• Title/Summary/Keyword: network security

Search Result 6,093, Processing Time 0.032 seconds

Creation of Natural Terrain by Erosion Simulation (자연스러운 지형 생성을 위한 침식 시뮬레이션)

  • Han, Yeong-Deok
    • Journal of Korea Game Society
    • /
    • v.15 no.6
    • /
    • pp.171-182
    • /
    • 2015
  • Existing hydraulic terrain erosion simulations mainly focus on small scale terrain deformations. In this paper, we propose a simulation method combining hydraulic terrain erosion and thermal erosion, by which a natural large scale terrain of mountainous regions with river networks can be created. For water movement we use the pipe model of shallow water simulation, and for the easy formation of watercourse we use velocity dependent erosion, also we apply thermal erosion for the formation of V-form slopes in the vicinity of stream lines. As a result, we can obtain good natural shaped terrains for certain ranges of $K_c$(sediment capacity constant) and $K_v$(velocity dependent erosion strength) values. Also we present improved thermal erosion method, and suggest a way to avoid problems caused by large $K_c$value.

Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router

  • Yan, Ruo-Yu;Zheng, Qing-Hua;Li, Hai-Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.428-451
    • /
    • 2010
  • Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly, a new type of unidirectional flow called IF flow is proposed. Merits and features of IF flows are analyzed in detail and then two efficient methods are introduced in our DDoS attacks detection and evaluation scheme. The first method uses residual variance ratio to detect DDoS attacks after Recursive Least Square (RLS) filter is applied to predict IF flows. The second method uses generalized likelihood ratio (GLR) statistical test to detect DDoS attacks after a Kalman filter is applied to estimate IF flows. Based on the two complementary methods, an evaluation formula is proposed to assess the seriousness of current DDoS attacks on router ports. Furthermore, the sensitivity of three types of traffic (IF flow, input link and output link) to DDoS attacks is analyzed and compared. Experiments show that IF flow has more power to expose anomaly than the other two types of traffic. Finally, two proposed methods are compared in terms of detection rate, processing speed, etc., and also compared in detail with Principal Component Analysis (PCA) and Cumulative Sum (CUSUM) methods. The results demonstrate that adaptive filter methods have higher detection rate, lower false alarm rate and smaller detection lag time.

Age Estimation via Selecting Discriminated Features and Preserving Geometry

  • Tian, Qing;Sun, Heyang;Ma, Chuang;Cao, Meng;Chu, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1721-1737
    • /
    • 2020
  • Human apparent age estimation has become a popular research topic and attracted great attention in recent years due to its wide applications, such as personal security and law enforcement. To achieve the goal of age estimation, a large number of methods have been pro-posed, where the models derived through the cumulative attribute coding achieve promised performance by preserving the neighbor-similarity of ages. However, these methods afore-mentioned ignore the geometric structure of extracted facial features. Indeed, the geometric structure of data greatly affects the accuracy of prediction. To this end, we propose an age estimation algorithm through joint feature selection and manifold learning paradigms, so-called Feature-selected and Geometry-preserved Least Square Regression (FGLSR). Based on this, our proposed method, compared with the others, not only preserves the geometry structures within facial representations, but also selects the discriminative features. Moreover, a deep learning extension based FGLSR is proposed later, namely Feature selected and Geometry preserved Neural Network (FGNN). Finally, related experiments are conducted on Morph2 and FG-Net datasets for FGLSR and on Morph2 datasets for FGNN. Experimental results testify our method achieve the best performances.

Effect of Particle Size and Unburned Carbon Content of Fly Ash from Hadong Power Plant on Compressive Strength of Geopolymers (하동화력발전소 비산재의 입도크기와 미연탄소 함량이 지오폴리머의 압축강도에 미치는 영향)

  • Kang, Nam-Hee;Chon, Chul-Min;Jou, Hyeong-Tae;Lee, Sujeong
    • Korean Journal of Materials Research
    • /
    • v.23 no.9
    • /
    • pp.510-516
    • /
    • 2013
  • Fly ash is one of the aluminosilicate sources used for the synthesis of geopolymers. The particle size distribution of fly ash and the content of unburned carbon residue are known to affect the compressive strength of geopolymers. In this study, the effects of particle size and unburned carbon content of fly ash on the compressive strength of geopolymers have been studied over a compositional range in geopolymer gels. Unburned carbon was effectively separated in the $-46{\mu}m$ fraction using an air classifier and the fixed carbon content declined from 3.04 wt% to 0.06 wt%. The mean particle size ($d_{50}$) decreased from $22.17{\mu}m$ to $10.79{\mu}m$. Size separation of fly ash by air classification resulted in reduced particle size and carbon residue content with a collateral increase in reactivity with alkali activators. Geopolymers produced from carbon-free ash, which was separated by air classification, developed up to 50 % higher compressive strength compared to geopolymers synthesized from raw ash. It was presumed that porous carbon particles hinder geopolymerization by trapping vitreous spheres in the pores of carbon particles and allowing them to remain intact in spite of alkaline attack. The microstructure of the geopolymers did not vary considerably with compressive strength, but the highest connectivity of the geopolymer gel network was achieved when the Si/Al ratio of the geopolymer gel was 5.0.

A Smart Phone based Family Network Service System using LBS (LBS를 이용한 스마트 폰 기반의 패밀리 네트워크 서비스 시스템)

  • Lee, Dong-Yun;Ahn, Yoon-Ae;Jung, Jin-Young;Lee, Jun-Hwan;Cho, Han-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.7
    • /
    • pp.60-69
    • /
    • 2011
  • As the mobile industry has developed, people have become to pursue more delicate information exchange and close relationships between individuals through it. According to such a request, Social Networking Services have been activated based on short messages. Moreover, in combination with smart phones, the needs for adding location information is recently increasing more and more. Security and Privacy problems, however, are raised because such location information is so sensitive and may be used maliciously by someone else. Especially, storing location information of family members in a public server may become a negative factor to hinder people from utilizing such services. Therefore, this paper proposes a location based SNS service using smart phones for home community that runs on a home server in a house so that relationships between family members at home may be closer and improved through utilizing the service.

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

A Secure Authentication Model Using Two Passwords in Client Server Systems (클라이언트 서버 시스템 환경하에서 2개의 패스워드를 사용하는 안전한 인증 모델)

  • Lee, Jae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1350-1355
    • /
    • 2011
  • It is very important issues to protect many system resources using authorized client authentication in distributed client server systems. So it is not enough to prevent unauthorized opponents from attacking our systems that client authentication is performed using only the client's identifier and password. In this paper, we propose a secure authentication database modeling with two authentication keys such as a client authentication key and a server authentication key. The proposed authentication model can be used making high quality of computer security using two authentication keys during transaction processing. The two authentication keys are created by client and server, and are used in every request transaction without user's extra input. Using the proposed authentication keys, we can detect intrusion during authorized client's transaction processing because we can know intrusion immediately through comparing stored authentication keys in client server systems when hackers attack our network or computer systems.

A Secure and Efficient Method for Detecting Malicious Nodes in MANET (MANET에서 악의적인 노드의 안전하고 효율적인 검출 방안)

  • Lee KangSeok;Choi JongOh;Ji JongBok;Song JooSeok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.617-622
    • /
    • 2005
  • Lately, the MANET research has focused on providing routing services with security and previous schemes have been proposed for detecting malicious nodes in a MANET. However, they still include some problems which malicious nodes cannot be found when they falsely report other nodes as malicious. Accordingly, we propose a novel and efficient scheme for detecting malicious nodes using report messages and a report table which is consisted of node ID both for suspecting and reporting when the malicious nodes behave normally during the route discovery, but the other hand they drop and modify packets, or falsely report other nodes as malicious during the data transmission. Our proposed scheme is applicable to not only DSR but aiso AODV. And we provide some simulation results of our proposed scheme by comparing general AODV with our proposed scheme. Simulation results show that our Proposed scheme outperforms general AODV in terms of average packet loss ratio and packet delivery ratio.

The Relationships between Social Determinants of Health and Health-related Quality of Life among the Community-dwelling Elderly (일 지역 노인의 사회적 건강결정인자와 건강 관련 삶의 질과의 관계)

  • Kim, Junghee;Lee, Hyeonkyeong;Lee, Chung Yul;Cho, Eunhee
    • Research in Community and Public Health Nursing
    • /
    • v.25 no.4
    • /
    • pp.237-247
    • /
    • 2014
  • Purpose: The purpose of this study was to examine the social determinants of health (SDH) associated with health-related quality of life (HQOL) among the community-dwelling elderly, based on the conceptual framework of the Commission on Social Determinants of Health (CSDH). Methods: A survey was conducted with 199 elders aged 65 years or older sampled through convenient sampling. Data were collected through face to face interviews by trained interviewers using a structured questionnaire, which included scales of the residential area, social support, sense of community, social network, health behaviors, and HQOL. Data were analyzed by ANOVA and stepwise multivariate regression. Results: Major SDH affecting HQOL included the participants' residential area, sense of community, and health behavior. The HQOL of the elderly residing in the B area with a low rate of basic livelihood security recipients was higher than that of those residing in other areas. Conclusion: CSDH framework was useful to determine the factors associated with HQOL among the community-dwelling elderly. In addition to their health behavior, their sense of community was found to be a SDH of HQOL, indicating the need of health promotion programs tailored to the characteristics of residential areas and strategies to enhance involvement in community activities.

Rotor Failures Diagnosis of Squirrel Cage Induction Motors with Different Supplying Sources

  • Menacer, Arezki;Champenois, Gerard;Nait Said, Mohamed Said;Benakcha, Abdelhamid;Moreau, Sandrine;Hassaine, Said
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.2
    • /
    • pp.219-228
    • /
    • 2009
  • The growing application and the numerous qualities of induction motors (1M) in industrial processes that require high security and reliability levels has led to the development of multiple methods for early fault detection. However, various faults can occur, such as stator short-circuits and rotor failures. Traditionally the diagnosis machine is done through a sinusoidal power supply, in the present paper we study experimentally the effects of the rotor failures, such as broken rotor bars in function of the ac supplying, the load and show the impact of the converter from diagnosis of the machine. The technique diagnosis used is based on the spectral analysis of stator currents or stator voltages respectively according to the types of induction motor ac supplying. So, four different ac supplying are considered: ${\odot}$ the IM is directly by the balanced three-phase network voltage source, ${\odot}$ the IM is fed by a sinusoidal current source given the controlled by hysteresis, ${\odot}$ the IM is fed (in open loop) by a scalar control imposing through ratio V/f=constant, ${\odot}$ the IM is controlled through a vector control using space vector pulse width modulation (SVPWM) technique inverter with an outer speed loop.