• Title/Summary/Keyword: Rule-Based Model

Search Result 1,019, Processing Time 0.031 seconds

Design and Implementation of a Secure E-Document Transmission System based Certificate for CEDA (Certified E-Document Authority) (공인전자문서보관소를 위한 인증서 기반의 안전한 전자문서 전송시스템 설계 및 구현)

  • Kim, Dae-Jung;Kim, Jung-Jae;Lee, Seung-Min;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.370-378
    • /
    • 2008
  • The CEDA(Certified E-Document Authority) is a reliable third party that deposit electronic document having legal effects securely, and verify contents of document or transmission. This paper focuses on a function of secure transmission among several important functions, and implements public key encryption system for secure transmission when server and user communicate for image transmission. This paper follows a standard fundamental rule of X.509 in ITU-T, and it uses symmetric encryption algorithm to raise speed of a large data operation. A key of symmetric encryption algorithm is encrypted by private key in public key system, it protects to be modified using digital signature for data integrity. Also it uses certificates for mutual authentication.

Effective Intrusion Detection using Evolutionary Neural Networks (진화신경망을 이용한 효과적 인 침입탐지)

  • Han Sang-Jun;Cho Sung-Bae
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.301-309
    • /
    • 2005
  • Learning program's behavior using machine learning techniques based on system call audit data is an effective intrusion detection method. Rule teaming, neural network, statistical technique, and hidden Markov model are representative methods for intrusion detection. Among them neural networks are known for its good performance in teaming system call sequences. In order to apply it to real world problems successfully, it is important to determine their structure. However, finding appropriate structure requires very long time because there are no formal solutions for determining the structure of networks. In this paper, a novel intrusion detection technique using evolutionary neural networks is proposed. Evolutionary neural networks have the advantage that superior neural networks can be obtained in shorter time than the conventional neural networks because it leams the structure and weights of neural network simultaneously Experimental results against 1999 DARPA IDEVAL data confirm that evolutionary neural networks are effective for intrusion detection.

Many-to-Many Warship Combat Tactics Generation Methodology Using the Evolutionary Simulation (진화론적 시뮬레이션을 이용한 다대다 함정교전 전술 생성 방법론)

  • Jung, Chan-Ho;Ryu, Han-Eul;You, Yong-Jun;Chi, Sung-Do;Kim, Jae-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2011
  • In most existing warships combat simulation system, the tactics of a warship is manipulated by human operators. For this reason, the simulation results are restricted due to the stereotype of human operators. To deal with this, we have employed the genetic algorithm for supporting the evolutionary simulation environment. In which, the tactical decision by human operators is replaced by the human model with a rule-based chromosome for representing tactics so that the population of simulations are created and hundreds of simulation runs are continued on the basis of the genetic algorithm without any human intervention until to find emergent tactics which shows the best performance throughout the simulation. This paper proposes an evolutionary tactics generation methodology for the emergent tactics in many-to-many warship combat simulation. To do this, 3:3 warship combat simulation tests are performed.

Accelerated Life Evaluation of Drive Shaft Using Vehicle Load Spectrum Modeling (차량 부하 스펙트럼 모델링을 이용한 구동축의 가속 수명 평가)

  • Kim, Do Sik;Lee, Geun Ho;Kang, E-Sok
    • Transactions of the KSME C: Technology and Education
    • /
    • v.5 no.2
    • /
    • pp.115-126
    • /
    • 2017
  • This paper proposes an accelerated life evaluation of drive shaft for the power train parts of special purpose vehicle. It is necessary the real load data of usage level driving load condition for life evaluation of power train parts, but we can't get the load spectrum data for evaluation in many case of special purpose vehicle. So, in this paper, the road load spectrum data for evaluation is created by modeling and simulation based on vehicle data and special road condition. The inverse power model is used for accelerated life test. The equivalent torque of load spectrum is achieved using the Miner's Rule. This paper also proposes the calibrated acceleration life test method for drive shaft. The fatigue test is performed through three stress levels. The lifetime at normal stress level is predicted by extrapolation, and is verified through comparison of experimental results and load spectrum data.

Robust Head Tracking using a Hybrid of Omega Shape Tracker and Face Detector for Robot Photographer (로봇 사진사를 위한 오메가 형상 추적기와 얼굴 검출기 융합을 이용한 강인한 머리 추적)

  • Kim, Ji-Sung;Joung, Ji-Hoon;Ho, An-Kwang;Ryu, Yeon-Geol;Lee, Won-Hyung;Jin, Chung-Myung
    • The Journal of Korea Robotics Society
    • /
    • v.5 no.2
    • /
    • pp.152-159
    • /
    • 2010
  • Finding a head of a person in a scene is very important for taking a well composed picture by a robot photographer because it depends on the position of the head. So in this paper, we propose a robust head tracking algorithm using a hybrid of an omega shape tracker and local binary pattern (LBP) AdaBoost face detector for the robot photographer to take a fine picture automatically. Face detection algorithms have good performance in terms of finding frontal faces, but it is not the same for rotated faces. In addition, when the face is occluded by a hat or hands, it has a hard time finding the face. In order to solve this problem, the omega shape tracker based on active shape model (ASM) is presented. The omega shape tracker is robust to occlusion and illuminationchange. However, whenthe environment is dynamic,such as when people move fast and when there is a complex background, its performance is unsatisfactory. Therefore, a method combining the face detection algorithm and the omega shape tracker by probabilistic method using histograms of oriented gradient (HOG) descriptor is proposed in this paper, in order to robustly find human head. A robot photographer was also implemented to abide by the 'rule of thirds' and to take photos when people smile.

Method and Application of Searching Hot Spot For Reengineering Software Using AOP (AOP를 이용한 재공학에서의 핫 스팟 탐색과 응용)

  • Lee, Ei-Sung;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.83-92
    • /
    • 2009
  • Complicated business logic makes program complexity more complicated. It's inevitable that the program must undergo reengineering processes all the way of in its lifetime. Hot spot analysis that has diverse purposes is getting an important question more and more. As a rule, reengineering process is done by UML model-based approach to analyze the legacy system. The smallest fragment of targets to be analysed is unit, that is function or class. Today's software development is to deal with huge change of software product and huge class including heavy quantity of LOC(Lines Of Code). However, analysis of unit is not precise approach process for reliable reengineering consequence. In this paper, we propose very precise hot spot analysis approach using Aspect-Oriented Programming languages, such as AspectJ. Typically the consistency between UML and source is needed code to redefine the modified library or framework boundaries. But reengineering approach using AOP doesn't need to analyze UML and source code. This approach makes dynamic event log data that contains detailed program interaction information. This dynamic event log data makes it possible to analyze hot spot.

Hydro-thermo-mechanical biaxial buckling analysis of sandwich micro-plate with isotropic/orthotropic cores and piezoelectric/polymeric nanocomposite face sheets based on FSDT on elastic foundations

  • Rajabi, Javad;Mohammadimehr, Mehdi
    • Steel and Composite Structures
    • /
    • v.33 no.4
    • /
    • pp.509-523
    • /
    • 2019
  • In the present work, the buckling analysis of micro sandwich plate with an isotropic/orthotropic cores and piezoelectric/polymeric nanocomposite face sheets is studied. In this research, two cases for core of micro sandwich plate is considered that involve five isotropic Devineycell materials (H30, H45, H60, H100 and H200) and an orthotropic material also two cases for facesheets of micro sandwich plate is illustrated that include piezoelectric layers reinforced by carbon and boron-nitride nanotubes and polymeric matrix reinforced by carbon nanotubes under temperature-dependent and hydro material properties on the elastic foundations. The first order shear deformation theory (FSDT) is adopted to model micro sandwich plate and to apply size dependent effects from modified strain gradient theory. The governing equations are derived using the minimum total potential energy principle and then solved by analytical method. Also, the effects of different parameters such as size dependent, side ratio, volume fraction, various material properties for cores and facesheets and temperature and humidity changes on the dimensionless critical buckling load are investigated. It is shown from the results that the dimensionless critical buckling load for boron nitride nanotube is lower than that of for carbon nanotube. It is illustrated that the dimensionless critical buckling load for Devineycell H200 is highest and lowest for H30. Also, the obtained results for micro sandwich plate with piezoelectric facesheets reinforced by carbon nanotubes (case b) is higher than other states (cases a and c).The results of this research can be used in aircraft, automotive, shipbuilding industries and biomedicine.

Yaw wind effect on flutter instability of four typical bridge decks

  • Zhu, Le-Dong;Xu, You-Lin;Guo, Zhenshan;Chang, Guang-Zhao;Tan, Xiao
    • Wind and Structures
    • /
    • v.17 no.3
    • /
    • pp.317-343
    • /
    • 2013
  • When evaluating flutter instability, it is often assumed that incident wind is normal to the longitudinal axis of a bridge and the flutter critical wind speed estimated from this direction is most unfavorable. However, the results obtained in this study via oblique sectional model tests of four typical types of bridge decks show that the lowest flutter critical wind speeds often occur in the yaw wind cases. The four types of bridge decks tested include a flat single-box deck, a flat ${\Pi}$-shaped thin-wall deck, a flat twin side-girder deck, and a truss-stiffened deck with and without a narrow central gap. The yaw wind effect could reduce the critical wind speed by about 6%, 2%, 8%, 7%, respectively, for the above four types of decks within a wind inclination angle range between $-3^{\circ}$ and $3^{\circ}$, and the yaw wind angles corresponding to the minimal critical wind speeds are between $4^{\circ}$ and $15^{\circ}$. It was also found that the flutter critical wind speed varies in an undulate manner with the increase of yaw angle, and the variation pattern is largely dependent on both deck shape and wind inclination angle. Therefore, the cosine rule based on the mean wind decomposition is generally inapplicable to the estimation of flutter critical wind speed of long-span bridges under skew winds. The unfavorable effect of yaw wind on the flutter instability of long-span bridges should be taken into consideration seriously in the future practice, especially for supper-long span bridges in strong wind regions.

Two-Level Hierarchical Production Planning for a Semiconductor Probing Facility (반도체 프로브 공정에서의 2단계 계층적 생산 계획 방법 연구)

  • Bang, June-Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.159-167
    • /
    • 2015
  • We consider a wafer lot transfer/release planning problem from semiconductor wafer fabrication facilities to probing facilities with the objective of minimizing the deviation of workload and total tardiness of customers' orders. Due to the complexity of the considered problem, we propose a two-level hierarchical production planning method for the lot transfer problem between two parallel facilities to obtain an executable production plan and schedule. In the higher level, the solution for the reduced mathematical model with Lagrangian relaxation method can be regarded as a coarse good lot transfer/release plan with daily time bucket, and discrete-event simulation is performed to obtain detailed lot processing schedules at the machines with a priority-rule-based scheduling method and the lot transfer/release plan is evaluated in the lower level. To evaluate the performance of the suggested planning method, we provide computational tests on the problems obtained from a set of real data and additional test scenarios in which the several levels of variations are added in the customers' demands. Results of computational tests showed that the proposed lot transfer/planning architecture generates executable plans within acceptable computational time in the real factories and the total tardiness of orders can be reduced more effectively by using more sophisticated lot transfer methods, such as considering the due date and ready times of lots associated the same order with the mathematical formulation. The proposed method may be implemented for the problem of job assignment in back-end process such as the assignment of chips to be tested from assembly facilities to final test facilities. Also, the proposed method can be improved by considering the sequence dependent setup in the probing facilities.

A Study on Anomaly Detection based on User's Command Analysis (사용자 명령어 분석을 통한 비정상 행위 판정에 관한 연구)

  • 윤정혁;오상현;이원석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.59-71
    • /
    • 2000
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while various information has been provided to users conveniently. As a results, many studies are necessary to detect the activities of intruders effectively. In this paper, a new association algorithm for the anomaly detection model is proposed in the process of generating user\`s normal patterns. It is that more recently observed behavior get more affection on the process of data mining. In addition, by clustering generated normal patterns for each use or a group of similar users, it is possible to identify the usual frequency of programs or command usage for each user or a group of uses. The performance of the proposed anomaly detection system has been tested on various system Parameters in order to identify their practical ranges for maximizing its detection rate.