• Title/Summary/Keyword: BOT-2

Search Result 137, Processing Time 0.022 seconds

EQUATIONS AX = Y AND Ax = y IN ALGL

  • Jo, Young-Soo;Kang, Joo-Ho;Park, Dong-Wan
    • Journal of the Korean Mathematical Society
    • /
    • v.43 no.2
    • /
    • pp.399-411
    • /
    • 2006
  • Let L be a subspace lattice on a Hilbert space H and X and Y be operators acting on a Hilbert space H. Let P be the projection onto $\frac\;{R(X)}$, where RX is the range of X. If PE = EP for each $E\;\in\;L$, then there exists an operator A in AlgL such that AX = Y if and only if $$sup\{{\parallel}E^{\bot}Yf{\parallel}/{\parallel}E^{\bot}Xf{\parallel}\;:\;f{\in}H,\; E{\in}L}=K\;<\;\infty$$ Moreover, if the necessary condition holds, then we may choose an operator A such that AX = Y and ${\parallel}A{\parallel} = K.$ Let x and y be vectors in H and let $P_x$ be the projection onto the singlely generated space by x. If $P_xE = EP_x$ for each $E\inL$, then the assertion that there exists an operator A in AlgL such that Ax = y is equivalent to the condition $$K_0\;:\;=\;sup\{{\parallel}E^{\bot}y{\parallel}/{\parallel}E^{\bot}x\;:\;E{\in}L}=<\;\infty$$ Moreover, we may choose an operator A such that ${\parallel}A{\parallel} = K_0$ whose norm is $K_0$ under this case.

Study on Prioritizing the countries for BOT nuclear power project using Analytic Hierarchy Process (시스템엔지니어링에 기반한 원자력 사업대상국가 평가방법 연구)

  • Choi, Sun Woo;Bui, Hoang Ha;Roh, Myung Sub
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.9 no.2
    • /
    • pp.1-6
    • /
    • 2013
  • Developing Build-Own (or Operate)-Transfer (BOT) nuclear power project carrying large capital in the long term requires initially well-made multi-decision which it prevents sorts of risks from unexpected situation of target countries. In order to analyze the feasibility of project country, the Analytic Hierarchy Process is adopted. Firstly, the factors influencing the success of BOT nuclear power project in overseas countries were investigated through the literature survey for the country risk and were evaluated by expert interview for estimating comparative weight through pairwise comparison between such factors. Finally, it is developed comparative database of alternate countries with respect to each factor. This analytic method enables the developer to select and focus on the country which has preferable circumstance so that it enhances the efficiency of the project promotion. Also, it enables the developer to quantify the qualitative factors so that it diversifies the project success strategy and policy for the target country.

Real Hypersurfaces in Complex Two-plane Grassmannians with F-parallel Normal Jacobi Operator

  • Jeong, Im-Soon;Suh, Young-Jin
    • Kyungpook Mathematical Journal
    • /
    • v.51 no.4
    • /
    • pp.395-410
    • /
    • 2011
  • In this paper we give a non-existence theorem for Hopf hypersurfaces M in complex two-plane Grassmannians $G_2(\mathbb{C}^{m+2})$ whose normal Jacobi operator $\bar{R}_N$ is parallel on the distribution F defined by $F=[{\xi}]{\cup}D^{\bot}$, where [${\xi}$] = Span{${\xi}$}, $D^{\bot}$ = Span {${\xi}_1$, ${\xi}_2$, ${\xi}_3$} and $T_xM=D{\oplus}D^{\bot}$, $x{\in}M$.

ON STABILITY OF THE ORTHOGONALLY CUBIC TYPE FUNCTIONAL EQUATION

  • Chang, Ick-Soon
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.19 no.3
    • /
    • pp.275-281
    • /
    • 2006
  • In this article, we establish the stability of the orthogonally cubic type functional equation 2f(x + 2y) + 2f(x - 2y) + 2f(2x)+7[f(x)+f(-x)] = 4f(x)+8[f(x+y)+f(x-y)], $x{\bot}y$ in which ${\bot}$ is the orthogonality in the sense in the R$\ddot{a}$tz.

  • PDF

Swarm-bot Manufacture and System Control (스웜봇의 제작 및 시스템 제어)

  • Jeong, Su-Yeon;Lee, Seung-Won;Park, Jae-Sun;Kim, Dong-Hwan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.2
    • /
    • pp.163-172
    • /
    • 2007
  • A swarm-bot docking with two independent robots aiming at overcoming obstacles or climbing up/down stairs is introduced how it can be manufactured and controlled. Utilizing the fast mobility of the vehicle robot and cooperating between robots expands the applications of the robot. An algorithm for identifying the partner robot and its generic mechanism enabling the docking of two robots are addressed. The designed swarm-bot has advantages in terms of overcoming obstacle or stair climbing which is not easily implemented by a single robot, increasing the adaptability to the environment.

User Behavior Analysis for Online Game Bot Detection (온라인 게임 봇 탐지를 위한 사용자 행위 분석)

  • Kang, Ah-Reum;Woo, Ji-young;Park, Ju-yong;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.225-238
    • /
    • 2012
  • Among the various security threats in online games, the use of game bots is the most serious problem. In this paper, we propose a framework for user behavior analysis for bot detection in online games. Specifically, we focus on party play that reflects the social activities of gamers: In a Massively Multi-user Online Role Playing Game (MMORPG), party play log includes a distinguished information that can classify game users under normal-user and abnormal-user. That is because the bot users' main activities target on the acquisition of cyber assets. Through a statistical analysis of user behaviors in game activity logs, we establish the threshold levels of the activities that allow us to identify game bots. Also, we build a knowledge base of detection rules based on this statistical analysis. We apply these rule reasoner to the sixth most popular online game in the world. As a result, we can detect game bot users with a high accuracy rate of 95.92%.

Validity of Long Form Assessment in Interactive Metronome® as a Measure of Children's Praxis (아동의 운동기능평가에 대한 Interactive Metronome® LFA의 타당도 연구)

  • Kim, Kyeong-Mi;Heo, Seo-Yoon;Kim, Mi-Su;Lee, Soo-Min
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.13 no.1
    • /
    • pp.13-22
    • /
    • 2015
  • Objective : The aim of this study is to verify validity of Long Form Assessment, which is an Interactive Metronome $measure^{(R)}$(LFA-IM), as a measurement of praxis of children. Methods : The study was implemented from March 2015 to July 2015. Twenty-five children with Attention Deficit Hyperactivity Disorder (ADHD) and those without ADHD (age of 6~11) were selected from a local university hospital and community in Gyeoung-Nam province and Busan for this study. In order to examine discriminative validity of LFA-IM, Bruininks-Oseretsky Test of Motor Proficiency, second edition (BOT-2) was used to compare the difference of results with LFA-IM for both children with- and without ADHD. For concurrent validity, correlation between LFA-IM and BOT-2 was investigated using spearman correlation coefficients. Results : For the comparison between children with ADHD and children without ADHD, there were significant differences in the total scores of LFA-IM (p<.05). Regarding the concurrent validity, there was a strong negative correlation between the total scores of LFA-IM and BOT-2 (p<.05). In addition, there was high correlation between LFA-IM and BOT-2 for the area of hand control (rs=-.532), and high negative correlation for the area of fine-motor accuracy (rs=-.447), hand dexterity (rs=-.532), and balance control (rs=-.623) (p<.05). Conclusion : This study identified validities of LFA-IM as an assessment of praxis of children. The results showed that it is appropriate to evaluate praxis of children with the total score of LFA-IM and, thus, it is believed that LFA-IM has a potential clinical utility. However, there should be more researches with large number of subjects.

The Traffic Analysis of P2P-based Storm Botnet using Honeynet (허니넷을 이용한 P2P 기반 Storm 봇넷의 트래픽 분석)

  • Han, Kyoung-Soo;Lim, Kwang-Hyuk;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.51-61
    • /
    • 2009
  • Recently, the cyber-attacks using botnets are being increased, Because these attacks pursue the money, the criminal aspect is also being increased, There are spreading of spam mail, DDoS(Distributed Denial of Service) attacks, propagations of malicious codes and malwares, phishings. leaks of sensitive informations as cyber-attacks that used botnets. There are many studies about detection and mitigation techniques against centralized botnets, namely IRC and HITP botnets. However, P2P botnets are still in an early stage of their studies. In this paper, we analyzed the traffics of the Peacomm bot that is one of P2P-based storm bot by using honeynet which is utilized in active analysis of network attacks. As a result, we could see that the Peacomm bot sends a large number of UDP packets to the zombies in wide network through P2P. Furthermore, we could know that the Peacomm bot makes the scale of botnet maintained and extended through these results. We expect that these results are used as a basis of detection and mitigation techniques against P2P botnets.

An Implementation of the path-finding algorithm for TurtleBot 2 based on low-cost embedded hardware

  • Ingabire, Onesphore;Kim, Minyoung;Lee, Jaeung;Jang, Jong-wook
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.313-320
    • /
    • 2019
  • Nowadays, as the availability of tiny, low-cost microcomputer increases at a high level, mobile robots are experiencing remarkable enhancements in hardware design, software performance, and connectivity advancements. In order to control Turtlebot 2, several algorithms have been developed using the Robot Operating System(ROS). However, ROS requires to be run on a high-cost computer which increases the hardware cost and the power consumption to the robot. Therefore, design an algorithm based on low-cost hardware is the most innovative way to reduce the unnecessary costs of the hardware, to increase the performance, and to decrease the power consumed by the computer on the robot. In this paper, we present a path-finding algorithm for TurtleBot 2 based on low-cost hardware. We implemented the algorithm using Raspberry pi, Windows 10 IoT core, and RPLIDAR A2. Firstly, we used Raspberry pi as the alternative to the computer employed to handle ROS and to control the robot. Raspberry pi has the advantages of reducing the hardware cost and the energy consumed by the computer on the robot. Secondly, using RPLIDAR A2 and Windows 10 IoT core which is running on Raspberry pi, we implemented the path-finding algorithm which allows TurtleBot 2 to navigate from the starting point to the destination using the map of the area. In addition, we used C# and Universal Windows Platform to implement the proposed algorithm.

A Study of an effective Defence against self-configuring Botnets (Botnet의 자가 형성에 대응한 효율적인 방어책에 대한 연구)

  • Jo Joo-Hyung;Kim Yong;Hwang Eun-Young;Park Se-Hyun;Hwag Hyun-Uk;Bae Byung-Chul;Yun Young-Tae
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.101-104
    • /
    • 2006
  • 유행처럼 시도하던 DDoS 공격, 특정 목적을 위한 트로이 목마, 스팸메일을 통한 악성코드 유포, 개인 정보 유출 등 악의적인 공격들이 공격자에 의해 조종당하는 Bot에 의해 쉽게 이루어지고 있으며, 특별한 해결방안이 있는 것도 아니다. 이러한 Bot들이 공격자를 통해서가 아닌 자체적으로 P2P 네트워크를 자가 형성하여 공격한다면 탐지는 더욱 어려워지게 된다. 이와 같은 자가 형성에 대응한 효율적인 방어책을 로컬 시스템 간의 네트워크 모니터링 에이전트를 도입하여 해결하고, 에이전트들이 자가 형성하여 실시간으로 Bot에 대한 정보를 공유하고, 이 정보를 기반으로 시스템을 감시하여 Bot을 탐지하는 방어책에 대해 본 논문에서 기술한다.

  • PDF