http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Yashiro, S.,Murai, K.,Okabe, T.,Takeda, N. The Korean Society for Composite Materials 2007 Advanced composite materials Vol.16 No.2
This study proposes two new approaches for identifying damage patterns in a holed CFRP cross-ply laminate using an embedded fiber Bragg grating (FBG) sensor. It was experimentally confirmed that the reflection spectrum from the embedded FBG sensor was significantly deformed as the damage near the hole (i.e. splits, transverse cracks and delamination) extended. The damage patterns were predicted using forward analysis (a damage analysis and an optical analysis) with strain estimation and the proposed damage-identification method as well as the forward analysis only. Forward analysis with strain estimation provided the most accurate damage-pattern estimation and the highest computational efficiency. Furthermore, the proposed damage identification significantly reduced computation time with the equivalent accuracy compared to the conventional identification procedure, by using damage analysis as the initial estimation.
Toward a more practical unsupervised anomaly detection system
Song, J.,Takakura, H.,Okabe, Y.,Nakao, K. North-Holland [etc ; Elsevier Science Ltd 2013 Information sciences Vol.231 No.-
During the last decade, various machine learning and data mining techniques have been applied to Intrusion Detection Systems (IDSs) which have played an important role in defending critical computer systems and networks from cyber attacks. Unsupervised anomaly detection techniques have received a particularly great amount of attention because they enable construction of intrusion detection models without using labeled training data (i.e., with instances preclassified as being or not being an attack) in an automated manner and offer intrinsic ability to detect unknown attacks; i.e., 0-day attacks. Despite the advantages, it is still not easy to deploy them into a real network environment because they require several parameters during their building process, and thus IDS operators and managers suffer from tuning and optimizing the required parameters based on changes of their network characteristics. In this paper, we propose a new anomaly detection method by which we can automatically tune and optimize the values of parameters without predefining them. We evaluated the proposed method over real traffic data obtained from Kyoto University honeypots. The experimental results show that the performance of the proposed method is superior to that of the previous one.