• 제목/요약/키워드: Exploit

검색결과 1,234건 처리시간 0.028초

심해저용 원격 착탈 시스템 제어를 위한 수중음향신호 인식 알고리즘의 개발 (A Development of Underwater Sound Signal Recognition Algorithm for Acoustic Releaser in the Seafloor)

  • 김영진;우종식;조영준;허경무
    • 제어로봇시스템학회논문지
    • /
    • 제10권5호
    • /
    • pp.421-427
    • /
    • 2004
  • In order to exploit underwater resources successfully, the first step would be a marine environmental research and exploration in the seafloor. Generally one sets up a long-term underwater experimental unit in the seafloor and retrieves the unit later after a certain period time. Essential to these applications is the reliable teleoperation and telemetering of the unit. In this paper we presents a robust underwater sound recognition algorithm by which we can identify the sound signal without the influence of disturbances due to underwater environmental changes. The proposed method provides a means suitable for the acoustic releaser which requires low power dissipation and long-time underwater operation. We demonstrate its ability of securing stability and fast sound recognition through simulation methods.

Direct and Indirect Robust Adaptive Fuzzy Controllers for a Class of Nonlinear Systems

  • Essounbouli Najib;Hamzaoui Abdelaziz
    • International Journal of Control, Automation, and Systems
    • /
    • 제4권2호
    • /
    • pp.146-154
    • /
    • 2006
  • In this paper, we propose direct and indirect adaptive fuzzy sliding mode control approaches for a class of nonaffine nonlinear systems. In the direct case, we use the implicit function theory to prove the existence of an ideal implicit feedback linearization controller, and hence approximate it to attain the desired performances. In the indirect case, we exploit the linear structure of a Takagi-Sugeno fuzzy system with constant conclusion to establish an affine-in-control model, and therefore design an indirect adaptive fuzzy controller. In both cases, the adaptation laws of the adjustable parameters are deduced from the stability analysis, in the sense of Lyapunov, to get a more accurate approximation level. In addition to their robustness, the design of the proposed approaches does not require the upper bounds of both external disturbances and approximation errors. To show the efficiency of the proposed controllers, a simulation example is presented.

Stepping Stones Attack Simulator for TCP Connection Traceback Test

  • Choi, Byeong-cheol;Seo, Dong-Il;Sohn, Sung-Won;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2112-2115
    • /
    • 2003
  • In this paper, we describe a SSAS (stepping stones attack simulator) that is automatic tool for testing and evaluation in TCP connection traceback system. The SSAS can pass multiple hosts that are included with hacker, middle-path hosts and victim’s system. And SSAS can also attack through commands to exploit the victim’s system. Usually, hackers do not expose their real attack positions through compromising the middle-path hosts like stepping-stones. Namely, hackers perform the stepping stones attacks in Internet. The SSAS can be utilized by developments and tests of the various countermeasure techniques of hacking. Specially, in this paper, it is used to test the performance of TCP connection traceback system.

  • PDF

HSFE Network and Fusion Model based Dynamic Hand Gesture Recognition

  • Tai, Do Nhu;Na, In Seop;Kim, Soo Hyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3924-3940
    • /
    • 2020
  • Dynamic hand gesture recognition(d-HGR) plays an important role in human-computer interaction(HCI) system. With the growth of hand-pose estimation as well as 3D depth sensors, depth, and the hand-skeleton dataset is proposed to bring much research in depth and 3D hand skeleton approaches. However, it is still a challenging problem due to the low resolution, higher complexity, and self-occlusion. In this paper, we propose a hand-shape feature extraction(HSFE) network to produce robust hand-shapes. We build a hand-shape model, and hand-skeleton based on LSTM to exploit the temporal information from hand-shape and motion changes. Fusion between two models brings the best accuracy in dynamic hand gesture (DHG) dataset.

A Minimalist Model of Single Molecule Spectroscopy in a Dynamic Environment Studied by Metadynamics

  • Oh, In-Rok;Lee, Eun-Sang;Jung, Youn-Joon
    • Bulletin of the Korean Chemical Society
    • /
    • 제33권3호
    • /
    • pp.980-986
    • /
    • 2012
  • In this paper we develop a minimalist model of single molecule spectroscopy in a dynamic environment. Our model is based upon a lattice system consisting of a probe molecule embedded in an Ising-model like environment. We assume that the probe molecule interacts with the Ising spins via a dipole-dipole potential, and calculate free energy curves and lineshapes of the system. To investigate fluctuation behavior of the system we exploit the metadynamics sampling method. In particular, using the method, we calculate the free energy curve of magnetization of the lattice and that of the transition energy of the probe molecule. Furthermore, we compare efficiencies of three different sampling methods used; unbiased, umbrella, and metadynamics sampling methods. Finally, we explore the lineshape behavior of the probe molecule as the system undergoes a phase transition from a sub-critical and to a super-critical temperature. We show that the transition energy of a probe molecule is broadly distributed due to the heterogeneous, local environments.

클러스터링 기법을 이용한 손가락 마디지문 식별 알고리즘 (A Finger Crease Pattern Identification Algorithm Utilizing Clustering Method)

  • 주일용;안장용;최환수
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(4)
    • /
    • pp.247-250
    • /
    • 2000
  • This paper proposes a finger crease pattern identification algorithm utilizing a clustering method. The algorithms has been developed for the use of biometric person identification system. Since the finger crease pattern may be well-imaged utilizing low cost imaging devices such as low-end CCD camera with LED lighting, the feasibility of commercialization of the algorithm and the system utilizing the algorithm may be well justified if the finger crease pattern is a reasonable choice for the biometric feature. In this paper, we exploit this possibility and show the potential of using the finger crease pattern as a feature for biometric person identification.

  • PDF

Karhunen-loeve 변환과 분류 벡터 양자화에 의한 효율적인 영상 부호화 (Karhunen - Loeve Transform -Classified Vector Quantization for Efficient Image Coding)

  • 김태용;최흥문
    • 전자공학회논문지B
    • /
    • 제33B권11호
    • /
    • pp.44-52
    • /
    • 1996
  • This paper proposes a KLT-CVQ scheme using PCNN to improbe the quality of the reconstructed images at a given bit rate. By using the PCNN and classified vector quantization, we exploit the high energy compaction and compelte decorrelation capbilities of the KLT, and the pdf (probability density function) shape and space-filling advantages of the vQ to improve the performance of the proposed hybrid coding technique. In order to preserve the preceptual fetures such as the edge components in the reconstructed images, we classified the input image blocks according to the texture energy measures of the local statistics and vector-coded them adaptively, and thereby reduces the possible edge degradation in the reconstructed images. The results of the computer simulations show that the performance of the proposed KLT-CVQ is higher than that of the KLT-CSQ or the DCT-CVQ in the quality of the reconstructed images at a given bit rate.

  • PDF

가변 타원곡선 암호 프로세서의 FPGA 구현 및 전력분석 공격 (FPGA Implementation and Power Analysis Attack of Versatile Elliptic Curve Crypto-processor)

  • 장수혁;이동호
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 하계종합학술대회 논문집(2)
    • /
    • pp.521-524
    • /
    • 2004
  • For implementation of Cryptographic algorithms, security against implementation attacks such as side-channel attacks as well as the speed and the size of the circuit is important. Power Analysis attacks are powerful techniques of side-channel attacks to exploit secret information of crypto-processors. In this thesis the FPGA implementation of versatile elliptic crypto-processor is described. Explain the analysis of power consumption of ALTERA FPGA(FLEX10KE) that is used in our hand made board. Conclusively this thesis presents clear proof that implementations of Elliptic Curve Crypto-systems are vulnerable to Differential Power Analysis attacks as well as Simple Power Analysis attacks.

  • PDF

위상 보정된 웨이블릿 변환을 이용한 영상확대 (Image Interpolation Using Phase-Shifted Wavelet Transforms)

  • 김상수;엄일규;김유신
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.387-390
    • /
    • 2005
  • Parameter estimation for the probability model of wavelet coefficients is essential to the wavelet-domain interpolation. However, phase uncertainty, one well-known drawback of the orthogonal wavelet transforms, make it difficult to estimate parameters. In this paper, we exploit a phase shifting matrix in order to improve the accuracy of estimation. Nonlinear modeling to capture the interscale characteristics is also described. The experimental results show that the proposed method outperforms the previous wavelet-domain interpolation method as well as the conventional bicubic method.

  • PDF

Study on the preamble based OFDM timing synchronization

  • Choi, Seung-Duk;Choi, Jung-Min;Lee, Jae-Hong
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.73-76
    • /
    • 2005
  • Preamble based synchronization result in performance degradation due to the high time variation in the power delay profile of the channel in fast varying channel. Since most of the timing metric that exploit the preamble is not based on theoretical back ground, it is not easy to find out the reason. In this paper, the behavior of the timing metric in the multipath fading channel is explained.

  • PDF