• Title/Summary/Keyword: 로그 생성

Search Result 333, Processing Time 0.024 seconds

Feasibility of Using Norad Orbital Elements for Pass Programming and Catalog Generation for High Resolution Satellite Images (고해상도 위성영상 촬영계획 수립 및 카탈로그 생성을 위한 NORAD 궤도 데이터의 이용 가능성 연구)

  • 신동석;김탁곤;곽성희;이영란
    • Korean Journal of Remote Sensing
    • /
    • v.15 no.2
    • /
    • pp.119-130
    • /
    • 1999
  • At present, many ground stations all over the world are using NORAD orbit element data in order to track and communicate with Earth orbiting satellites. The North American Aerospace Defense Command (NORAD) observes thousands of Earth orbiting objects on daily basis and provides their orbital information via internet. The orbital data provided by NORAD, which is also called two line element (TLE) sets, allows ground stations to predict the time-varying positions of satellites accurately enough to communicate with the satellites. In order to complete the mission of a high resolution remote sensing satellite which requires very high positional determination and control accuracy, however, a mission control and tracking ground station is dedicated for the observation and positional determination of the satellite rather than using NORAD orbital sets. In the case of KITSAT-3, NORAD orbital elements are currently used for image acquisition planning and for the processing of acquired images due to the absence of a dedicated KITSAT-3 tracking ground system. In this paper, we tested and analyzed the accuracy of NORAD orbital elements and the appropriate prediction model to determine how accurately a satellite acquisites an image of the location of interest and how accurately a ground processing system can generate the catalog of the images.

RDP-based Lateral Movement Detection using PageRank and Interpretable System using SHAP (PageRank 특징을 활용한 RDP기반 내부전파경로 탐지 및 SHAP를 이용한 설명가능한 시스템)

  • Yun, Jiyoung;Kim, Dong-Wook;Shin, Gun-Yoon;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.1-11
    • /
    • 2021
  • As the Internet developed, various and complex cyber attacks began to emerge. Various detection systems were used outside the network to defend against attacks, but systems and studies to detect attackers inside were remarkably rare, causing great problems because they could not detect attackers inside. To solve this problem, studies on the lateral movement detection system that tracks and detects the attacker's movements have begun to emerge. Especially, the method of using the Remote Desktop Protocol (RDP) is simple but shows very good results. Nevertheless, previous studies did not consider the effects and relationships of each logon host itself, and the features presented also provided very low results in some models. There was also a problem that the model could not explain why it predicts that way, which resulted in reliability and robustness problems of the model. To address this problem, this study proposes an interpretable RDP-based lateral movement detection system using page rank algorithm and SHAP(Shapley Additive Explanations). Using page rank algorithms and various statistical techniques, we create features that can be used in various models and we provide explanations for model prediction using SHAP. In this study, we generated features that show higher performance in most models than previous studies and explained them using SHAP.

Localization and Accumulated Concentration Changes of Mercury Compound in Reproductive Organs of Female Mice with Time (암컷 마우스 생식기관 내 수은 화합물의 위치와 시간에 따른 축적된 수은 농도 변화)

  • Kim, Young Eun;Kim, Yu Seon;Cho, Hyun Wook
    • Journal of Life Science
    • /
    • v.28 no.7
    • /
    • pp.811-818
    • /
    • 2018
  • This study was performed to investigate the localization and concentration changes of mercury compound in female reproductive organs with time. Methylmercuric chloride was subcutaneously injected weekly into pubescent female mice for 3 weeks. For the concentration changes of mercury with time, the mice were sacrificed at 10, 150, and 300 days post treatment (DPT). Body and organ weights were not significantly different between the control and mercury-treated groups, except for 10 DPT in body weight. Localization of accumulated mercury was identified by the autometallography method. Localization of mercury compounds in the uterus, ovary, and ovum was analyzed with a light microscope. In the uterus, mercury was densely located in the stroma cells and surface epithelium of the perimetrium at 10 DPT. Mercury concentration was decreased at 150 DPT and did not appear at 300 DPT. In the ovary, mercury particles were distributed in the stroma cells of the cortex region, cells of the theca around the follicle, and the corpus luteum at 10 DPT. Mercury was concentrated in the medulla region at 150 DPT and was not distributed at 300 DPT. In the ovum, mercury particles were mainly located in the marginal region at 10 and 150 DPT. Mercury concentration was decreased and evenly distributed at 300 DPT. These results suggest that hormone synthesis, implantation, and developing embryos will be affected by mercury compound in the female mouse.

Proxy Caching Scheme Based on the User Access Pattern Analysis for Series Video Data (시리즈 비디오 데이터의 접근 패턴에 기반한 프록시 캐슁 기법)

  • Hong, Hyeon-Ok;Park, Seong-Ho;Chung, Ki-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1066-1077
    • /
    • 2004
  • Dramatic increase in the number of Internet users want highly qualified service of continuous media contents on the web. To solve these problems, we present two network caching schemes(PPC, PPCwP) which consider the characteristics of continuous media objects and user access pattern in this paper. While there are plenty of reasons to create rich media contents, delivering this high bandwidth contents over the internet presents problems such as server overload, network congestion and client-perceived latency. PPC scheme periodically calculates the popularity of objects based on the playback quantity and determines the optimal size of the initial fraction of a continuous media object to be cached in proportion to the calculated popularity. PPCwP scheme calculates the expected popularity using the series information and prefetches the expected initial fraction of newly created continuous media objects. Under the PPCwP scheme, the initial client-perceived latency and the data transferred from a remote server can be reduced and limited cache storage space can be utilized efficiently. Trace-driven simulation have been performed to evaluate the presented caching schemes using the log-files of iMBC. Through these simulations, PPC and PPCwP outperforms LRU and LFU in terms of BHR and DSR.

  • PDF

Attacking OpenSSL Shared Library Using Code Injection (코드 주입을 통한 OpenSSL 공유 라이브러리의 보안 취약점 공격)

  • Ahn, Woo-Hyun;Kim, Hyung-Su
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.4
    • /
    • pp.226-238
    • /
    • 2010
  • OpenSSL is an open-source library implementing SSL that is a secure communication protocol. However, the library has a severe vulnerability that its security information can be easily exposed to malicious software when the library is used in a form of shared library on Linux and UNIX operating systems. We propose a scheme to attack the vulnerability of the OpenSSL library. The scheme injects codes into a running client program to execute the following attacks on the vulnerability in a SSL handshake. First, when a client sends a server a list of cryptographic algorithms that the client is willing to support, our scheme replaces all algorithms in the list with a specific algorithm. Such a replacement causes the server to select the specific algorithm. Second, the scheme steals a key for data encryption and decryption when the key is generated. Then the key is sent to an outside attacker. After that, the outside attacker decrypts encrypted data that has been transmitted between the client and the server, using the specified algorithm and the key. To show that our scheme is realizable, we perform an experiment of collecting encrypted login data that an ftp client using the OpenSSL shared library sends its server and then decrypting the login data.

Synthesis of Long-Chain Unsaturated Acetates (장직쇄상(長直鎖狀) 불포화(不飽和) 초산화합물(醋酸化合物)의 합성(合成)에 관(關)한 연구(硏究))

  • Oh, Sung-Ki
    • Applied Biological Chemistry
    • /
    • v.19 no.1
    • /
    • pp.1-23
    • /
    • 1976
  • The female moths of Lepidoptera comprising over 1,000,000 described species possess long-chain unsaturated alcohols or esters as the typical structure of potential sex attractants. In this experiment, various stereoisomers of $C_{16}-unsaturated$ acetates were synthesized for potential sex attractants; e.g., $CH_3(CH_2)_mCH=CH(CH_2)_nOR$ (m=0-12, n=1-13, R=H and $-COCH_3$). Seventeen acetates were spectrometrically examined so that the data would provide a ready catalog of gas chromatography and mass spectrometric data for comparison with natural insect sex attractants. Exclusively cis and trans isomers were obtained by the catalytic and chemical reduction methods, respectively. Commercially available $CH_3(CH_2)_mBr,\;CH_3(CH_2)_mC{\equiv}CH,\;HC{\equiv}C(CH_2)_nOH\;and\;HO(CH_2)_n\;OH$ were used for the synthetic starting material. 1-Alkynes, $CH_3(CH_2)_m\;C{\equiv}CH$ exceeding nine methylene groups did not condense with alkyl dihalides. The yield of coupling products was gradually decreased with increasing the molecular weight of diols. In the coupling reaction of $BrCH_2CH_2$ OTHP with acetylene gas, the tetrahydropyranyl ether of bromohydrin produced undesirable elimination product. In this experiment, it seems that p-toluenesulfonic acid is greatly favoured hydrolyzing agent over dilute sulfuric acid in the hydrolysis of the tetrahydropyranyl ether of long-chain alkynols.

  • PDF

Investigations on Techniques and Applications of Text Analytics (텍스트 분석 기술 및 활용 동향)

  • Kim, Namgyu;Lee, Donghoon;Choi, Hochang;Wong, William Xiu Shun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.471-492
    • /
    • 2017
  • The demand and interest in big data analytics are increasing rapidly. The concepts around big data include not only existing structured data, but also various kinds of unstructured data such as text, images, videos, and logs. Among the various types of unstructured data, text data have gained particular attention because it is the most representative method to describe and deliver information. Text analysis is generally performed in the following order: document collection, parsing and filtering, structuring, frequency analysis, and similarity analysis. The results of the analysis can be displayed through word cloud, word network, topic modeling, document classification, and semantic analysis. Notably, there is an increasing demand to identify trending topics from the rapidly increasing text data generated through various social media. Thus, research on and applications of topic modeling have been actively carried out in various fields since topic modeling is able to extract the core topics from a huge amount of unstructured text documents and provide the document groups for each different topic. In this paper, we review the major techniques and research trends of text analysis. Further, we also introduce some cases of applications that solve the problems in various fields by using topic modeling.

Relation between Highway Improvement and Induced Travel Demand, and Estimate the Demand Elasticity (A Seoul Metropolitan Area Case) (도로환경개선과 집합적 개념의 유발통행수요와의 관련성 규명 및 수요탄력성 추정(수도권을 중심으로))

  • Lee, Gyu-Jin;Choe, Gi-Ju;Sim, Sang-U;Kim, Sang-Su
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.4 s.90
    • /
    • pp.7-17
    • /
    • 2006
  • The purpose or this paper is to investigate the relationship between highway improvement and Induced Travel Demand(ITD) focusing on the Seoul metropolitan area data. In addition, authors tried to estimate basic unit of demand elasticity focusing on zone and trip purpose which can be applied for the ITD forecasting. The results are based on the 2002 Metropolitan Household Transportation Survey Data, where the demand elasticity (DE) is -0.582 in Seoul, -0.597 in Incheon and -0.559 in Gyounggi province, respectively. This study revealed part of the relationship between highway improvement and ITD for metropolitan region and provided the framework for yielding real estimated values by applying the concept of demand elasticity in terms of the relationship by using regional and long-term data. We expect that the basic unit of demand elasticity focusing on zone and trip purpose can be applied for the ITD forecasting to analyze the whole demand exactly The estimated DE's for age group and day of week can also be used for Proper transportation management and transport Policy making. Some limitations have also been discussed.

A Content-Aware toad Balancing Technique Based on Histogram Transformation in a Cluster Web Server (클러스터 웹 서버 상에서 히스토그램 변환을 이용한 내용 기반 부하 분산 기법)

  • Hong Gi Ho;Kwon Chun Ja;Choi Hwang Kyu
    • Journal of Internet Computing and Services
    • /
    • v.6 no.2
    • /
    • pp.69-84
    • /
    • 2005
  • As the Internet users are increasing rapidly, a cluster web server system is attracted by many researchers and Internet service providers. The cluster web server has been developed to efficiently support a larger number of users as well as to provide high scalable and available system. In order to provide the high performance in the cluster web server, efficient load distribution is important, and recently many content-aware request distribution techniques have been proposed. In this paper, we propose a new content-aware load balancing technique that can evenly distribute the workload to each node in the cluster web server. The proposed technique is based on the hash histogram transformation, in which each URL entry of the web log file is hashed, and the access frequency and file size are accumulated as a histogram. Each user request is assigned into a node by mapping of (hashed value-server node) in the histogram transformation. In the proposed technique, the histogram is updated periodically and then the even distribution of user requests can be maintained continuously. In addition to the load balancing, our technique can exploit the cache effect to improve the performance. The simulation results show that the performance of our technique is quite better than that of the traditional round-robin method and we can improve the performance more than $10\%$ compared with the existing workload-aware load balancing(WARD) method.

  • PDF

Comparison of Partial Least Squares and Support Vector Machine for the Flash Point Prediction of Organic Compounds (유기물의 인화점 예측을 위한 부분최소자승법과 SVM의 비교)

  • Lee, Chang Jun;Ko, Jae Wook;Lee, Gibaek
    • Korean Chemical Engineering Research
    • /
    • v.48 no.6
    • /
    • pp.717-724
    • /
    • 2010
  • The flash point is one of the most important physical properties used to determine the potential for fire and explosion hazards of flammable liquids. Despite the needs of the experimental flash point data for the design and construction of chemical plants, there is often a significant gap between the demands for the data and their availability. This study have built and compared two models of partial least squares(PLS) and support vector machine(SVM) to predict the experimental flash points of 893 organic compounds out of DIPPR 801. As the independent variables of the models, 65 functional groups were chosen based on the group contribution method that was oriented from the assumption that each fragment of a molecule contributes a certain amount to the value of its physical property, and the logarithm of molecular weight was added. The prediction errors calculated from cross-validation were employed to determine the optimal parameters of two models. And, an optimization technique should be used to get three parameters of SVM model. This work adopted particle swarm optimization that is one of heuristic optimization methods. As the selection of training data can affect the prediction performance, 100 data sets of randomly selected data were generated and tested. The PLS and SVM results of the average absolute errors for the whole data range from 13.86 K to 14.55 K and 7.44 K to 10.26 K, respectively, indicating that the predictive ability of the SVM is much superior than PLS.