• Title/Summary/Keyword: Transition Detection

Search Result 282, Processing Time 0.033 seconds

Specification-based Intrusion Detection System for the Initial Authentication Phase of WiBro (와이브로의 초기인증에 적합한 명세기반의 침입탐지시스템)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.23-32
    • /
    • 2010
  • WiBro(Wireless Broadband), the service based on IEEE 802.16e(mobile WiMAX) standard, is a wireless broadband Internet technology being developed by the domestic telecommunication industry. In this paper, we analyze security vulnerabilities of WiBro focusing on initial authentication phase and propose a specification-based intrusion detection system that can detect those vulnerabilities. We first derive a specification from the normally operational process of the initial authentication based on PKMv2 EAP-AKA and formalize the derived specification as a state transition diagram. Proposed system executes the intrusion detection based on those specification and state transition diagram. In this paper, to verify the detection capability of proposed system, we construct a test bed network and execute scenario-based test.

Sensing Model for Reducing Power Consumption for Indoor/Outdoor Context Transition (실내/실외 컨텍스트 전이를 고려한 저전력 센싱 모델)

  • Kim, Deok-Ki;Park, Jae-Hyeon;Lee, Jung-Won
    • Journal of KIISE
    • /
    • v.43 no.7
    • /
    • pp.763-772
    • /
    • 2016
  • With the spread of smartphones containing multiple on-board sensors, the market for context aware applications have grown. However, due to the limited power capacity of a smartphone, users feel discontented QoS. Additionally, context aware applications require the utilization of many forms of context and sensing information. If context transition has occurred, types of needed sensors must be changed and each sensor modules need to turn on/off. In addition, excessive sensing has been found when the context decision is ambiguous. In this paper, we focus on power consumption associated with the context transition that occurs during indoor/outdoor detection, modeling the activities of the sensor associated with these contexts. And we suggest a freezing algorithm that reduces power consumption in context transition. We experiment with a commercial application that service is indoor/outdoor location tracking, measure power consumption in context transition with and without the utilization of the proposed method. We find that proposed method reduces power consumption about 20% during context transition.

Shot Transition Detection by Compensating Camera Operations (카메라의 동작을 보정한 장면전환 검출)

  • Jang Seok-Woo;Choi Hyung-Il
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.403-412
    • /
    • 2005
  • In this paper, we propose an effective method for detecting and classifying shot transitions in video sequences. The proposed method detects and classifies shot transitions including cuts, fades and dissolves by compensating camera operations in video sequences, so that our method prevents false positives resulting from camera operations. Also, our method eliminates local moving objects in the process of compensating camera operations, so that our method prevents errors resulting from moving objects. In the experiments, we show that our shot transition approach can work as a promising solution by comparing the proposed method with previously known methods in terms of performance.

A Study on the Phase Transition of DPPC Organic Films (DPPC 유기박막의 상전이에 관한 연구)

  • 김동관;이순형;최영일;최충석;장희동;이경섭
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2000.07a
    • /
    • pp.491-494
    • /
    • 2000
  • Conductive Langmuir-Blodgett(LB) films have recently attracted much interest from the viewpoint of ultrathin film conductors at the molecular level. The result shows that the Maxwell-displacement-current(MDC) measuring technique is useful in the detection of phase-transition over the entire range of molecule areas. At the liquid-solid phase transition, a striking feature in the present current measurement was observed; the I-A isotherm for a DPPC monolayer has sharp bend. Dynamic behavior of monolayers in the presence of an external field was also investigated using the current-measuring technique. Dynamic behavier of DPPC monolayer was measured by displacement current when the molecules are stimulated by pressure velocity. As result, it is known that current is generated of higher current pe마 as compression velocity become faster. Also, in order to clarify the reorganization of the lipid monolayers, it is instructive to plot the relationship between I and 1/$A^2$.

  • PDF

Design and Synthesis of Metallopeptide Sensors: Tuning Selectivity with Ligand Variation

  • Kim, Joung-Min;Joshi, Bishnu Prasad;Lee, Keun-Hyeung
    • Bulletin of the Korean Chemical Society
    • /
    • v.31 no.9
    • /
    • pp.2537-2541
    • /
    • 2010
  • We chose a fluorescent pentapeptide sensor (-CPGHE) containing a dansyl fluorophore as a model peptide and investigated whether the selectivity and sensitivity of the peptides for heavy and transition metal ions could be tuned by changing amino acid sequence. In this process, we developed a selective peptide sensor, Cp1-d (-HHPGE, $K_d\;=\;670\;nM$) for detection of $Zn^{2+}$ in 100% aqueous solution and a selective and sensitive peptide sensor, Cp1-e (-CCHPGE, $K_d\;=\;24\;nM$) for detection of $Cd^{2+}$ in 100% aqueous solution. Overall results indicate that the selectivity and sensitivity of the metallopeptide sensors to specific heavy and transition metal ions can be tuned by changing amino acid sequence.

Random sequence synchronization failure detection algorithm for synchronous stream cipher system using RMVD (RMVD를 이용하는 동기식 스트림 암호 데이터 통신시 난수동기 이탈 검출 알고리듬)

  • 박종욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.29-36
    • /
    • 2000
  • It is very import role to increase communication quality that fast detection of random sequence synchronization fail in synchronous stream cipher system using initial synchronization mode. Generally it sends additional information to detect random sequency synchronization fail. But we can't transmit additional informations to decide synchronization fail in a system using RMVD to correct channel error. In this paper we propose a method to detect synchronization fail in the receiver even though a system using RMVD has no margin to send additional information, For detecting random sequency synchronization fail we decipher receiver data analyze probability of transition rate for pre-determined period and decide synchronization fail using calculated transition rate probability. This proposed method is fast very reliable and robust in noisy channel and is easily implemented with hardware.

Rule-based Fault Detection Agent System for Fault Detection and Location on LAN (LAN 상의 장애 검출 및 위치 확인을 위한 규칙 기반 장애 진단 에이전트 시스템)

  • Jo, Gang-Hong;An, Seong-Jin;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2169-2178
    • /
    • 2000
  • This paper proposes the structure of an agent and rules for fault detection and location on LAN. To find out a reason of critical fault incurred LAN, collision detection rule, error detection rule, broadcast detection rule, system location rule, and Internet application location rule ar shown. Also, the structure of multi-agent system and state transition diagram is portrayed to have connectivity with he set of rules. To verify availability of proposed rules, the process to find a faulty system is shown by monitoring and analyzing the LAN fault occurrences from the proposed set of rules. Such an rule based agent system is helpful to an Internet manager to solve a reason of fault and make ad decision from gathering management information.

  • PDF

Optimization of State-Based Real-Time Speech Endpoint Detection Algorithm (상태변수 기반의 실시간 음성검출 알고리즘의 최적화)

  • Kim, Su-Hwan;Lee, Young-Jae;Kim, Young-Il;Jeong, Sang-Bae
    • Phonetics and Speech Sciences
    • /
    • v.2 no.4
    • /
    • pp.137-143
    • /
    • 2010
  • In this paper, a speech endpoint detection algorithm is proposed. The proposed algorithm is a kind of state transition-based ones for speech detection. To reject short-duration acoustic pulses which can be considered noises, it utilizes duration information of all detected pulses. For the optimization of parameters related with pulse lengths and energy threshold to detect speech intervals, an exhaustive search scheme is adopted while speech recognition rates are used as its performance index. Experimental results show that the proposed algorithm outperforms the baseline state-based endpoint detection algorithm. At 5 dB input SNR for the beamforming input, the word recognition accuracies of its outputs were 78.5% for human voice noises and 81.1% for music noises.

  • PDF

Automated Generation Algorithm of the Penetration Scenarios using Association Mining Technique (연관 마이닝 기법을 이용한 침입 시나리오 자동생성 알고리즘)

  • 정경훈;주정은;황현숙;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.203-207
    • /
    • 1999
  • In this paper we propose the automated generation algorithm of penetration scenario using association mining technique. Until now known intrusion detections are classified into anomaly detection and misuse detection. The former uses statistical method, features selection, neural network method in order to decide intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching for deciding intrusion. In proposed many intrusion detection algorithms unknown penetrations are created and updated by security experts. Our algorithm automatically generates penetration scenarios applying association mining technique to state transition technique. Association mining technique discovers efficient and useful unknown information in existing data. In this paper the algorithm we propose can automatically generate penetration scenarios to have been produced by security experts and is easy to cope with intrusions when it is compared to existing intrusion algorithms. Also It has advantage that maintenance cost is not high.

  • PDF

A new algorithm of pulse generation and detection for UWB communication system (UWB통신 시스템을 위한 새로운 펄스생성 방법 및 수신 알고리즘)

  • 김건수;윤상훈;정정화;이경국
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.242-245
    • /
    • 2003
  • This paper introduces a new algorithm of pulse generation and detection for UWB communication system. The existing UWB systems using Gaussian pulse have some difficulties to cope with bandwidth limitation and frequency transition. Moreover. the system sensitivity to channel noise has made the processes of acquisition and tacking difficult. in this paper, we introduce a new pulse generation method which is able to control the bandwidth and center frequency applying modulation method. thus could improve the detection performance of receiving algorithm. Also, we made a system to search maximum perk by applying the proposed algorithm and consequently could guarantee the correct detection. By the result of simulation, when accumulate 10 times at every 2dB band shifting from 0 to 18dB on AWGN channel, we could confirm the proposed method has 97.4% PDR(Pulse Detection Rate) and 1.868% FAR(False Alarm Rate) performance at 4dB SNR and 15% transmission power threshold level.

  • PDF