• Title/Summary/Keyword: 관제통신

Search Result 447, Processing Time 0.032 seconds

Efficient Multicasting Mechanism for Mobile Computing Environment (산불 발생지역에서의 산불 이동속도 예측 및 안전구역 확보에 관한 연구)

  • Woo, Byeong-hun;Koo, Nam-kyoung;Oh, Young-jun;Jang, Kyung-sik;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.89-92
    • /
    • 2015
  • In this paper, we propose a method to reduce the fire suppression time. Our suggestions can secure a safe area according to the diffusion path and speed of the fire, forest fire prediction minimize casualties and property damage forests. The existing path prediction method wildfire spread predict the wildfire spread model and speed through topography, weather, fuel factor and the image information. In this case, however, occur to control a large mountain huge costs. Also Focus on the diffusion model predictions and the path identified by the problem arises that insufficient efforts to ensure the safe area. In this paper, we estimate the moving direction and speed of fire at a lower cost, and proposes an algorithm to ensure the safety zone for fire suppression. The proposed algorithm is a technique to analyze the attribute information that temperature, wind, smoke measured over time. According to our algorithm forecast wildfire moving direction and ensure the safety zone. By analyzing the moving speed and the moving direction of the simulated fire in a given environment is expected to be able to quickly reduce the damage to the forest fire fighters.

  • PDF

A Development of 3D video simulation system using GPS (GPS와 9-axis sensor를 이용한 3D 영상 구현 시뮬레이션 시스템)

  • Joo, Sang-Woong;Shim, Kyou-Chul;Kim, Kyeong-Hwan;Zhu, Jiang;Liu, Hao;Liu, Jie;Jeong, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1021-1023
    • /
    • 2013
  • Currently, aircraft and automobile simulator for training provides a variety of training by making hypothetical situation on a simulator Installed on the ground Currently. And the instructor maximizes the effectiveness of the training by Monitoring training and instructing the required training. When trainees are boarding the aircraft or automobile. The Instructor in the ground is not able to monitoring aircraft, automobile. The assessment of the training is not easy after the end of the training Therefore, it is difficult to provide high quality of education to the students. In this paper, Simulation software is to develop the following. Collecting GPS and real-time information for aircraft, automobile ${\grave{a}}implementing$ 3D simulation. Implementing Current image of the aircraft or automobile in the screen by 3D Real-time monitoring of training situation at the control center utilizing for training saving 3D video files Analysis, evaluation on training After the end of the training.

  • PDF

The Automation Model of Ransomware Analysis and Detection Pattern (랜섬웨어 분석 및 탐지패턴 자동화 모델에 관한 연구)

  • Lee, Hoo-Ki;Seong, Jong-Hyuk;Kim, Yu-Cheon;Kim, Jong-Bae;Gim, Gwang-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1581-1588
    • /
    • 2017
  • Recently, circulating ransomware is becoming intelligent and sophisticated through a spreading new viruses and variants, targeted spreading using social engineering attack, malvertising that circulate a large quantity of ransomware by hacking advertising server, or RaaS(Ransomware-as-a- Service), from the existing attack way that encrypt the files and demand money. In particular, it makes it difficult to track down attackers by bypassing security solutions, disabling parameter checking via file encryption, and attacking target-based ransomware with APT(Advanced Persistent Threat) attacks. For remove the threat of ransomware, various detection techniques are developed, but, it is very hard to respond to new and varietal ransomware. Accordingly, in this paper, find out a making Signature-based Detection Patterns and problems, and present a pattern automation model of ransomware detecting for responding to ransomware more actively. This study is expected to be applicable to various forms in enterprise or public security control center.

Design of Marine IoT Wireless Network for Building Fishing Gear Monitoring System (어구 모니터링 시스템 구축을 위한 해상 IoT 무선망 설계)

  • Kwak, Jae-Min;Kim, Se-Hoon;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.76-83
    • /
    • 2018
  • In order to prevent overusing the fishing gear and to reduce discarded fishing gear, there is a need for a technique that can efficiently transmit the information including the type and location of the fishing gear and the user's real name to the fishing boat and the control center using IoT-based communication. In order to do this, it is necessary to be able to confirm the position information of a plurality of buoys that can be identified by the base stations on the land. In this paper, in order to service the maritime IoT communication system, we calculate the link budget between the land base station and the targets on the sea to derive the service coverage. To design a marine IoT radio network for building a fishing gear monitoring system, we calculate link budget for wireless service optimization at sea for NB-IoT using 1.8 GHz frequency band and LoRa service using 900 MHz frequency band. In addition, the link budget between the land base station and buoy, the link budget between the land base station and fishing boat are calculated and the results are analyzed.

Europe's Space Exploration and Korea's Space Exploration Strategy from the Perspective of Science and Technology Diplomacy (과학기술외교 관점에서 바라본 유럽의 우주탐사와 우리나라 우주탐사전략)

  • Nammi Choe
    • Journal of Space Technology and Applications
    • /
    • v.2 no.3
    • /
    • pp.195-205
    • /
    • 2022
  • Space exploration is an area where international cooperation takes place more actively than any other space activities such as Earth observation, communication and navigation. This is because a country cannot afford a huge budget to have full infrastructure for deep space exploration, such as a heavy launch vehicle, communication and energy infrastructure, and human habitats, and has learned that it is not sustainable. Korea expressed its willingness to join humanity's epic exploration journey by signing the Artemis Accords in 2021 and launching Danuri lunar orbiter in 2022. The beginning of space exploration means that Korea's space activities have expanded beyond the stage of focusing only on technology development to set norms necessary to accompany other countries and cooperate diplomatically to solve exposed problems. This paper analyzed European space policy and space exploration, which are most actively participating in the Artemis Program and exerting diplomatic power in the space field, from the perspective of science and technology diplomacy. The suggestions for Korea's space exploration strategy from the perspective of science and technology diplomacy were drawn by examining the international cooperation strategies in Europe's space activities ranging from space policy, space strategy, and space exploration program to project units.

Log Collection Method for Efficient Management of Systems using Heterogeneous Network Devices (이기종 네트워크 장치를 사용하는 시스템의 효율적인 관리를 위한 로그 수집 방법)

  • Jea-Ho Yang;Younggon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.119-125
    • /
    • 2023
  • IT infrastructure operation has advanced, and the methods for managing systems have become widely adopted. Recently, research has focused on improving system management using Syslog. However, utilizing log data collected through these methods presents challenges, as logs are extracted in various formats that require expert analysis. This paper proposes a system that utilizes edge computing to distribute the collection of Syslog data and preprocesses duplicate data before storing it in a central database. Additionally, the system constructs a data dictionary to classify and count data in real-time, with restrictions on transmitting registered data to the central database. This approach ensures the maintenance of predefined patterns in the data dictionary, controls duplicate data and temporal duplicates, and enables the storage of refined data in the central database, thereby securing fundamental data for big data analysis. The proposed algorithms and procedures are demonstrated through simulations and examples. Real syslog data, including extracted examples, is used to accurately extract necessary information from log data and verify the successful execution of the classification and storage processes. This system can serve as an efficient solution for collecting and managing log data in edge environments, offering potential benefits in terms of technology diffusion.

The Development Strategy of Shanghai's Air Transportation (상해항공운수발전전각)

  • Peng Youlian
    • Proceedings of the KOR-KST Conference
    • /
    • 1993.07a
    • /
    • pp.235-247
    • /
    • 1993
  • 이십일세기상해항공운수발전전략연구, 시이 $\ll$진흥상해, 개발포동, 복무전국, 면향세계$\gg$ 적방침작위지도, 병통과이상해포동개방개\ulcorner\ulcorner\ulcorner장강삼각주지구내지정개장강류역경제발전, 축보사상해발전성위\ulcorner\ulcorner지 구경제, 김융, 무역중심지일작위목표개전전략연구. 상해재아국두\ulcorner\ulcorner의현대화건설진정중점유겁기중요적지위, 저장성위태평양서안최인적 제무역중심지일, 목전, 상해항공운수적현상여기재국민경제중적전략지 위급여세계경제발달국가급지구례여뉴약, 륜돈, 파려, 지가가, 동경, 향항, 신가파등국제대성시상비차거태대, 안통계수거상해1990년항공운수탄토량약시미국뉴약1986년적1.5%, 시향항적10%좌우, 가견상해민\ulcorner\ulcorner수적 발전속도이경한제료상해경제적등비, 한제료포동개방개발급여국내 외정치경제화문화적교류, 위료사상해항공운수여상해적국민경제급사사회 발전상괄응, 대력발전항공운수기박재미첩. 수착상해경제발전, 능원, 원재료적증가, 외향형경제발전급금후궤십년상해인민수입증가화경제결 구조정.고정첨기출적발전급국제교왕적증가. 예측이십일세기상해여객 운수량급화운량장성배증가, 소이탐색일개여상해경제발전전략목표상괄 응적현대화항공교통운수체계, 발혼항공운수특유적우핵시십분필요적. 본연구보고종이하오개방면대상해이십일세기항공운수발전전략진행천술. 일, 개술발전상해항공운수적필요성급긴박성. 이, 상해민용항공운수현상대상해지구주요승운인동방항공공사항선 망, 운력, 기대, 기장현상작료분석,설명상해민항유우운력불족, 기출 장비체후, 자김결, 불능만족상해경제등비발전적수요. 공중교통관제, 통신도항, 기무유수, 항유공응등방면야도불동정도지한 제료항공운수적발전, 필수인기겁대적중시. 삼, 상해항공운수적예측화전망, 통과자료연구급수거분석, 리용수 학모형대이십일세기상해항공운량진행예측, 제출발전상해항공운수적전 략목표급발전중점. 예측2020년 상해항공항총객운탄토량4300만인/년, 화운량달120만돈; 2050년객운량장달18150만인차/년, 화운량518만돈. 사, 발전상해민항기출경제정책, 제출위료$\ll$진흥상해, 개발포동, 복무전국, 면향세계$\gg$ 화도이십일세기중기국민경제달도중등발달국가수 평굉관전략목표적실현, 제료필수재지도사상상파교통운수진정방도전략 산업지위, 환응재관리체제상채취과단유효적개혁조시, 재기출경제정책 상급여대력부지. 오, 전략목표, 위파상해건설성위태평양서안최대적경제, 김융, 무역적중심, 요구상해항공항성위화동지구통향세계각지항선망출발참, 구성대외개방선면축심, 실현국제항선적함접화국내항반적전항, 형성다축심복사식항선망; 가강기장건설, 개피포동제이국제기장건설, 괄응포동개발경제발전적수요.

  • PDF

A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning (기계학습 기반 IDS 보안이벤트 분류 모델의 정확도 및 신속도 향상을 위한 실용적 feature 추출 연구)

  • Shin, Iksoo;Song, Jungsuk;Choi, Jangwon;Kwon, Taewoong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.385-395
    • /
    • 2018
  • With the development of Internet, cyber attack has become a major threat. To detect cyber attacks, intrusion detection system(IDS) has been widely deployed. But IDS has a critical weakness which is that it generates a large number of false alarms. One of the promising techniques that reduce the false alarms in real time is machine learning. However, there are problems that must be solved to use machine learning. So, many machine learning approaches have been applied to this field. But so far, researchers have not focused on features. Despite the features of IDS alerts are important for performance of model, the approach to feature is ignored. In this paper, we propose new feature set which can improve the performance of model and can be extracted from a single alarm. New features are motivated from security analyst's know-how. We trained and tested the proposed model applied new feature set with real IDS alerts. Experimental results indicate the proposed model can achieve better accuracy and false positive rate than SVM model with ordinary features.

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.

An Architecture for Managing Faulty Sensing Data on Low Cost Sensing Devices over Manufacturing Equipments (전문 설비의 이상신호 처리를 위한 저비용 관제 시스템 구축)

  • Chae, Yuna;Kim, Changi;Ko, Haram;Kim, Woongsup
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.3
    • /
    • pp.113-120
    • /
    • 2018
  • In this study, we proposed a monitoring system for identifying and handling faulty sensing stream data on manufacturing equipments where low-cost sensors can be safely used. Low cost sensors will lessen the cost of implementing distributed monitoring system, but suffer from sensor noises and inaccurate sensed data. Therefore, a distributed monitoring system with low cost sensors should identify faulty signal data as either of sensor fault or machine fault, and filter out faulty signals from sensing fault. To this end, we adopted a fourier transform based diagnostic approach mixed with a weighed moving averaging method, in order to identify faulty signals. We measured how effective our approach is and found out our approach can filter out one-third faulty signals from our experimental environment. In addition, we attached wireless communication modules to reduce sensor and network installation cost. To handle massive sensor data efficiently, we employed unstructured data format with NoSQL based database.