• Title/Summary/Keyword: Matching Network

Search Result 658, Processing Time 0.029 seconds

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur Jung-Youn;Truong Le Xuan;Lee Sang-Kyu
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.357-362
    • /
    • 2005
  • Iris recognition system is the one of the most reliable biometries recognition system. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transformed into polar coordinates. After performing three times Wavelet transformation, normalization was done using a sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compared pairs of two adjacent pixels. The binary code of the iris is transmitted to the server by the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the database. The process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.

Hybrid Scaling Based Dynamic Time Warping for Detection of Low-rate TCP Attacks

  • So, Won-Ho;Yoo, Kyoung-Min;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.592-600
    • /
    • 2008
  • In this paper, a Hybrid Scaling based DTW (HS-DTW) mechanism is proposed for detection of periodic shrew TCP attacks. A low-rate TCP attack which is a type of shrew DoS (Denial of Service) attacks, was reported recently, but it is difficult to detect the attack using previous flooding DoS detection mechanisms. A pattern matching method with DTW (Dynamic Time Warping) as a type of defense mechanisms was shown to be reasonable method of detecting and defending against a periodic low-rate TCP attack in an input traffic link. This method, however, has the problem that a legitimate link may be misidentified as an attack link, if the threshold of the DTW value is not reasonable. In order to effectively discriminate between attack traffic and legitimate traffic, the difference between their DTW values should be large as possible. To increase the difference, we analyze a critical problem with a previous algorithm and introduce a scaling method that increases the difference between DTW values. Four kinds of scaling methods are considered and the standard deviation of the sampling data is adopted. We can select an appropriate scaling scheme according to the standard deviation of an input signal. This is why the HS-DTW increases the difference between DTW values of legitimate and attack traffic. The result is that the determination of the threshold value for discrimination is easier and the probability of mistaking legitimate traffic for an attack is dramatically reduced.

A Multi-Resolution Database Model for Management of Vector Geodata in Vehicle Dynamic Route Guidance System (동적 경로안내시스템에서 벡터 지오데이터의 관리를 위한 다중 해상도 모델)

  • Joo, Yong-Jin;Park, Soo-Hong
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.4
    • /
    • pp.101-107
    • /
    • 2010
  • The aim of this paper is to come up with a methodology of constructing an efficient model for multiple representations which can manage and reconcile real-time data about large-scale roads in Vector Domain. In other words, we suggested framework based on a bottom-up approach, which is allowed to integrate data from the network of the lowest level sequentially and perform automated matching in order to produce variable-scale map. Finally, we applied designed multi-LoD model to in-vehicle application.

A Simulation Study on the Variability Function of the Arrival Process in Queueing Networks (시뮬레이션을 이용한 대기행렬 네트워크 도착과정의 변동성함수에 관한 연구)

  • Kim, Sun-Kyo
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.2
    • /
    • pp.1-10
    • /
    • 2011
  • In queueing network analysis, arrival processes are usually modeled as renewal processes by matching mean and variance. The renewal approximation simplifies the analysis and provides reasonably good estimate for the performance measures of the queueing systems under moderate conditions. However, high variability in arrival process or in service process requires more sophisticated approximation procedures for the variability parameter of departure/arrival processes. In this paper, we propose an heuristic approach to refine Whitt's variability function with the k-interval squared coefficient of variation also known as the index of dispersion for intervals(IDI). Regression analysis is used to establish an empirical relationships between the IDI of arrival process and the IDI of departure process of a queueing system.

Implementation of Path Finding Method using 3D Mapping for Autonomous Robotic (3차원 공간 맵핑을 통한 로봇의 경로 구현)

  • Son, Eun-Ho;Kim, Young-Chul;Chong, Kil-To
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.2
    • /
    • pp.168-177
    • /
    • 2008
  • Path finding is a key element in the navigation of a mobile robot. To find a path, robot should know their position exactly, since the position error exposes a robot to many dangerous conditions. It could make a robot move to a wrong direction so that it may have damage by collision by the surrounding obstacles. We propose a method obtaining an accurate robot position. The localization of a mobile robot in its working environment performs by using a vision system and Virtual Reality Modeling Language(VRML). The robot identifies landmarks located in the environment. An image processing and neural network pattern matching techniques have been applied to find location of the robot. After the self-positioning procedure, the 2-D scene of the vision is overlaid onto a VRML scene. This paper describes how to realize the self-positioning, and shows the overlay between the 2-D and VRML scenes. The suggested method defines a robot's path successfully. An experiment using the suggested algorithm apply to a mobile robot has been performed and the result shows a good path tracking.

The Study on the Automated Detection Algorithm for Penetration Scenarios using Association Mining Technique (연관마이닝 기법을 이용한 침입 시나리오 자동 탐지 알고리즘 연구)

  • 김창수;황현숙
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.371-384
    • /
    • 2001
  • In these days, it is continuously increased to the intrusion of system in internet environment. The methods of intrusion detection can be largely classified into anomaly detection and misuse detection. The former uses statistical methods, features selection method in order to detect intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching. The existing studies for IDS(intrusion detection system) use combined methods. In this paper, we propose a new intrusion detection algorithm combined both state transition analysis and association mining techniques. For the intrusion detection, the first step is generated state table for transmitted commands through the network. This method is similar to the existing state transition analysis. The next step is decided yes or no for intrusion using the association mining technique. According to this processing steps, we present the automated generation algorithm of the penetration scenarios.

  • PDF

Fabrication and Characteristic Analysis of Optical Transceiver for Transmitting IMT-2000 & PCS Wireless Band (IMT-2000 & PCS 무선대역전송용 광 송수신기 제작 및 특성분석)

  • Kim, Chang-Won;Kim, Byeong-Jik;O, Yun-Je;Yang, Gwang-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.7
    • /
    • pp.24-30
    • /
    • 2000
  • In this paper, we proposed an fiber-optic transceivers based on the analog optical transmission techniques of incorporating the SCM (subcarrier multiplexing) and WDM (wavelength-division multiplexing ) method, which can be used to transmission of IMT-2000 and PCS wireless frequency band and analyzed overall those parameters related with fabrication. Especially in the impedance matching network between RF signal and LD, we proposed the method of deriving optimal performance using simulation techniques. In the frequency band of 1.7GHz∼2.25GHz, experimental data for the gain flatness and the noise floor of the optical link were also presented $\pm$1.5dB and -130dBm respectively when the link Rain was 0dB.

  • PDF

Constructing Proteome Reference Map of the Porcine Jejunal Cell Line (IPEC-J2) by Label-Free Mass Spectrometry

  • Kim, Sang Hoon;Pajarillo, Edward Alain B.;Balolong, Marilen P.;Lee, Ji Yoon;Kang, Dae-Kyung
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.6
    • /
    • pp.1124-1131
    • /
    • 2016
  • In this study, the global proteome of the IPEC-J2 cell line was evaluated using ultra-high performance liquid chromatography coupled to a quadrupole Q Exactive Orbitrap mass spectrometer. Proteins were isolated from highly confluent IPEC-J2 cells in biological replicates and analyzed by label-free mass spectrometry prior to matching against a porcine genomic dataset. The results identified 1,517 proteins, accounting for 7.35% of all genes in the porcine genome. The highly abundant proteins detected, such as actin, annexin A2, and AHNAK nucleoprotein, are involved in structural integrity, signaling mechanisms, and cellular homeostasis. The high abundance of heat shock proteins indicated their significance in cellular defenses, barrier function, and gut homeostasis. Pathway analysis and annotation using the Kyoto Encyclopedia of Genes and Genomes database resulted in a putative protein network map of the regulation of immunological responses and structural integrity in the cell line. The comprehensive proteome analysis of IPEC-J2 cells provides fundamental insights into overall protein expression and pathway dynamics that might be useful in cell adhesion studies and immunological applications.

Modeling of 18-Pulse STATCOM for Power System Applications

  • Singh, Bhim;Saha, R.
    • Journal of Power Electronics
    • /
    • v.7 no.2
    • /
    • pp.146-158
    • /
    • 2007
  • A multi-pulse GTO based voltage source converter (VSC) topology together with a fundamental frequency switching mode of gate control is a mature technology being widely used in static synchronous compensators (STATCOMs). The present practice in utility/industry is to employ a high number of pulses in the STATCOM, preferably a 48-pulse along with matching components of magnetics for dynamic reactive power compensation, voltage regulation, etc. in electrical networks. With an increase in the pulse order, need of power electronic devices and inter-facing magnetic apparatus increases multi-fold to achieve a desired operating performance. In this paper, a competitive topology with a fewer number of devices and reduced magnetics is evolved to develop an 18-pulse, 2-level $\pm$ 100MVAR STATCOM in which a GTO-VSC device is operated at fundamental frequency switching gate control. The inter-facing magnetics topology is conceptualized in two stages and with this harmonics distortion in the network is minimized to permissible IEEE-519 standard limits. This compensator is modeled, designed and simulated by a SimPowerSystems tool box in MATLAB platform and is tested for voltage regulation and power factor correction in power systems. The operating characteristics corresponding to steady state and dynamic operating conditions show an acceptable performance.

A Design of Dangerous Sound Detection Engine of Wearable Device for Hearing Impaired Persons (청각장애인을 위한 웨어러블 기기의 위험소리 검출 엔진 설계)

  • Byun, Sung-Woo;Lee, Soek-Pil
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.7
    • /
    • pp.1263-1269
    • /
    • 2016
  • Hearing impaired persons are exposed to the danger since they can't be aware of many dangerous situations like fire alarms, car hones and so on. Therefore they need haptic or visual informations when they meet dangerous situations. In this paper, we design a dangerous sound detection engine for hearing impaired. We consider four dangerous indoor situations such as a boiled sound of kettle, a fire alarm, a door bell and a phone ringing. For outdoor, two dangerous situations such as a car horn and a siren of emergency vehicle are considered. For a test, 6 data sets are collected from those six situations. we extract LPC, LPCC and MFCC as feature vectors from the collected data and compare the vectors for feasibility. Finally we design a matching engine using an artificial neural network and perform classification tests. We perform classification tests for 3 times considering the use outdoors and indoors. The test result shows the feasibility for the dangerous sound detection.