• Title/Summary/Keyword: 검사주기

Search Result 696, Processing Time 0.029 seconds

Feasibility Study on Producing 1:25,000 Digital Map Using KOMPSAT-5 SAR Stereo Images (KOMPSAT-5 레이더 위성 스테레오 영상을 이용한 1:25,000 수치지형도제작 가능성 연구)

  • Lee, Yong-Suk;Jung, Hyung-Sup
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_3
    • /
    • pp.1329-1350
    • /
    • 2018
  • There have been many applications to observe Earth using synthetic aperture radar (SAR) since it could acquire Earth observation data without reference to weathers or local times. However researches about digital map generation using SAR have hardly been performed due to complex raw data processing. In this study, we suggested feasibility of producing digital map using SAR stereo images. We collected two sets, which include an ascending and a descending orbit acquisitions respectively, of KOMPSAT-5 stereo dataset. In order to suggest the feasibility of digital map generation from SAR stereo images, we performed 1) rational polynomial coefficient transformation from radar geometry, 2) digital resititution using KOMPSAT-5 stereo images, and 3) validation using digital-map-derived reference points and check points. As the results of two models, root mean squared errors of XY and Z direction were less than 1m for each model. We discussed that KOMPSAT-5 stereo image could generated 1:25,000 digital map which meets a standard of the digital map. The proposed results would contribute to generate and update digital maps for inaccessible areas and wherever weather conditions are unstable such as North Korea or Polar region.

The Precise Three Dimensional Phenomenon Modeling of the Cultural Heritage based on UAS Imagery (UAS 영상기반 문화유산물의 정밀 3차원 현상 모델링)

  • Lee, Yong-Chang;Kang, Joon-Oh
    • Journal of Cadastre & Land InformatiX
    • /
    • v.49 no.1
    • /
    • pp.85-101
    • /
    • 2019
  • Recently, thank to the popularization of light-weight drone through the significant developments in computer technologies as well as the advanced automated procedures in photogrammetry, Unmanned Aircraft Systems have led to a growing interest in industry as a whole. Documentation, maintenance, and restoration projects of large scaled cultural property would required accurate 3D phenomenon modeling and efficient visual inspection methods. The object of this study verify on the accuracies achieved of 3D phenomenon reconstruction as well as on the validity of the preservation, maintenance and restoration of large scaled cultural property by UAS photogrammetry. The test object is cltural heritage(treasure 1324) that is the rock-carved standing Bodhisattva in Soraesan Mountain, Siheung, documented in Goryeo Period(918-1392). This standing Bodhisattva has of particular interests since it's size is largest stone Buddha carved in a rock wall and is wearing a lotus shaped crown that is decorated with arabesque patterns. The positioning accuracy of UAS photogrammetry were compared with non-target total station survey results on the check points after creating 3D phenomenal models in real world coordinates system from photos, and also the quantified informations documented by Culture Heritage Administration were compared with UAS on the bodhisattva image of thin lines. Especially, tests the validity of UAS photogrammetry as a alternative method of visual inspection methods. In particular, we examined the effectiveness of the two techniques as well as the relative fluctuation of rock surface for about 2 years through superposition analysis of 3D points cloud models produced by both UAS image analysis and ground laser scanning techniques. Comparison studies and experimental results prove the accuracy and efficient of UAS photogrammetry in 3D phenomenon modeling, maintenance and restoration for various large-sized Cultural Heritage.

Convergence research on education needs for prevention and control of infectious diseases (감염병 예방 및 관리에 대한 교육요구도 융복합 연구)

  • Kang, Kyung-hee;Park, Arma;Lim, HyoNam;Hwang, Hye-Jeong;Kim, Kwang Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.4
    • /
    • pp.95-103
    • /
    • 2021
  • This study was aimed to investigate the education needs for prevention and control of infectious diseases by lifecycle based on age group and to provide the fundamental data to develop the educational programs. A research was conducted with 328 adults over 19 years old for a month of February 2021 through online and mobile survey by Gallup Korea. Research contents include the general characteristics, personal hygiene practices related to infection, perceived risks related to infection, importance and level of knowledge on infectious diseases, and education needs for prevention and control of infectious diseases. For the research data analysis, PASW Statistics Ver 20.0 was used as a statistical program. Ranks from analysis upon conversion as the formula of Borich needs to sum up with importance and knowledge level showed first (Borich 3.11) with treatments for infectious diseases; second (Borich 2.15) with process in case of suspicion and diagnosis of infectious diseases; third (Borich 1.75) with transmission routes of infectious diseases; fourth (Borich 1.73) with preventive ways of infectious diseases; fifth (Borich 1.50) with diagnostic and test methods of infectious diseases; sixth (Borich 1.45) with characteristics of infectious diseases; and seventh (Borich1.38) with main symptoms of infectious diseases. It is anticipated that development of educational programs applying education needs for prevention and control of infectious diseases in this research can contribute to enhance the physical health, mental health, and psychological well-being of the subjects.

A Study on the Development Site of an Open-pit Mine Using Unmanned Aerial Vehicle (무인항공기를 이용한 노천광산 개발지 조사에 관한 연구)

  • Kim, Sung-Bo;Kim, Doo-Pyo;Back, Ki-Suk
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.136-142
    • /
    • 2021
  • Open-pit mine development requires continuous management because of topographical changes and there is a risk of accidents if the current status survey is performed directly in the process of calculating the earthwork. In this study, the application of UAV photogrammetry, which can acquire spatial information without direct human access, was applied to open-pit mines development area and analyzed the accuracy, earthwork, and mountain restoration plan to determine its applicability. As a result of accuracy analysis at checkpoint using ortho image and Digital Surface Model(DSM) by UAV photogrammetry, Root Mean Square Error(RMSE) is 0.120 m in horizontal and 0.150 m in vertical coordinates. This satisfied the tolerance range of 1:1,000 digital map. As a result of the comparison of the earthwork, UAV photogrammetry yielded 11.7% more earthwork than the conventional survey method. It is because UAV photogrammetry shows more detailed topography. And result of monitoring mountain restoration showed possible to determine existence of rockfall prevention nets and vegetation. If the terrain changes are monitored by acquiring images periodically, the utility of UAV photogrammetry will be further useful to open-pit mine development.

Zkimi : Integrated Security Analysis Tool for UNIX Systems (지킴이: 유닉스 시스템을 위한 통합 보안 점검 도구)

  • 채흥석;이남희;김형호;김내희;차성덕;백석철;임규건;박승민;정종윤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.23-40
    • /
    • 1997
  • There are a lot of security tools for the investigation and improvement of UNIX systems. However, most of them fail to provide a consistent and usable user interface. In addition, they concentrate on a specific aspect of a system, not the whole one. For the overall management, system administrators cannot help using several uncomfortable tools. This paper introduces an integrated security analysis tool, named "Zkimi", which provides a convenient user interface and investigates the various aspects of UNIX systems such as account security, system security, network security, and file system integrity. The Zkimi supports user-friendly WWW based interface, so administrators can examine the various aspects of system more easily. We tried the tool for a system of a moderate size, and were confirmed that the tool is very efficient for investigating various security aspects of a system. a system.

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL) (취약성 점검 코드를 자동으로 생성하는 에이전트를 통한 통합 취약성 분석 시스템)

  • 김수용;서정석;조상현;김한성;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.111-122
    • /
    • 2002
  • Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.

A Source-Level Discovery Methodology for Vulnerabilities of Linux Kernel Variables (리눅스 커널 변수 취약성에 대한 소스레벨 발견 방법론)

  • Ko Kwangsun;Kang Yong-hyeog;Eom Young Ik;Kim Jaekwang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.13-25
    • /
    • 2005
  • In these days, there are various uses of Linux such as small embedded systems, routers, and huge servers, because Linux gives several advantages to system developers by allowing to use the open source code of the Linux kernel. On the other hand, the open source nature of the Linux kernel gives a bad influence on system security. If someone wants to exploit Linux-based systems, the attacker can easily do it by finding vulnerabilities of their Linux kernel sources. There are many kinds of existing methods for lading source-level vulnerabilities of softwares, but they are not suitable for finding source-level vulnerabilities of the Linux kernel which has an enormous amount of source code. In this paper, we propose the Onion mechanism as a methodology of finding source-level vulnerabilities of Linux kernel variables. The Onion mechanism is made up of two steps. The Int step is to select variables that may be vulnerable by using pattern matching mechanism and the second step is to inspect vulnerability of each selected variable by constructing and analyzing the system call trees. We also evaluate our proposed methodology by applying it to two well-known source-level vulnerabilities.

Characterization and Detection of Opinion Manipulation on Common Interest Groups in Online Communities (온라인 공간에서 관심집단 대상 비정상 정보의 특징 분석과 탐지)

  • Lee, Sihyung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.57-69
    • /
    • 2020
  • As more people share their opinions in online communities, such as Internet portals and social networking services, more opinions are manipulated for the benefit of particular individuals and groups. In particular, when manipulations occur for political purposes, they influence election results as well as government policies and the quality of life. This type of manipulation has targeted the general public, and their analysis and detection has also focused on such manipulation. However, to more efficiently spread propaganda, recent manipulations have targeted common interest groups(e.g., a group of those interested in real estate) and propagated information whose content and style are customized to those groups. This work characterizes such manipulations on common interest groups and proposes method to detect manipulations. To this end, we collected and analyzed opinions posted on 10 common interest groups before and after an election. As a result, we found that manipulations on common interest groups indeed occurred and were gradually increasing toward the election date. We also proposed a detection system that examines individual opinions, their authors, and their collaborators. Using the collected opinions, we demonstrated that the proposed system can accurately classify more than 90% of manipulated opinions and that many of these opinions were posted by multiple collaborators. We believe that regular audits of opinions using the proposed system can quickly isolate manipulations and decrease their impact. Moreover, the proposed features can be used to identify manipulations in domains other than politics.

Structural Design Optimization of Gageocho Jacket Structure Considering Unity Check (가거초 자켓 구조물의 허용응력비를 고려한 구조 최적설계)

  • Kim, Byungmo;Ha, Seung-Hyun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.4
    • /
    • pp.205-212
    • /
    • 2021
  • Offshore jacket structures generally comprise steel members, and the safety standard for jacket structures typically focuses on the steel components. However, large amounts of concrete grouting is filled in the legs of the Gageocho jacket structure to aid in the recovery from typhoon damage. This paper proposes a safe and lightweight design for the Gageocho ocean research station comprising steel members instead of large amounts of concrete reinforcement in the legs. Based on the actual design, the structural members are grouped according to their functional roles, and the inner diameter of the cross-section in each design group is defined as a design variable. Structural optimization is carried out using a genetic algorithm to minimize the total weight of the structure. To satisfy the conservative safety standards in the offshore field, both the maximum stress and the unity check criteria are considered as design constraints during optimization. For enhanced safety confidence, extreme environmental conditions are assumed. The maximum marine attachment thickness and the section erosion in the splash zone are applied. Additionally, the design load is defined as the force induced by extreme waves, winds, and currents aligned in the same direction. All the loading directions surrounding the structure are considered to design the structure in a balanced and safe manner. As a result, compared with the current structure, the proposed structure features a 45% lighter design, satisfying the strict offshore safety criteria.

A Study on the Relationship between Body Function and Prelusive Movement to Falls to Promote Wellness in Chronic Stroke Patients (만성뇌졸중 환자의 웰니스 증진을 위한 신체기능과 낙성전조동작의 관련성 연구)

  • Park, Chang-Sik;Kim, Jin-Young
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.7
    • /
    • pp.181-192
    • /
    • 2021
  • This study was conducted to investigate the effects of a participatory rehabilitation program on sit-rise and rise-to-walk test performances, and perception and motor skills in adults with medically vulnerable individuals and, adults with developmental disabilities in particular. Seventeen adults with developmental disabilities participated in a participatory rehabilitation program using resistance bands and exercise balls, for 60 minutes once weekly over 13 weeks. Their performances were measured before and immediately after the intervention, and 12 weeks after. The findings were as follows. In the sit-rise test, the number of times rising from sitting posture increased after the intervention versus before, but the difference was not statistically significant. In the rise-to-walk test, the performance showed statistically significant difference over time, and the post-hoc test showed a significant effect after the intervention versus before. There was no significant difference in perception and motor skills. In sum, the participatory rehabilitation program positively influenced dynamic balancing related to functional activities but had no significant effect on perception and motor skills, which is related to motor control and motor learning. It is suggested that to increase the participation in community activities, reduce fall risk, and improve dynamic balancing abilities in adults with developmental disabilities, participatory rehabilitation programs should be utilized to promote the physical wellbeing.