• Title/Summary/Keyword: 탐지 확률

Search Result 263, Processing Time 0.024 seconds

An Experimental Study on the Detection Characteristic of Draft Ice by Thermography System (열화상 시스템에 의한 유빙의 탐지특성에 관한 실험적 연구)

  • Cho, Yong-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.302-307
    • /
    • 2017
  • Draft ice in polar regions is formed due to sea level changes and various environmental factors cause damage due to collision with offshore plants and ships for resource development. Drift ice in polar regions is a potential source of accidents for offshore plants that perform long-term operations in one place, as well as on the ship. To prevent accidents with drift ice, offshore plants and ships in polar regions use satellite image information and detection radar to detect drift ice. However, the inability to use visible satellite images at night significantly lowers the detection probability by radar for small drift ice. In this study, we used a thermal imaging system which can be operated day and night for the detection of drift ice, and carried out an experimental study on the detection characteristics of drift ice. To examine the night operation of the thermal imaging system, the experimental condition was set and the thermal image was measured according to the measurement angle change. Under this condition, the correlation was analyzed by theoretical calculating the radiant energy of the drift ice and the sea water.

A Study on the Underwater Target Detection Using the Waveform Inversion Technique (파형역산 기법을 이용한 수중표적 탐지 연구)

  • Bae, Ho Seuk;Kim, Won-Ki;Kim, Woo Shik;Choi, Sang Moon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.487-492
    • /
    • 2015
  • A short-range underwater target detection and identification techniques using mid- and high-frequency bands have been highly developed. However, nowadays the long-range detection using the low-frequency band is requested and one of the most challengeable issues. The waveform inversion technique is widely used and the hottest technology in both academia and industry of the seismic exploration. It is based on the numerical analysis tool, and could construct more than a few kilometers of the subsurface structures and model-parameters such as P-wave velocity using a low-frequency band. By applying this technique to the underwater acoustic circumstance, firstly application of underwater target detection is verified. Furthermore, subsurface structures and it's parameters of the war-field are well reconstructed. We can confirm that this technique greatly reduces the false-alarm rate for the underwater targets because it could accurately reproduce both the shape and the model-parameters at the same time.

Deinterleaving of Multiple Radar Pulse Sequences Using Genetic Algorithm (유전자 알고리즘을 이용한 다중 레이더 펄스열 분리)

  • 이상열;윤기천
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.98-105
    • /
    • 2003
  • We propose a new technique of deinterleaving multiple radar pulse sequences by means of genetic algorithm for threat identification in electronic warfare(EW) system. The conventional approaches based on histogram or continuous wavelet transform are so deterministic that they are subject to failing in detection of individual signal characteristics under real EW signal environment that suffers frequent signal missing, noise, and counter-EW signal. The proposed algorithm utilizes the probabilistic optimization procedure of genetic algorithm. This method, a time-of-arrival(TOA) only strategy, constructs an initial chromosome set using the difference of TOA. To evaluate the fitness of each gene, the defined pulse phase is considered. Since it is rare to meet with a single radar at a moment in EW field of combat, multiple solutions are to be derived in the final stage. Therefore it is designed to terminate genetic process at the prematured generation followed by a chromosome grouping. Experimental results for simulated and real radar signals show the improved performance in estimating both the number of radar and the pulse repetition interval.

Selection of Detection Measures for Malicious Codes using Naive Estimator (단순 추정량을 이용한 악성코드의 탐지척도 선정)

  • Mun, Gil-Jong;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.97-105
    • /
    • 2008
  • The various mutations of the malicious codes are fast generated on the network. Also the behaviors of them become intelligent and the damage becomes larger step by step. In this paper, we suggest the method to select the useful measures for the detection of the codes. The method has the advantage of shortening the detection time by using header data without payloads and uses connection data that are composed of TCP/IP packets, and much information of each connection makes use of the measures. A naive estimator is applied to the probability distribution that are calculated by the histogram estimator to select the specific measures among 80 measures for the useful detection. The useful measures are then selected by using relative entropy. This method solves the problem that is to misclassify the measure values. We present the usefulness of the proposed method through the result of the detection experiment using the detection patterns based on the selected measures.

Improvement of Attack Traffic Classification Performance of Intrusion Detection Model Using the Characteristics of Softmax Function (소프트맥스 함수 특성을 활용한 침입탐지 모델의 공격 트래픽 분류성능 향상 방안)

  • Kim, Young-won;Lee, Soo-jin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.81-90
    • /
    • 2020
  • In the real world, new types of attacks or variants are constantly emerging, but attack traffic classification models developed through artificial neural networks and supervised learning do not properly detect new types of attacks that have not been trained. Most of the previous studies overlooked this problem and focused only on improving the structure of their artificial neural networks. As a result, a number of new attacks were frequently classified as normal traffic, and attack traffic classification performance was severly degraded. On the other hand, the softmax function, which outputs the probability that each class is correctly classified in the multi-class classification as a result, also has a significant impact on the classification performance because it fails to calculate the softmax score properly for a new type of attack traffic that has not been trained. In this paper, based on this characteristic of softmax function, we propose an efficient method to improve the classification performance against new types of attacks by classifying traffic with a probability below a certain level as attacks, and demonstrate the efficiency of our approach through experiments.

A Study on the Characteristics of Opinion Retrieval Using Term Statistical Analysis in Opinion Documents (의견 문서의 단어 통계 분석을 통한 의견 검색 특성에 관한 연구)

  • Han, Kyoung-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.21-29
    • /
    • 2010
  • Opinion retrieval which searches the opinions expressed in documents by users cannot outperform significantly yet traditional topical retrieval which searches the facts. Therefore, the focus of this paper is to identify the statistical characteristics which can be applied to opinion retrieval by comparing and analyzing the term statistics of opinion and non-opinion documents in the blog domain. The TREC Blogs06 collection and 150 TREC topics are used in the experiments. The difference between term probability distributions in opinion documents is measured by JS divergence, and the difference according to the topic types and topic domains is also investigated. Moreover, the term probabilities of opinion terms are analyzed comparatively. The main findings of this study include the following: it is necessary to consider the topic-specific characteristics for the opinion detection; it is effective to extract positive and negative opinion terms according to the topics; the topic types are complementary to the topic domains; and special attention has to be given to the usage of the positive opinion terms.

Automatic Estimation of Threshold Values for Change Detection of Multi-temporal Remote Sensing Images (다중시기 원격탐사 화상의 변화탐지를 위한 임계치 자동 추정)

  • 박노욱;지광훈;이광재;권병두
    • Korean Journal of Remote Sensing
    • /
    • v.19 no.6
    • /
    • pp.465-478
    • /
    • 2003
  • This paper presents two methods for automatic estimation of threshold values in unsupervised change detection of multi-temporal remote sensing images. The proposed methods consist of two analytical steps. The first step is to compute the parameters of a 3-component Gaussian mixture model from difference or ratio images. The second step is to determine a threshold value using Bayesian rule for minimum error. The first method which is an extended version of Bruzzone and Prieto' method (2000) is to apply an Expectation-Maximization algorithm for estimation of the parameters of the Gaussian mixture model. The second method is based on an iterative thresholding algorithm that successively employs thresholding and estimation of the model parameters. The effectiveness and applicability of the methods proposed here were illustrated by two experiments and one case study including the synthetic data sets and KOMPSAT-1 EOC images. The experiments demonstrate that the proposed methods can effectively estimate the model parameters and the threshold value determined shows the minimum overall error.

Probability Analysis for Impact Behavior of Composite Laminates Subjected to Low-Velocity Impact (저속충격을 받는 복합적층판의 충격거동에 대한 확률분포 특성)

  • Ha, Seung-Chul;Kim, In-Gul;Lee, Seok-Je;Cho, Sang-Gyu;Jang, Moon-Ho;Choi, Ik-Hyeon
    • Composites Research
    • /
    • v.22 no.6
    • /
    • pp.18-22
    • /
    • 2009
  • In this paper, we examined impact force and impact behavior through low velocity impact tests of composite laminates. And through c-scan as nondestructive inspection, explored the damaged area being difficult to examine with the visual inspection. Through CAI tests, we also measured the compression strength of composite laminates subjected to low velocity impact. To examine the characteristics of impact behavior measured from low velocity impact test, nondestructive inspection, and CAI test, the simulated data are generated from the test data using Monte-Carlo simulation, then represented it by probability distribution. The testing results using visible stochastic distribution were examined and compared.

Comparison of Two Methods for Estimating the Appearance Probability of Seawater Temperature Difference for the Development of Ocean Thermal Energy (해양온도차에너지 개발을 위한 해수온도차 출현확률 산정 방법 비교)

  • Yoon, Dong-Young;Choi, Hyun-Woo;Lee, Kwang-Soo;Park, Jin-Soon;Kim, Kye-Hyun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.13 no.2
    • /
    • pp.94-106
    • /
    • 2010
  • Understanding of the amount of energy resources and site selection are required prior to develop Ocean Thermal Energy (OTE). It is necessary to calculate the appearance probability of difference of seawater temperature(${\Delta}T$) between sea surface layer and underwater layers. This research mainly aimed to calculate the appearance probability of ${\Delta}T$ using frequency analysis(FA) and harmonic analysis(HA), and compare the advantages and weaknesses of those methods which has used in the South Sea of Korea. Spatial scale for comparison of two methods was divided into local and global scales related to the estimation of energy resources amount and site selection. In global scale, the Probability Differences(PD) of calculated ${\Delta}T$ from using both methods were created as spatial distribution maps, and compared areas of PD. In local scale, both methods were compared with not only the results of PD at the region of highest probability but also bimonthly probabilities in the regions of highest and lowest PD. Basically, the strong relationship(pearson r=0.96, ${\alpha}$=0.05) between probabilities of two methods showed the usefulness of both methods. In global scale, the area of PD more than 10% was less than 5% of the whole area, which means both methods can be applied to estimate the amount of OTE resources. However, in practice, HA method was considered as a more pragmatic method due to its capability of calculating under various ${\Delta}T$ conditions. In local scale, there was no significant difference between the high probability areas by both methods, showing difference under 5%. However, while FA could detect the whole range of probability, HA had a disadvantage of inability of detecting probability less than 10%. Therefore it was analyzed that the HA is more suitable to estimate the amount of energy resources, and FA is more suitable to select the site for OTE development.

Relaying Rogue AP detection scheme using SVM (SVM을 이용한 중계 로그 AP 탐지 기법)

  • Kang, Sung-Bae;Nyang, Dae-Hun;Choi, Jin-Chun;Lee, Sok-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.431-444
    • /
    • 2013
  • Widespread use of smartphones and wireless LAN accompany a threat called rogue AP. When a user connects to a rogue AP, the rogue AP can mount the man-in-the-middle attack against the user, so it can easily acquire user's private information. Many researches have been conducted on how to detect a various kinds of rogue APs, and in this paper, we are going to propose an algorithm to identify and detect a rogue AP that impersonates a regular AP by showing a regular AP's SSID and connecting to a regular AP. User is deceived easily because the rogue AP's SSID looks the same as that of a regular AP. To detect this type of rogue APs, we use a machine learning algorithm called SVM(Support Vector Machine). Our algorithm detects rogue APs with more than 90% accuracy, and also adjusts automatically detection criteria. We show the performance of our algorithm by experiments.