• Title/Summary/Keyword: 대응방법

Search Result 4,658, Processing Time 0.032 seconds

A Study of the Submarine Periscope Detection Algorithm using Characteristic of Target HRRP Information

  • Jin-Hyang Ahn;Chi-Sun Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.131-138
    • /
    • 2024
  • The ability of Combat Management System(CMS) to respond quickly and accurately to threat to a naval vessel is directly related to the survivability and combat power of the vessel. However, current method for detecting enemy submarine periscope in CMS rely on manual and subjective method that require operators to manually verify and analyze information received from sensor. This delays the response time to the threat, making the vessel less viable. This paper introduces a periscope detection algorithm that classifies the plot information generated by High Resolution Range Profile(HRRP) into probability-based suspicion classes and dramatically reduces threat response time through classified notifications. Algorithm validation showed 133.3791 × 106 times faster and 12.78%p higher detection rate than operator, confirming the potential for reduces threat response time to increase vessel survivability.

Clinical Features of Retinal Correspondence according to Refractive Errors and Deviation Angles (굴절이상과 편위각에 따른 망막대응의 임상적 고찰)

  • Wi, Dae-Gwang;Joo, Seok-Hee;Lee, Koon-Ja;Leem, Hyun-Sung
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.15 no.4
    • /
    • pp.367-372
    • /
    • 2010
  • Purpose: The purpose of this study was to provide useful information for evaluating the sensory function of patients with strabismus by identifying the distribution of anomalous retinal correspondence (ARC) and normal retinal correspondence (NRC) by the degree of refractive errors and deviation angles. Methods: Objective refraction (AR/K, Cannon RK-F1, Japan) and subjective refraction tests were performed on 56 subjects (male: 26, female: 30) by an examiner; objective deviation angle was measured using synoptophore (OCULUS Synoptophore, Germany) with subject' eyes fully corrected for distance, and then subjective deviation angle was measured. Results: In all groups with refractive errors, the number of ARC was larger than that of NRC(67%). Particularly, it was largest in groups with myopia (71%), and in all groups, the number of UARC was larger than that of HARC. In groups with anisometropia, although the numbers of NRC and ARC were same, the number of UARC was larger than that of HARC as in other groups. In the distribution of NRC and ARC by deviation angle, the number of NRC was larger than that of ARC (46%) only at microstrabismus (0 ~ ${\pm}10{\triangle}$). Conclusions: Normal retinal correspondence were the most emmetropia in the retinal response were much higher than in the more hyperopia than the retinal correspondence were more myopia. In addition, the smaller the angle of retinal correspondence Normal over many, but overall, respectively.

Factors Influencing Stress Coping Behaviors of Elementary Students in Korea (한국 초등학생들의 스트레스 대응 행동에 영향을 미치는 요인)

  • Lee, Chung-Yul;Lee, Gyu-Young;Jeon, Kyoung-Mi;Park, So-Hyun;Hong, Yoon-Mi;Lee, Hyeon-Kyeong
    • Korean Journal of Health Education and Promotion
    • /
    • v.26 no.5
    • /
    • pp.1-13
    • /
    • 2009
  • Objectives: The purpose of this study was to examine factors influencing stress coping behaviors of elementary students in Korea. Methods: This study used a descriptive comparative survey design. A total of 1,161 elementary students voluntarily participated in the study from 10 schools at three regional levels (large and medium-sized cities, and rural towns). Coping behaviors were measured by the modified Ways of Coping Checklist. The data were analyzed using descriptive statistics, t-test, ANOVA, and multiple regression. Results: The most commonly used stress coping behavior reported by the participants was mystic coping, followed by positive coping, and negative coping. Students living in the large city and female students tended to use more coping behaviors than students living in the medium-sized city or rural towns and male students, respectively. Positive coping behaviors were associated with high school performance while myotic coping behaviors were associated high life satisfaction. Conclusion: Elementary students who are males, dissatisfied with their lives, or living in large cities or rural towns tended to be at risk for poor coping. There were differences in factors influencing coping behaviors by type of coping behaviors. An approach to building a successful coping behavior that is specifically tailored to the gender subsets of population and region-specific social and physical environment is recommended.

Image Mosaicing using Voronoi Distance Matching (보로노이 거리(Voronoi Distance)정합을 이용한 영상 모자익)

  • 이칠우;정민영;배기태;이동휘
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1178-1188
    • /
    • 2003
  • In this paper, we describe image mosaicing techniques for constructing a large high-resolution image with images taken by a video camera in hand. we propose the method which is automatically retrieving the exact matching area using color information and shape information. The proposed method extracts first candidate areas which have similar form using a Voronoi Distance Matching Method which is rapidly estimating the correspondent points between adjacent images, and calculating initial transformations of them and finds the final matching area using color information. It is a method that creates Voronoi Surface which set the distance value among feature points and other points on the basis of each feature point of a image, and extracts the correspondent points which minimize Voronoi Distance in matching area between an input image and a basic image using the binary search method. Using the Levenberg-Marquadt method we turn an initial transformation matrix to an optimal transformation matrix, and using this matrix combine a basic image with a input image.

  • PDF

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

New Simple Power Analysis on scalar multiplication based on sABS recoding (sABS 형태의 스칼라 곱셈 연산에 대한 새로운 단순전력 공격)

  • Kim, Hee-Seok;Kim, Sung-Kyoung;Kim, Tae-Hyun;Park, Young-Ho;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.115-123
    • /
    • 2007
  • In cryptographic devices like a smart-card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. Scalar multiplication is very important operation in Elliptic Curve Cryptosystems, and so must be constructed in safety against side channel attack(SCA). But several countermeasures proposed against SCA are exposed weaknesses by new un-dreamed analysis. 'Double-and-add always scalar multiplication' algorithm adding dummy operation being known to secure against SPA is exposed weakness by Doubling Attack. But Doubling Attack cannot apply to sABS receding proposed by Hedabou, that is another countermeasure against SPA. Our paper proposes new strengthened Doubling Attacks that can break sABS receding SPA-countermeasure and a detailed method of our attacks through experimental result.

Camera Extrinsic Parameter Estimation using 2D Homography and LM Method based on PPIV Recognition (PPIV 인식기반 2D 호모그래피와 LM방법을 이용한 카메라 외부인수 산출)

  • Cha Jeong-Hee;Jeon Young-Min
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.43 no.2 s.308
    • /
    • pp.11-19
    • /
    • 2006
  • In this paper, we propose a method to estimate camera extrinsic parameter based on projective and permutation invariance point features. Because feature informations in previous research is variant to c.:men viewpoint, extraction of correspondent point is difficult. Therefore, in this paper, we propose the extracting method of invariant point features, and new matching method using similarity evaluation function and Graham search method for reducing time complexity and finding correspondent points accurately. In the calculation of camera extrinsic parameter stage, we also propose two-stage motion parameter estimation method for enhancing convergent degree of LM algorithm. In the experiment, we compare and analyse the proposed method with existing method by using various indoor images to demonstrate the superiority of the proposed algorithms.

SPIT Prevention Framework using Expanded White List (확장 화이트리스트 기법을 이용한 SPIT 대응 프레임워크)

  • Bae, Kwang-Yong;Chae, Kang-Suk;Kim, Young-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.95-102
    • /
    • 2010
  • This paper proposes a SPIT(Spam over IP Telephony) prevention framework which is using expanded white-list in real-time VoIP environment. The existing schemes are vulnerable to attack from spammers since they can continue to transfer SPIT upon changing their ID. And existing frameworks have experienced the time delay and overload as session initiates due to real-time operation. To solve these problems, the proposed scheme expands the scope of white lists by forming social networks using the white list, but it is to decide quickly whether pass a caller ID without searching the entire database. The proposed framework takes the three-stage architecture and the fast scoring system. The proposed framework minimize user's inconvenience and time delay for initiation of session, therefore, it is proper for real-time VoIP environment.

A Study of the standard disaster field manuals based on the situations (상황 기반 표준 현장조치 행동 매뉴얼 체계에 관한 연구)

  • Park, GilJoo;Lee, ChangYeol;Kim, TaeHwan
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.4
    • /
    • pp.474-479
    • /
    • 2018
  • Purpose: This study focus on the disaster response process in the disaster field manuals. The process reflects the several kinds of disaster situation scenarios under the defined disaster types. Method: Firstly we defined the situation concept from the emergency types. And then, we makes each disaster response process based on the situations. Results: There are several kinds of the disaster response process in a disaster fields manuals. The most of the process has the duplicated SOP's among the situation types. In this paper, we developed the situation code sand then apply the codes to the process. As a result of the work, we defined one the disaster response process which includes the situational code in the each SOP. Conclusion: This study developed the several kinds of the disaster response process based on the disaster situation types. It makes that we can easily respond to the disaster.