybercharacter are based on, the technological power. assistance of fund and the ctrltural background, The information-entertainment of the cybercharacters functions well with the accompinimene of these three things, The cybercharacters can make a subject which keeps single issue as a central point of the virtual realty, The cybercharacters can also be connected with equity of "Korean knowledge information society" in the cultural rule of the internet and sociocul tural identity, identity.

  • PDF

Revitalization Plan and Value of Social Network Service in the Business Organization (기업조직 내 소셜 미디어 서비스 활용의 가치 제고 및 활성화 방안)

  • Kim, Dong-Hyun;Seo, Hyun-Shik;Kim, Hyung-Joon;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.275-286
    • /
    • 2011
  • The purpose of this study is to find the beneficial plan for business success by the advantage of social media service in the business organization. There is few research for applying social media on a variety of fields in business organization although many companies are trying to find the way for its application. Hence, this study identifies the possibility for the utilization of social media services, and it also finds the plan for their effective application. The social relationship is created by increasing communications between users of social media service. The research model is established on the basis of the hypothesis that the social relationship affects knowledge share, pursuit of ego, social participation, amusement. To maximize the impact of results, the research was conducted on the basis of the target on two groups including the business men and non-business men who use social media services. As results of the research, the business men tend to appeal their impression based on sharing knowledge with anonymous people. Also, it is necessary to make a social participation to a management participation, and to utilize the social media in the organization by including amusement to its function. This research is expected to have significant implication to companies which wants to apply social media services in the future.

Comparative Analysis by Batch Size when Diagnosing Pneumonia on Chest X-Ray Image using Xception Modeling (Xception 모델링을 이용한 흉부 X선 영상 폐렴(pneumonia) 진단 시 배치 사이즈별 비교 분석)

  • Kim, Ji-Yul;Ye, Soo-Young
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.4
    • /
    • pp.547-554
    • /
    • 2021
  • In order to quickly and accurately diagnose pneumonia on a chest X-ray image, different batch sizes of 4, 8, 16, and 32 were applied to the same Xception deep learning model, and modeling was performed 3 times, respectively. As a result of the performance evaluation of deep learning modeling, in the case of modeling to which batch size 32 was applied, the results of accuracy, loss function value, mean square error, and learning time per epoch showed the best results. And in the accuracy evaluation of the Test Metric, the modeling applied with batch size 8 showed the best results, and the precision evaluation showed excellent results in all batch sizes. In the recall evaluation, modeling applied with batch size 16 showed the best results, and for F1-score, modeling applied with batch size 16 showed the best results. And the AUC score evaluation was the same for all batch sizes. Based on these results, deep learning modeling with batch size 32 showed high accuracy, stable artificial neural network learning, and excellent speed. It is thought that accurate and rapid lesion detection will be possible if a batch size of 32 is applied in an automatic diagnosis study for feature extraction and classification of pneumonia in chest X-ray images using deep learning in the future.

Construction and Application of Intelligent Decision Support System through Defense Ontology - Application example of Air Force Logistics Situation Management System (국방 온톨로지를 통한 지능형 의사결정지원시스템 구축 및 활용 - 공군 군수상황관리체계 적용 사례)

  • Jo, Wongi;Kim, Hak-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.77-97
    • /
    • 2019
  • The large amount of data that emerges from the initial connection environment of the Fourth Industrial Revolution is a major factor that distinguishes the Fourth Industrial Revolution from the existing production environment. This environment has two-sided features that allow it to produce data while using it. And the data produced so produces another value. Due to the massive scale of data, future information systems need to process more data in terms of quantities than existing information systems. In addition, in terms of quality, only a large amount of data, Ability is required. In a small-scale information system, it is possible for a person to accurately understand the system and obtain the necessary information, but in a variety of complex systems where it is difficult to understand the system accurately, it becomes increasingly difficult to acquire the desired information. In other words, more accurate processing of large amounts of data has become a basic condition for future information systems. This problem related to the efficient performance of the information system can be solved by building a semantic web which enables various information processing by expressing the collected data as an ontology that can be understood by not only people but also computers. For example, as in most other organizations, IT has been introduced in the military, and most of the work has been done through information systems. Currently, most of the work is done through information systems. As existing systems contain increasingly large amounts of data, efforts are needed to make the system easier to use through its data utilization. An ontology-based system has a large data semantic network through connection with other systems, and has a wide range of databases that can be utilized, and has the advantage of searching more precisely and quickly through relationships between predefined concepts. In this paper, we propose a defense ontology as a method for effective data management and decision support. In order to judge the applicability and effectiveness of the actual system, we reconstructed the existing air force munitions situation management system as an ontology based system. It is a system constructed to strengthen management and control of logistics situation of commanders and practitioners by providing real - time information on maintenance and distribution situation as it becomes difficult to use complicated logistics information system with large amount of data. Although it is a method to take pre-specified necessary information from the existing logistics system and display it as a web page, it is also difficult to confirm this system except for a few specified items in advance, and it is also time-consuming to extend the additional function if necessary And it is a system composed of category type without search function. Therefore, it has a disadvantage that it can be easily utilized only when the system is well known as in the existing system. The ontology-based logistics situation management system is designed to provide the intuitive visualization of the complex information of the existing logistics information system through the ontology. In order to construct the logistics situation management system through the ontology, And the useful functions such as performance - based logistics support contract management and component dictionary are further identified and included in the ontology. In order to confirm whether the constructed ontology can be used for decision support, it is necessary to implement a meaningful analysis function such as calculation of the utilization rate of the aircraft, inquiry about performance-based military contract. Especially, in contrast to building ontology database in ontology study in the past, in this study, time series data which change value according to time such as the state of aircraft by date are constructed by ontology, and through the constructed ontology, It is confirmed that it is possible to calculate the utilization rate based on various criteria as well as the computable utilization rate. In addition, the data related to performance-based logistics contracts introduced as a new maintenance method of aircraft and other munitions can be inquired into various contents, and it is easy to calculate performance indexes used in performance-based logistics contract through reasoning and functions. Of course, we propose a new performance index that complements the limitations of the currently applied performance indicators, and calculate it through the ontology, confirming the possibility of using the constructed ontology. Finally, it is possible to calculate the failure rate or reliability of each component, including MTBF data of the selected fault-tolerant item based on the actual part consumption performance. The reliability of the mission and the reliability of the system are calculated. In order to confirm the usability of the constructed ontology-based logistics situation management system, the proposed system through the Technology Acceptance Model (TAM), which is a representative model for measuring the acceptability of the technology, is more useful and convenient than the existing system.

Techniques for Acquisition of Moving Object Location in LBS (위치기반 서비스(LBS)를 위한 이동체 위치획득 기법)

  • Min, Gyeong-Uk;Jo, Dae-Su
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.885-896
    • /
    • 2003
  • The typws of service using location Information are being various and extending their domain as wireless internet tochnology is developing and its application par is widespread, so it is prospected that LBS(Location-Based Services) will be killer application in wireless internet services. This location information is basic and high value-added information, and this information services make prior GIS(Geographic Information System) to be useful to anybody. The acquisition of this location information from moving object is very important part in LBS. Also the interfacing of acquisition of moving object between MODB and telecommunication network is being very important function in LBS. After this, when LBS are familiar to everybody, we can predict that LBS system load is so heavy for the acquisition of so many subscribers and vehicles. That is to say, LBS platform performance is fallen off because of overhead increment of acquiring moving object between MODB and wireless telecommunication network. So, to make stable of LBS platform, in this MODB system, acquisition of moving object location par as reducing the number of acquisition of unneccessary moving object location. We study problems in acquiring a huge number of moving objects location and design some acquisition model using past moving patternof each object to reduce telecommunication overhead. And after implementation these models, we estimate performance of each model.

The Method for Real-time Complex Event Detection of Unstructured Big data (비정형 빅데이터의 실시간 복합 이벤트 탐지를 위한 기법)

  • Lee, Jun Heui;Baek, Sung Ha;Lee, Soon Jo;Bae, Hae Young
    • Spatial Information Research
    • /
    • v.20 no.5
    • /
    • pp.99-109
    • /
    • 2012
  • Recently, due to the growth of social media and spread of smart-phone, the amount of data has considerably increased by full use of SNS (Social Network Service). According to it, the Big Data concept is come up and many researchers are seeking solutions to make the best use of big data. To maximize the creative value of the big data held by many companies, it is required to combine them with existing data. The physical and theoretical storage structures of data sources are so different that a system which can integrate and manage them is needed. In order to process big data, MapReduce is developed as a system which has advantages over processing data fast by distributed processing. However, it is difficult to construct and store a system for all key words. Due to the process of storage and search, it is to some extent difficult to do real-time processing. And it makes extra expenses to process complex event without structure of processing different data. In order to solve this problem, the existing Complex Event Processing System is supposed to be used. When it comes to complex event processing system, it gets data from different sources and combines them with each other to make it possible to do complex event processing that is useful for real-time processing specially in stream data. Nevertheless, unstructured data based on text of SNS and internet articles is managed as text type and there is a need to compare strings every time the query processing should be done. And it results in poor performance. Therefore, we try to make it possible to manage unstructured data and do query process fast in complex event processing system. And we extend the data complex function for giving theoretical schema of string. It is completed by changing the string key word into integer type with filtering which uses keyword set. In addition, by using the Complex Event Processing System and processing stream data at real-time of in-memory, we try to reduce the time of reading the query processing after it is stored in the disk.

Immunological mechanism of Aging : T & B cell changes (면역학적 노화 기전에 관한 연구: T 및 B 세포의 변화)

  • Kim, Jay Sik;Lee, Won Kil;Suh, Jang Soo;Song, Kyung Eun;Lee, Joong Won;Lee, Nan Young;Weksler, Marc E.
    • IMMUNE NETWORK
    • /
    • v.1 no.3
    • /
    • pp.236-243
    • /
    • 2001
  • Background: An immunological approach for aging mechanism appears to be important. Lymphocyte subsets analysis in peripheral blood is widely performed to assess the immune status and to diagnose and monitor various diseases. Some lymphocyte subsets are known to change with age, but only few data about age-related reference ragnes for these subsets in healthy individuals have been reported. So we attempted to report reference ranges for these subsets in each age group and review changes of the results with age for the secondary studies about immune cell function as lymphocyte blast transformation and immunoglobulin gene rearrangement (VDJ) including recombination activating genes (RAG-1 and RAG-2). Methods: Lymphocyte subset analysis was performed on 302 subjects, 189 males and 113 females with age group of all decades of life. Two color direct immunofluorescene flow cytometry (FCM) was done using $Simultest^{TM}$ IMK-Lymphocyte kit (Becton Dickinson, USA), $FACScan^{TM}$ (Becton Dickinson, USA) and $FACSCalibur^{TM}$ (Becton Dickinson, USA). Lymphocyte subsets analysed were T ($CD3^+$) and B cells ($CD19^+$), helper/inducer T ($CD4^+$) and suppressor/cytotoxic T cells ($CD8^+$), helper/suppressor ($CD4^+/CD8^+$) ratio and natural killer (NK) cells ($CD3^-CD16^+/CD56^+$). The absolute numbers of each subset were calculated from total lymphocyte counts. Data collected was analysed using SAS 6.12. A P-value of < 0.05 was considered significant. Results: We reported the counts and percentages of lymphocyte and these subsets in each age group. There were no statistically significant differences between male and female subjects. The percentage of $CD4^+$ T cells, and the count of NK cells did not show the significant difference among the various age groups. The age-related changes observed in our study were as following: 1) a decrease in the percentages of T cells, B cells and $CD8^+$ T cells ; 2) a decrease in the counts of B cells and $CD8^+$ T cells ; 3) an increase in the percentage and count of NK cells ; and 4) an increase in the $CD4^+/CD8^+$ ratio. Conclusion: The characteristics of aging process appeared to be showing a marked decrease of lympocyte subsets T and B cells as well as T8 ($CD8^+$). The age-related increase of the percentage of cells bearing NK marker can be interpreted as a compensatory consequence to cope with the decrease of T cells related to the thymic involution. These changes with age appeared to be for the secondary study about immune cell function as lymphocyte blast transformation and immunoglobulin gene rearrangement.

  • PDF