• Title/Summary/Keyword: Relationship Detection

Search Result 779, Processing Time 0.027 seconds

Development of an Adaptive Feedback based Actuator Fault Detection and Tolerant Control Algorithms for Longitudinal Autonomous Driving (적응형 되먹임 기반 종방향 자율주행 구동기 고장 탐지 및 허용 제어 알고리즘 개발)

  • Oh, Kwangseok;Lee, Jongmin;Song, Taejun;Oh, Sechan;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.4
    • /
    • pp.13-22
    • /
    • 2020
  • This paper presents an adaptive feedback based actuator fault detection and tolerant control algorithms for longitudinal functional safety of autonomous driving. In order to ensure the functional safety of autonomous vehicles, fault detection and tolerant control algorithms are needed for sensors and actuators used for autonomous driving. In this study, adaptive feedback control algorithm to compute the longitudinal acceleration for autonomous driving has been developed based on relationship function using states. The relationship function has been designed using feedback gains and error states for adaptation rule design. The coefficients in the relationship function have been estimated using recursive least square with multiple forgetting factors. The MIT rule has been adopted to design the adaptation rule for feedback gains online. The stability analysis has been conducted based on Lyapunov direct method. The longitudinal acceleration computed by adaptive control algorithm has been compared to the actual acceleration for fault detection of actuators used for longitudinal autonomous driving.

A Moral-Belief Model for Deterring Non-Work-Related Computing in Organizations

  • Tserendulam Munkh-Erdene;Sang Cheol Park
    • Asia pacific journal of information systems
    • /
    • v.29 no.4
    • /
    • pp.644-672
    • /
    • 2019
  • Negative consequences incurred from employees' non-work-related computing (NWRC) have been one of the security-related issues in information intensive organizations. While most studies have focused on the factors that motivate employees to engage in NWRC, this study examines the mediating effect of moral beliefs on the relationship between sanctions and NWRC using a moral beliefs-based model. The research model posits that the formal (i.e., punishment severity and detection certainty) and informal sanctions (subjective norms and descriptive norms) enhance employees' moral beliefs against NWRC intention. From a cross-sectional scenario-based survey involving 176 employees working at banks in Mongolia, our results indicate that moral beliefs fully mediate the relationship between detection certainty/subjective norms and NWRC intention and act as a partial mediator in the relationship between descriptive norms and NWRC. The findings from this study present empirical evidence that both informal and formal sanctions could be an effective deterrent for NWRC intention through employees' moral beliefs.

A System for Improving Data Leakage Detection based on Association Relationship between Data Leakage Patterns

  • Seo, Min-Ji;Kim, Myung-Ho
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.520-537
    • /
    • 2019
  • This paper proposes a system that can detect the data leakage pattern using a convolutional neural network based on defining the behaviors of leaking data. In this case, the leakage detection scenario of data leakage is composed of the patterns of occurrence of security logs by administration and related patterns between the security logs that are analyzed by association relationship analysis. This proposed system then detects whether the data is leaked through the convolutional neural network using an insider malicious behavior graph. Since each graph is drawn according to the leakage detection scenario of a data leakage, the system can identify the criminal insider along with the source of malicious behavior according to the results of the convolutional neural network. The results of the performance experiment using a virtual scenario show that even if a new malicious pattern that has not been previously defined is inputted into the data leakage detection system, it is possible to determine whether the data has been leaked. In addition, as compared with other data leakage detection systems, it can be seen that the proposed system is able to detect data leakage more flexibly.

Climate Factors and Their Effects on the Prevalence of Rhinovirus Infection in Cheonan, Korea

  • Lim, Dong Kyu;Jung, Bo Kyeung;Kim, Jae Kyung
    • Microbiology and Biotechnology Letters
    • /
    • v.49 no.3
    • /
    • pp.425-431
    • /
    • 2021
  • The use of big data may facilitate the recognition and interpretation of causal relationships between disease occurrence and climatic variables. Considering the immense contribution of rhinoviruses in causing respiratory infections, in this study, we examined the effects of various climatic variables on the seasonal epidemiology of rhinovirus infections in the temperate climate of Cheonan, Korea. Trends in rhinovirus detection were analyzed based on 9,010 tests performed between January 1, 2012, and December 31, 2018, at Dankook University Hospital, Cheonan, Korea. Seasonal patterns of rhinovirus detection frequency were compared with the local climatic variables for the same period. Rhinovirus infection was the highest in children under 10 years of age, and climatic variables influenced the infection rate. Temperature, wind chill temperature, humidity, and particulate matter significantly affected rhinovirus detection. Temperature and wind chill temperature were higher on days on which rhinovirus infection was detected than on which it was not. Conversely, particulate matter was lower on days on which rhinovirus was detected. Atmospheric pressure and particulate matter showed a negative relationship with rhinovirus detection, whereas temperature, wind chill temperature, and humidity showed a positive relationship. Rhinovirus infection was significantly related to climatic factors such as temperature, wind chill temperature, atmospheric pressure, humidity, and particulate matter. To the best of our knowledge, this is the first study to find a relationship between daily temperatures/wind chill temperatures and rhinovirus infection over an extended period.

Number Plate Detection System by Using the Night Images

  • Yoshimori, S.;Mitsukura, Y.;Fukumi, M.;Akamatsu, N.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1249-1253
    • /
    • 2003
  • License plate recognition is very important in an automobile society. This is because, since plate detection accuracy has large influence on subsequent number recognition, it is very important. However, it is very difficult to do it, because a background and a body color of cars are similar to that of the license plate. In this paper, we propose a new thresholds determination method in the various background by using the real-coded genetic algorithm (RGA). By using RGA, the most likely plate colors are decided under various lighting conditions. First, the average brightness Y values of images are calculated. Next, relationship between the Y value and the most likely plate color thresholds (upper and lower bounds)are obtained by RGA. The relationship between thresholds decided from RGA and brightness average is aproximate by using the recursive least squares (RLS) algorithm. In the case of plate detection, thresholds are decided from these functions.

  • PDF

Spammer Detection using Features based on User Relationships in Twitter (관계 기반 특징을 이용한 트위터 스패머 탐지)

  • Lee, Chansik;Kim, Juntae
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.785-791
    • /
    • 2014
  • Twitter is one of the most famous SNS(Social Network Service) in the world. Twitter spammer accounts that are created easily by E-mail authentication deliver harmful content to twitter users. This paper presents a spammer detection method that utilizes features based on the relationship between users in twitter. Relationship-based features include friends relationship that represents user preferences and type relationship that represents similarity between users. We compared the performance of the proposed method and conventional spammer detection method on a dataset with 3% to 30% spammer ratio, and the experimental results show that proposed method outperformed conventional method in Naive Bayesian Classification and Decision Tree Learning.

Realtime e-Actuator Fault Detection using Online Parameter Identification Method (온라인 식별 및 매개변수 추정을 이용한 실시간 e-Actuator 오류 검출)

  • Park, Jun-Gi;Kim, Tae-Ho;Lee, Heung-Sik;Park, Chansik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.3
    • /
    • pp.376-382
    • /
    • 2014
  • E-Actuator is an essential part of an eVGT, it receives the command from the main ECU and controls the vane. An e-Actuator failure can cause an abrupt change in engine output and it may induce an accident. Therefore, it is required to detect anomalies in the e-Actuator in real time to prevent accidents. In this paper, an e-Actuator fault detection method using on-line parameter identification is proposed. To implement on-line fault detection algorithm, many constraints are considered. The test input and sampling rate are selected considering the constraints. And new recursive system identification algorithm is proposed which reduces the memory and MCU power dramatically. The relationship between the identified parameters and real elements such as gears, spring and motor are derived. The fault detection method using the relationship is proposed. The experiments with the real broken gears show the effectiveness of the proposed algorithm. It is expected that the real time fault detection is possible and it can improve the safety of eVGT system.

A Probe Detection based on Private Cloud using BlockChain (블록체인을 적용한 사설 클라우드 기반 침입시도탐지)

  • Lee, Seyul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.11-17
    • /
    • 2018
  • IDS/IPS and networked computer systems are playing an increasingly important role in our society. They have been the targets of a malicious attacks that actually turn into intrusions. That is why computer security has become an important concern for network administrators. Recently, various Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems is useful for existing intrusion patterns on standard-only systems. Therefore, probe detection of private clouds using BlockChain has become a major security protection technology to detection potential attacks. In addition, BlockChain and Probe detection need to take into account the relationship between the various factors. We should develop a new probe detection technology that uses BlockChain to fine new pattern detection probes in cloud service security in the end. In this paper, we propose a probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) based on service security using BlockChain technology.

New Protocol at Fast Scan Mode for Sea-surface Small Target Detection

  • Cha, Sangbin;Park, Sanghong;Jung, Jooho;Choi, Inoh
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.17 no.2
    • /
    • pp.101-107
    • /
    • 2022
  • In this article, we propose a new protocol at fast scan mode for a sea-surface small target detection. The conventional fast scan mode is composed of coherent intrascan integration to suppress sea clutter and non-coherent interscan integration to exclude sea spikes. The proposed method realizes the coherent interscan integration by the new Fourier relationship between carrier-frequency and initial-radial-range, which can be analytically derived by using multiple carrier frequencies at fast scan mode, leading to improved detection performance, compared to the conventional non-coherent methods. In simulations, our proposed method is verified.

An Intrusion Detection Method Based on Changes of Antibody Concentration in Immune Response

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.137-150
    • /
    • 2019
  • Although the research of immune-based anomaly detection technology has made some progress, there are still some defects which have not been solved, such as the loophole problem which leads to low detection rate and high false alarm rate, the exponential relationship between training cost of mature detectors and size of self-antigens. This paper proposed an intrusion detection method based on changes of antibody concentration in immune response to improve and solve existing problems of immune based anomaly detection technology. The method introduces blood relative and blood family to classify antibodies and antigens and simulate correlations between antibodies and antigens. Then, the method establishes dynamic evolution models of antigens and antibodies in intrusion detection. In addition, the method determines concentration changes of antibodies in the immune system drawing the experience of cloud model, and divides the risk levels to guide immune responses. Experimental results show that the method has better detection performance and adaptability than traditional methods.