• Title/Summary/Keyword: Event detection

Search Result 650, Processing Time 0.027 seconds

Development of a dual-mode energy-resolved neutron imaging detector: High spatial resolution and large field of view

  • Wenqin Yang;Jianrong Zhou;Jianqing Yang;Xingfen Jiang;Jinhao Tan;Lin Zhu;Xiaojuan Zhou;Yuanguang Xia;Li Yu;Xiuku Wang;Haiyun Teng;Jiajie Li;Yongxiang Qiu;Peixun Shen;Songlin Wang;Yadong Wei;Yushou Song;Jian Zhuang;Yubin Zhao;Junrong Zhang;Zhijia Sun;Yuanbo Chen
    • Nuclear Engineering and Technology
    • /
    • v.56 no.7
    • /
    • pp.2799-2805
    • /
    • 2024
  • Energy-resolved neutron imaging is an effective way to investigate the internal structure and residual stress of materials. Different sample sizes have varying requirements for the detector's imaging field of view (FOV) and spatial resolution. Therefore, a dual-mode energy-resolved neutron imaging detector was developed, which mainly consisted of a neutron scintillator screen, a mirror, imaging lenses, and a time-stamping optical fast camera. This detector could operate in a large FOV mode or a high spatial resolution mode. To evaluate the performance of the detector, the neutron wavelength spectra and the multiple spatial resolution tests were conducted at CSNS. The results demonstrated that the detector accurately measured the neutron wavelength spectra selected by a bandwidth chopper. The best spatial resolution was about 20 ㎛ in high spatial resolution mode after event reconstruction, and a FOV of 45.0 mm × 45.0 mm was obtained in large FOV mode. The feasibility was validated to change the spatial resolution and FOV by replacing the scintillator screen and adjusting the lens magnification.

Coordination among the Security Systems using the Blackboard Architecture (블랙보드구조를 활용한 보안 모델의 연동)

  • 서희석;조대호
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.4
    • /
    • pp.310-319
    • /
    • 2003
  • As the importance and the need for network security are increased, many organizations use the various security systems. They enable to construct the consistent integrated security environment by sharing the network vulnerable information among IDS (Intrusion Detection System), firewall and vulnerable scanner. The multiple IDSes coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (Blackboard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (Blackboard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete Event system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses to these detection information.

An Application of Blackboard Architecture for the Coordination among the Security Systems (보안 모델의 연동을 위한 블랙보드구조의 적용)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.4
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

A Study on Security Event Detection in ESM Using Big Data and Deep Learning

  • Lee, Hye-Min;Lee, Sang-Joon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.42-49
    • /
    • 2021
  • As cyber attacks become more intelligent, there is difficulty in detecting advanced attacks in various fields such as industry, defense, and medical care. IPS (Intrusion Prevention System), etc., but the need for centralized integrated management of each security system is increasing. In this paper, we collect big data for intrusion detection and build an intrusion detection platform using deep learning and CNN (Convolutional Neural Networks). In this paper, we design an intelligent big data platform that collects data by observing and analyzing user visit logs and linking with big data. We want to collect big data for intrusion detection and build an intrusion detection platform based on CNN model. In this study, we evaluated the performance of the Intrusion Detection System (IDS) using the KDD99 dataset developed by DARPA in 1998, and the actual attack categories were tested with KDD99's DoS, U2R, and R2L using four probing methods.

A Novel Approach for Deriving Test Scenarios and Test Cases from Events

  • Singh, Sandeep K.;Sabharwal, Sangeeta;Gupta, J.P.
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.213-240
    • /
    • 2012
  • Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test ma Safety critic Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test manually. In order to cut down on costs, save time, and increase reliability, the model based testing approach is the best solution. Such an approach does not require applications or codes prior to generating test cases, so it leads to the early detection of faults, which helps in reducing the development time. Several model-based testing approaches have used different UML models but very few works have been reported to show the generation of test cases that use events. Test cases that use events are an apt choice for these types of systems. However, these works have considered events that happen at a user interface level in a system while other events that happen in a system are not considered. Such works have limited applications in testing the GUI of a system. In this paper, a novel model-based testing approach is presented using business events, state events, and control events that have been captured directly from requirement specifications. The proposed approach documents events in event templates and then builds an event-flow model and a fault model for a system. Test coverage criterion and an algorithm are designed using these models to generate event sequence based test scenarios and test cases. Unlike other event based approaches, our approach is able to detect the proposed faults in a system. A prototype tool is developed to automate and evaluate the applicability of the entire process. Results have shown that the proposed approach and supportive tool is able to successfully derive test scenarios and test cases from the requirement specifications of safety critical systems, real time systems, and event based systems.

New Scheme for Smoker Detection (흡연자 검출을 위한 새로운 방법)

  • Lee, Jong-seok;Lee, Hyun-jae;Lee, Dong-kyu;Oh, Seoung-jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1120-1131
    • /
    • 2016
  • In this paper, we propose a smoker recognition algorithm, detecting smokers in a video sequence in order to prevent fire accidents. We use description-based method in hierarchical approaches to recognize smoker's activity, the algorithm consists of background subtraction, object detection, event search, event judgement. Background subtraction generates slow-motion and fast-motion foreground image from input image using Gaussian mixture model with two different learning-rate. Then, it extracts object locations in the slow-motion image using chain-rule based contour detection. For each object, face is detected by using Haar-like feature and smoke is detected by reflecting frequency and direction of smoke in fast-motion foreground. Hand movements are detected by motion estimation. The algorithm examines the features in a certain interval and infers that whether the object is a smoker. It robustly can detect a smoker among different objects while achieving real-time performance.

Agent-target Detection Problem Considering Change in Probability of Event Occurrence (사건 발생 확률 변화를 고려한 에이전트-타깃 감지 문제)

  • Gwang Kim
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.4
    • /
    • pp.67-76
    • /
    • 2024
  • In this study, we address the problem of target detection using multiple agents. Specifically, the detection problem involving mobile agents necessitates additional strategies for path planning. The objective is to maximize the total utility derived from the detection process over a specific period. This detection problem incorporates realistic utility values by considering a stochastic process based on the Poisson process, which accounts for the changing probability of target event occurrence over time. The objective function is nonlinear and is classified as an NP-hard problem. To identify an effective solution within an efficient computation time, this study demonstrates that the objective function possesses the characteristic of submodularity. Using this property, we propose a heuristic algorithm designed to obtain a reasonable strategy with relatively low computational time. The proposed algorithm shows solution performance and the ability to generate solutions within an appropriate computation time through theoretical and experimental results.

Quantification of Genetically Modified Canola GT73 Using TaqMan Real-Time PCR

  • Kim, Jae-Hwan;Song, Hee-Sung;Kim, Dong-Hern;Kim, Hae-Yeong
    • Journal of Microbiology and Biotechnology
    • /
    • v.16 no.11
    • /
    • pp.1778-1783
    • /
    • 2006
  • Event-specific PCR detection methods are the primary trend in genetically modified (GM) plant detection owing to their high specificity based on the flanking sequence of the exogenous integrant. Therefore, this study describes a real-time PCR system for event-specific GM canola GT73, consisting of a set of primers, TaqMan probe, and single target standard plasmid. For the specific detection of GT73 canola, the 3'-integration junction sequence between the host plant DNA and the integrated specific border was targeted. To validate the proposed method, test samples of 0, 1, 3, 5, and 10% GT73 canola were quantified. The method was also assayed with 15 different plants, and no amplification signal was observed in a real-time PCR assay with any of the species tested, other than GT73 canola.

A Study on ESM(Enterprise Security Management) System Standard (통합 보안 관리 시스템 표준화에 대한 연구)

  • 소우영
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.109-121
    • /
    • 2002
  • As the development of information technology and thus the growth of security incidents, there has been increasing demand on developing a system for centralized security management, also known as Enterprise Security Management(ESM), uniting functions of various security systems such as firewall, intrusion detection system, virtual private network and so on. Unfortunately, however, developers have been suffering with a lack of related standard. Although ISTF recently announced firewall system and intrusion detection system log format, it still needs for truly efficient ESM further development of the related standard including event and control messaging. This paper analyses ISTF standard and further suggests an additional event and control messaging standard for firewall and intrusion detection systems. It is expected that this effort would be helpful for the development of ESM and further related standard.

  • PDF