• Title/Summary/Keyword: incident detection

Search Result 235, Processing Time 0.026 seconds

Split-spectrum Processing for Improved Flaw Detectability by Ultrasound System ("Split-Spectrum Processing"을 사용(使用)해서 (결정립(結晶粒) 크기에 따른) 초음파(超音波) 결함판독(缺陷判讀) 개선(改善))

  • Koo, Kil-Mo;Shim, Chul-Moo;Ahn, Byeong-Wan
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.7 no.2
    • /
    • pp.8-15
    • /
    • 1988
  • A split-spectrum processing technique for an ultrasonic flaw detection system has been developed, which improves the flaw-to-grain echo ratio in large-grained materials. The enhancement is achieved by partitioning a wide-band received spectrum to obtain frequency shifted bands, which are then processed to suppress the grain echoes with respect to the flaw echo, using a novel signal minimization algorithm. A technique for suppression of grain echoes has also been devised which takes advantage of the fact that the grain echo amplitude changes with the frequency of the incident ultrasound whereas the flaw echo amplitude does not. The combination of this technique and the new flaw detection system greatly improve the capabilities of ultrasonic evaluation of large grain materials.

  • PDF

Flaw Detection of Petrochemical Pipes using Torsional Waves (비틀림파를 이용한 석유화학 파이프의 결함탐지)

  • Park, K.J.;Kang, W.S.;Kang, D.J.
    • Journal of Power System Engineering
    • /
    • v.14 no.3
    • /
    • pp.46-51
    • /
    • 2010
  • A torsional guided wave was applied to detect a defect in petrochemical pipes. Phase and group velocity dispersion curves for the longitudinal and torsional modes of the inspected pipe were presented for the theoretical analysis. It was found through mode shape analysis that there was mode conversion when torsional wave is incident at an asymmetric defect. An artificial notch was fabricated in the pipe and the detectability was examined from the distance 2m of the end of the pipe by using magnetostrictive sensors. The relativities between the amplitude of the reflected signal and the size of the defect was examined. It was shown that the T(0,1) mode could be used for the long range inspection for the petrochemical pipes.

Development of An Automatic Incident Detection Model Using Wilcoxon Rank Sum Test (Wilcoxon Rank Sum Test 기법을 이용한 자동돌발상황검지 모형 개발)

  • 이상민;이승환
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.6
    • /
    • pp.81-98
    • /
    • 2002
  • 본 연구는 Wilcoxon Rank Sum Test 기법을 이용한 자동 돌발상황 검지 모형을 개발하는 것이다. 본 연구의 수행을 위하여 고속도로에 설치된 루프 차량 검지기(Loop Vehicle Detection System)에서 수집된 점유율 데이터를 사용하였다. 기존의 검지모형은 산정하기가 까다로운 임계치에 의하여 돌발상황을 검지하는 방식이었다. 반면 본 연구 모델은 위치와 시간대 교통 패턴에 관계없이 모형을 일정하게 적용하며, 지속적으로 돌발상황 지점과 상·하류의 교통패턴을 비교 검정 기법인 Wilcoxon Rank Sum Test 기법을 사용하여 돌발상황 검지를 수행하도록 하였다. 연구모형의 검증을 위한 테스트 결과 시간과 위치에 관계없이 정확하고 빠른 검지시간(돌발 상황 발생 후 2∼3분)을 가짐을 알 수 있었다. 또한 기존의 모형인 APID, DES, DELOS모형과 비교검증을 위하여 검지율 및 오보율 테스트를 수행한 결과 향상된 검지 능력(검지율 : 89.01%, 오보율 : 0.97%)을 나타남을 알 수 있었다. 그러나 압축파와 같은 유사 돌발상황이 발생되면 제대로 검지를 하지 못하는 단점을 가지고 있으며 향후 이에 대한 연구가 추가된다면 더욱 신뢰성 있는 검지모형으로 발전할 것이다.

Effect of two-photon spatial bunching on single photon detection rates (광자쌍의 뭉침현상이 단일계수에 미치는 영향)

  • 김헌오;신하림;박구동;김태수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.6
    • /
    • pp.573-577
    • /
    • 2003
  • We report an effect of photon pairs on single-photon detection rates, while Hong-Ou-Handel's two-photon interference experiment is performed with photons produced in noncollinear type-I parametric down-conversion. Photon pairing behavior or spatial bunching is measured and shown to cause a decrease in the single photon counting rate. Such a dip is found to result from the fact that the single-photon timing resolution of photodetectors is much longer compared to the time interval between the two photons incident on the single-photon detector.

Multi-spectral Mueller Matrix Imaging for Wheat Stripe Rust

  • Yang Feng;Tianyu He;Wenyi Ren;Dan Wu;Rui Zhang;Yingge Xie
    • Current Optics and Photonics
    • /
    • v.8 no.2
    • /
    • pp.192-200
    • /
    • 2024
  • Wheat stripe rust, caused by Puccinia striiformis, has reduced winter wheat yield globally for ages. In this work, multi-spectral Mueller matrix imaging with 37 measurements using the method of double rotatable quarter-wave plates was used to investigate wheat stripe rust. Individual Mueller matrix measurements were performed on incident monochromatic light with nine bands in the range of 430 to 690 nm. As a result, it was found that the infected area absorbed linearly polarized light and was sensitive to circularly polarized light in the spectral domain. Both linear depolarization and linear diattenuation images distinguished between wheat stripe rust and healthy tissue. The responsiveness of stripe rust to polarized light reveals the potential of using polarization imaging to detect plant diseases. This further suggests that the multi-spectral Mueller matrix imaging system provides us with an alternative approach to agricultural disease detection.

Advanced Nanoscale Characterization of Cement Based Materials Using X-Ray Synchrotron Radiation: A Review

  • Chae, Sejung R.;Moon, Juhyuk;Yoon, Seyoon;Bae, Sungchul;Levitz, Pierre;Winarski, Robert;Monteiro, Paulo J.M.
    • International Journal of Concrete Structures and Materials
    • /
    • v.7 no.2
    • /
    • pp.95-110
    • /
    • 2013
  • We report various synchrotron radiation laboratory based techniques used to characterize cement based materials in nanometer scale. High resolution X-ray transmission imaging combined with a rotational axis allows for rendering of samples in three dimensions revealing volumetric details. Scanning transmission X-ray microscope combines high spatial resolution imaging with high spectral resolution of the incident beam to reveal X-ray absorption near edge structure variations in the material nanostructure. Microdiffraction scans the surface of a sample to map its high order reflection or crystallographic variations with a micron-sized incident beam. High pressure X-ray diffraction measures compressibility of pure phase materials. Unique results of studies using the above tools are discussed-a study of pores, connectivity, and morphology of a 2,000 year old concrete using nanotomography; detection of localized and varying silicate chain depolymerization in Al-substituted tobermorite, and quantification of monosulfate distribution in tricalcium aluminate hydration using scanning transmission X-ray microscopy; detection and mapping of hydration products in high volume fly ash paste using microdiffraction; and determination of mechanical properties of various AFm phases using high pressure X-ray diffraction.

Imaging of Harmonic Wave Generated by Contact Acoustic Nonlinearity in Obliquely Incident Ultrasonic Wave (경사입사 초음파에서 계면 접촉 음향 비선형성에 의해 발생한 고조파의 영상화)

  • Yun, Dong-Seok;Choi, Sung-Ho;Kim, Chung-Seok;Jhang, Kyung-Young
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.32 no.4
    • /
    • pp.362-368
    • /
    • 2012
  • The objective of this study is to image the harmonic wave generated by contact acoustic nonlinearity in obliquely incident ultrasonic wave for early detection of closed cracks. A closed crack has been simulated by contacting two aluminum block specimens producing solid-solid contact interfaces and then acoustic nonlinearity has been imaged with contact pressure. Sampling phased array(SPA) and synthetic aperture focusing technique(SAFT) are used for imaging techniques. The amplitude of the fundamental frequency decreased with appling pressure. But, the amplitude of second harmonic increased with pressure and was a maximum amplitude at the simulation point of closed crack. Then, the amplitude of second harmonic decreased. As a result, harmonic imaging of contact acoustic nonlinearity is possible and it is expected to be apply for early detection of initial cracks.

Windows 7 Operating System Event based Visual Incident Analysis System (윈도우즈 7 운영체제 이벤트에 대한 시각적 침해사고 분석 시스템)

  • Lee, Hyung-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.223-232
    • /
    • 2012
  • Recently, the leakage of personal information and privacy piracy increase. The victimized case of the malicious object rapidlies increase. Most of users use the windows operating system. Recently, the Windows 7 operating system was announced. Therefore, we need to study for the intrusion response technique at the next generation operate system circumstances. The accident response technique developed till now was mostly implemented around the Windows XP or the Windows Vista. However, a new vulnerability problem will be happen in the breach process of reaction as the Windows 7 operating system is announced. In the windows operating system, the system incident event needs to be efficiently analyzed. For this, the event information generated in a system needs to be visually analyzed around the time information or the security threat weight information. Therefore, in this research, we analyzed visually about the system event information generated in the Windows 7 operating system. And the system analyzing the system incident through the visual event information analysis process was designed and implemented. In case of using the system developed in this study the more efficient accident analysis is expected to be possible.

An experimental study on the ignition of dusts behind reflected shock waves (고체미립자의 반사압축파에 의한 점화에 관한 실험적 연구)

  • 백승옥
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.11 no.1
    • /
    • pp.118-123
    • /
    • 1987
  • In relation to the dust detonatians which have imposed severe damages on the industry, the ignitability of various dusts has been investigated on a horizontal shock tube in this study. By using a newly designed air injector, very well-distributed clouds could be obtained. The proper reflected shock conditions have been generated by placing a reflector 1.5cm behind the air injector, which reflected the incident shock wave. The incident shock waves in the range of Mach number 2.8-3.3 created the postreflected shock temperature of 1200-1600K. Experimentally the ignition delay was defined as the time interval between the arrival of a reflected shock wave at dusts and the detection of visible light. Measured ignition delays of dusts investigated were located lower than 1msec under the above conditions. These values are one-order higher than those in the incident shock wave condition. In this type of ignitiion process the following three processes are considered to play important roles; heating of a particle, generation of volatile gas by endothermic devolatilization process, and its diffusion from the particle surface and the formation of stoichiometric mixture with oxidizer.

A Cause-Effect Model for Human Resource Management (정보시스템의 효율적인 인적자원 관리를 위한 Cause-Effect, Model의 활용)

  • Lee, Nam-Hoon;In, Hoh;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.161-169
    • /
    • 2006
  • According to the development of information system, many information system and application soft-ware are develop. However, cyber attack and incident have more increased to the development of them. To defend from cyber attack and incident, many organizations has run information security systems, such as Intrusion Detection System, Firewall, VPN etc, and employed information Security person till now But they have many difficulty in operating these information security component because of the lack of organizational management and analysis of each role. In this paper, We propose the formal Cause-Effect Model related with the information security system and administrative mission per each security. In this model, we regard information system and information system operator as one information component. It is possible to compose the most suitable information component, such as information system, human resource etc., according to the analysis of Cause-Effect Model in this paper. These analysis and approaching methodology can make effective operation of each limited resource in organization and effective defense mechanism against many malicious cyber attack and incident.

  • PDF