• Title/Summary/Keyword: 통합탐지

Search Result 378, Processing Time 0.023 seconds

Detection and Analysis of Post-Typhoon, Nabi Three-Dimensional Changes in Haeundae Sand Beach Topography using GPS and GIS Technology (GPS·GIS 기법을 활용한 태풍 후 해운대 해빈지형의 3차원 변화 탐지 및 분석)

  • Hong, Hyun-Jung;Choi, Chul-Uong;Jeon, Seong-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.3
    • /
    • pp.82-92
    • /
    • 2006
  • As beaches throughout Korea have suffered great losses of sand due to artificial developments and meteorological phenomena, particularly typhoons, it is necessary to monitor beaches that are prone to erosion continuously, establish and enforce a comprehensive plan to attack coastal erosion with the object of the long-term management. However, debates and temporary measures, not based on accurate coastal zone surveys and analyses, have been established up to now. Therefore, with Haeundae sand beach as a case study, we proposed methods to collect accurate spatial data of the coastline and the sand beach through GPS survey. And we detected and analyzed topographic changes resulting from Typhoon Nabi quantitatively and qualitatively, by using GIS technique. Results showed a mean elevation of 1.95 m, a total area of 53,441 $m^2$, and a total volume of 104,639 $m^3$ after Typhoon Nabi. Mean elevation rose 0.06 m between the pre- and the post-typhoon surveys by a protective shore wall. However, strong winds and north-northeast surges brought by the typhoon caused erosion of the area and the volume, by 3,096 $m^2$ and 2,320 $m^3$. Accurate spatial databases of coastal zones based on integrated GPS GIS techniques and quantitative and qualitative analyses of topographical changes will help Korea develop systematic and effective countermeasures against coastal erosion.

  • PDF

Application of IHS Transform Method for Understanding of Groundwater Resources Distribution in the Haenam area (해남지역 지하수 부존 분포 파악을 위한 IHS 변환 적용)

  • 김승태;이기원;유인걸;송무영
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2003.04a
    • /
    • pp.51-55
    • /
    • 2003
  • 본 연구는 조사대상지역인 전라남도 해남군 전역에 대해 현장조사된 지질 및 지하수 양수량 자료등과 같은 수리정보를 종합적으로 분석하고 이를 Landsat 영상자료과의 영상융합 과정을 통해 지하수 부존가능성에 대한 수리 지질 지표정보로 추출함으로서 지하수 특성정보를 위성영상정보와 연계하여 효과적으로 도시하고자 하였다. 현장조사시 획득된 자료는 해남지역을 11개 소유역으로 구분한 후 각 구역에 대한 2000여개 관점에서 측정된 양수량과 안정지하수위를 이용하여 산출한 비용출량 자료(groundwater specific capacity)와 각 소 유역 (unit watershed)에 대한 선구조 분석자료, 지질별 분포, 정밀고도자료를 추출하여 산출한 고도, 경사도 분포, 수계패턴과 수계밀도로서 이를 통합적으로 분석하여 해남지역에 대한 지하수 특성을 파악하고자 하였다. 위성영상자료의 처리과정은 Landsat 5 TM 영상자료는 '86. 12. 11 및 '98. 12. 28에 촬영된 WRS(World Reference System) Row-Path116-36로서, 1986년 영상은 12년 차이의 해남의 변화지역을 탐지하기 위한 영상자료로서 활용하였으며 98년 영상을 주요 분석 자료로 이용하였으며 지표 이용정보 추출은 크게 수역추출, 식생분포추출, 지표분류도, 변화탐지영역추출로 구분된다. 본 연구방법은 크게 위성영상분석을 통해 추출된 정보와 지표조사를 통해 획득된 선구조 및 지하수 정보를 Data fusion 방식으로 이용되고 있는 IHS 변환 기법을 통해 본 역에 대한 지하수 정보 및 간척지 등에 의한 지표 개발에 따른 지하수 부존 가능성을 탐색하기 위한 현황을 효과적인 자료로 표현하고자 하였다.및 스페클 잡영 제거 정도에 있어 다른 필터들과 큰 차이가 없지만 경계선보존지수는 다른 필터들에 비하여 가장 우수함을 확인할 수 있었다.rbon 탐식효율을 조사한 결과 B, D 및 E 분획에서 유의적인 효과를 나타내었다. 이상의 결과를 종합해볼 때, ${\beta}$-glucan은 고용량일 때 직접적으로 또는 $IFN-{\gamma}$ 존재시에는 저용량에서도 복강 큰 포식세로를 활성화시킬 뿐 아니라, 탐식효율도 높임으로써 면역기능을 증진 시키는 것으로 나타났고, 그 효과는 crude ${\beta}$-glucan의 추출조건에 따라 달라지는 것을 알 수 있었다.eveloped. Design concepts and control methods of a new crane will be introduced in this paper.and momentum balance was applied to the fluid field of bundle. while the movement of′ individual material was taken into account. The constitutive model relating the surface force and the deformation of bundle was introduced by considering a representative prodedure that stands for the bundle movement. Then a fundamental equations system could be simplified considering a steady state of the process. On th

  • PDF

Molecular biological studies on Heat-Shock Responses in Amoeba proteus: I. Detection of Heat-shock Proteins (아메바(Amoebaproteus)의 열충격 대응에 관한 분자생물학적 연구: 1 . 열충격 대응 단백질의 탐색)

  • 홍혜경;최지영안태인
    • The Korean Journal of Zoology
    • /
    • v.37 no.4
    • /
    • pp.554-564
    • /
    • 1994
  • 세균이 세포내 공생하는 xD strain과 모 세포주인 tD strain Amoeba proteus의 열충격 대응의 차이를 알아 보기 위하여 방사선 동위원소로 표지된 아미노산을 Ca2+_less Chalkley's 용액에서 음작용 경로를 통하여 90분 동안 흡수하게 하고, 저온 및 고온 스트레스에 대하여 새로 합성되는 스트레스 대응 단백질의 양상을 1, 2차원 전기영동 및 자기방사 사진법에 의해서 비교하였다 저온(10"C) 충격에 대응하여 아메바는 두 strain 모두 56.0 kDa, pl 6.0 단백질을 강하게 발현하였으며, xD strain에서는 tD strain과 달리 저온 충격 초기에 66 0 kDa, pl 5.5 단백질의 발현이 중단되었다. 한편 고온(33"C) 열충격에 대하여 두 strain 아메바에서 모두 10여종의 단백질이 새합성되는 것으로 확인되었으며, tD 아메바에는 이들 단백질의 새합성이 완만하게 이루어지는데 비하여 xD 아메바에서는 그중 66.0 kDa 단백질이 고온 대응 단백질로서 신속하게 새합성되는 것으로 나타났다. 이외에도 2차원 전기 영동 분석을 통하여 열충격에 의해서 발현이 촉진되는 다수의 단백질들을 탐지하였다 탐지된 아메바의 열충격 단백질은 분자량에 따라 hsp100군 2종, hsp90군, 3종, hsp70군 및 hsp60군 각 1종, 그리고 small csp군 4종으로 분류해 볼 수 있었다 두 분석의 결과를 종합해 보면 tD 아메바에는 저온 및 고온 충격에 대하여 열충격 단백질의 합성이 완만하게 상승하는 데 비하여 xD strain에서는 신속하게 이루어졌다. 이상의 결과로 보아 아메바의 세포내 공생 세균은 숙주의 열충격 대응기작에 변화를 야기한 것으로 판단된다한 것으로 판단된다. 10mg과 20mg의 estrogen 처리구 사이에 유두 직경, 길이 그리고 용적의 증가량에 있어서는 차이가 없었다. 10mg 및 20mg의 estrogen 처리는 초발정일령을 각각 20일 및 124일 단축시켰다. 전체적으로 이러한 결과는 송아지에 estradiol의 삽입은 성장과 유선 발달을 촉진시키고 초발정일령을 단축시킬수 있다는 것을 강력하게 지적한다. 일치하지 않으므로 더욱 정밀한 조사를 실시하여 분류학상의 위치를 정확히 밝혀 볼 필요가 있을 것으로 생각되었다.연한 도구이자 정신활동으로 보게함으로써, 주제 및 연구방법에서 획일성보다 다양성과 창조성이 강조되고 있다. 그리고 연구에 있어서 주제 의 다양성을 통해 보다 현실생활에 밀접하게 연결되어야 할 필요성은 학문이나 과학의 사회 성에 대한 새로운 인식을 가져다 주고 있다. 이러한 지리교육과정의 좌표의 변화된 측면들 을 고려하여, 지리교육과정의 새로운 방향은 다음의 세가지로 모색될 수 있다. 첫째, 爭點中 心 地理敎育課程이다. 사회쟁점에 대한 접근은 쟁점의 이해와 문제해결에의 지리적 관점의 활용을 통해 학습내용의 시사성과 사실성을 높힐 수 있다. 이때 문제해결능력을 통해 현대 시민의 자질 및 능력을 기를 수 있음은 물론, 다른 한편으로 실제세계 즉 학생의 실생활, 사 회, 국가, 세계에서 일어나는 일들과의 관련성을 갖게 함으로써, 내적 동기화와 외적인 자극 을 강력하게 결합할 수 있을 것이다. 이는 개인적 유관적합성과 사회적 유관적합성을 동시 에 확보하는 데 유리할 것이다. 둘째, 思考中心 地理敎育課程이다. 지리교육은 학생들을 지 식 및 기능의 숙달자가 되도록 할 것이 아니라 기본적 문장해독력의 수준을 넘어 능력있는 사고자로 길러내는 것을 목표로 하여야 한다.

  • PDF

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.

Application of Remote Sensing Technology for Developing REDD+ Monitoring Systems (REDD+ 모니터링 시스템 구축을 위한 원격탐사기술의 활용방안)

  • Park, Taejin;Lee, Woo-Kyun;Jung, Raesun;Kim, Moon-Il;Kwon, Tae-Hyub
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.3
    • /
    • pp.315-326
    • /
    • 2011
  • In recent years, domestic and international interests focus on climate change, and importance of forest as carbon sink have been also increased. Particularly REDD+ mechanism expanded from REDD (Reduced Emissions from Deforestation and Degradation) is expected to perform a new mechanism for reducing greenhouse gas in post 2012. To conduct this mechanism, countries which try to get a carbon credit have to certify effectiveness of their activities by MRV (Measuring, Reporting and Verification) system. This study analyzed the approaches for detecting land cover change and estimating carbon stock by remote sensing technology which is considered as the effective method to develop MRV system. The most appropriate remote sensing for detection of land cover change is optical medium resolution sensors and satellite SAR (Synthetic Aperture Radar) according to cost efficiency and uncertainty assessment. In case of estimating carbon stock, integration of low uncertainty techniques, airborne LiDAR (Light Detection and Ranging), SAR, and cost efficient techniques, optical medium resolution sensors and satellite SAR, could be more appropriate. However, due to absence of certificate authority, guideline, and standard of uncertainty, we should pay continuously our attention on international information flow and establish appropriate methods. Moreover, to apply monitoring system to developing countries, close collaboration and monitoring method reflected characteristics of each countries should be considered.

Application and Analysis of Remote Sensing Data for Disaster Management in Korea - Focused on Managing Drought of Reservoir Based on Remote Sensing - (국가 재난 관리를 위한 원격탐사 자료 분석 및 활용 - 원격탐사기반 저수지 가뭄 관리를 중심으로 -)

  • Kim, Seongsam;Lee, Junwoo;Koo, Seul;Kim, Yongmin
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_3
    • /
    • pp.1749-1760
    • /
    • 2022
  • In modern society, human and social damages caused by natural disasters and frequent disaster accidents have been increased year by year. Prompt access to dangerous disaster sites that are inaccessible or inaccessible using state-of-the-art Earth observation equipment such as satellites, drones, and survey robots, and timely collection and analysis of meaningful disaster information. It can play an important role in protecting people's property and life throughout the entire disaster management cycle, such as responding to disaster sites and establishing mid-to long-term recovery plans. This special issue introduces the National Disaster Management Research Institute (NDMI)'s disaster management technology that utilizes various Earth observation platforms, such as mobile survey vehicles equipped with close-range disaster site survey sensors, drones, and survey robots, as well as satellite technology, which is a tool of remote earth observation. Major research achievements include detection of damage from water disasters using Google Earth Engine, mid- and long-term time series observation, detection of reservoir water bodies using Sentinel-1 Synthetic Aperture Radar (SAR) images and artificial intelligence, analysis of resident movement patterns in case of forest fire disasters, and data analysis of disaster safety research. Efficient integrated management and utilization plan research results are summarized. In addition, research results on scientific investigation activities on the causes of disasters using drones and survey robots during the investigation of inaccessible and dangerous disaster sites were described.

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

A Study on the Real-time Recognition Methodology for IoT-based Traffic Accidents (IoT 기반 교통사고 실시간 인지방법론 연구)

  • Oh, Sung Hoon;Jeon, Young Jun;Kwon, Young Woo;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.15-27
    • /
    • 2022
  • In the past five years, the fatality rate of single-vehicle accidents has been 4.7 times higher than that of all accidents, so it is necessary to establish a system that can detect and respond to single-vehicle accidents immediately. The IoT(Internet of Thing)-based real-time traffic accident recognition system proposed in this study is as following. By attaching an IoT sensor which detects the impact and vehicle ingress to the guardrail, when an impact occurs to the guardrail, the image of the accident site is analyzed through artificial intelligence technology and transmitted to a rescue organization to perform quick rescue operations to damage minimization. An IoT sensor module that recognizes vehicles entering the monitoring area and detects the impact of a guardrail and an AI-based object detection module based on vehicle image data learning were implemented. In addition, a monitoring and operation module that imanages sensor information and image data in integrate was also implemented. For the validation of the system, it was confirmed that the target values were all met by measuring the shock detection transmission speed, the object detection accuracy of vehicles and people, and the sensor failure detection accuracy. In the future, we plan to apply it to actual roads to verify the validity using real data and to commercialize it. This system will contribute to improving road safety.

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.