• 제목/요약/키워드: Detection Mechanism

검색결과 855건 처리시간 0.031초

미소경 드릴링 머신의 시작과 감시에 관한 연구 (A Study on the Development and the Monitoring of Micro Hole Drilling Machine)

  • 백인환;정우섭
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제18권4호
    • /
    • pp.62-68
    • /
    • 1994
  • Recently, the trends toward reduction in size and weight of industrial products increased the application of micro hole for manufacturing gadgets of high precision and gave rise to a great deal of interest for micro hole drilling M/C. Quite a few research work is performed on micro drilling on domestic basis compared with the tendency of analyzing cutting mechanism, adaptive control, monitoring of generally available drills of diameter greater than 1mm. This study adresses the design, manufacturing and controlling a micro hole drilling M/C with the overload detection instrument and the step feed mechanism. Controlling and monitoring of the drilling process are acomplished on PC basis for more user interfaces and effectiveness. The test machine of the results of this research shows a good foundation for extending further micro hole machining technique.

  • PDF

Structural damage detection based on Chaotic Artificial Bee Colony algorithm

  • Xu, H.J.;Ding, Z.H.;Lu, Z.R.;Liu, J.K.
    • Structural Engineering and Mechanics
    • /
    • 제55권6호
    • /
    • pp.1223-1239
    • /
    • 2015
  • A method for structural damage identification based on Chaotic Artificial Bee Colony (CABC) algorithm is presented. ABC is a heuristic algorithm with simple structure, ease of implementation, good robustness but with slow convergence rate. To overcome the shortcoming, the tournament selection mechanism is chosen instead of the roulette mechanism and chaotic search mechanism is also introduced. Residuals of natural frequencies and modal assurance criteria (MAC) are used to establish the objective function, ABC and CABC are utilized to solve the optimization problem. Two numerical examples are studied to investigate the efficiency and correctness of the proposed method. The simulation results show that the CABC algorithm can identify the local damage better compared with ABC and other evolutionary algorithms, even with noise corruption.

Reversible Data Hiding Algorithm Based on Pixel Value Ordering and Edge Detection Mechanism

  • Nguyen, Thai-Son;Tram, Hoang-Nam;Vo, Phuoc-Hung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3406-3418
    • /
    • 2022
  • Reversible data hiding is an algorithm that has ability to extract the secret data and to restore the marked image to its original version after data extracting. However, some previous schemes offered the low image quality of marked images. To solve this shortcoming, a new reversible data hiding scheme based on pixel value ordering and edge detection mechanism is proposed. In our proposed scheme, the edge image is constructed to divide all pixels into the smooth regions and rough regions. Then, the pixels in the smooth regions are separated into non overlapping blocks. Then, by taking advantages of the high correlation of current pixels and their adjacent pixels in the smooth regions, PVO algorithm is applied for embedding secret data to maintain the minimum distortion. The experimental results showed that our proposed scheme obtained the larger embedding capacity. Moreover, the greater image quality of marked images are achieved by the proposed scheme than that other previous schemes while the high EC is embedded.

경량화 에이전트를 이용한 확장성 있는 분산 웜 탐지 및 방지 모델 (A Scalable Distributed Worm Detection and Prevention Model using Lightweight Agent)

  • 박연희;김종욱;이성욱;김철민;우즈만;홍만표
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권5호
    • /
    • pp.517-521
    • /
    • 2008
  • 웜은 사람의 개입 없이 취약점이 존재하는 네트워크 서비스에 대한 공격을 시행하고 사용자가 원치 않는 패킷을 복사 및 전파하는 악성코드이다. 기존의 웜 탐지 기법은 주로 시그너쳐 기반의 방식이 주를 이루었으나 조기탐지의 한계로 인해 최근에는 웜 전파의 행동 특성을 감지하는 방식이 각광 받고 있다. 본 논문에서는 웜 행동 주기와 감염 체인으로 대표되는 웜의 행위적 특성을 탐지하고 대응할 수 있는 분산 웜 탐지 및 방지 방법을 제안하고, 제안된 탐지 및 방지 모델 적용 시 웜의 감염 속도가 감소되는 현상을 시뮬레이션을 통해 증명한다. 제안하는 웜 탐지모델은 규모가 큰 시그너쳐 데이타베이스가 필요하지 않을 뿐더러 컴퓨팅 파워가 비교적 적게 소요되므로, 개인용 컴퓨터 뿐 아니라 유비쿼터스와 모바일 환경과 같이 개별 기기가 낮은 컴퓨팅 파워를 가지는 상황에도 적합하다.

Label-free Femtomolar Detection of Cancer Biomarker by Reduced Graphene Oxide Field-effect Transistor

  • Kim, Duck-Jin;Sohn, Il-Yung;Jung, Jin-Heak;Yoon, Ok-Ja;Lee, N.E.;Park, Joon-Shik
    • 한국진공학회:학술대회논문집
    • /
    • 한국진공학회 2012년도 제42회 동계 정기 학술대회 초록집
    • /
    • pp.549-549
    • /
    • 2012
  • Early detection of cancer biomarkers in the blood is of vital importance for reducing the mortality and morbidity in a number of cancers. From this point of view, immunosensors based on nanowire (NW) and carbon nanotube (CNT) field-effect transistors (FETs) that allow the ultra-sensitive, highly specific, and label-free electrical detection of biomarkers received much attention. Nevertheless 1D nano-FET biosensors showed high performance, several challenges remain to be resolved for the uncomplicated, reproducible, low-cost and high-throughput nanofabrication. Recently, two-dimensional (2D) graphene and reduced GO (RGO) nanosheets or films find widespread applications such as clean energy storage and conversion devices, optical detector, field-effect transistors, electromechanical resonators, and chemical & biological sensors. In particular, the graphene- and RGO-FETs devices are very promising for sensing applications because of advantages including large detection area, low noise level in solution, ease of fabrication, and the high sensitivity to ions and biomolecules comparable to 1D nano-FETs. Even though a limited number of biosensor applications including chemical vapor deposition (CVD) grown graphene film for DNA detection, single-layer graphene for protein detection and single-layer graphene or solution-processed RGO film for cell monitoring have been reported, development of facile fabrication methods and full understanding of sensing mechanism are still lacking. Furthermore, there have been no reports on demonstration of ultrasensitive electrical detection of a cancer biomarker using the graphene- or RGO-FET. Here we describe scalable and facile fabrication of reduced graphene oxide FET (RGO-FET) with the capability of label-free, ultrasensitive electrical detection of a cancer biomarker, prostate specific antigen/${\alpha}$ 1-antichymotrypsin (PSA-ACT) complex, in which the ultrathin RGO channel was formed by a uniform self-assembly of two-dimensional RGO nanosheets, and also we will discuss about the immunosensing mechanism.

  • PDF

실시간 침입탐지를 위한 자기 조직화 지도(SOM)기반 트래픽 속성 상관관계 메커니즘 (Traffic Attributes Correlation Mechanism based on Self-Organizing Maps for Real-Time Intrusion Detection)

  • 황경애;오하영;임지영;채기준;나중찬
    • 정보처리학회논문지C
    • /
    • 제12C권5호
    • /
    • pp.649-658
    • /
    • 2005
  • 네트워크 기반의 공격은 그 위험성과 피해의 규모가 크기 때문에 공격 초기에 빨리 탐지하는 것이 중요하다. 그러나 지도학습 데이터 마이닝을 이용한 네트워크상의 비정상 트래픽을 탐지하는 방법은 방대한 양의 데이터 전처리와 관리자의 분석이 요구되며 관리자의 분석이 정확하다는 보장이 없을 뿐만 아니라 각 네트워크의 실시간 특성을 고려하지 못하기 때문에 탐지의 어려움이 크다. 본 논문에서는 실시간 침입 탐지와 점진적 학습을 위해 비지도학습의 데이터마이닝 기법중 하나인 자기 조직화 지도를 기반으로 트래픽 속성 상관관계 메커니즘을 제안한다. 이는 세 단계로 이루어진다. 첫 번째 단계는 초기 학습이 이루어지는 단계로 비지도 학습을 통하여 성격이 비슷한 트래픽끼리 클러스터링 한 맵을 생성시킨다. 두 번째 단계는 맵의 각 클러스터가 정상과 비정상 트래픽의 클러스터로 구분되기 위해 각 공격별로 추출된 규칙(rule)을 적용하여 맵을 분석한다. 이 규칙은 지도 학습을 통한 규칙 기반의 방법으로, 각 데이터 항목마다 SOM을 이용한 속성별 맵의 상관관계(correlation) 분석을 통해 생성되었다. 마지막으로 분석된 맵을 이용하여 실시간 탐지와 함께 점진적 학습이 이루어지게 된다. 여러 실험을 통하여 비지도 학습과 지도 학습을 결합한 SOM 기반 트래픽 속성 상관관계 메커니즘이 지도 학습에 비해 실시간 탐지에 우수함을 증명하였다.

IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘 (Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4)

  • 김아름;김미희;채기준
    • 정보처리학회논문지C
    • /
    • 제17C권1호
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4 표준기술[1]은 센서 네트워크에서 저전력을 위한 기술로 LR-WPANs(Low Rate-Wireless Personal Area Networks)의 물리 계층과 MAC계층을 규정한다. 이 표준은 무선 센서, 가상 선(Virtual Wire)과 같은 제한된 출력과 성능으로 간단한 단거리 무선 통신을 필요로 하는 폭넓은 응용에 활용되고 있지만 보안 측면의 연구는 현재 미비한 상태로 다양한 공격에 대한 취약점을 내포하고 있다. 본 논문에서는 802.15.4 MAC계층의 슬립거부(Denial of Sleep) 공격에 대한 취약성을 분석하고 이를 탐지하는 메커니즘을 제안한다. 분석 결과, 슈퍼프레임 구간 변경, CW(Contention Window)값 변경, 채널스캔 및 PAN 연합과정 등에서 슬립거부 공격의 가능성을 분석할 수 있었고, 이 과정 중 일부에서는 표준에서 정의한 인증과 암호화 기능이 적용되어도 공격 가능함을 알 수 있었다. 또한 본 논문에서는 분석된 취약점 중에 채널스캔 및 PAN 연합과정에서 Beacon/Association Request 메시지 위조를 통한 슬립거부 공격의 탐지 메커니즘을 제안한다. 제안된 메커니즘은 메시지 요청 간격, 요청 노드 ID, 신호 세기 등을 모니터링하여 공격을 식별하여 탐지한다. QualNet 시뮬레이션 툴을 사용하여 공격의 영향 및 제안된 탐지 메커니즘의 탐지 가능성과 성능의 우수성을 입증할 수 있었다.

Nondestructive Detection of Defect in a Pipe Using Thermography

  • Choi, Hee-Seok;Joung, Ok-Jin;Kim, Young-Han
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1413-1416
    • /
    • 2005
  • An infrared temperature sensor module developed for the detection of defects in a plate was modified to use in a cylinder. A set of optical fiber leads and a mechanism maintaining sensor-object distance constant were utilized for the modification of the IR sensor module. The detection performance was experimentally investigated, and the measured temperature was also compared with computed temperature distribution. The experimental outcome indicates that the detection of a simulated defect is readily available. The temperature distribution is better for defect detection than that with the previous device. In addition, the measured distribution is comparable to the calculated one using a heat conduction equation. The developed device of defect detection is suitable to be utilized in chemical processes where most of vessels and piping systems are in the shape of a cylinder.

  • PDF

원자로 제어봉구동장치 제어시스템의 전력변환기 사이리스터 고장 검출 (Fault Detection for thyristors of Power Converter Module in Control Rod Control System)

  • 김춘경;천종민;이종무;정순현;권순만
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 학술회의 논문집 정보 및 제어부문 B
    • /
    • pp.559-562
    • /
    • 2003
  • In this paper, we introduce a new method detecting thyristor faults of the power converter module in Control Rod Control System. When we control the currents in each coil of Control Rod Drive Mechanism by using the current control method, the current value can follow the current reference despite the faults like the missing phase or the diode acting. Comparing the fault current values with the normal current values, the bad transient characteristics of the abnormal current can make the operations of control rods incorrect. In this case, the information from the current trends cannot be enough to detect the fault occurrence in thyristors. Instead of the coil currents, the state of thyristors can be watched by measuring the coil voltages. In the existing system of Westinghouse type, the ripple detector takes charge of this task. But this detector has some shortcomings in the point of time for fault detection, we come to devise a new fault detection method solving the problems which belong to the ripple detector.

  • PDF

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.