• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.031 seconds

Prediction of compressive strength of lightweight mortar exposed to sulfate attack

  • Tanyildizi, Harun
    • Computers and Concrete
    • /
    • v.19 no.2
    • /
    • pp.217-226
    • /
    • 2017
  • This paper summarizes the results of experimental research, and artificial intelligence methods focused on determination of compressive strength of lightweight cement mortar with silica fume and fly ash after sulfate attack. The artificial neural network and the support vector machine were selected as artificial intelligence methods. Lightweight cement mortar mixtures containing silica fume and fly ash were prepared in this study. After specimens were cured in $20{\pm}2^{\circ}C$ waters for 28 days, the specimens were cured in different sulfate concentrations (0%, 1% $MgSO_4^{-2}$, 2% $MgSO_4^{-2}$, and 4% $MgSO_4^{-2}$ for 28, 60, 90, 120, 150, 180, 210 and 365 days. At the end of these curing periods, the compressive strengths of lightweight cement mortars were tested. The input variables for the artificial neural network and the support vector machine were selected as the amount of cement, the amount of fly ash, the amount of silica fumes, the amount of aggregates, the sulfate percentage, and the curing time. The compressive strength of the lightweight cement mortar was the output variable. The model results were compared with the experimental results. The best prediction results were obtained from the artificial neural network model with the Powell-Beale conjugate gradient backpropagation training algorithm.

Effect of longitudinal grooves of the scallop surface on aerodynamic performance (조개 표면의 종방향 그루브가 공력성능에 미치는 영향)

  • Kim, Tae-Hun;Choi, Hae-Cheon
    • Proceedings of the KSME Conference
    • /
    • 2008.11b
    • /
    • pp.2419-2421
    • /
    • 2008
  • Some of the scallops like Amesium balloti have an excellent level-swimming ability, i.e. they can swim about 20m by single level swimming with a maximum swimming velocity of about 1.6m/s in the sea. On the other hand, some species like Patinopecten yessoensis have longitudinal grooves on the upper and lower surfaces and others do not. Therefore, in the present study, we measure the lift and drag forces on a real scallop model (Patinopecten yessoensis) in a wind tunnel. Experiments are performed at the Reynolds number of 75,000 based on the maximum chord length, which is within the swimming condition of real scallop (Re = $30,000{\sim}300,000$). To see the effect of longitudinal grooves, we measure the aerodynamic forces on a scallop model by removing the grooves. With the grooves, the lift force increases at low angles of attack (${\alpha}<10^{\circ}$). The drag force increases slightly at all the attack angles considered. The lift-to-drag ratio is increased by about 10% at ${\alpha}<10^{\circ}$.

  • PDF

Adversarial Detection with Gaussian Process Regression-based Detector

  • Lee, Sangheon;Kim, Noo-ri;Cho, Youngwha;Choi, Jae-Young;Kim, Suntae;Kim, Jeong-Ah;Lee, Jee-Hyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4285-4299
    • /
    • 2019
  • Adversarial attack is a technique that causes a malfunction of classification models by adding noise that cannot be distinguished by humans, which poses a threat to a deep learning model. In this paper, we propose an efficient method to detect adversarial images using Gaussian process regression. Existing deep learning-based adversarial detection methods require numerous adversarial images for their training. The proposed method overcomes this problem by performing classification based on the statistical features of adversarial images and clean images that are extracted by Gaussian process regression with a small number of images. This technique can determine whether the input image is an adversarial image by applying Gaussian process regression based on the intermediate output value of the classification model. Experimental results show that the proposed method achieves higher detection performance than the other deep learning-based adversarial detection methods for powerful attacks. In particular, the Gaussian process regression-based detector shows better detection performance than the baseline models for most attacks in the case with fewer adversarial examples.

Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection (네트워크 이상행위 탐지를 위한 암호트래픽 분석기술 동향)

  • Y.S. Choi;J.H. Yoo;K.J. Koo;D.S. Moon
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.5
    • /
    • pp.71-80
    • /
    • 2023
  • With the rapid advancement of the Internet, the use of encrypted traffic has surged in order to protect data during transmission. Simultaneously, network attacks have also begun to leverage encrypted traffic, leading to active research in the field of encrypted traffic analysis to overcome the limitations of traditional detection methods. In this paper, we provide an overview of the encrypted traffic analysis field, covering the analysis process, domains, models, evaluation methods, and research trends. Specifically, it focuses on the research trends in the field of anomaly detection in encrypted network traffic analysis. Furthermore, considerations for model development in encrypted traffic analysis are discussed, including traffic dataset composition, selection of traffic representation methods, creation of analysis models, and mitigation of AI model attacks. In the future, the volume of encrypted network traffic will continue to increase, particularly with a higher proportion of attack traffic utilizing encryption. Research on attack detection in such an environment must be consistently conducted to address these challenges.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.

Fireside Corrosion Characteristics in Coal-Fired Boiler Tube (석탄연소중 발생되는 보일러 튜브의 화염측 부식특성)

  • Kim, Tae-Hyung;Seo, Sang-Il;Park, Ho-Young;Kim, Young-Ju
    • 한국연소학회:학술대회논문집
    • /
    • 2006.10a
    • /
    • pp.276-281
    • /
    • 2006
  • Although fireside corrosion of heat transfer surfaces in coal fired steam generators has been a problem to some extent for a number of tears, with the advent of low NOx firing systems these surfaces can be exposed to conditions that will exacerbate wastage rates. Numerous reports of waterwall wastage in coal fired boilers have appeared in the literature. It is believed that wastage results both from gaseous phase attack of metal surfaces and from deposition of ash and unburned fuel. Gaseous phase attack is known to occur in the presence of reducing sulfur species such as $H_2S$ and in the presence of fuel chlorine. The highest wastage rates are thought to be due to deposition of unoxidized material and the presence of fuel chlorine. Localized wall and near wall conditions that may exacerbate wastage include reducing conditions, high temperatures, high heat fluxes, and a high fraction of unoxidized material deposited. So, this study is directed at developing an advanced corrosion model in coal-fired utility boilers.

  • PDF

Look-Angle-Control Guidance for Missiles with Strapdown Seeker (스트랩다운 탐색기를 탑재한 유도탄의 관측각 제어 유도)

  • Kim, Dowan;Park, Woosung;Ryoo, Chang-Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.3
    • /
    • pp.275-280
    • /
    • 2013
  • Conventional proportional navigation guidance law is not adequate for missiles with a strapdown seeker, because the strapdown seeker cannot measure line-of-sight rate directly. This paper suggests a guidance loop design method, in which the look angle, measured by the strapdown seeker directly, is controlled to deliver a missile to a target. Basically, the look angle control loop is regarded as an attitude control loop. By using the proposed method, it is possible to shape the midcourse trajectory by choosing the reference look angle properly. The look angle control loop can robustly maintain target lock-on against disturbances because the target is always captured in the field of view of the seeker. The performance of the proposed method is verified via 6-DOF simulations of a true short range tactical missile model.

Performance Analysis of Stabilizer Fin Applied Coanda System (코안다 시스템이 장착된 안정기용 핀의 성능해석)

  • Seo, Dae-Won;Lee, Se-Jin;Oh, Jungkeun
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.1
    • /
    • pp.18-24
    • /
    • 2016
  • Stabilizer fins are installed on each side of a ship to control its roll motion. The most common stabilizer fin is a rolling control system that uses the lift force on the fin surface. If the angle of attack of a stabilizer fin is zero or the speed is zero, it cannot control the roll motion. The Coanda effect is well known to generate lift force in marine field. The performance of stabilizer fin that applies the Coanda effect has been verified by model tests and numerical simulations. It was found that a stabilizer fin that applied the Coanda effect at Cj = 0.085 and a zero angle of attack exactly coincided with that of the original fin at α = 26°. In addition, the power needed to generate the Coanda effect was not high compared to the motor power of the original stabilizer fin.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

A Study on Flow Characteristics of a Wells Turbine for Wave Power Conversion Using Numerical Analysis (수치해석을 이용한 파력발전용 웰즈터빈의 유동특성에 관한 연구)

  • ;;;;T.Setoguchi
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.25 no.1
    • /
    • pp.182-190
    • /
    • 2001
  • The aerodynamics of the Wells turbine has been studied using 3-d, unstructured mesh flow solver for the Reynolds-averaged Navier-Stokes equations. The basic feature of the Wells turbine is that even though the cyclic airflow produces oscillating axial forces on the airfoil blades, the tangential force on the rotor is always in the same direction. Geometry used to define 3-D numerical grid is based upon that of an experimental test rig. The 3-D Wells turbine model, consisting of approximate 220,000 cells is tested of four axial flow rates. In the calculations the angle of attack has been varied between 10˚ and 30˚ of blades, Representative results from each case are presented graphically andy analysed. It is concluded that this technique holds much promise for future development of Wells turbines.

  • PDF