• Title/Summary/Keyword: number of Event

Search Result 900, Processing Time 0.031 seconds

A Fuzzy-based Risk Assessment using Uncertainty Model (불확실성 모델을 사용한 퍼지 위험도분석)

  • Choi Hyun-Ho;Seo Jong-Won;Jung Pyung-Ki
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.473-476
    • /
    • 2003
  • This paper presents a systematic risk assessment procedure with uncertainty modeling for general construction projects. Since the approach is able to effectively deal with all the related construction risks in terms of the assumed probability with conditional probability concept that systematically incorporate expert's experiences and subjective judgement, the proposed methods with uncertainty modeling is able to apply to all the construction projects inherent in lots of uncertain risk events. The fuzzy set theory is adopted to enhance risk assessment to effectively handle the vague and dynamic phenomenon of an event Therefore, the fuzzy-based risk assessment is very useful, for those countries, such as Korea, where objective probabilistic data for risk assessment is extremely rare, and thus the utilization of subjective judgmental data based on expert's experiences is inevitable.

  • PDF

Implementation of u-Care System Based on Multi-Sensor in u-Home Environment (u-Home 환경에서 멀티센서 기반 u-Care System 구현)

  • Lee, Hee-Jeong;Kang, Sin-Jae;Jang, Hyung-Geun;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.135-147
    • /
    • 2011
  • As the number of elderly people living alone has been increasing in the recent years, systems for their safety have been required, and some related services or pilot systems have been operating. These systems provide the monitoring service for the activities of the elderly people living alone with indoor location tracking technology using the various sensors. However, most systems provide services on expensive infrastructure such as attached tags and mobile devices. In this point, this paper attempts to suggest a system based on low cost sensors to collect event data in home environment. And a main characteristic of the system is that people can monitor the results of provided services through web browser in real time and the system can provide related context information to guardians and health care managers through SMS of mobile phone.

Modeling and Simulation of Fuzzy based Propagation Limiting Method for message routing in Wireless Sensor Networks (무선 센서 네트워크에서 메시지 라우팅을 위한 퍼지 기반 전달 영역 제한 기법의 모델링 및 시뮬레이션)

  • Chi, Sang-Hoon;Lee, Hae-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.29-39
    • /
    • 2006
  • Sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. A number of routing protocols to transmit the data between the base station and sensor nodes have been proposed. Intanagonwiwat et al. proposed the directed diffusion in which the base station sends interest messages and waits for data from the nodes in the specific regions. Since the directed diffusion propagates every interest message to whole nodes in the network, it causes energy dissipation of nodes. In this paper, we propose a novel data propagation method, which limits the data transmission area according to a threshold value for reducing the energy consumption in the network. A fuzzy logic is exploited to determine the threshold value by considering the energy and density of all the deployed nodes. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

An Image forgery protection for real-time vehicle black box using PingPong-256MAC (PingPong-256MAC을 이용한 차량용 블랙박스 실시간 영상 위변조 방지 기술)

  • Kim, HyunHo;Kim, Min-Kyu;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.241-244
    • /
    • 2018
  • Domestic vehicle registration is continuously increasing every year, traffic accidents are also increasing by an increase in the number of vehicles. In the event of a traffic accident, the perpetrator and the victim should be judged and handled appropriately. When judging the accident situation, the black box is what evidence can be except for witness who is at the accident scene. The black box becomes an essential role in order to prevent traffic accidents. However, there is no way to prove integrity by evidence corruption, fabrication and etc. For this reason, we propose a method to guarantee the integrity of image through hash value generated by using PingPong 256 encryption algorithm for integrity verification in this paper.

  • PDF

A Condition Processing System of Active Rules Using Analyzing Condition Predicates (조건 술어 분석을 이용한 능동규칙의 조건부 처리 시스템)

  • Lee, Gi-Uk;Kim, Tae-Sik
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.21-30
    • /
    • 2002
  • The active database system introduces the active rules detecting specified state. As the condition evaluation of the active rules is performed every time an event occurs, the performance of the system has a great influence, depending on the conditions processing method. In this paper, we propose the conditions processing system with the preprocessor which determines the delta tree structure, constructs the classification tree, and generates the aggregate function table. Due to the characteristics of the active database through which the active rules can be comprehended beforehand, the preprocessor can be introduced. In this paper, the delta tree which can effectively process the join, selection operations, and the aggregate function is suggested, and it can enhance the condition evaluation performance. And we propose the classification tree which effectively processes the join operation and the aggregate function table processing the aggregate function which demands high cost. In this paper, the conditions processing system can be expected to enhance the performance of conditions processing in the active rules as the number of conditions comparison decreases because of the structure which is made in the preprocessor.

A Study on Improvement of Evacuation Safety at Daycare Center (어린이집 피난안전 향상에 관한 연구)

  • Jin, Seung-Hee
    • Fire Science and Engineering
    • /
    • v.31 no.1
    • /
    • pp.63-73
    • /
    • 2017
  • As more and more the number of a couple working together for living has increased and an interest in early education has risen, daycare centers have made an effort to provide effective and good service beyond 'nursery care'. The most important thing in building in the event of disasters is safe evacuation of occupants. Having 'safe evacuation route' is required to reduce damage caused by disasters, It is necessary to give continuous and repeated training for right evacuation to infant and children so that they can evacuation successfully. This study examined problems that need improvement so that evacuation instrument installed in daycare centers can be used better by analyzing a survey of evacuation related facilities on daycare centers. This study found that laws and regulations on safety should be improved, evacuation facilities prepared against should be maintained regularly by relevant authorities, training for coping with disasters should be provied and evacuation instruments which are suitable for children.

Automatic Test Report Recording Program Design and Implementation for Integration Test (통합시험을 위한 자동 시험일지 작성프로그램 설계 및 구현)

  • Jeong, Younghwan;Song, Kyoungrok;Lee, Wonsik;Wi, Sounghyouk
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.1
    • /
    • pp.33-39
    • /
    • 2018
  • For the integration test in the current field of defense simulation, each actual equipment and simulator's logging information is automated. Although the event of the integrated test system is written in the test log, it is not automated, and relies on the operator's handwriting or file creation, resulting in ineffective aspects such as low-quality record content and repetition of the same content. In this study, we propose the automatic test report recording program that solves these problems. Automatic test report recording program uses framework-based technology to receive information from the test control computer and user to record a log of the test log. Automatic test report recording program allows the user to record the repeated test content in a stable manner. Additionally, even if the number of test operators is limited, the efficiency is improved so that we can fucus on the integration test.

Convolutional neural network based amphibian sound classification using covariance and modulogram (공분산과 모듈로그램을 이용한 콘볼루션 신경망 기반 양서류 울음소리 구별)

  • Ko, Kyungdeuk;Park, Sangwook;Ko, Hanseok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.37 no.1
    • /
    • pp.60-65
    • /
    • 2018
  • In this paper, a covariance matrix and modulogram are proposed for realizing amphibian sound classification using CNN (Convolutional Neural Network). First of all, a database is established by collecting amphibians sounds including endangered species in natural environment. In order to apply the database to CNN, it is necessary to standardize acoustic signals with different lengths. To standardize the acoustic signals, covariance matrix that gives distribution information and modulogram that contains the information about change over time are extracted and used as input to CNN. The experiment is conducted by varying the number of a convolutional layer and a fully-connected layer. For performance assessment, several conventional methods are considered representing various feature extraction and classification approaches. From the results, it is confirmed that convolutional layer has a greater impact on performance than the fully-connected layer. Also, the performance based on CNN shows attaining the highest recognition rate with 99.07 % among the considered methods.

Data-Dissemination Mechanism used on Multiple Virtual Grids in Wireless Sensor Networks (무선센서 네트워크에서의 다중 가상 그리드를 이용한 데이터 전송 메커니즘)

  • Jin, Min-Sook;Lee, Eui-Sin;Park, Soo-Chang;Kim, Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.505-510
    • /
    • 2009
  • Sensor networks are composed of a great number of sensor nodes. Since all sensor nodes are energy-restricted and hard to recharge, it is very important.However, the energy consumption may significantly increase if mobile sources or sinks exist in sensor networks. The reason is that the routing information for mobile sources and sinks needs to be update frequently for efficientdata delivery. The routing algorithm supporting mobile sinks should consider not only continuous data delivery but also the energy consumption of sensor nodes. However, most of the existing research focuses on even energy consumption while the mobility of sinks and sources is rarely consider. In this paper, we propose an efficient routing protocol with multiple virtual grids to reduce energy consumption and improve packets delivery efficiency. Then this paper considers the mobility. Simulation results show that our algorithm can guarantee high data delivery ratio and lower average delivery delay, while consuming lower energy than existing routing protocols in sensor networks.

Android based Mobile Device Rooting Attack Detection and Response Mechanism using Events Extracted from Daemon Processes (안드로이드 기반 모바일 단말 루팅 공격에 대한 이벤트 추출 기반 대응 기법)

  • Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.479-490
    • /
    • 2013
  • Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note and Galaxy Tab 10.1. The malicious application can be distributed to currently used mobile devices through open market masquerading as an normal application. An attacker inserts malicious code into an application, which might threaten privacy by rooting attack. Once the rooting attack is successful, malicious code can collect and steal private data stored in mobile terminal, for example, SMS messages, contacts list, and public key certificate for banking. To protect the private information from the malicious attack, malicious code detection, rooting attack detection and countermeasure method are required. To meet this end, this paper investigates rooting attack mechanism for Android-platform mobile terminal. Based on that, this paper proposes countermeasure system that enables to extract and collect events related to attacks occurring from mobile terminal, which contributes to active protection from malicious attacks.