• Title/Summary/Keyword: Random Box

Search Result 97, Processing Time 0.027 seconds

A Study on the Confidence Region of the Stationary Point in a second Order Response Surface

  • Jorn, Hong S.
    • Journal of the Korean Statistical Society
    • /
    • v.7 no.2
    • /
    • pp.109-119
    • /
    • 1978
  • When a response surface by a seconde order polynomial regression model, the stationary point is obtained by solving simultaneous linear equations. But the point is a function of random variables. We can find a confidence region for this point as Box and Hunter provided. However, the confidence region is often too large to be useful for the experiments, and it is necessary to augment additional design points in order to obtain a satisfactory confidence region for the stationary point. In this note, the author suggests a method how to augment design points "eficiently", and shows the change of the confidence region of the estimated stationary point in a response surface.e surface.

  • PDF

Deep Learning based Scrapbox Accumulated Status Measuring

  • Seo, Ye-In;Jeong, Eui-Han;Kim, Dong-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.27-32
    • /
    • 2020
  • In this paper, we propose an algorithm to measure the accumulated status of scrap boxes where metal scraps are accumulated. The accumulated status measuring is defined as a multi-class classification problem, and the method with deep learning classify the accumulated status using only the scrap box image. The learning was conducted by the Transfer Learning method, and the deep learning model was NASNet-A. In order to improve the accuracy of the model, we combined the Random Forest classifier with the trained NASNet-A and improved the model through post-processing. Testing with 4,195 data collected in the field showed 55% accuracy when only NASNet-A was applied, and the proposed method, NASNet with Random Forest, improved the accuracy by 88%.

Stream Cipher Algorithm using the Modified S-box (변형된 S박스를 이용한 스트림 암호 알고리즘)

  • 박미옥;최연희;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.137-145
    • /
    • 2003
  • Nowadays, people can communicate with each other on any time at my place by development of wireless communications. But, the openness of mobile communications Poses serious security threats and the security is necessary on mobile communications to support the secure communication channel. The most commonly method is stream cipher for mobile communications. Generally, this stream cipher is implemented by LFSR(Linear Feedback Shift Register). On this paper proposes the modified mechanism of the S box is usually used in block cipher to advance security og the stream cipher and this mechanism is the modified three one in consideration og the randomness. Generally, S box that is function with nonlinear property makes data more strong by attack. The randomness test of the proposed algorithm is used Ent Pseudorandom Number Sequence Test Program and by the test result it proves that it has better randomness and serial correlation value than the based stream cipher on respective test.

Image Steganography for Securing Hangul Messages based on RS-box Hiding Model (RS-box 은닉 모델에 기반한 한글 메시지 보안을 위한 이미지 스테가노그래피)

  • Seon-su Ji
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.2
    • /
    • pp.97-103
    • /
    • 2023
  • Since most of the information is transmitted through the network, eavesdropping and interception by a third party may occur. Appropriate measures are required for effective, secure and confidential communication in the network. Steganography is a technology that prevents third parties from detecting that confidential information is hidden in other media. Due to structural vulnerabilities, information protected by encryption and steganography techniques can be easily exposed to illegitimate groups. In order to improve the limitations of LSB where the simplicity and predictability of the hiding method exist, I propose a technique to improve the security of the message to be hidden based on PRNG and recursive function. To enhance security and confusion, XOR operation was performed on the result of selecting a random bit from the upper bits of the selected channel and the information transformed by the RS-box. PSNR and SSIM were used to confirm the performance of the proposed method. Compared to the reference values, the SSIM and PSNR of the proposed method were 0.9999 and 51.366, respectively, confirming that they were appropriate for hiding information.

Generating Test Cases of Simulink/Stateflow Model Based on RRT Algorithm Using Heuristic Input Analysis (휴리스틱 입력 분석을 이용한 RRT 기반의 Simulink/Stateflow 모델 테스트 케이스 생성 기법)

  • Park, Hyeon Sang;Choi, Kyung Hee;Chung, Ki Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.12
    • /
    • pp.829-840
    • /
    • 2013
  • This paper proposes a modified RRT (Rapidly exploring Random Tree) algorithm utilizing a heuristic input analysis and suggests a test case generation method from Simulink/Stateflow model using the proposed RRT algorithm. Though the typical RRT algorithm is an efficient method to solve the reachability problem to definitely be resolved for generating test cases of model in a black box manner, it has a drawback, an inefficiency of test case generation that comes from generating random inputs without considering the internal states and the test targets of model. The proposed test case generation method increases efficiency of test case generation by analyzing the test targets to be satisfied at the current state and heuristically deciding the inputs of model based on the analysis during expanding an RRT, while maintaining the merit of RRT algorithm. The proposed method is evaluated with the models of ECUs embedded in a commercial passenger's car. The performance is compared with that of the typical RRT algorithm.

Analysis of the Feature Importance of Occupational Accidents Occurring at Construction Sites on the Severity of Lost Workdays (건설 현장에서 발생한 업무상 재해가 근로손실일수 심각도에 미치는 특징 중요도 분석)

  • Kang, Kyung-Su;Choi, Jae-Hyun;Ryu, Han-Guk
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.2
    • /
    • pp.165-174
    • /
    • 2021
  • The construction industry causes the most accidents and fatalities among all industries. Although many efforts have been made to reduce safety accidents in construction, the study on the lost workdays that return to work place is insufficient. Therefore, this study proposes a model that classifies the lost workdays lost into moderate and severity, and derives the importance of variable and analyzes important factors through the trained random forest model. We analyze the learning process of the random forest which is a black box model, and extracted important variables that impact on the severity of the lost workdays through the extracted feature importance. The factors existing inside were analyzed through the extracted variables. The purpose of this study is to analyze the accident case data at the construction site through a random forest model and to review variables that have a high impact on the lost workdays. In the future, this sutdy can apply to improve construction safety management and reduce the accident of industrial accidents.

VALIDITY OF USE A Y-MAZE TO DETERMINE A FORAGING STRATEGY OF CATTLE

  • Hosoi, E.;Rittenhouse, L.R.;Swift, D.M.;Richards, R.W.;Yano, H.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.8 no.2
    • /
    • pp.145-149
    • /
    • 1995
  • Validity of use of a Y-maze for determining a foraging strategy of cattle was investigated with the object of establishing a procedure of testing foraging strategies of large herbivores. Cattle were placed in a start box of a Y-maze, forced into either goal arm and allowed to consume half of the feed at the end of the arm. Then, cattle were returned to the start box and allowed to choose either arm in the second half of a trial. This time animals were allowed to deplete the feed in the goal arm they chose. A return to the previous arm was recorded a "stay" Choice of the other arm was recorded as a "shift". Shift strategy was not observed. Rather, their behavior appeared either random or stay. However, it might have been caused by inappropriateness of the application of the apparatus and/or the procedure used in the study of foraging behavior of rats. Although the existence of lateral preference was suggested, further study with an elaborated procedure will be necessary to investigate foraging strategies of cattle.

Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box (비트 슬라이스 대합 S-박스에 의한 대칭 SPN 블록 암호에 대한 차분 오류 공격)

  • Kang, HyungChul;Lee, Changhoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.3
    • /
    • pp.105-108
    • /
    • 2015
  • In this paper, we propose a differential fault analysis on symmetric SPN block cipher with bitslice involution S-box in 2011. The target block cipher was designed using AES block cipher and has advantage about restricted hardware and software environment using the same structure in encryption and decryption. Therefore, the target block cipher must be secure for the side-channel attacks. However, to recover the 128-bit secret key of the targer block cipher, this attack requires only one random byte fault and an exhausted search of $2^8$. This is the first known cryptanalytic result on the target block cipher.

A Design of Authentication/Security Processor IP for Wireless USB (무선 USB 인증/보안용 프로세서 IP 설계)

  • Yang, Hyun-Chang;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2031-2038
    • /
    • 2008
  • A small-area and high-speed authentication/security processor (WUSB_Sec) IP is designed, which performs the 4-way handshake protocol for authentication between host and device, and data encryption/decryption of wireless USB system. The PRF-256 and PRF-64 are implemented by CCM (Counter mode with CBC-MAC) operation, and the CCM is designed with two AES (Advanced Encryption Standard) encryption coles working concurrently for parallel processing of CBC mode and CTR mode operations. The AES core that is an essential block of the WUSB_Sec processor is designed by applying composite field arithmetic on AF$(((2^2)^2)^2)$. Also, S-Box sharing between SubByte block and key scheduler block reduces the gate count by 10%. The designed WUSB_Sec processor has 25,000 gates and the estimated throughput rate is about 480Mbps at 120MHz clock frequency.

A Development of Unbalanced Box Stacking System with High Stability using the Center of Gravity Measurement (무게중심 측정을 이용한 불평형 상자의 고안정 적재 시스템 개발)

  • Seong-Woo Bae;Dae-Gyu Han;Jae-Ho Ryu;Hyeon-hui Lee;Chae-Hun An
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.1
    • /
    • pp.229-237
    • /
    • 2024
  • The logistics industry is converging with digital technology and growing into various logistics automation systems. However, inspection and loading/unloading, which are mainly performed in logistics work, depend on human resources, and the workforce is shrinking due to the decline in the productive population due to the low birth rate and aging. Although much research is being conducted on the development of automated logistics systems to solve these problems, there is a lack of research and development on load stacking stability, which has the potential to cause significant accidents. In this study, loading boxes with various sizes and positions of the center of gravity were set up, and a method for stacking that with high stability is presented. The size of the loading box is measured using a depth camera. The loading box's weight and center of gravity are measured and estimated by a developed device with four loadcells. The measurement error is measured through various repeated experiments and is corrected using the least squares method. The robot arm performs load stacking by determining the target position so that the centers of gravity of the loading boxes with unbalanced masses with a random sequence are transported in alignment. All processes were automated, and the results were verified by experimentally confirming load stacking stability.