• Title/Summary/Keyword: Detection mechanism

Search Result 844, Processing Time 0.025 seconds

The Study of System Security Technique for Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 시스템 보안 기법에 관한 연구)

  • Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.33-39
    • /
    • 2008
  • Mobile Ad Hoc Network is easy to be attacked because nodes are distributed not network based infrastructure. Intrusion detection system perceives the trust values of neighboring nodes and receives inspection on local security of nodes and observation ability. This study applied clustering mechanism to reduce overhead in intrusion detection. And, in order to measure the trust values, it associates the trust information cluster head received from member nodes with its own value and evaluates the trust of neighboring nodes. Secure data transmission is received by proposed concept because the trust of nodes on network is achieved accurately.

  • PDF

Prediction of User Preferred Cosmetic Brand Based on Unified Fuzzy Rule Inference

  • Kim, Jin-Sung
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.271-275
    • /
    • 2005
  • In this research, we propose a Unified Fuzzy rule-based knowledge Inference Systems UFIS) to help the expert in cosmetic brand detection. Users' preferred cosmetic product detection is very important in the level of CRM. To this Purpose, many corporations trying to develop an efficient data mining tool. In this study, we develop a prototype fuzzy rule detection and inference system. The framework used in this development is mainly based on two different mechanisms such as fuzzy rule extraction and RDB (Relational DB)-based fuzzy rule inference. First, fuzzy clustering and fuzzy rule extraction deal with the presence of the knowledge in data base and its value is presented with a value between $0\∼1$. Second, RDB and SQL(Structured Query Language)-based fuzzy rule inference mechanism provide more flexibility in knowledge management than conventional non-fuzzy value-based KMS(Knowledge Management Systems)

  • PDF

A Study of FDIR S/W Design and Verification for Gyro Sensor of COMS Satellite (통신해양기상위성 자이로센서 FDIR 설계 및 검증에 관한 연구)

  • Lee, Hoon-Hee
    • Aerospace Engineering and Technology
    • /
    • v.7 no.2
    • /
    • pp.95-102
    • /
    • 2008
  • COMS Satellite is automatically able to recover from any defined failure thanks to a full redundancy. This study assesses the effects of gyro failure on the COMS mission and analyzes the mechanism of Gyro Failure Detection, Isolation and Recovery about failure detection means, isolation and recovery actions and their consequences. At last, it checks the FDIR behavior from an injected failure on COMS simulator.

  • PDF

A Study on the Development of a Lanchester-Type Model Incorporating Firing & Observing States in the Direct Fire Engagement (Firing State와 Observing State를 갖는 Lanchester형 전투모형에 관한 연구)

  • Ham Il-Hwan;Choe Sang-Yeong;Song Mun-Ho
    • Journal of the military operations research society of Korea
    • /
    • v.17 no.2
    • /
    • pp.44-53
    • /
    • 1991
  • This paper is aimed to develop a Lanchester type combat model for the direct-fire engagement. This model incorporates number of combatants, inter-firing time, detection time by movement, detection probability by the signature of fire, where the inter-firing time and the detection time are assumed to follow a negative exponential distribution. The approach to modeling is as follows : in the process of an engagement, a combatant takes one of the states('observing' state or 'firing' state), a combatant is initially in the observing state, if the combatant detects a target, he changes his state from 'observing' to 'firing' and will cause attrition to the opposing forces. Thus this transition mechanism is embodied into the differential equation form with each transition rate. A limited examination of the validity has been conducted by comparison with the Monte-Carlo simulation model 'BAGSIM', and with a traditional Deterministic Lanchester model.

  • PDF

A doulbe talk detector using the reflection coefficients (반사계수를 이용한 동시통화 검출기)

  • 유재하;조성호;윤대희
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.10
    • /
    • pp.141-150
    • /
    • 1997
  • In this paepr, we propose an intelligent double talk detector that can enhance the performance of the acoustic echo cancellation system. The conventional double talk detection methods often misunderstand the echo path changes as double talk. Although there exist several detection methods that can distinguish the echo path changes from the double-talks, they show poor tracking performance because of the excessive decision delay for the discrimination and can only be used after the adaptive digital filter converges. A new and more effective ditetion algorithm has been proposed, where the detection mechanism is performed by observing the change rate of the reflection coefficients of the two lattice predictors that re placed on the near-end and far-end terminals. The excellence of the proposed method is verified by extensive computer simulations using real speech signals.

  • PDF

Highlight-Detection-Based Color Correction Method for Multiview Images

  • Shao, Feng;Jiang, Gangyi;Yu, Mei;Ho, Yo-Sung
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.448-450
    • /
    • 2009
  • In multiview imaging systems, color correction is adopted to eliminate color inconsistency between views. However, the influence of highlights on color correction has not been considered before. In this letter, a new color correction method based on highlight detection is proposed. The method is designed to treat highlight and highlight-removal regions independently when calculating correction parameters. Finial correction is implemented with a fusion mechanism. Experimental results show that the proposed method can improve objective and subjective correction performance, while achieving better coding performance than other correction methods.

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

Investigation of Laser Scattering Pattern and Defect Detection Based on Rayleigh Criterion for Crystalline Silicon Wafer Used in Solar Cell (태양전지 실리콘 웨이퍼에서의 레일리기준 기반 레이저산란 패턴 분석 및 결함 검출)

  • Yean, Jeong-Seung;Kim, Gyung-Bum
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.28 no.5
    • /
    • pp.606-613
    • /
    • 2011
  • In this paper, patterns of laser scattering and detection of micro defects have been investigated based on Rayleigh criterion for silicon wafer in solar cell. Also, a new laser scattering mechanism is designed using characteristics of light scattering against silicon wafer surfaces. Its parameters are to be optimally selected to obtain effective and featured patterns of laser scattering. The optimal parametric ranges of laser scattering are determined using the mean intensity of laser scattering. Scattering patterns of micro defects are investigated at the extracted parameter region. Among a lot of pattern features, both maximum connected area and number of connected component in patterns of laser scattering are regarded as the important information for detecting micro defects. Their usefulness is verified in the experiment.

Prediction of User's Preference by using Fuzzy Rule & RDB Inference: A Cosmetic Brand Selection

  • Kim, Jin-Sung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.4
    • /
    • pp.353-359
    • /
    • 2005
  • In this research, we propose a Unified Fuzzy rule-based knowledge Inference Systems (UFIS) to help the expert in cosmetic brand detection. Users' preferred cosmetic product detection is very important in the level of CRM. To this purpose, many corporations trying to develop an efficient data mining tool. In this study, we develop a prototype fuzzy rule detection and inference system. The framework used in this development is mainly based on two different mechanisms such as fuzzy rule extraction and RDB (Relational DB)-based fuzzy rule inference. First, fuzzy clustering and fuzzy rule extraction deal with the presence of the knowledge in data base and its value is presented with a value between 0 -1. Second, RDB and SQL (Structured Query Language)-based fuzzy rule inference mechanism provide more flexibility in knowledge management than conventional non-fuzzy value-based KMS (Knowledge Management Systems).

Detection of Nitroaromatic Compounds Based on Fluorescent Silafluorene Chemosensors

  • Kim, Bumseok
    • Journal of Integrative Natural Science
    • /
    • v.3 no.1
    • /
    • pp.19-23
    • /
    • 2010
  • A simple and rapid method is described for detecting nitroaromatic explosives in air or seawater with the use of photoluminescent organosilicon compounds. The synthesis, spectroscopic characterization, and fluorescence quenching efficiency of silafluorenes are reported. Silafluorenes were synthesized from the reduction of dilithiobiphenyl with dichlorosilanes. Two silafluorenes were used for the detection of nitroaromatic compounds. Detection of nitroaromatic molecules, such as 2,4-dinitrotoluene (DNT), 2,4,6-trinitrotoluene (TNT), and picric acid (PA), has been explored. A linear Stern-Volmer relationship was observed for the first three analytes. Fluorescence spectra of silafluorenes obtained in either toluene solutions or thin films displayed no shift in the maximum of the emission wavelength. The photoluminescence quenching occurs by a static mechanism.