• Title/Summary/Keyword: 안티확률

Search Result 4, Processing Time 0.019 seconds

안티포달(Antipodal) 초광대역 통신 시스템

  • 이정석;김유창;가민호
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.3
    • /
    • pp.63-73
    • /
    • 2002
  • 초광대역 통신 시스템은 광대역에 걸쳐 주파수 스펙트럼이 기저 대역 잡음과 같이 존재하여 기존의 통신 시스템에 간섭을 주지 않고 고속의 통신이 가능하며, 반송파를 사용하지 않기 때문에 송.수신기의 소비 전력을 감소시키고 그의 구조를 간략화 시킬 수 있다. 본 논문은 신호의 대칭성에 의해 평균값이 0인 안티포달 초광대역 신호를 구성하고 시간 도약 부호를 이용하여 다중접속, 주파수 영역에서 에너지의 평활화 및 재밍 저항(간섭 제거)을 위 한 초광대역 통신 시스템을 제안하였다. AWGN 및 다중접속 환경에서 안티포달 초광대역 통신 시스템의 오류확률, 다중접속시 전송속도에 대해 수치해석을 통해 시스템의 성능을 분석하였다.

HMM Topology Optimization using HBIC and BIC_Anti Criteria (HBIC와 BIC_Anti 기준을 이용한 HMM 구조의 최적화)

  • 박미나;하진영
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.867-875
    • /
    • 2003
  • This paper concerns continuous density HMM topology optimization. There have been several researches for HMM topology optimization. BIC (Bayesian Information Criterion) is one of the well known optimization criteria, which assumes statistically well behaved homogeneous model parameters. HMMs, however, are composed of several different kind of parameters to accommodate complex topology, thus BIC's assumption does not hold true for HMMs. Even though BIC reduced the total number of parameters of HMMs, it could not improve the recognition rates. In this paper, we proposed two new model selection criteria, HBIC (HMM-oriented BIC) and BIC_Anti. The former is proposed to improve BIC by estimating model priors separately. The latter is to combine BIC and anti-likelihood to accelerate discrimination power of HMMs. We performed some comparative research on couple of model selection criteria for online handwriting data recognition. We got better recognition results with fewer number of parameters.

Analysis on Operation of Anti-Virus Systems with Real-Time Scan and Batch Scan (실시간스캔과 배치스캔을 갖춘 안티바이러스시스템의 운영 분석)

  • Yang, Won Seok;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.861-869
    • /
    • 2013
  • We consider an information system where viruses arrive according to a Poisson process with rate ${\lambda}$. The information system has two types of anti-virus operation policies including 'real-time scan' and 'batch scan.' In the real-time scan policy, a virus is assumed to be scanned immediately after its arrival. Consequently, the real-time scan policy assumes infinite number of anti-viruses. We assume that the time for scanning and curing a virus follows a general distribution. In the batch scan policy, a system manager operates an anti-virus every deterministic time interval and scan and cure all the viruses remaining in the system simultaneously. In this paper we suggest a probability model for the operation of anti-virus software. We derive a condition under which the operating policy is achieved. Some numerical examples with various cost structure are given to illustrate the results.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.