• Title/Summary/Keyword: filter(normal filter)

Search Result 353, Processing Time 0.032 seconds

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.165-174
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated, the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread, and design a logic engine module. Three engines judge attack grades (Attack, Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

Fault Detection and Isolation for the Inverter of BLDC Motor Drive using EKF (EKF를 이용한 BLDC 모터 구동기 인버터의 고장 검출 및 분리)

  • Kim, SunKi;Seong, SangMan;Kang, Kiho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.7
    • /
    • pp.706-712
    • /
    • 2014
  • The inverters used to drive Brushless DC motors (BLDC) include switching devices such as FETs and the faults in FETs cause severe performance degradation in systems where a BLDC acts as actuator. This paper presents a fault detection and isolation method for the FETs of an inverter for BLDC motor control systems, which is based on the EKF (Extended Kalman filter). Firstly, an equivalent circuit model for a BLDC motor plus its inverter system was derived. Secondly, a state-space equation was established, where the on-resistance of the FETs is expressed as a state variable and the EKF equation estimates the on-resistance. If the estimated resistance differs greatly from the known value, it can be asserted that there is a fault on that FET. Thirdly, the local convergence of the established EKF was proved. Finally, through the experiments, the performance of the proposed method was verified. The results show that the on-resistance is estimated close to the value specified in the FET data sheet in normal operation, whereas the estimated resistance is a much larger value than the normal one in case an FET fault occurs. Therefore, it is confirmed that the proposed fault detection and isolation method works appropriately in real systems.

An Edge Directed Color Demosaicing Algorithm Considering Color Channel Correlation (컬러 채널 상관관계를 고려한 에지 방향성 컬러 디모자이킹 알고리즘)

  • Yoo, Du Sic;Lee, Min Seok;Kang, Moon Gi
    • Journal of Broadcast Engineering
    • /
    • v.18 no.4
    • /
    • pp.619-630
    • /
    • 2013
  • In this paper, we propose an edge directed color demosaicing algorithm considering color channel correlation. The proposed method consists of local region classification step and edge directional interpolation step. In the first step, each region of a given Bayer image is classified as normal edge, pattern edge, and flat regions by using intra channel and inter channel gradients. Especially, two criteria and verification process for the normal edge and pattern edge classification are used to reduce edge direction estimation error, respectively. In the second step, edge directional interpolation process is performed according to characteristics of the classified regions. For horizontal and vertical directional interpolations, missing color components are obtained from interpolation equations based on intra channel and inter channel correlations in order to improve the performance of the directional interpolations. The simulation results show that the proposed algorithm outperforms conventional approaches in both objective and subjective terms.

A GCST-based Digital Image Watermarking Scheme (GCST 기반 디지털 영상 워터마킹 방법)

  • Lee, Juck-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.3
    • /
    • pp.142-149
    • /
    • 2012
  • Various image transformations can be used to compress images, to reduce noises in images and to extract useful features. Watermarking techniques using DCT and DWT have been a lot of research interest in the spread of multimedia contents. In this paper, Gabor cosine and sine transform considered as human visual filter is applied to embedding and extraction of watermarks for digital images. The proposed transform is used for watermarking with fifteen attacks. Randomly normal distributed noises are used as an embedded watermark. To measure the similarity between the embedded watermark and extracted one, a correlation value is computed and furthermore is compared with that of existing DCT method. Correlation values of extracted watermark are computed with randomly normal distributed noise sequences, and the sequence with the largest correlation value is declared as the embedded watermark. Frequency components are divided into various bands. Experimental results for low frequency and mid-frequency bands have shown that the proposed GCST provides a good watermarking algorithm and its performance is better than DCT.

ORENTGENOGRAPHIC STUDIES ON THE SOFT TISSUE PROFILE (악안면 연조직에 관한 X선학적 연구)

  • Park Tae Won
    • Journal of Korean Academy of Oral and Maxillofacial Radiology
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 1971
  • Modern orthodontics implies not only occlusal excellence, but also the positioning of teeth to produce optimal facial harmony for the individual patients. Several methods have been used in the study of facial height, width and depth were made from living subjects. These methods, however, complicate to control the subjects, therefore many investigators have used profile cephalometric technics. Practically, cephalometric technics were used m orthodontic treatment, maxillo-facial surgery and anthropometric studies. Author was studied to investigate the normal standards of soft tissue profile in Korean adolescences. The subjects consisted of 53 males and 54 females from 17 to 22 years of age and with normal occlusion and acceptable profile. Aluminum filter was designed to obtain both hard and soft tissue structures on a single film. Eight profile landmarks were plotted and drawn on the tracings of all cephalograms and eighteen depth, height and angles were measured from each landmarks of the cephalograms. The following conclusIOns were obtained from this studies; 1. Total facial convexity was 170. 75 in males and females samples and lower facial and: labiomandibular convexity were each of 141.44, 171.05. 2. Maxillary and mandibular sulcus angulations were 137.61, 129.52 and upper and lower lip inclinations were each of 123.26 and 49.56 in male and females. 3. Soft tissue depth of several points were as follows; Subnasale 18.74㎜ in males and 16.65㎜ in females Pogonion 13.40㎜ in males and 13.07㎜ in females upper lip 14.06㎜ in males and 11.91㎜ in females . lower lip 15.46㎜, 13.63㎜ in males and females 4. The protrusion of nose were 16.28㎜ in males and 15.56㎜ in females 5. The vertical length of upper and lower lips were 25.67㎜, 52.96㎜ and the lip posture was indicated 93.43 per cent (closed state) in centric occlusions.

  • PDF

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Abnormal Step Recognition for Pedestrian Danger Recognition (보행자의 위험인지를 위한 비정상 걸음인식)

  • Ryu, Chang-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1233-1242
    • /
    • 2017
  • Various attempts have been made to prevent crime risk. One of the cases where outdoor pedestrians are attacked by criminals is the abnormal health condition. When a mental or mental condition that can not sustain normal walking due to drunkenness is exposed, the case of being a crime is revealed through crime case analysis. In this study, we propose a method for estimating the state of an individual that can be detected in outdoor activities. In order to avoid the inconvenience of installing a separate terminal for event information transmission of sensors and sensors, it is possible to estimate an abnormal state by using a 3-axis acceleration sensor built in a smart phone. The state of the user can be estimated by analyzing the momentum of the user and analyzing it with the passage of time. It is possible to distinguish the flow of time at regular intervals, to recognize the activity patterns in each time band, and to distinguish between normal and abnormal. In this study, we have evaluated the total amount of kinetic energy and kinetic energy in each direction of the acceleration sensor and the Fourier transformed value of the total energy amount to distinguish the abnormal state.

Gene filtering based on fuzzy pattern matching for whole genome micro array data analysis (마이크로어레이 데이터의 게놈수준 분석을 위한 퍼지 패턴 매칭에 의한 유전자 필터링)

  • Lee, Sun-A;Lee, Keon-Myung;Lee, Seung-Joo;Kim, Wun-Jea;Kim, Yong-June;Bae, Suk-Cheol
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.471-475
    • /
    • 2008
  • Microarray technology in biological science enables molecular level observations and analyses on the biological phenomina by allowing to measure the RNA expression profiles in cells. Microarray data analysis is applied in various purposes such as identifying significant genes which react to drug treatment, understanding the genome scale phenomina. In drug response experiments, the microarray-based gene expression analysis could provide meaningful information. It is sometimes needed to identify the genes which shows different expression behavior for treatment group and normal group each other. When the normal group shows the medium level expression, it is not easy to discriminate the group just by expression level comparison. This paper proposes a method which selects group-wise representative values for each gene and sets the value range of the groups in order to filter out the genes with specific pattern. It also shows some experiment results.

Fault Pattern Extraction Via Adjustable Time Segmentation Considering Inflection Points of Sensor Signals for Aircraft Engine Monitoring (센서 데이터 변곡점에 따른 Time Segmentation 기반 항공기 엔진의 고장 패턴 추출)

  • Baek, Sujeong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.86-97
    • /
    • 2021
  • As mechatronic systems have various, complex functions and require high performance, automatic fault detection is necessary for secure operation in manufacturing processes. For conducting automatic and real-time fault detection in modern mechatronic systems, multiple sensor signals are collected by internet of things technologies. Since traditional statistical control charts or machine learning approaches show significant results with unified and solid density models under normal operating states but they have limitations with scattered signal models under normal states, many pattern extraction and matching approaches have been paid attention. Signal discretization-based pattern extraction methods are one of popular signal analyses, which reduce the size of the given datasets as much as possible as well as highlight significant and inherent signal behaviors. Since general pattern extraction methods are usually conducted with a fixed size of time segmentation, they can easily cut off significant behaviors, and consequently the performance of the extracted fault patterns will be reduced. In this regard, adjustable time segmentation is proposed to extract much meaningful fault patterns in multiple sensor signals. By considering inflection points of signals, we determine the optimal cut-points of time segments in each sensor signal. In addition, to clarify the inflection points, we apply Savitzky-golay filter to the original datasets. To validate and verify the performance of the proposed segmentation, the dataset collected from an aircraft engine (provided by NASA prognostics center) is used to fault pattern extraction. As a result, the proposed adjustable time segmentation shows better performance in fault pattern extraction.