• Title/Summary/Keyword: 변형 기반 모드

Search Result 50, Processing Time 0.024 seconds

False Alarm Minimization Technology using SVM in Intrusion Prevention System (SVM을 이용한 침입방지시스템 오경보 최소화 기법)

  • Kim Gill-Han;Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.119-132
    • /
    • 2006
  • The network based security techniques well-known until now have week points to be passive in attacks and susceptible to roundabout attacks so that the misuse detection based intrusion prevention system which enables positive correspondence to the attacks of inline mode are used widely. But because the Misuse detection based Intrusion prevention system is proportional to the detection rules, it causes excessive false alarm and is linked to wrong correspondence which prevents the regular network flow and is insufficient to detect transformed attacks, This study suggests an Intrusion prevention system which uses Support Vector machines(hereinafter referred to as SVM) as one of rule based Intrusion prevention system and Anomaly System in order to supplement these problems, When this compared with existing intrusion prevention system, show performance result that improve about 20% and could through intrusion prevention system that propose false positive minimize and know that can detect effectively about new variant attack.

  • PDF

Algorithms for Ultrasound Elasticity Imaging (초음파 탄성 영상 알고리듬)

  • Kwon, Sung-Jae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.32 no.5
    • /
    • pp.484-493
    • /
    • 2012
  • Since the 1980s, there have been many research activities devoted to quantitatively characterizing and imaging human tissues based on sound speed, attenuation coefficient, density, nonlinear B/A parameter, etc., but those efforts have not yet reached the stage of commercialization. However, a new imaging technology termed elastography, which was proposed in the early 1980s, has recently been implemented in commercial clinical ultrasound scanners, and is now being used to diagnose prostates, breasts, thyroids, livers, blood vessels, etc., more quantitatively as a complementary adjunct modality to the conventional B-mode imaging. The purpose of this article is to introduce and review various elastographic algorithms for use in quasistatic or static compression type elasticity imaging modes. Most of the algorithms are based on the crosscorrelation or autocorrelation function methods, and the fundamental difference is that the time shift is estimated by changing the lag variable in the former, while it is directly obtained from the phase shift at a fixed lag in the latter.

Implementation and Analysis Performance of CCM-UW based AES, ARIA Blockcipher for Underwater Environment (수중무선통신 환경에 적합한 AES, ARIA 블록암호 기반 CCM-UW 구현 및 성능 분석)

  • Lee, Jae-Hoon;Park, Minha;Yun, Nam-Yeol;Yi, Okyeon;Park, Soo-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.115-118
    • /
    • 2014
  • Underwater Wireless Communication System can be useful for research of quality of water, ocean resources exploration, analysis ocean environment and so on. However, there exist security threats including data loss, data forgery, and another variety of security threats, because of characteristics of water, various geographical factors, intended attack, etc. To solve these problem, in this paper, we propose a CCM-UW mode of operation modified form of CCM mode of operation, providing data confidentiality, integrity, origin authentication and anti-attack prevent, for the Underwater Wireless Communication System. By implementing CCM-UW in MACA protocol(Underwater Wireless Communication MAC Protocol) and measuring speed of communication, we confirm the applicability of the security and analyze the communication environment impact.

  • PDF

Failure Stress Analysis of Bendable Embeded Electronic Module Based on Physics-of-Failure(PoF) (PoF 기반 Bendable Embeded 전자모듈의 스트레스 인자 해석)

  • Hong, Won-Sik;Oh, Chul-Min;Park, No-Chang;Han, Chang-Woon;Kim, Dae-Gon;Hong, Sung-Taik;Choi, Woo-Suk;Kim, Joong-Do
    • Proceedings of the KWS Conference
    • /
    • 2009.11a
    • /
    • pp.71-71
    • /
    • 2009
  • 전자제품의 다양한 기능들의 융복합화 및 휴대 편의성 경향은 이제 더 이상 새로운 것이 아니다. 이러한 추세에 따라 전자부품들은 모듈화 되고, 휴대하기 용이해 지고 있다. 또한 다양한 제품 디자인에 적용하기 위해 제품에 장착되는 부품의 기구적 위치 배열의 한계 또한 제약 받고 있다. 따라서 최근의 전자부품은 모듈화 되고 있으며, 기구적 한계를 극복하기 위한 Flexible 모듈의 사용이 증가하고 있다. 또한 양산측면에서 Roll-to-Roll(R2R) 방식을 적용함으로써 생산성을 극대화 하고 있다. 이때 R2R 적용을 위해서는 제품이 굴곡 될 수 있도록 유연성이 보장되는 Bendable 전자모듈의 개발이 필수적으로 요구되고 있다. Flexible 기판은 더 이상 새로운 기술이 아니지만, Felxible 기판 내부에 칩이 내장되고, 회로가 형성되어 자체적으로 기능을 수행할 수 있도록 한 Bendable 전자모듈을 R2R 방식으로 제조하는 기술은 매우 새로운 접근이라 할 수 있다. 이러한 기술개발이 현실화 된다면, Wearable Electronics 및 Flexible Display 등 다양한 전자제품에 응용될 수 있을 것으로 기대된다. 그러나 이러한 제품의 상용화를 위해서는 Bendable 전자모듈에 대한 신뢰성이 확보되고, 제품으로써의 수명이 보증되어야 한다. 신규 개발되는 제품의 신뢰성 검증항목이나 수명평가 모델은 현재까지 제안되지 않고 있는 실정이다. 또한 다양한 사용 환경에서 고장(Failure) 발생을 유발하는 스트레스 인자(Stress Factor)를 도출함으로써, 가속시험 또는 신뢰성 검증을 위한 인가 스트레스를 선정할 수 있다. 그러나 이러한 고장물리를 기반으로 스트레스 인자를 해석한 결과는 아직 보고되고 있지 않다. 따라서 본 연구에서는 $50{\mu}m$ 두께의 Si Chip에 저항변화를 관찰하기 위한 회로를 형성한 후 폴리이미드 기판을 이용하여 Si Chip이 임베딩된 Bendable 전자모듈을 제작하였다. 전자모듈의 실사용 환경에서의 수명예측을 위한 사전단계로써 고장물리에 기반한 고장모드와 고장메카니즘을 해석하는 것이 최우선 수행되어야 하며, 이를 바탕으로 고장을 유발하는 스트레스 인자를 도출 하였다. 고장도출을 위해 시제품은 JEDEC J-STD-020C의 MSL시험, 고온가압시험, 열충격시험 및 고온저장시험을 각각 수행하였으며, 이로부터 발생된 각각의 고장유형을 분석함으로써 스트레스 인자를 도출하였다. 또한 모아레(Moire) 간섭계를 이용하여 제작된 샘플의 온도변화에 따른 변형해석을 수행하였고, 동시에 Half Symetry Model을 이용한 유한요소해석(FEA)을 수행하여 변형해석 및 스트레스 유발원인을 도출하였다. 이 결과로 부터 고장물리 기반의 고장해석과 Moire 분석 그리고 시뮬레이션 해석 결과를 바탕으로 Bendable 전자모듈의 고장유발 스트레스 인자를 해석할 수 있었다.

  • PDF

Prediction and Evaluation of Progressive Failure Behavior of CFRP using Crack Band Model Based Damage Variable (Crack Band Model 기반 손상변수를 이용한 탄소섬유강화 복합재료 적층판의 점진적 파손 거동 예측 및 검증)

  • Yoon, Donghyun;Kim, Sangdeok;Kim, Jaehoon;Doh, Youngdae
    • Composites Research
    • /
    • v.32 no.5
    • /
    • pp.258-264
    • /
    • 2019
  • In this paper, a progressive failure analysis method was developed using the Hashin failure criterion and crack band model. Using the failure criterion, the failure initiation was evaluated. If the failure initiation is occurred, the damage variables at each failure modes (fiber tension & compression, matrix tension & compression) was calculated according to linear softening degradation behavior and the variables are used to derive the damaged stiffness matrix. The damaged stiffness matrix is reflected to damaged material and the progressive failure analysis is continued until the damage variables to be 1 that complete failure of material. A series of processes were performed using FE commercial code ABAQUS with user defined material subroutine (UMAT). To evaluate the proposed progressive failure model, the experimental results of open hole composite laminate tests was compared with numerical result. Using digital image correlation system, the strain behavior also was compared. The proposed numerical results were coincided well with the experimental results.

Development of Stream Cipher using the AES (AES를 이용한 스트림 암호 개발)

  • Kim, Sung-Gi;Kim, Gil-Ho;Cho, Gyeong-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.972-981
    • /
    • 2013
  • Future aspects of the has turned into a network centric warfare(NCW). Organically combined wired and wireless networks in a variety of cross-of-the-art combat power factor utilization of information and communication technology is a key element of NCW implementation. At used various information in the NCW must be the confidentiality and integrity excellent then quick situation assessment through reliability the real-time processing, which is the core of winning the war. In this paper, NCW is one of the key technologies of the implementation of 128-bit output stream cipher algorithm is proposed. AES-based stream cipher developed by applying modified OFB mode the confidentiality and integrity as well as hardware implementation to the security and real-time processing is superior.

Development of Smart Etiquette System based on BLE and App (BLE 기반 스마트 에티켓 시스템 및 App 개발)

  • Hong, Seong-Pyo;Cho, Young-Ju
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.803-810
    • /
    • 2017
  • Currently, every person possesses a smart phone due to the development of the IT industry. There is an improper situation in which a smart phone is not set in silent mode, such as a lecture room, a library, and a theatre hall. The proposed system automatically automates the function of smart phones where they are designated as a public place or etiquette area and automatically return the function of the smartphone if they deviate from the location of the site. It is also equipped with a combination of autonomous devices and services, based on Bluetooth communications, which are applied to ultra-light low-power IoT(Internet of Things) devices, and has features that allow diverse types of features and services to be added without requiring deformation of the hardware.

Relative Density and Stress-Dependent Failure Criteria of Marine Silty Sand Subjected to Cyclic Loading (반복하중을 받는 해양실트질 모래의 상대밀도에 따른 응력기반 파괴기준)

  • Ko, Min Jae;Son, Su Won;Kim, Jin Man
    • Journal of the Korean Geotechnical Society
    • /
    • v.33 no.1
    • /
    • pp.79-91
    • /
    • 2017
  • An experimental study has been conducted by using the Cyclic Direct Simple Shear apparatus to evaluate the influence of average and cyclic shear stresses on the undrained shear failure behavior of marine silty sand considering various relative densities. The obtained results show that despite using different relative densities, similar trends were gained in the cyclic shear deformation. Moreover, the cyclic shear deformation is affected mainly by the average and cyclic shear stresses. The number of cyclic loads for failure is significantly affected by the cyclic shear stress ratio and relative density, and is less affected by the average shear stress ratio. The proposed three-dimensional stress-dependent failure contour can be used effectively to assess the soil shear strength considering various relative densities in the design of foundation used for offshore structures.

Damage Index Evaluation Based on Dissipated Energy of SCH 40 3-Inch Carbon Steel Pipe Elbows Under Cyclic Loading (주기적 하중을 받는 SCH 40 3-Inch 탄소강관엘보의 소산에너지 기반의 손상지수 평가)

  • Kim, Sung-Wan;Yun, Da-Woon;Jeon, Bub-Gyu;Kim, Seong-Do
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.1
    • /
    • pp.112-119
    • /
    • 2021
  • The failure mode of piping systems due to seismic loads is the low-cycle fatigue failure with ratcheting, and it was found that the element in which nonlinear behavior is concentrated and damage occurs is the elbow. In this study, to quantitatively express the failure criteria for a pipe elbow of SCH40 3-inch carbon steel under low-cycle fatigue, the limit state was defined as leakage, and the in-plane cyclic loading test was conducted. For the carbon steel pipe elbow, which is the vulnerable part to seismic load of piping systems, the damage index was represented using the moment-deformation angle relationship, and it was compared and analyzed with the damage index calculated using the force-displacement relationship. An attempt was made to quantitatively express the limit state of the carbon steel pipe elbow involving leakage using the damage index, which was based on the dissipated energy caused by repeated external forces.

Graph Cut-based Automatic Color Image Segmentation using Mean Shift Analysis (Mean Shift 분석을 이용한 그래프 컷 기반의 자동 칼라 영상 분할)

  • Park, An-Jin;Kim, Jung-Whan;Jung, Kee-Chul
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.11
    • /
    • pp.936-946
    • /
    • 2009
  • A graph cuts method has recently attracted a lot of attentions for image segmentation, as it can globally minimize energy functions composed of data term that reflects how each pixel fits into prior information for each class and smoothness term that penalizes discontinuities between neighboring pixels. In previous approaches to graph cuts-based automatic image segmentation, GMM(Gaussian mixture models) is generally used, and means and covariance matrixes calculated by EM algorithm were used as prior information for each cluster. However, it is practicable only for clusters with a hyper-spherical or hyper-ellipsoidal shape, as the cluster was represented based on the covariance matrix centered on the mean. For arbitrary-shaped clusters, this paper proposes graph cuts-based image segmentation using mean shift analysis. As a prior information to estimate the data term, we use the set of mean trajectories toward each mode from initial means randomly selected in $L^*u^*{\upsilon}^*$ color space. Since the mean shift procedure requires many computational times, we transform features in continuous feature space into 3D discrete grid, and use 3D kernel based on the first moment in the grid, which are needed to move the means to modes. In the experiments, we investigate the problems of mean shift-based and normalized cuts-based image segmentation methods that are recently popular methods, and the proposed method showed better performance than previous two methods and graph cuts-based automatic image segmentation using GMM on Berkeley segmentation dataset.