• Title/Summary/Keyword: Detection scheme

Search Result 1,692, Processing Time 0.025 seconds

Detection Schemes Based on Local Optimality and Sequential Criterion: 1. Threshold Analysis (국소 최적성과 순차 기준을 바탕으로 한 검파 기법: 1. 문턱값 분석)

  • Choi Sang Won;Oh Jongho;Kwon Hyoungmoon;Yoon Seokho;Bae Jinsoo;Song Iickho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.532-540
    • /
    • 2005
  • In this paper, a sequential detection scheme is proposed as a combination of a novel weak-signal and a locally optimum(LO) detection schemes. In Part 1, we propose a novel sequential detection scheme for weak signals and show some interesting threshold properties and examples. In Part 2, the performance of the proposed sequential detection scheme is compared with that of the fixed sample size(FSS) test, sequential probability ratio test (SPRT), and truncated sequential probability ratio test(TSPRT).

A Fault Detection Isolation and Compensation Scheme using Finite-time Fault Detection Observers (유한시간 수렴 고장검출관측자를 이용한 고장검출식별 및 보상기법)

  • Lee, Kee-Sang
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.9
    • /
    • pp.1802-1808
    • /
    • 2009
  • A fault detection observer with finite time convergence characteristics(FT_FDO) is proposed and applied to a fault detection isolation system for a dynamic control system. The FT_FDO is a kind of dual state-observer scheme that provides with the state estimates insensitive to a specified fault and the corresponding fault estimate. The state estimates are processed to get the residual that will be logically compared with other residuals to detect and isolate the fault of interest, and the fault estimate may be used for fault compensation. The FDIS employing the FT_FDOs can be considered to be a multiple observer schemes(MOS) in which FT_FDOs are parallelly driven to generate a set of residuals to be compared each other. Due to the finite time convergence characteristics of the FT_FDO, the predetermined detection delay can be considered in the design stage of FDIS so that any fault of interest can be detected and identified in that time. It evidently resolves a well known difficulty of threshold selection owing to the transient responses of the fault detection observers(FDO) employed in FDIS. An FDIS is constructed for instruments(2-sensor, 1-actuator) in an inverted pendulum control system, and simulations are performed to show the performance of the FDIS and fault tolerant control system.

STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme (STRIDE 및 HARM 기반 클라우드 네트워크 취약점 탐지 기법)

  • Jo, Jeong-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.599-612
    • /
    • 2019
  • Cloud networks are used to provide various services. As services are increasingly deployed using cloud networks, there are a number of resources in the cloud that leverage a variety of environments and protocols. However, there is a security intrusion on these resources, and research on cloud network vulnerability detection is required as threats to cloud resources emerge. In this paper, we propose a vulnerability detection scheme using STRIDE and HARM for vulnerability detection of resources utilizing various environments and protocols, and present cloud network vulnerability detection scheme through vulnerability detection scenario composition.

A Study on Improved Detection Signature System in Hacking Response of One-Line Games (온라인 게임 해킹대응에서 Signature 기반 탐지방법 개선에 관한 연구)

  • Lee, Chang Seon;Yoo, Jinho
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.1
    • /
    • pp.105-118
    • /
    • 2016
  • Game companies are frequently attacked by attackers while the companies are servicing their own games. This paper analyzes the limit of the Signature detection method, which is a way of detecting hacking modules in online games, and then this paper proposes the Scoring Signature detection scheme to make up for these problems derived from the limits. The Scoring Signature detection scheme enabled us to detect unknown hacking attacks, and this new scheme turned out to have more than twenty times of success than the existing signature detection methods. If we apply this Scoring Signature detection scheme and the existing detection methods at the same time, it seems to minimize the inconvenient situations to collect hacking modules. And also it is expected to greatly reduce the amount of using hacking modules in games which had not been detected yet.

A Novel Repeat-back Jamming Detection Scheme for GNSS using a Combined Pseudo Random Noise Signal (통합의사잡음 신호를 사용한 GNSS의 재방송재밍 검출기법)

  • Yoo, Seungsoo;Yeom, Dong-Jin;Jee, Gyu-In;Kim, Sun Yong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.9
    • /
    • pp.977-983
    • /
    • 2014
  • A repeat-back jamming signal is an intentionally re-broadcasted GNSS (Global Navigation Satellite System) interference. In this paper, a novel repeat-back jamming detection scheme is proposed. The proposed scheme uses a combined pseudo random noise signal (C-PRN) and is available for a generic GNSS receiver with a single antenna. The C-PRN signal is made by combining several received pseudo random noise signals that had been transmitted from the visible GNSS satellites. Through a Monte-Carlo simulation, the detection probability of a repeat-back jamming signal detected with the proposed scheme is presented.

SPC 기법에 의한 밀링공구의 파손분석 및 검색

  • 서석환;전치혁;최용종
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1992.10a
    • /
    • pp.47-51
    • /
    • 1992
  • Automatic detection of tool breakage during NC machining is a key issue not only for improving productivity but to implement the unattended manufacturing system. In this paper, we develop a vibration sensor-based tool breakage detection system for NC milling processes. The system obtains the time-domain vibration signal from the sensor attached on the spindle bracket of our CNC machine and declares tool failures through the on-line monitoring schemes. For on-line detection, our approach is to use the PSC(statistical process control) methods being increasingly used for on-line process control. The main thrust of this paper is to propose and compare the performance of SPC methods including : a) X-bar control scheme, b) S control scheme, c)EWMA (exponentially weighted moving average) scheme, and d) AEWMA (adaptive exponentially weighted moving average) scheme. The performance of the control schemes are compared in terms of the type 1 and 2 error calculated from the experiment data.

Robust Fault-Tolerant Control for Robotic Systems

  • Shin, Jin-Ho;Lee, Ju-Jang
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.513-518
    • /
    • 1998
  • In this paper, a robust fault-tolerant control scheme for robot manipulators overcoming actuator failures is presented. The joint(or actuator) fault considered in this paper is the free-swinging joint failure and causes the loss of torque on a joint. The presented fault-tolerant control framework includes a normal control with normal(non-failed) operation, a fault detection and a fault-tolerant control to achieve task completion. For both no uncertainty case and uncertainty case, a stable normal con-troller and an on-line fault detection scheme are presented. After the detection and identification of joint failures, the robot manipulator becomes the underactuated robot system with failed actuators. A robust adaptive control scheme of robot manipulators with the detected failed-actuators using the brakes equipped at the failed(passive) joints is proposed in the presence of parametric uncertainty and external disturbances. To illustrate the feasibility and validity of the proposed fault-tolerant control scheme, simulation results for a three-link planar robot arm with a failed joint are presented.

  • PDF

The Study for Improvement Performance on Priority Multi-Buffer Scheme in Wireless LAN (무선 랜에서 우선순위를 할당한 다중 버퍼 사용에 따른 성능 향상에 관한 연구)

  • Kim, Dong-Ok
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.2
    • /
    • pp.42-50
    • /
    • 2004
  • This paper describes a new approach to Internet host mobility. We argue that local mobility, the performance of existing mobile host protocol can be significantly improved. It proposes Fast Moving Detection schemethat based on neighbor AP channel information and moving detection table. And, it composes Local Area Clustering Path (LACP) domain that collected in AP's channel information and MN interface information. It stored the roaming table to include channel information and moving detection. Those which use the proposal scheme will need to put LACP information into the beacon or probe frame. Each AP uses scheme to inform available channel information to MN. From the simulation result, we show that the proposed scheme is advantageous over the legacy schemes in terms of theburst blocking probability and the link utilization.

  • PDF

Reversible Data Hiding Algorithm Based on Pixel Value Ordering and Edge Detection Mechanism

  • Nguyen, Thai-Son;Tram, Hoang-Nam;Vo, Phuoc-Hung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3406-3418
    • /
    • 2022
  • Reversible data hiding is an algorithm that has ability to extract the secret data and to restore the marked image to its original version after data extracting. However, some previous schemes offered the low image quality of marked images. To solve this shortcoming, a new reversible data hiding scheme based on pixel value ordering and edge detection mechanism is proposed. In our proposed scheme, the edge image is constructed to divide all pixels into the smooth regions and rough regions. Then, the pixels in the smooth regions are separated into non overlapping blocks. Then, by taking advantages of the high correlation of current pixels and their adjacent pixels in the smooth regions, PVO algorithm is applied for embedding secret data to maintain the minimum distortion. The experimental results showed that our proposed scheme obtained the larger embedding capacity. Moreover, the greater image quality of marked images are achieved by the proposed scheme than that other previous schemes while the high EC is embedded.

A Novel Approach for Object Detection in Illuminated and Occluded Video Sequences Using Visual Information with Object Feature Estimation

  • Sharma, Kajal
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.2
    • /
    • pp.110-114
    • /
    • 2015
  • This paper reports a novel object-detection technique in video sequences. The proposed algorithm consists of detection of objects in illuminated and occluded videos by using object features and a neural network technique. It consists of two functional modules: region-based object feature extraction and continuous detection of objects in video sequences with region features. This scheme is proposed as an enhancement of the Lowe's scale-invariant feature transform (SIFT) object detection method. This technique solved the high computation time problem of feature generation in the SIFT method. The improvement is achieved by region-based feature classification in the objects to be detected; optimal neural network-based feature reduction is presented in order to reduce the object region feature dataset with winner pixel estimation between the video frames of the video sequence. Simulation results show that the proposed scheme achieves better overall performance than other object detection techniques, and region-based feature detection is faster in comparison to other recent techniques.