• Title/Summary/Keyword: 탐지성능 모델링

Search Result 95, Processing Time 0.031 seconds

Intrusion Detection Algorithm based on Motion Information in Video Sequence (비디오 시퀀스에서 움직임 정보를 이용한 침입탐지 알고리즘)

  • Kim, Alla;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.284-288
    • /
    • 2010
  • Video surveillance is widely used in establishing the societal security network. In this paper, intrusion detection based on visual information acquired by static camera is proposed. Proposed approach uses background model constructed by approximated median filter(AMF) to find a foreground candidate, and detected object is calculated by analyzing motion information. Motion detection is determined by the relative size of 2D object in RGB space, finally, the threshold value for detecting object is determined by heuristic method. Experimental results showed that the performance of intrusion detection is better one when the spatio-temporal candidate informations change abruptly.

Warning Classification Method Based On Artificial Neural Network Using Topics of Source Code (소스코드 주제를 이용한 인공신경망 기반 경고 분류 방법)

  • Lee, Jung-Been
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.273-280
    • /
    • 2020
  • Automatic Static Analysis Tools help developers to quickly find potential defects in source code with less effort. However, the tools reports a large number of false positive warnings which do not have to fix. In our study, we proposed an artificial neural network-based warning classification method using topic models of source code blocks. We collect revisions for fixing bugs from software change management (SCM) system and extract code blocks modified by developers. In deep learning stage, topic distribution values of the code blocks and the binary data that present the warning removal in the blocks are used as input and target data in an simple artificial neural network, respectively. In our experimental results, our warning classification model based on neural network shows very high performance to predict label of warnings such as true or false positive.

Generation Paraphrase using Pointer Generation Network (포인터 생성 네트워크를 이용한 패러프레이즈 생성)

  • Park, Da-Sol;Kim, Young-kil;Cha, Jeong-Won
    • Annual Conference on Human and Language Technology
    • /
    • 2020.10a
    • /
    • pp.535-539
    • /
    • 2020
  • 다양한 발화를 모델링하는 요구는 자연어 처리 분야에서 꾸준히 있었으며 단어, 구 또는 문장과 동등한 의미 콘텐츠를 자동으로 식별하고 생성하는 것은 자연어 처리의 중요한 부분이다. 본 논문에서는 포인터 생성 네트워크(Pointer Generate Nework)를 이용하여 패러프레이즈 생성 모델을 제안한다. 제안한 모델의 성능을 측정하기 위해 사람이 직접 구축한 유사 문장 코퍼스를 이용하였으며, 토큰 단위의 BLEU-4 0.250, ROUGE_L 0.455, CIDEr 2.190의 성능을 보였다. 하지만 입력 문장과 동일한 문장을 출력하는 문제점이 존재하여 빔서치(beam search)를 적용하여 입력 문장과 비교하여 생성 문장을 선택하는 방식을 적용하였다. 입력 문장과 동일한 문장을 제외한 문장으로 평가를 진행했으며, 토큰 단위의 BLEU-4 0.234, ROUGE_L 0.459, CIDEr 2.041의 성능을 보였으나, 패러프레이즈 생성 데이터 양이 크게 증가하였다. 본 연구는 문장 간의 의미적으로 동일한 정보를 정확하게 추출할 수 있게 됨으로써 정보 추출, 온톨로지 생성에 도움이 될 것이다. 또한 이러한 기법이 챗봇에서 사용자의 의도 탐지 및 MRC와 같은 자연어 처리의 여러 분야에 유용한 자원으로 사용될 것이다.

  • PDF

Measurements and Data Interpretation for the Detection of Steel Bars and Delamination inside Concrete (콘크리트내의 철근 및 공동탐사를 위한 측정과 분석)

  • Rhim, Hong-Chul;Park, Ki-Joon;Lee, Soong-Jae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.20 no.4
    • /
    • pp.305-313
    • /
    • 2000
  • To determine detection capabilities of locating steel bars and delamination inside concrete, commercially available nondestructive testing (NDT) equipments have been tested. The equipments include two radar systems and two electromagnetic method systems. The inclusions are a 19 mm diameter steel bar and 50 mm thick delamination embedded at different cover depths from the surface of concrete specimens. For the steel bar, attempts were made to determine the size of the bars by changing the diameter of the bars. A sample result of measuring horizontal spacing between doubly reinforced bars is presented in this paper. Experimental results on various measurement cases are discussed. Application of numerical modeling technique for the simulation of radar measurements and improved output display of radar measurements are also presented.

  • PDF

A study on wideband underwater acoustic signal amplifier design for generating multi-frequency (다중 주파수 재생을 위한 광대역 수중 음향 신호 증폭기 설계 연구)

  • Lee, Dong-Hun;Yoo, Seung-Jin;Kim, Hyeong-Moon;Kim, Hyoung-Nam
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.3
    • /
    • pp.179-185
    • /
    • 2017
  • The problem that occurred in the design/fabrication/testing of the wideband transmitting power amplifier for an embedded active SONAR (Sound Navigation and Ranging) system operating underwater was analyzed and the solution of the problem was proposed in this paper. Wideband acoustic SONAR systems had been developed in order to improve the underwater detection performance. The underwater acoustic transmission system had been also developed to achieve the wideband SONAR system. In this paper, the wideband acoustic transmission signal was generated using a 2 Level sawtooth type Class D PWM (Pulse Width Modulation) which was not complicated to implement. When the sonar signals having two or more frequencies were simultaneously generated, parasitic frequencies were added to the original signals by integer multiples of the frequency difference of the original signal. To cope with this problem, we proposed a way to remove the parasitic frequency from the source signal through modeling and simulation of the implemented power amplifier and PWM control hardware using MATLAB and Simulink.

Modeling Relationships between Objects for Referring Expression Comprehension (참조 표현 이해를 위한 물체간의 관계 모델링)

  • Shin, Donghyeop;Kim, Incheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.869-872
    • /
    • 2017
  • 참조 표현이란 영상 내의 특정 물체를 가리키는 자연어 문장을 의미한다. 그리고 이러한 자연어 참조 표현을 기초로, 한 영상에서 실제로 대상 물체의 영역을 찾아내는 일을 참조 표현 이해라고 한다. 본 논문은 참조 표현 이해를 위한 새로운 심층 신경망 모델과 학습 방법을 제안한다. 본 논문에서 제안하는 모델은 효과적인 참조 표현 이래를 위해, 참조 표현에서 언급하는 대상 물체와 보조 물체를 모두 고려할 뿐만 아니라, 두 물체간의 관계정보도 활용한다. 또한, 본 논문에서 제안하는 모델은 이러한 다양한 맥락 정보들을 참조 표현 의존적인 방식으로 가중 결합함으로써, 참조 표현에 부합하는 대상 물체 영역을 보다 정확히 탐지해낼 수 있도록 설계하였다. 본 논문에서는 대규모 참조 표현 데이터 집합인 Google RefExp를 이용한 성능 비교 실험들을 통해, 제안하는 모델의 우수성을 확인하였다.

Suggestion of Selecting features and learning models for Android-based App Malware Detection (안드로이드 기반 앱 악성코드 탐지를 위한 Feature 선정 및 학습모델 제안)

  • Bae, Se-jin;Rhee, Jung-soo;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.377-380
    • /
    • 2022
  • An application called an app can be downloaded and used on mobile devices. Among them, Android-based apps have the disadvantage of being implemented on an open source basis and can be exploited by anyone, but unlike iOS, which discloses only a small part of the source code, Android is implemented as an open source, so it can analyze the code. However, since anyone can participate in changing the source code of open source-based Android apps, the number of malicious codes increases and types are bound to vary. Malicious codes that increase exponentially in a short period of time are difficult for humans to detect one by one, so it is efficient to use a technique to detect malicious codes using AI. Most of the existing malicious app detection methods are to extract Features and detect malicious apps. Therefore, three ways to select the optimal feature to be used for learning after feature extraction are proposed. Finally, in the step of modeling with optimal features, ensemble techniques are used in addition to a single model. Ensemble techniques have already shown results beyond the performance of a single model, as has been shown in several studies. Therefore, this paper presents a plan to select the optimal feature and implement a learning model for Android app-based malicious code detection.

  • PDF

Modeling and Implementation of IDS for Security System simulation using SSFNet (SSFNet 환경에서 보안시스템 시뮬레이션을 위한 IDS 모델링 및 구현)

  • Kim, Yong-Tak;Kwon, Oh-Jun;Seo, Dong-Il;Kim, Tai-Suk
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.87-95
    • /
    • 2006
  • We need to check into when a security system is newly developed, we against cyber attack which is expected in real network. However it is impossible to check it under the environment of a large-scale distributive network. So it is need to simulate it under the virtual network environment. SSFNet is a event-driven simulator which can be represent a large-scale network. Unfortunately, it doesn't have the module to simulate security functions. In this paper, we added the IDS module to SSFNet. We implement the IDS module by modeling a key functions of Snort. In addition, we developed some useful functions using Java language which can manipulate easily a packet for network simulation. Finally, we performed the simulation to verify the function if our developed IDS and Packets Manipulation. The simulation shows that our expanded SSFNet can be used to further large-scale security system simulator.

  • PDF

A sea trial method of hull-mounted sonar using machine learning and numerical experiments (기계학습 및 수치실험을 활용한 선체고정형소나 해상 시운전 평가 방안)

  • Ho-seong Chang;Chang-hyun Youn;Hyung-in Ra;Kyung-won Lee;Dea-hwan Kim;Ki-man Kim
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.3
    • /
    • pp.293-304
    • /
    • 2024
  • In this paper, efficient and reliable methodologies for conducting sea trials to evaluate the performance of hull-mounted sonar systems is discussed. These systems undergo performance verification during ship construction via sea trials. However, the evaluation procedures often lack detailed consideration of variabilities in detection performance due to seabed topography, seasonal factors. To resolve this issue, temperature and salinity structure data were collected from 1967 to 2022 using ARGO floats and ocean observers data. The paper proposes an efficient and reliable sea trial method incorporating Bellhop modeling. Furthermore, a machine learning model applying a Physics-Informed Neural Networks was developed using the acquired data. This model predicts the sound speed profile at specific points within the sea trial area, reflecting seasonal elements of performance evaluation. In this study, we predicted the seasonal variations in sound speed structure during sea trial operations at a specific location within the trial area. We then proposed a strategy to account for the variability in detection performance caused by seasonal factors, using results from Bellhop modeling.

Implementation and Design of Policy Based Security System for Integration Management (통합 관리를 위한 정책 기반의 보안시스템 설계 및 구현)

  • Kim, Yong-Tak;Lee, Jong-Min;Kim, Tai-Suk;Kwon, Oh-Jun
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.1052-1059
    • /
    • 2007
  • Network security system used in the large scale network composes individual security system which protects only own domain. Problems of individual security system are not to protect the backbone network and to be hard to cope with in real-time. In this paper we proposed a security system which includes security function at the router, and the access point, which exist at the backbone network, to solve the problems. This security system sends the alert messages to an integrated security management system after detecting intrusions. The integrated security management system releases confrontation plan to each suity system. Thus the systematic and immediate confrontation is possible. We analyzed function verification and efficiency by using the security system and the integrated security management system suggested in this paper. We confirmed this integrated security management system has a possibility of a systematic and immediate confrontation.

  • PDF