• Title/Summary/Keyword: Event Identification

Search Result 224, Processing Time 0.035 seconds

FIRE PROPAGATION EQUATION FOR THE EXPLICIT IDENTIFICATION OF FIRE SCENARIOS IN A FIRE PSA

  • Lim, Ho-Gon;Han, Sang-Hoon;Moon, Joo-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.43 no.3
    • /
    • pp.271-278
    • /
    • 2011
  • When performing fire PSA in a nuclear power plant, an event mapping method, using an internal event PSA model, is widely used to reduce the resources used by fire PSA model development. Feasible initiating events and component failure events due to fire are identified to transform the fault tree (FT) for an internal event PSA into one for a fire PSA using the event mapping method. A surrogate event or damage term method is used to condition the FT of the internal PSA. The surrogate event or the damage term plays the role of flagging whether the system/component in a fire compartment is damaged or not, depending on the fire being initiated from a specified compartment. These methods usually require explicit states of all compartments to be modeled in a fire area. Fire event scenarios, when using explicit identification, such as surrogate or damage terms, have two problems: (1) there is no consideration of multiple fire propagation beyond a single propagation to an adjacent compartment, and (2) there is no consideration of simultaneous fire propagations in which an initiating fire event is propagated to multiple paths simultaneously. The present paper suggests a fire propagation equation to identify all possible fire event scenarios for an explicitly treated fire event scenario in the fire PSA. Also, a method for separating fire events was developed to make all fire events a set of mutually exclusive events, which can facilitate arithmetic summation in fire risk quantification. A simple example is given to confirm the applicability of the present method for a $2{\times}3$ rectangular fire area. Also, a feasible asymptotic approach is discussed to reduce the computational burden for fire risk quantification.

Adapted Sequential Pattern Mining Algorithms for Business Service Identification (비즈니스 서비스 식별을 위한 변형 순차패턴 마이닝 알고리즘)

  • Lee, Jung-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.87-99
    • /
    • 2009
  • The top-down method for SOA delivery is recommended as a best way to take advantage of SOA. The core step of SOA delivery is the step of service modeling including service analysis and design based on ontology. Most enterprises know that the top-down approach is the best but they are hesitant to employ it because it requires them to invest a great deal of time and money without it showing any immediate results, particularly because they use well-defined component based systems. In this paper, we propose a service identification method to use a well-defined components maximally as a bottom-up approach. We assume that user's inputs generates events on a GUI and the approximate business process can be obtained from concatenating the event paths. We first find the core GUIs which have many outgoing event calls and form event paths by concatenating the event calls between the GUIs. Next, we adapt sequential pattern mining algorithms to find the maximal frequent event paths. As an experiment, we obtained business services with various granularity by applying a cohesion metric to extracted frequent event paths.

Development of a multiplex PCR method for identification of four genetically modified maize lines and its application in living modified organism identification

  • Park, Jin Ho;Seol, Min-A;Eum, Soon-Jae;Kim, Il Ryong;Lim, Hye Song;Lee, Jung Ro;Choi, Wonkyun
    • Journal of Plant Biotechnology
    • /
    • v.47 no.4
    • /
    • pp.309-315
    • /
    • 2020
  • Advances in biotechnology have led to progress in crop genetic engineering to improve agricultural productivity. The use of genetically modified (GM) crops has increased, as have consumers' and regulators' concerns about the safety of GM crops to human health, and ecological biodiversity. As such, the identification of GM crops is a critical issue for developers and distributors, and their labeling is mandatory. Multiplex polymerase chain reaction (PCR) has been developed and its use validated for the detection and identification of GM crops in quarantine. Herein, we established a simultaneous detection method to identify four GM maize events. Event-specific primers were designed between the junction region of transgene and genome of four GM maize lines, namely 5307, DAS-40278-9, MON87460, and MON87427. To verify the efficiency and accuracy of the multiplex PCR we used specificity analysis, limit of detection evaluation, and mixed certified reference materials identification. The multiplex PCR method was applied to analyze 29 living, modified maize volunteers collected in South Korea in 2018 and 2019. We performed multiplex PCR analysis to identify events and confirmed the result by simplex PCR using each event-specific primer. As a result, rather than detecting each event individually, the simultaneous detection PCR method enabled the rapid analysis of 29 GM maize volunteers. Thus, the novel multiplex PCR method is applicable for living modified organism volunteer identification.

Vital Area Identification Rule Development and Its Application for the Physical Protection of Nuclear Power Plants (원자력발전소의 물리적방호를 위한 핵심구역파악 규칙 개발 및 적용)

  • Jung, Woo Sik;Hwang, Mee-Jeong;Kang, Minho
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.3
    • /
    • pp.160-171
    • /
    • 2017
  • US national research laboratories developed the first Vital Area Identification (VAI) method for the physical protection of nuclear power plants that is based on Event Tree Analysis (ETA) and Fault Tree Analysis (FTA) techniques in 1970s. Then, Korea Atomic Energy Research Institute proposed advanced VAI method that takes advantage of fire and flooding Probabilistic Safety Assessment (PSA) results. In this study, in order to minimize the burden and difficulty of VAI, (1) a set of streamlined VAI rules were developed, and (2) this set of rules was applied to PSA fault tree and event tree at the initial stage of VAI process. This new rule-based VAI method is explained, and its efficiency and correctness are demonstrated throughout this paper. This new rule-based VAI method drastically reduces problem size by (1) performing PSA event tree simplification by applying VAI rules to the PSA event tree, (2) calculating preliminary prevention sets with event tree headings, (3) converting the shortest preliminary prevention set into a sabotage fault tree, and (4) performing usual VAI procedure. Since this new rule-based VAI method drastically reduces VAI problem size, it provides very quick and economical VAI procedure. In spite of an extremely reduced sabotage fault tree, this method generates identical vital areas to those by traditional VAI method. It is strongly recommended that this new rule-based VAI method be applied to the physical protection of nuclear power plants and other complex safety-critical systems such as chemical and military systems.

Design and Implementation of Business Event Framework for Developing RFID Applications (효과적인 RFID 애플리케이션 개발을 위한 비즈니스 이벤트 프레임워크의 설계 및 구현)

  • Yu, Sun-Mee;Lee, Chan-Young;Moon, Mi-Kyeong;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.14D no.2
    • /
    • pp.211-216
    • /
    • 2007
  • Radio Frequency Identification(RFID) is technology that identify products using radio frequency transmission. We read EPC from Tag in RFID environment, but we can see only what the identify objects are and it is too limited to get the additional detailed information by the EPC. Therefore many companies and organizations have studied RFID system in order to effectively use it. But the existing RFID system still has the complication that we should fully understand various knowledges, communicating ways, etc, and the insufficiency to support the application development in order to treat the business event of the related application. In this paper, I propose business event that we can conveniently use in FRID application and shows Business Event Framework. BEF which is able to deliver the business event produced to the application.

A Semantic Aspect-Based Vector Space Model to Identify the Event Evolution Relationship within Topics

  • Xi, Yaoyi;Li, Bicheng;Liu, Yang
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.2
    • /
    • pp.73-82
    • /
    • 2015
  • Understanding how the topic evolves is an important and challenging task. A topic usually consists of multiple related events, and the accurate identification of event evolution relationship plays an important role in topic evolution analysis. Existing research has used the traditional vector space model to represent the event, which cannot be used to accurately compute the semantic similarity between events. This has led to poor performance in identifying event evolution relationship. This paper suggests constructing a semantic aspect-based vector space model to represent the event: First, use hierarchical Dirichlet process to mine the semantic aspects. Then, construct a semantic aspect-based vector space model according to these aspects. Finally, represent each event as a point and measure the semantic relatedness between events in the space. According to our evaluation experiments, the performance of our proposed technique is promising and significantly outperforms the baseline methods.

Identification and Analysis of External Event Combinations for Hanhikivi 1 PRA

  • Helander, Juho
    • Nuclear Engineering and Technology
    • /
    • v.49 no.2
    • /
    • pp.380-386
    • /
    • 2017
  • Fennovoima's nuclear power plant, Hanhikivi 1, $Pyh{\ddot{a}}joki$, Finland, is currently in design phase, and its construction is scheduled to begin in 2018 and electricity production in 2024. The objective of this paper is to produce a preliminary list of safety-significant external event combinations including preliminary probability estimates, to be used in the probabilistic risk assessment of Hanhikivi 1 plant. Starting from the list of relevant single events, the relevant event combinations are identified based on seasonal variation, preconditions related to different events, and dependencies (fundamental and cascade type) between events. Using this method yields 30 relevant event combinations of two events for the Hanhikivi site. The preliminary probability of each combination is evaluated, and event combinations with extremely low probability are excluded from further analysis. Event combinations of three or more events are identified by adding possible events to the remaining combinations of two events. Finally, 10 relevant combinations of two events and three relevant combinations of three events remain. The results shall be considered preliminary and will be updated after evaluating more detailed effects of different events on plant safety.

Design of Intrusion Detection System Using Event Sequence Tracking (Event Sequence Tracking을 이용한 침입 감지 시스템의 설계)

  • 최송관;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.115-125
    • /
    • 1995
  • 본 논문에서는 컴퓨터 시스템에서 침입 감지 시스템을 설계함에 있어서 사용될 수 있는 새로운 방법인 Event Sequence Tracking 방법을 제안하였다. Event Sequence Tracking 방법에서는 컴퓨터 시스템의 공격방법을 크게 두가지로 분류한다. 첫번째는 일련의 시스템 명령어를 이용한 공격방법이고 두번째는 침입자 자신이 만들었거나 다른 사람으로부터 얻은 프로그램을 이용하는 방법이다. 첫번째 공격방법에 대한 감지방법은 시스템을 공격할 때 사용한 일련의 시스템 명령어들을 감사 데이타를 분석하여 찾아내고 이 결과를 기존에 알려진 공격 시나리오들과 비교하여 침입자를 찾아내는 방식이다. 두번째 공격방법에 대한 감지 방법은 보안 관리자가 정해놓은, 시스템에서 일반 사용자가 할 수 없는 행위에 관한 보안 정책에 따라 Key-Event 데이타 베이스를 만들고 여기에 해당하는 event의 집합을 감사 데이타에서 찾아내는 방법이다. Event Sequence Tracking 방법은 Rule-based Penetration Identification 방법의 일종으로서 시스템의 공격방법을 분류하여 컴퓨터 시스템에의 침입을 효과적으로 감지할 수 있다는 것과 rule-base의 생성과 갱신을 함에 있어서 보다 간단하게 할 수 있다는 장점을 갖는다.

  • PDF

Overall damage identification of flag-shaped hysteresis systems under seismic excitation

  • Zhou, Cong;Chase, J. Geoffrey;Rodgers, Geoffrey W.;Xu, Chao;Tomlinson, Hamish
    • Smart Structures and Systems
    • /
    • v.16 no.1
    • /
    • pp.163-181
    • /
    • 2015
  • This research investigates the structural health monitoring of nonlinear structures after a major seismic event. It considers the identification of flag-shaped or pinched hysteresis behavior in response to structures as a more general case of a normal hysteresis curve without pinching. The method is based on the overall least squares methods and the log likelihood ratio test. In particular, the structural response is divided into different loading and unloading sub-half cycles. The overall least squares analysis is first implemented to obtain the minimum residual mean square estimates of structural parameters for each sub-half cycle with the number of segments assumed. The log likelihood ratio test is used to assess the likelihood of these nonlinear segments being true representations in the presence of noise and model error. The resulting regression coefficients for identified segmented regression models are finally used to obtain stiffness, yielding deformation and energy dissipation parameters. The performance of the method is illustrated using a single degree of freedom system and a suite of 20 earthquake records. RMS noise of 5%, 10%, 15% and 20% is added to the response data to assess the robustness of the identification routine. The proposed method is computationally efficient and accurate in identifying the damage parameters within 10% average of the known values even with 20% added noise. The method requires no user input and could thus be automated and performed in real-time for each sub-half cycle, with results available effectively immediately after an event as well as during an event, if required.

Efficient Class Identification based on Event (이벤트 기반의 효율적인 클래스 식별)

  • Choi, Mi-Sook;Lee, Jong-Suk
    • Journal of Digital Contents Society
    • /
    • v.9 no.2
    • /
    • pp.165-175
    • /
    • 2008
  • Currently, software development methods have been advanced to service-oriented from component-oriented, to component-oriented from object-oriented. The component-oriented and service-oriented software development methods are analyzed by object-oriented UML model. So, the efficient analysis method for object-oriented UML model needs. In this paper, we suggest the analysis guideline and process based on event using Input Data-Process-Output Data Table for identifying use cases and classes efficiently. And the suggested method complements the problems depending the developer's perspective and experience.

  • PDF