• 제목/요약/키워드: Technology Similarity

검색결과 1,526건 처리시간 0.025초

A DoS Detection Method Based on Composition Self-Similarity

  • Jian-Qi, Zhu;Feng, Fu;Kim, Chong-Kwon;Ke-Xin, Yin;Yan-Heng, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권5호
    • /
    • pp.1463-1478
    • /
    • 2012
  • Based on the theory of local-world network, the composition self-similarity (CSS) of network traffic is presented for the first time in this paper for the study of DoS detection. We propose the concept of composition distribution graph and design the relative operations. The $(R/S)^d$ algorithm is designed for calculating the Hurst parameter. Based on composition distribution graph and Kullback Leibler (KL) divergence, we propose the composition self-similarity anomaly detection (CSSD) method for the detection of DoS attacks. We evaluate the effectiveness of the proposed method. Compared to other entropy based anomaly detection methods, our method is more accurate and with higher sensitivity in the detection of DoS attacks.

무선 모바일 프록시 시스템에서 유사도 기반의 캐싱 손실 최소화 (Similarity-based Caching Replacement Loss Minimization in Wireless Mobile Proxy Systems)

  • 이종득
    • 한국항행학회논문지
    • /
    • 제16권3호
    • /
    • pp.455-462
    • /
    • 2012
  • 무선 모바일 프록시 캐싱 구조에서 캐싱 교체로 인한 손실은 스트리밍 QoS에 중요한 영향을 미친다. 본 논문에서는 캐싱 교체 과정에서 발생하는 손실을 최소화하기 위하여 유사도 기반의 캐싱 손실 최소화 기법 SCLM(Similarity-based Caching Loss Minimization)을 제안한다. 제안된 기법은 객체 세그먼트를 분할 한 후 유사도 관계를 수행한다. 유사도 관계가 수행된 세그먼트들은 SRT (Similarity Relation Tree)가 생성되고 유사도가 측정된다. 유사도는 적합성 피드백을 결정하는 중요한 척도로서 적합성을 만족한 세그먼트들은 캐싱 교체를 위해 캐시 블록에 저장한다. 시뮬레이션 결과 제안된 기법은 prefix 캐싱 기법, segment 캐싱 기법, 그리고 bps 캐싱 기법에 비해서 캐싱 시작 지연 제어율, 캐시 처리율, 그리고 캐시 응답율의 QoS가 효율적임을 보인다.

사회연결망 k-코어를 활용한 기술융합 분석: 방위산업 기업의 보유기술 중심 (Technology Convergence Analysis Using Social Network k-Core: Focusing on Company Technologies of Defense Industry)

  • 박동수;윤한성
    • 디지털산업정보학회논문지
    • /
    • 제18권3호
    • /
    • pp.83-95
    • /
    • 2022
  • A technology can be newly formed through technological convergence achieved by the intersection of two or more technological fields. As the complexity of technology development increases, related interest is increasing. Researches have been carried out on the concept, related indicators and analysis of technology convergence including method of social networks. This paper intends to suggest an analysis method of technology convergence using social networks based on the company's possessing technologies. According to the similarity of technologies among companies, a social network was constructed and the technology convergence was analyzed using k-core, a social network subgroup method. Using the result of k-core, base and element technologies for convergence was identified with their relations. Using the suggested method, technology convergence was analyzed on real technology data of defense-industry companies. When the minimum technology similarity is 0, the overall technology convergence relations between technology elements can be identified. In the scope of data in this paper, technologies of defense S/W, aircraft structure and structural materials are identified as important base technology for convergence.

상사성을 고려한 배수재 설치 연약점토 지반의 원심모델링 (Centrifuge Modeling of Soft Clay with Vertical Drains Considering the Centrifuge Similarity)

  • 유남재;홍영길;정길수;조한기
    • 산업기술연구
    • /
    • 제27권A호
    • /
    • pp.111-120
    • /
    • 2007
  • This paper is results of experimental research on the effect of application of similarity related to permeability of soil on the consolidation behavior as centrifuge modeling of consolidation is performed with the centrifuge model facility. In this research, the permeability of soil was controlled by changing the viscosity of porewater as the mixed water with glycerin was used during the centrifuge model experiments. The effect of drainage path on consolidation was investigated by installing the vertical drains. A serise of centrifuge model tests with conditions of single vertical and radial horizontal drainage were carried out. Kaolinite and Jumunjin standard sand were used as soft clay and surcharges respectively during tests. For testing condition of single vertical drainage considering similarity of permeability, it was found that consolidation with mixed porewater with glycerin was delayed in comparisons sons with test results with water only. For conditions of horizontal drainage with vertical drains, a low permeability by changing the viscosity of pore water resulted in delayed degree of consolidation at an initial stage of consolidation. But, it predicted not much differences in settlement as long as the consolidation time was sufficiently long enough to finish consolidation. Consequently, it was found that similarity in permeability should be considered to be critical for the case of centrifuge model experiments related to consolidation with long drainage path.

  • PDF

산란점 정보를 이용한 표적 SAR 영상 간 유사도 평가기법 (Method for Similarity Assessment Between Target SAR Images Using Scattering Center Information)

  • 박지훈;임호
    • 한국군사과학기술학회지
    • /
    • 제22권6호
    • /
    • pp.735-744
    • /
    • 2019
  • One of the key factors for recognition performance in the automatic target recognition for synthetic aperture radar imagery(SAR-ATR) system is reliability of the SAR target database. To achieve optimal performance, the database should be constructed using the images obtained under the same operating condition as the SAR sensor. However, it is impractical to have the extensive set of real-world SAR images, and thus those from the electro magnetic prediction tool with 3-D CAD models are suggested as an alternative where their reliability can be always questionable. In this paper, a method for similarity assessment between target SAR images is presented inspired by the fact that a target SAR image is mainly characterized by the features of scattering centers. The method is demonstrated using a variety of examples and quantitatively measures the similarity related to reliability. Its assessment performance is further compared with that of the existing metric, structural similarity(SSIM).

A Method for Identification of Harmful Video Images Using a 2-Dimensional Projection Map

  • Kim, Chang-Geun;Kim, Soung-Gyun;Kim, Hyun-Ju
    • Journal of information and communication convergence engineering
    • /
    • 제11권1호
    • /
    • pp.62-68
    • /
    • 2013
  • This paper proposes a method for identification of harmful video images based on the degree of harmfulness in the video content. To extract harmful candidate frames from the video effectively, we used a video color extraction method applying a projection map. The procedure for identifying the harmful video has five steps, first, extract the I-frames from the video and map them onto projection map. Next, calculate the similarity and select the potentially harmful, then identify the harmful images by comparing the similarity measurement value. The method estimates similarity between the extracted frames and normative images using the critical value of the projection map. Based on our experimental test, we propose how the harmful candidate frames are extracted and compared with normative images. The various experimental data proved that the image identification method based on the 2-dimensional projection map is superior to using the color histogram technique in harmful image detection performance.

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권8호
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

Brain MR Multimodal Medical Image Registration Based on Image Segmentation and Symmetric Self-similarity

  • Yang, Zhenzhen;Kuang, Nan;Yang, Yongpeng;Kang, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1167-1187
    • /
    • 2020
  • With the development of medical imaging technology, image registration has been widely used in the field of disease diagnosis. The registration between different modal images of brain magnetic resonance (MR) is particularly important for the diagnosis of brain diseases. However, previous registration methods don't take advantage of the prior knowledge of bilateral brain symmetry. Moreover, the difference in gray scale information of different modal images increases the difficulty of registration. In this paper, a multimodal medical image registration method based on image segmentation and symmetric self-similarity is proposed. This method uses modal independent self-similar information and modal consistency information to register images. More particularly, we propose two novel symmetric self-similarity constraint operators to constrain the segmented medical images and convert each modal medical image into a unified modal for multimodal image registration. The experimental results show that the proposed method can effectively reduce the error rate of brain MR multimodal medical image registration with rotation and translation transformations (average 0.43mm and 0.60mm) respectively, whose accuracy is better compared to state-of-the-art image registration methods.

Local Similarity based Discriminant Analysis for Face Recognition

  • Xiang, Xinguang;Liu, Fan;Bi, Ye;Wang, Yanfang;Tang, Jinhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4502-4518
    • /
    • 2015
  • Fisher linear discriminant analysis (LDA) is one of the most popular projection techniques for feature extraction and has been widely applied in face recognition. However, it cannot be used when encountering the single sample per person problem (SSPP) because the intra-class variations cannot be evaluated. In this paper, we propose a novel method called local similarity based linear discriminant analysis (LS_LDA) to solve this problem. Motivated by the "divide-conquer" strategy, we first divide the face into local blocks, and classify each local block, and then integrate all the classification results to make final decision. To make LDA feasible for SSPP problem, we further divide each block into overlapped patches and assume that these patches are from the same class. To improve the robustness of LS_LDA to outliers, we further propose local similarity based median discriminant analysis (LS_MDA), which uses class median vector to estimate the class population mean in LDA modeling. Experimental results on three popular databases show that our methods not only generalize well SSPP problem but also have strong robustness to expression, illumination, occlusion and time variation.

Semantic Trajectory Based Behavior Generation for Groups Identification

  • Cao, Yang;Cai, Zhi;Xue, Fei;Li, Tong;Ding, Zhiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5782-5799
    • /
    • 2018
  • With the development of GPS and the popularity of mobile devices with positioning capability, collecting massive amounts of trajectory data is feasible and easy. The daily trajectories of moving objects convey a concise overview of their behaviors. Different social roles have different trajectory patterns. Therefore, we can identify users or groups based on similar trajectory patterns by mining implicit life patterns. However, most existing daily trajectories mining studies mainly focus on the spatial and temporal analysis of raw trajectory data but missing the essential semantic information or behaviors. In this paper, we propose a novel trajectory semantics calculation method to identify groups that have similar behaviors. In our model, we first propose a fast and efficient approach for stay regions extraction from daily trajectories, then generate semantic trajectories by enriching the stay regions with semantic labels. To measure the similarity between semantic trajectories, we design a semantic similarity measure model based on spatial and temporal similarity factor. Furthermore, a pruning strategy is proposed to lighten tedious calculations and comparisons. We have conducted extensive experiments on real trajectory dataset of Geolife project, and the experimental results show our proposed method is both effective and efficient.