• 제목/요약/키워드: DoS detection

검색결과 540건 처리시간 0.032초

선반가공시 채터 모드 및 안정영역 분석 (Chatter Mode and Stability Boundary Analysis in Turning)

  • 오상록;진도훈;윤문철;류인일;하만경
    • 한국공작기계학회논문집
    • /
    • 제14권5호
    • /
    • pp.7-12
    • /
    • 2005
  • This paper presents several time series methods to analyze the chatter mechanics by using the power spectrum of these algorithms considering the cutting dynamics. In this study, several time series models such as AR(burg, forwardbackward, geometric lattice, instrument variable, least square, Yule Walker), ARX(1s, iv4), ARMAX, ARMA, Box Jenkins, Output Error were modeled and compared with one another. Finally, it was proven that time series modelings are also a desirable and reliable algorithm than the other conventional methods(FFT) for the calculation of the chatter mode in turning operation. Also, the spectrum of times series methods is a little bit more powerful than the FFT fer the detection of a high noisy and weak chatter mode. The radial cutting force Fy has been used for spectrum and chatter stability lobe analysis in this study.

원격유지보수용 조작기 시뮬레이터 개발 (A graphic Simulator of Manipulators for Remote Maintenance)

  • 이종열;김성현;송태길;박병석;윤지섭
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2002년도 추계학술대회 논문집
    • /
    • pp.772-775
    • /
    • 2002
  • The remote handling and maintenance devices in the nuclear hot ceil should be checked prior to the hot operation in view of reliability and operability. In this study, the digital mock-up is implemented to analyze and define the process equipment maintenance processes instead of real mock-up, which is very expensive and time consuming. To do this, the parts of equipment and maintenance devices are modeled in 3-D graphics, assembled, and kinematics is assigned. Also, the virtual workcell of the spent fuel management process is implemented in the graphical environment which is the same as the real environment. This simulator has the several functions for verification such as analyses for the manipulator's working area, the collision detection, the path planning and graphic simulation of the processes etc. This graphic simulator of the maintenance devices can be effectively used in designing of the maintenance processes for the hot cell equipment and enhance the reliability of the spent fuel management.

  • PDF

자동적인 위치, 배율 조정 기반의 용의자 계측 프로그램 개발 (Application of the height measurement method by Automatic Size, Position Adjustment)

  • 이중;이응대;김동욱;윤도영
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 학술회의 논문집 정보 및 제어부문 A
    • /
    • pp.287-290
    • /
    • 2003
  • Over the last few years computer based image processing has become more prominent in forensic science. The image quality from many CCTV systems is too poor for facial recognition. but there are other human characteristics which allow us to recognize individuals from a distance. one of these parameters is a human's height. In this paper, we propose useful height measurement method by auto Position, size adjustment which uses image superimposition and edge detection regardless of lens distortion and not uses conventional photogrammetry calibration methods.

  • PDF

침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 네트워크 보안 시뮬레이션

  • 서희석;조대호;이용원
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2001년도 춘계 학술대회 논문집
    • /
    • pp.72-76
    • /
    • 2001
  • 인터넷이 생활의 중요한 요소로 자리잡기 시작하면서 네트워크의 침해 사고가 급증하고 있는 현실이다. 이러한 침해 사고를 예방하기 위해 침입 탐지 시스템(IDS)과 방화벽(Firewall)이 많이 사용되고 있다. 방화벽과 침입 탐지 시스템은 연동은 서로의 단점을 보완하여 더 강력하게 네트워크를 보호할 수 있다. 방화벽과 침입 탐지 시스템을 위한 시뮬레이션 모델은 DEVS (Discrete Event system Specification) 방법론을 사용하여 구성하였다. 본 논문에서는 실제 침입 데이터를 발생시켜 실제 침입에 가까운 상황 가운데 침입 행위를 판별하도록 구성하였다. 이렇게 구성된 시뮬레이션 모델을 사용하여 침입탐지 시스템의 핵심 요소인 침입 판별이 효과적으로 수행되는지를 시뮬레이션 할 수 있다. 현재의 침입은 광범위해지고, 복잡하게 되어 한 침입 탐지 시스템이 독립적으로 네트워크의 침입을 판단하기 어렵게 되었다. 이를 위해 네트워크 내에 여러 침입 탐지 시스템 에이전트를 배치하였고, 에이전트들이 서로 정보를 공유함으로써 공격에 효과적으로 대응할 수 있도록 하였다. 침입 탐지 시스템이 서로 협력하여 침입을 탐지하고, 이런 정보를 침입 차단 시스템에게 넘겨주게 된다. 이와 같은 구성을 통해서 공격자로부터 발생된 패킷이 네트워크 내로 들어오는 것을 원천적으로 막을 수 있도록 하였다.

  • PDF

Sorption of Thiocyanate Silver Complexes and Determination of Silver by Diffuse Reflectance Spectroscopy

  • Kononova, O.N.;Goryaeva, N.G.;Vorontsova, T.V.;Bulavskaya, T.A.;Kachin, S.V.;Kholmogorov, A.G.
    • Bulletin of the Korean Chemical Society
    • /
    • 제27권11호
    • /
    • pp.1832-1838
    • /
    • 2006
  • The present paper is focused on sorption concentration of silver (I) on some complex-forming ion exchangers in the initial thiocyanate form and subsequent determination of Ag(I) in the phase of anion exchanger AN-25 by diffuse reflectance spectroscopy. The sorption and kinetic characteristics of the sorbents were investigated. The apparent stability constants of thiocyanate silver complexes in the ion exchanger phase were calculated. The sorption-spectroscopic method is proposed for Ag(I) determination in aqueous solutions. The calibration curve is linear in the concentration range of 10-200 mg/L (sample volume is 10.0 mL) and the detection limit is 2 $\mu$g/mL. The presence of $Na^+,\;K^+,\;Mg^{2+}$ (macrocomponents) as well as of Ni (II), Co (II), Cu (II) do not hinder the determination of silver (I).

액티브 네트워크에서의 협업적 구조를 통한 보안 강화 (Security Enforcement based on Cooperative Architecture in Active network)

  • 오하영;채기준
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 한국컴퓨터종합학술대회 논문집 Vol.32 No.1 (A)
    • /
    • pp.223-225
    • /
    • 2005
  • 기존의 패킷 교환 네트워크는 해킹과 같은 보안 공격에 많은 취약점을 가지고 있다. 침입차단시스템 (Firewall system)과 침입탐지 시스템 (Intrusion Detection system)같은 보안 시스템이 개발되고 있지만 DOS나 Probe등을 비롯한 다양한 공격에 대해 적극적으로 대처 할 수 없다. 결과 DARPA를 비롯한 여러 기관에서 전송중인 액티브 패킷이 라우터에서 관리자의 정책을 담고 있는 코드를 실행할 수 있고 그 코드의 실행결과에 따라 라우터의 상태를 변경할 수 있는 액티브 네트워크 전반적인 구조를 제안하였다. 하지만 액티브 네트워크에서 중요한 것은 기존 네트워크와 달리 액티브 패킷이 액티브 노드의 자원에 접근함으로써 발생하게 되는 네트워크 보안이다. 따라서 액티브 노드의 NodeOs단에 Crypto engine, Integrity Engine, Authentication Engine, Authorization Engine등을 비롯한 액티브 노드 인증 및 액티브 패킷/코드 인증 보안 모듈을 둠으로써 액티브 노드 간 서로 안전한 협업적 관리를 통해 보안을 강화한다.

  • PDF

선삭가공에 있어서 선삭저항의 신호처리와 그 응용에 관한 연구(II) (A Study on the Signal Process of Cutting Forces in Turning and its Application (2nd Report) -Automatic Monitor of Chip Rorms using Cutting Forces-)

  • 김도영;윤을재;남궁석
    • 한국정밀공학회지
    • /
    • 제7권2호
    • /
    • pp.85-94
    • /
    • 1990
  • In automatic metal cuttings, the chip control is one of the serious problems. So the automatic detection of chip forms is essential to the chip control in automatic metal cuttings. Cutting experiments were carried out under the variety of cutting conditions (cutting speed, feed, depth of cut and tool geometry) and with workpiece made of steel (S45C), and cutting forces were measured in-processing by using a piezoelectric type Tool Dynamometer. In this report, the frequency analysis of dynamic components, the upper frequency distributions, the ratio of RMS values, the numbers of null point and the probability density were calculated from the dynamic componeents of cutting forces filtered through various band pass filters. Experimental results showed that computer chip form monitoring system based on the cutting forces was designed and simulated and that 6 type of chip forms could be detected while in-process machining.

  • PDF

속도 명령 기반 PID 제어기를 이용한 멀티로터 무인항공기의 표적 자동 추종 시스템 구현 (Implementation of Automatic Target Tracking System for Multirotor UAVs Using Velocity Command Based PID controller)

  • 정현도;고선재;최병조
    • 대한임베디드공학회논문지
    • /
    • 제13권6호
    • /
    • pp.321-328
    • /
    • 2018
  • This paper presents an automatic target tracking flight system using a PID controller based on velocity command of a multirotor UAV. The automatic flight system includes marker based onboard target detection and an automatic velocity command generation replacing manual controller. A quad-rotor UAV is equipped with a camera and an image processing computer to detect the marker in real time and to estimate the relative distance from the target. The marker tracking system consists of PID controller and generates velocity command based on the relative distance. The generated velocity command is used as the input of the UAV's original flight controller. The operation of the proposed system was verified through actual flight tests using a marker on top of a moving vehicle and tracks it to successfully demonstrate its capability using a quad-rotor UAV.

Sirius: The KASI-SNU Optical Intensity Interferometer

  • Oh, Junghwan;Trippe, Sascha;Wagner, Jan;Byun, Do-young
    • 천문학회보
    • /
    • 제44권1호
    • /
    • pp.58.3-58.3
    • /
    • 2019
  • Optical intensity interferometry, developed in the 1950s, is a simple and inexpensive method for achieving angular resolutions on microarcsecond scales. Its low sensitivity has limited intensity interferometric observations to bright stars so far. Substantial improvements are possible by using avalanche photodiodes (APDs) as light detectors. We present here the results of laboratory measurements with a prototype astronomical intensity interferometer using APDs in continuous ("linear") detection mode - arguably, the first of its kind. We used two interferometer configurations, one with zero baseline and one with variable baseline. Using a superluminous diode as light source, we unambiguously detected Hanbury Brown-Twiss photon-photon correlations at very high significance. From measuring the correlation as function of baseline, we measured the angular diameter of the light source, in analogy to the measurement of the angular diameter of a star. Our results demonstrate the possibility to construct large astronomical intensity interferometers that can address a multitude of astrophysical science cases.

  • PDF

프라이빗 블록체인을 사용한 DID 활용 연구 (A Research on the Use of DID Using a Private Blockchain)

  • 박종규;권성근;권기룡;이석환
    • 한국멀티미디어학회논문지
    • /
    • 제24권6호
    • /
    • pp.760-767
    • /
    • 2021
  • The identity verification is one of the most important technologies in online services. Many services in society are provided online, and the service is provided after confirming the user's identity. Users can do a lot of things online, but they also have side effects. Online digital information is easily manipulated and it is difficult to verify its authenticity, causing social confusion. Accordingly, there has been a movement for individuals to directly manage their identity information using DID. In this paper, we propose a system that can authenticate identity by directly adding own personal information and issuing an identifier using DID technology based on a private blockchain. Then, to verify the proposed system, the scenario is executed and verified.