• Title/Summary/Keyword: Detection rule

Search Result 442, Processing Time 0.028 seconds

Edge Detection Verification and Principle analysis about Cellular Automata (셀룰라 오토마타의 원리 분석과 에지 추출 검증)

  • Nam, Tae-Hee
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.1
    • /
    • pp.29-38
    • /
    • 2008
  • This treatise analyzed theoretical principle of Cellular Automata systematically. Specially, Cellular Automata is hinting that can handle function of various form using transition rule. Cellular Automata can embody various and complicated principle with simple identifying marks that is "State", "Neighborhood", "Program Rules". Specially, have eminent cognitive faculty in image processing field. Examined closely that the ability excels flying important Edge Detection in image processing using this Cellular Automata in treatise that see therefore.

  • PDF

Fault Detection and Diagnosis of an Air Handling Unit Based on Rule Bases (룰 베이스를 이용한 공조기의 고장검출 및 진단)

  • 한도영;주명재
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.14 no.7
    • /
    • pp.552-559
    • /
    • 2002
  • The fault detection and diagnosis (FDD) technology may be applied in order to decrease the energy consumption and the maintenance cost of the air conditioning system. In this study, rule bases and curve fitting models were used to detect faults in an air handling unit. Gradually progressed faults, such as the fan speed degradation, the coil water leakage, the humidifier nozzle clogging, the sensor degradation and the damper stoppage, were applied to the developed FBD system. Simulation results show good detections and diagnoses of these faults. Therefore, this method may be effectively used for the fault detection and diagnosis of the air handling unit.

Robust spectrum sensing under noise uncertainty for spectrum sharing

  • Kim, Chang-Joo;Jin, Eun Sook;Cheon, Kyung-yul;Kim, Seon-Hwan
    • ETRI Journal
    • /
    • v.41 no.2
    • /
    • pp.176-183
    • /
    • 2019
  • Spectrum sensing plays an important role in spectrum sharing. Energy detection is generally used because it does not require a priori knowledge of primary user (PU) signals; however, it is sensitive to noise uncertainty. An order statistics (OS) detector provides inherent protection against nonhomogeneous background signals. However, no analysis has been conducted yet to apply OS detection to spectrum sensing in a wireless channel to solve noise uncertainty. In this paper, we propose a robust spectrum sensing scheme based on generalized order statistics (GOS) and analyze the exact false alarm and detection probabilities under noise uncertainty. From the equation of the exact false alarm probability, the threshold value is calculated to maintain a constant false alarm rate. The detection probability is obtained from the calculated threshold under noise uncertainty. As a fusion rule for cooperative spectrum sensing, we adopt an OR rule, that is, a 1-out-of-N rule, and we call the proposed scheme GOS-OR. The analytical results show that the GOS-OR scheme can achieve optimum performance and maintain the desired false alarm rates if the coefficients of the GOS-OR detector can be correctly selected.

Development of an Adaptive Feedback based Actuator Fault Detection and Tolerant Control Algorithms for Longitudinal Autonomous Driving (적응형 되먹임 기반 종방향 자율주행 구동기 고장 탐지 및 허용 제어 알고리즘 개발)

  • Oh, Kwangseok;Lee, Jongmin;Song, Taejun;Oh, Sechan;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.4
    • /
    • pp.13-22
    • /
    • 2020
  • This paper presents an adaptive feedback based actuator fault detection and tolerant control algorithms for longitudinal functional safety of autonomous driving. In order to ensure the functional safety of autonomous vehicles, fault detection and tolerant control algorithms are needed for sensors and actuators used for autonomous driving. In this study, adaptive feedback control algorithm to compute the longitudinal acceleration for autonomous driving has been developed based on relationship function using states. The relationship function has been designed using feedback gains and error states for adaptation rule design. The coefficients in the relationship function have been estimated using recursive least square with multiple forgetting factors. The MIT rule has been adopted to design the adaptation rule for feedback gains online. The stability analysis has been conducted based on Lyapunov direct method. The longitudinal acceleration computed by adaptive control algorithm has been compared to the actual acceleration for fault detection of actuators used for longitudinal autonomous driving.

Design and Implementation of the Intrusion Detection Pattern Algorithm Based on Data Mining (데이터 마이닝 기반 침입탐지 패턴 알고리즘의 설계 및 구현)

  • Lee, Sang-Hoon;Soh, Jin
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.717-726
    • /
    • 2003
  • In this paper, we analyze the associated rule based deductive algorithm which creates the rules automatically for intrusion detection from the vast packet data. Based on the result, we also suggest the deductive algorithm which creates the rules of intrusion pattern fast in order to apply the intrusion detection systems. The deductive algorithm proposed is designed suitable to the concept of clustering which classifies and deletes the large data. This algorithm has direct relation with the method of pattern generation and analyzing module of the intrusion detection system. This can also extend the appication range and increase the detection speed of exiting intrusion detection system as the rule database is constructed for the pattern management of the intrusion detection system. The proposed pattern generation technique of the deductive algorithm is used to the algorithm is used to the algorithm which can be changed by the supporting rate of the data created from the intrusion detection system. Fanally, we analyze the possibility of the speed improvement of the rule generation with the algorithm simulation.

Design and Performance Analysis of Energy-Aware Distributed Detection Systems with Multiple Passive Sonar Sensors (다중 수동 소나 센서 기반 에너지 인식 분산탐지 체계의 설계 및 성능 분석)

  • Kim, Song-Geun;Hong, Sun-Mog
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.1
    • /
    • pp.9-21
    • /
    • 2010
  • In this paper, optimum design of distributed detection is considered for a parallel sensor network system consisting of a fusion center and multiple passive sonar nodes. Nonrandom fusion rules are employed as the fusion rules of the sensor network. For the nonrandom fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is investigated that maximizes the probability of detection under a constraint on energy consumption due to false alarms. It is also investigated through numerical experiments how signal strength, false alarm probability, and the distance between three sensor nodes affect the system detection performances.

Design and Performance Analysis of Energy-Aware Distributed Detection Systems with Two Passive Sonar Sensors (수동 소나 쌍을 이용한 에너지 인식 분산탐지 체계의 설계 및 성능 분석)

  • Do, Joo-Hwan;Kim, Song-Geun;Hong, Sun-Mog
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.4
    • /
    • pp.139-147
    • /
    • 2009
  • In this paper, optimum design of energy-aware distributed detection is considered for a parallel sensor network system consisting of a fusion center and two passive sonar nodes. AND rule and OR rule are employed as the fusion rules of the sensor network. For the fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is investigated that maximizes the probability of detection under a constraint on energy consumption due to false alarms. It is also investigated through numerical experiments how signal strength, an energy constraint, and the distance between two sensor nodes affect the system detection performances.

Design and Implementation of a System to Detect Intrusion and Generate Detection Rule against Scan-based Internet Worms (스캔 기반의 인터넷 웜 공격 탐지 및 탐지룰 생성 시스템 설계 및 구현)

  • Kim Ik-Su;Jo Hyuk;Kim Myung Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.191-200
    • /
    • 2005
  • The brilliant achievements in computers and the internet technology make it easy for users to get useful information. But at the same time, the damages caused by intrusions and denial of service attacks are getting more worse. Specially because denial of service attacks by internet worm incapacitate computers and networks, we should draw up a disposal plan against it. So far many rule-based intrusion detection systems have been developed, but these have the limits of these ability to detect new internet worms. In this paper, we propose a system to detect intrusion and generate detection rule against scan-based internet worm, paying attention to the fact that internet worms scan network to infect hosts. The system detects internet worms using detection rule. And if it detects traffic causing by a new scan-based internet worm, it generates new detection nile using traffic information that is gathered. Therefore it can response to new internet worms early. Because the system gathers packet payload, when it is being necessary only, it can reduce system's overhead and disk space that is required.

Implementation of Rule-based Smartphone Motion Detection Systems

  • Lee, Eon-Ju;Ryou, Seung-Hui;Lee, So-Yun;Jeon, Sung-Yoon;Park, Eun-Hwa;Hwang, Jung-Ha;Choi, Doo-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.45-55
    • /
    • 2021
  • Information obtained through various sensors embedded in a smartphone can be used to identify and analyze user's movements and situations. In this paper, we propose two rule-based motion detection systems that can detect three alphabet motions, 'I', 'S', and 'Z' by analyzing data obtained by the acceleration and gyroscope sensors in a smartphone. First of all, the characteristics of acceleration and angular velocity for each motion are analyzed. Based on the analysis, two rule-based systems are proposed and implemented as an android application and it is used to verify the detection performance for each motion. Two rule-based systems show high recognition rate over 90% for each motion and the rule-based system using ensemble shows better performance than another one.

Detection of Malicious Code using Association Rule Mining and Naive Bayes classification (연관규칙 마이닝과 나이브베이즈 분류를 이용한 악성코드 탐지)

  • Ju, Yeongji;Kim, Byeongsik;Shin, Juhyun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1759-1767
    • /
    • 2017
  • Although Open API has been invigorated by advancements in the software industry, diverse types of malicious code have also increased. Thus, many studies have been carried out to discriminate the behaviors of malicious code based on API data, and to determine whether malicious code is included in a specific executable file. Existing methods detect malicious code by analyzing signature data, which requires a long time to detect mutated malicious code and has a high false detection rate. Accordingly, in this paper, we propose a method that analyzes and detects malicious code using association rule mining and an Naive Bayes classification. The proposed method reduces the false detection rate by mining the rules of malicious and normal code APIs in the PE file and grouping patterns using the DHP(Direct Hashing and Pruning) algorithm, and classifies malicious and normal files using the Naive Bayes.