• Title/Summary/Keyword: Detection scheme

Search Result 1,684, Processing Time 0.026 seconds

QR Decomposition Based Sequential Belief Propagation Detection Scheme for MIMO Systems (MIMO 시스템을 위한 QR 분해 기반 순차적 신뢰 전파 검출 기법)

  • Park, Sangjoon;Choi, Sooyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.9
    • /
    • pp.1725-1727
    • /
    • 2015
  • In this letter, a QR decomposition based sequential BP detection scheme is proposed for MIMO systems. The proposed scheme performs the sequential updates from the observation node having the smallest degree among all the observation nodes. Our simulation results verify that the proposed scheme achieves an improved error performance with a significantly accelerated detection convergence speed compared to the conventional schemes.

Anti-Islanding Scheme for a Number of Grid-connected Inverters under Parallel Operation (병렬연결된 다수 대 계통연계형 인버터를 위한 단독운전 방지 기법)

  • Kim, Dong-Gyun;Park, Kwan-nam;Cho, Sang-Yoon;Lee, Young-Kwoun;Yu, Gwon-Jong;Song, Seung-Ho;Choy, Ick;Choi, Ju-Yeop
    • Proceedings of the KIPE Conference
    • /
    • 2016.07a
    • /
    • pp.351-352
    • /
    • 2016
  • Since anti-islanding scheme of grid-connected inverter is a key function of standards compliance, unintentional islanding results in safety hazards, reliability, and many other issues. Therefore, many anti-islanding schemes have been researched, however, existing anti-islanding schemes show poor power quality and non-detection zone issues. Besides, most of them have problems which deteriorate performance of islanding detection under parallel-operation. Therefore, this paper proposes a new anti-islanding scheme that has both negligible power quality degradation, no non-detection zone and precise islanding detection under parallel-operation. Finally, both simulation and experimental results validate the proposed scheme.

  • PDF

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Chung, Ting-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2005-2021
    • /
    • 2014
  • This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user's requirement, with each BTC-compressed image block being used to carry the authentication code using the data hiding method. In the proposed scheme, to obtain a high-quality embedded image, a reference table is used when the authentication code is embedded. The experimental results demonstrate that the proposed scheme achieves high-quality embedded images and guarantees the capability of tamper detection.

A Scheme for Protecting Security Rules in Intrusion Detection System (침입 탐지 시스템을 위한 효율적인 룰 보호 기법)

  • 손재민;김현성;부기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.4
    • /
    • pp.8-16
    • /
    • 2003
  • This paper moses a method to solve the weakness in Snort, the network based intrusion detection system. Snort which is the rule-based intrusion detection system dose not supports a protection method for their own rules which are signatures to detect intrusions. Therefore the purpose of this paper is to provide a scheme for protecting rules. The system with the proposed scheme could support integrity and confidentiality to the rules.

  • PDF

The Scheme for Generate to Active Response Policy in Intrusion Detection System (침입 탐지 도구에서 능동 대응 정책 생성 방안)

  • Lee Jaw-Kwang;Paek Seung-Hyun;Oh Hyung-Geun;Park Eung-Ki;Kim Bong-Han
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.151-159
    • /
    • 2006
  • This paper studied active response policy generation scheme in intrusion detection system. We considered seven requirements of intrusion detection system for active response with components as the preceding study We presented the scheme which I can generate signature with a base with integrate one model with NIDS and ADS. We studied detection of the Unknown Attack which was active, and studied scheme for generated to be able to do signature automatically through Unknown Attack detection.

  • PDF

A Study on Traffic Anomaly Detection Scheme Based Time Series Model (시계열 모델 기반 트래픽 이상 징후 탐지 기법에 관한 연구)

  • Cho, Kang-Hong;Lee, Do-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.304-309
    • /
    • 2008
  • This paper propose the traffic anomaly detection scheme based time series model. We apply ARIMA prediction model to this scheme and transform the value of the abnormal symptom into the probability value to maximize the traffic anomaly symptom detection. For this, we have evaluated the abnormal detection performance for the proposed model using total traffic and web traffic included the attack traffic. We will expect to have an great effect if this scheme is included in some network based intrusion detection system.

A Novel Detection Scheme for Reducing the Effect of Residual Doppler Frequency Offset in Spread Spectrum Systems (나머지 도플러 주파수 오프셋이 있는 대역확산 시스템에서 새로운 검파기법)

  • Yoo Seung-Soo;Kim Sun-Yong;Song Iick-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6A
    • /
    • pp.586-592
    • /
    • 2006
  • In this paper, a novel detection method called the joint multiple frequency cell (JMFC) detection is addressed for spread spectrum code acquisition in the presence of residual Doppler frequency offset (RDFO). When the RDFO exists, the correlation peak used for detection during the acquisition process is split into several lower neighboring peaks, resulting in severe degradation in the detection performance, and consequently, in the overall acquisition performance. In the JMFC detection, a decision variable for detection is formed by combining several consecutive correlator outputs, so that the reduction in the correlation value due to the RDFO can be alleviated. Numerical results show that the proposed scheme can offer better detection performance over the conventional scheme based on the cell-by-cell detection.

A residual generator for fault detection/isolation of a class of nonlinear systems (비선형 공정의 고장검출을 위한 잔차발생알고리즘)

  • Ryu, Ji-Su;Lee, Sang-Moon;Lee, Kee-Sang;Park, Tae-Geon
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2230-2232
    • /
    • 2004
  • A residual generation scheme that can be employed in the process fault detection and isolation systems for a class of nonlinear (control) systems is suggested. Although the scheme is a kind of observer scheme, the design of the observers employed for residual generation is very simple and the order of the observer is very low. In spite of the simplicity, the residual generation scheme provides the same information for the detection and isolation of the anticipated faults as the conventional multiple observer based schemes. The residuals may be structured so that fault isolation can be performed by pre-selected logic. An FDIS using the residual generation scheme is constructed and evaluated for a nonlinear DC motor system.

  • PDF

A Scheme for Energy Detection Based Backscatter Signal Detection for Switching Antenna (안테나 스위칭을 위한 에너지 검파 기반의 백스캐터 신호 검출 기법)

  • Sim, Isaac;Hwang, Yu Min;Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.2
    • /
    • pp.18-22
    • /
    • 2016
  • In this paper, we proposed a scheme for signal detection based on average of detected energy of frequencies for backscatter communications. We applied this scheme on the bistatic backscatter radio architecture for RF energy harvesting. Tags reflected entire RF signals on a same bandwidth when transmitted energy signals. Receivers can optimal switching antenna by this scheme. Simulation results show that the proposed scheme can precisely detect signals from tag with properly calculated parameters.