• Title/Summary/Keyword: 경계탐지

Search Result 180, Processing Time 0.024 seconds

Sensitivity Analysis of IR Aerosol Detection Algorithm (적외선 채널을 이용한 에어로솔 탐지의 경계값 및 민감도 분석)

  • Ha, Jong-Sung;Lee, Hyun-Jin;Kim, Jae-Hwan
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.6
    • /
    • pp.507-518
    • /
    • 2006
  • The radiation at $11{\mu}m$ absorbed more than at $12{\mu}m$ when aerosols is loaded in the atmosphere, whereas it will be the other way around when cloud is present. The difference of the two channels provides an opportunity to detect aerosols such as Yellow Sand even with the presence of clouds and at night. However problems associated with this approach arise because the difference can be affected by various atmospheric and surface conditions. In this paper, we has analyzed how the threshold and sensitivity of the brightness temperature difference between two channel (BTD) vary with respect to the conditions in detail. The important finding is that the threshold value for the BTD distinguishing between aerosols and cloud is $0.8^{\circ}K$ with the US standard atmosphere, which is greater than the typical value of $0^{\circ}K$. The threshold and sensitivity studies for the BTD show that solar zenith angle, aerosols altitude, surface reflectivity, and atmospheric temperature profile marginally affect the BTD. However, satellite zenith angle, surface temperature along with emissivity, and vertical profile of water vapor are strongly influencing on the BTD, which is as much as of about 50%. These results strongly suggest that the aerosol retrieval with the BTD method must be cautious and the outcomes must be carefully calibrated with respect to the sources of the error.

Development of a Method for Tracking Sandbar Formation by Weir-Gate Opening Using Multispectral Satellite Imagery in the Geumgang River, South Korea (금강에서 다분광 위성영상을 이용한 보 운영에 따른 모래톱 형성 추적 방법의 개발)

  • Cheolho Lee;Kang-Hyun Cho
    • Ecology and Resilient Infrastructure
    • /
    • v.10 no.4
    • /
    • pp.135-142
    • /
    • 2023
  • A various technology of remote sensing and image analysis are applied to study landscape changes and their influencing factors in stream corridors. We developed a method to detect landscape changes over time by calculating the optical index using multispectral images taken from satellites at various time points, calculating the threshold to delineate the boundaries of water bodies, and creating binarized maps into land and water areas. This method was applied to the upstream reach of the weirs in the Geumgang River to track changes in the sandbar formed by the opening of the weir gate. First, we collected multispectral images with a resolution of 10 m × 10 m taken from the Sentinel-2 satellite at various times before and after the opening of the dam in the Geumgang River. The normalized difference water index (NDWI) was calculated using the green light and near-infrared bands from the collected images. The Otsu's threshold of NDWI calculated to delineate the boundary of the water body ranged from -0.0573 to 0.1367. The boundary of the water area determined by remote sensing matched the boundary in the actual image. A map binarized into water and land areas was created using NDWI and the Otsu's threshold. According to these results of the developed method, it was estimated that a total of 379.7 ha of new sandbar was formed by opening the three weir floodgates from 2017 to 2021 in the longitudinal range from Baekje Weir to Daecheong Dam on the Geumgang River. The landscape detection method developed in this study is evaluated as a useful method that can obtain objective results with few resources over a wide spatial and temporal range.

Selection of Detection Measures for Malicious Codes using Naive Estimator (단순 추정량을 이용한 악성코드의 탐지척도 선정)

  • Mun, Gil-Jong;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.97-105
    • /
    • 2008
  • The various mutations of the malicious codes are fast generated on the network. Also the behaviors of them become intelligent and the damage becomes larger step by step. In this paper, we suggest the method to select the useful measures for the detection of the codes. The method has the advantage of shortening the detection time by using header data without payloads and uses connection data that are composed of TCP/IP packets, and much information of each connection makes use of the measures. A naive estimator is applied to the probability distribution that are calculated by the histogram estimator to select the specific measures among 80 measures for the useful detection. The useful measures are then selected by using relative entropy. This method solves the problem that is to misclassify the measure values. We present the usefulness of the proposed method through the result of the detection experiment using the detection patterns based on the selected measures.

Building Boundary Reconstruction from Airborne Lidar Data by Adaptive Convex Hull Algorithm (적응적 컨벡스헐 알고리즘을 이용한 항공라이다 데이터의 건물 경계 재구성)

  • Lee, Jeong-Ho;Kim, Yong-Il
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.3
    • /
    • pp.305-312
    • /
    • 2012
  • This paper aims at improving the accuracy and computational efficiency in reconstructing building boundaries from airborne Lidar points. We proposed an adaptive convex hull algorithm, which is a modified version of local convex hull algorithm in three ways. The candidate points for boundary are first selected to improve efficiency depending on their local density. Second, a searching-space is adjusted adaptively, based on raw data structure, to extract boundary points more robustly. Third, distance between two points and their IDs are utilized in detecting the seed points of inner boundary to distinguish between inner yards and inner holes due to errors or occlusions. The practicability of the approach were evaluated on two urban areas where various buildings exist. The proposed method showed less shape-dissimilarity(8.5%) and proved to be two times more efficient than the other method.

Window Production Method based on Low-Frequency Detection for Automatic Object Extraction of GrabCut (GrabCut의 자동 객체 추출을 위한 저주파 영역 탐지 기반의 윈도우 생성 기법)

  • Yoo, Tae-Hoon;Lee, Gang-Seong;Lee, Sang-Hun
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.211-217
    • /
    • 2012
  • Conventional GrabCut algorithm is semi-automatic algorithm that user must be set rectangle window surrounds the object. This paper studied automatic object detection to solve these problem by detecting salient region based on Human Visual System. Saliency map is computed using Lab color space which is based on color opposing theory of 'red-green' and 'blue-yellow'. Then Saliency Points are computed from the boundaries of Low-Frequency region that are extracted from Saliency Map. Finally, Rectangle windows are obtained from coordinate value of Saliency Points and these windows are used in GrabCut algorithm to extract objects. Through various experiments, the proposed algorithm computing rectangle windows of salient region and extracting objects has been proved.

Cyber-Threat Detection of ICS Using Sysmon and ELK (Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지)

  • Kim, Yongjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.331-346
    • /
    • 2019
  • Global cyber threats to industrial control systems are increasing. As a result, related research and cooperation are actively underway. However, we are focusing on strengthening security for physical network separation and perimeter. Internal threats are still vulnerable. This is because the easiest and strongest countermeasure is to enhance border security, and solutions for enhancing internal security are not easy to apply due to system availability problems. In particular, there are many vulnerabilities due to the large number of legacy systems remaining throughout industrial control systems. Unless these vulnerable systems are newly built according to the security framework, it is necessary to respond to these vulnerable systems, and therefore, a security solution considering availability has been verified and suggested. Using Sysmon and ELK, security solutions can detect Cyber-threat that are difficult to detect in unstructured ICS.

Performance Improvement of a Variability-index CFAR Detector for Heterogeneous Environment (비균질 환경에 강인한 검출기를 위한 변동 지수 CFAR의 성능 향상)

  • Shin, Jong-Woo;Kim, Wan-Jin;Do, Dae-Won;Lee, Dong-Hun;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.3
    • /
    • pp.37-46
    • /
    • 2012
  • In RADAR and SONAR detection systems, noise environment can be classified into homogeneous and heterogeneous environment. Especially heterogeneous environments are modelled as target masking and clutter edge. Since the variability-index (VI) CFAR, a composed CFAR algorithm, dynamically selects one of the mean-level algorithms based on the VI and the MR (mean ratio) test, it is robust to various environments. However, the VI CFAR still suffers from lowered detection probabilities in heterogeneous environments. To overcome these problems, we propose an improved VI CFAR processor where TM (trimmed mean) CFAR and a sub-windowing technique are introduced to minimize the degradation of the detection probabilities appeared in heterogeneous environments. Computer simulation results show that the proposed method has the better performance in terms of detection probability and false alarm probability compared to the VI CFAR and single CFAR algorithms.

A Study on the Evaluation Method of Urban Open Spaces of Seoul with Remote Sensing: Detection of the Ecotone of the Mt. Pukhansan National Park (위성영상자료를 이용한 서울시 도시녹지의 평가기법 연구: 북한산 국립공원 주연부 탐지)

  • 박종화
    • Korean Journal of Remote Sensing
    • /
    • v.11 no.3
    • /
    • pp.71-81
    • /
    • 1995
  • The purpose of this research were to find ways to detect ecotone between the Mt. Pukhansan National Park and adjacent urban residential areas, to measure the width and size of ecotone around the park, and to investigate temporal change of ecotone around the Park. Normalized Difference Vegetation Index(NDVI) derived from TM data (May of 1985, 1987, and 1993) and the analytical capabilities of GIS were used to investigate the impacts of human activities inside of and outside of the boundary of the park. Major findings of the study can be summarized as follows: First, ecotone around the boundary of the national park could be identified from NDVI-distance curves derived by a series of buffering operations with a GIS. Second, average width of ecotone around the park was nealy doubled during 1985-1993 period. Third, NDVI vaules of the park were about 14 percent higher than those of surrounding areas. Finally, it seems that the expansion of the ecotone of the park is related to heavy trampling of visitors and various types of environmental pollution of the adjacent urban areas.

Robust Skin Area Detection Method in Color Distorted Images (색 왜곡 영상에서의 강건한 피부영역 탐지 방법)

  • Hwang, Daedong;Lee, Keunsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.350-356
    • /
    • 2017
  • With increasing attention to real-time body detection, active research is being conducted on human body detection based on skin color. Despite this, most existing skin detection methods utilize static skin color models and have detection rates in images, in which colors are distorted. This study proposed a method of detecting the skin region using a fuzzy classification of the gradient map, saturation, and Cb and Cr in the YCbCr space. The proposed method, first, creates a gradient map, followed by a saturation map, CbCR map, fuzzy classification, and skin region binarization in that order. The focus of this method is to rigorously detect human skin regardless of the lighting, race, age, and individual differences, using features other than color. On the other hand,the borders between these features and non-skin regions are unclear. To solve this problem, the membership functions were defined by analyzing the relationship between the gradient, saturation, and color features and generate 108 fuzzy rules. The detection accuracy of the proposed method was 86.35%, which is 2~5% better than the conventional method.

A Study on Threat Detection Model using Cyber Strongholds (사이버 거점을 활용한 위협탐지모델 연구)

  • Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • With the innovative development of ICT technology, hacking techniques of hackers are also evolving into sophisticated and intelligent hacking techniques. Threat detection research to counter these cyber threats was mainly conducted in a passive way through hacking damage investigation and analysis, but recently, the importance of cyber threat information collection and analysis is increasing. A bot-type automation program is a rather active method of extracting malicious code by visiting a website to collect threat information or detect threats. However, this method also has a limitation in that it cannot prevent hacking damage because it is a method to identify hacking damage because malicious code has already been distributed or after being hacked. Therefore, to overcome these limitations, we propose a model that detects actual threats by acquiring and analyzing threat information while identifying and managing cyber bases. This model is an active and proactive method of collecting threat information or detecting threats outside the boundary such as a firewall. We designed a model for detecting threats using cyber strongholds and validated them in the defense environment.