• Title/Summary/Keyword: 판정기법

Search Result 356, Processing Time 0.025 seconds

Online Game Identity Theft Detection Model based on Hacker's Behavior Analysis (온라인게임 계정도용 탐지모델에 관한 연구)

  • Choi, Hwa-Jae;Woo, Ji-Young;Kim, Huy-Kang
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.81-93
    • /
    • 2011
  • Identity theft happens frequently in popular MMORPG(Massively Multi-player Online Role Playing Games) where profits can be gained easily. In spite of the importance of security about identity theft in MMORPG, few methods to prevent and detect identity theft in online games have been proposed. In this study, we investigate real identity theft cases of an online game and define the representative patterns of identity theft as the speedy type, cautious type, and bold type. We then propose the automatic identity theft detection model based on the multi-class classification. We verify the system with one of the leading online games in Korea. The multi-class detection model outperforms the existing binary-class one(hacked or not).

Practical Page Segmentation using Connected Components and Color Information (연결요소와 색상정보를 이용한 실제적 문서영상 분할)

  • Kim, Pyeoung-Kee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.273-285
    • /
    • 2000
  • While page segmentation is an important step in document recognition, there haven's been many researches on it. More improvement is still needed on the segmentation of document elements in complicated or color documents. In this paper, I present a new page segmentation method which can segment pages with multiple columns, dotted lines, graphics, and photographs. I extract all connected components using contour following and combine them depending on the size and positional information of them. Separate text location is done for non-text color regions to extract possible text lines. To see the performance of the proposed method, experiments are done for 180 documents. Four commercial OCR programs are also tested and the proposed method showed the best result.

  • PDF

Video Based Tail-Lights Status Recognition Algorithm (영상기반 차량 후미등 상태 인식 알고리즘)

  • Kim, Gyu-Yeong;Lee, Geun-Hoo;Do, Jin-Kyu;Park, Keun-Soo;Park, Jang-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1443-1449
    • /
    • 2013
  • Automatic detection of vehicles in front is an integral component of many advanced driver-assistance system, such as collision mitigation, automatic cruise control, and automatic head-lamp dimming. Regardless day and night, tail-lights play an important role in vehicle detecting and status recognizing of driving in front. However, some drivers do not know the status of the tail-lights of vehicles. Thus, it is required for drivers to inform status of tail-lights automatically. In this paper, a recognition method of status of tail-lights based on video processing and recognition technology is proposed. Background estimation, optical flow and Euclidean distance is used to detect vehicles entering tollgate. Then saliency map is used to detect tail-lights and recognize their status in the Lab color coordinates. As results of experiments of using tollgate videos, it is shown that the proposed method can be used to inform status of tail-lights.

The Vertical Handover Between WLAN and UMTS using Group Decision Making Method (그룹결정방법을 이용한 WLAN과 UMTS간의 수직 핸드오버)

  • Kim, Nam-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.9
    • /
    • pp.4492-4497
    • /
    • 2013
  • An important features of next-generation wireless networks will be heterogeneous environment in which a mobile terminal will be able to connect to multiple radio access networks and network selection mechanisms play an important role in ensuring QoS for users in this environment. In this paper, our study is concerned with an extension of the well known AHP to the group decision making methods. The users requested specific QoS divide into a group and the access networks with similar characteristics split into a group. Between each group, the one group is selected and within that group, the best access networks will be assigned according to priority order by network selection algorithm. The experimental results of MATLAB simulation show that the every user in each services can select the same network with decision value as large as 0.9. Consequently, the proposed network selection mechanism is more effective than conventional one in integrated UMTS and WLAN networks.

Analysis of Hydrologic data using Poincare Section and Neural Network (Poincare Section과 신경망 기법을 이용한 수문자료 분석)

  • La, Chang-Jin;Kim, Hung-Soo;Kim, Joong-Hoon;Kim, Eung-Seok
    • Journal of Korea Water Resources Association
    • /
    • v.35 no.6
    • /
    • pp.817-826
    • /
    • 2002
  • Many researchers have been tried to forecast the future as analyzing data characteristics and the forecasting methodology may be divided into two cases of deterministic and stochastic techniques. However, the understanding data characteristics may be very important for model construction and forecasting. In the sense of this view, recently, the deterministic method known as nonlinear dynamics has been studied in many fields. This study uses the geometrical methodology suggested by Poincare for analyzing nonlinear dynamic systems and we apply the methodology to understand the characteristics of known systems and hydrologic data, and determines the possibility of forecasting according to the data characteristics. Say, we try to understand the data characteristics as constructing Poincare map by using Poincare section and could conjecture that the data sets are linear or nonlinear and an appropriate model.

A Study on the Analysis of Intellectual Structure of Korean Veterinary Sciences (국내 수의과학 분야의 지적 구조 분석에 관한 연구)

  • Cho, Hyun-Yang
    • Journal of Information Management
    • /
    • v.43 no.2
    • /
    • pp.43-66
    • /
    • 2012
  • The purpose of this study is to see the intellectual structure in the field of veterinary sciences in Korea, using author profiling analysis(APA), a bibliometric approach. Three journals are selected on the basis of citation data, exchanging most citations with Korean Journal of Veterinary. And then, 50 authors who published most articles at selected journals during the given period of time were chosen. The analysis of similarity and dissimilarity among authors by comparing co-word appearance patterns from article title, abstracts, and keywords was made. Authors can be grouped 11 minor clusters under 4 major clusters, depending on their interests in the area of veterinary sciences in Korea. The subjects for each cluster at the veterinary sciences are decided by the matching the keyword, representing author's research interest. As a result, it is possible to figure out the current research trends and the researcher network in the field of veterinary sciences.

ANIDS(Advanced Network Based Intrusion Detection System) Design Using Association Rule Mining (연관법칙 마이닝(Association Rule Mining)을 이용한 ANIDS (Advanced Network Based IDS) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2287-2297
    • /
    • 2007
  • The proposed ANIDS(Advanced Network Intrusion Detection System) which is network-based IDS using Association Rule Mining, collects the packets on the network, analyze the associations of the packets, generates the pattern graph by using the highly associated packets using Association Rule Mining, and detects the intrusion by using the generated pattern graph. ANIDS consists of PMM(Packet Management Module) collecting and managing packets, PGGM(Pattern Graph Generate Module) generating pattern graphs, and IDM(Intrusion Detection Module) detecting intrusions. Specially, PGGM finds the candidate packets of Association Rule large than $Sup_{min}$ using Apriori algorithm, measures the Confidence of Association Rule, and generates pattern graph of association rules large than $Conf_{min}$. ANIDS reduces the false positive by using pattern graph even before finalizing the new pattern graph, the pattern graph which is being generated is compared with the existing one stored in DB. If they are the same, we can estimate it is an intrusion. Therefore, this paper can reduce the speed of intrusion detection and the false positive and increase the detection ratio of intrusion.

A Study on the Signal Correction for Multiple Defects in MFL Type Nondestructive Testing System (MFL 비파괴 검사 시스템에서 다중 결함에 의한 신호 왜곡과 신호 보정에 관한 연구)

  • Park, Jeng Hoon;Kim, Hui Min;Park, Gwan Soo
    • Journal of the Korean Magnetics Society
    • /
    • v.26 no.1
    • /
    • pp.24-30
    • /
    • 2016
  • MFL (Magnetic flux leakage) type nondestructive testing has been used for inspection of underground gas pipelines to find metal defects by detecting magnetic leakage signal. Because the underground gas pipeline is exposed by environment such as high pressure with great humidity, external defects are easily formed on the surface of pipelines and they are being grouped respectively. These adjacent defects cause the signal distortion of leakage flux so that it is hard to estimate the shape information of defects. In this paper, we performed to study of the signal distortion and compensating method for multiple defects in MFL type nondestructive testing system by using 3D FEM simulation. This paper proposes the basic algorithm of defect signal analysis on multiple defects on the surface of 30 inch diameter pipeline.

A Hybird Antibody Model Design using Genetic Algorithm Scheme (유전 알고리즘 기법을 이용한 HA 모델 설계)

  • Shin, Mi-Yea;Jeon, Seoung-Heup;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.159-166
    • /
    • 2009
  • A nature immunity system responds sensitively to an external invasion with various functions in a lot of bodies, besides it there is a function to remember information to have been currently infected. we propose a hybrid model similar to immune system which combine with the antibody which applied genetic algorithm as select antibody and the arbitrary abnormal system call sequence that applied negative selection of a nature immunity system. A proposed model uses an arbitrary abnormal system Kol sequence in order to reduce a positive defect and a negative defect. Data used to experiment are send mail data processed UNM (University of New Maxico). The negative defect that an experiment results proposal model judged system call more abnormal than the existing negative selection to normal system call appeared 0.55% low.

A Study on the Improvement of Weapon System T&E performance System (국방 무기체계 시험평가 수행체계 개선방안 연구)

  • BaekJung Kim;Sukjae Jeong
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.2
    • /
    • pp.1-9
    • /
    • 2023
  • The purpose of this study is to derive the need to improve the test and evaluation(T&E) performance system of the weapon systems to which advanced science and technology is applied, evaluate priorities, and present development plans. T&E of Al-based weapon systems through a literature research and case analysis on changes in the T&E environment for weapon system, 11 detailed evaluation items were derived from the in terms of the T&E system, structure, and technology. Al-based weapon system test evaluation should be performed in parallel with data-based performance evaluation and actual T&E, and performance measurement using a separate T&E data set is required for AI models performance evaluation. As a result of analyzing the importance of T&E through AHP analysis, the order of T&E system-technology-structure was evaluated, and the priority of detailed evaluation items was evaluated in the order of T&E result judgment-T&E organization and expert training-scientific T&E. For evaluation items with high priority, measures to improve the T&E performance system were presented.

  • PDF