• 제목/요약/키워드: Threshold Scheme

검색결과 593건 처리시간 0.021초

음악검색을 위한 가변임계치 기반의 음성 질의 변환 기법 (A Threshold Adaptation based Voice Query Transcription Scheme for Music Retrieval)

  • 한병준;노승민;황인준
    • 전기학회논문지
    • /
    • 제59권2호
    • /
    • pp.445-451
    • /
    • 2010
  • This paper presents a threshold adaptation based voice query transcription scheme for music information retrieval. The proposed scheme analyzes monophonic voice signal and generates its transcription for diverse music retrieval applications. For accurate transcription, we propose several advanced features including (i) Energetic Feature eXtractor (EFX) for onset, peak, and transient area detection; (ii) Modified Windowed Average Energy (MWAE) for defining multiple small but coherent windows with local threshold values as offset detector; and finally (iii) Circular Average Magnitude Difference Function (CAMDF) for accurate acquisition of fundamental frequency (F0) of each frame. In order to evaluate the performance of our proposed scheme, we implemented a prototype music transcription system called AMT2 (Automatic Music Transcriber version 2) and carried out various experiments. In the experiment, we used QBSH corpus [1], adapted in MIREX 2006 contest data set. Experimental result shows that our proposed scheme can improve the transcription performance.

An Automatic Portscan Detection System with Adaptive Threshold Setting

  • Kim, Sang-Kon;Lee, Seung-Ho;Seo, Seung-Woo
    • Journal of Communications and Networks
    • /
    • 제12권1호
    • /
    • pp.74-85
    • /
    • 2010
  • For the purpose of compromising hosts, attackers including infected hosts initially perform a portscan using IP addresses in order to find vulnerable hosts. Considerable research related to portscan detection has been done and many algorithms have been proposed and implemented in the network intrusion detection system (NIDS). In order to distinguish portscanners from remote hosts, most portscan detection algorithms use a fixed threshold that is manually managed by the network manager. Because the threshold is a constant, even though the network environment or the characteristics of traffic can change, many false positives and false negatives are generated by NIDS. This reduces the efficiency of NIDS and imposes a high processing burden on a network management system (NMS). In this paper, in order to address this problem, we propose an automatic portscan detection system using an fast increase slow decrease (FISD) scheme, that will automatically and adaptively set the threshold based on statistical data for traffic during prior time periods. In particular, we focus on reducing false positives rather than false negatives, while the threshold is adaptively set within a range between minimum and maximum values. We also propose a new portscan detection algorithm, rate of increase in the number of failed connection request (RINF), which is much more suitable for our system and shows better performance than other existing algorithms. In terms of the implementation, we compare our scheme with other two simple threshold estimation methods for an adaptive threshold setting scheme. Also, we compare our detection algorithm with other three existing approaches for portscan detection using a real traffic trace. In summary, we show that FISD results in less false positives than other schemes and RINF can fast and accurately detect portscanners. We also show that the proposed system, including our scheme and algorithm, provides good performance in terms of the rate of false positives.

차영상에서의 히스토그램을 이용한 적응적 임계값 결정 (Decision of Adaptive Threshold Value Using Histogram in Differential Image)

  • 오명관;김태익;최동진;전병민
    • 한국콘텐츠학회논문지
    • /
    • 제4권3호
    • /
    • pp.91-97
    • /
    • 2004
  • 이동 객체 추적 시스템을 위한 한 연구 분야로 차영상을 이용하여 움직임을 추정하는 기법이 있다. 움직임 추정을 위해 차영상을 이용하는 경우 임계값을 적용하여 배경 영역과 이동 객체 영역을 구분할 수 있도록 이진화를 수행하는 과정이 필수적이다. 본 논문에서는 차영상에서 배경과 객체의 특성 변화에 적응적인 임계값 결정 기법을 제안하였다. 제안 기법은 차영상의 히스토그램 모양을 분석하여 적절한 임계값을 결정하도록 하였다. 그레이 스케일 영상의 이진화에 사용되는 일반적인 임계값 기법들과 성능을 비교 평가하였다. 60개의 실험 영상에 대해 평가한 결과 제안 기법이 수작업으로 확인한 최적의 임계값과 평균 오차 2.8로 성능의 우수성을 확인하였다.

  • PDF

LR-UWB 시스템에서 개선된 동기 기법 (Advanced Synchronization Scheme in the LR-UWB System)

  • 권순구;김재석
    • 한국통신학회논문지
    • /
    • 제36권7B호
    • /
    • pp.892-896
    • /
    • 2011
  • 본 논문에서는 IEEE 802.15.4a 시스템에 적합한 직렬 검색 비동기 상호 상관(serial search non-coherent correlator)을 이용한 두 단계(two-stage) 방식의 동기 방식(synchronization scheme)을 제안한다. 제안된 방식에서는 다중펄스 신호를 사용하여 단일펄스 신호를 이용하는 기존 방식보다 동기성능을 개선하였고, 적응 임계값(adaptive threshold) 기법을 적용하여 고정 임계값(fixed threshold)을 사용함으로써 생기는 낮은 SNR에서의 성능 열화를 보상하였다. 제안된 기법은 IEEE 802.15.4a 채널 모델에서 기존의 기법과 비교하여 약 0.2~0.3우수한 검출 확률(Detection Probability)을 보였다.

Design of Threshold Blind Signature Scheme

  • Vo, Duc-Liem;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 하계학술대회논문집
    • /
    • pp.37-42
    • /
    • 2003
  • Threshold signature and blind signature are playing important roles in cryptography as well as practical applications such as e-cash and e-voting systems. In this paper, we present a new threshold blind digital signature based on pairings without a trusted third party. Our scheme operates on Gap Diffie-Hellman group, where Computational Diffie-Hellman problems are hard but Decision Diffie-Hellman problems are easy. For example, we use pairings that could be built from Weil pairing or Tate pairing. To the best of our knowledge, we claim that our scheme is the first threshold blind signature using pairings with provable security in the random oracle model.

  • PDF

Detection technique for code acquisition in DS-SS systems employing PN matched filters

  • 유영환;문태현;주판유;강창언
    • 한국통신학회논문지
    • /
    • 제23권7호
    • /
    • pp.1699-1706
    • /
    • 1998
  • This paper presents a threshold decision technique for direct sequence code acquistion employing Pseudo-Noise(PN) matched filter. The probabilities of detection and false alarm are derived as a measure of the system performance in both nonfading and nonselective Rician fading channels. For received PN codes with different SNR, the proposed acquisition scheme is able to detect a desired threshold in the search mode so that this value is utilized as a threshold for the verification mode. Thus, there is no need to determine a threshold by applying the Neyman-Person ciriteron. It is shown that this scheme achieves lower probability of false alarm than the acquisition scheme based on the Neyman-Person criterion, giving comparable performance in terms of the probability of detection.

  • PDF

ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법 (The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption)

  • 김미령;김효승;손영동;이동훈
    • 정보보호학회논문지
    • /
    • 제22권4호
    • /
    • pp.733-744
    • /
    • 2012
  • 동적 임계 공개키 암호 시스템(dynamic threshold public-key encryption)이란 시스템을 구축하는 과정에서 전체 사용자들의 집합과 인증된 수신자 집합의 크기, 임계치를 고정값으로 설정하지 않고 유연하게 변경될 수 있는 기능을 제공하는 임계 암호 시스템을 말한다. 이와 관련하여 신원정보를 공개키로 사용하는 ID기반 암호 시스템(identity-based encryption)과 동적 임계 공개키 시스템을 결합하여 ID기반 동적 임계 암호 시스템(identity-based dynamic threshold encryption)을 설계하려는 연구가 이뤄지고 있으며, 최근 2011년 Xing과 Xu은 동적 기능을 제공하는 ID기반 임계 암호기법을 제안하였다. 본 논문에서는 Xing과 Xu가 제안한 ID기반 동적 임계 암호 시스템을 분석하고 구조적으로 문제점이 있음을 보인다. 또한 겹선형 함수를 이용한 ID기반 암호 시스템을 ID기반 동적 임계 암호 시스템으로 변환하는 방법(conversion method)를 제안한다. 마지막으로, 변환하여 설계한 기법이 완전한 풀 모델(full model)로 선택된 평문 공격(chosen plaintext attack)환경에서 안전함을 증명한다.

통계적 여과기법에서 퍼지 규칙을 이용한 적응적 보안 경계 값 결정 방법 (An Adaptive Threshold Determining Method in Senor Networks using Fuzzy Logic)

  • 선청일;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.177-180
    • /
    • 2008
  • There are many application areas of sensor networks, such as surveillance, hospital monitoring, and home network. These are dependent on the secure operation of networks, and will have serious outcome if the networks is injured. An adversary can inject false data into the network through the compromising node. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false data during forwarding process. In this scheme, it is important that the choice of the threshold value since it trades off security and overhead. This paper presents an adaptive threshold value determining method in the SEF using fuzzy logic. The fuzzy logic determines a security distance value by considering the situation of the network. The Sensor network is divided into several areas by the security distance value, it can each area to uses the different threshold value. The fuzzy based threshold value can reduce the energy consumption in transmitting.

  • PDF

An Algorithm for Bit Error Rate Monitoring and Adaptive Decision Threshold Optimization Based on Pseudo-error Counting Scheme

  • Kim, Sung-Man
    • Journal of the Optical Society of Korea
    • /
    • 제14권1호
    • /
    • pp.22-27
    • /
    • 2010
  • Bit error rate (BER) monitoring is the ultimate goal of performance monitoring in all digital transmission systems as well as optical fiber transmission systems. To achieve this goal, optimization of the decision threshold must also be considered because BER is dependent on the level of decision threshold. In this paper, we analyze a pseudo-error counting scheme and propose an algorithm to achieve both BER monitoring and adaptive decision threshold optimization in optical fiber transmission systems. To verify the effectiveness of the proposed algorithm, we conduct computer simulations in both Gaussian and non-Gaussian distribution cases. According to the simulation results, BER and the optimum decision threshold can be estimated with the errors of < 20% and < 10 mV, respectively, within 0.1-s processing time in > 40-Gb/s transmission systems.

CRYPTANALYSIS OF A DYNAMIC THRESHOLD DECRYPTION SCHEME

  • Kim, Ki-Tae;Lim, Seong-An;Yie, Ik-Kwon;Kim, Kyung-Hee
    • 대한수학회논문집
    • /
    • 제24권1호
    • /
    • pp.153-159
    • /
    • 2009
  • In this paper, we analyze a dynamic threshold decryption scheme proposed by Long et al. It was claimed that the scheme allows to renew the master key, or to add/remove or update a decryption server, without leaking any information on the master key and changing other decryption server's secret keys. We present an attack to Long et al's scheme by using the fact that it renews a decryption server's secret key without changing other decryption server's secret shares.