• Title/Summary/Keyword: Fixed Threshold

Search Result 250, Processing Time 0.027 seconds

An Adaptive Pruning Threshold Algorithm for the Korean Address Speech Recognition (한국어 주소 음성인식의 고속화를 위한 적응 프루닝 문턱치 알고리즘)

  • 황철준;오세진;김범국;정호열;정현열
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.7
    • /
    • pp.55-62
    • /
    • 2001
  • In this paper, we propose a new adaptative pruning algorithm which effectively reduces the search space during the recognition process. As maximum probabilities between neighbor frames are highly interrelated, an efficient pruning threshold value can be obtained from the maximum probabilities of previous frames. The main idea is to update threshold at the present frame by a combination of previous maximum probability and hypotheses probabilities. As present threshold is obtained in on-going recognition process, the algorithm does not need any pre-experiments to find threshold values even when recognition tasks are changed. In addition, the adaptively selected threshold allows an improvement of recognition speed under different environments. The proposed algorithm has been applied to a Korean Address recognition system. Experimental results show that the proposed algorithm reduces the search space of average 14.4% and 9.14% respectively while preserving the recognition accuracy, compared to the previous method of using fixed pruning threshold values and variable pruning threshold values.

  • PDF

An Automatic Portscan Detection System with Adaptive Threshold Setting

  • Kim, Sang-Kon;Lee, Seung-Ho;Seo, Seung-Woo
    • Journal of Communications and Networks
    • /
    • v.12 no.1
    • /
    • pp.74-85
    • /
    • 2010
  • For the purpose of compromising hosts, attackers including infected hosts initially perform a portscan using IP addresses in order to find vulnerable hosts. Considerable research related to portscan detection has been done and many algorithms have been proposed and implemented in the network intrusion detection system (NIDS). In order to distinguish portscanners from remote hosts, most portscan detection algorithms use a fixed threshold that is manually managed by the network manager. Because the threshold is a constant, even though the network environment or the characteristics of traffic can change, many false positives and false negatives are generated by NIDS. This reduces the efficiency of NIDS and imposes a high processing burden on a network management system (NMS). In this paper, in order to address this problem, we propose an automatic portscan detection system using an fast increase slow decrease (FISD) scheme, that will automatically and adaptively set the threshold based on statistical data for traffic during prior time periods. In particular, we focus on reducing false positives rather than false negatives, while the threshold is adaptively set within a range between minimum and maximum values. We also propose a new portscan detection algorithm, rate of increase in the number of failed connection request (RINF), which is much more suitable for our system and shows better performance than other existing algorithms. In terms of the implementation, we compare our scheme with other two simple threshold estimation methods for an adaptive threshold setting scheme. Also, we compare our detection algorithm with other three existing approaches for portscan detection using a real traffic trace. In summary, we show that FISD results in less false positives than other schemes and RINF can fast and accurately detect portscanners. We also show that the proposed system, including our scheme and algorithm, provides good performance in terms of the rate of false positives.

Study on Optimal Trading Method of REC by Solar Power Generation (태양광 REC 최적 거래 방식에 관한 연구)

  • Nam, Youngsik;Lee, Jaehyung
    • Environmental and Resource Economics Review
    • /
    • v.29 no.1
    • /
    • pp.91-111
    • /
    • 2020
  • While the renewable energy portfolio standard (RPS) is in place to expand the scale of renewable energy generation, the power producer can obtain the renewable energy credit (REC) and use it as an incentive to operate the facility. RECs secured by solar power generation can be traded through spot market or fixed price contracts, and, in the spot market trading, power producers are exposed to the uncertainty of REC spot price. In this study, real option analysis is conducted to analyze the optimal threshold of REC spot price for the conversion of REC trading method by power producer considering the uncertainty of REC spot price. We calculated the optimal threshold of REC spot price that can convert the trading method of REC from spot market to fixed price contract. In conclusion, the spot market trading is a rational trading method when considering the uncertainty of REC price, but the fixed price bidding is a rational trading method when not considering the uncertainty of REC price.

The Large Capacity Steganography Using Adaptive Threshold on Bit Planes (비트 플레인별 적응적 임계값을 이용한 대용량 스테가노그라피)

  • Lee, Sin-Joo;Jung, Sung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.11B no.4
    • /
    • pp.395-402
    • /
    • 2004
  • In this paper, we proposed a new method of the large capacity steganography using adaptive threshold on bit planes. Applying fixing threshold, if we insert information into all bit planes, all bit planes showed different image quality. Therefore, we first defined the bit plane weight to solve the fixing threshold problem. We then proposed a new adaptive threshold method using the bit plane weight and the average complexity to increase insertion capacity adaptively. In the experiment, we inserted information into the standard images with the same image quality and same insertion capacity, and we analyzed the insertion capacity and image duality. As a result, the proposed method increased the insertion capacity of about 6% and improved the image quality of about 24dB than fixed threshold method.

Adaptive Delay Threshold-based Priority Queueing Scheme for Packet Scheduling in Mobile Broadband Wireless Access System (광대역 이동 액세스 시스템에서의 실시간 및 비실시간 통합 서비스 지원을 위한 적응적 임계값 기반 패킷 스케줄링 기법)

  • Ku, Jin-Mo;Kim, Sung-Kyung;Kim, Tae-Wan;Kim, Jae-Hoon;Kang, Chung-G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3A
    • /
    • pp.261-270
    • /
    • 2007
  • The Delay Threshold-based Priority Queueing (DTPQ) scheme has been shown useful for scheduling both real-time (RT) and non-real-time (NRT) service traffic in mobile broadband wireless access (MBWA) systems. The overall system capacity can be maximized subject to their QoS requirement by the DTPQ scheme, which takes the urgency of the RT service into account only when their head-of-line (HOL) packet delays exceed a given delay threshold. In practice, the optimum delay threshold must be configured under the varying service scenarios and a corresponding traffic load, e.g., the number of RT and NRTusers in the system. In this paper, we propose an adaptive version of DTPQ scheme, which updates the delay threshold by taking the urgency and channel conditions of RT service users into account. By evaluating the proposed approach in an orthogonal frequency division multiple access/time division duplex (OFDM/TDD)-based broadband mobile access system, it has been found that our adaptive scheme significantly improves the system capacity as compared to the existing DTPQ scheme with a fixed delay threshold.

Investigation of Biases for Variance Components on Multiple Traits with Varying Number of Categories in Threshold Models Using Bayesian Inferences

  • Lee, D.H.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.15 no.7
    • /
    • pp.925-931
    • /
    • 2002
  • Gibbs sampling algorithms were implemented to the multi-trait threshold animal models with any combinations of multiple binary, ordered categorical, and linear traits and investigate the amount of bias on these models with two kinds of parameterization and algorithms for generating underlying liabilities. Statistical models which included additive genetic and residual effects as random and contemporary group effects as fixed were considered on the models using simulated data. The fully conditional posterior means of heritabilities and genetic (residual) correlations were calculated from 1,000 samples retained every 10th samples after 15,000 samples discarded as "burn-in" period. Under the models considered, several combinations of three traits with binary, multiple ordered categories, and continuous were analyzed. Five replicates were carried out. Estimates for heritabilities and genetic (residual) correlations as the posterior means were unbiased when underlying liabilities for a categorical trait were generated given by underlying liabilities of the other traits and threshold estimates were rescaled. Otherwise, when parameterizing threshold of zero and residual variance of one for binary traits, heritability estimates were inflated 7-10% upward. Genetic correlation estimates were biased upward if positively correlated and downward if negatively correlated when underling liabilities were generated without accounting for correlated traits on prior information. Residual correlation estimates were, consequently, much biased downward if positively correlated and upward if negatively correlated in that case. The more categorical trait had categories, the better mixing rate was shown.

Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking (이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구)

  • Park, Bae-Hyo;Lee, Jae-Il;Hahn, Gene-Beck;Nyang, Dae-Hun
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.

Plagiarism Detection among Source Codes using Adaptive Methods

  • Lee, Yun-Jung;Lim, Jin-Su;Ji, Jeong-Hoon;Cho, Hwaun-Gue;Woo, Gyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1627-1648
    • /
    • 2012
  • We propose an adaptive method for detecting plagiarized pairs from a large set of source code. This method is adaptive in that it uses an adaptive algorithm and it provides an adaptive threshold for determining plagiarism. Conventional algorithms are based on greedy string tiling or on local alignments of two code strings. However, most of them are not adaptive; they do not consider the characteristics of the program set, thereby causing a problem for a program set in which all the programs are inherently similar. We propose adaptive local alignment-a variant of local alignment that uses an adaptive similarity matrix. Each entry of this matrix is the logarithm of the probabilities of the keywords based on their frequency in a given program set. We also propose an adaptive threshold based on the local outlier factor (LOF), which represents the likelihood of an entity being an outlier. Experimental results indicate that our method is more sensitive than JPlag, which uses greedy string tiling for detecting plagiarism-suspected code pairs. Further, the adaptive threshold based on the LOF is shown to be effective, and the detection performance shows high sensitivity with negligible loss of specificity, compared with that using a fixed threshold.

A Study on the Reliability Comparison of Median Frequency and Spike Parameter and the Improved Spike Detection Algorithm for the Muscle Fatigue Measurement (근피로도 측정을 위한 중간 주파수와 Spike 파라미터의 신뢰도 비교 및 향상된 Spike 검출 알고리듬에 관한 연구)

  • 이성주;홍기룡;이태우;이상훈;김성환
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.5
    • /
    • pp.380-388
    • /
    • 2004
  • This study proposed an improved spike detection algorithm which automatically detects suitable spike threshold on the amplitude of surface electromyography(SEMG) signal during isometric contraction. The EMG data from the low back muscles was obtained in six channels and the proposed signal processing algorithm is compared with the median frequency and Gabriel's spike parameter. As a result, the reliability of spike parameter was inferior to the median frequency. This fact indicates that a spike parameter is inadequate for analysis of multi-channel EMG signal. Because of uncertainty of fixed spike threshold, the improved spike detection algorithm was proposed. It automatically detects suitable spike threshold depending on the amplitude of the EMG signal, and the proposed algorithm was able to detect optimal threshold based on mCFAR(modified Constant False Alarm Rate) in the every EMG channel. In conclusion, from the reliability points of view, neither median frequency nor existing spike detection algorithm was superior to the proposed method.

A Device Parameter Extraction Method for Thin Film SOI MOSFETs (얇은 박막 SOI (Silicon-On-Insulator) MOSFET 에서의 소자 변수 추출 방법)

  • Park, Sung-Kye;Kim, Choong-Ki
    • Proceedings of the KIEE Conference
    • /
    • 1992.07b
    • /
    • pp.820-824
    • /
    • 1992
  • An accurate method for extracting both Si film doping concentration and front or back silicon-to-oxide fixed charge density of fully depleted SOI devices is proposed. The method utilizes the current-to-voltage and capacitance-to-voltage characteristics of both SOI NMOSFET and PMOSFET which have the same doping concentration. The Si film doping concentration and the front or back silicon-to-oxide fixed charge density are extracted by mainpulating the respective threshold voltages of the SOI NMOSFET and PMOSFET according to the back surface condition (accumulation or inversion) and the capacitance-to-voltage characteristics of the SOI PMOSFET. Device simulations show that the proposed method has less than 10% errors for wide variations of the film doping concentration and the front or the back silicon-to-oxide fixed charge density.

  • PDF