• Title/Summary/Keyword: Fuzzy measures

Search Result 219, Processing Time 0.024 seconds

Target extraction in FLIR image using Bi-modality of local characteristic and Chamfer distance (국부적 특성의 Bi-modality와 Chamfer 거리를 이용한 FLIR 영상의 표적 추출)

  • Lee, Hee-Yul;Kim, Se-Yun;Kim, Jong-Hwan;Kwak, Dong-Min;Choi, Byung-Jae;Joo, Young-Bok;Park, Kil-Houm
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.3
    • /
    • pp.304-310
    • /
    • 2009
  • In this paper, target extraction method in FLIR(forward-looking infrared) images based on fuzzy thresholding which used bi-modality and adjacency to determine membership value is proposed. The bi-modality represents how a pixel is classified into a part of target using distribution of pixel values in a local region, and The adjacency is a measure to represent how each pixel is far from the target region. First, membership value is calculated using above two measures, and then fuzzy thresholding is performed to extract the target. To evaluate performance of proposed target extraction method, we compare other segmentation methods using various FLIR tank image. Experimental results show that the proposed algorithm is a good segmentation performance.

Incremental Clustering Algorithm by Modulating Vigilance Parameter Dynamically (경계변수 값의 동적인 변경을 이용한 점층적 클러스터링 알고리즘)

  • 신광철;한상용
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1072-1079
    • /
    • 2003
  • This study is purported for suggesting a new clustering algorithm that enables incremental categorization of numerous documents. The suggested algorithm adopts the natures of the spherical k-means algorithm, which clusters a mass amount of high-dimensional documents, and the fuzzy ART(adaptive resonance theory) neural network, which performs clustering incrementally. In short, the suggested algorithm is a combination of the spherical k-means vector space model and concept vector and fuzzy ART vigilance parameter. The new algorithm not only supports incremental clustering and automatically sets the appropriate number of clusters, but also solves the current problems of overfitting caused by outlier and noise. Additionally, concerning the objective function value, which measures the cluster's coherence that is used to evaluate the quality of produced clusters, tests on the CLASSIC3 data set showed that the newly suggested algorithm works better than the spherical k-means by 8.04% in average.

A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol (TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델)

  • Lee, Se-Yul;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

Implementation of Pipeline Monitoring System Using Bio-memetic Robots (생체 모방 로봇을 이용한 관로 모니터링 시스템의 구현)

  • Shin, Dae-Jung;Na, Seung-You;Kim, Jin-Young;Jung, Joo-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.17A no.1
    • /
    • pp.33-44
    • /
    • 2010
  • We present a pipeline monitoring system based on bio-memetic robot in this paper. A bio-memetic robot exploring pipelines measures temperature, humidity, and vibration. The principal function of pipeline monitoring robot for the exploring pipelines is to recognize the shape of pipelines. We use infrared distance sensor to recognize the shape of pipelines and potentiometer to measure the angle of motor mounting infrared distance sensor. For the shape recognition of pipelines, the number of detected pipelines is used during only one scanning of distance. Three fuzzy classifiers are used for the number of detected pipelines, and the classifying results are presented in this paper.

Proposal and Implementation of Authentication System Using Human Face Biometric Features (얼굴 생체 특징을 이용한 인증 시스템의 제안과 구현)

  • 조동욱;신승수
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.24-30
    • /
    • 2003
  • Pre-existing authentication system such as token based method, knowledge-based and hybrid method have problems such as loss and wiretapping. for this, this paper describes the biometric authentication system which have the excellent convenience and security. In particular, a new biometric system by human face biometric features which have the non-enforcement and non-touch measurement is proposed. Firstly, facial features are extracted by Y- histogram and tilted face images we corrected by coordinate transformation and scaling has done for achieving independent of the camera positions. Secondly, feature vectors are extracted such as distance and intersection angles and similarities we measured by fuzzy relation matrix. finally, the effectiveness of this paper is demonstrated by experiments.

  • PDF

Damage level prediction of non-reshaped berm breakwater using ANN, SVM and ANFIS models

  • Mandal, Sukomal;Rao, Subba;N., Harish;Lokesha, Lokesha
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.4 no.2
    • /
    • pp.112-122
    • /
    • 2012
  • The damage analysis of coastal structure is very important as it involves many design parameters to be considered for the better and safe design of structure. In the present study experimental data for non-reshaped berm breakwater are collected from Marine Structures Laboratory, Department of Applied Mechanics and Hydraulics, NITK, Surathkal, India. Soft computing techniques like Artificial Neural Network (ANN), Support Vector Machine (SVM) and Adaptive Neuro Fuzzy Inference system (ANFIS) models are constructed using experimental data sets to predict the damage level of non-reshaped berm breakwater. The experimental data are used to train ANN, SVM and ANFIS models and results are determined in terms of statistical measures like mean square error, root mean square error, correla-tion coefficient and scatter index. The result shows that soft computing techniques i.e., ANN, SVM and ANFIS can be efficient tools in predicting damage levels of non reshaped berm breakwater.

A Study on Network based Intelligent Intrusion Prevention model by using Fuzzy Cognitive Maps on Denial of Service Attack (서비스 거부 공격에서의 퍼지인식도를 이용한 네트워크기반의 지능적 침입 방지 모델에 관한 연구)

  • Lee, Se-Yul;Kim, Yong-Soo;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.148-153
    • /
    • 2003
  • A DoS(Denial of Service) attack appears in the form of the intrusion attempt and Syn Flooding attack is a typical example. The Syn Flooding attack takes advantage of the weak point of 3-way handshake between the end-points of TCP which is the connection-oriented transmission service and has the reliability This paper proposes a NIIP(Network based Intelligent Intrusion Prevention) model. This model captures and analyzes the packet informations for the detection of Syn Flooding attack. Using the result of analysis of decision module, the decision module, which utilizes FCM(Fuzzy Cognitive Maps), measures the degree of danger of the DoS and trains the response module to deal with attacks. This model is a network based intelligent intrusion prevention model that reduces or prevents the danger of Syn Flooding attack.

A Feature Selection Method Based on Fuzzy Cluster Analysis (퍼지 클러스터 분석 기반 특징 선택 방법)

  • Rhee, Hyun-Sook
    • The KIPS Transactions:PartB
    • /
    • v.14B no.2
    • /
    • pp.135-140
    • /
    • 2007
  • Feature selection is a preprocessing technique commonly used on high dimensional data. Feature selection studies how to select a subset or list of attributes that are used to construct models describing data. Feature selection methods attempt to explore data's intrinsic properties by employing statistics or information theory. The recent developments have involved approaches like correlation method, dimensionality reduction and mutual information technique. This feature selection have become the focus of much research in areas of applications with massive and complex data sets. In this paper, we provide a feature selection method considering data characteristics and generalization capability. It provides a computational approach for feature selection based on fuzzy cluster analysis of its attribute values and its performance measures. And we apply it to the system for classifying computer virus and compared with heuristic method using the contrast concept. Experimental result shows the proposed approach can give a feature ranking, select the features, and improve the system performance.

A Study on vitalization of the Pohang Yeongil Port and its hinterland in the post Covid-19 pandemic (포스트 코로나 시대 지역거점항인 포항영일만항과 배후단지 활성화 방안에 관한 연구)

  • Kwak, Dong-Wook;Lee, Sung-Woo;Kim, A-Rom;Seo, Young-Joon
    • Journal of Korea Port Economic Association
    • /
    • v.38 no.1
    • /
    • pp.73-86
    • /
    • 2022
  • This study aims at investigating measures to vitalize the Pohang Yeongil New Port and its hinterland in the context of the post Covid-19 pandemic. To identify appropriate strategies, an SWOT analysis combined with fuzzy-AHP(Analytic Hierarchy Process) was applied for strategical priority. Among the SWOT factors, weaknesses and threats were found to be critical. At a more detailed level, the strategic priorities were given to insufficient infrastructure (W), neighboring ports (T), insufficient shipping network (W), low service level (W) and South-North Korea relationships (T). Given these results, several strategies to overcome core weaknesses and threats of the Pohang Yeongil Port were suggested. The results of this study may provide valuable insights for port policy makers.