• Title/Summary/Keyword: violation rate

Search Result 77, Processing Time 0.03 seconds

Risk assessment of pesticide residues in fruits collected in Gyeonggi-do, Korea from 2006 to 2010 (경기도내 유통 과실류의 잔류농약 위해평가(2006~2010))

  • Do, Young-Sook;Kim, Jung-Beom;Kang, Suk-Ho;Kim, Nan-Young;Um, Mi-Na;Park, Yong-Bae;Oh, Mun-Seok;Yoon, Mi-Hye
    • The Korean Journal of Pesticide Science
    • /
    • v.16 no.2
    • /
    • pp.85-97
    • /
    • 2012
  • The monitoring of pesticide residues was performed on 33 fruit commodities collected in Gyeonggi-do, Korea from 2006 to 2010. Pesticide residues were detected in 431 samples (16.8%) of total 2,558 samples and violated in 12 samples (0.5%). Annual detection rate showed 6.9%~19.4% with the rate of violation of 0.3%~0.9%. Twenty three samples (69.7%) of 33 commodities were detected and 4 samples (12.1%) were violated. Eight pesticides (EPN, dicofol, carbaryl, procymidone, methidathion, prothiofos, fenitrothion and phenthoate) were violated and 62 pesticides were detected. Chloropyrifos was detected most frequently. The rate of detection and violation of citrus fruits in fruits showed the highest level. Organophosphorus pesticides (35%) and insecticide (57%) were detected most frequently. The hazard index (%ADI) of chronic dietary risk assessment by deterministic approach showed that the lower limit value and upper limit value for the whole population were 0.0000~0.7526 and 0.0000~1.3237 respectively. For the only consumer group, the lower limit value and upper limit value were 0.0006~9.7801 and 0.0058~15.9258 respectively. Therefore the hazard index for the whole population and the only consumer group were evaluated as a safe level.

Which country's end devices are most sharing vulnerabilities in East Asia? (거시적인 관점에서 바라본 취약점 공유 정도를 측정하는 방법에 대한 연구)

  • Kim, Kwangwon;Won, Yoon Ji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1281-1291
    • /
    • 2015
  • Compared to the past, people can control end devices via open channel. Although this open channel provides convenience to users, it frequently turns into a security hole. In this paper, we propose a new human-centered security risk analysis method that puts weight on the relationship between end devices. The measure derives from the concept of entropy rate, which is known as the uncertainty per a node in a network. As there are some limitations to use entropy rate as a measure in comparing different size of networks, we divide the entropy rate of a network by the maximum entropy rate of the network. Also, we show how to avoid the violation of irreducible, which is a precondition of the entropy rate of a random walk on a graph.

An Optimization Technique For Crane Acceleration Using A Genetic Algorithm (유전자알고리즘을 이용한 크레인가속도 최적화)

  • 박창권;김재량;정원지;홍대선;권장렬;박범석
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.1701-1704
    • /
    • 2003
  • This paper presents a new optimization technique of acceleration curve for a wafer transfer crane movement in which high speed and low vibration are desirable. This technique is based on a genetic algorithm with a penalty function for acceleration optimization under the assumption that an initial profile of acceleration curves constitutes the first generation of the genetic algorithm. Especially the penalty function consists of the violation of constraints and the number of violated constraints. The proposed penalty function makes the convergence rate of optimization process using the genetic algorithm more faster than the case of genetic algorithm without a penalty function. The optimized acceleration of the crane through the genetic algorithm and commercial dynamic analysis software has shown to have accurate movement and low vibration.

  • PDF

Astronomy Potentials with Korean Neutrino Detector and Telescope

  • Kim, Soo-Bong
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.1
    • /
    • pp.35.4-36
    • /
    • 2017
  • A 250 kton water Cherenkov detector is proposed to be built in Korea to determine the CP violation phase and the neutrino mass ordering using a neutrino beam produced in J-PARC of Japan. It will be also a world-leading neutrino telescope to reveal the mystery of supernova explosion by observing a neutrino burst. The telescope is expected to detect more than 100,000 neutrinos in ten seconds from a supernova explosion in our Galaxy. The pointing accuracy will be better than 1 degree and be able to guide early optical telescope observations. The expected rate of supernova explosion in our galaxy is once per every 30 years in the most optimistic case or once per every 100 years in the worst case. If it is indeed observed, it will be a historical chance to study the supernova explosion mechanism in great details. In this talk, various astronomy potentials will be discussed if the Korean neutrino observatory is built.

  • PDF

Development of Genetic Algorithms for Efficient Constraints Handling (구속조건의 효율적인 처리를 위한 유전자 알고리즘의 개발)

  • Cho, Young-Suk;Choi, Dong-Hoon
    • Proceedings of the KSME Conference
    • /
    • 2000.04a
    • /
    • pp.725-730
    • /
    • 2000
  • Genetic algorithms based on the theory of natural selection, have been applied to many different fields, and have proven to be relatively robust means to search for global optimum and handle discontinuous or even discrete data. Genetic algorithms are widely used for unconstrained optimization problems. However, their application to constrained optimization problems remains unsettled. The most prevalent technique for coping with infeasible solutions is to penalize a population member for constraint violation. But, the weighting of a penalty for a particular problem constraint is usually determined in the heuristic way. Therefore this paper proposes, the effective technique for handling constraints, the ranking penalty method and hybrid genetic algorithms. And this paper proposes dynamic mutation tate to maintain the diversity in population. The effectiveness of the proposed algorithm is tested on several test problems and results are discussed.

  • PDF

Rate-Controlled Data-Driven Real-Time Stream Processing for an Autonomous Machine (자율 기기를 위한 속도가 제어된 데이터 기반 실시간 스트림 프로세싱)

  • Noh, Soonhyun;Hong, Seongsoo;Kim, Myungsun
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.4
    • /
    • pp.340-347
    • /
    • 2019
  • Due to advances in machine intelligence and increased demands for autonomous machines, the complexity of the underlying software platform is increasing at a rapid pace, overwhelming the developers with implementation details. We attempt to ease the burden that falls onto the developers by creating a graphical programming framework we named Splash. Splash is designed to provide an effective programming abstraction for autonomous machines that require stream processing. It also enables programmers to specify genuine, end-to-end timing constraints, which the Splash framework automatically monitors for violation. By utilizing the timing constraints, Splash provides three key language semantics: timing semantics, in-order delivery semantics, and rate-controlled data-driven stream processing semantics. These three semantics together collectively serve as a conceptual tool that can hide low-level details from programmers, allowing developers to focus on the main logic of their applications. In this paper, we introduce the three-language semantics in detail and explain their function in association with Splash's language constructs. Furthermore, we present the internal workings of the Splash programming framework and validate its effectiveness via a lane keeping assist system.

Along-Track Position Error Bound Estimation using Kalman Filter-Based RAIM for UAV Geofencing

  • Gihun, Nam;Junsoo, Kim;Dongchan, Min;Jiyun, Lee
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.1
    • /
    • pp.51-58
    • /
    • 2023
  • Geofencing supports unmanned aerial vehicle (UAV) operation by defining stay-in and stay-out regions. National Aeronautics and Space Administration (NASA) has developed a prototype of the geofencing function, SAFEGUARD, which prevents stayout region violation by utilizing position estimates. Thus, SAFEGUARD depends on navigation system performance, and the safety risk associated with the navigation system uncertainty should be considered. This study presents a methodology to compute the safety risk assessment-based along-track position error bound under nominal and Global Navigation Satellite Systems (GNSS) failure conditions. A Kalman filter system using pseudorange measurements as well as pseudorange rate measurements is considered for determining the position uncertainty induced by velocity uncertainty. The worst case pseudorange and pseudorange rate fault-based position error bound under the GNSS failure condition are derived by applying a Receiver Autonomous Integrity Monitor (RAIM). Position error bound simulations are also conducted for different GNSS fault hypotheses and constellation conditions with a GNSS/INS integrated navigation system. The results show that the proposed along-track position error bounds depend on satellite geometries caused by UAV attitude change and are reduced to about 40% of those of the single constellation case when using the dual constellation.

Consideration of CJK Joint Hanja Unicode when is used in AMI/HDB-3 Line Coding (AMI/HDB-3 회선부호화와 한·중·일 한자 유니코드 체계 고찰)

  • Tai, Dong-Zhen;Hong, Wan Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1011-1015
    • /
    • 2013
  • This paper analyses the violation rate of CJK joint Chines character Unicode to the source code rule. In the paper, Chinese character 150ea in Chinese Unicode which have relatively a higher frequency in use of a character was chosen to study. The frequency rate in use of the 150ea characters is about 50% of the total frequency rate of the Chinese characters. The study was applied the AMI/HDB-3 line coding/scrambling and HDLC protocol, According to the analyses, the number of violated characters were 77ea of 150 ea, frequency rate in use 29%. Therefore, when the violated 77ea characters are replaced to the matched character codes to the source coding rule, the processing rate of the line coder can be improved about 37%.

Study on the Appropriate Time for Leading Pedestrian Intervals (보행자 우선 출발신호의 적정 시간 산출 연구)

  • Kim, Daekyung;Yoon, Suyoung;Yoon, Jinsoo;Kim, Sang-Ock;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.3
    • /
    • pp.1-13
    • /
    • 2020
  • When pedestrians cross a pedestrian crossing during a pedestrian signal, there is a problem that pedestrians are exposed to the danger of traffic accidents due to permissive-left turning and right-turning vehicles. In order to solve this problem, there is an increasing demand to improve the traffic signal system to increase pedestrian safety at the signal crossing. This study aims to examine the feasibility of introducing a leading pedestrian interval(LPI) to prevent conflict between unprotected left and right turn vehicles and pedestrians. In this study, the need for LPI was surveyed by experts and the general public. As a result of the survey, many opinions indicated that the introduction of LPI was necessary. In addition, after selecting the non-protected left and right turn pilot operation targets, LPI was installed on two signal intersections. After installation, the speed analysis of the arrival vehicle in the pedestrian crossing and the violation rate of the pedestrian signal were analyzed. As a result of analysis, when the walking signal was equalized, the speed of the arriving vehicle in the pedestrian crossing was reduced, and the violation rate of the walking signal was improved.

A Study on the Parking Supply and Management Strategics for Multi-Family Housing Sites (공동주택 주차공급 및 관리방안 연구)

  • 안정근
    • Journal of Korean Society of Transportation
    • /
    • v.17 no.2
    • /
    • pp.41-53
    • /
    • 1999
  • The rate of automobile ownerships has been increased significantly in multi-family housing sites so that government has made new parking regulations increasing the rate of parking supply by the high demand of parking lots in multi-family housing sites. However, the new regulation of parking supply has several problems that it applies to only new multi-family housing sites and disregards to the locational distinctions around the sites. It also has reduced to the open spaces in the sites and increased the price of housing units especially to the small size units of multi-family housing sites by increasing the number of underground parking lots. Furthermore, the residents have not been equal opportunity to access their parking lots even though they have been charged to equal amount of financial burden for the construction of underground parking lots. This research aims to relieve above problems by analysing parking supply and demand management strategies both domestic and foreign countries, and suggest to new parking management system for multi-family housing sites in 21st Centuries. This research reveals that most of multi-family housing sites want to be applied 1) diverse parking supply regulations considering the locational distinctions of sites, 2) parking lot ownership programs, 3) charging parking fees to second vehicles, 4) increasing parking lots both in the sites and around the sites, 5) enforcing police power to the parking violation vehicles to their sites. Especially, the multi-family housing sites consisting of small & medium size of units and locating in small & medium size of cites strongly want to be accepted new Parking regulations considered their locational and social distinctions and applied police power to the parking violation vehicles in their sites compared to the other multi-family housing sites.

  • PDF