• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.027 seconds

Measurements of the Pitch Dynamic Stability Derivatives of a Standard Dynamics Model Using a Forced Vibration Technique (강제진동기법을 이용한 표준동역학 모델의 피치 동안정미계수측정)

  • Cho, Hwan-Kee;Kim, Seung-Pil;Baek, Seung-Woock;Chang, Jo-Won
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.6
    • /
    • pp.489-495
    • /
    • 2007
  • An experimental study was carried out in order to measure the pitch dynamic stability derivatives of a standard dynamics model in a low-speed wind tunnel. When a trigger signal is generated, the aircraft model starts oscillation with constant amplitudes and frequencies provided by DC electrical servomotor. The measured data are simultaneously recorded on a data recorder for 25 cycles of the model oscillation. The Phase shift needed to compute the dynamic stability derivatives is determined by calculating differences between the peak values of the input and output signals from the dynamic stability balance. Stabilator effects on the stability derivatives were also investigated with deflection angles. Although the driving apparatus and experimental equipments manufactured creatively for this study are different from other experiments, the variational trend of dynamic stability derivatives with the angle of attack is in a good accordance with the results of TPI, NAE, and FFA.

An Entropy Masking Model for Image and Video Watermarking (영상 워터마킹을 위한 엔트로피 마스킹 모델)

  • Kim, Seong-Whan;Shan Suthaharan
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.491-496
    • /
    • 2003
  • We present a new watermark design tool for digital images and digital videos that are based on human visual system (HVS) characteristics. In this tool, basic mechanisms (inhibitory and excitatory behaviour of cells) of HVS are used to determine image dependent upper bound values on watermark insertion. This allows us to insert maximai allowable transparent watermark, which in turn is extremely hard to attack with common image processing, Motion Picture Experts Group (MPEG) compression. As the number of details (e.g. edges) increases in an image, the HVS decrease its sensitivity to the details. In the same manner, as the number of motion increases in a video signal, the HVS decrease its sensitivity to the motions. We model this decreased sensitivity to the details and motions as an (motion) entropy masking. Entropy masking model can be efficiently used to increase the robustness of image and video watermarks. We have shown that our entropy-masking model provides watermark scheme with increased transparency and henceforth increased robustness.

A Numerical Study of Turbulent Flow Around a Twin-Skeg Container Ship Model with Appendages

  • Kim, Hyoung-Tae;Lee, Pyung-Kuk;Kim, Hee-Taek
    • Journal of Ship and Ocean Technology
    • /
    • v.10 no.4
    • /
    • pp.12-23
    • /
    • 2006
  • In this paper, a numerical study is carried out to investigate the turbulent flow around a twin-skeg container ship model with rudders including propeller effects. A commercial CFD code, FLUENT is used with body forces distributed on the propeller disk to simulate the ship stem and wake flows with the propeller in operation. A multi-block, matching, structured grid system has been generated for the container ship hull with twin-skegs in consideration of rudders and body-force propeller disks. The RANS equations for incompressible fluid flows are solved numerically by using a finite volume method. For the turbulence closure, a Reynolds stress model is used in conjunction with a wall function. Computations are carried out for the bare hull as well as the hull with appendages of a twin-skeg container ship model. For the bare hull, the computational results are compared with experimental data and show generally a good agreement. For the hull with appendages, the changes of the stem flow by the rudders and the propellers have been analyzed based on the computed result since there is no experimental data available for comparison. It is found the flow incoming to the rudders has an angle of attack due to the influence of the skegs and thereby the hull surface pressure and the limiting streamlines are changed slightly by the rudders. The axial velocity of the propeller disk is found to be accelerated overall by about 35% due to the propeller operation with the rudders. The area and the magnitude of low pressure on the hull surface enlarge with the flow acceleration caused by the propeller. The propellers are found to have an effect on up to the position where the skeg begins. The propeller slipstream is disturbed strongly by the rudders and the flow is accelerated further and the transverse velocity vectors are weakened due to the flow rectifying effect of the rudder.

Provably Secure Tree-Based Centralized Group Key Distribution: Security Model and Modular Approach (증명 가능한 트리기반 중앙 분배 방식의 그룹키 기법: 안전성 모델 및 변환모듈)

  • Kim Hyun-Jeong;Lee Su-Mi;Lee Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.69-78
    • /
    • 2004
  • During the last decade, security models have been defined for two- and three-parity key exchange protocols. Currently there is a growing research interest in security models for group key management schemes. While various security models and provably secure protocols have been proposed for distributed group key exchange schemes, no results are hewn for centralized group key distribution schemes in spite of their theoretical and practical importance. We describe security requirements and a formal security model for centralized group key distribution scheme: we define the model on the channel controlled by adversaries with the ability of strong user corruption. In the security model, we propose a conversion module which can transform centralized tree-based group key distribution schemes in the literature to provably secure centralized tree-based group key distribution schemes.

Improving Adversarial Robustness via Attention (Attention 기법에 기반한 적대적 공격의 강건성 향상 연구)

  • Jaeuk Kim;Myung Gyo Oh;Leo Hyun Park;Taekyoung Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.621-631
    • /
    • 2023
  • Adversarial training improves the robustness of deep neural networks for adversarial examples. However, the previous adversarial training method focuses only on the adversarial loss function, ignoring that even a small perturbation of the input layer causes a significant change in the hidden layer features. Consequently, the accuracy of a defended model is reduced for various untrained situations such as clean samples or other attack techniques. Therefore, an architectural perspective is necessary to improve feature representation power to solve this problem. In this paper, we apply an attention module that generates an attention map of an input image to a general model and performs PGD adversarial training upon the augmented model. In our experiments on the CIFAR-10 dataset, the attention augmented model showed higher accuracy than the general model regardless of the network structure. In particular, the robust accuracy of our approach was consistently higher for various attacks such as PGD, FGSM, and BIM and more powerful adversaries. By visualizing the attention map, we further confirmed that the attention module extracts features of the correct class even for adversarial examples.

Optimization of Angled Ribs for Heat Transfer Enhancement in Square Channel with Bleed Flow (유출홀이 설치된 정사각유로 내 열전달 향상을 위한 경사진 요철 최적설계)

  • Lee, Hyun;Kim, Kyung-Min;Lee, Dong-Hyun;Cho, Hyung-Hee
    • Proceedings of the KSME Conference
    • /
    • 2007.05b
    • /
    • pp.2384-2389
    • /
    • 2007
  • The 2nd order response surface method (RSM) has been carried out to get optimum thermal design for enhanced heat transfer on square channel with bleed holes. The RSM was used as an optimization technique with Reynolds-averaged navier-stokes equation. Turbulence model for heat transfer analysis used RNG k-epsilon model. The wall function used enhanced wall function. Numerical local heat transfer coefficients were similar to the experimental tendency. Two design variables such as attack angle of rib (${\alpha}$), rib pitch-to-rib height ratio (p/e) were chosen. Operation condition considered bleeding ratio per bleed hole ($BR_{hole}$). A response surface were constructed by the design variables and operation condition. As a result, adjusted $R^2$ was more than 0.9. Optimization results of various objective function were similar to heat transfer in channel with and without bleed flow. But friction factor was lower than channel without bleed flow.

  • PDF

Simulation of Conceptual Designs of a Three-Surface Stealth Strike Fighter

  • Kuizhi, Yue;ShiChun, Chen;Wenlin, Liu;Dazhao, Yu
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.15 no.4
    • /
    • pp.366-373
    • /
    • 2014
  • A conceptual design of a three-surface strike fighter was studied and stealth performance was taken into account to enhance survivability and battle effectiveness. CATIA was used to design the aircraft's three-dimensional prototype model and the weapon carriage arrangement was also studied. The aircraft's RCS characteristics and distributions under X, S, C, and L bands were simulated using the RCSPlus software, which is based on the PO method. Pressure and velocity distributions of the flow field were also simulated using CFD. A turbulence model was based on standard $k-{\varepsilon}$ function and N-S functions were used during the CFD computation. Lift coefficients, drag coefficients, and lift-to-drag ratio were obtained by aerodynamic simulation. The results showed that: (1) the average value of head-on RCS between ${\pm}30^{\circ}$ is below -3.197 dBsm, and (2) the lift coefficient is 0.34674, the drag coefficient is 0.04275, and the lift-to-drag ratio is 8.11087 when the attack angle is $2.5^{\circ}$.

VoIP-Based Voice Secure Telecommunication Using Speaker Authentication in Telematics Environments (텔레매틱스 환경에서 화자인증을 이용한 VoIP기반 음성 보안통신)

  • Kim, Hyoung-Gook;Shin, Dong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.1
    • /
    • pp.84-90
    • /
    • 2011
  • In this paper, a VoIP-based voice secure telecommunication technology using the text-independent speaker authentication in the telematics environments is proposed. For the secure telecommunication, the sender's voice packets are encrypted by the public-key generated from the speaker's voice information and submitted to the receiver. It is constructed to resist against the man-in-the middle attack. At the receiver side, voice features extracted from the received voice packets are compared with the reference voice-key received from the sender side for the speaker authentication. To improve the accuracy of text-independent speaker authentication, Gaussian Mixture Model(GMM)-supervectors are applied to Support Vector Machine (SVM) kernel using Bayesian information criterion (BIC) and Mahalanobis distance (MD).

Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier

  • Lee, Jinlee;Park, Dooho;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5132-5148
    • /
    • 2017
  • Cyber attacks are evolving commensurate with recent developments in information security technology. Intrusion detection systems collect various types of data from computers and networks to detect security threats and analyze the attack information. The large amount of data examined make the large number of computations and low detection rates problematic. Feature selection is expected to improve the classification performance and provide faster and more cost-effective results. Despite the various feature selection studies conducted for intrusion detection systems, it is difficult to automate feature selection because it is based on the knowledge of security experts. This paper proposes a feature selection technique to overcome the performance problems of intrusion detection systems. Focusing on feature selection, the first phase of the proposed system aims at constructing a feature subset using a sequential forward floating search (SFFS) to downsize the dimension of the variables. The second phase constructs a classification model with the selected feature subset using a random forest classifier (RFC) and evaluates the classification accuracy. Experiments were conducted with the NSL-KDD dataset using SFFS-RF, and the results indicated that feature selection techniques are a necessary preprocessing step to improve the overall system performance in systems that handle large datasets. They also verified that SFFS-RF could be used for data classification. In conclusion, SFFS-RF could be the key to improving the classification model performance in machine learning.

Effect of Shock Waves on Dynamic Stability of Transonic Missiles (천음속 미사일의 동안정성에 대한 충격파 영향)

  • Park, Su-Hyeong;Gwon, Jang-Hyeok;Heo, Gi-Hun;Byeon, U-Sik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.2
    • /
    • pp.12-20
    • /
    • 2002
  • Three dimentional unsteady Euler equations are solved and an integration method is presented to predict the dynamic stability derivatives of transonic missiles. Results for the Basic Finner model are compared with several experimental data to vaildate the prediction capability of the present method. The variations of dynamic stability derivatives are discussed with respect to angle of attack, Mach number, and rotation rate. Results show that shock waves between fins enhance the pitch-damping characteristics in transonic region. Results also imply that the Euler equations can give the damping coefficients with comparable accuracy.