• Title/Summary/Keyword: 탐지 확률

Search Result 263, Processing Time 0.273 seconds

Research on PSNF-m algorithm applying track management technique (트랙관리 기법을 적용한 PSNF-m 표적추적 필터의 성능 분석 연구)

  • Yoo, In-Je
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.681-691
    • /
    • 2017
  • In the clutter environment, it is necessary to update the target tracking filter by detecting the target signal among many measured value data obtained via the radar system, the track does not diverge, and tracking performance is maintained. The method of associating the measurement most relevant to the target track among numerous measurement values is referred to as data association. PSNF and PSNF-m are data association methods of SN-series. In this paper, we provide an IPSNF-m(Integrated Probabilistic Strongest Neighbor Filter-m) algorithm with a track management method based on the track existence probability in PSNF-m algorithm. This algorithm considers not only the presence of the target but also the case where the target is present but not detected. Calculating the probability of each caseenables efficient management. In order to verify the performance of the proposed IPSNF-m, the track existence probability of the IPSNF algorithm applying the track management technique to PSNF, which is known to have similar performance to PSNF-m, is derived. Through simulation in the same environment, we compare and analyze the proposed algorithm with RMSE, Confirmed True Track, and Track Existence Probability that show better performance in terms of track retention and estimation than the existing PSNF-m and IPSNF algorithms.

RSSI based Proximity User Detection System using Exponential Moving Average (지수이동평균을 이용한 RSSI 기반 근거리 사용자 탐지 시스템)

  • Yun, Gi-Hun;Kim, Keon-Wook;Choi, Jae-Hun;Park, Soo-Jun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.4
    • /
    • pp.105-111
    • /
    • 2010
  • This paper proposes the recursive algorithm for passive proximity detection system based on signal strength. The system is designed to be used in the smart medicine chest in order to provide location-based service for the senior personnel. Due to the system profile, single receiver and uni-direction communication are applied over the signal attenuation model for the determination of user existence within certain proximity. The performance of conventional methods is subjective to the sight between the transmitter and receiver unless the direction of target is known. To appreciate the temporal and spatial locality of human subjects, the authors present exponential moving average (EMA) to compensate the unexpected position error from the direction and/or environment. By using optimal parameter, the experiments with EMA algorithm demonstrates 32.26% (maximum 40.80%) reduction in average of the error probability with 50% of consecutive sight in time.

A Distributed Method for Bottleneck Node Detection in Wireless Sensor Network (무선 센서망의 병목 노드 탐색을 위한 분산 알고리즘)

  • Gou, Haosong;Kim, Jin-Hwan;Yoo, Young-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.621-628
    • /
    • 2009
  • Wireless sensor networks (WSNs) have been considered as a promising method for reliably monitoring both civil and military environments under hazardous or dangerous conditions. Due to the special property and difference from the traditional wireless network, the lifetime of the whole network is the most important aspect. The bottleneck nodes widely exist in WSNs and lead to decrease the lifetime of the whole network. In order to find out the bottleneck nodes, the traditional centralized bottleneck detection method MINCUT has been proposed as a solution for WSNs. However they are impractical for the networks that have a huge number of nodes. This paper first proposes a distributed algorithm called DBND (Distributed Bottleneck Node detection) that can reduce the time for location information collection, lower the algorithm complexity and find out the bottleneck nodes quickly. We also give two simple suggestions of how to solve the bottleneck problem. The simulation results and analysis show that our algorithm achieves much better performance and our solutions can relax the bottleneck problem, resulting in the prolonging of the network lifetime.

Development of Simulation Tool for Ship Self Defense Scenario Using Naval Multi Function Radar (함정용 다기능 레이다를 이용한 자함 방어 시나리오 시뮬레이션 도구 개발)

  • Park, Myung-Hoon;Kim, Chang-Hwan;Kim, Hyun-Seung;Go, Jin-Yong;Jeon, Woo-Joong;Kwon, Se-Woong;Lee, Ki-Won;Kang, Yeon-Duk;Yoo, Seung-Ki
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.87-96
    • /
    • 2020
  • The multi function radar is searching target and tracking through resource management at the same time. Increasing resource allotment of track, if more targets and faster the renewal rate of track, lead to decreasing quota of searching resource in limited resource. When the resource of search are decreased, it becomes degrade searching performance such as revisit time, number of detecting chance and tracking etc. Degraded performance of search reduces guided missile defense probability in complex strategy such as ship self defense. In this paper, we developed a modeling and simulation (M&S) tool that uses own-ship model, radar model, target model and defense model for analysis of self defense in complex strategy. We analyzed influence of ship self defense in complex strategy according to various target environments and track performance.

A Fuzzy Logic-Based False Report Detection Method in Wireless Sensor Networks (무선 센서 네트워크에서 퍼지 로직 기반의 허위 보고서 탐지 기법)

  • Kim, Mun-Su;Lee, Hae-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.27-34
    • /
    • 2008
  • Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in the sensor network without adequate protection may be compromised by adversaries. Such compromised nodes are vulnerable to the attacks like false reports injection attacks and false data injection attacks on legitimate reports. In false report injection attacks, an adversary injects false report into the network with the goal of deceiving the sink or the depletion of the finite amount of energy in a battery powered network. In false data injection attacks on legitimate reports, the attacker may inject a false data for every legitimate report. To address such attacks, the probabilistic voting-based filtering scheme (PVFS) has been proposed by Li and Wu. However, each cluster head in PVFS needs additional transmission device. Therefore, this paper proposes a fuzzy logic-based false report detection method (FRD) to mitigate the threat of these attacks. FRD employs the statistical en-route filtering scheme as a basis and improves upon it. We demonstrate that FRD is efficient with respect to the security it provides, and allows a tradeoff between security and energy consumption, as shown in the simulation.

  • PDF

Paper Duplication Method Supported by Task (태스크 기반 이중화 방안)

  • Lee, Jong-Chan;Park, Sang-Joon;Kang, Kwon-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.103-111
    • /
    • 2002
  • In RNC of IMT-2000, main control processors such as ASP, ACP and OMP are responsible for call control function, and the high reliability and real-time property should be provided for it. So, the study of real-time fault-tolerant for it is needed. In this paper, we proposes an Task based duplication method, in which Tasks in active side operated on message unit and send the updated data to standby side after operation, log in the message to standby side for recovery during take-over. This scheme decreases the dual down and the complexity of synchronization procedure, and performs the synchronization more exactly because Tasks control the synchronization of system. This paper also proposes the fault detection and the fault handing method for effective implementation of Task based duplication. This scheme focus on increasing the fault detection rate and intercepting originally that fault data is send to standby side.

A Bayesian Inference Model for Landmarks Detection on Mobile Devices (모바일 디바이스 상에서의 특이성 탐지를 위한 베이지안 추론 모델)

  • Hwang, Keum-Sung;Cho, Sung-Bae;Lea, Jong-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.1
    • /
    • pp.35-45
    • /
    • 2007
  • The log data collected from mobile devices contains diverse meaningful and practical personal information. However, this information is usually ignored because of its limitation of memory capacity, computation power and analysis. We propose a novel method that detects landmarks of meaningful information for users by analyzing the log data in distributed modules to overcome the problems of mobile environment. The proposed method adopts Bayesian probabilistic approach to enhance the inference accuracy under the uncertain environments. The new cooperative modularization technique divides Bayesian network into modules to compute efficiently with limited resources. Experiments with artificial data and real data indicate that the result with artificial data is amount to about 84% precision rate and about 76% recall rate, and that including partial matching with real data is about 89% hitting rate.

Reliable Multicast MAC Protocol with Low Probability of Detection for Survivability in Tactical Ad-hoc Networks (생존성 향상을 위해 신뢰성 및 저피탐을 보장하는 멀티캐스팅 MAC 프로토콜 기법)

  • Kim, Jeong-Hun;Jung, Jun-Woo;Kim, Jung-Bin;Lim, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1685-1695
    • /
    • 2010
  • In this paper, we propose a new reliable multicast MAC protocol over the IEEE 802.11-based tactical ad hoc networks. The major contribution compared to the previous reliable multicast schemes using consecutive CTSs/ACKs is that the proposed scheme can send multiple CTS/ACK messages concurrently assisted by MC-DS/CDMA mechanisms. When multiple receivers receive the RTS/DATA message from a sender, they respond with the CTS/ACK message spread with pre-assigned code in the same time interval. The proposed scheme can reduce the overhead of multiple CTSs/ACKs. It is also possible to alleviate the received signal strength at the enemy detector and thus it improves low probability of detection performance. Through simulations and analysis, the proposed scheme outperforms that of the multiple CTSs/ACks in terms of the throughput, transmission delay and low probability of detection.

Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment (IoT 환경에서 네트워크 코딩의 위장패킷 탐지와 유효한 복구의 식별 알고리즘)

  • Lee, Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • Work to improve network throughput has been focused on network coding as the utilization of IoT-based application services increases and network usage increases rapidly. In network coding, nodes transform packets received from neighboring nodes into a combination of encoded packets for transmission and decoding at the destination. This scheme is based on trust among nodes, but in the IoT environment where nodes are free to join, a malicious node can fabricate the packet if it legally participates in the configuration. It is difficult to identify the authenticity of the encoded packet since the packet received at destination is not a single source but a combination of packets generated by several nodes. In this paper, we propose a method to detect "look-like-valid" packets that have been attacked and disguised in packets received at destination, and to identify valid messages in the reconstructions. This method shows that network coding performance is significantly improved because the destination can reconstruct a valid message with only received packets without retransmission with a high probability, despite the presence of disguised packets.

A Study on a Combination Model Development for Counterfire Operation with Heterogeneous Weapon System (대화력전에 대한 이종 무기체계의 조합모델개발 연구)

  • Kim, Hanyoung;Kim, Seungcheon;Ro, Kwanghyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.62-69
    • /
    • 2016
  • This paper proposes to select Measure of Performance(MOP) for object attainment in the counterfire operation and deduce the reasonable combination of blue force's hitting resources satisfying MOP's optimal value and regression equation for the object achievement time. Also, in the study-methodological perspective, a series of procedures for drawing the regression equation from the real world is presented. Firstly the model was made by simplifying the weapon-system information of red force and blue force, then the time for object attainment was derived from its simulation. Simulating the model for the counterfire operation was divided into three phases-detection, decision and hitting. The probability method by applying the random numbers were used for detection, fixed constant numbers for decision and hitting. The simulation was repeatedly performed to get the minimum time for the object attainment against the fixed enemy, and it was estimated as the optimal value of simulation. From this result, the optimum combination of blue force's weapon system against the red force and finally, the regression equation were obtained by using the response surface analyzing method in MINITAB. Thereafter this equation was completely verified by using 'the 2-sample t-test.' As a result, the regression equation is suitable.