• Title/Summary/Keyword: 발사각

Search Result 284, Processing Time 0.022 seconds

Detection of Arctic Summer Melt Ponds Using ICESat-2 Altimetry Data (ICESat-2 고도계 자료를 활용한 여름철 북극 융빙호 탐지)

  • Han, Daehyeon;Kim, Young Jun;Jung, Sihun;Sim, Seongmun;Kim, Woohyeok;Jang, Eunna;Im, Jungho;Kim, Hyun-Cheol
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_1
    • /
    • pp.1177-1186
    • /
    • 2021
  • As the Arctic melt ponds play an important role in determining the interannual variation of the sea ice extent and changes in the Arctic environment, it is crucial to monitor the Arctic melt ponds with high accuracy. Ice, Cloud, and Land Elevation Satellite-2 (ICESat-2), which is the NASA's latest altimeter satellite based on the green laser (532 nm), observes the global surface elevation. When compared to the CryoSat-2 altimetry satellite whose along-track resolution is 250 m, ICESat-2 is highly expected to provide much more detailed information about Arctic melt ponds thanks to its high along-track resolution of 70 cm. The basic products of ICESat-2 are the surface height and the number of reflected photons. To aggregate the neighboring information of a specific ICESat-2 photon, the segments of photons with 10 m length were used. The standard deviation of the height and the total number of photons were calculated for each segment. As the melt ponds have the smoother surface than the sea ice, the lower variation of the height over melt ponds can make the melt ponds distinguished from the sea ice. When the melt ponds were extracted, the number of photons per segment was used to classify the melt ponds covered with open-water and specular ice. As photons are much more absorbed in the water-covered melt pondsthan the melt ponds with the specular ice, the number of photons persegment can distinguish the water- and ice-covered ponds. As a result, the suggested melt pond detection method was able to classify the sea ice, water-covered melt ponds, and ice-covered melt ponds. A qualitative analysis was conducted using the Sentinel-2 optical imagery. The suggested method successfully classified the water- and ice-covered ponds which were difficult to distinguish with Sentinel-2 optical images. Lastly, the pros and cons of the melt pond detection using satellite altimetry and optical images were discussed.

Introduction on the Products and the Quality Management Plans for GOCI-II (천리안 해양위성 2호 산출물 및 품질관리 계획)

  • Lee, Sun-Ju;Lee, Kyeong-Sang;Han, Tae Hyun;Moon, Jeong-Eon;Bae, Sujung;Choi, Jong-kuk
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_2
    • /
    • pp.1245-1257
    • /
    • 2021
  • GOCI-II, succeeding the mission of GOCI, was launched in February 2020 and has been in regular operation since October 2020. Korea Institute of Ocean Science and Technology (KIOST) processes and produces in real time Level-1B and 26 Level-2 outputs, which then are provided by Korea Hydrographic and Oceanographic Agency (KHOA). We introduced current status of regular GOCI-II operation and showed future improvement. Basic GOCI-II products including chlorophyll-a, total suspended materials, and colored dissolved organic matter concentration, are induced by OC4 and YOC algorithms, which were described in detail. For the full disk (FD), imaging schedule was established considering solar zenith angle and sun glint during the in-orbital test, but improved by further considering satellite zenith angle. The number of slots satisfying the condition 'Best Ocean' significantly increased from 15 to 78. GOCI-II calibration requirements were presented based on that by European Space Agency (ESA) and candidate fixed locations for calibrating local observation area were. The quality management of FD uses research ships and overseas bases of KIOST, but it is necessary to establish an international calibration/validation network. These results are expected to enhance the understanding of users for output processing and help establish detailed plans for future quality management tasks.

Evaluation of Antenna Pattern Measurement of HF Radar using Drone (드론을 활용한 고주파 레이다의 안테나 패턴 측정(APM) 가능성 검토)

  • Dawoon Jung;Jae Yeob Kim;Kyu-Min Song
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.35 no.6
    • /
    • pp.109-120
    • /
    • 2023
  • The High-Frequency Radar (HFR) is an equipment designed to measure real-time surface ocean currents in broad maritime areas.It emits radio waves at a specific frequency (HF) towards the sea surface and analyzes the backscattered waves to measure surface current vectors (Crombie, 1955; Barrick, 1972).The Seasonde HF Radar from Codar, utilized in this study, determines the speed and location of radial currents by analyzing the Bragg peak intensity of transmitted and received waves from an omnidirectional antenna and employing the Multiple Signal Classification (MUSIC) algorithm. The generated currents are initially considered ideal patterns without taking into account the characteristics of the observed electromagnetic wave propagation environment. To correct this, Antenna Pattern Measurement (APM) is performed, measuring the strength of signals at various positions received by the antenna and calculating the corrected measured vector to radial currents.The APM principle involves modifying the position and phase information of the currents based on the measured signal strength at each location. Typically, experiments are conducted by installing an antenna on a ship (Kim et al., 2022). However, using a ship introduces various environmental constraints, such as weather conditions and maritime situations. To reduce dependence on maritime conditions and enhance economic efficiency, this study explores the possibility of using unmanned aerial vehicles (drones) for APM. The research conducted APM experiments using a high-frequency radar installed at Dangsa Lighthouse in Dangsa-ri, Wando County, Jeollanam-do. The study compared and analyzed the results of APM experiments using ships and drones, utilizing the calculated radial currents and surface current fields obtained from each experiment.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF