• Title/Summary/Keyword: Matching mechanism

Search Result 145, Processing Time 0.024 seconds

Detection Mechanism of Attacking Web Service DoS using Self-Organizing Map (SOM(Self-Organizing Map)을 이용한 대용량 웹 서비스 DoS 공격 탐지 기법)

  • Lee, Hyung-Woo;Seo, Jong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.9-18
    • /
    • 2008
  • Web-services have originally been devised to share information as open services. In connection with it, hacking incidents have surged. Currently, Web-log analysis plays a crucial clue role in detecting Web-hacking. A growing number of cases are really related to perceiving and improving the weakness of Web-services based on Web-log analysis. Such as this, Web-log analysis plays a central role in finding out problems that Web has. Hence, Our research thesis suggests Web-DoS-hacking detective technique In the process of detecting such problems through SOM algorithm, the emergence frequency of BMU(Best Matching Unit) was studied, assuming the unit with the highest emergence frequency, as abnormal, and the problem- detection technique was recommended through the comparison of what's called BMU as input data.

An Implementation of A Recruiting System for Real-time Communication Matching based on Android Platform (실시간 양방향 의사정합을 위한 안드로이드 리쿠르팅 시스템의 구현)

  • Ihm, Sun-Young;Park, Young-Ho
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.107-114
    • /
    • 2011
  • Recently, interests for recruiting and the rates of using smart phones are growing fast. The paper proposes Recruid, which is a smart phone application based on android platform, that helps real-time communication matching between users. They can use every services of Recruid anywhere and anytime which reflects mobility characteristics of smart phones, and also use additional services on web pages. Recruid provides three main services. First, it provides mobile subscription and submission functionality on high mobility and convenience. Second, it provides group service that user can make their own groups. Last, it also provides reliability evaluation mechanism of activity data in Recruid thus, Recruid provides high credibility to users. The paper presents implementation of Recruid and shows the snapshots of the presented system.

Shear strengthening of seawater sea-sand concrete beams containing no shear reinforcement using NSM aluminum alloy bars

  • Yasin Onuralp Ozkilic;Emrah Madenci;Ahmed Badr;Walid Mansour;Sabry Fayed
    • Steel and Composite Structures
    • /
    • v.51 no.2
    • /
    • pp.153-172
    • /
    • 2024
  • Due to the fast development of constructions in recent years, there has been a rapid consumption of fresh water and river sand. In the production of concrete, alternatives such as sea water and sea sand are available. The near surface mounted (NSM) technique is one of the most important methods of strengthening. Aluminum alloy (AA) bars are non-rusting and suitable for usage with sea water and sand concrete (SSC). The goal of this study was to enhance the shear behaviour of SSC-beams strengthened with NSM AA bars. Twenty-four RC beams were cast from fresh water river sand concrete (FRC) and SSC before being tested in four-point flexure. All beams are the same size and have the same internal reinforcement. The major factors are the concrete type (FRC or SSC), the concrete degree (C25 or C50 with compressive strength = 25 and 50 MPa, respectively), the presence of AA bars for strengthening, the direction of AA bar reinforcement (vertical or diagonal), and the AA bar ratio (0, 0.5, 1, 1.25 and 2 %). The beams' failure mechanism, load-displacement response, ultimate capacity, and ductility were investigated. Maximum load and ductility of C25-FRC-specimens with vertical and diagonal AA bar ratios (1%) were 100,174 % and 140, 205.5 % greater, respectively, than a matching control specimen. The ultimate load and ductility of all SSC-beams were 16-28 % and 11.3-87 % greater, respectively, for different AA bar methods than that of FRC-beams. The ultimate load and ductility of C25-SSC-beams vertically strengthened with AA bar ratios were 66.7-172.7 % and 89.6-267.9 % higher than the unstrengthened beam, respectively. When compared to unstrengthened beams, the ultimate load and ductility of C50-SSC-beams vertically reinforced with AA bar ratios rose by 50-120 % and 45.4-336.1 %, respectively. National code proposed formulae were utilized to determine the theoretical load of tested beams and compared to matching experimental results. The predicted theoretical loads were found to be close to the experimental values.

Collision Tree Based Anti-collision Algorithm in RFID System (RFID시스템에서 충돌 트리 기반 충돌방지 알고리즘)

  • Seo, Hyun-Gon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.316-327
    • /
    • 2007
  • RFID (Radio Frequency Identification) is one of the most promising air interface technologies in the future for object identification using radio wave. If there are multiple tags within the range of the RFID tag reader, all tags send their tag identifications to the reader at the same time in response to the reader's query. This causes collisions on the reader and no tag is identified. A multi-tag identification problem is a core issue in the RFID. It can be solved by anti-collision algorithm such as slot based ALHOA algorithms and tree based algorithms. This paper, proposes a collision tree based anti-collision algorithm using collision tree in RFID system. It is a memory-less algorithm and is an efficient RFID anti-collision mechanism. The collision tree is a mechanism that can solve multi-tag identification problem. It is created in the process of querying and responding between the reader and tags. If the reader broadcasts K bits of prefix to multiple tags, all tags with the identifications matching the prefix transmit the reader the identifications consisted of k+1 bit to last. According to the simulation result, a proposed collision tree based anti-collision algorithm shows a better performance compared to tree working algorithm and query tree algorithm.

Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System (고성능 침입탐지 및 대응 시스템의 구현 및 성능 평가)

  • Kim, Hyeong-Ju;Park, Dae-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.157-162
    • /
    • 2004
  • Recently, the growth of information infrastructure is getting fatter and faster. At the same time, the security accidents are increasing together. We have problem that do not handle traffic because we have the Intrusion Detection Systems in low speed environment. In order to overcome this, we need effective security analysis techniques that ran Processed data of high-capacity because high speed network environment. In this paper we proposed the Gigabit Intrusion Detection System for coordinated security function such as intrusion detection, response on the high speed network. We suggested the detection mechanism in high speed network environment that have pattern matching function based packet header and based packet data that is proceeded in system kernel area, we are shown that this mechanism was excellent until maximum 20 times than existing system in traffic processing performance.

Fuzzy Cluster Based Diagnosis System for Classifying Computer Viruses (컴퓨터 바이러스 분류를 위한 퍼지 클러스터 기반 진단시스템)

  • Rhee, Hyun-Sook
    • The KIPS Transactions:PartB
    • /
    • v.14B no.1 s.111
    • /
    • pp.59-64
    • /
    • 2007
  • In these days, malicious codes have become reality and evolved significantly to become one of the greatest threats to the modern society where important information is stored, processed, and accessed through the internet and the computers. Computer virus is a common type of malicious codes. The standard techniques in anti-virus industry is still based on signatures matching. The detection mechanism searches for a signature pattern that identifies a particular virus or stain of viruses. Though more accurate in detecting known viruses, the technique falls short for detecting new or unknown viruses for which no identifying patterns present. To cope with this problem, anti-virus software has to incorporate the learning mechanism and heuristic. In this paper, we propose a fuzzy diagnosis system(FDS) using fuzzy c-means algorithm(FCM) for the cluster analysis and a decision status measure for giving a diagnosis. We compare proposed system FDS to three well known classifiers-KNN, RF, SVM. Experimental results show that the proposed approach can detect unknown viruses effectively.

QoS Matching Mechanism for Semantic Web Services (시맨틱 웹 서비스를 위한 QoS 매칭 메커니즘)

  • 유소연;유정연;이규철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.43-45
    • /
    • 2004
  • 웹 서비스의 등록, 검색, 조합, 실행을 자동적으로 수행할 수 있도록 웹 서비스에 시맨틱 웹 기술을 적용시킨 것이 시맨틱 웹 서비스(Semantic Web Services)이다. 시맨틱 웹 서비스는 원하는 서비스를 찾으려는 사용자의 노력을 줄이기 위해 기계가 이해할 수 있는 정보를 서비스에 추가시킴으로써 정확하게 원하는 서비스를 찾을 수 있게 해준다. 수많은 서비스들 중 같은 역할을 하는 서비스들이 있을 수가 있다. 그 중 하나의 서비스만을 선택해야 할 때 서비스의 기능이 아닌 질적인 측면에서 QoS(Quality of Service)를 고려하면 최선의 서비스를 선택을 하는데 도움을 줄 수 있다. 따라서 시맨틱 웹 서비스의 검색과 조합의 측면에서 매치메이킹(matchmaking)에 대한 연구의 하나로써 QoS의 매칭에 대한 연구를 수행하게 되었다. 기존의 QoS 매칭과 관련된 연구에서 QoS의 유사도를 계산하는 방법은 QoS 요소의 값의 특성을 반영하지 않는다는 것과 QoS 유사도의 순위가 놓더라도 좋은 서비스라는 것을 의미하지 않는다는 두 가지 문제점을 발견하였다. 따라서 본 논문에서는 기존 연구의 문제점을 해결할 수 있는 방법을 제시하고자 한다. 먼저 기존의 웹 서비스 관련 연구에서 논의된 여러 QoS 모델을 수렴하여 QoS 모델의 요소들을 결정하였다. 그리고 기존 연구의 두 가지 문제점을 해결하기 위해 각 QoS 요소의 표준편차를 이용한 표준 값을 구하여 QoS 요소의 값의 특성을 반영하였다. 또한 매칭 결과 순위가 높은 것이 사용자에게 더 선호되는 좋은 서비스라는 것을 보장하는 메커니즘을 제안하였다.

  • PDF

Appliance identification algorithm using multiple classifier system (다중 분류 시스템을 이용한 가전기기 식별 알고리즘)

  • Park, Yong-Soon;Chung, Tae-Yun;Park, Sung-Wook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.213-219
    • /
    • 2015
  • Real-time energy monitoring systems is a demand-response system which is reported to be effective in saving energy up to 12%. Real-time energy monitoring system is commonly composed of smart-plugs which sense how much electrical power is consumed and IHD(In-Home Display device) which displays power consumption patterns. Even though the monitoring system is effective, users should themselves match which smart plus is connected to which appliance. In order to make the matching work to be automatic, the monitoring system need to have appliance identification algorithm, and some works have made under the name of NILM(Non-Intrusive Load Monitoring). This paper proposed an algorithm which utilizes multiple classifiers to improve accuracy of appliance identification. The algorithm proposes to understand each classifiers performance, that is, when a classifier make a result how much the result is reliable, and utilize it in choosing the final result among result candidates from many classifiers. By using the proposed algorithm this paper make 4.5% of improved accuracy with respect to using single best classifier, and 2.9% of improved accuracy with respect to other method using multiple classifiers, so called CDM(Commitee Decision Mechanism) method.

The Research of Security Vulnerabilities of Smartphone (스마트폰 보안 취약 요소에 따른 분석 연구)

  • Choi, Hee Sik;Cho, Yang Hyun;Joo, Heon Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.119-127
    • /
    • 2013
  • The merits of Smartphone are portability, convenience and especially a lot of information can be stored in the device. Especially in Smartphone, users can install programs that cannot install to normal cell phone and users can use many different services through these Smartphone programs. Also Smartphone can connect to Internet through network, so it can access information anytime, anywhere easily. Security of personal information and variety of information which stored in Smartphone are in risk. In Chapter 2 of thesis, it will discuss the definition and features of the Smartphone and market trends. In Chapter 3 of thesis, it will discuss security vulnerabilities of Smartphone and it will analyze and research security vulnerabilities of Smartphone in Chapter 4. In conclusion, it will check users' identification twice in useful application especially application that relate to finance and mobile payment. By checking users' identification several times, it will help to defend from security threats. Users can use Smartphone safely and convenience by know how to prevent from mobile hacking for personal and private information. the quality of APIs matching by the clustering and hierarchical relationships mechanism.

Broadband metamaterial absorber using resistive layers

  • Kim, Y.J.;Yoo, Y.J.;Hwang, J.S.;Son, H.M.;Rhee, J.Y.;Kim, K.W.;Lee, Y. P.
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2016.02a
    • /
    • pp.359.1-359.1
    • /
    • 2016
  • The electromagnetic (EM) properties of media, such as propagation, focusing and scattering, strongly rely on the electric permittivity and the magnetic permeability of media. Recently, artificially-created metamaterials (MMs) composed of periodically-arranged unit cells with tailored electric permittivity and magnetic permeability have drawn wide interest due to their capability of adjusting the EM response. MM absorbers using the conventional sandwich structures usually have very high absorption at a certain frequency, and the absorption properties of MMs can be adjusted simply by changing the geometrical parameters of unit cell. In this work, we suggested an incident-angle-independent broadband perfect absorber based on resistive layers. We analyze the absorption mechanism based on the impedance matching with the free space and the distribution of surface currents at specific frequencies. From the simulation, the absorption was expected to be higher than 96% in 1.4-6.0 GHz. The corresponding experimental absorption was found to be higher than 96% in 1.4-4.0 GHz, and the absorption turned out to be slightly lower than 96% in 4.0-6.0 GHz owing to the irregularity in the thickness of resistive layers.

  • PDF