• Title/Summary/Keyword: Probability of Detection

Search Result 1,124, Processing Time 0.026 seconds

The Effectiveness of Independent Verification and Validation of Safety-critical Aviation Systems (항공 안전 필수 시스템에 대한 독립적 검증 및 확인의 효과도 분석)

  • Kim, Young-Hoon;Yoo, Beong-Seon;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.2
    • /
    • pp.155-162
    • /
    • 2017
  • In recent years, aviation-related safety-critical systems have been developed in Korea, but these products have not satisfied the specified requirements and thus have not been commercialized or commercialized. Due to increasing complexity of the modern aviation system, traditional verification and validation techniques are not sufficient to identify and reduce latent risks in the system. To overcome this shortcoming, a new method which is called 'Independent verification and validation (IV&V)' is suggested. However, academic researches on the effectiveness of this independent verification and validation have not been conducted domestically, and it is performed very rarely even overseas. Therefore, in this paper, we investigated the application of independent verification and validation of the safety-critical aviation systems performed by advanced aviation organizations, and analyzed various positive effects on projects. As a result of the analysis, IV&V shows that early error detection rate is increased, potential risk is mitigated early, and the complex reworking probability, which appears later in the development life cycle, is reduced, greatly preventing the development schedule and costs from increasing.

Development of Anti-Spoofing Equipment Architecture and Performance Evaluation Test System

  • Jung, Junwoo;Park, Sungyeol;Hyun, Jongchul;Kang, Haengik;Song, Kiwon;Kim, Kapjin;Park, Youngbum
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.7 no.3
    • /
    • pp.127-138
    • /
    • 2018
  • Spoofing attacks including meaconing can provide a bogus position to a victim GPS receiver, and those attacks are notably difficult to detect at the point of view on the receiver. Several countermeasure techniques have been studied to detect, classify, and cancel the spoofing signals. Based on the countermeasure techniques, we have developed an anti-spoofing equipment that detects and mitigates or eliminates the spoofing signal based on raw measurements. Although many anti-spoofing techniques have been studied in the literatures, the evaluation test system is not deeply studied to evaluate the anti-spoofing equipment, which includes detection, mitigation, and elimination of spoofing signals. Each study only has a specific test method to verify its anti-spoofing technique. In this paper, we propose the performance evaluation test system that includes both spoofing signal injection system and its injection scenario with the constraints of stand-alone anti-spoofing techniques. The spoofing signal injection scenario is designed to drive a victim GPS receiver that moves to a designed position, where the mitigation and elimination based anti-spoofing algorithms can be successively evaluated. We evaluate the developed anti-spoofing equipment and a commercial GPS receiver using our proposed performance evaluation test system. Although the commercial one is affected by the test system and moves to the designed position, the anti-spoofing equipment mitigates and eliminates the injected spoofing signals as planned. We evaluate the performance of anti-spoofing equipment on the position error of the circular error probability, while injecting spoofing signals.

Iterative Phase estimation based on Turbo code (터보부호를 이용한 반복 위상 추정기법)

  • Ryu, Joong-Gon;Heo, Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.1-8
    • /
    • 2006
  • In this paper, we propose carrier phase synchronization algorithm which are base on turbo coded system for DVB-RCS. There have been two categories of phase estimator, single estimator outside turbo code decoder and multiple estimators inside turbo code decoder. In single estimator, we use the estimation algorithm that ML(Maximum Likelihood) and LMS(Least Mean Square), also three different soft decision methods are proposed. Multiple estimator apply PSP(Per Survivor Processing) algorithm additionally. We compared performance between single estimator and Multiple estimator in AWGN channel. We presented the two methods of PSP algorithm for performance elevation. First is the Bi-directional channel estimation and second is binding method.

Noise Removal Algorithm for Accurate Mean Arterial Pressure Measurement in Pressurized Oscillometric Method (가압식 오실로메트릭 측정법에서 정확한 평균 동맥압 측정을 위한 노이즈 제거 알고리즘)

  • Joh, In-hee;Lim, Jung-hyun;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.184-187
    • /
    • 2018
  • The most important factor in the prevention and treatment of cerebral infarction is to increase cerebral blood flow. Methods for increasing cerebral blood flow include drug-based methods, the surgery, invasive procedures directly inserting medical devices into the artery(NeuroFloTM) and so on. The noninvasive cerebral blood flow increasing device proposed in this paper can reduce the burden on the patient because the probability of complication is low and the treatment level can be determined according to the blood pressure state of the patient. In implementing such a noninvasive cerebral blood flow increasing device, it is important to measure the accurate mean arterial pressure for provision the appropriate level of treatment for the patient. Therefore, to remove a noise, analog and digital filters were used and algorithm for peak value detection, pump control algorithms and so on were.

  • PDF

Iris Detection at a Distance by Non-volunteer Method (비강압적 방법에 의한 원거리에서의 홍채 탐지 기법)

  • Park, Kwon-Do;Kim, Dong-Su;Kim, Jeong-Min;Song, Young-Ju;Koh, Seok-Joo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.705-708
    • /
    • 2018
  • Among biometrics commercialized for security, iris recognition technology has the most excellent security for the probability of the match between individuals is the lowest. Current commercialized iris recognition technology has excellent recognition ability, but this technology has a fatal drawback. Without the user's active cooperation, it cannot recognize the iris correctly. To make up for this weakness, recent trend of iris recognition development mounts a non-volunteering, unconstrained method. According to this information, the objective of this research is developing a module that can identify people iris from a video acquired by high performance infrared camera in a range of 3m and in a involuntary way. For this, we import images from the video and find people's face and eye positions from the images using Haar classifier trained through Cascade training method. finally, we crop the iris by Hough circle transform and compare it with data from the database to identify people.

  • PDF

Effective Cooperative FFT based pilot Sensing Scheme for Detecting DTV Signals in Cognitive Radio (인지무선 시스템에서 DTV 신호 검출을 위한 FFT 기반의 협력 파일럿 센싱)

  • Lee, So-Young;Kim, Eun-Cheol;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.1
    • /
    • pp.27-33
    • /
    • 2010
  • Cognitive radio (CR), which is proposed as a technology that utilizes the frequency resources effectively, has been studied to relive scarcity of the frequency resources. Also, FCC revises the regulation to reuse the TV white spaces for applying CR system and allows to use the TV white spaces by CR devices and use of CR device may be regularized after conversion by DTV in 2009. In order to reuse the TV bands without harmful interference to primary user, correct spectrum sensing should be needed to detect DTV signals that is the primary user in TV bands. In this paper, we detect the DTV signal using FFT-based pilot sensing and cooperative sensing scheme is applied for the reliability of the sensing performance and the accuracy of the detection probability. Also, in order to make the reliable decision, the majority rule is proposed.

A Collision Compensation Method for CSMA/CR Protocol in Wireless LAN (포화상태인 무선랜 네트워크에서 Carrier Sensing Multiple Access with Collision Resolution (CSMA/CR) 프로토콜의 실용화를 위한 충돌 보상 방법)

  • Kim, Ji-in;Park, Byung-hyun;Kwon, YongHo;Rhee, Byung Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1033-1036
    • /
    • 2013
  • A study about collision resolution is needed because huge file, video and multimedia information are transmitted to wireless LAN. CSMA/CR protocol guarantees fairness, but doesn't consider QoS. To practicalize CSMA/CR protocol in saturation fully-connected single hop network environments, this paper proposes method of collision compensation. previous CSMA/CR protocol chooses CR Slot only considering fairness, but this paper chooses front CR Slot for compensation of collision to station experiencing collisions. The station transmits jam signal and has channel priority of transmission. So transmitting efficiency and successful transmission probability rise. This proposed simple method can offer benefit to station experiencing collisions without additional hardware cost.

  • PDF

Accuracy Comparisons between Traditional Adjustment and Least Square Method (최소제곱법을 적용한 지적도근점측량 계산의 정확도 분석)

  • Lee, Jong-Min;Jung, Wan-Suk;Lee, Sa-Hyung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.2
    • /
    • pp.117-130
    • /
    • 2015
  • A least squares method for adjusting the horizontal network satisfies the conditions which is minimizing the sum of the squares of errors based on probability theory. This research compared accuracy of 3rd cadastral control points adjusted by traditional and least square method with respect to the result of Network-RTK. Test results showed the least square method more evenly distribute closure error than traditional method. Mean errors of least square and traditional adjusting method are 2.7cm, 2.2cm respectively. In addition, blunder in angle observations can be detected by comparing position errors which calculated by forward and backward initial coordinates. However, distance blunder cannot offer specific observation line occurred mistake because distance error propagates several observation lines which have similar directions.

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.

Developing of Text Plagiarism Detection Model using Korean Corpus Data (한글 말뭉치를 이용한 한글 표절 탐색 모델 개발)

  • Ryu, Chang-Keon;Kim, Hyong-Jun;Cho, Hwan-Gue
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.231-235
    • /
    • 2008
  • Recently we witnessed a few scandals on plagiarism among academic paper and novels. Plagiarism on documents is getting worse more frequently. Although plagiarism on English had been studied so long time, we hardly find the systematic and complete studies on plagiarisms in Korean documents. Since the linguistic features of Korean are quite different from those of English, we cannot apply the English-based method to Korean documents directly. In this paper, we propose a new plagiarism detecting method for Korean, and we throughly tested our algorithm with one benchmark Korean text corpus. The proposed method is based on "k-mer" and "local alignment" which locates the region of plagiarized document pairs fast and accurately. Using a Korean corpus which contains more than 10 million words, we establish a probability model (or local alignment score (random similarity by chance). The experiment has shown that our system was quite successful to detect the plagiarized documents.