• Title/Summary/Keyword: Vector Fields

Search Result 534, Processing Time 0.027 seconds

A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine (Support Vector Machine 기반 TCP/IP 헤더의 은닉채널 탐지에 관한 연구)

  • 손태식;서정우;서정택;문종섭;최홍민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.35-45
    • /
    • 2004
  • In explosively increasing internet environments, information security is one of the most important consideration. Nowadays, various security solutions are used as such problems countermeasure; IDS, Firewall and VPN. However, basically internet has much vulnerability of protocol itself. Specially, it is possible to establish a covert channel using TCP/IP header fields such as identification, sequence number, acknowledge number, timestamp and so on. In this Paper, we focus cm the covert channels using identification field of IP header and the sequence number field of TCP header. To detect such covert channels, we used Support Vector Machine which has excellent performance in pattern classification problems. Our experiments showed that proposed method could discern the abnormal cases(including covert channels) from normal TCP/IP traffic using Support Vector Machine.

A Study on Developments of Three-dimensional Measurement System for Flow-Structure Interactions using Digital Image Processing (디지털 영상처리기술을 이용한 비접촉식 유체-구조 연동운동3차원 측정시스템 개발에 관한 연구)

  • DOH DEOG-HEE;SANG JI-WOONG;HWANG TAE-GYU;CHO YONG-BEOM;PYEON YONG-BEOM
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2004.05a
    • /
    • pp.274-278
    • /
    • 2004
  • A simultaneous measurement system that can analyze the flaw-structure interactions has been developed This system consists of four CCD cameras, two for capturing instantaneous flaw fields and two for tracking a solid body. The three-dimensional vector fields around a cylinder are measured while the motion of the cylinder forced by the flow field is measured simultaneously with the constructed system The cylinder is pended in the working fluid of a water channel and the surface of the working fluid is forced sinusoidal to make the cylinder bounced Reynolds number for the mean main stream is about l000. The interaction between the flaw fields and the cylinder motion is examined quantitatively.

  • PDF

Effects of Slits and Swirl Vanes on the Main Flow Fields of a Gun-Type Gas Swirl Burner (슬릿과 스월베인이 Gun식 가스버너의 주 유동장에 미치는 영향)

  • Kim, J.K.;Jeong, K.J.
    • Journal of Power System Engineering
    • /
    • v.6 no.4
    • /
    • pp.23-29
    • /
    • 2002
  • This paper is studied to investigate the effect of slits and swirl vanes on the main flow fields of a gun-type gas burner through X-Y plane and Y-Z plane respectively by using X-probe from hot-wire anemometer system. This experiment was carried out with flow rate $450{\ell}/min$ in respective burner models installed in the test section of a subsonic wind tunnel. The burner models with only slits and only swirl vanes respectively were made by modifying original gun-type gas burner. The fast jet flow spurted from slits played a role such as an air-curtain because it encircled rotational flow by swirl vanes and drives mixed main flow to axial direction. As a result, the gun-type gas burner had a wider flow range up to about Y/R=1.5 deviated from slits and maintains a comparatively large velocity in the central part of burner within the range of about X/R=2.5. Therefore, it was very desirable that swirl vanes were installed within slits in gun-type gas burner in order to control the main flow fields effectively.

  • PDF

Integrated Control of Vector Mosquitoes with Native Fishes (Aplocheilus and Aphyocypris) ad Bacillus thuringiensis(H-14) in Natural Rice Fields of Korea (천적포식어(Aplocheilus and Aphyocypris)와 미생물제제 Bacillus thuringiensis (H-14)의 병합처리에 의한 논에서 서식하는 질병매개모기의 종합적방제)

  • 유효석;김흥철
    • Korean journal of applied entomology
    • /
    • v.28 no.3
    • /
    • pp.167-174
    • /
    • 1989
  • A confined field assessment on the integrated control of vector mosquitoes (Anopheles sinen- sis and Culex tritaent'orhynchus) was conducted by timely treatment of Bacillus thuringiensis(H-14) formulation in the presence of larvivorous fish (Aplocheilus lalipes) in natural rice fields of $30,000M^2$ at Yongam, South Korea Cholla Province from July through October in 1988. In presence of larvivorous fish (Aplocheilus) at lower density of 0.6 fish per $M^2$ water surface, mosquito vector control rates ranged 55. 0~57. 6% from July through August, and when the mosquio density started to increase with over 10 larvae on the average per sample, B.t.(H-14) formulation treatment at the rate of 1. 0 Kg/ha made 100% vectors reduc¬tion in 24 hours, the control sustained above 98% until the test was terminated on October 11th. In the fish introduced rice paddies with Aphyocypris chinensis at the density of above 1. 5 fish per $M^2$, a satisfactory degree of vector control was obtained by 88. 2~96. 7% in 2 week period until September 21st. In the absence of larvivorous fishes, B.t. (H-14) treatment made 100% control in 24 hours, however, vector population rebound appeared in day 7, required to make additional treatment to suppress population down.

  • PDF

A New Method of Coronal Magnetic Field Reconstruction

  • Yi, Sibaek;Choe, G.S.;Lim, Daye
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.1
    • /
    • pp.67.1-67.1
    • /
    • 2015
  • In the past two decades, diverse methods and computer codes for reconstruction of coronal magnetic fields have been developed. Some of them can reproduce a known analytic solution quite well when the magnetic field vector is fully specified by the known solution at the domain boundaries. In practical problems, however, we do not know the boundary conditions in the computational domain except the photospheric boundary, where vector magnetogram data are provided. We have developed a new, simple variational method employing vector potentials. We have tested the computational code based on this method for problems with known solutions and those with actual photospheric data. When solutions are fully given at all boundaries, the accuracy of our method is almost comparable to best performing methods in the market. When magnetic field vectors are only given at the photospheric boundary, our method excels other methods in "figures of merit" devised by Schrijver et al. (2006). Our method is expected to contribute to the real time monitoring of the sun required for future space weather prediction.

  • PDF

On Development of the GIS Application Based on Satellite Images (위성영상을 기반으로 한 GIS 응용 시스템 개발)

  • 양인태;최영재
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.1
    • /
    • pp.1-9
    • /
    • 2004
  • Until comparatively lately the use of vector data is the main current in GIS fields. Vector data have many advantages such as easy of scale change, small data volume and so on. But it also has some weak point that can't apply real world. The other hand the satellite images have strong point that can apply real world actually. Recently rapid progress of computer capacity and processing velocity is the current trend of the times. Therefore in this study I intend to develop GIS application based on satellite images with vector data and raster data altogether. This system is developed by using Visual C++ in the personal computer and MS Access's MDB far database management. The LANDSAT, KOMPSAT and IKONOS satellite image database were used in this study. Also, we are studied to set up scale for screen display according to spatial resolution.

Using weighted Support Vector Machine to address the imbalanced classes problem of Intrusion Detection System

  • Alabdallah, Alaeddin;Awad, Mohammed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5143-5158
    • /
    • 2018
  • Improving the intrusion detection system (IDS) is a pressing need for cyber security world. With the growth of computer networks, there are constantly daily new attacks. Machine Learning (ML) is one of the most important fields which have great contribution to address the intrusion detection issues. One of these issues relates to the imbalance of the diverse classes of network traffic. Accuracy paradox is a result of training ML algorithm with imbalanced classes. Most of the previous efforts concern improving the overall accuracy of these models which is truly important. However, even they improved the total accuracy of the system; it fell in the accuracy paradox. The seriousness of the threat caused by the minor classes and the pitfalls of the previous efforts to address this issue is the motive for this work. In this paper, we consolidated stratified sampling, cost function and weighted Support Vector Machine (WSVM) method to address the accuracy paradox of ID problem. This model achieved good results of total accuracy and superior results in the small classes like the User-To-Remote and Remote-To-Local attacks using the improved version of the benchmark dataset KDDCup99 which is called NSL-KDD.

Black-Box Classifier Interpretation Using Decision Tree and Fuzzy Logic-Based Classifier Implementation

  • Lee, Hansoo;Kim, Sungshin
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.1
    • /
    • pp.27-35
    • /
    • 2016
  • Black-box classifiers, such as artificial neural network and support vector machine, are a popular classifier because of its remarkable performance. They are applied in various fields such as inductive inferences, classifications, or regressions. However, by its characteristics, they cannot provide appropriate explanations how the classification results are derived. Therefore, there are plenty of actively discussed researches about interpreting trained black-box classifiers. In this paper, we propose a method to make a fuzzy logic-based classifier using extracted rules from the artificial neural network and support vector machine in order to interpret internal structures. As an object of classification, an anomalous propagation echo is selected which occurs frequently in radar data and becomes the problem in a precipitation estimation process. After applying a clustering method, learning dataset is generated from clusters. Using the learning dataset, artificial neural network and support vector machine are implemented. After that, decision trees for each classifier are generated. And they are used to implement simplified fuzzy logic-based classifiers by rule extraction and input selection. Finally, we can verify and compare performances. With actual occurrence cased of the anomalous propagation echo, we can determine the inner structures of the black-box classifiers.

A Study on the Application Technique and Integration of Remote Sensing and Geographic Information System (리모트센싱과 GIS의 통합 및 그 적용기법에 관한 연구)

  • 안철호;연상호
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.9 no.1
    • /
    • pp.97-107
    • /
    • 1991
  • This paper was suggested the detailed methods on the integration of Remote Sensing and GIS for various application of two functions at the one system with making the most use of respective merits rather than make use of independent systems. It developed of algorithm about simultaneous overlay of raster and vector data for remote sensing and GIS for these objects. For test application on integration of remote sensing and GIS, it used of remote sensing data of satellite and used to topographic map of the same area for vector data acquisition of GIS application. For the practical application, it proved of effective value of integration of raster and vector data by present of useful technique with multilateral approach method through data conversion about thematic application for major application fields of remote sensing and GIS and it suggested that new application technique for integrated application of remote sensing GIS through synthetic situation analysis.

  • PDF

SEMI-INVARIANT SUBMANIFOLDS OF CODIMENSION 3 IN A COMPLEX SPACE FORM WITH 𝜉-PARALLEL STRUCTURE JACOBI OPERATOR

  • U-Hang KI;Hyunjung SONG
    • East Asian mathematical journal
    • /
    • v.40 no.1
    • /
    • pp.1-23
    • /
    • 2024
  • Let M be a semi-invariant submanifold of codimension 3 with almost contact metric structure (𝜙, 𝜉, 𝜂, g) in a complex space form Mn+1(c). We denote by A, K and L the second fundamental forms with respect to the unit normal vector C, D and E respectively, where C is the distinguished normal vector, and by R𝜉 = R(𝜉, ·)𝜉 the structure Jacobi operator. Suppose that the third fundamental form t satisfies dt(X, Y) = 2𝜃g(𝜙X, Y) for a scalar 𝜃(≠ 2c) and any vector fields X and Y , and at the same time R𝜉K = KR𝜉 and ∇𝜙𝜉𝜉R𝜉 = 0. In this paper, we prove that if it satisfies ∇𝜉R𝜉 = 0 on M, then M is a real hypersurface of type (A) in Mn(c) provided that the scalar curvature $\bar{r}$ of M holds $\bar{r}-2(n-1)c{\leq}0$.