• Title/Summary/Keyword: Evasion

Search Result 238, Processing Time 0.026 seconds

Neural and Genetic Basis of Evasion, Approach and Predation

  • Park, Seahyung;Ryoo, Jia;Kim, Daesoo
    • Molecules and Cells
    • /
    • v.45 no.2
    • /
    • pp.93-97
    • /
    • 2022
  • Evasion, approach and predation are examples of innate behaviour that are fundamental for the survival of animals. Uniting these behaviours is the assessment of threat, which is required to select between these options. Far from being comprehensive, we give a broad review over recent studies utilising optic techniques that have identified neural circuits and genetic identities underlying these behaviours.

A Design and Implementation of Detection System against Evasional Attack to IDS (IDS 우회공격 탐지 시스템 설계 및 구현)

  • Gil, Min-Wook;Cha, Jun-Nam;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.165-177
    • /
    • 2002
  • IDS(Intrusion Detection System) evasion is a technology which uses vulnerability of IDS in order not to be detected by IDS. In this paper, at first, we classify IDS evasion technology. Second, we propose detection model of IDS evasion technology. Finally, we design and implement detection system of IDS evasion.

  • PDF

A study on the effect of tax evasion controversy on corporate values in internet news portals through big data analysis (빅데이터 분석을 통한 인터넷 뉴스 포털에서의 탈세 논란이 기업 가치에 미치는 영향 연구)

  • Lee, Sang-Min;Park, Myung-Ho;Kim, Byung-Jun;Park, Dae-Keun
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.51-57
    • /
    • 2021
  • If a company's actions to save or avoid taxes are judged to be tax evasion rather than legal tax action by the tax authorities, the company will not only pay tax but also non-tax costs such as damage to corporate image and stock price decline due to a series of tax evasion-related news articles. Therefore, this study measures the frequency of occurrence of tax evasion controversial keywords in internet news portal as a factor to measure the severity of the case, and analyzes the effect of the frequency of occurrence on corporate value. In the Korean stock market, we crawl related articles from internet news portal by using keywords that are controversial for tax evasion targeting top companies based on market capitalization, and generate a time series of the frequency of occurrence of keywords about tax evasion by company and analyze the effect of frequency of appearance on book value versus market capitalization. Through panel regression and impulse response analysis, it is analyzed that the frequency of appearance has a negative effect on the market capitalization and the effect gradually decreases until 12 months. This study examines whether the tax evasion issue affects the corporate value of Korean companies and suggests that it is necessary to take these influences into account when entrepreneurs set up tax-planning schemes.

Korean Countermeasures against the Anti-Evasion, Anti-Circumvention in US (미국의 우회덤핑방지제도와 회피방지제도에 대한 우리나라의 대응방안)

  • Oh, Byung-Seok
    • Korea Trade Review
    • /
    • v.44 no.6
    • /
    • pp.231-246
    • /
    • 2019
  • Circumvention refers to the situation in which exporters try to circumvent import restrictions by setting up factories in third countries and assembling and producing parts locally. Circumvention dumping eliminates the impacts of existing anti-dumping measures, and major countries are introducing anti-circumvention dumping laws to address this problem. If the act of the exporting country is recognized as a circumvention dumping activity, anti-dumping duties are applied retroactively to the imported goods or components. Evasion is an act of importation that results in the reduction or non-application of cash deposits, securities, or anti-dumping or countervailing duties, in a manner that is substantive or false, substantive or omission. In this article, we reviewed the contents and examples of the anti-circumvention measures by the US Department of Commerce (DOC), the International Trade Commission (ITC), and the Anti-Evasion measures by the CBP. The CBP examples show how much inference can be made about which parts of the CBP's investigations, and in what ways. The enactment of the EAPA created an environment in which the role of the CBP was directly guaranteed, and it was possible to apply adverse inferences to those who did not respond to requests for information, resulting in stronger CBP's authority. Therefore, it is advisable for Korea to examine the introduction of domestic laws, such as the bypass anti-dumping system, in order to cope with unfair trade practices that undermine and neutralize the effects of anti-dumping measures.

The Impact of Tax Evasion on Afghanistan's Economy

  • TAWHEED, Qais;CONG, Wang;RAFIQEE, Noorullah;QADERI, Khwaja Bahman;SHARIFI, Mohammad Shabir;HALIMI, Muhammad Shekaib
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.9
    • /
    • pp.317-325
    • /
    • 2022
  • The simple regression model (SRM) is used in this study to look at potential economic growth-influencing factors. The sample's period runs from 2005 to 2019. The data was gathered from various ministries and government agencies such as the Central Bank of Afghanistan's Statistical Bulletin, the World Bank, the United Nations (UN), World Bank open data, NASA, Ministry of Finance (MoF), Ministry of Economy (MoE), and Central Bank of Afghanistan's Statistical Bulletin (CBA), as well as the internet and news. There is an urgent need to ensure that taxes are collected in the most efficient manner possible because one of the enormous management gaps in Afghanistan over the last two decades has been tax evasion. According to the results of this study, tax evasion has a negative and significant impact on Afghanistan's economic growth. We can affirm that the subject of this article is among the most significant topics recently discussed in my country. If the right solutions are implemented, It can significantly contribute to quickening the cycle of the developing Afghan economy and turning it from an unstable to a sustainable one.

Secure Self-Driving Car System Resistant to the Adversarial Evasion Attacks (적대적 회피 공격에 대응하는 안전한 자율주행 자동차 시스템)

  • Seungyeol Lee;Hyunro Lee;Jaecheol Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.907-917
    • /
    • 2023
  • Recently, a self-driving car have applied deep learning technology to advanced driver assistance system can provide convenience to drivers, but it is shown deep that learning technology is vulnerable to adversarial evasion attacks. In this paper, we performed five adversarial evasion attacks, including MI-FGSM(Momentum Iterative-Fast Gradient Sign Method), targeting the object detection algorithm YOLOv5 (You Only Look Once), and measured the object detection performance in terms of mAP(mean Average Precision). In particular, we present a method applying morphology operations for YOLO to detect objects normally by removing noise and extracting boundary. As a result of analyzing its performance through experiments, when an adversarial attack was performed, YOLO's mAP dropped by at least 7.9%. The YOLO applied our proposed method can detect objects up to 87.3% of mAP performance.

Host Innate Immunity against Hepatitis E Virus and Viral Evasion Mechanisms

  • Kang, Sangmin;Myoung, Jinjong
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.10
    • /
    • pp.1727-1735
    • /
    • 2017
  • Hepatitis E virus (HEV) infections cause epidemic or sporadic acute hepatitis, which are mostly self-limiting. However, viral infection in immunocompromised patients and pregnant women may result in serious consequences, such as chronic hepatitis and liver damage, mortality of the latter of which reaches up to 20-30%. Type I interferon (IFN)-induced antiviral immunity is known to be the first-line defense against virus infection. Upon HEV infection in the cell, the virus genome is recognized by pathogen recognition receptors, leading to rapid activation of intracellular signaling cascades. Expression of type I IFN triggers induction of a barrage of IFN-stimulated genes, helping the cells cope with viral infection. Interestingly, some of the HEV-encoded genes seem to be involved in disrupting signaling cascades for antiviral immune responses, and thus crippling cytokine/chemokine production. Antagonistic mechanisms of type I IFN responses by HEV have only recently begun to emerge, and in this review, we summarize known HEV evasion strategies and compare them with those of other hepatitis viruses.

Synthesis and Investigation of the Neural Network Guidance Based on Pursuit-Evasion Games

  • Park, Han-Lim;Tahk, Min-Jea;Bang, Hyo-Choong;Lee, Hun-Gu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.156.3-156
    • /
    • 2001
  • This paper handles synthesis and investigation of a neural network guidance law based on pursuit-evasion games. This work considers two-dimensional pursuit-evasion games solved by using the gradient method. The procedure of developing a guidance law from the game-optimal solutions is deeply examined, and important features of the neural network guidance are investigated. The proposed neural network guidance law takes the range, range rate, line-of-sight rate, and heading error as its input variables. By reconstructing the trajectory, the accuracy of the neural network approximation is verified. Afterwards, robustness of the neural network guidance to the autopilot lag, which results from its feedback structure, is investigated ...

  • PDF

Research on In-band Spurious Evasion Techniques of Hybrid Frequency Synthesizer

  • Kim, Seung-Woo;Yoo, Woo-Sung
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.176-185
    • /
    • 2015
  • The study aims to a design hybrid frequency synthesizer in spectrum analyzer and to propose new techniques designed for evasion of in-band spurious. The study focuses on calculating the exact location of multiple phase locked loop of hybrid frequency synthesizer and spurious of direct digital synthesizer to evade in-band spurious outside of frequency range that the user wants to see and thereby simulating technique to improve input related spurious of spectrum analyzer for algorithm. The proposed technique is designed to calculate spurious evasion algorithm in central processing system when in-band spurious arises, and to move output frequency of DDS(direct digital synthesizer) into the place where no in-band spurious exists thereby improving performance of frequency synthesizer. The study used simulation and result representation to prove the effectiveness of the proposed technique.

A Pursuit-Evasion Game Between a Missile and an Aircraft (미사일과 항공기간의 추적.회피 게임)

  • Byun, Ji-Joon;Seo, Jin-H.
    • Proceedings of the KIEE Conference
    • /
    • 1996.07b
    • /
    • pp.946-948
    • /
    • 1996
  • In this paper, we consider a 2-dimensional pursuit-evasion game between a maneuvering target and a coasting missile using qualitative game theory. The optimal evasion algorithm of the target and the optimal guidance algorithm of the missile are determined and the barrier trajectories of this game are obtained through computer simulation. The optimal strategy of the missile and target is to turn toward the final line of sight direction using maximum input and maintain its direction. The capture set of the missile can be obtained by backward integration from the BUP.

  • PDF