• Title/Summary/Keyword: ID3 Algorithm

Search Result 79, Processing Time 0.027 seconds

A New Decoding Algorithm and Arbitration Logic in IEEE 1394 Communications (새로운 IEEE 1394 송수신 디코딩 알고리즘과 Arbitration 회로)

  • 이제훈;박광로;서은미;조경록
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.3B
    • /
    • pp.347-354
    • /
    • 2001
  • IEEE 1394 버스는 데이터 패킷 전송시 반이중(half duplex)으로, 0과 1의 두 상태를 이용하여 전송한다. 그러나 버스 자동 구성 및 중재 기간에서 양방향으로 버스 중재 선 상태(arbitrtation line state) 신호를 주고받으며, 이는 Z, 0. 1의 세 논리 상태를 가지고 있다. IEEE 1394 버스를 채택한 노드는 시스템에 연결시 자동으로 네트웍을 트리 구조로 구성하고, 6 비트 물리 ID를 할당하며, 이는 버스 리셋, 트리 식별, 자기 식별의 세과정을 통해 구성된다. 또 전송할 데이터가 있는 경우 노드는 버스의 사용권을 얻기 위한 버스 중재(arbitration) 후 전송을 시작한다. 이러한 시스템 자동 구성을 위한 과정들과 버스 중재 과정에서 양방향으로 아날로그 0, 1, Z의 중재 선 상태 신호를 주고받게 된다. 본 논문에서는 기존 IEEE 1394를 채택한 노드들과 화환되며 중재 선 상태를 0과 1의 논리 상태만을 사용하여 버스 자동 구성 및 버스 중재를 디지털 회로로 구성할 수 있는 중재 선 상태 디코딩 알고리즘을 제안하였고, VHDL을 이용하여 전체 시스템의 동작을 시뮬레이션하였다.

  • PDF

On the Synthesis of Robot Manipulator using Adaptive Control (적용제어에 의한 로보트매니퓰레이터 설계)

  • Lee, Si-Bok;Lee, Man-Hyung;Park, Jong-Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.3 no.1
    • /
    • pp.50-59
    • /
    • 1986
  • Adaptive Model Following Control (AMFC) technique is applied to develop a robot manipulator control system, which can deal successfully with the complex dvnamics of the manipulator. Main concerns of this study are put on the problem reducing the chatter amplitude of control signal yielded by the unit vector control law that was proposed [10] previously for AMFC of the manipulatro, and the effect- iveness of the algorithm when implemented practically. To see the effectiveness of modified method, computer simulations using new and old control law are carried out and compared, and the modified one id implemented in RHINO XR-II robot system recon- structed partially to enable torque control.

  • PDF

Efficient Tool Path Generation of Compound Geometric Surface (복합기하곡면의 효율적인 공구경로 생성)

  • 한충규;이동주
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.04b
    • /
    • pp.429-433
    • /
    • 1995
  • Compound solid is maded for specially fixed object. A number of compound soild are devided as a unit germetric solid. The special case of rotation about an arbitrary axis makes according selection modelfor transformation. View plane and View region are estiblished for back face removal. After back-face removal eachedge is checked for point of intersection. The designing of of fset surface id maded and tool-path gernerted on the part surface. In tersection point is checked among the offset surfaces. The paper used an efficient algorithm for generating tool paths to apply a notion view volume. Through machining experiments with a 3-axis machining centre, the adequacy of the analysis was confirmed.

  • PDF

Auto-tuning of PID Controller using Neural Network (신경회로망을 이용한 PID 제어기 자동동조)

  • Oh, Hun;Choi, Seok-Ho;Yoon, Yang-Woong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.12 no.3
    • /
    • pp.7-13
    • /
    • 1998
  • In this paper, the control technique that ID controller are autotuned according to system dynamics, driving out sample in the changeable limits of system dynamics and learning neural network, is presented. In order to lean neural network, the backpropagation learning algorithm is used and the controller parameters obtained by rule-base are used as teacher's values. When load changes, the auto-tuning of PID controller proper to system dynamics is conformed by simulation.

  • PDF

An Efficient False Data Reduction Algorithm in P2P Environment (P2P환경에 유효한 허위 데이터 감축 알고리즘)

  • Lee, Won-Joo;Kim, Seung-Yun;Jeon, Chang-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.1-3
    • /
    • 2005
  • 현재 P2P(Peer-to-Peer) 환경에서는 많은 허위 데이터가 생성되면서 불필요한 네트워크 트래픽이 증가하는 문제점이 발생하고 있다. 본 논문에서는 이러한 문제점을 줄일 수 있는 FDR(False Data Reduction) 알고리즘을 제안한다. 이 알고리즘은 멀티미디어 콘텐츠 파일의 헤더 정보를 이용하여 데이터 파일에 고유 ID를 부여함으로써 허위 데이터 생성을 방지한다. 또한 허위 데이터로 확인된 데이터는 각 peer에 저장된 데이터 전송경로를 이용하여 허위 데이터를 삭제함으로써 허위 데이터 증가에 따른 네트워크 트래픽을 감소시킨다.

  • PDF

Implementation of a Remote Authentication System Using Smartcards to Guarantee User Anonymity to Third Party (제 3자에게 사용자 익명성을 제공하는 스마트 카드 기반 원격 인증 시스템 구현)

  • Baek, Yi-Roo;Oh, Doo-Hwan;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2750-2759
    • /
    • 2009
  • In this paper, we analyze vulnerabilities in a remote authentication protocol using smartcards which was proposed by Bindu et al. and propose an improved scheme. The proposed scheme can prevent from restricted replay attack and denial of service attack by replacing time stamp with random number. In addition, this protocol can guarantee user anonymity by transmitting encrypted user's ID using AES cipher algorithm. The computational load in our protocol is decreased by removing heavy exponentiation operations and user efficiency is enhanced due to addition of password change phase in which a user can freely change his password. Furthermore, we really implement the proposed authentication protocol using a STM smartcard and authentication server. Then we prove the correctness and effectiveness of the proposed remote authentication system.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

The State Attribute and Grade Influence Structure for the RC Bridge Deck Slabs by Information Entropy (정보 엔트로피에 의한 RC 교량 상판의 상태속성 및 등급 영향 구조 분석)

  • Hwang, Jin-Ha;Park, Jong-Hoi;An, Seoung-Su
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.23 no.1
    • /
    • pp.61-71
    • /
    • 2010
  • The attributes related to the health condition of RC deck slabs are analyzed to help us identify and rate the safety level of the bridges in this study. According to the related reports the state assessment for the outward aspects of bridges is the important and critical part for rating the overall structural safety. In this respect, the careful identification for the various state attributes make the field inspection and structural diagnosis very effective. This study analyzes the influence of the state attributes on evaluation classes and the relationship of them by the inductive reasoning, which raise the understanding and performance for evaluation work, and support the logical approach for the state assessment. ID3 algorithm applied to the case set which is constructed from the field reports indicates the main attributes and the precedence governing the assessment, and derives the decision hierarchy for the state assessment.

The Improved-Scheme of Password using Final Approval Time (최종 승인시간을 이용하는 개선된 패스워드 기법)

  • Ji, Seon-Su;Lee, Hee-Choon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.3
    • /
    • pp.57-63
    • /
    • 2011
  • The internet is currently becoming popularized and generalized in our daily life. Recently, a lot of hacking tools have appeared on the internet. And damage size and seriousness the measurement is impossible. The password security protects oneself and information is the tool which is essential for from the internet, if this emphasizes no matter how, does not go to extremes. If applies a encryption, a 7 character password is sufficient, so long as attackers don't pick easily guessed values. In this paper, entering password using the virtual keyboard, I propose a new and improved one time password algorithm using information a part of ID and final approval time.

Design of an efficient learning-based face detection system (학습기반 효율적인 얼굴 검출 시스템 설계)

  • Kim Hyunsik;Kim Wantae;Park Byungjoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.213-220
    • /
    • 2023
  • Face recognition is a very important process in video monitoring and is a type of biometric technology. It is mainly used for identification and security purposes, such as ID cards, licenses, and passports. The recognition process has many variables and is complex, so development has been slow. In this paper, we proposed a face recognition method using CNN, which has been re-examined due to the recent development of computers and algorithms, and compared with the feature comparison method, which is an existing face recognition algorithm, to verify performance. The proposed face search method is divided into a face region extraction step and a learning step. For learning, face images were standardized to 50×50 pixels, and learning was conducted while minimizing unnecessary nodes. In this paper, convolution and polling-based techniques, which are one of the deep learning technologies, were used for learning, and 1,000 face images were randomly selected from among 7,000 images of Caltech, and as a result of inspection, the final recognition rate was 98%.