• Title/Summary/Keyword: Performance Enhanced Model

Search Result 629, Processing Time 0.026 seconds

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.

Atmospheric Correction of Sentinel-2 Images Using Enhanced AOD Information

  • Kim, Seoyeon;Lee, Yangwon
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.1
    • /
    • pp.83-101
    • /
    • 2022
  • Accurate atmospheric correction is essential for the analysis of land surface and environmental monitoring. Aerosol optical depth (AOD) information is particularly important in atmospheric correction because the radiation attenuation by Mie scattering makes the differences between the radiation calculated at the satellite sensor and the radiation measured at the land surface. Thus, it is necessary to use high-quality AOD data for an appropriate atmospheric correction of high-resolution satellite images. In this study, we examined the Second Simulation of a Satellite Signal in the Solar Spectrum (6S)-based atmospheric correction results for the Sentinel-2 images in South Korea using raster AOD (MODIS) and single-point AOD (AERONET). The 6S result was overall agreed with the Sentinel-2 level 2 data. Moreover, using raster AOD showed better performance than using single-point AOD. The atmospheric correction using the single-point AOD yielded some inappropriate values for forest and water pixels, where as the atmospheric correction using raster AOD produced stable and natural patterns in accordance with the land cover map. Also, the Sentinel-2 normalized difference vegetation index (NDVI) after the 6S correction had similar patterns to the up scaled drone NDVI, although Sentinel-2 NDVI had relatively low values. Also, the spatial distribution of both images seemed very similar for growing and harvest seasons. Future work will be necessary to make efforts for the gap-filling of AOD data and an accurate bi-directional reflectance distribution function (BRDF) model for high-resolution atmospheric correction. These methods can help improve the land surface monitoring using the future Compact Advanced Satellite 500 in South Korea.

TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs

  • Zhang, Wenbo;Chen, Lin;Su, Hengtao;Wang, Yin;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3438-3457
    • /
    • 2022
  • As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.

Algorithm for Improving Visibility under Ambient Lighting Using Deep Learning (딥러닝을 이용한 외부 조도 아래에서의 시인성 향상 알고리즘)

  • Lee, Hee Jin;Song, Byung Cheol
    • Journal of Broadcast Engineering
    • /
    • v.27 no.5
    • /
    • pp.808-811
    • /
    • 2022
  • Display under strong ambient lighting is perceived darker than it really is. Existing techniques for solving the problem in terms of software show limitations in that image enhancement techniques are applied regardless of ambient lighting or chrominance is not improved compared to luminance. Therefore, this paper proposes a visibility enhancement algorithm using deep learning to adaptively respond to ambient lighting values and an equation to restore optimal chrominance for luminance. The algorithm receives an ambient lighting value with the input image, and then applies a deep learning model and chrominance restoration equation to generate an image to minimize the difference between the degradation modeling of enhanced image and the input image. Qualitative evaluation proves that the algorithm shows excellent performance in improving visibility under strong ambient lighting through comparison of images applied with degradation modeling.

Performance Analysis of Various Activation Functions in Super Resolution Model (초해상화 모델의 활성함수 변경에 따른 성능 분석)

  • Yoo, YoungJun;Kim, DaeHee;Lee, JaeKoo
    • Annual Conference of KIPS
    • /
    • 2020.05a
    • /
    • pp.504-507
    • /
    • 2020
  • ReLU(Rectified Linear Unit) 함수는 제안된 이후로 대부분의 깊은 인공신경망 모델들에서 표준 활성함수로써 지배적으로 사용되었다. 이후에 ReLU 를 대체하기 위해 Leaky ReLU, Swish, Mish 활성함수가 제시되었는데, 이들은 영상 분류 과업에서 기존 ReLU 함수 보다 향상된 성능을 보였다. 따라서 초해상화(Super Resolution) 과업에서도 ReLU 를 다른 활성함수들로 대체하여 성능 향상을 얻을 수 있는지 실험해볼 필요성을 느꼈다. 본 연구에서는 초해상화 과업에서 안정적인 성능을 보이는 EDSR(Enhanced Deep Super-Resolution Network) 모델의 활성함수들을 변경하면서 성능을 비교하였다. 결과적으로 EDSR 의 활성함수를 변경하면서 진행한 실험에서 해상도를 2 배로 변환하는 경우, 기존 활성함수인 ReLU 가 실험에 사용된 다른 활성함수들 보다 비슷하거나 높은 성능을 보였다. 하지만 해상도를 4 배로 변환하는 경우에서는 Leaky ReLU 와 Swish 함수가 기존 ReLU 함수대비 다소 향상된 성능을 보임을 확인하였다. 구체적으로 Leaky ReLU 를 사용했을 때 기존 ReLU 보다 영상의 품질을 정량적으로 평가할 수 있는 PSNR 과 SSIM 평가지표가 평균 0.06%, 0.05%, Swish 를 사용했을 때는 평균 0.06%, 0.03%의 성능 향상을 확인할 수 있었다. 4 배의 해상도를 높이는 초해상화의 경우, Leaky ReLU 와 Swish 가 ReLU 대비 향상된 성능을 보였기 때문에 향후 연구에서는 다른 초해상화 모델에서도 성능 향상을 위해 활성함수를 Leaky ReLU 나 Swish 로 대체하는 비교실험을 수행하는 것도 필요하다고 판단된다.

A Comparative Study on the Service Characteristics for Transferring Process of High-Speed Rail and Domestic Airline Systems by Using Structural Equation Modeling (공분산구조분석을 이용한 고속철도와 국내항공의 이동단계별 서비스특성 비교연구)

  • Kim, Tae Ho;Jeong, Kwang Seop;Park, Je Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.2D
    • /
    • pp.183-190
    • /
    • 2009
  • In order to improve continuous success and stabilization of high-speed rail in the future, Using Frequency of high-speed rail should be enhanced by improving satisfaction of high-speed rail passenger. High-speed rail is needed to hold the priority in competition means by comparing the traits of service of domestic air lines. This study utilizes structural equation modeling to develop model for estimating factors influencing to service through conducting survey questionnaire. It also uses reliability analysis, correlation analysis, factor analysis to examine the rationalization of items and to establish hypothesis of this research. The results show that KTX contains 'inner service' item that is considered to be ameliorated and that domestic airline present low performance of 'outer service' item. In other words, moving section which partly is under a limited condition is needed to be improved. In addition, access to airport and transfer to other transportations have to be improved as they show the lowest satisfaction.

The crack propagation of fiber-reinforced self-compacting concrete containing micro-silica and nano-silica

  • Moosa Mazloom;Amirhosein Abna;Hossein Karimpour;Mohammad Akbari-Jamkarani
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.495-511
    • /
    • 2023
  • In this research, the impact of micro-silica, nano-silica, and polypropylene fibers on the fracture energy of self-compacting concrete was thoroughly examined. Enhancing the fracture energy is very important to increase the crack propagation resistance. The study focused on evaluating the self-compacting properties of the concrete through various tests, including J-ring, V-funnel, slump flow, and T50 tests. Additionally, the mechanical properties of the concrete, such as compressive and tensile strengths, modulus of elasticity, and fracture parameters were investigated on hardened specimens after 28 days. The results demonstrated that the incorporation of micro-silica and nano-silica not only decreased the rheological aspects of self-compacting concrete but also significantly enhanced its mechanical properties, particularly the compressive strength. On the other hand, the inclusion of polypropylene fibers had a positive impact on fracture parameters, tensile strength, and flexural strength of the specimens. Utilizing the response surface method, the relationship between micro-silica, nano-silica, and fibers was established. The optimal combination for achieving the highest compressive strength was found to be 5% micro-silica, 0.75% nano-silica, and 0.1% fibers. Furthermore, for obtaining the best mixture with superior tensile strength, flexural strength, modulus of elasticity, and fracture energy, the ideal proportion was determined as 5% micro-silica, 0.75% nano-silica, and 0.15% fibers. Compared to the control mixture, the aforementioned parameters showed significant improvements of 26.3%, 30.3%, 34.3%, and 34.3%, respectively. In order to accurately model the tensile cracking of concrete, the authors used softening curves derived from an inverse algorithm proposed by them. This method allowed for a precise and detailed analysis of the concrete under tensile stress. This study explores the effects of micro-silica, nano-silica, and polypropylene fibers on self-compacting concrete and shows their influences on the fracture energy and various mechanical properties of the concrete. The results offer valuable insights for optimizing the concrete mix to achieve desired strength and performance characteristics.

Analysis of Piezoresistive Properties of Cement Composites with Fly Ash and Carbon Nanotubes Using Transformer Algorithm (트랜스포머 알고리즘을 활용한 탄소나노튜브와 플라이애시 혼입 시멘트 복합재료의 압저항 특성 분석)

  • Jonghyeok Kim;Jinho Bang;Haemin Jeon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.36 no.6
    • /
    • pp.415-421
    • /
    • 2023
  • In this study, the piezoresistive properties of cementitious composites enhanced with carbon nanotubes for improved electrical conductivity were analyzed using a deep learning-based transformer algorithm. Experimental execution was performed in parallel for acquisition of training data. Previous studies on mixture design, specimen fabrication, chemical composition analysis, and piezoresistive performance testing are also reviewed in this paper. Notably, specimens in which fly ash substituted 50% of the binder material were fabricated and evaluated in this study, in addition to carbon nanotube-infused specimens, thereby exploring the potential enhancement of piezoresistive characteristics in conductive cementitious materials. The experimental results showed more stable piezoresistive responses in specimens with fly-ash substituted binder. The transformer model was trained using 80% of the gathered data, with the remaining 20% employed for validation. The analytical outcomes were generally consistent with empirical measurements, yielding an average absolute error and root mean square error between 0.069 to 0.074 and 0.124 to 0.132, respectively.

Improvement and Educational Effectiveness of Fashion Consumption Trend Analysis Class Based on IC-PBL (IC-PBL 기반의 패션 소비트렌드 분석 수업 개선 및 교육적 효과)

  • Jaekyong Lee
    • Journal of Fashion Business
    • /
    • v.27 no.5
    • /
    • pp.121-134
    • /
    • 2023
  • With the development of information and communication technology, interest in new educational approaches that can enhance the learning performance of learners with improved information literacy skills is increasing, and universities are actively promoting educational innovation to foster the talents required by society. In the field of fashion studies education, which is closely related to the fashion industry, there is a strong need to develop field-linked educational programs that reflect the trends in the industry and changes in the educational system. The purpose of this study was to introduce industry-coupled problem-based learning (IC-PBL) to the course "Understanding Fashion Consumption Trends" for non-fashion majors to reflect the current needs and strengthen the educational effectiveness of the learners through a survey. A seven-step curriculum (introduction to the class, practitioner's problem, learner's problem analysis, organizing concepts related to variables, information collection and scenario writing, presentation and scenario proposal, and evaluation) not only enhanced learners' understanding of fashion consumption trends and the fashion industry but also greatly amplified learners' satisfaction with the class. The results of the survey showed that the seven-step curriculum was effective in increasing learners' self-directed learning ability, problem-solving ability, and confidence in learning. Self-directed learning ability was stronger than other factors, consistent with the core principle of problem-based learning to empower learners to take the initiative and promote self-directed learning. Each factor analyzed was positively correlated.

Design and Implementation of a ML-based Detection System for Malicious Script Hidden Corrupted Digital Files (머신러닝 기반 손상된 디지털 파일 내부 은닉 악성 스크립트 판별 시스템 설계 및 구현)

  • Hyung-Woo Lee;Sangwon Na
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.1-9
    • /
    • 2023
  • Malware files containing concealed malicious scripts have recently been identified within MS Office documents frequently. In response, this paper describes the design and implementation of a system that automatically detects malicious digital files using machine learning techniques. The system is proficient in identifying malicious scripts within MS Office files that exploit the OLE VBA macro functionality, detecting malicious scripts embedded within the CDH/LFH/ECDR internal field values through OOXML structure analysis, and recognizing abnormal CDH/LFH information introduced within the OOXML structure, which is not conventionally referenced. Furthermore, this paper presents a mechanism for utilizing the VirusTotal malicious script detection feature to autonomously determine instances of malicious tampering within MS Office files. This leads to the design and implementation of a machine learning-based integrated software. Experimental results confirm the software's capacity to autonomously assess MS Office file's integrity and provide enhanced detection performance for arbitrary MS Office files when employing the optimal machine learning model.