• Title/Summary/Keyword: Detection scheme

Search Result 1,686, Processing Time 0.03 seconds

Link Energy Efficiency Routing Strategy for Optimizing Energy Consumption of WBAN (WBAN의 에너지 소비 최적화를 위한 링크 에너지 효율 라우팅 전략)

  • Lee, Jung-jae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.1-7
    • /
    • 2022
  • IoT technology that utilizes wireless body area networks (WBAN) and biosensors is an important field in the health industry to minimize resources and monitor patients. In order to integrate IoT and WBAN, a cooperative protocol that constitutes WBAN's limited sensor nodes and rapid routing for efficient data transmission is required. In this paper we propose an we propose an energy efficient and cooperative link energy-efficient routing strategy(LEERS) to solve the problems of redundant data transmission detection and limited network sensor lifetime extention. The proposed scheme considers the hop count node congestion level towards the residual energy sink and bandwidth and parameters. In addition, by determining the path cost function and providing effective multi-hop routing, it is shown that the existing method is improved in terms of residual energy and throughput

The development of EASI-based multi-path analysis code for nuclear security system with variability extension

  • Andiwijayakusuma, Dinan;Setiadipura, Topan;Purqon, Acep;Su'ud, Zaki
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3604-3613
    • /
    • 2022
  • The Physical Protection System (PPS) plays an important role and must effectively deal with various adversary attacks in nuclear security. In specific single adversary path scenarios, we can calculate the PPS effectiveness by EASI (Estimated Adversary Sequence Interruption) through Probability of Interruption (PI) calculation. EASI uses a single value of the probability of detection (PD) and the probability of alarm communications (PC) in the PPS. In this study, we develop a multi-path analysis code based on EASI to evaluate the effectiveness of PPS. Our quantification method for PI considers the variability and uncertainty of PD and PC value by Monte Carlo simulation. We converted the 2-D scheme of the nuclear facility into an Adversary Sequence Diagram (ASD). We used ASD to find the adversary path with the lowest probability of interruption as the most vulnerable paths (MVP). We examined a hypothetical facility (Hypothetical National Nuclear Research Facility - HNNRF) to confirm our code compared with EASI. The results show that implementing the variability extension can estimate the PI value and its associated uncertainty. The multi-path analysis code allows the analyst to make it easier to assess PPS with more extensive facilities with more complex adversary paths. However, the variability of the PD value in each protection element allows a significant decrease in the PI value. The possibility of this decrease needs to be an important concern for PPS designers to determine the PD value correctly or set a higher standard for PPS performance that remains reliable.

A Design of DDoS Attack Detection Scheme Using Traffic Analysis and IP Extraction in SIP Network (SIP망에서 트래픽 측정 및 IP 추출을 통한 DDoS공격 탐지 기법 설계)

  • Yun, Sung-Yeol;Sim, Yong-Hoon;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.729-732
    • /
    • 2010
  • 통신망의 발달로 다양한 인터넷 기반 기술들이 등장함에 따라 현재는 데이터뿐만 아닌 음성에 대한 부분도 IP 네트워크를 통해 전송하려는 움직임이 발판이 되어 VoIP(Voice Over Internet Protocol)라는 기술이 등장하였다. SIP(Session Initiation Protocol) 프로토콜 기반 VoIP 서비스는 통신 절감 효과가 큰 장점과 동시에 다양한 부가서비스를 제공하여 사용자 수가 급증하고 있다. VoIP 서비스는 호(Call)를 제어하기 위해 SIP 기반으로 구성이 되며, SIP 프로토콜은 IP 망을 이용하여 다양한 음성과 멀티미디어 서비스를 제공하게 되는데 IP 프로토콜에서 발생하는 인터넷 보안 취약점을 그대로 동반하기 때문에 DoS(Denial of Service) 및 DDoS(Distribute Denial of Service)에 취약한 성향을 가지고 있다. DDoS 공격은 단시간 내에 대량의 패킷을 타깃 호스트 또는 네트워크에 전송하여 네트워크 접속 및 서비스 기능을 정상적으로 작동하지 못하게 하거나 시스템의 고장을 유도하게 된다. 인터넷 기반 생활이 일상화 되어 있는 현 시점에서 안전한 네트워크 환경을 만들기 위해 DDoS 공격에 대한 대응 방안이 시급한 시점이다. DDoS 공격에 대한 탐지는 매우 어렵기 때문에 근본적인 대책 마련에 대한 연구가 필요하며, 정상적인 트래픽 및 악의적인 트래픽에 대한 탐지 시스템 개발이 절실히 요구되는 사항이다. 본 논문에서는 SIP 프로토콜 및 공격기법에 대해 조사하고, DoS와 DDoS 공격에 대한 특성 및 종류에 대해 조사하였으며, SIP를 이용한 VoIP 서비스에서 IP 분류와 메시지 중복 검열을 통한 DDoS 공격 탐지기법을 제안한다.

Building Detection Using Edge and Color Information of Color Imagery (컬러영상의 경계정보와 색상정보를 활용한 동일건물인식)

  • Park, Choung Hwan;Sohn, Hong Gyoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.3D
    • /
    • pp.519-525
    • /
    • 2006
  • The traditional area-based matching or efficient matching methods using epipolar geometry and height restriction of stereo images, which have a confined search space for image matching, have still some disadvantages such as mismatching and timeconsuming, especially in the dense metropolitan city that very high and similar buildings exist. To solve these problems, a new image matching method through building recognition has been presented. This paper described building recognition in color stereo images using edge and color information as a elementary study of new matching scheme. We introduce the modified Hausdorff distance for using edge information, and the modified color indexing with 3-D RGB histogram for using color information. Color information or edge information alone is not enough to find conjugate building pairs. For edge information only, building recognition rate shows 46.5%, for color information only, 7.1%. However, building recognition rate distinctly increase 78.5% when both information are combined.

A New Statistical Voice Activity Detector Based on UMP Test (UMP 테스트에 근거한 새로운 통계적 음성검출기)

  • Jang, Keun-Won;Chang, Joon-Hyuk;Kim, Dong-Kook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.26 no.1
    • /
    • pp.16-24
    • /
    • 2007
  • Voice activity detectors (VADs) are important in wireless communication and speech signal processing. In the conventional VAD methods. an expression for the likelihood ratio test (LRT) based on statistical models is derived. Then, speech or noise is decided by comparing the value of the expression with a threshold. We propose a new method with the modified decision rule based on the Gaussian distribution and the uniformly most power (UMP) test. This method requires the distribution of the absolute value of the incoming speech signal. Then we can obtain the final decision through the relation between the Rayleigh distributions. This VAD method can detect speech without a priori signal-to-noise ratio (SNR) which is required in the conventional VAD algorithms. Additionally, in the various VAD performance tests, the proposed VAD method is shown to be more effective than the traditional scheme.

Local/Global Structural Health Monitoring System Using Piezoelectric Sensors (압전센서를 이용한 구조물 국부/광역 손상 진단 시스템)

  • Kim, Byung-Soo;Kwon, Hyeok-Sang;Kim, Jin-Wook;Roh, Yong-Rae
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.4
    • /
    • pp.308-317
    • /
    • 2009
  • In the present work, a sensor system composed of an oscillator sensor and a Lamb wave sensor is proposed for the purpose of structural health monitoring. The oscillator sensing system detecting the shift of a structural resonant frequency in proportion to the amount of defects in the structure is a pretty sensitive and simple device, but its detectable range is limited to its local zone. The Lamb wave sensor system, however, is applicable to global detection of the defects. This study is aimed at investigating the feasible combination of the two systems to exploits their merits simultaneously. The scheme to use PZT patches as the oscillator sensor as well as the Lamb wave sensor was proposed to identify the position, length and number of cracks by means of TOF and amplitude of signals, and its validity was confirmed through experiments.

An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks

  • Rooh Ullah;Beenish Ayesha Akram;Amna Zafar;Atif Saeed;Sultan H. Almotiri;Mohammed A. Al Ghamdi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1390-1411
    • /
    • 2024
  • Underwater Wireless Sensors Networks (UWSNs) are deployed in remotely monitored environment such as water level monitoring, ocean current identification, oil detection, habitat monitoring and numerous military applications. Providing scalable and efficient routing is very challenging in UWSNs due to the harsh underwater environment. The biggest difficulties are the nodes inherent movement due to water current, long delay in data transmission, low bandwidth of the acoustic signal, high error rate and energy scarcity in battery powered nodes. Many routing protocols have been proposed to solve the aforementioned problems. There are three broad categories of routing protocols namely depth based, energy based and vector-based routing. Vector Based Forwarding protocols perform routing through virtual pipeline by defining their radius which give proper direction to packets communication. We proposed a routing protocol termed as Path-Oriented Energy Scaled Expanded Vector Based Forwarding (PESEVBF). PESEVBF takes into account all parameters; holding time, the source nodes packets routing path and void holes creation on the second hop; PESEVBF not only considers the packet upward advancement but also focus on density of the forwarded nodes in terms of number of potential forwarding and suppressed nodes for path selection. Node selection in resultant holding time is based on minimum Path Factor (PF) value. Moreover, the suppressed node will be selected for packet forwarding to avoid the void holes occurrences on the second hop. Performance of PESEVBF is compared with other routing protocols using matrices such as energy consumption, packet delivery ratio, packets dropping ratio and duplicate packets creation indicating considerable performance improvement.

Print-Scan Resilient Curve Watermarking using B-Spline Curve Model and its 2D Mesh-Spectral Transform (B-스프라인 곡선 모델링 및 메시-스펙트럼 변환을 이용한 프린트-스캔에 강인한 곡선 워터마킹)

  • Kim, Ji-Young;Lee, Hae-Yeoun;Im, Dong-Hyuck;Ryu, Seung-Jin;Choi, Jung-Ho;Lee, Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.307-314
    • /
    • 2008
  • This paper presents a new robust watermarking method for curves that uses informed-detection. To embed watermarks, the presented algorithm parameterizes a curve using the B-spline model and acquires the control points of the B-spline model. For these control points, 2D mesh are created by applying Delaunay triangulation and then the mesh spectral analysis is performed to calculate the mesh spectral coefficients where watermark messages are embedded in a spread spectrum way. The watermarked coefficients are inversely transformed to the coordinates of the control points and the watermarked curve is reconstructed by calculating B-spline model with the control points. To detect the embedded watermark, we apply curve matching algorithm using inflection points of curve. After curve registration, we calculate the difference between the original and watermarked mesh spectral coefficients with the same process for embedding. By calculating correlation coefficients between the detected and candidate watermark, we decide which watermark was embedded. The experimental results prove the proposed scheme is more robust than previous watermarking schemes against print-scan process as well as geometrical distortions.

Assessment of Soil and Groundwater Contamination at Two Animal Carcass Disposal Sites (가축 사체 매몰지 주변 토양 및 지하수의 오염도 평가)

  • Kim, Kye-Hoon;Kim, Kwon-Rae;Kim, Hyuck-Soo;Lee, Goon-Taek;Lee, Keun-Hwa
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.43 no.3
    • /
    • pp.384-389
    • /
    • 2010
  • Outbreak of contagious diseases to livestock animals is becoming prevalent worldwide and consequently, tremendous numbers of the infected or culled stocks are buried on the ground as the most common disposal method. The buried animals can generate a wide range of detrimental components such as leachate, nutrient salts, and pathogenic bacteria, consequently contaminating the surround environment. This implies that regular investigations are required to monitor any possible detrimental environmental aspect occurred around burial sites. Therefore, the current study was conducted to investigate whether the soil and groundwater nearby the burial sites had been contaminated by the substances originated from the burial sites, which can be applied for the establishment of the ideal burial site construction design and post management scheme. For this, two different burial sites located in Cheonan and Pyeongtaek were selected. Cheonan and Pyeongtaek sites were constructed in 2004 and 2008, respectively and both contained dead poultry infected by avian influenza (AI). Soil and groundwater samples were collected around the sites followed by determination of the nutrient concentrations and bacteria (Salmonella, Camphylobacter, and Bacillus) existence in both soil and groundwater. Some of the soil samples showed higher EC, $NH_4$-N, $NO_3$-N concentration compared to those of the background (control) soils. Also the concentration of $NH_4$-N in some of the groundwater samples appeared to exceed the USEPA guideline value for drinking water (10 mg $L^{-1}$). These results indicated that the soil and groundwater were influenced by the burial site originated nutrients. In the soil, Bacillus was isolated in most soil samples while there were no detections of Salmonella and Camplylobacter. Due to the Bacillus existing mainly as a spore in the soils, it was considered that the frequent detection of Bacillus in the soil samples was attributed to the nutrients originated from the burial sites.

Joint Precoding Technique for Interference Cancellation in Multiuser MIMO Relay Networks for LTE-Advanced System (LTE-Advanced 시스템의 다중 사용자 MIMO Relay 네트워크에서 간섭 제거를 위한 Joint Precoding 기술)

  • Malik, Saransh;Moon, Sang-Mi;Kim, Bo-Ra;Kim, Cheol-Sung;Hwang, In-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.6
    • /
    • pp.15-26
    • /
    • 2012
  • In this paper, we perform interference cancellation in multiuser MIMO (Multiple Input Multiple Output) relay network with improved Amplify-and-Forward (AF) and Decode-and-Forward (DF) relay protocols. The work of interference cancellation is followed by evolved NodeB (eNB), Relay Node (RN) and User Equipment (UE) to improve the error performance of whole transmission system with the explicit use of relay node. In order to perform interference cancellation, we use Dirty Paper Coding (DPC) and Thomilson Harashima Precoding (THP) allied with detection techniques Zero Forcing (ZF), Minimum Mean Square Error (MMSE), Successive Interference Cancellation (SIC) and Ordered Successive Interference Cancellation (OSIC). These basic techniques are studied and improved in the proposal by using the functions of relay node. The performance is improved by Decode-and-Forward which enhance the cancellation of interference in two layers at the cooperative relay node. The interference cancellation using weighted vectors is performed between eNB and RN. In the final results of the research, we conclude that in contrast with the conventional algorithms, the proposed algorithm shows better performance in lower SNR regime. The simulation results show the considerable improvement in the bit error performance by the proposed scheme in the LTE-Advanced system.