• Title/Summary/Keyword: goal detection

Search Result 292, Processing Time 0.022 seconds

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

Optimal sensor placement for bridge damage detection using deflection influence line

  • Liu, Chengyin;Teng, Jun;Peng, Zhen
    • Smart Structures and Systems
    • /
    • v.25 no.2
    • /
    • pp.169-181
    • /
    • 2020
  • Sensor placement is a crucial aspect of bridge health monitoring (BHM) dedicated to accurately estimate and locate structural damages. In addressing this goal, a sensor placement framework based on the deflection influence line (DIL) analysis is here proposed, for the optimal design of damage detection-oriented BHM system. In order to improve damage detection accuracy, we explore the change of global stiffness matrix, damage coefficient matrix and DIL vector caused by structural damage, and thus develop a novel sensor placement framework based on the Fisher information matrix. Our approach seeks to determine the contribution of each sensing node to damage detection, and adopts a distance correction coefficient to eliminate the information redundancy among sensors. The proposed damage detection-oriented optimal sensor placement (OSP) method is verified by two examples: (1) a numerically simulated three-span continuous beam, and (2) the Pinghu bridge which has existing real damage conditions. These two examples verify the performance of the distance corrected damage sensitivity of influence line (DSIL) method in significantly higher contribution to damage detection and lower information redundancy, and demonstrate the proposed OSP framework can be potentially employed in BHM practices.

The Significance of the Analytical Sciences In Environmental Assessment

  • Chung, Yong;Ahn, Hye-Won
    • Analytical Science and Technology
    • /
    • v.8 no.4
    • /
    • pp.1079-1087
    • /
    • 1995
  • The quality of human life is directly related to the quality of the environment. To assess environmental quality we must first determine the MCLG(Maximum Contaminant Level Goal), MCL(Maximum Contaminant Level), environmental impact and so on. The MCLG is the concentration at which no known adverse health effects occur. The MCLG is determined by risk assessment identifying which process is hazardous assessing, dose-response, human exposure, and characteristics of risk. With consideration of analytical methods, treatment technology, cost and regulatory impact, the MCL is set as close to the MCLG as possible. In this way, determination of the concentration and national distribution of contaminants is important for assessment of environmental quality The analytical sciences pose potential problems in assessing environmental quality. Continuing improvement in the performance of analytical instruments and operating technique has been lowering the limits of detectability. Contaminant concentration below the detection limit has usually been reported as ND(Not-Detected) and this has often been misunderstood as equivalent to zero. Because of this, more the contaminant concentration in the past was below the detection limit, whereas contaminants can be quantified now even though the contaminant concentration might remain the same or may even have decreased. In addition, environmental sampling has various components due to heterogeneous matrices. These samples are used to overestimate the concentration of the contaminant due to large variability, resulting in excess readings for MCL. In this paper, the significance of the analytical sciences is emphasized in both a conceptual and a technical approach to environmental assessment.

  • PDF

An algorithm for pahse detection using weighting function and the design of a phase tracking loop (가중치 함수를 이용한 위상 검출 알고리즘과 위상 추적 루프의 설계)

  • 이명환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.9A
    • /
    • pp.2197-2210
    • /
    • 1998
  • In the grand alliance (GA) HDTV receiver, a coherent detection is empolyed for coherent demodulation of vestigial side-band (VSB) signal by using frequency and phaselocked loop(FPLL) operating on the pilot carrier. Additional phase tracking loop (PTL) employed to track out phase noise that has not been removed by the FPLL in theGA system. In this paper, we propose an algorithm for phase detection which utilizes a weighting function. The simplest implementation of the proposed algorithm using te sign of the Q channel component can be tractable by imposing a phase detection gain to the loop gain. It is obserbed that the propsoed algorithm has a robust characteristic against the performance of the digital filters used for Q channel estimation. A second goal of this paper is to introduce a gain control algorithm for the PTL in order to provide an effective implementation of the proposed phase detection algorithm. And we design the PTL through the realization of the simplified digital filter for H/W reduction. The proposed algorithms and the designed PTL are evaluated by computer simulation. In spite of using the simplified H/W structure, simulation results show that the proposed algorithms outperform the coventional PTL algorithms in the phase detection and tracking performance.

  • PDF

Reviewing And Analysis of The Deadlock Handling Methods

  • El-Sharawy, Enas E.;Ahmed, Thowiba E;Alshammari, Reem H;Alsubaie, Wafaa;Almuhanna, Norah;Alqahtani, Asma
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.230-236
    • /
    • 2022
  • Objectives: The primary goal of this article is to compare the multiple algorithms used for deadlock handling methods and then outline the common method in deadlock handling methods. Methods: The article methodology begins with introducing a literature review studying different algorithms used in deadlock detection and many algorithms for deadlocks prevented, recovered, and avoided. Discussion and analysis of the literature review were done to classify and compare the studied algorithms. Findings: The results showed that the deadlock detection method solves the deadlock. As soon as the real-time deadlock detection algorithm is identified and indicated, it performs better than the non-real-time deadlock detection algorithm. Our novelty the statistics that we get from the percentages of reviewing outcomes that show the most effective rate of 47% is in deadlock prevention. Then deadlock detection and recovery with 28% finally, a rate of 25% for deadlock avoidance.

Object Double Detection Method using YOLOv5 (YOLOv5를 이용한 객체 이중 탐지 방법)

  • Do, Gun-wo;Kim, Minyoung;Jang, Si-woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.54-57
    • /
    • 2022
  • Korea has a vulnerable environment from the risk of wildfires, which causes great damage every year. To prevent this, a lot of manpower is being used, but the effect is insufficient. If wildfires are detected and extinguished early through artificial intelligence technology, damage to property and people can be prevented. In this paper, we studied the object double detection method with the goal of minimizing the data collection and processing process that occurs in the process of creating an object detection model to minimize the damage of wildfires. In YOLOv5, the original image is primarily detected through a single model trained on a limited image, and the object detected in the original image is cropped through Crop. The possibility of improving the false positive object detection rate was confirmed through the object double detection method that re-detects the cropped image.

  • PDF

Cyber threat Detection and Response Time Modeling (사이버 위협 탐지대응시간 모델링)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.53-58
    • /
    • 2021
  • There is little research on actual business activities in the field of security control. Therefore, in this paper, we intend to present a practical research methodology that can contribute to the calculation of the size of the appropriate input personnel through the modeling of the threat information detection response time of the security control and to analyze the effectiveness of the latest security solutions. The total threat information detection response time performed by the security control center is defined as TIDRT (Total Intelligence Detection & Response Time). The total threat information detection response time (TIDRT) is composed of the sum of the internal intelligence detection & response time (IIDRT) and the external intelligence detection & response time (EIDRT). The internal threat information detection response time (IIDRT) can be calculated as the sum of the five steps required. The ultimate goal of this study is to model the major business activities of the security control center with an equation to calculate the cyber threat information detection response time calculation formula of the security control center. In Chapter 2, previous studies are examined, and in Chapter 3, the calculation formula of the total threat information detection response time is modeled. Chapter 4 concludes with a conclusion.

Background Subtraction in Dynamic Environment based on Modified Adaptive GMM with TTD for Moving Object Detection

  • Niranjil, Kumar A.;Sureshkumar, C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.372-378
    • /
    • 2015
  • Background subtraction is the first processing stage in video surveillance. It is a general term for a process which aims to separate foreground objects from a background. The goal is to construct and maintain a statistical representation of the scene that the camera sees. The output of background subtraction will be an input to a higher-level process. Background subtraction under dynamic environment in the video sequences is one such complex task. It is an important research topic in image analysis and computer vision domains. This work deals background modeling based on modified adaptive Gaussian mixture model (GMM) with three temporal differencing (TTD) method in dynamic environment. The results of background subtraction on several sequences in various testing environments show that the proposed method is efficient and robust for the dynamic environment and achieves good accuracy.

A Study on Conflict Detection and Resolution for Aircraft Separation Assurance in a Free Flight Environment (자유비행 환경에서의 항공기 분리보장을 위한 충돌 탐지 및 해결 방법에 대한 고찰)

  • Kim, Chang-Hwan;Kang, Ja-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.3
    • /
    • pp.27-33
    • /
    • 2010
  • The goal for the CD&R system is to predict that a conflict is going to occur in the future, communicate the detected conflict to a human operator, and, in some cases, assist in the resolution of the conflict situation. To provide insight into different methods of conflict detection and resolution, a literature review of previous research models and current developmental and operational systems was performed. This paper focuses only on the specific attributes of each model, not on the depth to which a model has been analyzed, validated, or accepted. Thus, care should be taken to remember that a model that seems to be simple according to our categorization scheme may be significantly more viable than an apparently sophisticated model.

Multi-touch Detection Technology Using a Divergence IR Beam Profile for Large LCD Touch Solutions

  • Lee, Young-Joon;Lee, Won-Suk;Pushchin, Victor;Song, Moon-Bong
    • Journal of Information Display
    • /
    • v.11 no.4
    • /
    • pp.169-172
    • /
    • 2010
  • This paper proposes a multi-touch detection technology that can be applied to large LCDs. To achieve this goal, a set of IR LEDs and sensors was used to construct an IR matrix, and a new algorithm based on Hough transform was applied. This approach reduced the "Ghost" response of the multi-touch detection technology to make it better than other IR touch recognition technologies, and showed robust performance in terms of multi-touch recognition.