• Title/Summary/Keyword: Event driven method

Search Result 73, Processing Time 0.025 seconds

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

Data-driven event detection method for efficient management and recovery of water distribution system man-made disasters (상수도관망 재난관리 및 복구를 위한 데이터기반 이상탐지 방법론 개발)

  • Jung, Donghwi;Ahn, Jaehyun
    • Journal of Korea Water Resources Association
    • /
    • v.51 no.8
    • /
    • pp.703-711
    • /
    • 2018
  • Water distribution system (WDS) pipe bursts are caused from excessive pressure, pipe aging, and ground shift from temperature change and earthquake. Prompt detection of and response to the failure event help prevent large-scale service interruption and catastrophic sinkhole generation. To that end, this study proposes a improved Western Electric Company (WECO) method to improve the detection effectiveness and efficiency of the original WECO method. The original WECO method is an univariate Statistical Process Control (SPC) technique used for identifying any non-random patterns in system output data. The improved WECO method multiples a threshold modifier (w) to each threshold of WECO sub-rules in order to control the sensitivity of anomaly detection in a water distribution network of interest. The Austin network was used to demonstrated the proposed method in which normal random and abnormal pipe flow data were generated. The best w value was identified from a sensitivity analysis, and the impact of measurement frequency (dt = 5, 10, 15 min etc.) was also investigated. The proposed method was compared to the original WECO method with respect to detection probability, false alarm rate, and averaged detection time. Finally, this study provides a set of guidelines on the use of the WECO method for real-life WDS pipe burst detection.

Design of Seat Belt Pretensioner driven by Elastic Force (탄성력 기반 안전벨트 프리텐셔너 설계)

  • Yongsu Lee;Seyun Park;Hyuneun Lee;Sang-Hyun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.545-550
    • /
    • 2023
  • A pretensioner is a safety device that protects occupants by pulling the seat belt in the event of a vehicle collision. However, since the pretensioner is driven by a explosive method, it is necessary to replace not only the gas generator but also all connecting parts including the manifold after an accident. Therefore, in this paper, we propose an elastic force-based pretensioner that can be used safely and semi-permanently. After analyzing the operating mechanism of the existing pretensioner from a thermodynamic/dynamic point of view, the spring stiffness that can be deployed within an appropriate operating time was determined by converting the gas explosion energy into elastic energy. In addition, the coil spring shape that satisfies the elastic stiffness was designed in consideration of the vehicle interior installation standard. Finally, the operating performance of the pretensioner driven by elastic force was verified through fabrication.

Development of Real-time Simultaneous Discharge Algorithm for Randomly Feeding Object (무작위 이송 개체용 실시간 동시 배출 알고리즘 개발)

  • Kim, S. C.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.24 no.2
    • /
    • pp.145-152
    • /
    • 1999
  • Methods of discharging each graded agricultural product are divided into two according to the type of feeding. One is based on feeding objects using a series of specially designed holders mounted with an equal interval. The other is randomly feeding objects while being isolated without a specific interval. In this paper, a real time simultaneous discharge algorithm, which is good for objects randomly fed individually and for multi-objects located along a series of discharge buckets, was developed. And the developed algorithm was implemented to the controller and the performance was verified using the system developed for dried mushrooms. The discharge system used for the experiment was composed of a variable speed conveyor, a series of double channel bucket mounted along both sides of the conveyor, and a series of air nozzles and optic sensors. Developed algorithm worked perfectly and could be directly used for automatic discharge system for randomly feeding agricultural products.

  • PDF

Redundancy Management of Brake-by-wire System using a Message Scheduling (메시지 스케줄링을 이용한 Brake-by-wire 시스템의 Redundancy Management)

  • Yune, J. W.;Kim, K. W.;Kim, T. Y.;Kim, J. G.;Lee, S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.717-720
    • /
    • 2000
  • Event-driven communication protocols such as CAN(Controller Area Network) have inherent packet delays due to the contention process for the use of network medium. These delays are stochastic in nature because most packets arrive at random time instants. The stochastic property of the delay adversely influences the control system's performance in terms of stability, responsiveness and steady-state error. Another problem for safety-critical application such as brake-by-wire systems is the reliability of the communication modules that can fail abruptly. This paper deals with two methods to overcome the above problems : (i) scheduling method that can maintain packet delays under some acceptable level, and (ii) redundancy management of communication modules that prescribes dual-redundancy modules' behavior when one of them fails.

  • PDF

Mega Flood Simulation Assuming Successive Extreme Rainfall Events (연속적인 극한호우사상의 발생을 가정한 거대홍수모의)

  • Choi, Changhyun;Han, Daegun;Kim, Jungwook;Jung, Jaewon;Kim, Duckhwan;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.18 no.1
    • /
    • pp.76-83
    • /
    • 2016
  • In recent, the series of extreme storm events were occurred by those continuous typhoons and the severe flood damages due to the loss of life and the destruction of property were involved. In this study, we call Mega flood for the Extreme flood occurred by these successive storm events and so we can have a hypothetical Mega flood by assuming that a extreme event can be successively occurred with a certain time interval. Inter Event Time Definition (IETD) method was used to determine the time interval between continuous events in order to simulate Mega flood. Therefore, the continuous extreme rainfall events are determined with IETD then Mega flood is simulated by the consecutive events : (1) consecutive occurrence of two historical extreme events, (2) consecutive occurrence of two design events obtained by the frequency analysis based on the historical data. We have shown that Mega floods by continuous extreme rainfall events were increased by 6-17% when we compared to typical flood by a single event. We can expect that flood damage caused by Mega flood leads to much greater than damage driven by a single rainfall event. The second increase in the flood caused by heavy rain is not much compared to the first flood caused by heavy rain. But Continuous heavy rain brings the two times of flood damage. Therefore, flood damage caused by the virtual Mega flood of is judged to be very large. Here we used the hypothetical rainfall events which can occur Mega floods and this could be used for preparing for unexpected flood disaster by simulating Mega floods defined in this study.

A Machine Learning-Driven Approach for Wildfire Detection Using Hybrid-Sentinel Data: A Case Study of the 2022 Uljin Wildfire, South Korea

  • Linh Nguyen Van;Min Ho Yeon;Jin Hyeong Lee;Gi Ha Lee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.175-175
    • /
    • 2023
  • Detection and monitoring of wildfires are essential for limiting their harmful effects on ecosystems, human lives, and property. In this research, we propose a novel method running in the Google Earth Engine platform for identifying and characterizing burnt regions using a hybrid of Sentinel-1 (C-band synthetic aperture radar) and Sentinel-2 (multispectral photography) images. The 2022 Uljin wildfire, the severest event in South Korean history, is the primary area of our investigation. Given its documented success in remote sensing and land cover categorization applications, we select the Random Forest (RF) method as our primary classifier. Next, we evaluate the performance of our model using multiple accuracy measures, including overall accuracy (OA), Kappa coefficient, and area under the curve (AUC). The proposed method shows the accuracy and resilience of wildfire identification compared to traditional methods that depend on survey data. These results have significant implications for the development of efficient and dependable wildfire monitoring systems and add to our knowledge of how machine learning and remote sensing-based approaches may be combined to improve environmental monitoring and management applications.

  • PDF

Mutual Verification of an Analytic Model of a Complex System and Space Syntax Using Network Analyses (네트워크 분석방식 선택에 따른 복잡계 모형과 공간구문론의 상호검증)

  • Kim, Suk-Tae;Yoon, So-hee
    • Korean Institute of Interior Design Journal
    • /
    • v.26 no.3
    • /
    • pp.45-54
    • /
    • 2017
  • A social phenomenon that occurs in a physical space is said to be a complex system. However, space syntax, which is commonly employed by researchers to identify such social phenomena, has various limitations in interpreting their complexity. On the other hand, agent-based modeling considers a variety of factors including the personality of the agent, objective-oriented work flows, estimation according to time flows and better prediction of space use through diverse parameters depending the situation, as well as the characteristics of the space. The agent-based method thus has the potentials to be developed as an alternative to space syntax techniques. In particular, discrete event driven simulation(DEVS), which is part of the agent-based modeling method, embraces the concept of networks just like space syntax, which allows a possible theoretical linkage in the future. This study suggests a procedural model of agent-based DEVS reflecting two different connection methods, i.e. connections between adjacent areas and those of the entire space, and attempts to identify the relationship between the local and regional indices of space syntax. A number of spaces were selected as examples-one for a preliminary experiment and eight modified for the main experiment-and space syntax and DEVS were applied to each of them. The comparative analysis of the results led to the conclusions as follows: 1) Adjacent connections were closely related to local indices, while the whole-space approach to regional indices. Local integration shows both characteristics. 2) Observation of the time flow model indicated a faster convergence with the range of 1 to 3-fold of the total time of one lap, with the error of less than 10%. 3) The heat map analysis showed more obvious characteristics of using the space for the entire space rather than adjacent connections. 4) Space syntax shows higher eligibility than ABM.

Design and Implementation of Real-Time Parallel Engine for Discrete Event Wargame Simulation (이산사건 워게임 시뮬레이션을 위한 실시간 병렬 엔진의 설계 및 구현)

  • Kim, Jin-Soo;Kim, Dae-Seog;Kim, Jung-Guk;Ryu, Keun-Ho
    • The KIPS Transactions:PartA
    • /
    • v.10A no.2
    • /
    • pp.111-122
    • /
    • 2003
  • Military wargame simulation models must support the HLA in order to facilitate interoperability with other simulations, and using parallel simulation engines offer efficiency in reducing system overhead generated by propelling interoperability. However, legacy military simulation model engines process events using sequential event-driven method. This is due to problems generated by parallel processing such as synchronous reference to global data domains. Additionally. using legacy simulation platforms result in insufficient utilization of multiple CPUs even if a multiple CPU system is under use. Therefore, in this paper, we propose conversing the simulation engine to an object model-based parallel simulation engine to ensure military wargame model's improved system processing capability, synchronous reference to global data domains, external simulation time processing, and the sequence of parallel-processed events during a crash recovery. The converted parallel simulation engine is designed and implemented to enable parallel execution on a multiple CPU system (SMP).

An Efficient Neighbor Discovery Method for Cooperative Video Surveillance Services in Internet of Vehicles (차량 인터넷에서 협업 비디오 감시 서비스를 위한 효율적인 이웃 발견 방법)

  • Park, Taekeun;Lee, Suk-Kyoon
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.97-109
    • /
    • 2016
  • The rapid deployment of millions of mobile sensors and smart devices has resulted in high demand for opportunistic encounter-based networking. For the cooperative video surveillance of dashboard cameras in nearby vehicles, a fast and energy-efficient asynchronous neighbor discovery protocol is indispensable because a dashboard camera is an energy-hungry device after the vehicle's engine has turned off. In the existing asynchronous neighbor discovery protocols, all nodes always try to discover all neighbors. However, a dashboard camera needs to discover nearby dashboard cameras when an event is detected. In this paper, we propose a fast and energy-efficient asynchronous neighbor discovery protocol, which enables nodes : 1) to have different roles in neighbor discovery, 2) to discover neighbors within a search range, and 3) to report promptly the exact discovery result. The proposed protocol has two modes: periodic wake-up mode and active discovery mode. A node begins with the periodic wake-up mode to be discovered by other nodes, switches to the active discovery mode on receiving a neighbor discovery request, and returns to the periodic wake-up mode when the active discovery mode finishes. In the periodic wake-up mode, a node wakes up at multiples of number ${\alpha}$, where ${\alpha}$ is determined by the node's remaining battery power. In the active discovery mode, a node wakes up for consecutive ${\gamma}$ slots. Then, the node operating in the active discovery mode can discover all neighbors waking up at multiples of ${\beta}$ for ${\beta}{\leq}{\gamma}$ within ${\gamma}$ time slots. Since the proposed protocol assigns one half of the duty cycle to each mode, it consumes equal to or less energy than the existing protocols. A performance comparison shows that the proposed protocol outperforms the existing protocols in terms of discovery latency and energy consumption, where the frequency of neighbor discovery requests by car accidents is not constantly high.