• Title/Summary/Keyword: 안개 탐지

Search Result 30, Processing Time 0.022 seconds

A Restoration Scheme using Dynamic Establishment of Alternative LSP in MPLS Networks (MPLS망에서 대체 LSP의 동적 설정을 이용한 복구기법)

  • 안개일;전우직
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.9A
    • /
    • pp.1542-1552
    • /
    • 2001
  • MPLS 망에서 설정된 LSP (Label Switched Path)내에 링크/노드 장애나 혼잡이 발생한 트래픽을 대체 경로로 우회시킴으로써 신뢰성 있는 서비스를 제공하는 것은 필수적이다. 기존에 제안된 기법들은 장애가 발생하기 전에 대체 경로를 미리 설정하기 때문에 빠른 장애 복구를 제공할 수 있지만 자원 낭비가 심하며 기본 LSP와 대체 LSP가 모두 장애인 경우에는 대처할 수가 없는 문제점을 가지고 있다. 본 논문에서는 장애를 탐지한 노드가 기본 경로상에 존재할 수 있는 가능한 모든 대체 경로 중에서 비용이 최소인 대체 경로를 계산한 후에 그 경로를 따라서 대체 LSP를 설정하는 동적 복구 기법을 제안한다. 제안된 기법은 최소 비용인 대체 경로를 계산하기 위하여 제안된 알고리즘을 사용함으로써 비교적 빠른 시간 내에 대체 LSP를 설정할 수 있으며, 자원 효율성이 높고, 기본경로와 대체 경로가 장애인 경우에도 대처할 수 있다. 제안된 기법의 성능을 평가하기 위하여 링크 장애, 노드 장애, 대체 경로 장애, 그리고 동시 발생 장애에 대하여 각각 시뮬레이션 하였다. 실험 결과, 제안된 기법은 기존의 기법들과 비교해서 동시 발생 장애에서는 성능이 좋지 않았지만, 링크 장애와 노드 장애의 경우에 비교적 성능이 좋았고, 기본 경로와 대체 경로가 장애인 경우에도 복구할 수 있었으며 자원 효율성에서는 월등히 우수했다.

  • PDF

Design of Network Topology Map Generator for Management of Security System (보안 시스템의 관리를 위한 망 토폴러지 맵 생성기의 설계)

  • Ahn, Gae-Il;Baik, Kwang-Ho;Kim, Ki-Young;Jang, Jong-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1293-1296
    • /
    • 2002
  • 악의 있는 사용자로부터 네트워크와 시스템을 보호하기 위하여 침입 탐지 시스템이나 방화벽같은 보안 시스템들이 제안되었다. 현재 보안 영역은 사용자 망에서 ISP 망으로 확대되고 있으며, 그에 비례하여 보안 시스템의 관리가 상대적으로 중요해졌다. 또한 보안 시스템에 적용하는 정책도 단순 정적 설정에서 현재의 보안 상황을 반영하여 정책을 재 수립하는 동적 설정으로 바뀌고 있기 때문에, 이를 위하여 관리자에게 망 상태를 주기적으로 보고하는 일도 또한 매우 의미 있는 일이 되었다. 본 논문에서는 SNMP(Simple Network Management Protocol) 프로토콜을 이용하여 보안 시스템의 설치 및 운용을 용이하게 할 수 있는 망 토폴러지 맵 생성기를 설계한다. 제안하는 망 토폴러지 맵 생성기는 탐색할 네트워크 도메인이 주어지면 자동적으로 네트워크 시스템과 보안 시스템을 발견하여 망 토폴러지를 생성하며 또한 망 상태를 주기적으로 수집하는 기능도 제공한다.

  • PDF

Efficacy analysis for the AI-based Scientific Border Security System based on Radar : focusing on the results of bad weather experiments (레이더 기반 AI 과학화 경계시스템의 효과분석 : 악천후 시 실험 결과를 중심으로)

  • Hochan Lee;Kyuyong Shin;Minam Moon;Seunghyun Gwak
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.85-94
    • /
    • 2023
  • In the face of the serious security situation with the increasing threat from North Korea, Korean Army is pursuing a reduction in troops through the performance improvement project of the GOP science-based border security system, which utilizes advanced technology. In order for the GOP science-based border security system to be an effective alternative to the decrease in military resources due to the population decline, it must guarantee a high detection and identification rate and minimize troop intervention by dramatically improving the false detection rate. Recently introduced in Korean Army, the GOP science-based border security system is known to ensure a relatively high detection and identification rate in good weather conditions, but its performance in harsh weather conditions such as rain and fog is somewhat lacking. As an alternative to overcoming this, a radar-based border security system that can detect objects even in bad weather has been proposed. This paper proves the effectiveness of the AI-based scientific border security system based on radar that is being currently tested at the 00th Division through the 2021 Rapid Acquisition Program, and suggests the direction of development for the GOP scientific border security system.

Design of Collaborative Response Framework Based on the Security Information Sharing in the Inter-domain Environments (도메인간 보안 정보 공유를 통한 협력 대응 프레임워크 설계)

  • Lee, Young-Seok;An, Gae-Il;Kim, Jong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.605-612
    • /
    • 2011
  • Recently, cyber attacks against public communications networks are getting more complicated and varied. Moreover, in some cases, one country could make systematic attacks at a national level against another country to steal its confidential information and intellectual property. Therefore, the issue of cyber attacks is now regarded as a new major threat to national security. The conventional way of operating individual information security systems such as IDS and IPS may not be sufficient to cope with those attacks committed by highly-motivated attackers with significant resources. In this paper, we discuss the technologies and standard trends about actual cyber threat and response methods, design the collaborative response framework based on the security information sharing in the inter-domain environments. The computation method of network threat level based on the collaborative response framework is proposed. The network threats are be quickly detected and real-time response can be executed using the proposed computation method.

A Study on the quantitative measurement methods of MRTD and prediction of detection distance for Infrared surveillance equipments in military (군용 열영상장비 최소분해가능온도차의 정량적 측정 방법 및 탐지거리 예측에 관한 연구)

  • Jung, Yeong-Tak;Lim, Jae-Seong;Lee, Ji-Hyeok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.557-564
    • /
    • 2017
  • The purpose of the thermal imaging observation device mounted on the K's tank in the Republic of Korea military is to convert infrared rays into visual information to provide information about the environment under conditions of restricted visibility. Among the various performance indicators of thermal observation devices, such as the view, magnification, resolution, MTF, NETD, and Minimum Resolvable Temperature Difference (MRTD), the MRTD is the most important, because it can indicate both the spatial frequency and temperature resolvable. However, the standard method of measuring the MRTD in NATO contains many subjective factors. As the measurement result can vary depending on subjective factors such as the human eye, metal condition and measurement conditions, the MRTD obtained is not stable. In this study, these qualitative MRTD measurement systems are converted into quantitative indicators based on a gray scale using imaging processing. By converting the average of the gray scale differences of the black and white images into the MRTD, the mean values can be used to determine whether the performance requirements required by the defense specification are met. The (mean) value can also be used to discriminate between detection, recognition and identification and the detectable distance of the thermal equipment can be analyzed under various environmental conditions, such as altostratus, heavy rain and fog.

Object Detection Algorithm Using Edge Information on the Sea Environment (해양 환경에서 에지 정보를 이용한 물표 추출 알고리즘)

  • Jeong, Jong-Myeon;Park, Gyei-Kark
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.69-76
    • /
    • 2011
  • According to the related reports, about 60 percents of ship collisions have resulted from operating mistake caused by human factor. Specially, the report said that negligence of observation caused 66.8 percents of the accidents due to a human factor. Hence automatic detection and tracking of an object from an IR images are crucial for safety navigation because it can relieve officer's burden and remedies imperfections of human visual system. In this paper, we present a method to detect an object such as ship, rock and buoy from a sea IR image. Most edge directions of the sea image are horizontal and most vertical edges come out from the object areas. The presented method uses them as a characteristic for the object detection. Vertical edges are extracted from the input image and isolated edges are eliminated. Then morphological closing operation is performed on the vertical edges. This caused vertical edges that actually compose an object be connected and become an object candidate region. Next, reference object regions are extracted using horizontal edges, which appear on the boundaries between surface of the sea and the objects. Finally, object regions are acquired by sequentially integrating reference region and object candidate regions.

Uncertainty Analysis on Vertical Wind Profile Measurement of LIDAR for Wind Resource Assessment (풍력자원평가를 위한 라이다 관측 시 풍속연직분포 불확도 분석)

  • Kim, Hyun-Goo;Choi, Ji-Hwee;Jang, Moon-Seok;Jeon, Wan-Ho
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2010.06a
    • /
    • pp.185.1-185.1
    • /
    • 2010
  • 원격탐사(remote sensing)란 관측 대상과의 접촉 없이 멀리서 정보를 얻어내는 기술을 말한다. 기상관측분야에는 이미 소다(SODAR) 장비가 폭넓게 사용되거 왔으나 최근 풍력자원평가(wind resource assessment)를 위한 풍황측정에 SODAR와 더불어 라이다(LIDAR)가 적극적으로 활용되기 시작하고 있다. 참고로 SODAR(SOnic Detection And Ranging)는 수직 및 동서 남북 방향으로 음파를 발생시키고 대기유동에 의해 산란 반사된 에코를 수신하여 진동수 변화와 반사에코 강도를 측정하여 각 방향의 에코자료를 벡터 합성함으로써 풍향 및 풍속을 산출하는 원리이다. 반면 LIDAR(Light Detection And Ranging)는 비교적 최근에 풍황측정 용도로 개발된 레이저 탐지에 바탕을 둔 원거리 센서로, 공기입자(먼지, 수증기, 구름, 안개, 오염물질 등)에 의해 산란된 레이저 발산의 도플러 쉬프트(Doppler shift)를 이용하여 풍향 및 풍속을 측정하는 원격탐사 장비이다. 풍력자원평가 측면에서 라이다는 그 정확도가 IEC61400-12에 의거한 풍황탑(met-mast) 측정자료 다수와의 비교검증 실측평가(Albers et al., 2009)를 통하여 입증된 바 있다. 한편 한국에너지기술연구원에서 운용 중인 라이다 시스템은 그림 1의 우측 그림과 같이 1초에 $360^{\circ}$를 스캔하여 50지점에서 반사되는 레이저를 스펙트럼으로 측정하되 설정된 관측높이에서 풍속은 샘플링 부피(sampling volume)의 평균값으로 정의된다. 그런데 샘플링 부피는 설정된 관측높이로부터 상하 12.5m, 총 25m의 높이구간에서 관측한 스펙트럼의 평균값을 그 중앙지점에서의 풍속으로 환산하는 알고리듬(algorithm)을 채택하고 있다. 따라서 비선형적으로 변화하는 풍속연직분포 관측 시 풍속환산 알고리듬에 의한 측정오차가 개입될 가능성이 존재하는 것이다. 이에 본 연구에서는 라이다에 의한 풍속연직분포 측정 시 샘플링 부피의 구간 평균화 과정에서 발생하는 불확도(uncertainty)를 정량적으로 분석함으로써 라이다에 의한 풍속연직분포 관측의 불확도를 정량평가하고자 한다.

  • PDF

Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service (실시간 인터넷 보안 서비스 제공을 위한 정책기반 통합 서버 설계 및 시뮬레이션)

  • Kim, Gi-Yeong;An, Gae-Il;Jang, Jong-Su;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.565-572
    • /
    • 2001
  • Recently, due to the open architecture of the internet and wide spread of internet users, the cyber terror threatens to the network\`s weak point are tending grow. Until now, information security solutions are passive on security host and particular security system. This passive information security solution is weak from the attacks through the networks connected worldwide internet systems, and has limitation on the defense against cyber terror attacks. Therefore, network level integrated security function must be provided. In this paper, we consider technology limitations on the information security problems and its environment. Then we present the architecture and functions of policy-based information security services for network level active information security function. This paper also includes design of target system, which provide information security services. Finally, we discuss network level system deployment direction and discuss with Network Security Simulation.

  • PDF

Image Registration of Cloudy Pushbroom Scanner Images (구름을 포함한 푸쉬브룸 스캐너 영상의 밴드간 상호등록)

  • Lee, Won-Hee;Yu, Su-Hong;Heo, Joon
    • Korean Journal of Remote Sensing
    • /
    • v.27 no.1
    • /
    • pp.9-15
    • /
    • 2011
  • Since PAN(panchromatic) and MS(multispectral) imagery of pushbroom scanner have the offset between PAN and MS CCD(charge coupled device) in the focal plane, PAN and MS images are acquired at different time and angle. Since clouds are fast moving objects, they should lead mis-registration problem with wrong matching points on clouds. The registration of cloudy imagery to recognize and remove the contamination of clouds can be categorized into three classes: (1) cloud is considered as nose and removed (2) employing multi-spectral imagery (3) using multi-temporal imagery. In this paper, method (1) and (3) are implemented and analysed with cloudy pushbroom scanner images.

Operation Measures of Sea Fog Observation Network for Inshore Route Marine Traffic Safety (연안항로 해상교통안전을 위한 해무관측망 운영방안에 관한 연구)

  • Joo-Young Lee;Kuk-Jin Kim;Yeong-Tae Son
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.2
    • /
    • pp.188-196
    • /
    • 2023
  • Among marine accidents caused by bad weather, visibility restrictions caused by sea fog occurrence cause accidents such as ship strand and ship bottom damage, and at the same time involve casualties caused by accidents, which continue to occur every year. In addition, low visibility at sea is emerging as a social problem such as causing considerable inconvenience to islanders in using transportation as passenger ships are collectively delayed and controlled even if there are local differences between regions. Moreover, such measures are becoming more problematic as they cannot objectively quantify them due to regional deviations or different criteria for judging observations from person to person. Currently, the VTS of each port controls the operation of the ship if the visibility distance is less than 1km, and in this case, there is a limit to the evaluation of objective data collection to the extent that the visibility of sea fog depends on the visibility meter or visual observation. The government is building a marine weather signal sign and sea fog observation networks for sea fog detection and prediction as part of solving these obstacles to marine traffic safety, but the system for observing locally occurring sea fog is in a very insufficient practical situation. Accordingly, this paper examines domestic and foreign policy trends to solve social problems caused by low visibility at sea and provides basic data on the need for government support to ensure maritime traffic safety due to sea fog by factually investigating and analyzing social problems. Also, this aims to establish a more stable maritime traffic operation system by blocking marine safety risks that may ultimately arise from sea fog in advance.