• Title/Summary/Keyword: Detection Sequence

Search Result 1,116, Processing Time 0.021 seconds

Performance evaluation of the single-dwell and double-dwell detection schemes in the IS-95 reverse link (IS-95역방향 링크에서 단일 적분 및 이중 적분 검색 방식의 성능 분석)

  • 강법주;박형래;손정영;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.2
    • /
    • pp.383-393
    • /
    • 1996
  • This paper considers the evaluation of the ecquistion performance for an accesschannel preamble based on a random access procedure of direct sequence code division multiple access(DS/CDMA) reverse link. The parallel acquistion technique that employs the single-well detection scheme and the multiple-dwell(double-dwell) detection scheme is mentioned. The acquisition performance for two detection schemes is compared in therms of the acquisition probability and the acquisition time. The parallel acquisition is done by a bank of N parallel I/Q noncoherent correlators. Expressions on the detection, false alarm, and miss probabilities of the single-dwell and multiple-dwell(double-well) detection schemes are derived for multiple H$_{1}$ cells and multipath Rayleight fading channel. comparing the single-dwell detection scheme with the multiple-dwell(double-dwell) detection scheme in the case of employing the parallel acquisition technique in the reverse link,the numerical results show that the single-dwell detection scheme deomonstrates a better performance.

  • PDF

Design of T-N2SCD Detection Model based on Time Window (타임 윈도우 기반의 T-N2SCD 탐지 모델 구현)

  • Shin, Mi-Yea;Won, Il-Young;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2341-2348
    • /
    • 2009
  • An intrusion detection technique based on host consider system call sequence or system call arguments. These two ways are suitable when system call sequence or order and length of system call arguments are out of order. However, there are two disadvantages which a false positive rate and a false negative rate are high. In this paper we propose the T-N2SCD detection model based on Time Window in order to reduce false positive rate and false negative rate. Data for using this experiment is provided from DARPA. As experimental results, the proposed model showed that the false positive rate and the false negative rate are lowest at an interval of 1000ms than at different intervals.

Fault detection of logic circuit by use of M-sequence correlation method

  • Miyata, Chikara;Kashiwagi, Hiroshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10b
    • /
    • pp.24-29
    • /
    • 1993
  • In this paper, the estimation of the structure of a logic circuit under test is made from the observation of the input-output correlation function by use of M-sequence, from which we can estimate whether or not any fault exist in the logic circuit. Especially, investigation was made in case of the 2_stage logic circuit. We checked theoretically the sequence of correlation function, and we have shown that the correlation function is a function of period of M-sequence only, land the appearing number of correlation function in a period is a constant value depending on the logic circuit only. And by computer simulations we have shown that the structure of the circuit under test can be estimated from the observation of sequence of correlation function.

  • PDF

Design of Intrusion Detection System Using Event Sequence Tracking (Event Sequence Tracking을 이용한 침입 감지 시스템의 설계)

  • 최송관;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.115-125
    • /
    • 1995
  • 본 논문에서는 컴퓨터 시스템에서 침입 감지 시스템을 설계함에 있어서 사용될 수 있는 새로운 방법인 Event Sequence Tracking 방법을 제안하였다. Event Sequence Tracking 방법에서는 컴퓨터 시스템의 공격방법을 크게 두가지로 분류한다. 첫번째는 일련의 시스템 명령어를 이용한 공격방법이고 두번째는 침입자 자신이 만들었거나 다른 사람으로부터 얻은 프로그램을 이용하는 방법이다. 첫번째 공격방법에 대한 감지방법은 시스템을 공격할 때 사용한 일련의 시스템 명령어들을 감사 데이타를 분석하여 찾아내고 이 결과를 기존에 알려진 공격 시나리오들과 비교하여 침입자를 찾아내는 방식이다. 두번째 공격방법에 대한 감지 방법은 보안 관리자가 정해놓은, 시스템에서 일반 사용자가 할 수 없는 행위에 관한 보안 정책에 따라 Key-Event 데이타 베이스를 만들고 여기에 해당하는 event의 집합을 감사 데이타에서 찾아내는 방법이다. Event Sequence Tracking 방법은 Rule-based Penetration Identification 방법의 일종으로서 시스템의 공격방법을 분류하여 컴퓨터 시스템에의 침입을 효과적으로 감지할 수 있다는 것과 rule-base의 생성과 갱신을 함에 있어서 보다 간단하게 할 수 있다는 장점을 갖는다.

  • PDF

Emerging Topic Detection Using Text Embedding and Anomaly Pattern Detection in Text Streaming Data (텍스트 스트리밍 데이터에서 텍스트 임베딩과 이상 패턴 탐지를 이용한 신규 주제 발생 탐지)

  • Choi, Semok;Park, Cheong Hee
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.9
    • /
    • pp.1181-1190
    • /
    • 2020
  • Detection of an anomaly pattern deviating normal data distribution in streaming data is an important technique in many application areas. In this paper, a method for detection of an newly emerging pattern in text streaming data which is an ordered sequence of texts is proposed based on text embedding and anomaly pattern detection. Using text embedding methods such as BOW(Bag Of Words), Word2Vec, and BERT, the detection performance of the proposed method is compared. Experimental results show that anomaly pattern detection using BERT embedding gave an average F1 value of 0.85 and the F1 value of 1 in three cases among five test cases.

A Novel Approach for Object Detection in Illuminated and Occluded Video Sequences Using Visual Information with Object Feature Estimation

  • Sharma, Kajal
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.2
    • /
    • pp.110-114
    • /
    • 2015
  • This paper reports a novel object-detection technique in video sequences. The proposed algorithm consists of detection of objects in illuminated and occluded videos by using object features and a neural network technique. It consists of two functional modules: region-based object feature extraction and continuous detection of objects in video sequences with region features. This scheme is proposed as an enhancement of the Lowe's scale-invariant feature transform (SIFT) object detection method. This technique solved the high computation time problem of feature generation in the SIFT method. The improvement is achieved by region-based feature classification in the objects to be detected; optimal neural network-based feature reduction is presented in order to reduce the object region feature dataset with winner pixel estimation between the video frames of the video sequence. Simulation results show that the proposed scheme achieves better overall performance than other object detection techniques, and region-based feature detection is faster in comparison to other recent techniques.

Rapid and Efficient Detection of 16SrI Group Areca Palm Yellow Leaf Phytoplasma in China by Loop-Mediated Isothermal Amplification

  • Yu, Shao-shuai;Che, Hai-yan;Wang, Sheng-jie;Lin, Cai-li;Lin, Ming-xing;Song, Wei-wei;Tang, Qing-hua;Yan, Wei;Qin, Wei-quan
    • The Plant Pathology Journal
    • /
    • v.36 no.5
    • /
    • pp.459-467
    • /
    • 2020
  • Areca palm yellow leaf (AYL) disease caused by the 16SrI group phytoplasma is a serious threat to the development of the Areca palm industry in China. The 16S rRNA gene sequence was utilized to establish a rapid and efficient detection system efficient for the 16SrI-B subgroup AYL phytoplasma in China by loop-mediated isothermal amplification (LAMP). The results showed that two sets of LAMP detection primers, 16SrDNA-2 and 16SrDNA-3, were efficient for 16SrI-B subgroup AYL phytoplasma in China, with positive results appearing under reaction conditions of 64℃ for 40 min. The lowest detection limit for the two LAMP detection assays was the same at 200 ag/μl, namely approximately 53 copies/μl of the target fragments. Phytoplasma was detected in all AYL disease samples from Baoting, Tunchang, and Wanning counties in Hainan province using the two sets of LAMP primers 16SrDNA-2 and 16SrDNA-3, whereas no phytoplasma was detected in the negative control. The LAMP method established in this study with comparatively high sensitivity and stability, provides reliable results that could be visually detected, making it suitable for application and research in rapid diagnosis of AYL disease, detection of seedlings with the pathogen and breeding of disease-resistant Areca palm varieties.

Comparison and Analysis of P2P Botnet Detection Schemes

  • Cho, Kyungsan;Ye, Wujian
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.69-79
    • /
    • 2017
  • In this paper, we propose our four-phase life cycle of P2P botnet with corresponding detection methods and the future direction for more effective P2P botnet detection. Our proposals are based on the intensive analysis that compares existing P2P botnet detection schemes in different points of view such as life cycle of P2P botnet, machine learning methods for data mining based detection, composition of data sets, and performance matrix. Our proposed life cycle model composed of linear sequence stages suggests to utilize features in the vulnerable phase rather than the entire life cycle. In addition, we suggest the hybrid detection scheme with data mining based method and our proposed life cycle, and present the improved composition of experimental data sets through analysing the limitations of previous works.

Performance Analysis of Frequency Synchronization for HDR-WPAN System (HDR-WPAN 시스템을 위한 주파수 동기 성능분석)

  • Park, Ji-Woo;Kang, Hee-Gok;Kim, Jae-Young;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.8 no.2
    • /
    • pp.163-168
    • /
    • 2004
  • In this paper, we propose a frequency synchronization algorithm using characteristic of CAZAC sequence for HDR-WPAN and analyze the performance by signal constellation and EVM(error vector magnitude). The proposed frequency offset technique estimated each sample phase error of two sequences among 12 CAZAC sequences which have excellent autocorrelated characteristic. Estimated phase error is multiplied to each sample of next sequence for compensating the frequency offset. The remaining frequency offset after compensating it with two sequences has maximum 0.002 offsest ranges at each sample. The computer simulation proved that the permission of EVM value had satisfied in the case of DQPSK at 20[dB].

  • PDF

Performance Improvement of STDR Scheme Employing Sign Correlator (부호 상관기를 활용한 STDR 기법의 탐지 성능 개선)

  • Han, Jeong Jae;Noh, Sanguk;Park, So Ryoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.990-996
    • /
    • 2015
  • This paper proposes an enhanced scheme adding a sign detector at the front of the correlator in STDR (sequence time domain reflectometry) system. We have executed simulations to show the improvement of detection performance in two fault types and various fault locations. Consequently, it can be shown that the proposed scheme improves the detection performance of the location of far-fault without increasing the computational complexity.