• Title/Summary/Keyword: 탐지/추적

Search Result 562, Processing Time 0.041 seconds

Classification Type of Weapon Using Artificial Intelligence for Counter-battery RadarPaper Title (인공지능을 이용한 대포병탐지레이더의 탄종 식별)

  • Park, Sung-Jin;Jin, Hyung-Seuk
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.921-930
    • /
    • 2020
  • The Counter-battery radar estimates the origin and impact point of the artillery by tracking the trajectory of the shell. In addition, it has the ability of identifying the type of weapon. Depending on the position between the shell and the radar, the detected signals appear differently. This has ambiguity to distinguish the type of shells. This paper compares fuzzy logic and artificial intelligence, which classifies type of shell using the parameter of signal processing step. According to the research result, artificial intelligence can improve identification rate of type of shell. The data used in the experiment was obtained from a live fire detection test.

Design of Bottleneck detection and analysis System on Web-base (Web 기반 bottleneck 구간 탐지 및 분석 시스템의 설계)

  • Sung, Yun-Gook;Cho, Kang-Hong;Choi, Young-Su;Chung, Jin-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.681-684
    • /
    • 2000
  • 본 논문은 Client & Server 모델을 기반으로 선로 이용률과 응답시간을 분석, 조합하여 웹 상에서 해당 목적지 경로 사이에 있을 수 있는 bottleneck 구간을 탐지하기 위한 시스템을 설계하였다. 이를 위해 traceroute를 이용하여 사용자와 해당 목적지 경로 사이의 인터페이스들을 추적하였다. 추적된 인터페이스들의 IP로 TCP/IP 표준 네트워크 망 관리 프로토콜인 SNMP Polling을 하여 인터페이스로부터 각종 MIB 정보들을 가져와 각 인터페이스간의 선로 이용률을 분석해냈으며, 또한 정확한 bottleneck 구간을 알아내고자 각 라우터로 ping을 실행시켜 응답시간을 계산하였다. 이렇게 얻은 선로 이용률과 응답시간으로 보다 정확한 트래픽 정보와 bottleneck 구간을 분석해낼 수 있었다. 이러한 분석 시스템으로 인해 사용자들은 전문적인 지식 없이 단지 자신의 컴퓨터의 웹브라우저를 통한 서버 분석 시스템 접속만으로도 해당 구간의 어떤 부분이 bottleneck 구간인지를 탐지, 분석할 수 있을 것이다.

  • PDF

Performance Comparision of Deadlock Detection Schemes in Distributed Database Systems (분산 데이터베이스 시스템에서의 교착상태 탐지기법의 성능평가)

  • 이원섭;이상희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.26-33
    • /
    • 2003
  • The edge-chasing deadlock detection algorithm of Choudhary fails to remove the existing deadlocks after committing the transaction whose priority is lowest on the transaction wait-for path. We proposed a modified algorithm that solves this problem. In this thesis, the performance of the modified algorithm is compared with that of the Tsai's deadlock detection algorithm that uses transaction-resource graph(TR graph) using simulation approach.

  • PDF

Real-time Object Tracking System using Variable Searching Window (가변 탐색창을 이용한 실시간 객체 추적 시스템)

  • 지정규;김용균
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.52-58
    • /
    • 2002
  • This Paper describes the method of real time object tracking using variable searching window. Monitoring systems require real time object tracking in video, efficiencies depend on environment of monitoring target. To get a position of object using a difference between background image and input image, the system extracts contour and centroid of the object. This method track motion of object using variable searching window from size and position of object. The background imgaes and camera are limited as fixed environment. The test result of proposed method Is 17-23FPS, this shows more fast process speed than average(10-14FPS) of existing object tracking method.

  • PDF

Long-Distance Plume Detection Simulation for a New MWIR Camera (장거리 화염 탐지용 적외선 카메라 성능 광선추적 수치모사)

  • Yoon, Jeeyeon;Ryu, Dongok;Kim, Sangmin;Seong, Sehyun;Yoon, Woongsup;Kim, Jieun;Kim, Sug-Whan
    • Korean Journal of Optics and Photonics
    • /
    • v.25 no.5
    • /
    • pp.245-253
    • /
    • 2014
  • We report a realistic field-performance simulation for a new MWIR camera. It is designed for early detection of missile plumes over a distance range of a few hundred kilometers. Both imaging and radiometric performance of the camera are studied by using real-scale integrated ray tracing, including targets, atmosphere, and background scene models. The simulation results demonstrate that the camera would satisfy the imaging and radiometric performance requirements for field operation.

Performance Analysis of Omni-Directional Automatic Target Detection and Tracking for a Towed Array Passive Sonar System (예인형 수동소나에 적합한 전방위 표적 자동탐지 및 추적기법 성능 분석)

  • Seo, Ik-Su
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.3
    • /
    • pp.33-40
    • /
    • 2006
  • In towed array passive sonar system, sonar operators cannot detect and track the all targets simultaneously in the omni-directional area by just Operator Initiated Tracking(OIT). In this paper, omni-directional automatic target detection and tracking algorithm is described and optimize the parameters through ocean data to overcome the drawbacks of OITs. The algorithm is verified through sea trials with submarines.

Quantification of Angular Prediction Accuracy for Phased Array Radar Tracking (위상배열레이더 추적 각도예측의 정확도 정량화)

  • Hong, Sun-Mog
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.1
    • /
    • pp.74-79
    • /
    • 2012
  • Scalar quantification of the angular prediction error covariance matrix is considered for characterizing tracking performances in phased array radar tracking. Specifically, the maximum eigenvalue and the trace of the covariance matrix are examined in terms of consistency in parameterizing the probability of detection, taking antenna beam-pointing losses into account, and it is shown numerically that the latter is more consistent.

On-the-fly Detection of Race Conditions in Message-Passing Programs (메시지 전달 프로그램에서의 수행 중 경합탐지)

  • Park, Mi-Young;Kang, Moon-Hye;Jun, Yong-Kee;Park, Hyuk-Ro
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.267-275
    • /
    • 2007
  • Message races should be detected for debugging message-passing parallel programs because they can cause non-deterministic executions. Specially, it is important to detect the first race in each process because the first race can cause the occurrence of the other races in the same process. The previous techniques for detecting the first races require more than two monitored runs of a program or analyze a trace file which size is proportional to the number of messages. In this paper we introduce an on-the-fly technique to detect the first race in each process without generating any trace file. In the experiment we test the accuracy of our technique with some benchmark programs and it shows that our technique detects the first race in each process in all benchmark programs.

Buffer Overflow Malicious Code Detection by Tracing Executable Area of Memory (메모리 실행영력 추적을 사용한 버퍼오버플로 악성코드 탐지기법)

  • Choi, Sung-Woon;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.189-194
    • /
    • 2009
  • Most of anti-virus programs detect and compare the signature of the malicious code to detect buffer overflow malicious code. Therefore most of anti-virus programs can't detect new or unknown malicious code. This paper introduces a new way to detect malicious code traces memory executable of essentials APIs by malicious code. To prove the usefulness of the technology, 7 sample codes were chosen for compared with other methods of 8 anti-virus programs. Through the simulation, It turns out that other anti-virus programs could detect only a limited portion of the code, because they were implemented just for detecting not heap areas but stack areas. But in other hand, I was able to confirm that the proposed technology is capable to detect the malicious code.

A study of Unioned Intrusion Detection System & Intrusion Prevention System based on Kernel (커널기반의 통합 침입 탐지와 침입 차단 시스템에 관한 연구)

  • Jeong, Jong-Geun;Ha, Chu-Ja;Kim, Chul-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1121-1124
    • /
    • 2004
  • 일반적인 침입탐지 시스템의 원리를 보면 공격자가 공격 패킷을 보내면 침입탐지서버에 IDS 프로그램으로 공격자의 패킷을 기존의 공격패턴과 비교하여 탐지한다. 공격자가 일반적인 공격 패킷이 아닌 패킷을 가짜 패킷과 공격 패킷을 겸용한 진보된 방법을 사용할 경우 IDS는 이를 탐지하지 못하고 로그 파일에 기록하지 않는다. 이는 패턴 검사에 있어 공격자가 IDS를 속였기 때문이다. 따라서 공격자는 추적 당하지 않고서 안전하게 공격을 진행할 수 있다. 본 논문에서는 이러한 탐지를 응용프로그램 단계가 아닌 커널 단계에서 탐지함으로서 침입탐지뿐만 아니라 침입 방지까지 할 수 있도록 하였다.

  • PDF