• Title/Summary/Keyword: 랜덤확산

Search Result 53, Processing Time 0.022 seconds

Study of Dynamic Tree Routing Using Support Vector Machine for Intelligent Building (지능형 건축물 환경 모니터링 시스템에서의 서포트 벡터 머신을 이용한 동적 트리 라우팅에 대한 연구)

  • Lee, Min-Woo;Park, Gwi-Tae
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1895-1896
    • /
    • 2008
  • 지능형 빌딩 환경 모니터링 시스템과 같이 실내에서 센서 네트워크를 이용하여 환경 데이터를 수집하는 네트워크가 점점 확산되고 있다. 이와 같은 건축물 내에서의 무선 센서 네트워크는 랜덤하게 센서 노드들이 뿌려지는 것이 아니라, 사람의 의지대로 배치가 된다. 따라서 위치정보를 모르는 상황의 무선 센서 네트워크들이 가지는 라우팅 방법을 사용하는 것이 아니라 더 간결하면서 강한 네트워크 유지 능력을 가지는 라우팅 방법이 사용되게 된다. 본 논문에서는 트리 라우팅을 이용한 건물 환경 모니터링 시스템에 에너지 효율을 높이기 위하여 네트워크의 상황을 고려한 SVM을 이용한 동적 라우터 선택기법을 포함한 동적 트리 라우팅 기법에 대한 연구와 이의 구현을 보이고 있다.

  • PDF

A Digital Watermarking using common gray image as watermark information (일반 이미지를 워터마크로 사용하는 디지털 워터마킹)

  • Youn, Ma-Ru;Rhee, Yoon-Jung;Kim, Tae-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1057-1060
    • /
    • 2001
  • 최근 인터넷을 통한 전자 저작물 유통이 확산됨에 따라 저작권을 보호하기 위한 디지털 워터마킹이 많이 이용되고 있다. 종래의 디지털 워터마킹 기법에서는 주로 도장 이미지를 워터마크로 사용해왔다. 본 논문은 도장 이미지가 아닌 복잡한 형태의 이미지를 삽입 할 수 있도륵 워터마크 이미지의 정보를 웨이브릿 변환을 통해 추출하여 삽입, 복원해내는 방법을 제안한다. 또한 웨이브릿 변환 계수를 제로 트리 웨이브릿 부호화 방법을 사용하여 워터마킹에 가장 적절한 계수를 선택해서 저작권 정보를 삽입하도록 한다. 이렇게 하면 적합한 대역에 워터마크를 삽입하게 되어 이미지 변형이 적고 공격에도 강인하게 된다. 이 과정에서 삽입 위치를 랜덤하게 하는 부가적인 과정을 생략할 수 있게 함으로써 효율적인 워터마크 첨가를 가능하게 하였다.

  • PDF

Physical Modelling for Consistent Reasonable Thought and Stock-Price Flow Patterns (합리적 생각의 물리적 모델링과 주가 흐름 패턴 분석)

  • Park, Sangup
    • New Physics: Sae Mulli
    • /
    • v.68 no.12
    • /
    • pp.1364-1373
    • /
    • 2018
  • A recognizable form having meaning is called a sign in semiotics. The sign is transformed into a physical counter form in this work. Its internal structure is restricted on the linguistic concept structure. We borrow the concept of a mathematical function from the utility function of a rational personal in the economy. Universalizing the utility function by introducing the consistency of independency on the manner of construction, we construct the probability. We introduce a random variable for the probability and join it to a position variable. Thus, we propose a physical sign and its serial changes in the forms of stochastic equations. The equations estimate three patterns (jumping, drifting, diffusing) of possible solutions, and we find them in the one-day stock-price flow. The periods of jumping, drifting and diffusing were about 2, 3.5, and 6 minutes for the Kia stock on 11/05/2014. Also, the semiotic sign (icon, index, symbol) can be expected from the equations.

Simulation Study on Search Strategies for the Reconnaissance Drone (정찰 드론의 탐색 경로에 대한 시뮬레이션 연구)

  • Choi, Min Woo;Cho, Namsuk
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.23-39
    • /
    • 2019
  • The use of drone-bots is demanded in times regarding the reduction of military force, the spread of the life-oriented thought, and the use of innovative technology in the defense through the fourth industrial revolution. Especially, the drone's surveillance and reconnaissance are expected to play a big role in the future battlefield. However, there are not many cases in which the concept of operation is studied scientifically. In this study, We propose search algorithms for reconnaissance drone through simulation analysis. In the simulation, the drone and target move linearly in continuous space, and the target is moving adopting the Random-walk concept to reflect the uncertainty of the battlefield. The research investigates the effectiveness of existing search methods such as Parallel and Spiral Search. We analyze the probabilistic analysis for detector radius and the speed on the detection probability. In particular, the new detection algorithms those can be used when an enemy moves toward a specific goal, PS (Probability Search) and HS (Hamiltonian Search), are introduced. The results of this study will have applicability on planning the path for the reconnaissance operations using drone-bots.

A Study on Prediction of Mass SQL Injection Worm Propagation Using The Markov Chain (마코브 체인을 이용한 Mass SQL Injection 웜 확산 예측에 관한 연구)

  • Park, Won-Hyung;Kim, Young-Jin;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.173-181
    • /
    • 2008
  • Recently, Worm epidemic models have been developed in response to the cyber threats posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical model techniques such as Epidemic(SI), KM (Kermack-MeKendrick), Two-Factor and AAWP(Analytical Active Worm Propagation). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the network such as CodeRed worm and it was able to be applied to the specified threats. Therefore, we propose the probabilistic of worm propagation based on the Markov Chain, which can be applied to cyber threats such as Mass SQL Injection worm. Using the proposed method in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

  • PDF

Digital Watermarking using the Channel Coding Technique (채널 코딩 기법을 이용한 디지털 워터마킹)

  • Bae, Chang-Seok;Choi, Jae-Hoon;Seo, Dong-Wan;Choe, Yoon-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3290-3299
    • /
    • 2000
  • Digital watermarking has similar concepts with channel coding thechnique for transferring data with minimizing error in noise environment, since it should be robust to various kinds of data manipulation for protecting copyrights of multimedia data. This paper proposes a digital watermarking technique which is robust to various kinds of data manipulation. Intellectual property rights information is encoded using a convolutional code, and block-interleaving technique is applied to prevent successive loss of encoded data. Encoded intelloctual property rithts informationis embedded using spread spectrum technique which is robust to cata manipulation. In order to reconstruct intellectual property rights information, watermark signalis detected by covariance between watermarked image and pseudo rando noise sequence which is used to einbed watermark. Embedded intellectual property rights information is obtaned by de-interleaving and cecoding previously detected wtermark signal. Experimental results show that block interleaving watermarking technique can detect embedded intellectial property right informationmore correctly against to attacks like Gaussian noise additon, filtering, and JPEG compression than general spread spectrum technique in the same PSNR.

  • PDF

Radionuclides Transport from the Hypothetical Disposal Facility in the KURT Field Condition on the Time Domain (KURT 부지 환경에 위치한 가상의 처분 시설에서 누출되는 방사성 핵종의 이동을 Time Domain에서 해석하는 방법에 관한 연구)

  • Hwang, Youngtaek;Ko, Nak-Youl;Choi, Jong Won;Jo, Seong-Seock
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.10 no.4
    • /
    • pp.295-303
    • /
    • 2012
  • Based on the data observed and analyzed on a groundwater flow system in the KURT (KAERI Underground Research Tunnel) site, the transport of radionuclides, which were assumed to be released at the supposed position, was calculated on the time-domain. A groundwater pathway from the release position to the surface was identified by simulating the groundwater flow model with the hydrogeological characteristics measured from the field tests in the KURT site. The elapsed time when the radionuclides moved through the pathway is evaluated using TDRW (Time Domain Random Walk) method for simulating the transport on the time-domain. Some retention mechanisms, such as radioactive decay, equilibrium sorption, and matrix diffusion, as well as the advection-dispersion were selected as the factors to influence on the elapsed time. From the simulation results, the effects of the sorption and matrix diffusion, determined by the properties of the radionuclides and underground media, on the transport of the radionuclides were analyzed and a decay chain of the radionuclides was also examined. The radionuclide ratio of the mass discharge into the surface environment to the mass released from the supposed repository did not exceed $10^{-3}$, and it decreased when the matrix diffusion were considered. The method used in this study could be used in preparing the data on radionuclide transport for a safety assessment of a geological disposal facility because the method could evaluate the travel time of the radionuclides considering the transport retention mechanism.

A Physical Combined Attack and its Countermeasure on BNP Exponentiation Algorithm (BNP 멱승 알고리듬에 대한 물리적인 조합 공격 및 대응책)

  • Kim, Hyung-Dong;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.585-591
    • /
    • 2013
  • Recently, the combined attack which is a combination of side channel analysis and fault attack has been developed to extract the secret key during the cryptographic processes using a security device. Unfortunately, an attacker can find the private key of RSA cryptosystem through one time fault injection and power signal analysis. In this paper, we diagnosed SPA/FA resistant BNP(Boscher, Naciri, and Prouff) exponentiation algorithm as having threats to a similar combined attack. And we proposed a simple countermeasure to resist against this combined attack by randomizing the private key using error infective method.

Performance Enhancement of an OFDMA/CDM-based Cellular System in a Multi-Cell Environment (다중셀 환경에서 OFDMA/CDM 기반 셀룰라 시스템의 성능 개선)

  • Kim, Duk-Kyung;Ryu, Je-Hun;Jeong, Bu-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7A
    • /
    • pp.587-596
    • /
    • 2005
  • In this paper, we propose an OFDMA/CDM-based cellular system, which accommodates multiple users in frequency-domain and multiplexes user data with frequency-domain spreading. The proposed system utilizes random codes to discriminate cells and adopts the pre-equalization to enhance the performance. For cellular applications, a number of pre-equalization techniques are compared and an efficient power allocation scheme is suggested with a transmit power constraint. Especially, the validity of OFDMA/CDM based cellular system is investigated, by comparing the performance for varying the number of multiplexed data symbols at different locations. Finally the pre/post-equalization is proposed to reduce the performance degradation caused by time delay.

BER Improvement Correlation-Flattened Binary CDMA (상관도 평활화된 Binary CDMA의 BER 개선)

  • Seo, Keun-Jong;Chong, Min-Woo;Kim, Yong-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.9-17
    • /
    • 2004
  • We present a performance improvement of Binary CDMA by flattening the correlation values. A Binary CDMA system, in which multi-leveled transmission signal of multi-code CDMA is clipped into a binary value, is cost-efficient since the strict linearity of the power amplifier is relieved. However, a loss of orthogonality among user channels due to the clipping causes the correlation values at the receiver to have a random distribution. If the correlation value for even a single channel goes too low, the average BER drops considerably. We developed a method of correlation flattening, where the binary chip pattern at the transmitter is adjusted so that the correlation values have averaged magnitude. Experimental results on several spreading codes show that the correlation flattening method increases the number of available channels at reduced BER.