• Title/Summary/Keyword: real-time damage detection

Search Result 162, Processing Time 0.026 seconds

Impact Monitoring of Composite Structures using Fiber Bragg Grating Sensors (광섬유 브래그 격자 센서를 이용한 복합재 구조물의 충격 모니터링 기법 연구)

  • Jang, Byeong-Wook;Park, Sang-Oh;Lee, Yeon-Gwan;Kim, Chun-Gon;Park, Chan-Yik;Lee, Bong-Wan
    • Composites Research
    • /
    • v.24 no.1
    • /
    • pp.24-30
    • /
    • 2011
  • Low-velocity impact can cause various damages which are mostly hidden inside the laminates or occur in the opposite side. Thus, these damages cannot be easily detected by visual inspection or conventional NDT systems. And if they occurred between the scheduled NDT periods, the possibilities of extensive damages or structural failure can be higher. Due to these reasons, the built-in NDT systems such as real-time impact monitoring system are required in the near future. In this paper, we studied the impact monitoring system consist of impact location detection and damage assessment techniques for composite flat and stiffened panel. In order to acquire the impact-induced acoustic signals, four multiplexed FBG sensors and high-speed FBG interrogator were used. And for development of the impact and damage occurrence detections, the neural networks and wavelet transforms were adopted. Finally, these algorithms were embodied using MATLAB and LabVIEW software for the user-friendly interface.

Efficient Deep Learning Approaches for Active Fire Detection Using Himawari-8 Geostationary Satellite Images (Himawari-8 정지궤도 위성 영상을 활용한 딥러닝 기반 산불 탐지의 효율적 방안 제시)

  • Sihyun Lee;Yoojin Kang;Taejun Sung;Jungho Im
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_3
    • /
    • pp.979-995
    • /
    • 2023
  • As wildfires are difficult to predict, real-time monitoring is crucial for a timely response. Geostationary satellite images are very useful for active fire detection because they can monitor a vast area with high temporal resolution (e.g., 2 min). Existing satellite-based active fire detection algorithms detect thermal outliers using threshold values based on the statistical analysis of brightness temperature. However, the difficulty in establishing suitable thresholds for such threshold-based methods hinders their ability to detect fires with low intensity and achieve generalized performance. In light of these challenges, machine learning has emerged as a potential-solution. Until now, relatively simple techniques such as random forest, Vanilla convolutional neural network (CNN), and U-net have been applied for active fire detection. Therefore, this study proposed an active fire detection algorithm using state-of-the-art (SOTA) deep learning techniques using data from the Advanced Himawari Imager and evaluated it over East Asia and Australia. The SOTA model was developed by applying EfficientNet and lion optimizer, and the results were compared with the model using the Vanilla CNN structure. EfficientNet outperformed CNN with F1-scores of 0.88 and 0.83 in East Asia and Australia, respectively. The performance was better after using weighted loss, equal sampling, and image augmentation techniques to fix data imbalance issues compared to before the techniques were used, resulting in F1-scores of 0.92 in East Asia and 0.84 in Australia. It is anticipated that timely responses facilitated by the SOTA deep learning-based approach for active fire detection will effectively mitigate the damage caused by wildfires.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Development and Performance Evaluation of Multi-sensor Module for Use in Disaster Sites of Mobile Robot (조사로봇의 재난현장 활용을 위한 다중센서모듈 개발 및 성능평가에 관한 연구)

  • Jung, Yonghan;Hong, Junwooh;Han, Soohee;Shin, Dongyoon;Lim, Eontaek;Kim, Seongsam
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_3
    • /
    • pp.1827-1836
    • /
    • 2022
  • Disasters that occur unexpectedly are difficult to predict. In addition, the scale and damage are increasing compared to the past. Sometimes one disaster can develop into another disaster. Among the four stages of disaster management, search and rescue are carried out in the response stage when an emergency occurs. Therefore, personnel such as firefighters who are put into the scene are put in at a lot of risk. In this respect, in the initial response process at the disaster site, robots are a technology with high potential to reduce damage to human life and property. In addition, Light Detection And Ranging (LiDAR) can acquire a relatively wide range of 3D information using a laser. Due to its high accuracy and precision, it is a very useful sensor when considering the characteristics of a disaster site. Therefore, in this study, development and experiments were conducted so that the robot could perform real-time monitoring at the disaster site. Multi-sensor module was developed by combining LiDAR, Inertial Measurement Unit (IMU) sensor, and computing board. Then, this module was mounted on the robot, and a customized Simultaneous Localization and Mapping (SLAM) algorithm was developed. A method for stably mounting a multi-sensor module to a robot to maintain optimal accuracy at disaster sites was studied. And to check the performance of the module, SLAM was tested inside the disaster building, and various SLAM algorithms and distance comparisons were performed. As a result, PackSLAM developed in this study showed lower error compared to other algorithms, showing the possibility of application in disaster sites. In the future, in order to further enhance usability at disaster sites, various experiments will be conducted by establishing a rough terrain environment with many obstacles.

A Study on the Development of Long-term Self Powered Underground Pipeline Remote Monitoring System (자가 발전형 장기 지하매설배관 원격감시 장치 개발에 관한 연구)

  • Kim, Youngsear;Chae, Hyun-Byung;Seo, Jae-Soon;Chae, Soo-Kwon
    • Journal of the Korean Society for Environmental Technology
    • /
    • v.19 no.6
    • /
    • pp.576-585
    • /
    • 2018
  • Systematic management during the whole life cycle from construction to operation and maintenance is very important for the seven underground pipelines (waterworks, sewerage, electricity, telecommunications, gas, heating, oil including waterworks and sewerage). Especially, it is the construction process that affects the whole life cycle of underground buried pipeline. In order to construct a new city or to maintain different underground pipes, it is always necessary to dig the ground and carry out construction and related work. There is a possibility that secondary and tertiary breaks frequently occur in the pipeline construction process after the piping constructed first in this process. To solve this problem, a system is needed which can monitor damage in real time. However, the supply of electric power for continuous operation of the system is limited according to the environment of underground buried pipelines, so it is necessary to develop a stable electric power supply system using natural energy rather than existing electric power. In this study, we developed a system that can operate the pipeline monitoring system for long time (24 hours and 15 days) using natural energy using wind and solar light.

Road Patrol Strategy based on Pothole Occurrence Characteristics considering Rainfall Effects (우천에 따른 포트홀 발생 특성을 고려한 도로순찰 전략)

  • Han, Daeseok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.603-611
    • /
    • 2020
  • Potholes on the road directly affect drivers' safety, satisfaction, and vehicle damage. Thus, real-time detection and response are required. Increasing frequency of patrols allows for potholes to be detected and responded to quickly, but this takes much manpower, money, and time. In addition, potholes have different occurrence characteristics depending on the rain conditions, so it is necessary to consider the optimal frequency from an economic and road-service perspective. Therefore, a quantitative analysis was done on the effects of rainfall on the occurrence characteristics of potholes. Information on the persistence, impact of rainfall intensity, and weather information was collected over a long period. Based on the results, a risk-based, optimized, and changeable road-patrol strategy is presented. The analysis results show that the probability of pothole occurrence increases by 2.4 times in rainy weather. Furthermore, the impact continues for 3 days even after the rain stops. The probability of pothole occurrence increases by 0.46% per 1 mm of rainfall, and the occurrence characteristics react sensitively to even a small amount of rain of around 1 mm. It was concluded that road patrol is required at least once every three days for an effect-free period, while twice a day is needed for the "sphere of influence" period to achieve a 95% reliability level.ys for effect-free period, while twice a day for sphere of influence period to satisfy 95% reliability level.

PRC Maritime Operational Capability and the Task for the ROK Military (중국군의 해양작전능력과 한국군의 과제)

  • Kim, Min-Seok
    • Strategy21
    • /
    • s.33
    • /
    • pp.65-112
    • /
    • 2014
  • Recent trends show that the PRC has stepped aside its "army-centered approach" and placed greater emphasis on its Navy and Air Force for a wider range of operations, thereby reducing its ground force and harnessing its economic power and military technology into naval development. A quantitative growth of the PLA Navy itself is no surprise as this is not a recent phenomenon. Now is the time to pay closer attention to the level of PRC naval force's performance and the extent of its warfighting capacity in the maritime domain. It is also worth asking what China can do with its widening naval power foundation. In short, it is time to delve into several possible scenarios I which the PRC poses a real threat. With this in mind, in Section Two the paper seeks to observe the construction progress of PRC's naval power and its future prospects up to the year 2020, and categorize time frame according to its major force improvement trends. By analyzing qualitative improvements made over time, such as the scale of investment and the number of ships compared to increase in displacement (tonnage), this paper attempts to identify salient features in the construction of naval power. Chapter Three sets out performance evaluation on each type of PRC naval ships as well as capabilities of the Navy, Air Force, the Second Artillery (i.e., strategic missile forces) and satellites that could support maritime warfare. Finall, the concluding chapter estimates the PRC's maritime warfighting capability as anticipated in respective conflict scenarios, and considers its impact on the Korean Peninsula and proposes the directions ROK should steer in response. First of all, since the 1980s the PRC navy has undergone transitions as the focus of its military strategic outlook shifted from ground warfare to maritime warfare, and within 30 years of its effort to construct naval power while greatly reducing the size of its ground forces, the PRC has succeeded in building its naval power next to the U.S.'s in the world in terms of number, with acquisition of an aircraft carrier, Chinese-version of the Aegis, submarines and so on. The PRC also enjoys great potentials to qualitatively develop its forces such as indigenous aircraft carriers, next-generation strategic submarines, next-generation destroyers and so forth, which is possible because the PRC has accumulated its independent production capabilities in the process of its 30-year-long efforts. Secondly, one could argue that ROK still has its chances of coping with the PRC in naval power since, despite its continuous efforts, many estimate that the PRC naval force is roughly ten or more years behind that of superpowers such as the U.S., on areas including radar detection capability, EW capability, C4I and data-link systems, doctrines on force employment as well as tactics, and such gap cannot be easily overcome. The most probable scenarios involving the PRC in sea areas surrounding the Korean Peninsula are: first, upon the outbreak of war in the peninsula, the PRC may pursue military intervention through sea, thereby undermining efforts of the ROK-U.S. combined operations; second, ROK-PRC or PRC-Japan conflicts over maritime jurisdiction or ownership over the Senkaku/Diaoyu islands could inflict damage to ROK territorial sovereignty or economic gains. The PRC would likely attempt to resolve the conflict employing blitzkrieg tactics before U.S. forces arrive on the scene, while at the same time delaying and denying access of the incoming U.S. forces. If this proves unattainable, the PRC could take a course of action adopting "long-term attrition warfare," thus weakening its enemy's sustainability. All in all, thiss paper makes three proposals on how the ROK should respond. First, modern warfare as well as the emergent future warfare demonstrates that the center stage of battle is no longer the domestic territory, but rather further away into the sea and space. In this respect, the ROKN should take advantage of the distinct feature of battle space on the peninsula, which is surrounded by the seas, and obtain capabilities to intercept more than 50 percent of the enemy's ballistic missiles, including those of North Korea. In tandem with this capacity, employment of a large scale of UAV/F Carrier for Kill Chain operations should enhance effectiveness. This is because conditions are more favorable to defend from sea, on matters concerning accuracy rates against enemy targets, minimized threat of friendly damage, and cost effectiveness. Second, to maintain readiness for a North Korean crisis where timely deployment of US forces is not possible, the ROKN ought to obtain capabilities to hold the enemy attack at bay while deterring PRC naval intervention. It is also argued that ROKN should strengthen its power so as to protect national interests in the seas surrounding the peninsula without support from the USN, should ROK-PRC or ROK-Japan conflict arise concerning maritime jurisprudence. Third, the ROK should fortify infrastructures for independent construction of naval power and expand its R&D efforts, and for this purpose, the ROK should make the most of the advantages stemming from the ROK-U.S. alliance inducing active support from the United States. The rationale behind this argument is that while it is strategically effective to rely on alliance or jump on the bandwagon, the ultimate goal is always to acquire an independent response capability as much as possible.

Research of Non-integeral Spatial Interpolation for Precise Identifying Soybean Location under Plastic Mulching

  • Cho, Yongjin;Yun, Yeji;Lee, Kyou-seung;Oh, Jong-woo;Lee, DongHoon
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 2017.04a
    • /
    • pp.156-156
    • /
    • 2017
  • Most crop damages have been occurred by vermin(e.g., wild birds and herbivores) during the period between seeding and the cotyledon level. In this study, to minimize the damage by vermin and acquire the benefits such as protection against weeds and maintenance of water content in soil, immediately vinyl mulching after seeding was devised. Vinyl mulching has been generally covered with black color vinyl, that crop seeding locations cannot be detected by visible light range. Before punching vinyl, non-contact and non-destructive methods that can continuously determine the locations are necessary. In this study, a crop position detection method was studied that uses infrared thermal image sensor to determine the cotyledon position under vinyl mulch. The moving system for acquiring image arrays has been developed for continuously detecting crop locations under plastic mulching on the field. A sliding mechanical device was developed to move the sensor, which were arranged in the form of a linear array, perpendicular to the array using a micro-controller integrated with a stepping motor. The experiments were conducted while moving 4.00 cm/s speed of the IR sensor by the rotational speed of the stepping motor based on a digital pulse width modulation signal from the micro-controller. The acquired images were calibrated with the spatial image correlation. The collected data were processed using moving averaging on interpolation to determine the frame where the variance was the smallest in resolution units of 1.02 cm. For this study, the spline method was relatively faster than the other polynomial interpolation methods, because it has a lower maximum order of formulation when using a system such as the tridiagonal linear equation system which provided the capability of real-time processing. The temperature distribution corresponding to the distance between the crops was 10 cm, and the more clearly the leaf pattern of the crop was visually confirmed. The frequency difference was decreased, as the number of overlapped pixels was increased. Also the wave pattern of points where the crops were recognized were reduced.

  • PDF

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.