• Title/Summary/Keyword: system of computer mathematics

Search Result 329, Processing Time 0.021 seconds

A SURVEY ON INTRUSION DETECTION SYSTEMS IN COMPUTER NETWORKS

  • Zarringhalami, Zohreh;Rafsanjani, Marjan Kuchaki
    • Journal of applied mathematics & informatics
    • /
    • v.30 no.5_6
    • /
    • pp.847-864
    • /
    • 2012
  • In recent years, using computer networks (wired and wireless networks) has been widespread in many applications. As computer networks become increasingly complex, the accompanied potential threats also grow to be more sophisticated and as such security has become one of the major concerns in them. Prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. Intrusion Detection Systems (IDSs) have become a key component in ensuring systems and networks security. An IDS monitors network activities in order to detect malicious actions performed by intruders and then initiate the appropriate countermeasures. In this paper, we present a survey and taxonomy of intrusion detection systems and then evaluate and compare them.

ON ATTRACTORS OF TYPE 1 ITERATED FUNCTION SYSTEMS

  • JOSE MATHEW;SUNIL MATHEW;NICOLAE ADRIAN SECELEAN
    • Journal of applied mathematics & informatics
    • /
    • v.42 no.3
    • /
    • pp.583-605
    • /
    • 2024
  • This paper discusses the properties of attractors of Type 1 IFS which construct self similar fractals on product spaces. General results like continuity theorem and Collage theorem for Type 1 IFS are established. An algebraic equivalent condition for the open set condition is studied to characterize the points outside a feasible open set. Connectedness properties of Type 1 IFS are mainly discussed. Equivalence condition for connectedness, arc wise connectedness and locally connectedness of a Type 1 IFS is established. A relation connecting separation properties and topological properties of Type 1 IFS attractors is studied using a generalized address system in product spaces. A construction of 3D fractal images is proposed as an application of the Type 1 IFS theory.

Image classification model utilizing text to improve image classification accuracy (이미지 분류 정확도 향상을 위한 텍스트 활용 이미지 분류 모델)

  • Ju-Hyeok Lee;Mi-Hui Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.724-726
    • /
    • 2023
  • 컴퓨터 비전 문제 중 이미지 분류는 핵심적인 주제 중 하나이다. 딥러닝의 발전으로 이미지 분류 문제에서 높은 정확도와 성능을 보여준다. 하지만 대부분 이미지 분류 연구에서 시각정보인 이미지 내의 특징에만 의존하고 있다. 그렇기에 이미지의 본질적인 맥략과 함께 있는 텍스트 정보를 활용하지 못하는 경우도 있다. 이에 본 논문은 텍스트 정보를 활용하여 이미지 분류 성능을 개선하는 방식을 제안한다.

Dynamic Analytic Data Preprocessing Techniques for Malware Detection (악성코드 탐지를 위한 동적 분석 데이터 전처리 기법)

  • Hae-Soo Kim;Mi-Hui Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.230-231
    • /
    • 2023
  • 악성코드를 탐지하는 기법 중 동적 분석데이터와 같은 시계열 데이터는 프로그램마다 호출되는 API의 수가 모두 다르다. 하지만 딥러닝 모델을 통해 분석할 때는 모델의 입력이 되는 데이터의 크기가 모두 같아야 한다. 이에 본 논문은 TF-IDF(Term Frequency-Inverse Document Frequency)와 슬라이딩 윈도우 기법을 이용해 프로그램의 동적 특성을 유지하면서 데이터의 길이를 일정하게 만들 수 있는 전처리 기법과 LSTM(Long Short-Term Memory) 모델을 통해 정확도(Accuracy) 95.89%, 재현율(Recall) 97.08%, 정밀도(Precision) 95.9%, F1-score 96.48%를 달성했다.

Availability Analysis of a System Having Three Units : Super Priority, Priority and Ordinary Under Pre-empty Resume Repair Policy

  • Singh, V.V.;Singh, S.B.;Ram, M.;Goel, C.K.
    • International Journal of Reliability and Applications
    • /
    • v.11 no.1
    • /
    • pp.41-53
    • /
    • 2010
  • In the present paper we develop a mathematical model that facilitates the calculation of reliability of a complex repairable system having three units namely super priority, priority and ordinary. The system is analyzed with the application of Gumbel Hougaard copula when different types of repair possible at a particular state due to deliberate failure. Various reliability measures such as reliability, MTTF and profit function have been evaluated by using supplementary variable and Laplace transform techniques.

  • PDF

Three Characteristic Beltrami System in Even Dimensions (I): p-Harmonic Equation

  • Gao, Hongya;Chu, Yuming;Sun, Lanxiang
    • Kyungpook Mathematical Journal
    • /
    • v.47 no.3
    • /
    • pp.311-322
    • /
    • 2007
  • This paper deals with space Beltrami system with three characteristic matrices in even dimensions, which can be regarded as a generalization of space Beltrami system with one and two characteristic matrices. It is transformed into a nonhomogeneous $p$-harmonic equation $d^*A(x,df^I)=d^*B(x,Df)$ by using the technique of out differential forms and exterior algebra of matrices. In the process, we only use the uniformly elliptic condition with respect to the characteristic matrices. The Lipschitz type condition, the monotonicity condition and the homogeneous condition of the operator A and the controlled growth condition of the operator B are derived.

  • PDF

Delayed Dynamics of Prey-Predator System with Distinct Functional Responses

  • Madhusudanan, V.;Vijaya, S.
    • Kyungpook Mathematical Journal
    • /
    • v.57 no.2
    • /
    • pp.265-285
    • /
    • 2017
  • In this article, a mathematical model is proposed and analyzed to study the delayed dynamics of a system having a predator and two preys with distinct growth rates and functional responses. The equilibrium points of proposed system are determined and the local stability at each of the possible equilibrium points is investigated by its corresponding characteristic equation. The boundedness of the system is established in the absence of delay and the condition for existence of persistence in the system is determined. The discrete type gestational delay of predator is also incorporated on the system. Further it is proved that the system undergoes Hopf bifurcation using delay as bifurcation parameter. This study refers that time delay may have an impact on the stability of the system. Finally Computer simulations illustrate the dynamics of the system.

G/M/1 QUEUES WITH DELAYED VACATIONS

  • Han, Dong-Hwan;Choi, Doo-Il
    • Journal of applied mathematics & informatics
    • /
    • v.5 no.1
    • /
    • pp.1-12
    • /
    • 1998
  • We consider G/M/1 queues with multiple vacation disci-pline where at the end of every busy period the server stays idle in the system for a period of time called changeover time and then follows a vacation if there is no arrival during the changeover time. The vaca-tion time has a hyperexponential distribution. By using the methods of the shift operator and supplementary variable we explicitly obtain the queue length probabilities at arrival time points and arbitrary time points simultaneously.

TERNARY UNIVARIATE CURVATURE-PRESERVING SUBDIVISION

  • JEON MYUNGJIN;HAN DONGSOONG;PARK KYEONGSU;CHOI GUNDON
    • Journal of applied mathematics & informatics
    • /
    • v.18 no.1_2
    • /
    • pp.235-246
    • /
    • 2005
  • We present an interpolating, univariate subdivision scheme which preserves the discrete curvature and tangent direction at each step of subdivision. Since the polygon have a geometric information of some original(in some sense) curve as a discrete curvature, we can expect that the limit curve has the same curvature at each vertex as the control polygon. We estimate the curvature bound of odd vertices and give an error estimate for restoring a curve from sampled vertices on curves.

A STACKELBERG MODEL FOR SERVER-PROXIES-USERS SYSTEMS

  • HAW HAl SHAN;XIA ZUN-QUAN
    • Journal of applied mathematics & informatics
    • /
    • v.17 no.1_2_3
    • /
    • pp.185-194
    • /
    • 2005
  • A Server-Proxies-Users communication system is studied by using Stackelberg strategy theory of game. A new model, in which the server, proxies and users are not equal is established, and that is a three-level programming. The solution existence of the model is proved.