• Title/Summary/Keyword: 가중치 모델

Search Result 945, Processing Time 0.028 seconds

The Effectiveness Evaluation Methods of DDoS Attacks Countermeasures Techniques using Simulation (시뮬레이션을 이용한 DDoS공격 대응기술 효과성평가방법)

  • Kim, Ae-Chan;Lee, Dong-Hoon;Jang, Seong-Yong
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.3
    • /
    • pp.17-24
    • /
    • 2012
  • This paper suggests Effectiveness Evaluation Methods of DDoS attacks countermeasures model by simulation. According to the security objectives that are suggested by NIST(National Institute of Standards and Technology), It represents a hierarchical Effectiveness Evaluation Model. we calculated the weights of factors that security objectives, security controls, performance indicator through AHP(Analytic Hierarchy Process) analysis. Subsequently, we implemented Arena Simulation Model for the calculation of function points at the performance indicator. The detection and protection algorithm involve methods of critical-level setting, signature and anomaly(statistic) based detection techniques for Network Layer 4, 7 attacks. Proposed Effectiveness Evaluation Model can be diversely used to evaluate effectiveness of countermeasures and techniques for new security threats each organization.

Voice Activity Detection Using Modified Power Spectral Deviation Based on Teager Energy (Teager Energy 기반의 수정된 파워 스펙트럼 편차를 이용한 음성 검출)

  • Song, J.H.;Song, Y.R.;Shim, H.M.;Lee, S.M.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.8 no.1
    • /
    • pp.41-46
    • /
    • 2014
  • In this paper, we propose a novel voice activity detection (VAD) algorithm using feature vectors based on TE (teager energy). Specifically, power spectral deviation (PSD), which is used as the feature for the VAD in the IS-127 noise suppression algorithm, is obtained after the input signal is transfomed by Teager energy operator. In addition, the TE-based likelihhod ratio are derived in each frame to modifiy the PSD for further VAD. The performance of our proposed VAD algorithm are evaluated by objective testing (total error rate, receiver operating characteristics, perceptual evaluation of speech quality) under various environments, and it is found that the proposed method yields better results than conventional VAD algorithms in the non-stationary noise environments under 5 dB SNR (total error rate = 2.6% decrease, PESQ score = 0.053 improvement).

  • PDF

Integrated Circuit Implementation and Characteristic Analysis of a CMOS Chaotic Neuron for Chaotic Neural Networks (카오스 신경망을 위한 CMOS 혼돈 뉴런의 집적회로 구현 및 특성 해석)

  • Song, Han-Jeong;Gwak, Gye-Dal
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.5
    • /
    • pp.45-53
    • /
    • 2000
  • This paper presents an analysis of the dynamical behavor in the chaotic neuron fabricated using 0.8${\mu}{\textrm}{m}$ single poly CMOS technology. An approximated empirical equation models for the sigmoid output function and chaos generative block of the chaotic neuron are extracted from the measurement data. Then the dynamical responses of the chaotic neuron such as biurcation diagram, frequency responses, Lyapunov exponent, and average firing rate are calculated with numerical analysis. In addition, we construct the chaotic neural networks which are composed of two chaotic neurons with four synapses and obtain bifurcation diagram according to synaptic weight variation. And results of experiments in the single chaotic neuron and chaotic neural networks by two neurons with the $\pm$2.5V power supply and sampling clock frequency of 10KHz are shown and compared with the simulated results.

  • PDF

Regularization Method by Subset Selection for Structural Damage Detection (구조손상 탐색을 위한 부 집합 선택에 의한 정규화 방법)

  • Yun, Gun-Jin;Han, Bong-Koo
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.1
    • /
    • pp.73-82
    • /
    • 2008
  • In this paper, a new regularization method by parameter subset selection method is proposed based on the residual force vector for damage localization. Although subset selection using the fundamental modal characteristics as a residual function has been successful in detecting a single damage location, this method seems to have limited capabilities in the detection of multiple damage locations and typically requires cumbersome weighting values. The method is presented herein and considers cases in which damage detection must be achieved using incomplete measurements of the structural responses. Model expansion is incorporated to deal with this challenge. The unique advantage of employing the new regularization method is that it can reliably identify multiple damage locations. Through an illustrative example, the proposed damage detection method is demonstrated to be a reliable tool for identifying multiple damage locations for a planar truss structure.

Design of Adaptive Retrieval System using XMDR based knowledge Sharing (지식 공유 기반의 XMDR을 이용한 적응형 검색 시스템 설계)

  • Hwang Chi-Gon;Jung Kye-Dong;Choi Young-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8B
    • /
    • pp.716-729
    • /
    • 2006
  • The information systems in the most enterprise environments are distributed locally and are comprised with various heterogeneous data sources, so that it is difficult to obtain necessary and integrated information for supporting user decision. For solving 'this problems efficiently, it provides uniform interface to users and constructed database systems between heterogeneous systems make a consistence each independence and need to provide transparency like one interface. This paper presents XMDR that consists of category, standard ontology, location ontology and knowledge base. Standard ontology solves heterogeneous problem about naming, attributes, relations in data expression. Location ontology is a mediator that connects each legacy systems. Knowledge base defines the relation for sharing glossary. Adaptive retrieve proposes integrated retrieve system through reflecting site weight by location ontology, information sharing of various forms of knowledge base and integration and propose conceptual domain model about how to share unstructured knowledge.

Adaptive Rate Control Based on Statistical Modeling in Frame-layer for H.264/AVC (H.264/AVC를 위한 통계 모델 기반 프레임 단위의 비트율 제어 기법)

  • Kim, Myoung-Jin;Hong, Min-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11C
    • /
    • pp.917-928
    • /
    • 2010
  • In this paper, we propose an efficient and adaptive rate control in Frame-layer for H.264/AVC. For given QP, bits according to video characteristics, and current frame is close correlation between the adjacent frames. Using the statistical characteristic, we obtain change of occurrence bit about QP to apply the bit amount by QP from the video characteristic and applied in the estimated bit amount of the each unit of current frame. In addition, we use weight with QP and occurrence bit amount that is statistical information of encoded previous frames. Simulation results show that the proposed rate control scheme could not only achieves time saving of more than 99% over existing rate control algorithm, but also increase the average PSNR of reconstructed video for around 0.02~0.43 dB in all the sequences.

Intelligibility Improvement of Low Bit-Rate Speech Coder Using Stochastic Spectral Equalizer (통계적 스펙트럼 이퀄라이저를 이용한 저 비트율 음성부호화기의 명료도 향상)

  • Lee, Jeong Hun;Yun, Deokgyu;Choi, Seung Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1183-1185
    • /
    • 2016
  • Low bit-rate speech coder in digital speech communications synthesizes speech using vocal tract model parameters. In this case, the spectra of the synthesized speech can be much distorted since the allocated bits for the parameters are considerably limited, which results in the degradation of speech intelligibility. In this paper, we propose a speech intelligibility improvement method using stochastic spectral equalizer. This method stochastically obtains the weight vector of each speech coder using spectral ratios between original and synthesized speech, then applies this weight vector to synthesized speech. From the experiments of objective speech intelligibility tests, we found that the performance of the proposed method is better than that of the conventional method.

3-D Facial Animation on the PDA via Automatic Facial Expression Recognition (얼굴 표정의 자동 인식을 통한 PDA 상에서의 3차원 얼굴 애니메이션)

  • Lee Don-Soo;Choi Soo-Mi;Kim Hae-Hwang;Kim Yong-Guk
    • The KIPS Transactions:PartB
    • /
    • v.12B no.7 s.103
    • /
    • pp.795-802
    • /
    • 2005
  • In this paper, we present a facial expression recognition-synthesis system that recognizes 7 basic emotion information automatically and renders face with non-photorelistic style in PDA For the recognition of the facial expressions, first we need to detect the face area within the image acquired from the camera. Then, a normalization procedure is applied to it for geometrical and illumination corrections. To classify a facial expression, we have found that when Gabor wavelets is combined with enhanced Fisher model the best result comes out. In our case, the out put is the 7 emotional weighting. Such weighting information transmitted to the PDA via a mobile network, is used for non-photorealistic facial expression animation. To render a 3-D avatar which has unique facial character, we adopted the cartoon-like shading method. We found that facial expression animation using emotional curves is more effective in expressing the timing of an expression comparing to the linear interpolation method.

Optimum Design of Neural Networks for Flight Control System (신경회로망 구조 최적화를 통한 비행제어시스템 설계)

  • Choe,Gyu-Ho;Choe,Dong-Uk;Kim,Yu-Dan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.31 no.7
    • /
    • pp.75-84
    • /
    • 2003
  • To reduce the effects of the uncertainties due to the modeling error and aerodynamic coefficients, a nonlinear adaptive control system based on neural networks is proposed . Neural networks parameters are adjusted by using an adaptive law. The sliding mode control scheme is used to compensate for the effect of the approximation error of neural networks. Control parameters and neural networks structures are optimized to obtain better performance by using the genetic algorithm. By introducing the concept of multi-groups of populations, the genetic algorithm is modified so that individuals and groups can be simultaneously evolved . To verify the performance of the pro posed algorithm, the optimized neural networks control system is applied to an aircraft longitudinal dynamics.

An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification (실증검증을 통한 N/A 점검항목이 보안 수준 결과에 미치는 영향에 관한 연구)

  • Lee, Jun Ho;Sung, Kyung Sang;Oh, Hea Seok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.271-276
    • /
    • 2014
  • This study analyzed that N/A check items affect the results of the security level degree, when performing vulnerability analysis evaluation. For this, we were used vulnerability analysis evaluation range, check items and quantitative calculation method. Furthermore, were applied grade and weight for the importance of the items. In addition, because technology develop rapidly, the institution is always exposed risk. therefore, this study was carried out empirical analysis by applying RAL(Risk Acceptabel Level). According to the analyzed result N/A check items factors affecting the level of security has been proven. In other words, this study found that we shall exclude inspection items irrelevant to the institution characteristics, when perform vulnerability analysis evaluation. In this study suggested that security level evaluation shall performed, after that exclude items irrelevant to the institution characteristics based on empirical verification. And also, it proposed that model research is required for establish check items for which analysis-evaluate vulnerability based on empirical verification.