• Title/Summary/Keyword: security model

Search Result 3,960, Processing Time 0.028 seconds

A numerical application of Bayesian optimization to the condition assessment of bridge hangers

  • X.W. Ye;Y. Ding;P.H. Ni
    • Smart Structures and Systems
    • /
    • v.31 no.1
    • /
    • pp.57-68
    • /
    • 2023
  • Bridge hangers, such as those in suspension and cable-stayed bridges, suffer from cumulative fatigue damage caused by dynamic loads (e.g., cyclic traffic and wind loads) in their service condition. Thus, the identification of damage to hangers is important in preserving the service life of the bridge structure. This study develops a new method for condition assessment of bridge hangers. The tension force of the bridge and the damages in the element level can be identified using the Bayesian optimization method. To improve the number of observed data, the additional mass method is combined the Bayesian optimization method. Numerical studies are presented to verify the accuracy and efficiency of the proposed method. The influence of different acquisition functions, which include expected improvement (EI), probability-of-improvement (PI), lower confidence bound (LCB), and expected improvement per second (EIPC), on the identification of damage to the bridge hanger is studied. Results show that the errors identified by the EI acquisition function are smaller than those identified by the other acquisition functions. The identification of the damage to the bridge hanger with various types of boundary conditions and different levels of measurement noise are also studied. Results show that both the severity of the damage and the tension force can be identified via the proposed method, thereby verifying the robustness of the proposed method. Compared to the genetic algorithm (GA), particle swarm optimization (PSO), and nonlinear least-square method (NLS), the Bayesian optimization (BO) performs best in identifying the structural damage and tension force.

A Case Study of Using Creative Teaching Methods: 'National Threats' Learning Task (창의적 교수법 활용 사례: '국가 위협요인' 학습 과제)

  • Jin-Wook Baek;Ju-Ho Jug
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.373-379
    • /
    • 2023
  • Creative teaching methods can be beneficial in enhancing creativity and self-directed learning abilities in the classroom. However, there may be some specific learning tasks where applying creative teaching methods can be difficult. This is because students may not have completed the necessary prerequisite learning before performing the learning task, leading to low reliability of task results or meaninglessness. This study aims to propose teaching methods that enhance creativity and self-directed learning ability when performing learning tasks that may not have sufficient prior learning. To achieve this, we present a case of applying creative teaching methods to a learning task called "national threats". As a research procedure, we provide a suitable teaching method model and detailed procedures for the given learning task, and apply them in actual classes. The results showed that applying the presented teaching methods for the learning task produced meaningful academic achievements. This study can be valuable not only for enhancing creativity in education but also for interdisciplinary research in fields such as education and national security.

Ethereum Phishing Scam Detection based on Graph Embedding and Semi-Supervised Learning (그래프 임베딩 및 준지도 기반의 이더리움 피싱 스캠 탐지)

  • Yoo-Young Cheong;Gyoung-Tae Kim;Dong-Hyuk Im
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.5
    • /
    • pp.165-170
    • /
    • 2023
  • With the recent rise of blockchain technology, cryptocurrency platforms using it are increasing, and currency transactions are being actively conducted. However, crimes that abuse the characteristics of cryptocurrency are also increasing, which is a problem. In particular, phishing scams account for more than a majority of Ethereum cybercrime and are considered a major security threat. Therefore, effective phishing scams detection methods are urgently needed. However, it is difficult to provide sufficient data for supervised learning due to the problem of data imbalance caused by the lack of phishing addresses labeled in the Ethereum participating account address. To address this, this paper proposes a phishing scams detection method that uses both Trans2vec, an effective graph embedding techique considering Ethereum transaction networks, and semi-supervised learning model Tri-training to make the most of not only labeled data but also unlabeled data.

MAGICal Synthesis: Memory-Efficient Approach for Generative Semiconductor Package Image Construction (MAGICal Synthesis: 반도체 패키지 이미지 생성을 위한 메모리 효율적 접근법)

  • Yunbin Chang;Wonyong Choi;Keejun Han
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.30 no.4
    • /
    • pp.69-78
    • /
    • 2023
  • With the rapid growth of artificial intelligence, the demand for semiconductors is enormously increasing everywhere. To ensure the manufacturing quality and quantity simultaneously, the importance of automatic defect detection during the packaging process has been re-visited by adapting various deep learning-based methodologies into automatic packaging defect inspection. Deep learning (DL) models require a large amount of data for training, but due to the nature of the semiconductor industry where security is important, sharing and labeling of relevant data is challenging, making it difficult for model training. In this study, we propose a new framework for securing sufficient data for DL models with fewer computing resources through a divide-and-conquer approach. The proposed method divides high-resolution images into pre-defined sub-regions and assigns conditional labels to each region, then trains individual sub-regions and boundaries with boundary loss inducing the globally coherent and seamless images. Afterwards, full-size image is reconstructed by combining divided sub-regions. The experimental results show that the images obtained through this research have high efficiency, consistency, quality, and generality.

A Technique for Accurate Detection of Container Attacks with eBPF and AdaBoost

  • Hyeonseok Shin;Minjung Jo;Hosang Yoo;Yongwon Lee;Byungchul Tak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.39-51
    • /
    • 2024
  • This paper proposes a novel approach to enhance the security of container-based systems by analyzing system calls to dynamically detect race conditions without modifying the kernel. Container escape attacks allow attackers to break out of a container's isolation and access other systems, utilizing vulnerabilities such as race conditions that can occur in parallel computing environments. To effectively detect and defend against such attacks, this study utilizes eBPF to observe system call patterns during attack attempts and employs a AdaBoost model to detect them. For this purpose, system calls invoked during the attacks such as Dirty COW and Dirty Cred from popular applications such as MongoDB, PostgreSQL, and Redis, were used as training data. The experimental results show that this method achieved a precision of 99.55%, a recall of 99.68%, and an F1-score of 99.62%, with the system overhead of 8%.

A Study on the Elevator System Using Real-time Object Detection Technology YOLOv5 (실시간 객체 검출 기술 YOLOv5를 이용한 스마트 엘리베이터 시스템에 관한 연구)

  • Sun-Been Park;Yu-Jeong Jeong;Da-Eun Lee;Tae-Kook Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.103-108
    • /
    • 2024
  • In this paper, a smart elevator system was studied using real-time object detection technology based on YOLO(You only look once)v5. When an external elevator button is pressed, the YOLOv5 model analyzes the camera video to determine whether there are people waiting, and if it determines that there are no people waiting, the button is automatically canceled. The study introduces an effective method of implementing object detection and communication technology through YOLOv5 and MQTT (Message Queuing Telemetry Transport) used in the Internet of Things. And using this, we implemented a smart elevator system that determines in real time whether there are people waiting. The proposed system can play the role of CCTV (closed-circuit television) while reducing unnecessary power consumption. Therefore, the proposed smart elevator system is expected to contribute to safety and security issues.

Study on the Positioning Method using BLE for Location based AIoT Service (위치 기반 지능형 사물인터넷 서비스를 위한 BLE 측위 방법에 관한 연구)

  • Ho-Deok Jang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.25-30
    • /
    • 2024
  • Smart City, a key application area of the AIoT (Artificial Intelligence of Things), provides various services in safety, security, and healthcare sectors through location tracking and location-based services. an IPS (Indoor Positioning System) is required to implement location-based services, and wireless communication technologies such as WiFi, UWB (Ultra-wideband), and BLE (Bluetooth Low Energy) are being applied. BLE, which enables data transmission and reception with low power consumption, can be applied to various IoT devices such as sensors and beacons at a low cost, making it one of the most suitable wireless communication technologies for indoor positioning. BLE utilizes the RSSI (Received Signal Strength Indicator) to estimate the distance, but due to the influence of multipath fading, which causes variations in signal strength, it results in an error of several meters. In this paper, we conducted research on a path loss model that can be applied to BLE IPS for proximity services, and confirmed that optimizing the free space propagation loss coefficient can reduce the distance error between the Tx and Rx devices.

A Method for Generating Malware Countermeasure Samples Based on Pixel Attention Mechanism

  • Xiangyu Ma;Yuntao Zhao;Yongxin Feng;Yutao Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.456-477
    • /
    • 2024
  • With information technology's rapid development, the Internet faces serious security problems. Studies have shown that malware has become a primary means of attacking the Internet. Therefore, adversarial samples have become a vital breakthrough point for studying malware. By studying adversarial samples, we can gain insights into the behavior and characteristics of malware, evaluate the performance of existing detectors in the face of deceptive samples, and help to discover vulnerabilities and improve detection methods for better performance. However, existing adversarial sample generation methods still need help regarding escape effectiveness and mobility. For instance, researchers have attempted to incorporate perturbation methods like Fast Gradient Sign Method (FGSM), Projected Gradient Descent (PGD), and others into adversarial samples to obfuscate detectors. However, these methods are only effective in specific environments and yield limited evasion effectiveness. To solve the above problems, this paper proposes a malware adversarial sample generation method (PixGAN) based on the pixel attention mechanism, which aims to improve adversarial samples' escape effect and mobility. The method transforms malware into grey-scale images and introduces the pixel attention mechanism in the Deep Convolution Generative Adversarial Networks (DCGAN) model to weigh the critical pixels in the grey-scale map, which improves the modeling ability of the generator and discriminator, thus enhancing the escape effect and mobility of the adversarial samples. The escape rate (ASR) is used as an evaluation index of the quality of the adversarial samples. The experimental results show that the adversarial samples generated by PixGAN achieve escape rates of 97%, 94%, 35%, 39%, and 43% on the Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Convolutional Neural Network and Recurrent Neural Network (CNN_RNN), and Convolutional Neural Network and Long Short Term Memory (CNN_LSTM) algorithmic detectors, respectively.

Overcoming the Challenges in the Development and Implementation of Artificial Intelligence in Radiology: A Comprehensive Review of Solutions Beyond Supervised Learning

  • Gil-Sun Hong;Miso Jang;Sunggu Kyung;Kyungjin Cho;Jiheon Jeong;Grace Yoojin Lee;Keewon Shin;Ki Duk Kim;Seung Min Ryu;Joon Beom Seo;Sang Min Lee;Namkug Kim
    • Korean Journal of Radiology
    • /
    • v.24 no.11
    • /
    • pp.1061-1080
    • /
    • 2023
  • Artificial intelligence (AI) in radiology is a rapidly developing field with several prospective clinical studies demonstrating its benefits in clinical practice. In 2022, the Korean Society of Radiology held a forum to discuss the challenges and drawbacks in AI development and implementation. Various barriers hinder the successful application and widespread adoption of AI in radiology, such as limited annotated data, data privacy and security, data heterogeneity, imbalanced data, model interpretability, overfitting, and integration with clinical workflows. In this review, some of the various possible solutions to these challenges are presented and discussed; these include training with longitudinal and multimodal datasets, dense training with multitask learning and multimodal learning, self-supervised contrastive learning, various image modifications and syntheses using generative models, explainable AI, causal learning, federated learning with large data models, and digital twins.

The TANDEM Euratom project: Context, objectives and workplan

  • C. Vaglio-Gaudard;M.T. Dominguez Bautista;M. Frignani;M. Futterer;A. Goicea;E. Hanus;T. Hollands;C. Lombardo;S. Lorenzi;J. Miss;G. Pavel;A. Pucciarelli;M. Ricotti;A. Ruby;C. Schneidesch;S. Sholomitsky;G. Simonini;V. Tulkki;K. Varri;L. Zezula;N. Wessberg
    • Nuclear Engineering and Technology
    • /
    • v.56 no.3
    • /
    • pp.993-1001
    • /
    • 2024
  • The TANDEM project is a European initiative funded under the EURATOM program. The project started on September 2022 and has a duration of 36 months. TANDEM stands for Small Modular ReacTor for a European sAfe aNd Decarbonized Energy Mix. Small Modular Reactors (SMRs) can be hybridized with other energy sources, storage systems and energy conversion applications to provide electricity, heat and hydrogen. Hybrid energy systems have the potential to strongly contribute to the energy decarbonization targeting carbon-neutrality in Europe by 2050. However, the integration of nuclear reactors, particularly SMRs, in hybrid energy systems, is a new R&D topic to be investigated. In this context, the TANDEM project aims to develop assessments and tools to facilitate the safe and efficient integration of SMRs into low-carbon hybrid energy systems. An open-source "TANDEM" model library of hybrid system components will be developed in Modelica language which, by coupling, will extend the capabilities of existing tools implemented in the project. The project proposes to specifically address the safety issues of SMRs related to their integration into hybrid energy systems, involving specific interactions between SMRs and the rest of the hybrid systems; new initiating events may have to be considered in the safety approach. TANDEM will study two hybrid systems covering the main trends of the European energy policy and market evolution at 2035's horizon: a district heating network and power supply in a large urban area, and an energy hub serving energy conversion systems, including hydrogen production; the energy hub is inspired from a harbor-like infrastructure. TANDEM will provide assessments on SMR safety, hybrid system operationality and techno-economics. Societal considerations will also be encased by analyzing European citizen engagement in SMR technology safety.