• Title/Summary/Keyword: smart counter

Search Result 52, Processing Time 0.021 seconds

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Design of Phase Locked Loop (PLL) based Time to Digital Converter for LiDAR System with Measurement of Absolute Time Difference (LiDAR 시스템용 절대시간 측정을 위한 위상고정루프 기반 시간 디지털 변환기 설계)

  • Yoo, Sang-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.677-684
    • /
    • 2021
  • This paper presents a time-to-digital converter for measuring absolute time differences. The time-to-digital converter was designed and fabricated in 0.18-um CMOS technology and it can be applied to Light Detection and Ranging system which requires long time-cover range and 50ps time resolution. Since designed time-to-digital converter adopted the reference clock of 625MHz generated by phase locked loop, it could have absolute time resolution of 50ps after automatic calibration and its cover range was over than 800ns. The time-to-digital converter adopted a counter and chain delay lines for time measurement. The counter is used for coarse time measurement and chain delay lines are used for fine time measurement. From many times experiments, fabricated time-to-digital converter has 50 ps time resolution with maximum INL of 0.8 LSB and its power consumption is about 70 mW.

Treatment of GABA from Fermented Rice Germ Ameliorates Caffeine-Induced Sleep Disturbance in Mice

  • Mabunga, Darine Froy N.;Gonzales, Edson Luck T.;Kim, Hee Jin;Choung, Se Young
    • Biomolecules & Therapeutics
    • /
    • v.23 no.3
    • /
    • pp.268-274
    • /
    • 2015
  • ${\gamma}$-Aminobutyric acid (GABA), a major inhibitory neurotransmitter in the mammalian central nervous system, is involved in sleep physiology. Caffeine is widely used psychoactive substance known to induce wakefulness and insomnia to its consumers. This study was performed to examine whether GABA extracts from fermented rice germ ameliorates caffeine-induced sleep disturbance in mice, without affecting spontaneous locomotor activity and motor coordination. Indeed, caffeine (10 mg/kg, i.p.) delayed sleep onset and reduced sleep duration of mice. Conversely, rice germ ferment extracts-GABA treatment (10, 30, or 100 mg/kg, p.o.), especially at 100 mg/kg, normalized the sleep disturbance induced by caffeine. In locomotor tests, rice germ ferment extracts-GABA slightly but not significantly reduced the caffeine-induced increase in locomotor activity without affecting motor coordination. Additionally, rice germ ferment extracts-GABA per se did not affect the spontaneous locomotor activity and motor coordination of mice. In conclusion, rice germ ferment extracts-GABA supplementation can counter the sleep disturbance induced by caffeine, without affecting the general locomotor activities of mice.

A Study on the Issue Lifecycle through the Analysis of News Texts - A Case of Samsung Galaxy Note 7 - (신문기사 분석을 통한 이슈 라이프사이클에 관한 연구 - 삼성 갤럭시노트7 사례 -)

  • Heo, Pil Hee;Kim, Yang Sok;Lee, Choong Kwon
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.99-105
    • /
    • 2018
  • It is often the case that products or services on the market are causing problems, which hurt the business and image of the company. Responding appropriately to the problem and minimizing the damage is very important to business organizations. This study collected and analyzed the news articles related to the recall of the Galaxy Note 7, which was developed and launched by Samsung Electronics, one of the smartphone market leaders. Based on the issue lifecycle, the characteristics of the news were expressed by stages and the contents of the news were analyzed and visualized using association rules. The results of this study are expected to help business organizations to understand the changes and trends of issues and search for counter measures.

Biomimetic control for redundant and high degree of freedom limb systems: neurobiological modularity

  • Giszter, Simon F.;Hart, Corey B.
    • Smart Structures and Systems
    • /
    • v.7 no.3
    • /
    • pp.169-184
    • /
    • 2011
  • We review the current understanding of modularity in biological motor control and its forms, and then relate this modularity to proposed modular control structures for biomimetic robots. We note the features that are different between the robotic and the biological 'designs' with features which have evolved by natural selection, and note those aspects of biology which may be counter-intuitive or unique to the biological controls as we currently understand them. Biological modularity can be divided into kinematic modularity comprised of strokes and cycles: primitives approximating a range of optimization criteria, and execution modularity comprised of kinetic motor primitives: muscle synergies recruited by premotor drives which are most often pulsatile, and which have the biomechanical effect of instantiating a visco-elastic force-field in the limb. The relations of these identified biological elements to kinematic and force-level motor primitives employed in robot control formulations are discussed.

Detecting width-wise partial delamination in the composite beam using generalized fractal dimension

  • Kumar, S. Keshava;Ganguli, Ranjan;Harursampath, Dineshkumar
    • Smart Structures and Systems
    • /
    • v.19 no.1
    • /
    • pp.91-103
    • /
    • 2017
  • Generalized fractal dimension is used to detect the presence of partial delamination in a composite laminated beam. The effect of boundary conditions and location of delamination on the fractal dimension curve is studied. Appropriability of higher mode shape data for detection of delamination in the beam is evaluated. It is shown that fractal dimension measure can be used to detect the presence of partial delamination in composite beams. It is found that the torsional mode shape is well suited for delamination detection in beams. First natural frequency of delaminated beam is found to be higher than the healthy beam for certain small and partial width delaminations and some boundary conditions. An explanation towards this counter intuitive phenomenon is provided.

A Constant Pitch Based Time Alignment for Power Analysis with Random Clock Power Trace (전력분석 공격에서 랜덤클럭 전력신호에 대한 일정피치 기반의 시간적 정렬 방법)

  • Park, Young-Goo;Lee, Hoon-Jae;Moon, Sang-Jae
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.7-14
    • /
    • 2011
  • Power analysis attack on low-power consumed security devices such as smart cards is very powerful, but it is required that the correlation between the measured power signal and the mid-term estimated signal should be consistent in a time instant while running encryption algorithm. The power signals measured from the security device applying the random clock do not match the timing point of analysis, therefore random clock is used as counter measures against power analysis attacks. This paper propose a new constant pitch based time alignment for power analysis with random clock power trace. The proposed method neutralize the effects of random clock used to counter measure by aligning the irregular power signals with the time location and size using the constant pitch. Finally, we apply the proposed one to AES algorithm within randomly clocked environments to evaluate our method.

Cariogenic Potential of Nutritional Supplements for Children on Bovine Teeth (Bovine teeth에 대한 어린이용 영양제의 우식유발능)

  • Heo, Narang;Lee, Kwanghee;An, Soyoun;Song, Jihyun;Ra, Jiyoung
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.41 no.3
    • /
    • pp.233-240
    • /
    • 2014
  • An in vitro study on cariogenic potential of four over-the-counter nutritional supplements for children was performed. The experimental groups were four over-the-counter nutritional supplements. The positive control group was 10% sucrose solution (S), and the negative control group was artificial saliva (T). The pH of each group, the buffering capacities, acid production, the microhardness changes of the bovine teeth specimens were measured. The pH of all experimental groups were lower than critical pH 5.5 where enamel demineralization starts. The buffering capacity of the Hama Vitamin Pharm (Hamsoa Pharm Co., Korea) was highest, and the Smart Chewable Vitamin A (JW Pharm Co., Korea) had the lowest buffering capacity. The reduction rates of the pH of the experimental groups were significantly higher than that of the negative control group (p < 0.05). The microhardness of enamel of all experimental groups and the positive control group significantly decreased. In contrast, the microhardness of enamel of the negative control group significantly increased after experiment (p < 0.05). The reduction rate of the microhardness of enamel of the Hama Vitamin Pharm (Hamsoa Pharm Co., Korea) was significantly higher and Hikid Plus (Sanga Pharm Co., Korea) was significantly lower than the other experimental groups.

A Security Nonce Generation Algorithm Scheme Research for Improving Data Reliability and Anomaly Pattern Detection of Smart City Platform Data Management (스마트시티 플랫폼 데이터 운영의 이상패턴 탐지 및 데이터 신뢰성 향상을 위한 보안 난수 생성 알고리즘 방안 연구)

  • Lee, Jaekwan;Shin, Jinho;Joo, Yongjae;Noh, Jaekoo;Kim, Jae Do;Kim, Yongjoon;Jung, Namjoon
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.75-80
    • /
    • 2018
  • The smart city is developing an energy system efficiently through a common management of the city resource for the growth and a low carbon social. However, the smart city doesn't counter a verification effectively about a anomaly pattern detection when existing security technology (authentication, integrity, confidentiality) is used by fixed security key and key deodorization according to generated big data. This paper is proposed the "security nonce generation based on security nonce generation" for anomaly pattern detection of the adversary and a safety of the key is high through the key generation of the KDC (Key Distribution Center; KDC) for improvement. The proposed scheme distributes the generated security nonce and authentication keys to each facilities system by the KDC. This proposed scheme can be enhanced to the security by doing the external pattern detection and changed new security key through distributed security nonce with keys. Therefore, this paper can do improving the security and a responsibility of the smart city platform management data through the anomaly pattern detection and the safety of the keys.

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.