• Title/Summary/Keyword: 전이시스템

Search Result 581, Processing Time 0.022 seconds

Automated Generation Algorithm of the Penetration Scenarios using Association Mining Technique (연관 마이닝 기법을 이용한 침입 시나리오 자동생성 알고리즘)

  • 정경훈;주정은;황현숙;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.203-207
    • /
    • 1999
  • In this paper we propose the automated generation algorithm of penetration scenario using association mining technique. Until now known intrusion detections are classified into anomaly detection and misuse detection. The former uses statistical method, features selection, neural network method in order to decide intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching for deciding intrusion. In proposed many intrusion detection algorithms unknown penetrations are created and updated by security experts. Our algorithm automatically generates penetration scenarios applying association mining technique to state transition technique. Association mining technique discovers efficient and useful unknown information in existing data. In this paper the algorithm we propose can automatically generate penetration scenarios to have been produced by security experts and is easy to cope with intrusions when it is compared to existing intrusion algorithms. Also It has advantage that maintenance cost is not high.

  • PDF

Dynamic Analysis and Control Loop Design of ZVS-FB PWM DC/DC Converter (ZVS-FB PWM DC/DC 변환기의 동특성 해석 및 제어기 설계)

  • 이득기;윤길문;차영길;김흥근
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.3 no.3
    • /
    • pp.231-239
    • /
    • 1998
  • This paper presents the dynamic analysis and control loop design of a zero voltage switching full bridge (ZVS-FB) PWM DC/DC converter. The small-signal model is derived incorporating the effects of phase shift control and the utilization of transformer leakage inductance and power FET junction capacitance to achieve zero voltage resonant switching. These effects are modeled by introducing additional feedforward and feedback terms for duty cycle modulation. Based on the results of the small-signal analysis, the control loop is designed using a simple two-pole one-zero compensation circuit. To show the validity of the design procedures, the small signal analysis of the closed loop system is carried out and the potential of the zero voltage switching and the superiority of the dynamic characteristics are verified through the experiment with a 2 kW prototype converter.

  • PDF

The Design and Implementation of the Collision Avoidance Warning Function in the Air Traffic Control System (항공관제 시스템에서 항공기 공중충돌 경고기능의 설계 및 구현)

  • Song, Jin-Oh;Sim, Dong-Sub;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.213-221
    • /
    • 2009
  • An aircraft collision accident is a disaster that causes great losses of inventories and lives. Though a collision avoidance warning function is provided automatically to pilots in the aircrafts by the enhancement of the aircraft capability, achieving fast decision-making to escape a collision situation is a complex and dangerous work for pilots. If an in-flight collision situation is controlled by the air traffic control system which monitors all airplanes in the air, it would be more efficient to prevent in-flight collisions because it can handle the emergency before the pilot's action. In this paper, we develop the collision avoidance warning function in the air traffic control system. Specifically, we design and implement the five stages of the collision avoidance function, and propose a visualization method which could effectively provide the operators with the trajectories and altitudes of the aircrafts in a collision situation. By developing an in-flight collision warning function in the air traffic control system that visualizes flight patterns through the state transition data of in-flight aircrafts on the flight path lines, it can effectively prevent in-flight collisions with traffic alerts. The developed function allows operators to effectively select and control the aircraft in a collision situation by providing the operators with the expected collision time, the relative distance, and the relative altitude while assessing the level of alert, and visualizing the alert information which includes the Attention-Warning-Alert phase via embodying the TCAS standard. With the developed function the air traffic control system could sense an in-flight collision situation before the pilot's decision-making moment.

Ultra-Wideband Tapered Slot Antennas for Millimeter-Wave Systems (밀리미터파 시스템 응용을 위한 초광대역 테이퍼 슬롯 안테나 설계)

  • Woo, Dong-Sik;Kim, Young-Gon;Cho, Young-Ki;Kim, Kang-Wook
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.8
    • /
    • pp.913-919
    • /
    • 2008
  • A new design and its experimental results of a microstrip-fed ultra-wideband tapered slot antenna(TSA) for millimeter-wave systems are presented. By utilizing the ultra-wideband microstrip-to-CPS transition(balun), ultra-wideband characteristics of the inherent TSA are retrieved. Also, the design procedure of the TSA is simplified by performing simple impedance matching between balun and antenna. The proposed TSA is shaped by using the Fermi-Dirac tapering function and corrugated at the outer edge. The implemented antenna demonstrates ultra-wideband performance for frequency ranges from 23 to over 58 GHz with the relatively high and flat antenna gain of 12 to 14 dBi and low sidelobe levels. In addition, a 4-element linear antenna array for phased-array systems and mm-wave sensor applications is also presented.

Reversible Watermarking based Video Contents Management and Control technique using Biological Organism Model (생물학적 유기체 모델을 이용한 가역 워터마킹 기반 비디오 콘텐츠 관리 및 제어 기법)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.7
    • /
    • pp.841-851
    • /
    • 2013
  • The infectious information hiding system(IIHS) is proposed for secure distribution of high quality video contents by applying optimized watermark embedding and detection algorithms to video codecs. And the watermark as infectious information is transmitted while target video is displayed or edited by codecs. This paper proposes a fast and effective reversible watermarking and infectious information generation for IIHS. Our reversible watermarking scheme enables video decoder to control video quality and watermark strength actively for by adding control code and expiration date with the watermark. Also, we designed our scheme with low computational complexity to satisfy it's real-time processing in a video codec, and to prevent time or frame delay during watermark detection and video restoration, we embedded one watermark and one side information within a macro-block. Experimental results verify that our scheme satisfy real-time watermark embedding and detection and watermark error is 0% after reversible watermark detection. Finally, we conform that the quality of restored video contens is almost same with compressed video without watermarking algorithm.

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

Code Generation from the Statechart Based on XMI (XMI 기반 상태도의 소스코드 자동생성 엔진 구현)

  • Lim, Joa-Sang;Kim, Jin-Man
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.161-170
    • /
    • 2011
  • Despite some practical confusion over the variations in the diagram which may be drawn differently depending upon the CASE, the statechart of UML has been widely used to show the dynamic behaviour of the systems. Prior research has employed either simple switch-case statement or the state design pattern to generate source code from the statechart, which may result in varying source codes. This paper made an attempt to formally define the statechart and generate source codes from it. Firstly we cleaned up the XMI which was generated from different CASEs. This XMI has been translated to the EHA to identify automata contained in it. Then the elements of the statechart metamodel were mapped to the java programs. We also verified the quality of source codes by measuring functionality and maintainability. The case employed in this study was the air conditioner. The reason was that the case includes various states and transitions of interest. It was found that XMI was well extracted by removing some legacy codes in the CASE and the source codes were then successfully generated with the concurrency and hierarchy of the statechart. Further research is required to validate it practical significance with a larger case.

Design of a Project Management Maturity Evaluation Model using Information System Audit Checklists (정보시스템 감리점검항목을 활용한 프로젝트 조직성숙도 평가 모델의 설계)

  • Kim, Yun-Seok;Cho, Eun-Ae;Baik, Doo-Kwon
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.105-117
    • /
    • 2008
  • Generally, project audit provides the service which accomplishes a project successfully by checking the management activity of information system project, indicating a controversial point and reflecting the improvement issues based on project audit check list. In addition, the projects are managed by using the project management maturity model based on process. However, the effect is not big as we except projects performance of real world. In this paper. to solve these problems, the project management maturity evaluation model which is connected with project audit check list and organizational maturity model survey items is designed. Thus, we propose the model which can improve the project performance through the project evaluation of customer's project and development part and the evaluation of organization level as we design that it is possible to not only audit the project but also evaluate it before and after the project.

Effectual Fuzzy Query Evaluation Method based on Fuzzy Linguistic Matrix in Information Retrieval (정보검색에서 퍼지 언어 매트릭스에 근거한 효율적인 퍼지 질의 평가 방법)

  • 최명복;김민구
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.3
    • /
    • pp.218-227
    • /
    • 2000
  • In this paper, we present a new fuzzy information retrieval method based on thesaurus. In the proposed method th thesaurus is represented by a fuzzy linguistic matrix, where the elements in fuzzy linguistic matrix represent a qualitative linguistic values between terms. In the fuzzy linguistic matrix, there are three kinds of fuzzy relationships between terms, i.e., similar relation, hierarchical relation, and associative relation. The implicit fuzzy relationships between terms are inferred by the transitive closure of the fuzzy linguistic matrix based on fuzzy theory. And the proposed method has the capability to deal with a qualitative linguistic weights in a query and in indexing of information items to reflect qualitative measure of human based on vague and uncertain decisions rather than a quantitiative measure. Therefore the proposed method is more flexible than the ones presented in papers[1-3]. Moreover our method is more effectual of time than the ones presented in papers[1-3] because we use a fuzzy linguistic matrix and AON (Associate Ordinary Number) values in query evaluation process. As a result, the proposed method allows the users to perform fuzzy queries in a more flexible and more intelligent manner.

  • PDF

Candidate Marker Identification from Gene Expression Data with Attribute Value Discretization and Negation (속성값 이산화 및 부정값 허용을 하는 의사결정트리 기반의 유전자 발현 데이터의 마커 후보 식별)

  • Lee, Kyung-Mi;Lee, Keon-Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.5
    • /
    • pp.575-580
    • /
    • 2011
  • With the increasing expectation on personalized medicine, it is getting importance to analyze medical information in molecular biology perspective. Gene expression data are one of representative ones to show the microscopic phenomena of biological activities. In gene expression data analysis, one of major concerns is to identify markers which can be used to predict disease occurrence, progression or recurrence in the molecular level. Existing markers candidate identification methods mainly depend on statistical hypothesis test methods. This paper proposes a search method based decision tree induction to identify candidate markers which consist of multiple genes. The propose method discretizes numeric expression level into three categorical values and allows candidate markers' genes to be expressed by their negation as well as categorical values. It is desirable to have some number of genes to be included in markers. Hence the method is devised to try to find candidate markers with restricted number of genes.