• 제목/요약/키워드: Convergence pattern

검색결과 1,021건 처리시간 0.027초

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • 제8권3호
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF

Address Permutation for Privacy-Preserving Searchable Symmetric Encryption

  • Choi, Dae-Seon;Kim, Seung-Hyun;Lee, Youn-Ho
    • ETRI Journal
    • /
    • 제34권1호
    • /
    • pp.66-75
    • /
    • 2012
  • This paper proposes a privacy-preserving database encryption scheme that provides access pattern hiding against a service provider. The proposed scheme uses a session key to permute indices of database records each time they are accessed. The proposed scheme can achieve access pattern hiding in situations in which an adversary cannot access the inside of the database directly, by separating the entity with an index table and data table and permuting both the index and position where the data are stored. Moreover, it is very efficient since only O(1) server computation and communication cost are required in terms of the number of the data stored. It can be applied to cloud computing, where the intermediate entities such as cloud computing service provider can violate the privacy of users or patients.

A Study on Pattern Recognition Technology for Inspection Automation of Manufacturing Process based Smart Camera (스마트카메라를 이용한 생산공정의 검사자동화를 위한 패턴인식기술에 관한 연구)

  • Shin, Heang-Bong;Sim, Hyun-Suk;Kang, Un-Wook
    • Journal of the Korean Society of Industry Convergence
    • /
    • 제18권4호
    • /
    • pp.241-249
    • /
    • 2015
  • The purpose of this research is to develop the pattern recognition algorithm based on smart camera for inspection automation, and including external surface state of molding parts or optical parts. By performance verification, this development can be applied to establish for existing reflex data because inputting surface badness degree of scratch's standard specification condition directly. And it is pdssible to distinguish from schedule error of badness product and normalcy product within schedule extent after calculating the error comparing actuality measurement reflex data and standard reflex data mutually. The proposed technology cab be applied to test for masearing of the smallest 10 pixel unit. It is illustrated the relibility pf proposed technology by an experiment.

A Study on the Use of Genitive Particle '의': Focusing on the analysis of Korean Learners Corpus (한국어 학습자의 관형격 조사 '의' 사용 양상 연구: 학습자 말뭉치 분석을 중심으로)

  • Ji-Young Sim;Soo-Hyun Lee
    • Journal of the Korean Society of Industry Convergence
    • /
    • 제26권3호
    • /
    • pp.433-442
    • /
    • 2023
  • The purpose of this study is to reveal the Korean learners' usage pattern of '의', the genitive particle, according to semantic classification, so that it can be referred to in determining the contents and methods of related education. The method of this study adopts a quantitative analysis using learners corpus established by National Institute of Korean Language. As a result of the analysis, as proficiency increases, the overall frequency of '의' increases and the number of meaning senses used increases. However, the frequency of errors also increases with it. As for the usage pattern of each sense, the meaning of 'ownership, belonging' is the most frequent, and followed by 'acting entity', 'kinship, social relations', and 'relationship(area)'. In conclusion, the meanings of 'acting subjects' and 'relationships(area) need to be supplemented with explicit education. Other meanings need to be discussed, and decisions should be made in consideration of learning purpose and proficiency.

GLOBAL CONVERGENCE PROPERTIES OF THE MODIFIED BFGS METHOD ASSOCIATING WITH GENERAL LINE SEARCH MODEL

  • Liu, Jian-Guo;Guo, Qiang
    • Journal of applied mathematics & informatics
    • /
    • 제16권1_2호
    • /
    • pp.195-205
    • /
    • 2004
  • To the unconstrained programme of non-convex function, this article give a modified BFGS algorithm. The idea of the algorithm is to modify the approximate Hessian matrix for obtaining the descent direction and guaranteeing the efficacious of the quasi-Newton iteration pattern. We prove the global convergence properties of the algorithm associating with the general form of line search, and prove the quadratic convergence rate of the algorithm under some conditions.

Design of Layered Software Architecture Based on ROS That Reflects the Requirements of Underwater Robot Software System (수중로봇 소프트웨어 시스템의 요구사항을 반영한 ROS 기반의 계층화된 소프트웨어 아키텍처의 설계)

  • Lee, Jung-Woo;Choi, Young-Ho;Lee, Jong-Deuk;Yun, Sung-Jo;Suh, Jin-Ho
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • 제12권5호
    • /
    • pp.303-310
    • /
    • 2017
  • Underwater robots operating in constrained underwater environment have requirements for software systems. Firstly, it is necessary to provide reusable common software components for hardware interface of sensors and actuators that are frequently used in underwater robots. Secondly, it is required to support distributed execution environment on multiple embedded controllers. Thirdly, it is need to implement a monitoring system capable of high-speed and large-data transmission for underwater robots operating in an environment where it is difficult to check the robot status. For these requirements, we have designed the layered architecture pattern and applied several design patterns to enhance the reusability and the maintainability of software components, In addition, we overlaid the broker architecture pattern to support distributed execution environments. Finally, we implemented the underwater robot software system using ROS framework based on the software architecture design. In order to evaluate the performance of the implemented software system, we performed an experiment to measure the response time between components and the transmission rate of the monitoring data, and obtained the results satisfying the required performance.

A Study on Channel Equalization for Asynchronous DS-CDMA Systems (비동기 DS-CDMA 시스템에서 채널 등화에 관한 연구)

  • 민장기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제25권10B호
    • /
    • pp.1760-1768
    • /
    • 2000
  • Blind Equalization Method without training sequences is proposed for channel efficiency in mobile communication system for asynchronous multi-user DS-CDMA. the risk of mis-convergence of weak-power users is increased because of small regions of convergence in case of near-far effect in CMA(Constant Modulus Algorithm) which is the simplest has high performance and widely implemented. In despite the problem a equalization using Newton method has higher performance than a conventional method in squared error and eye-pattern.

  • PDF

An Exploratory Study on Smart-Phone and Service Convergence (스마트폰과 서비스 컨버전스에 대한 탐색적 연구)

  • Rho, Mi-Jung;Kim, Jin-Hwa;Lee, Jae-Beom
    • The Journal of Society for e-Business Studies
    • /
    • 제15권4호
    • /
    • pp.59-77
    • /
    • 2010
  • The purpose of this study is to examine the relationship between the smart-phone and the existing service convergence to find out the future direction in convergence pattern in e-business. To analyze the data and to derive the result, the association rules are applied. As a result, the findings are as followings. Firstly, it is observed that the usage patterns of smart-phone and the existing service convergence are very similar. This means that the convergence of smart-phone can be predicted through the usage pattern of the existing users. Secondly, through the analysis on the convergence patterns of smart-phone usages and the existing services, the smart-phone's link to home networking and office equipments can significantly conform to the user's requirements. It is meaningful that this research has newly approached to the future direction of e-business and the future convergence paradigm by analyzing the relationship between the usage patterns of smart-phone users and the existing service convergence.

Analyzing Technology-Service Convergence Using Smartphone Application Services (스마트폰 애플리케이션 서비스의 기술-서비스 융합 양상 분석)

  • Geum, Youngjung;Min, Hyejong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • 제42권1호
    • /
    • pp.1-19
    • /
    • 2016
  • Recently, the emergence of smartphone foster the technological convergence. This convergence no longer takes place within technologies only. Rather, convergence phenomena happen as a form of embodied services. However, previous research on convergence has been subject to the technology-oriented studies, including suggesting patent-based indexes or analyzing technological characteristics. However, investigating technology-service convergence is critical since most of new smart services are technology-based convergence services. Therefore, we analyze the pattern of technology-service convergence which occurs in the smartphone application services. We divided the smatphone application services into four categories, and employ a network analysis to represent the convergence phenomena of each category. Our study is expected to provide meaningful implication in new service development practice.

Hash-based Pattern Matching System for Detection Performance (침입탐지시스템 탐지성능 향상 위한 해시기반 패턴 매칭 시스템)

  • Kim, Byung-Hoon;Ha, Ok-Hyun;Shin, Jae-Chul
    • Convergence Security Journal
    • /
    • 제9권4호
    • /
    • pp.21-27
    • /
    • 2009
  • In the environment of development of network bandwidth and intrusion technology there is limit to the pattern analysis of all massed packets through the existing pattern matching method by the intrusion detection system. To detect the packets efficiently when they are received fragmented, it has been presented the matching method only the pattern of packets consisting with the operation system such as Esnort. Pattern matching performance is improved through the use of NMAP, the basic mechanism od Esnort, by scanning the operation system of the same network system and appling pattern match selectively scanned information and the same operation system as the received packets. However, it can be appeared the case of disregarding the receivied packets depending on the diversity of the kind of operation systems and recognition mistake of operation system of nmap. In this paper, we present and verify the improved intrusion detection system shortening the pattern matching time by the creation of hashy table through the pattern hash of intrusion detection system independently with the users system environment .in the state of flux.

  • PDF