• Title/Summary/Keyword: Generate Data

Search Result 3,066, Processing Time 0.033 seconds

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

THE WEIBULL MARSHALL-OLKIN LOMAX DISTRIBUTION WITH APPLICATIONS TO BLADDER AND HEAD CANCER DATA

  • KUMAR, DEVENDRA;KUMAR, MANEESH;ABD EL-BAR, AHMED M.T.;LIMA, MARIA DO CARMO S.
    • Journal of applied mathematics & informatics
    • /
    • v.39 no.5_6
    • /
    • pp.785-804
    • /
    • 2021
  • The proposal of new families has been worked out by many authors over recent years. Many ways to generate new families have been developed as the methods of addition, linear combination, composition and, one of the newer, the T-X family of distributions. Using this latter method, Korkmaz et al. (2018) proposed a new class called Weibull Marshall-Olkin-G (WMO-G) family. In the present work, we propose a new distribution, based on the WMO-G family, using the Lomax distribution as baseline, called Weibull Marshall-Olkin Lomax (WMOL) distribution. The hazard rate function of this distribution can be increasing, decreasing, bathtub-shaped, decreasing-increasing-decreasing and unimodal. Some properties of the proposed model are developed. Besides that, we consider method of maximum likelihood for estimating the unknown parameters of the WMOL distribution. We provide a simulation study in order to verify the asymptotic properties of the maximum likelihood estimates. The applicability of the new distribution to modeling real life data is proved by two real data sets.

Standard Terminology System Referenced by 3D Human Body Model

  • Choi, Byung-Kwan;Lim, Ji-Hye
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.2
    • /
    • pp.91-96
    • /
    • 2019
  • In this study, a system to increase the expressiveness of existing standard terminology using three-dimensional (3D) data is designed. We analyze the existing medical terminology system by searching the reference literature and perform an expert group focus survey. A human body image is generated using a 3D modeling tool. Then, the anatomical position of the human body is mapped to the 3D coordinates' identification (ID) and metadata. We define the term to represent the 3D human body position in a total of 12 categories, including semantic terminology entity and semantic disorder. The Blender and 3ds Max programs are used to create the 3D model from medical imaging data. The generated 3D human body model is expressed by the ID of the coordinate type (x, y, and z axes) based on the anatomical position and mapped to the semantic entity including the meaning. We propose a system of standard terminology enabling integration and utilization of the 3D human body model, coordinates (ID), and metadata. In the future, through cooperation with the Electronic Health Record system, we will contribute to clinical research to generate higher-quality big data.

Accuracy Comparison of Air Temperature Estimation using Spatial Interpolation Methods according to Application of Temperature Lapse Rate Effect (기온감률 효과 적용에 따른 공간내삽기법의 기온 추정 정확도 비교)

  • Kim, Yong Seok;Shim, Kyo Moon;Jung, Myung Pyo;Choi, In Tae
    • Journal of Climate Change Research
    • /
    • v.5 no.4
    • /
    • pp.323-329
    • /
    • 2014
  • Since the terrain of Korea is complex, micro- as well as meso-climate variability is extreme by locations in Korea. In particular, air temperature of agricultural fields is influenced by topographic features of the surroundings making accurate interpolation of regional meteorological data from point-measured data. This study was carried out to compare spatial interpolation methods to estimate air temperature in agricultural fields surrounded by rugged terrains in South Korea. Four spatial interpolation methods including Inverse Distance Weighting (IDW), Spline, Ordinary Kriging (with the temperature lapse rate) and Cokriging were tested to estimate monthly air temperature of unobserved stations. Monthly measured data sets (minimum and maximum air temperature) from 588 automatic weather system(AWS) locations in South Korea were used to generate the gridded air temperature surface. As the result, temperature lapse rate improved accuracy of all of interpolation methods, especially, spline showed the lowest RMSE of spatial interpolation methods in both maximum and minimum air temperature estimation.

Detection of Malicious PDF based on Document Structure Features and Stream Objects

  • Kang, Ah Reum;Jeong, Young-Seob;Kim, Se Lyeong;Kim, Jonghyun;Woo, Jiyoung;Choi, Sunoh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.85-93
    • /
    • 2018
  • In recent years, there has been an increasing number of ways to distribute document-based malicious code using vulnerabilities in document files. Because document type malware is not an executable file itself, it is easy to bypass existing security programs, so research on a model to detect it is necessary. In this study, we extract main features from the document structure and the JavaScript contained in the stream object In addition, when JavaScript is inserted, keywords with high occurrence frequency in malicious code such as function name, reserved word and the readable string in the script are extracted. Then, we generate a machine learning model that can distinguish between normal and malicious. In order to make it difficult to bypass, we try to achieve good performance in a black box type algorithm. For an experiment, a large amount of documents compared to previous studies is analyzed. Experimental results show 98.9% detection rate from three different type algorithms. SVM, which is a black box type algorithm and makes obfuscation difficult, shows much higher performance than in previous studies.

Semantic Trajectory Based Behavior Generation for Groups Identification

  • Cao, Yang;Cai, Zhi;Xue, Fei;Li, Tong;Ding, Zhiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5782-5799
    • /
    • 2018
  • With the development of GPS and the popularity of mobile devices with positioning capability, collecting massive amounts of trajectory data is feasible and easy. The daily trajectories of moving objects convey a concise overview of their behaviors. Different social roles have different trajectory patterns. Therefore, we can identify users or groups based on similar trajectory patterns by mining implicit life patterns. However, most existing daily trajectories mining studies mainly focus on the spatial and temporal analysis of raw trajectory data but missing the essential semantic information or behaviors. In this paper, we propose a novel trajectory semantics calculation method to identify groups that have similar behaviors. In our model, we first propose a fast and efficient approach for stay regions extraction from daily trajectories, then generate semantic trajectories by enriching the stay regions with semantic labels. To measure the similarity between semantic trajectories, we design a semantic similarity measure model based on spatial and temporal similarity factor. Furthermore, a pruning strategy is proposed to lighten tedious calculations and comparisons. We have conducted extensive experiments on real trajectory dataset of Geolife project, and the experimental results show our proposed method is both effective and efficient.

A Study on Random Reconstruction Method of 3-D Objects Based on Conditional Generative Adversarial Networks (cGANs) (cGANs(Conditional Generative Adversarial Networks) 기반 3차원 객체의 임의 재생 기법 연구)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.157-159
    • /
    • 2019
  • Hologram technology has been actively developed in terms of generation, transmission, and reproduction of 3D objects, but it is currently in a state of rest because of various limitations. Beyond VR and AR, the pseudo-hologram market is growing at an intermediate stage to meet the needs of new technologies. The key to the technology of hologram is to generate vast 3 dimensional data in the form of a point cloud, transmit the vast amount of data through the communication network in real time, and reproduce it like the original at the destination. In this paper, we propose a method to transmit massive 3 - D data in real - time and transmit the minutiae points of 3 - dimensional object information to reproduce the object as similar to original.

  • PDF

[Retracted]Hot Spot Analysis of Tourist Attractions Based on Stay Point Spatial Clustering

  • Liao, Yifan
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.750-759
    • /
    • 2020
  • The wide application of various integrated location-based services (LBS social) and tourism application (app) has generated a large amount of trajectory space data. The trajectory data are used to identify popular tourist attractions with high density of tourists, and they are of great significance to smart service and emergency management of scenic spots. A hot spot analysis method is proposed, based on spatial clustering of trajectory stop points. The DBSCAN algorithm is studied with fast clustering speed, noise processing and clustering of arbitrary shapes in space. The shortage of parameters is manually selected, and an improved method is proposed to adaptively determine parameters based on statistical distribution characteristics of data. DBSCAN clustering analysis and contrast experiments are carried out for three different datasets of artificial synthetic two-dimensional dataset, four-dimensional Iris real dataset and scenic track retention point. The experiment results show that the method can automatically generate reasonable clustering division, and it is superior to traditional algorithms such as DBSCAN and k-means. Finally, based on the spatial clustering results of the trajectory stay points, the Getis-Ord Gi* hotspot analysis and mapping are conducted in ArcGIS software. The hot spots of different tourist attractions are classified according to the analysis results, and the distribution of popular scenic spots is determined with the actual heat of the scenic spots.

CDMA Digital Mobile Communications and Message Security

  • Rhee, Man-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.3-38
    • /
    • 1996
  • The mobile station shall convolutionally encode the data transmitted on the reverse traffic channel and the access channel prior to interleaving. Code symbols output from the convolutional encoder are repeated before being interleaved except the 9600 bps data rate. All the symbols are then interleaved, 64-ary orthogonal modulation, direct-sequence spreading, quadrature spreading, baseband filtering and QPSK transmission. The sync, paging, and forward traffic channel except the pilot channel in the forward CDMA channel are convolutionally encoded, block interleaved, spread with Walsh function at a fixed chip rate of 1.2288 Mcps to provide orthogonal channelization among all code channels. Following the spreading operation, the I and Q impulses are applied to respective baseband filters. After that, these impulses shall be transmitted by QPSK. Authentication in the CDMA system is the process for confirming the identity of the mobile station by exchanging information between a mobile station and the base station. The authentication scheme is to generate a 18-bit hash code from the 152-bit message length appended with 24-bit or 40-bit padding. Several techniques are proposed for the authentication data computation in this paper. To protect sensitive subscriber information, it shall be required enciphering ceratin fields of selected traffic channel signaling messages. The message encryption can be accomplished in two ways, i.e., external encryption and internal encryption.

Blockchain for the Trustworthy Decentralized Web Architecture

  • Kim, Geun-Hyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.26-36
    • /
    • 2021
  • The Internet was created as a decentralized and autonomous system of interconnected computer networks used for data exchange across mutually trusted participants. The element technologies on the Internet, such as inter-domain and intra-domain routing and DNS, operated in a distributed manner. With the development of the Web, the Web has become indispensable in daily life. The existing web applications allow us to form online communities, generate private information, access big data, shop online, pay bills, post photos or videos, and even order groceries. This is what has led to centralization of the Web. This centralization is now controlled by the giant social media platforms that provide it as a service, but the original Internet was not like this. These giant companies realized that the decentralized network's huge value involves gathering, organizing, and monetizing information through centralized web applications. The centralized Web applications have heralded some major issues, which will likely worsen shortly. This study focuses on these problems and investigates blockchain's potentials for decentralized web architecture capable of improving conventional web services' critical features, including autonomous, robust, and secure decentralized processing and traceable trustworthiness in tamper-proof transactions. Finally, we review the decentralized web architecture that circumvents the main Internet gatekeepers and controls our data back from the giant social media companies.