• Title/Summary/Keyword: Verification Software

Search Result 952, Processing Time 0.028 seconds

Comparison of HMM and SVM schemes in detecting mobile Botnet (모바일 봇넷 탐지를 위한 HMM과 SVM 기법의 비교)

  • Choi, Byungha;Cho, Kyungsan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.4
    • /
    • pp.81-90
    • /
    • 2014
  • As mobile devices have become widely used and developed, PC based malwares can be moving towards mobile-based units. In particular, mobile Botnet reuses powerful malicious behavior of PC-based Botnet or add new malicious techniques. Different from existing PC-based Botnet detection schemes, mobile Botnet detection schemes are generally host-based. It is because mobile Botnet has various attack vectors and it is difficult to inspect all the attack vector at the same time. In this paper, to overcome limitations of host-based scheme, we compare two network-based schemes which detect mobile Botnet by applying HMM and SVM techniques. Through the verification analysis under real Botnet attacks, we present detection rates and detection properties of two schemes.

The Production of CD-ROM for the Class and the Development of Effective Master Plan Applied by It -In the Point of Wearing Korean Traditioinal Costume for First Grade of Junior Middle School Students in Home Economics Teaching- (수업용 CD-ROM 제작 및 이를 적용시킨 효과적인 학습지도안 개발 -중학교 1학년 가정 한복 입기를 중심으로-)

  • 이은선;김병미
    • Journal of Korean Home Economics Education Association
    • /
    • v.11 no.2
    • /
    • pp.13-26
    • /
    • 1999
  • The goals of this research are for producing and optimizing the CD-ROM, effective and practical Teaching-Learning method. It consists of Wearing Korean Traditional Costume for the First Grade of Middle School Students in Home Economics Teaching. This research’s summarization is following. First, the multi-media material. CD-ROM making use of Powerpoint. Wearing Korean Traditional Costume, is produced to help the students learn the difficult contents in terms of video and audio. Second, it is introduced the model of Open Education for increasing the efficiency of class. Third, it is developed to proceed the class with the CD-ROM and small group study of place activity. Fourth, it helps students concentrate on the class with proper sound effect whenever the slide films are changed. And it helps to link the web sites related to Korean Traditional Costume. Finally, another kinds of suggestions are following. The effective verification of this software that is tested and applied at the field for a given period will be necessary. And, it is necessary to upgrade for the CD-ROM and the supplementary teaching materials in Korean Traditional Costume education.

  • PDF

Current status and application of Photogrammetry (사진측정기의 동향 및 응용사례)

  • Choi, Jung-Su;Park, Eung-Sik;Kim, Hyung-Wan;Yoon, Yong-Sik
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.6 no.2
    • /
    • pp.80-89
    • /
    • 2008
  • Photogrammetry is a non-direct 3-dimensional coordinate measurement technique using 2-dimensional photographic images. For reconstruction 3-dimensional data from the 2-dimensional photos, photogrammetry uses the fundamental principle of triangulation. Digital photogrammetry solve for the camera location and coordinates simultaneously through the mapping, scaling and bundle processing in software processing. In this paper, several applications for photogrammetry measurement are introduced, such as 'photogrammetric measurement of the gravity deformation of a cassegrain type antenna', 'analysis of photogrammetry data from ISIM mockup', 'underwater photogrammetric verification of nuclear fuel assemblies', 'spacecraft optical bench measurement' and 'spacecraft ground support equipment measurement'.

  • PDF

Formant Measurements of Complex Waves and Vowels Produced by Students (복합음과 대학생이 발음한 모음 포먼트 측정)

  • Yang, Byung-Gon
    • Speech Sciences
    • /
    • v.15 no.3
    • /
    • pp.39-51
    • /
    • 2008
  • Formant measurements are one of the most important factors to objectively test cross-linguistic differences among vowels produced by speakers of any given languages. However, many speech analysis softwares present erroneous estimates and some researchers use them without any verification procedures. The purposes of this paper are to examine formant measurements of complex waves which were synthesized from the average formant values of five Korean vowels using three default methods in Praat and to verify the measured values of the five vowels produced by 20 students using one of the methods. Variances along the time axis are discussed after determining absolute difference sum from the 1/3 vowel duration point. Results show that there were smaller measurement errors by the burg method. Also, greater errors were observed in the sl or lpc methods mostly caused by the inappropriate formant settings. Formant measurement deviations were greater in those vowels produced by the female students than those of the male students, which were mostly attributed to the settings for the vowels /o, u/. Formant settings can best be corrected by changing the number of formants to the number of visible dark bands on the spectrogram. Those results suggest that researchers should check the validity of the estimates from the speech analysis software. Further studies are recommended on the perception test of the original sound with the synthesized sound by the estimated formant values.

  • PDF

Depth Controller Design using Fuzzy Gain Scheduling Method of a Autonomous Underwater Vehicle - Verification by HILS (퍼지 이득 스케쥴링 기법을 이용한 무인 잠수정의 심도제어기 설계 - HILS 검증)

  • Hwang, Jong-Hyon;Park, Sewon;Kim, Moon-Hwan;Lee, Sang-Young;Hong, Sung Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.9
    • /
    • pp.791-796
    • /
    • 2013
  • This paper proposes a fuzzy logic gain scheduling method for depth controller of the AUV (Autonomous Underwater Vehicle). Gains of depth controller are calculated by using multi-loop root locus technique. Fuzzy logic based gain scheduling approach is used to modify multi-loop gains as control condition. It is illustrated by simulations that the proposed fuzzy logic gain scheduling method yields smaller rising time and overshoot compared to the fixed-gain controller. Finally, being implemented on real hardwares, all the proposed algorithms are validated with integrations of hardware and software altogether by HILS.

Photometric Reverberation Mapping of Active Galactic Nuclei with Medium-band filters and LSGT

  • Kim, Joonho;Im, Myungshin;Choi, Changsu
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.2
    • /
    • pp.73.1-73.1
    • /
    • 2017
  • Reverberation mapping is one of the best way to investigate structure and kinematics of broad-line regions around central supermassive black holes of active galactic nuclei (AGN). It is usually used to estimate masses of supermassive black holes. So far, reverberation mapping studies have achieved good results for dozens of AGN by spectroscopic monitoring. However, spectroscopic monitoring is time consuming and high cost. Here, we present result of photometric reverberation mapping with medium-band observation. We monitored five nearby AGN which are already studied, have short time-lag, and show bright H-alpha emission lines. Observation has been performed for ~3 months with ~3 days cadence using three medium-band filters installed in LSGT (Lee Sang Gak Telescope). We found 0.01-0.06 magnitude variations by differential photometry. Also time-lags between continuum light-curves and H-alpha emission line light-curves are calculated using Javelin software. The result shows that our study and previous studies are consistent within uncertainty range. From verification of availability in this study, photometric reverberation mapping could be used as a powerful tool to measure central supermassive black holes for large samples and high-redshift AGN in the future.

  • PDF

Influence of sharp stiffness variations in damage evaluation using POD and GSM

  • Thiene, M.;Galvanetto, U.;Surace, C.
    • Smart Structures and Systems
    • /
    • v.14 no.4
    • /
    • pp.569-594
    • /
    • 2014
  • Damage detection methods based on modal analysis have been widely studied in recent years. However the calculation of mode shapes in real structures can be time consuming and often requires dedicated software programmes. In the present paper the combined application of proper orthogonal decomposition and gapped smoothing method to structural damage detection is presented. The first is used to calculate the dynamic shapes of a damaged structural element using only the time response of the system while the second is used to derive a reference baseline to which compare the data coming from the damaged structure. Experimental verification is provided for a beam case while numerical analyses are conducted on plates. The introduction of a stiffener on a plate is investigated and a method to distinguish its influence from that of a defect is presented. Results highlight that the derivatives of the proper orthogonal modes are more effective damage indices than the modes themselves and that they can be used in damage detection when only data from the damaged structure are available. Furthermore the stiffened plate case shows how the simple use of the curvature is not sufficient when analysing complex components. The combined application of the two techniques provides a possible improvement in damage detection of typical aeronautical structures.

Custom system design and verification using ARM Cortex-M0 DesignStart (ARM Cortex-M0 DesignStart를 활용한 커스텀 시스템 설계 및 검증)

  • Lee, Sungryoung;Yoo, Hoyoung
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.486-491
    • /
    • 2020
  • ARM Cortex-M0 DesignStart provided by ARM is cost-free design development suit targeting for designing and prototyping SoC with Cortex-M0 core. In this paper, we presents a method how to implement a custom system design using ARM Cortex-M0 DesignStart. First, hardware elements for ARM Cortex-M0 DesginStart is analyzed focusing on bus and memory map, and next software toolchain is explained to clarify the translating process from high level language to binary machine language. As an example of the custom system, UART system operated with Cortex-M0 is designed and simulated.

A Belay Prevention Algorithm of Cardiac Depolarization Wave Detection for Pacemakers or Automatic Implantable Cardioverter/Defibrillator (AICD) (이식용 심장박동기(Pacemaker) 및 심장 세동제거기 (AICD)를 위한 심장 탈분극파 검출지연 방지 알고리즘)

  • Kim, J.K.;Park, C.K.;Han, S.H.;Cho, B.S.;Huh, W.
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.1063-1066
    • /
    • 1999
  • The delay of cardiac depolarization wave detection in the conventional pacemakers or AICD (automatic implantable cardioverter/ defibrillator, or ICD) has been overlooked. However, it is known that the delay may cause hemodynamic problems and may prevent the proper operation of a new automatic feature, automatic capture verification, that is to be appeared in the near-future devices. In order to reduce the effects of the delay, a delay prevention algorithm was developed and tested by applying three human electrograms. The algorithm set the sensing threshold just above the measured noise level to reduce the detection delay. It is found that the low threshold was able to reduce the delay by 20msec(average) In most cases. The implementation results showed reliability and efficacy of the algorithm, and the algorithm could be applicable to the existing hardware and software of the conventional pacemakers and AICD without any significant modifications.

  • PDF

Anomaly Detection Scheme of Web-based attacks by applying HMM to HTTP Outbound Traffic (HTTP Outbound Traffic에 HMM을 적용한 웹 공격의 비정상 행위 탐지 기법)

  • Choi, Byung-Ha;Choi, Sung-Kyo;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.33-40
    • /
    • 2012
  • In this paper we propose an anomaly detection scheme to detect new attack paths or new attack methods without false positives by monitoring HTTP Outbound Traffic after efficient training. Our proposed scheme detects web-based attacks by comparing tags or javascripts of HTTP Outbound Traffic with normal behavioral models which apply HMM(Hidden Markov Model). Through the verification analysis under the real-attacked environment, we show that our scheme has superior detection capability of 0.0001% false positive and 96% detection rate.