• Title/Summary/Keyword: 통합탐지

Search Result 378, Processing Time 0.038 seconds

Recent Developments and Field Application of Foreign Waterworks Automatic Meter Reading (국외 상수도 원격검침시스템의 개발 동향 및 현장 적용 사례 고찰)

  • Joo, Jin Chul;Ahn, Hosang;Ahn, Chang Hyuk;Ko, Kyung-Rok;Oh, Hyun-Je
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.34 no.12
    • /
    • pp.863-870
    • /
    • 2012
  • The market trends of automatic meter reading associated with smart water meters were investigated. Also, recent developments and field applications of key technology for automatic meter reading associated with smart water meters were analyzed. Smart water meters have been manufactured mostly in United States and Europe and have been expanded their business to Asia. Integrated water management system combining with the additional functions such as real-time consumption metering, cost notification, water conservation, leak detection, water quality monitoring, and flow control have been operated in automatic meter reading. Both water quality and quantity data measured from smart water meters and sensors were transferred to data concentration units through neighborhood area network, and then were transferred to integrated server through wide area network. The data transfer methods were determined by comprehensively considering urban scale, density of smart water meters, power supply and network topologies. Common data collection methods such as fixed network to data concentation units, vehicles drive by, people walk by, and drone fly by have been applied. The automatic meter reading associated with smart water meters are spread throughout the world, and both water and energy savings result in saving the money and reducing the greenhouse gases emission.

Wide Integrated Surveillance System of Marine Territory Using Multi-Platform (다중플랫폼을 이용한 해양영토 광역통합감시 시스템)

  • Ryu, Joo-Hyung;Lee, Seok;Kim, Duk-jin;Hwang, Jae Dong
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.307-311
    • /
    • 2018
  • It is necessary to establish wide integrated surveillance system of marine territory to reduce damage caused by maritime security threats, marine pollution and accidents for safe and clean marine use and efficient development of marine resources. For marine surveillance, the information characteristics of space-time specific, accuracy and operability are required, and real-time information about the wide area should be provided at all times. This special issue has been published to identify the characteristics of each platform, evaluate its usability for the establishment of a wide integrated surveillance system, and present the direction for future convergence studies between platforms. Since 2015, KIOST and cooperative research team have been performing the project, "Base research for building wide integrated surveillance system of marine territory using multi-platform" that detect vessels and red tide etc. near real time by using satellite, UAV and HF Ocean Radar. The objective of this special issue is to introduce the significance for an integrated system for maritime surveillance and to create a forum for discussion on recent advances in remote sensing technology and applications for marine disasters, pollution, and accident surveillance.

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

Change Detection of Land Cover Environment using Fuzzy Logic Operation : A Case Study of Anmyeon-do (퍼지논리연산을 이용한 토지피복환경 변화분석: 안면도 사례연구)

  • 장동호;지광훈;이현영
    • Korean Journal of Remote Sensing
    • /
    • v.18 no.6
    • /
    • pp.305-317
    • /
    • 2002
  • The purpose of this study is to analyze the land cover environmental changes in the Anmyeon-do. Especially, it centers on the changes in the land cover environment through methods of GIS and remote sensing. The land cover environmental change areas were detected from remote sensing data, and geographic data sets related to land cover environment change were built as a spatial database in GIS. Fuzzy logic was applied for data representation and integration of thematic maps. In the natural, social, and economic environment variables, the altitude, population density, and the national land use planning showed higher fuzzy membership values, respectively. After integrating all thematic maps using fuzzy logic operation, it is possible to predict the change quantitatively. In the study area, a region where land cover change will be likely to occur is the one on a plain near the shoreline. In particular, the hills of less than 5% slope and less than 15m altitude, adjacent to the ocean, were quite vulnerable to the aggravation of coastal environment on account of current, large-scale development. In conclusions, it is expected that the generalized scheme used in this study is regarded as one of effective methodologies for land cover environmental change detection from geographic data.

Proposal for Research Model of High-Function Patrol Robot using Integrated Sensor System (통합 센서 시스템을 이용한 고기능 순찰 로봇의 연구모델 제안)

  • Byeong-Cheon Yoo;Seung-Jung Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.77-85
    • /
    • 2024
  • In this dissertation, a we designed and implemented a patrol robot that integrates a thermal imaging camera, speed dome camera, PTZ camera, radar, lidar sensor, and smartphone. This robot has the ability to monitor and respond efficiently even in complex environments, and is especially designed to demonstrate high performance even at night or in low visibility conditions. An orbital movement system was selected for the robot's mobility, and a smartphone-based control system was developed for real-time data processing and decision-making. The combination of various sensors allows the robot to comprehensively perceive the environment and quickly detect hazards. Thermal imaging cameras are used for night surveillance, speed domes and PTZ cameras are used for wide-area monitoring, and radar and LIDAR are used for obstacle detection and avoidance. The smartphone-based control system provides a user-friendly interface. The proposed robot system can be used in various fields such as security, surveillance, and disaster response. Future research should include improving the robot's autonomous patrol algorithm, developing a multi-robot collaboration system, and long-term testing in a real environment. This study is expected to contribute to the development of the field of intelligent surveillance robots.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

Designing a Repository Independent Model for Mining and Analyzing Heterogeneous Bug Tracking Systems (다형의 버그 추적 시스템 마이닝 및 분석을 위한 저장소 독립 모델 설계)

  • Lee, Jae-Kwon;Jung, Woo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.103-115
    • /
    • 2014
  • In this paper, we propose UniBAS(Unified Bug Analysis System) to provide a unified repository model by integrating the extracted data from the heterogeneous bug tracking systems. The UniBAS reduces the cost and complexity of the MSR(Mining Software Repositories) research process and enables the researchers to focus on their logics rather than the tedious and repeated works such as extracting repositories, processing data and building analysis models. Additionally, the system not only extracts the data but also automatically generates database tables, views and stored procedures which are required for the researchers to perform query-based analysis easily. It can also generate various types of exported files for utilizing external analysis tools or managing research data. A case study of detecting duplicate bug reports from the Firfox project of the Mozilla site has been performed based on the UniBAS in order to evaluate the usefulness of the system. The results of the experiments with various algorithms of natural language processing and flexible querying to the automatically extracted data also showed the effectiveness of the proposed system.

Implement for EzPlay and PC-EPG of Multimedia Remote Control System (EzPlay/EPG를 적용한 멀티미디어 원격제어 시스템 구현)

  • Park Nho-Kyung;Jin Hun-Jun;Kim Sang-Pok;Park Sang-Bong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.2 s.302
    • /
    • pp.39-48
    • /
    • 2005
  • In this paper, we implement the multimedia remote control system by using existing internet service or wired online. We also provide user-friendly convenient environment with developed application program named EzPlay and PC-EPG. The multimedia remote control system consists of integrated wireless transceiver of PC and TV connected USB type and the users can easily use lots of contents because EzPlay program provides appropriate UI mode on the PC and TV screen. The unposed system can operate real-time playing, reserved video receding and data storing function using internet mesh based on signal detecting control theory. The PC-EPG system is implemented by server/client web program and the client program based on visual C++/MFC processes data storing in client computer through TCP/IP. It also provides intelligent function that constructs database according to user's preference.

Take-Over Time Determination for High-Velocity Targets in a Multiple Radar System (다중 레이다 시스템의 고속표적 인계 시점 결정기법 연구)

  • Park, Soon-Seo;Jang, Dae-Sung;Choi, Han-Lim;Kim, Eun-Hee;Sun, Woong;Lee, Jong-Hyun;Yoo, Dong-Gil
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.3
    • /
    • pp.307-316
    • /
    • 2016
  • A multiple radar system is comprised of early warning radar for fast detection of a target and air defense radar for precision intercept. For this reason, target take-over process is required between the two radars. The target take-over should be performed at an appropriate time by consideration of stable tracking and effective fire control. In this paper, operation characteristics of multiple radar system are analyzed and target take-over time determination method using estimation of target tracking performance is proposed for high-velocity targets. The proposed method is validated with ballistic target defense scenarios in the developed integrated simulator.

Cyber forensics domain ontology for cyber criminal investigation (사이버 범죄 수사를 위한 사이버 포렌식 범주 온톨로지)

  • Park, Heum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1687-1692
    • /
    • 2009
  • Cyber forensics is used the process and technology of digital forensics as a criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data in cyber space. Accordingly, it is difficult to determine relational crime types, collect evidence and the legal admissibility of evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. In this paper, we constructed a cyber forensics domain ontology for cyber criminal investigation using the concepts, relations and properties, according to categories of cyber crime, laws, evidence, and information of criminals and crime-cases. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.