• Title/Summary/Keyword: 시스템 식별 방법

Search Result 933, Processing Time 0.029 seconds

Deep Learning-based system for plant disease detection and classification (딥러닝 기반 작물 질병 탐지 및 분류 시스템)

  • YuJin Ko;HyunJun Lee;HeeJa Jeong;Li Yu;NamHo Kim
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.9-17
    • /
    • 2023
  • Plant diseases and pests affect the growth of various plants, so it is very important to identify pests at an early stage. Although many machine learning (ML) models have already been used for the inspection and classification of plant pests, advances in deep learning (DL), a subset of machine learning, have led to many advances in this field of research. In this study, disease and pest inspection of abnormal crops and maturity classification were performed for normal crops using YOLOX detector and MobileNet classifier. Through this method, various plant pest features can be effectively extracted. For the experiment, image datasets of various resolutions related to strawberries, peppers, and tomatoes were prepared and used for plant pest classification. According to the experimental results, it was confirmed that the average test accuracy was 84% and the maturity classification accuracy was 83.91% in images with complex background conditions. This model was able to effectively detect 6 diseases of 3 plants and classify the maturity of each plant in natural conditions.

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

Verification of VIIRS Data using AIS data and automatic extraction of nigth lights (AIS 자료를 이용한 VIIRS 데이터의 야간 불빛 자동 추출 및 검증)

  • Suk Yoon;Hyeong-Tak Lee;Hey-Min Choi;;Jeong-Seok Lee;Hee-Jeong Han;Hyun Yang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.104-105
    • /
    • 2023
  • 해양 관측과 위성 원격탐사를 이용하여 시공간적으로 다양하게 변하는 생태 어장 환경 및 선박 관련 자료를 획득할 수 있다. 이번 연구의 주요 목적은 야간 불빛 위성 자료를 이용하여 광범위한 해역에 대한 어선의 위치 분포를 파악하는 딥러닝 기반 모델을 제안하는 것이다. 제안한 모델의 정확성을 평가하기 위해 야간 조업 어선의 위치를 포함하고 있는 AIS(Automatic Identification System) 정보와 상호 비교 평가 하였다. 이를 위해, 먼저 AIS 자료를 획득 및 분석하는 방법을 소개한다. 해양안전종합시스템(General Information Center on Maritime Safety & Security, GICOMS)으로부터 제공받은 AIS 자료는 동적정보와 정적정보로 나뉜다. 동적 정보는 일별 자료로 구분되어있으며, 이 정보에는 해상이동업무식별번호(Maritime Mobile Service Identity, MMSI), 선박의 시간, 위도, 경도, 속력(Speed over Ground, SOG), 실침로(Course over Ground, COG), 선수방향(Heading) 등이 포함되어 있다. 정적정보는 1개의 파일로 구성되어 있으며, 선박명, 선종 코드, IMO Number, 호출부호, 제원(DimA, DimB, DimC, Dim D), 홀수, 추정 톤수 등이 포함되어 있다. 이번 연구에서는 선박의 정보에서 어선의 정보를 추출하여 비교 자료로 사용하였으며, 위성 자료는 구름의 영향이 없는 깨끗한 날짜의 영상 자료를 선별하여 사용하였다. 야간 불빛 위성 자료, 구름 정보 등을 이용하여 야간 조업 어선의 불빛을 감지하는 심층신경망(Deep Neural Network; DNN) 기반 모델을 제안하였다. 본 연구의결과는 야간 어선의 분포를 감시하고 한반도 인근 어장을 보호하는데 기여할 것으로 기대된다.

  • PDF

Deep Learning-based Rail Surface Damage Evaluation (딥러닝 기반의 레일표면손상 평가)

  • Jung-Youl Choi;Jae-Min Han;Jung-Ho Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.505-510
    • /
    • 2024
  • Since rolling contact fatigue cracks can always occur on the rail surface, which is the contact surface between wheels and rails, railway rails require thorough inspection and diagnosis to thoroughly inspect the condition of the cracks and prevent breakage. Recent detailed guidelines on the performance evaluation of track facilities present the requirements for methods and procedures for track performance evaluation. However, diagnosing and grading rail surface damage mainly relies on external inspection (visual inspection), which inevitably relies on qualitative evaluation based on the subjective judgment of the inspector. Therefore, in this study, we conducted a deep learning model study for rail surface defect detection using Fast R-CNN. After building a dataset of rail surface defect images, the model was tested. The performance evaluation results of the deep learning model showed that mAP was 94.9%. Because Fast R-CNN has a high crack detection effect, it is believed that using this model can efficiently identify rail surface defects.

A Study on the Response Plan through the Analysis of North Korea's Drones Terrorism at Critical National Facilities - Focusing on Improvement of Laws and Systems - (국가중요시설에 대한 북한의 드론테러 위협 분석을 통한 대응방안 연구 - 법적·제도적 개선을 중심으로 -)

  • Choong soo Ha
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.395-410
    • /
    • 2023
  • Purpose: The purpose of this study was to analyze the current state of drone terrorism response at such critical national facilities and derive improvements, especially to identify problems in laws and systems to effectively utilize the anti-drone system and present directions for improvement. Method: A qualitative research method was used for this study by analyzing a variety of issues not discussed in existing research papers and policy documents through in-depth interviews with subject matter experts. In-depth interviews were conducted based on 12 semi-structured interviews by selecting 16 experts in the field of anti-drone and terrorism in Korea. The interview contents were recorded with the prior consent of the study participants, transcribed back to the Korean file, and problems and improvement measures were derived through coding. For this, the threats and types were analyzed based on the cases of drone terrorism occurring abroad and measures to establish anti-drone system were researched from the perspective of laws and systems by evaluating the possibility of drone terrorism in the Republic of Korea. Result: As a result of the study, improvements to some of the problems that need to be preceded in order to effectively respond to drone terrorism at critical national facilities in the Republic of Korea, have been identified. First, terminologies related to critical national facilities and drone terrorism should be clearly defined and reflected in the Integrated Defense Act and the Terrorism Prevention Act. Second, the current concept of protection of critical national facilities should evolve from the current ground-oriented protection to a three-dimensional protection concept that considers air threats and the Integrated Defense Act should reflect a plan to effectively install the anti-drone system that can materialize the concept. Third, a special law against flying over critical national facilities should be enacted. To this end, legislation should be enacted to expand designated facilities subject to flight restrictions while minimizing the range of no fly zone, but the law should be revised so that the two wings of "drone industry development" and "protection of critical national facilities" can develop in a balanced manner. Fourth, illegal flight response system and related systems should be improved and reestablished. For example, it is necessary to prepare a unified manual for general matters, but thorough preparation should be made by customizing it according to the characteristics of each facility, expanding professional manpower, and enhancing response training. Conclusion: The focus of this study is to present directions for policy and technology development to establish an anti-drone system that can effectively respond to drone terrorism and illegal drones at critical national facilities going forward.

Provision of a Novel Unlicensed Access Relay Station in IEEE 802.16-based Broadband Wireless Access Networks (IEEE 802.16 기반의 무선 액세스 망에서 Unlicensed 대역 액세스 릴레이에 대한 설계)

  • Choi, W.;Shon, T.S.;Choi, H.H.;Lee, Y.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.169-177
    • /
    • 2007
  • Existing wireless access (mobile) routers are based commonly on the network address and port translation (NAPT) technique which permits simultaneously sharing a subscriber's connection to the network with multiple users. However, the NAPT architecturally makes the users invisible on the network side, thus becoming a user-oriented connection technique. In this paper, we propose a novel service provider-oriented unlicensed nomadic access relay station (WiNNERS) for helping wireless broadband network service providers to make their business more lucrative by accommdating unlicensed band users as subscribers into their network. The WiNNERS offers service providers the capability to directly manage each of the unlicensed band users at the network side. This direct management allows the service providers to flexibly and simply handle QoS, access control, and billing for each user. In order to distinguish each of the unlicensed band users the WiNNERS constructs a virtual tunnel from each user's terminal to the network access router using connection identifiers which is defined for service flow management within the WiBro system, Consequently, our proposed service provider-oriented relay station can be included into the WiBro network system with minimum modifications.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Field Application of RFID for the Cavity Maintenance of Under Pavement (도로하부 공동의 유지관리를 위한 RFID의 현장 적용성 평가)

  • Park, Jeong Jun;Shin, Eun Chul;Kim, In Dae
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.459-468
    • /
    • 2019
  • Purpose: The cavity exploration of the lower part of the road is carried out to prevent ground-sinking. However, the detected communities cannot be identified by the cavity location and history information, such as repackaging the pavement. Therefore, the field applicability of RFID systems was evaluated in this study to enable anyone to accurately identify information. Method: During temporary recovery, tag recognition distance and recognition rate were measured according to underground burial materials and telecommunication tubes using RFID systems with electronic tag chips attached to the bottom of the rubber cap. Result: The perceived distance and perceived rate of depth for each position of the electron tag did not significantly affect the depth up to 15cm, but it did have some effect if the depth was 20cm. In addition, water effects from nearby underground facilities and rainfall are relatively small, and the effects of wind will need to be considered during the weather conditions of the road. Conclusion: The RFID tags for field application of the pavement management system store various information such as location and size of cavity, identification date, cause of occurrence, and surrounding underground facilities to maximize cavity management effect with a system that can be computerized and mobile utilization.

Effective Design Pattern and Enterprise Architecture Design Techniques in EJB Environment (EJB기반의 효율적인 설계 패턴 및 엔터프라이즈 아키텍처 설계 기법)

  • 민현기;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1025-1036
    • /
    • 2003
  • In industry, it is a current trend that systems are developed by using Enterprise JavaBeans(EJB) technology for reducing the cost and the time. Thus, the architecture of EJB is getting more essential to enhance reusability, extensibility and portability of system. However little has been studied in the realm of the practical software architectures for EJB. The architecture has just bean studied in abstract level, but not in concrete level providing the method to substantiate it using the practical J2EE techniques. Just using the EJB technology doesn't guarantee the reusability of the artifacts because EJB specification provides the characteristics and architecture for only fine grained components as session and entity bean. In this paper, we propose the enterprise software architecture for the systems based on EJB and the concrete techniques for implementing that. Also, design patterns of modeling efficient enterprise architecture are represented. By analyzing both the strengths and the weaknesses of suggested design patterns, EJB design patterns which are suitable for each layer of enterprise architecture will be identified. Through the component which design patterns are applied, the architecture can support the optimized relationship between the components. Five techniques for designing components from fine grained to coarse grained based on EJB technology, and architecture design techniques including transaction and assembling techniques are proposed.

Development of component architecture to support IoT management (IoT 및 네트워크 관리 지원을 위한 컴포넌트 아키텍처 개발)

  • Seo, Hee Kyoung
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.42-49
    • /
    • 2017
  • It is important to realize automation services by communicating in IoT with humans, objects & objects, and forming a common network. People used web like the most powerful network way to sharing things and communication. Therefore the efficiency method communication between each device and the web in IoT could be different from ones. The best method for high quality software product in web applications is software reuse ; Modules, classes, patterns, frameworks, and business components are reusable elements of various perspectives. Components is plugged with others through well-defined interfaces, which can overcome the operation and complexity of application development. A web-based distributed environment for IoT applications is a standard architecture use information collected from various devices for developing and using applications. For that reason, the network management which manages the constituent resources for the best service control in IoT application is required as a sub-layer support service in most applications as well as individual applications. In this paper, we measure to develop a network management system based not only by components but on heterogeneous internetworks. For procedure this, we clarify a component architecture for classifying and classify also the component needed in the IOT and network domain or order the type of real network management system.