• Title/Summary/Keyword: Bypass Algorithm

Search Result 50, Processing Time 0.034 seconds

Ship Pipe Layout Optimization using Genetic Algorithm (유전자 알고리듬을 이용한 선박용 파이프 경로 최적화)

  • Park, Cheol-Woo;Cheon, Ho-Jeong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.29 no.4
    • /
    • pp.469-478
    • /
    • 2012
  • This study aims to discover the optimal pipe layout for a ship, which generally needs a lot of time, efforts and experiences. Genetic algorithm was utilized to search for the optimum. Here the optimum stands for the minimum pipe length between two given points. Genetic algorithm is applied to planar pipe layout problems to confirm plausible and efficiency. Sub-programs are written to find optimal layout for the problems. Obstacles are laid in between the starting point and the terminal point. Pipe is supposed to bypass those obstacles. Optimal layout between the specified two points can be found using the genetic algorithm. Each route was searched for three case models in two-dimensional plane. In consequence of this, it discovered the optimum route with the minimized distance in three case models. Through this study, it is possible to apply optimization of ship pipe route to an actual ship using genetic algorithm.

Detection of Malicious PDF based on Document Structure Features and Stream Objects

  • Kang, Ah Reum;Jeong, Young-Seob;Kim, Se Lyeong;Kim, Jonghyun;Woo, Jiyoung;Choi, Sunoh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.85-93
    • /
    • 2018
  • In recent years, there has been an increasing number of ways to distribute document-based malicious code using vulnerabilities in document files. Because document type malware is not an executable file itself, it is easy to bypass existing security programs, so research on a model to detect it is necessary. In this study, we extract main features from the document structure and the JavaScript contained in the stream object In addition, when JavaScript is inserted, keywords with high occurrence frequency in malicious code such as function name, reserved word and the readable string in the script are extracted. Then, we generate a machine learning model that can distinguish between normal and malicious. In order to make it difficult to bypass, we try to achieve good performance in a black box type algorithm. For an experiment, a large amount of documents compared to previous studies is analyzed. Experimental results show 98.9% detection rate from three different type algorithms. SVM, which is a black box type algorithm and makes obfuscation difficult, shows much higher performance than in previous studies.

Improved Model for Maximum Power Point Tracking (MPPT) of Solar System (태양광 시스템의 최대 전력지점 추적(MPPT) 정확도 향상을 위한 모델링)

  • Lee, YoungHyun;Lee, Jonghwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.1
    • /
    • pp.114-118
    • /
    • 2022
  • The photovoltaic system is affected by various conditions such as temperature and irradiance. Because non-uniform irradiation and partial shading conditions affect the entire string of cells connected in series, a bypass diode is used to bypass the current flow normally. In order to find the maximum power point in partial shade conditions, it is necessary to estimate various methods of maximum power point tracking. In this paper, the hybrid method of MPPT using Lambert W function and perturbation & observation algorithm is proposed under partial shading conditions. The simulation results are obtained using MATLAB/Simulink and shows the improvement of the accuracy of MPPT.

Performance Analysis of Mode Switching Scheme for Reduction of Phase Distortion in GPS Anti-jamming Equipment Based on STAP Algorithm

  • Jung, Junwoo;Yang, Gi-Jung;Park, Sungyeol;Kang, Haengik;Kwon, Seungbok;Kim, Kap Jin
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.8 no.3
    • /
    • pp.95-105
    • /
    • 2019
  • A method that applies space-time adaptive signal processing (STAP) algorithm based on an array antenna consisting of multiple antenna elements has been known to be effective to remove wide-band jamming signals in GPS receivers. However, the occurrence of phase distortion in navigation signals has been a problem when navigation signals, from which jamming signals are removed using STAP, are supplied to global positioning system (GPS) receivers. This paper verified the navigation performance degradation as a result of phase distortion. To mitigate this phenomenon, this paper proposes a mode switching scheme, in which a bypass mode is adopted to make the best use of the tracking performance of receivers without performing signal processing when jamming signals are not present or weak, and a STAP mode is employed when jamming signals exceed the threshold value. In this paper, the mode switching scheme is proposed for two environments: when receivers are stationary, and when receivers are moving. This paper confirmed that the performance of position error improved because phase distortion could be excluded due to STAP if the bypass mode was adopted under a condition where the jamming signal power level was below the threshold value in an environment where receivers were stationary. However, this paper also observed that the navigation failed due to the instability of tracking performance of receivers due to phase distortion that occurred at the switching time, although the number of switching could be reduced dramatically by proposing a dual threshold scheme of on- and off-thresholds that switched a mode due to the array antenna characteristics of varying gains according to the jamming signal incident direction in an environment where receivers were moving. The analysis results verified that running the STAP algorithm at all times is more efficient than the mode switching, in terms of maintaining stable navigation and ensuring position error performance, to remove jamming signals in an environment where receivers were moving.

Global Path Planning for an Autonomous Underwater Vehicle in a Vortical Current Field by Using Genetic Algorithm (유전자 알고리즘을 이용한 무인잠수정의 와조류장에서의 전역경로계획)

  • Lee, Ki-Young;Kim, Subum;Song, Chan-Hee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.473-480
    • /
    • 2013
  • The purpose of this paper is to demonstrate that the genetic algorithm can be useful for the global path planning when the obstacles and current field data are given. In particular, the possibilities for a novel type small AUV mission deployment in tidal regions, which experience vortical currents, were examined. Experimental simulations show feasibility and effective in generate the global path regardless of current and obstacles. By choosing an appropriate path in space, an AUV may both bypass adverse currents which are too fast to be overcome by the vehicle's motor and also exploit favorable currents to achieve far greater speeds than motors could otherwise provide, while substantially saving energy.

Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin (VMProtect의 역공학 방해 기능 분석 및 Pin을 이용한 우회 방안)

  • Park, Seongwoo;Park, Yongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.297-304
    • /
    • 2021
  • Commercial obfuscation tools (protectors) aim to create difficulties in analyzing the operation process of software by applying obfuscation techniques and Anti-reversing techniques that delay and interrupt the analysis of programs in software reverse engineering process. In particular, in case of virtualization detection and anti-debugging functions, the analysis tool exits the normal execution flow and terminates the program. In this paper, we analyze Anti-reversing techniques of executables with Debugger Detection and Viralization Tools Detection options through VMProtect 3.5.0, one of the commercial obfuscation tools (protector), and address bypass methods using Pin. In addition, we predicted the location of the applied obfuscation technique by finding out a specific program termination routine through API analysis since there is a problem that the program is terminated by the Anti-VM technology and the Anti-DBI technology and drew up the algorithm flowchart for bypassing the Anti-reversing techniques. Considering compatibility problems and changes in techniques from differences in versions of the software used in experiment, it was confirmed that the bypass was successful by writing the pin automation bypass code in the latest version of the software (VMProtect, Windows, Pin) and conducting the experiment. By improving the proposed analysis method, it is possible to analyze the Anti-reversing method of the obfuscation tool for which the method is not presented so far and find a bypass method.

Endoscopic ultrasound-directed transgastric endoscopic retrograde cholangiopancreatography for patients with Roux-en-Y gastric bypass anatomy: technical overview

  • Hirokazu Honda;Jeffrey D. Mosko;Ryosuke Kobayashi;Andras Fecso;Bong Sik Kim;Schoeman Scott;Gary R. May
    • Clinical Endoscopy
    • /
    • v.55 no.6
    • /
    • pp.736-741
    • /
    • 2022
  • Endoscopic retrograde cholangiopancreatography (ERCP) in patients with Roux-en-Y gastric bypass anatomy is a well-documented challenge. Traditionally, this problem has been overcome with adjunctive techniques, such as device-assisted ERCP, including double-balloon or single-balloon enteroscopy and laparoscopy-assisted transgastric ERCP. Endoscopic ultrasound-directed transgastric ERCP (EDGE) is a novel technique that enables access to the ampulla using a duodenoscope without surgical intervention and has shown high clinical and technical success rates in recent studies. However, this approach is technically demanding, necessitating a thorough understanding of the gastrointestinal anatomy as well as high operator experience. In this review, we provide a technical overview of EDGE in parallel with our personal experience at our center and propose a simple algorithm to select patients for its appropriate application. In conjunction, the outcomes of EDGE compared with those of device-assisted and laparoscopy-assisted transgastric ERCP will be discussed.

Route Exploration Algorithm for Emergency Rescue Support on Urgent Disaster (긴급 재해 발생 시 피난 지원을 위한 탈출 경로 탐색 알고리즘)

  • Hwang, Jun-Su;Choi, Young-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.12-21
    • /
    • 2016
  • The emergency evacuation support system supports evacuation assistance when an urgent disaster occurs. We have implemented evacuation route search algorithm to assist people's escape when a disaster occurs such as fires or terrorism in the building. The algorithm will guide the escape route at the fastest emergency exit of each region at the emergency state. The algorithm calculates the escape route by applying the weighting factor of age groups and population density around the emergency exit and of other regions. So the system helps escape to bypass the crowded emergency exit and the disaster area, and reduces the congestion of emergency exit and overloading of evacuation route.

Operation modes and Protection of VS(Vertical Stabilization) Converter for International Thermonuclear Experimental Reactor (국제 핵융합실험로용 VS(Vertical Stabilization) 컨버터의 운전모드 및 보호동작)

  • Jo, Hyunsik;Jo, Jongmin;Oh, Jong-Seok;Suh, Jae-Hak;Cha, Hanju
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.20 no.2
    • /
    • pp.130-136
    • /
    • 2015
  • This study describes the structure and operation modes of vertical stabilization (VS) converter for international thermonuclear experimental reactor (ITER) and proposes a protection method. ITER VS converter supplies voltage (${\pm}1000V$)/current (${\pm}22.5kA$) to superconducting magnets for plasma current vertical stabilization. A four-quadrant operation must be achieved without zero-current discontinuous section. The operation mode of the VS converter is separated in 12-pulse mode, 6-pulse mode and circulation current mode according to the magnitude of the load current. Protection measures, such as bypass and discharge, are proposed for abnormal conditions, such as over current, over voltage, short circuit, and voltage sag. VS converter output voltage is controlled to satisfy voltage response time within 20 msec. Bypass operation is completed within 60 msec and discharge operation is performed successfully. The feasibility of the proposed control algorithm and protection measure is verified by assembling a real controller and implementing a power system including the VS converter in RTDS for a hardware-in-loop (HIL) facility.

Performance Evaluation of a Thrust Reverser Using an Euler Solver (비장착 나셀의 역추력기 형상에 대한 3차원 Euler 유동해석)

  • Kim Soo Mi;Yang Soo Seok;Lee Dae Sung
    • 한국전산유체공학회:학술대회논문집
    • /
    • 1999.11a
    • /
    • pp.167-173
    • /
    • 1999
  • An Euler-based CFD tool has been developed for the performance evaluation of a thrust reverser mounted on a high bypass ratio turbofan engine. The computational domain surrounded by the ground and non-reflection boundary includes the whole nacelle configuration with a deployed thrust reverser. The numerical algorithm is based on the modified Godunovs scheme to allow the second order accuracy in both space and time. The grid system is generated by using eleven multi-blocks, of which the total cell number is 148,400. The thrust reverser is modeled as if it locates at the nacelle simply in all circumferential direction. The existence of a fan and an OGV(Outlet Guide Vane) is simulated by adopting the actuator disk concept, in which predetermined radial distributions of stagnation pressure ratio and adiabatic efficiency coefficient are used for the rotor type disk, and stagnation pressure losses and flow outlet angles for the stator type disk. All boundary conditions including the fan and OGV simulation are treated by Riemann solver. The developed solver is applied to a turbofan engine with a bypass ratio of about 5.7 and the diameter of the fan cowl of 83 inch. The computational results show that the Euler-based inviscid method is very useful and economical to evaluate the performance of thrust reversers.

  • PDF