• Title/Summary/Keyword: Detection Mechanism

Search Result 844, Processing Time 0.024 seconds

Fault Detection Algorithm of Photovoltaic Power Systems using Stochastic Decision Making Approach (확률론적 의사결정기법을 이용한 태양광 발전 시스템의 고장검출 알고리즘)

  • Cho, Hyun-Cheol;Lee, Kwan-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.3
    • /
    • pp.212-216
    • /
    • 2011
  • Fault detection technique for photovoltaic power systems is significant to dramatically reduce economic damage in industrial fields. This paper presents a novel fault detection approach using Fourier neural networks and stochastic decision making strategy for photovoltaic systems. We achieve neural modeling to represent its nonlinear dynamic behaviors through a gradient descent based learning algorithm. Next, a general likelihood ratio test (GLRT) is derived for constructing a decision malling mechanism in stochastic fault detection. A testbed of photovoltaic power systems is established to conduct real-time experiments in which the DC power line communication (DPLC) technique is employed to transfer data sets measured from the photovoltaic panels to PC systems. We demonstrate our proposed fault detection methodology is reliable and practicable over this real-time experiment.

A light-adaptive CMOS vision chip for edge detection using saturating resistive network (포화 저항망을 이용한 광적응 윤곽 검출용 시각칩)

  • Kong, Jae-Sung;Suh, Sung-Ho;Kim, Jung-Hwan;Shin, Jang-Kyoo;Lee, Min-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.430-437
    • /
    • 2005
  • In this paper, we proposed a biologically inspired light-adaptive edge detection circuit based on the human retina. A saturating resistive network was suggested for light adaptation and simulated by using HSPICE. The light adaptation mechanism of the edge detection circuit was quantitatively analyzed by using a simple model of the saturating resistive element. A light-adaptive capability of the edge detection circuit was confirmed by using the one-dimensional array of the 128 pixels with various levels of input light intensity. Experimental data of the saturating resistive element was compared with the simulated results. The entire capability of the edge detection circuit, implemented with the saturating resistive network, was investigated through the two-dimensional array of the $64{\times}64$ pixels

Optoelectronic Mixing Detection for the Extension of Useable Frequency Range in the Radio over Fiber Network (무선광네트웍(RoF)의 가용 주파수 대역 확장을 위한 광전믹싱 광검파)

  • Choi, Young-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2189-2196
    • /
    • 2009
  • Theoretical analysis is presented for expending of the usable frequency range of optoelectronic mixing detection in the radio over fiber network system. We define the normalized gain to evaluate the performance of the optical mixing detection, and conform the possibilities of detection for the high frequency signals beyond the cutoff frequency of a photodiode. Optical mixing detection mechanism is analyzed by solving the continuity equation for the carriers of a photodiode. The normalized gain is independent on the signal frequency and the frequency difference between the optical signal and the local signal. Also, the amplitude of the local signal and the bias voltage are needed to be optimized at the same time in order to maximize the normalized gain.

Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices (안드로이드 모바일 단말에서의 실시간 이벤트 유사도 기반 트로이 목마 형태의 악성 앱 판별 메커니즘)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.31-43
    • /
    • 2014
  • Large number of Android mobile application has been developed and deployed through the Android open market by increasing android-based smart work device users recently. But, it has been discovered security vulnerabilities on malicious applications that are developed and deployed through the open market or 3rd party market. There are issues to leak user's personal and financial information in mobile devices to external server without the user's knowledge in most of malicious application inserted Trojan Horse forms of malicious code. Therefore, in order to minimize the damage caused by malignant constantly increasing malicious application, it is required a proactive detection mechanism development. In this paper, we analyzed the existing techniques' Pros and Cons to detect a malicious application and proposed discrimination and detection result using malicious application discrimination mechanism based on Jaccard similarity after collecting events occur in real-time execution on android-mobile devices.

Applying tilt mechanism for high-resolution image acquisition (고해상도 영상 획득을 위한 틸트 메커니즘 적용 기법)

  • Song, Chun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.31-37
    • /
    • 2014
  • In this paper, to compensate the degraded performance in high-resolution infrared sensor due to assembling error, the influence of each component was evaluated through the sensitivity analysis of lens assembly, axis mirror, and detector and also suggested detector tilt mechanism for compensation. 3 detector tilt mechanisms were investigated. The first one is 'Shim plate' method which is applying shim on installing plane. The second one is 'Tilting screw' method that is using tilt screw for adjusting detection plane. The last one is 'Micrometer head' method that is installing micrometer on detection plane and acquiring quantitative data. Based on the investigation result, 'Tilting screw' method was applied due to ease of user control, small volume, and real-time controllability, thereby we could acquire high-resolution infrared images. The research result shows that the tilting mechanism is necessary technology for the implementation of high-resolution infrared imaging system.

MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network (Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.85-96
    • /
    • 2008
  • An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.

  • PDF

Proposition for Retina Model Based on Electrophysiological Mechanism and Analysis for Spatiotemporal Response (전기생리학적 기전에 근거한 망막 모델의 제안과 시공간적 응답의 분석)

  • Lee, Jeong-Woo;Chae, Seung-Pyo;Cho, Jin-Ho;Kim, Myoung-Nam
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.39 no.6
    • /
    • pp.49-58
    • /
    • 2002
  • Based on electrophysiological retina mechanism, a retina model is proposed, which has similar response characteristics compared with the real primate retina. Photoreceptors, horizontal cells, and bipolar cells are modeled based on the previously studied retina models. And amacrine cells known to have relation to movements detection, and bipolar cell terminals are newly modeled using 3 NDP mechanism. The proposed model verified by analyzing the spatial response characteristics to stationary and moving stimuli, and characteristics for different speeds. Through this retina model, human vision system could be applied to computer vision systems for movement detection, and it could be the basic research for the implantable artificial retina.

Detection Mechanism against Code Re-use Attack in Stack region (스택 영역에서의 코드 재사용 공격 탐지 메커니즘)

  • Kim, Ju-Hyuk;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3121-3131
    • /
    • 2014
  • Vulnerabilities related to memory have been known as major threats to the security of a computer system. Actually, the number of attacks using memory vulnerability has been increased. Accordingly, various memory protection mechanisms have been studied and implemented on operating system while new attack techniques bypassing the protection systems have been developed. Especially, buffer overflow attacks have been developed as Return-Oriented Programing(ROP) and Jump-Oriented Programming(JOP) called Code Re-used attack to bypass the memory protection mechanism. Thus, in this paper, I analyzed code re-use attack techniques emerged recently among attacks related to memory, as well as analyzed various detection mechanisms proposed previously. Based on the results of the analyses, a mechanism that could detect various code re-use attacks on a binary level was proposed. In addition, it was verified through experiments that the proposed mechanism could detect code re-use attacks effectively.

Determination Method of TTL for Improving Energy Efficiency of Wormhole Attack Defense Mechanism in WSN (무선 센서 네트워크에서 웜홀 공격 방어기법의 에너지 효율향상을 위한 TTL 결정 기법)

  • Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.149-155
    • /
    • 2009
  • Attacks in wireless sensor networks (WSN), are similar to the attacks in ad-hoc networks because there are deployed on a wireless environment. However existing security mechanism cannot apply to WSN, because it has limited resource and hostile environment. One of the typical attack in WSN is setting up wrong route that using wormhole. To overcome this threat, Ji-Hoon Yun et al. proposed WODEM (WOrmhole attack DEfense Mechanism) which can detect and counter with wormhole. In this scheme, it can detect and counter with wormhole attacks by comparing hop count and initial TTL (Time To Live) which is pre-defined. The selection of a initial TTL is important since it can provide a tradeoff between detection ability ratio and energy consumption. In this paper, we proposed a fuzzy rule-based system for TTL determination that can conserve energy, while it provides sufficient detection ratio in wormhole attack.

Android based Mobile Device Rooting Attack Detection and Response Mechanism using Events Extracted from Daemon Processes (안드로이드 기반 모바일 단말 루팅 공격에 대한 이벤트 추출 기반 대응 기법)

  • Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.479-490
    • /
    • 2013
  • Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note and Galaxy Tab 10.1. The malicious application can be distributed to currently used mobile devices through open market masquerading as an normal application. An attacker inserts malicious code into an application, which might threaten privacy by rooting attack. Once the rooting attack is successful, malicious code can collect and steal private data stored in mobile terminal, for example, SMS messages, contacts list, and public key certificate for banking. To protect the private information from the malicious attack, malicious code detection, rooting attack detection and countermeasure method are required. To meet this end, this paper investigates rooting attack mechanism for Android-platform mobile terminal. Based on that, this paper proposes countermeasure system that enables to extract and collect events related to attacks occurring from mobile terminal, which contributes to active protection from malicious attacks.