• Title/Summary/Keyword: information theoretic analysis

Search Result 94, Processing Time 0.02 seconds

A Study on Direction of the Electronic Government: with Focused on Freedom of Information

  • Kim, Taek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.113-119
    • /
    • 2015
  • In this paper, we propose an efficient freedom of information and Information access right which improves transparent and speedy administration process. To build open Information, we scrutinize that causes of non access right and change of civil service consciousness, attitude for open information by effectively open system circumstances. The Important thing is basic information that is available to the public through an agency's FOIA Reference Guide, all agencies must notify potential FOIA requesters of the formal rules and requirements for the making and handling of FOIA request, through their FOIA regulations. The characteristics of this paper focused on Information access right, causes of non access right and proposed policy. In this paper, The author emphasize are as follows: first, to examine freedom of information' necessity and problem that scrutinize a theoretic analysis, second, to understand civil servant's attitude for the freedom of information, third, to suggest action plan and agenda for the better of Good Governance and Democracy of information.

A Probabilistic Reasoning in Incomplete Knowledge for Theorem Proving (불완전한 지식에서 정리증명을 위한 확률추론)

  • Kim, Jin-Sang;Shin, Yang-Kyu
    • Journal of the Korean Data and Information Science Society
    • /
    • v.12 no.1
    • /
    • pp.61-69
    • /
    • 2001
  • We present a probabilistic reasoning method for inferring knowledge about mathematical truth before an automated theorem prover completes a proof. We use a Bayesian analysis to update beleif in truth, given theorem-proving progress, and show how decision-theoretic methods can be used to determine the value of continuing to deliberate versus taking immediate action in time-critical situations.

  • PDF

PCA vs. ICA for Face Recognition

  • Lee, Oyoung;Park, Hyeyoung;Park, Seung-Jin
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.873-876
    • /
    • 2000
  • The information-theoretic approach to face recognition is based on the compact coding where face images are decomposed into a small set of basis images. Most popular method for the compact coding may be the principal component analysis (PCA) which eigenface methods are based on. PCA based methods exploit only second-order statistical structure of the data, so higher- order statistical dependencies among pixels are not considered. Independent component analysis (ICA) is a signal processing technique whose goal is to express a set of random variables as linear combinations of statistically independent component variables. ICA exploits high-order statistical structure of the data that contains important information. In this paper we employ the ICA for the efficient feature extraction from face images and show that ICA outperforms the PCA in the task of face recognition. Experimental results using a simple nearest classifier and multi layer perceptron (MLP) are presented to illustrate the performance of the proposed method.

  • PDF

Mutual Information Analysis for Three-Phase Dynamic Current Mode Logic against Side-Channel Attack

  • Kim, Hyunmin;Han, Dong-Guk;Hong, Seokhie
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.584-594
    • /
    • 2015
  • To date, many different kinds of logic styles for hardware countermeasures have been developed; for example, SABL, TDPL, and DyCML. Current mode-based logic styles are useful as they consume less power compared to voltage mode-based logic styles such as SABL and TDPL. Although we developed TPDyCML in 2012 and presented it at the WISA 2012 conference, we have further optimized it in this paper using a binary decision diagram algorithm and confirmed its properties through a practical implementation of the AES S-box. In this paper, we will explain the outcome of HSPICE simulations, which included correlation power attacks, on AES S-boxes configured using a compact NMOS tree constructed from either SABL, CMOS, TDPL, DyCML, or TPDyCML. In addition, to compare the performance of each logic style in greater detail, we will carry out a mutual information analysis (MIA). Our results confirm that our logic style has good properties as a hardware countermeasure and 15% less information leakage than those secure logic styles used in our MIA.

The Impact of Information-Centric Force Improvements on Deterrence of Invasion: A Game-Theoretic Analysis (정보중심 전력증강의 전쟁억제 효과: 게임이론적 분석)

  • Cho, Jea-Yeong;Kim, Seung-Kwon
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.1-13
    • /
    • 2005
  • Due to the rapid developments in information and computer technology, the warfare paradigm is being transformed into information-centric and knowledge-based warfare. This atmosphere may have significant impact on the ROK armed forces' Force Improvement Plans (FIP) which is documented in 'Defense White Paper 2004'. We focus here on the relationship of information-centric force and deterrence of invasion. Particularly, we are interested in understanding the level of information superiority that might be required to deter the invasion. In order to solve this problem, we employed two-sided, zero-sum strategic game to simulate the outcome with six hypothetical cases devised by varying the level of information superiority.

A study on the characterization of information science (정보학의 성격규명에 관한 연구)

  • 고영만
    • Journal of the Korean Society for information Management
    • /
    • v.12 no.2
    • /
    • pp.37-61
    • /
    • 1995
  • The purpose of this paper is to make a careful study on the characterization of information science and to describe the scientific basis for the revitalization. At first, various theoretic models in initial stage and later tendency of infor mation science are analyzed and evaluated. After that the dilemma and nature of information science as a postmodem science are investigated. Upon the results of these analysis and investigation, the new reference points of information science are presented from the strategic, theory-immanant, and methodological aspects.

  • PDF

A Hierarchical Autonomous System Based Topology Control Algorithm in Space Information Network

  • Zhang, Wei;Zhang, Gengxin;Gou, Liang;Kong, Bo;Bian, Dongming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3572-3593
    • /
    • 2015
  • This article investigates the topology control problem in the space information network (SIN) using a hierarchical autonomous system (AS) approach. We propose an AS network topology control (AS-TC) algorithm to minimize the time delay in the SIN. Compared with most existing approaches for SIN where either the purely centralized or the purely distributed control method is adopted, the proposed algorithm is a hybrid control method. In order to reduce the cost of control, the control message exchange is constrained among neighboring sub-AS networks. We prove that the proposed algorithm achieve logical k-connectivity on the condition that the original physical topology is k-connectivity. Simulation results validate the theoretic analysis and effectiveness of the AS-TC algorithm.

Anchor Frame Detection Using Anchor Object Extraction (앵커 객체 추출을 이용한 앵커 프레임 검출)

  • Park Ki-Tae;Hwang Doo-Sun;Moon Young-Shik
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.3 s.309
    • /
    • pp.17-24
    • /
    • 2006
  • In this paper, an algorithm for anchor frame detection in news video is proposed, which consists of four steps. In the first step, the cumulative histogram method is used to detect shot boundaries in order to segment a news video into video shots. In the second step, skin color information is used to detect face regions in each shot boundary. In the third step, color information of upper body regions is used to extract anchor object, which produces candidate anchor frames. Then, from the candidate anchor frames, a graph-theoretic cluster analysis algorithm is utilized to classify the news video into anchor-person frames and non-anchor frames. Experiment results have shown the effectiveness of the proposed algorithm.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

A formal approach to support the identification of unsafe control actions of STPA for nuclear protection systems

  • Jung, Sejin;Heo, Yoona;Yoo, Junbeom
    • Nuclear Engineering and Technology
    • /
    • v.54 no.5
    • /
    • pp.1635-1643
    • /
    • 2022
  • STPA (System-Theoretic Process Analysis) is a widely used safety analysis technique to identify UCAs (Unsafe Control Actions) resulting in potential losses. It is totally dependent on the experience and ability of analysts to construct an information model called Control Structures, upon which analysts try to identify unsafe controls between system components. This paper proposes a formal approach to support the manual identification of UCAs, effectively and systematically. It allows analysts to mechanically extract Process Model, an important element that makes up the Control Structures, from a formal requirements specification for a software controller. It then concisely constructs the contents of Context Tables, from which analysts can identify all relevant UCAs effectively, using a software fault tree analysis technique. The case study with a preliminary version of a Korean nuclear reactor protections system shows the proposed approach's effectiveness and applicability.