• Title/Summary/Keyword: detection mechanisms

Search Result 328, Processing Time 0.024 seconds

Detection and Diagnosis Solutions for Fault-Tolerant VSI

  • Cordeiro, Armando;Palma, Joao C.P.;Maia, Jose;Resende, Maia J.
    • Journal of Power Electronics
    • /
    • v.14 no.6
    • /
    • pp.1272-1280
    • /
    • 2014
  • This paper presents solutions for fault detection and diagnosis of two-level, three phase voltage-source inverter (VSI) topologies with IGBT devices. The proposed solutions combine redundant standby VSI structures and contactors (or relays) to improve the fault-tolerant capabilities of power electronics in applications with safety requirements. The suitable combination of these elements gives the inverter the ability to maintain energy processing in the occurrence of several failure modes, including short-circuit in IGBT devices, thus extending its reliability and availability. A survey of previously developed fault-tolerant VSI structures and several aspects of failure modes, detection and isolation mechanisms within VSI is first discussed. Hardware solutions for the protection of power semiconductors with fault detection and diagnosis mechanisms are then proposed to provide conditions to isolate and replace damaged power devices (or branches) in real time. Experimental results from a prototype are included to validate the proposed solutions.

Cholesteric Liquid Crystals as Multi-Purpose Sensor Materials

  • Lisetski, L.N.
    • Journal of Radiation Protection and Research
    • /
    • v.30 no.1
    • /
    • pp.27-30
    • /
    • 2005
  • New possibilities are discussed for cholesteric liquid crystals (CLC) as sensor materials for detection of ionizing radiation, biologically active UV radiation, and the presence of hazardous vapors in atmosphere. A distinguishing property of CLC-based detectors is their 'bioequivalence', i.e., mechanisms of their response to external factors essentially imitate the corresponding mechanisms of biological tissues. Such detectors can ensure sufficiently high sensitivity to make feasible their use as alarm indicators or in biophysical studies. Specific examples ate given of sensor compositions and their response characteristics.

A Secure Encryption-Based Malware Detection System

  • Lin, Zhaowen;Xiao, Fei;Sun, Yi;Ma, Yan;Xing, Cong-Cong;Huang, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1799-1818
    • /
    • 2018
  • Malware detections continue to be a challenging task as attackers may be aware of the rules used in malware detection mechanisms and constantly generate new breeds of malware to evade the current malware detection mechanisms. Consequently, novel and innovated malware detection techniques need to be investigated to deal with this circumstance. In this paper, we propose a new secure malware detection system in which API call fragments are used to recognize potential malware instances, and these API call fragments together with the homomorphic encryption technique are used to construct a privacy-preserving Naive Bayes classifier (PP-NBC). Experimental results demonstrate that the proposed PP-NBC can successfully classify instances of malware with a hit-rate as high as 94.93%.

Indoor Zone Detection based on Bluetooth Low Energy (블루투스를 이용한 실내 영역 결정 방법)

  • Frisancho, Jorge;Lee, Jemin;Kim, Hyungshin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.279-281
    • /
    • 2015
  • Location awareness is an important capability for mobile-based indoor services. Those indoor services have motivated the implementation of methods that need high computational load cost and complex mechanisms for positioning prediction. These mechanisms, such as opportunistic sensing and machine learning, require more energy consumption to achieve accuracy. In this paper, we propose the Bluetooth Low Energy indoor zone detection (BLEIZOD) technique. This method exploits the concept of proximity zone to reduce the load cost and complexity. Our proposed method implements the received signal strength indicator (RSSI) function more effectively to gain accuracy and reduce energy consumption.

  • PDF

Chemiresistive Gas Sensors for Detection of Chemical Warfare Agent Simulants

  • Lee, Jun Ho;Lee, Hyun-Sook;Kim, Wonkyung;Lee, Wooyoung
    • Journal of Sensor Science and Technology
    • /
    • v.28 no.3
    • /
    • pp.139-145
    • /
    • 2019
  • Precautionary detection of chemical warfare agents (CWAs) has been an important global issue mainly owing to their toxicity. To achieve proper detection, many studies have been conducted to develop sensitive gas sensors for CWAs. In particular, metal-oxide semi-conductors (MOS) have been investigated as promising sensing materials owing to their abundance in nature and excellent sensitivity. In this review, we mainly focus on various MOS-based gas sensors that have been fabricated for the detection of two specific CWA simulants, 2-chloroethyl ethyl sulfide (2-CEES) and dimethyl methyl phosphonate (DMMP), which are simulants of sulfur mustard and sarin, respectively. In the case of 2-CEES, we mainly discuss $CdSnO_3-$ and ZnO-based sensors and their reaction mechanisms. In addition, a method to improve the selectivity of ZnO-based sensors is mentioned. Various sensors and their sensing mechanisms have been introduced for the detection of DMMP. As the reaction with DMMP may directly affect the sensing properties of MOS, this paper includes previous studies on its poisoning effect. Finally, promising sensing materials for both gases are proposed.

Robust Data, Event, and Privacy Services in Real-Time Embedded Sensor Network Systems (실시간 임베디드 센서 네트워크 시스템에서 강건한 데이터, 이벤트 및 프라이버시 서비스 기술)

  • Jung, Kang-Soo;Kapitanova, Krasimira;Son, Sang-H.;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.37 no.6
    • /
    • pp.324-332
    • /
    • 2010
  • The majority of event detection in real-time embedded sensor network systems is based on data fusion that uses noisy sensor data collected from complicated real-world environments. Current research has produced several excellent low-level mechanisms to collect sensor data and perform aggregation. However, solutions that enable these systems to provide real-time data processing using readings from heterogeneous sensors and subsequently detect complex events of interest in real-time fashion need further research. We are developing real-time event detection approaches which allow light-weight data fusion and do not require significant computing resources. Underlying the event detection framework is a collection of real-time monitoring and fusion mechanisms that are invoked upon the arrival of sensor data. The combination of these mechanisms and the framework has the potential to significantly improve the timeliness and reduce the resource requirements of embedded sensor networks. In addition to that, we discuss about a privacy that is foundation technique for trusted embedded sensor network system and explain anonymization technique to ensure privacy.

Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events (비 캐시 하드웨어 이벤트를 이용한 캐시 부채널 공격 실시간 탐지)

  • Kim, Hodong;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1255-1261
    • /
    • 2020
  • Cache side-channel attack is a class of attacks to retrieve sensitive information from a system by exploiting shared cache resources in CPUs. As the attacks are delivered to wide range of environments from mobile systems to cloud systems recently, many detection strategies have been proposed. Since the conventional cache side-channel attacks are likely to incur tremendous number of cache events, most of the previous detection mechanisms were designed to carefully monitor mostly cache events. However, recently proposed attacks tend to incur less cache events during the attack. PRIME+ABORT attack, for example, leverages the Intel TSX instead of accessing cache to measure access time. Because of the characteristic, attack detection mechanisms based on cache events may hardly detect the attack. In this paper, we conduct an in-depth analysis of the PRIME+ABORT attack to identify the other useful hardware events for detection rather than cache events. Based on our finding, we present a novel mechanism called PRIME+ABORT Detector to detect the PRIME+ABORT attack and demonstrate that the detection mechanism can achieve 99.5% success rates with 0.3% performance overhead.

LSP Congestion Control methods in ATM based MPLS on BcN

  • Kim Chul soo;Park Na jung;Ahn Gwi im;Lee Jung tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4A
    • /
    • pp.241-249
    • /
    • 2005
  • ATM based MPLS(Multiprotocol Label Switching) is discussed for its provisioning QOS commitment capabilities, Traffic engineering and smooth migration for BcN in Korea. At this time, due to the comprehensive nature of ATM protocol, ATM has been adapted as the backbone system for carrying Internet traffic[1,2,3,4]. This paper presents preventive congestion control mechanisms for detecting HTR(Hard-To-Reach) LSP(Label Switched Path) in ATM based MPLS systems. In particular, we have introduced a HTR LSP detection method using network signaling information in an ATM layer. MPLS related studies can cover LSP failures in a physical layer fault, it can not impact network congestion status. Here we will present the research results for introducing HTR LSP detection methods and control mechanisms and this mechanism can be implementing as SOC for high speed processing a packet header. We concluded that it showed faster congestion avoidance abilities with a more reduced system load and maximized the efficiency of network resources by restricting ineffective machine attempts.

Improve ARED Algorithm in TCP/IP Network (TCP/IP 네트워크에서 ARED 알고리즘의 성능 개선)

  • Nam, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.177-183
    • /
    • 2007
  • Active queue management (AQM) refers to a family of packet dropping mechanisms for router queues that has been proposed to support end-to-end congestion control mechanisms in the Internet. The proposed AQM algorithm by the IETF is Random Early Detection (RED). The RED algorithm allows network operators simultaneously to achieve high throughput and low average delay. However. the resulting average queue length is quite sensitive to the level of congestion. In this paper, we propose the Refined Adaptive RED(RARED), as a solution for reducing the sensitivity to parameters that affect RED performance. Based on simulations, we observe that the RARED scheme improves overall performance of the network. In particular, the RARED scheme reduces packet drop rate and improves goodput.

  • PDF

Hybrid Scaling Based Dynamic Time Warping for Detection of Low-rate TCP Attacks

  • So, Won-Ho;Yoo, Kyoung-Min;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.592-600
    • /
    • 2008
  • In this paper, a Hybrid Scaling based DTW (HS-DTW) mechanism is proposed for detection of periodic shrew TCP attacks. A low-rate TCP attack which is a type of shrew DoS (Denial of Service) attacks, was reported recently, but it is difficult to detect the attack using previous flooding DoS detection mechanisms. A pattern matching method with DTW (Dynamic Time Warping) as a type of defense mechanisms was shown to be reasonable method of detecting and defending against a periodic low-rate TCP attack in an input traffic link. This method, however, has the problem that a legitimate link may be misidentified as an attack link, if the threshold of the DTW value is not reasonable. In order to effectively discriminate between attack traffic and legitimate traffic, the difference between their DTW values should be large as possible. To increase the difference, we analyze a critical problem with a previous algorithm and introduce a scaling method that increases the difference between DTW values. Four kinds of scaling methods are considered and the standard deviation of the sampling data is adopted. We can select an appropriate scaling scheme according to the standard deviation of an input signal. This is why the HS-DTW increases the difference between DTW values of legitimate and attack traffic. The result is that the determination of the threshold value for discrimination is easier and the probability of mistaking legitimate traffic for an attack is dramatically reduced.