• Title/Summary/Keyword: Realtime data detection

Search Result 49, Processing Time 0.025 seconds

Analysis of Rice Field Drought Area Using Unmanned Aerial Vehicle (UAV) and Geographic Information System (GIS) Methods (무인항공기와 GIS를 이용한 논 가뭄 발생지역 분석)

  • Park, Jin Ki;Park, Jong Hwa
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.3
    • /
    • pp.21-28
    • /
    • 2017
  • The main goal of this paper is to assess application of UAV (Unmanned Aerial Vehicle) remote sensing and GIS based images in detection and measuring of rice field drought area in South Korea. Drought is recurring feature of the climatic events, which often hit South Korea, bringing significant water shortages, local economic losses and adverse social consequences. This paper describes the assesment of the near-realtime drought damage monitoring and reporting system for the agricultural drought region. The system is being developed using drought-related vegetation characteristics, which are derived from UAV remote sensing data. The study area is $3.07km^2$ of Wonbuk-myeon, Taean-gun, Chungnam in South Korea. UAV images were acquired three times from July 4 to October 29, 2015. Three images of the same test site have been analysed by object-based image classification technique. Drought damaged paddy rices reached $754,362m^2$, which is 47.1 %. The NongHyeop Agricultural Damage Insurance accepted agricultural land of 4.6 % ($34,932m^2$). For paddy rices by UAV investigation, the drought monitoring and crop productivity was effective in improving drought assessment method.

Background Subtraction Algorithm by Using the Local Binary Pattern Based on Hexagonal Spatial Sampling (육각화소 기반의 지역적 이진패턴을 이용한 배경제거 알고리즘)

  • Choi, Young-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.15B no.6
    • /
    • pp.533-542
    • /
    • 2008
  • Background subtraction from video data is one of the most important task in various realtime machine vision applications. In this paper, a new scheme for background subtraction based on the hexagonal pixel sampling is proposed. Generally it has been found that hexagonal spatial sampling yields smaller quantization errors and remarkably improves the understanding of connectivity. We try to apply the hexagonally sampled image to the LBP based non-parametric background subtraction algorithm. Our scheme makes it possible to omit the bilinear pixel interpolation step during the local binary pattern generation process, and, consequently, can reduce the computation time. Experimental results revealed that our approach based on hexagonal spatial sampling is very efficient and can be utilized in various background subtraction applications.

Geographical Name Denoising by Machine Learning of Event Detection Based on Twitter (트위터 기반 이벤트 탐지에서의 기계학습을 통한 지명 노이즈제거)

  • Woo, Seungmin;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.10
    • /
    • pp.447-454
    • /
    • 2015
  • This paper proposes geographical name denoising by machine learning of event detection based on twitter. Recently, the increasing number of smart phone users are leading the growing user of SNS. Especially, the functions of short message (less than 140 words) and follow service make twitter has the power of conveying and diffusing the information more quickly. These characteristics and mobile optimised feature make twitter has fast information conveying speed, which can play a role of conveying disasters or events. Related research used the individuals of twitter user as the sensor of event detection to detect events that occur in reality. This research employed geographical name as the keyword by using the characteristic that an event occurs in a specific place. However, it ignored the denoising of relationship between geographical name and homograph, it became an important factor to lower the accuracy of event detection. In this paper, we used removing and forecasting, these two method to applied denoising technique. First after processing the filtering step by using noise related database building, we have determined the existence of geographical name by using the Naive Bayesian classification. Finally by using the experimental data, we earned the probability value of machine learning. On the basis of forecast technique which is proposed in this paper, the reliability of the need for denoising technique has turned out to be 89.6%.

A Practical Effectiveness Analysis on Alert Verification Method Based on Vulnerability Inspection (취약점 점검을 활용한 보안이벤트 검증 방법의 실증적 효과분석)

  • Chun, Sung-Taek;Lee, Youn-Su;Kim, Seok-Hun;Kim, Kyu-Il;Seo, Chang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.39-49
    • /
    • 2014
  • Cyber threats on the Internet are tremendously increasing and their techniques are also evolving constantly. Intrusion Detection System (IDS) is one of the powerful solutions for detecting and analyzing the cyber attacks in realtime. Most organizations deploy it into their networks and operate it for security monitoring and response service. However, IDS has a fatal problem in that it raises a large number of alerts and most of them are false positives. In order to cope with this problem, many approaches have been proposed for the purpose of automatically identifying whether the IDS alerts are caused by real attacks or not. In this paper, we present an alert verification method based on correlation analysis between vulnerability inspection results for real systems that should be protected and the IDS alerts. In addition, we carry out practical experiments to demonstrate the effectiveness of the proposed verification method using two types of real data, i.e., the IDS alerts and the vulnerability inspection results.

A Multi-objective Ant Colony Optimization Algorithm for Real Time Intrusion Detection Routing in Sensor Network (센서 네트워크에서 실시간 침입탐지 라우팅을 위한 다목적 개미 군집 최적화 알고리즘)

  • Kang, Seung-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.191-198
    • /
    • 2013
  • It is required to transmit data through shorter path between sensor and base node for real time intrusion detection in wireless sensor networks (WSN) with a mobile base node. Because minimum Wiener index spanning tree (MWST) based routing approach guarantees lower average hop count than that of minimum spanning tree (MST) based routing method in WSN, it is known that MWST based routing is appropriate for real time intrusion detection. However, the minimum Wiener index spanning tree problem which aims to find a spanning tree which has the minimum Wiener index from a given weighted graph was proved to be a NP-hard. And owing to its high dependency on certain nodes, minimum Wiener index tree based routing method has a shorter network lifetime than that of minimum spanning tree based routing method. In this paper, we propose a multi-objective ant colony optimization algorithm to tackle these problems, so that it can be used to detect intrusion in real time in wireless sensor networks with a mobile base node. And we compare the results of our proposed method with MST based routing and MWST based routing in respect to average hop count, network energy consumption and network lifetime by simulation.

Development of PCS and an experiment for performance evaluation (PCS(Pressure Core Sampler) 개발 및 성능평가실험)

  • Lee, Ha-jung;Kim, Hae-jin;Lee, Gye-gwang;Jung, Hyo-seok;Son, In-rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.9
    • /
    • pp.973-980
    • /
    • 2015
  • With their wide geographical distribution, unconventional resources are continuously compared against conventional resources, but their development is expanding because TRRs (Technical Recoverable Resources) are similar to conventional resources. In particular, there is active development of unconventional gas resources such as shale gas, tight gas, CBM (coalbed methane) and gas hydrate. However, it is difficult to calculate the material properties of unconventional resources, especially the gas content, with current geophysical logging technology. Additionally, some overseas companies have monopolies on related equipment and materials. Therefore, this study developed a reservoir PCS (Pressure Core Sampler). It can collect core samples without gaseous loss by maintaining high pressure from the moment the core is sampled and record pressure and temperature in real time. Successful performance testing was also carried out for official verification of the manufactured PCS. The reservoir PCS will contribute to the acquisition of geophysical well logging data as well as accurate and reliable cores.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

A Implementation of Electronic Measurement Datum Point Monitoring S/W based on Object-Oriented Modeling for Multi Purpose and High Availability (다목적 및 고활용성을 위한 객체지향 모델링 기반의 전자 측량기준점 모니터링 S/W 구현)

  • Jung, Se-Hoon;Sim, Chun-Bo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.99-112
    • /
    • 2015
  • Datum point for displaying location and altitude of point has being advantage usefully in various measurement parts. However, datum point has been increasing loss cases owing to weather changes and stratum changes and neglecting meaninglessly. In this paper, we design and implement a multi electronic measurement system monitoring software with functions such as include maximize utilization of existing measurement datum system as well as collected various environment data and detection stratum changes of surround area. Proposed software is implemented to support that reusability and extensibility of software using object oriented modeling method. Our software supports a GUI for electronic measurement datum point administrator as well as for web user and mobile user. Our system can support a graph GUI for various data analysis and reposition in realtime to database that measured location information and various sensing information to prevent loss of electronic measurement datum point and to detected stratum changes. In addition, we include a QR code and RFID recognition function. Finally, we suggest performance evaluation result to confirm stratum changes detection and GPS location error rate.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.