• Title/Summary/Keyword: 역 추적 시스템

Search Result 196, Processing Time 0.027 seconds

Performance Evaluation of VLBI Correlation Subsystem Main Product (VLBI 상관 서브시스템 본제품의 제작현장 성능시험)

  • Oh, Se-Jin;Roh, Duk-Gyoo;Yeom, Jae-Hwan;Oyama, Tomoaki;Park, Sun-Youp;Kang, Yong-Woo;Kawaguchi, Noriyuki;Kobayashi, Hideyuki;Kawakami, Kazuyuki
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.322-332
    • /
    • 2011
  • In this paper, we introduce the 1st performance evaluation of VLBI Correlation Subsystem (VCS) main product, which is core system of Korea-Japan Joint VLBI Correlator (KJJVC). The main goal of the 1st performance evaluation of VCS main product is that the perfection of overall system will be enhanced after checking the unsolved part by performing the experiments towards various test items at the manufacturer before installation of field. The functional test was performed by including the overflow problem occurred in the FFT re-quantization module due to the insufficient of effective bit at the VCS trial product in this performance test of VCS main product. Through the performance test for VCS main product in the factory, the problem such as FFT re-quantization discovered at performance test of VCS trial product in 2008 was clearly solved and the important functions such as delay tracking, daly compensation, and frequency bining were added in this VCS main product. We also confirmed that the predicted correlation results (fringe) was obtained in the correlation test by using real astronomical observed data(wideband/narrow band).

Implementation and Static Verification Methodology of Discrete Event Simulation Software based on the DEVS Diagram: A Practical Approach (DEVS 다이어그램 기반 이산사건 시뮬레이션 소프트웨어 구현 및 정적 검증기법: 실용적 접근방법)

  • Song, Hae Sang
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.23-36
    • /
    • 2018
  • Discrete Event System Specification (DEVS) has been used for decades as it provides sound semantics for hierarchical modular specification of discrete event systems. Instead of the mathematical specification, the DEVS diagram, based on the structured DEVS formalism, has provided more intuitive and convenient representation of complex DEVS models. This paper proposes a clean room process for implementation and verification of a DEVS diagram model specification into a simulation software source code. Specifically, it underlies a sequence of transformation steps from conformance and integrity checking of a given diagram model, translation into a corresponding tabular model, and finally conversion to a simulation source code, with each step being inversely verifiable for traceability. A simple example helps developers to understand the proposed process with associated transformation methods; a case study shows that the proposed process is effective for and adaptable to practical simulation software development.

Analysis & Evaluation of CAT(Catchment hydrologic cycle Analysis Tool) on Seolma-cheon Catchment (CAT 모형의 설마천 유역 적용 및 평가)

  • Lee, Yong-Jun;Kim, Hyeon-Jun;Noh, Seong-Jin;Jang, Cheol-Hee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.996-1000
    • /
    • 2009
  • 물순환계를 종합적으로 관리하기 위해서는 물순환계의 모니터링과 해석모형의 구축이 필요하다. 실측자료만으로는 복잡 다양한 물순환계 구조 및 인과관계를 규명할 수 없기 때문에 시간적 공간적으로 변화하는 다양한 수문현상을 일관된 하나의 시스템으로 이해하기 위해 물순환 해석모델을 구축하여 검토할 필요가 있다. CAT(Catchment hydrologic cycle Analysis Tool)은 수문학적으로 균일하게 판단되는 범위를 소유역으로 분할하여 지형학적 요인에 의한 유출 특성을 객관적으로 반영할 수 있게 하며, 토양층에 따라 침투, 증발, 지하수 흐름 등의 모의가 가능하도록 하는 Link-Node 모형으로, 증발산은 기준 증발산을 외부에서 직접 입력하거나, Penman-Monteith 방법을 선택할 수 있으며, 침투는 토양의 수리전도도에 따른 연직방향 침투 및 사면방향 복귀류를 고려할 수 있다. 노드의 지하수 유거를 고려하여 기존 노드-링크 방식 모형의 장기 유출 해석시 제한점을 보완하였으며, Muskingum, Muskingum-Cunge, Kinematic wave 방법을 이용하여 하도추적을 모의할 수 있다. 또한 GUI를 통해 사용자가 손쉽게 모형을 적용하고 관리 할 수 있도록 하고, 여러 시나리오를 적용함에 있어서 편리하도록 개발 중인 모형이다. 본 연구에서는 개발중인 CAT 모형을 평가 하기위해 시험 유역으로 운영 중인 설마천 유역에 적용하여 소유역 분할(노드수), 계산 시간 간격(일/시단위) 등에 따른 적용성을 평가하였다. 관측 자료를 통해 구축 가능한 물리적 매개변수를 통해 해당 유역을 단일 노드 및 다중 노드로 간단히 모형화할 수 있었으며, 모의 결과, 관측 유량과 적절히 일치하는 결과를 얻을 수 있었다. 1시간 단위에 대한 모의에서도 유출을 적절히 모의할 수 있었으며, 소규모 유역에 대한 정밀한 물순환 해석이 가능할 것으로 평가되었다.

  • PDF

A Neural Network-Based Tracking Method for the Estimation of Hazardous Gas Release Rate Using Sensor Network Data (센서네트워크 데이터를 이용하여 독성물질 누출속도를 예측하기 위한 신경망 기반의 역추적방법 연구)

  • So, Won;Shin, Dong-Il;Lee, Chang-Jun;Han, Chong-Hun;Yoon, En-Sup
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.2
    • /
    • pp.38-41
    • /
    • 2008
  • In this research, we propose a new method for tracking the release rate using the concentration data obtained from the sensor. We used a sensor network that has already been set surrounding the area where hazardous gas releases can occur. From the real-time sensor data, we detected and analyzed releases of harmful materials and their concentrations. Based on the results, the release rate is estimated using the neural network. This model consists of 14 input variables (sensor data, material properties, process information, meteorological conditions) and one output (release rate). The dispersion model then performs the simulation of the expected dispersion consequence by combining the sensor data, GIS data and the diagnostic result of the source term. The result of this study will improve the safety-concerns of residents living next to storage facilities containing hazardous materials by providing the enhanced emergency response plan and monitoring system for toxic gas releases.

  • PDF

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.

Implementation of Autonomous Intrusion Analysis Agent(AIAA) and Tool for using Intruder Retrace (인터넷 해킹피해 시스템자동분석에이젼트(AIAA) 및 침입자 역추적 지원도구 구현)

  • Im, Chae-Ho;Won, Yu-Heon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3410-3419
    • /
    • 1999
  • Autonomous Intrusion Analysis Agent(AIAA) is Incident Response Team staff's tool that scans, analyses, reports and alerts the traces of intrusion based on system logs and intruder's backdoors inside compromised system by IR staff after security incident is reported to the IR team. AIAA is intelligent to recognize to check out who is intruder from all the user accounts and to report the suspected candidates to the master control system in IR team. IR staff who controls AIAA with master system can pick up an intruder from the candidates reported by AIAA agent and review all related summary reports and details including source host's mane, finger information, all illegal behavior and so on. AIAA is moved to compromised system by the staff to investigate the signature of intrusion along the trace of victim hosts and it is also operated in secret mode to detect the further intrusion. AIAA is alive in all victim systems until the incident is closed and IR staff can control AIAA operation and dialogue with AIAA agent in Web interface.

  • PDF

A Study on Countermeasures against Messenger Phishing using ARIT Technique (ARIT 기법을 이용한 메신저 피싱 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.223-230
    • /
    • 2013
  • With the rapid development of IT technologies, many people talk to each other in real time on-line using messenger or use the messenger to share files for work. However, using this convenience, phishing crimes occur: e.g. demanding money, and if a criminal uses a bypassing technique like proxy in order to hide the IP address the criminal has used to log on, it is in fact, difficult to find the criminal's real IP address. This paper will propose a plan to measure against messenger phishing that may occur in advance by collecting the IP address with which a user has used in a dual channel mode and the real IP address obtained by ARIT Agent using ARIT technique, going through a separate identification process and deciding whether the user has accessed in a normal method.

Tracking Experimentation of Floating Debris Drained From Nak-Dong River (낙동강 유입 부유폐기물 해상이동경로 추적시험)

  • Yu J. S.;Lee M. J.;Rho J. H.;Yoon S. H.;Kim M. H.
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.5 no.3
    • /
    • pp.3-9
    • /
    • 2002
  • When a flooding a lot of debris are drained from rivet. Drained debris separated lodgement debris and floating debris, and floating debris moving other region by wind and ocean current. This experimentation throw three buoys which installed with DGPS and other devices in nak-dong river, and check there location every minute. In consequence of this experimentation, floating debris drained nak-dong river are gathered near Dadaepo seaside or drifted Dong hae. Ocean current and wind driven current are largely influenced then tide. Numerical analysis calculated by MAPCNTR(develop by KRISO) is similar to the result of this experimentation.

  • PDF

The Developement of Secondary Optics Design Method for LED (LED 2차 광학 시스템의 설계법 개발)

  • Jung, Seung-Gyun;Seok, Dae-Il;Shin, Hwa-Young;Lee, Chang-Mo;Kim, Hoon
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.6
    • /
    • pp.26-32
    • /
    • 2007
  • Design methods of LED optic system includes point source assumption and imaginary focus approaches. However, these methods make significant error if the position of LED approachs that of optic system. This paper suggests a new design approach that LED is equally divided, light distribution of each division is predicted and confirmed through reverse tracing of light wave, and then each divided segment is separately designed, Using new design method, two kinds of example optic system were designed and light distribution and efficiency of the systems were evaluated.

Design of the Multi-PIN Diode Waveguide Limiter with Extended Attenuation Bandwidth (확장된 신호 감쇄대역을 갖는 다중 PIN다이오드 도파관 리미터 설계)

  • Na, Jae-Hyun;Roh, Don-Suk;Kim, Dong-Gil
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.971-978
    • /
    • 2018
  • This paper deals with the design and implementation of a limiter, which is a key component of the Ku-band radar system. The limiter design with the multi-pin diode switch was complemented by wideband signal attenuation, and realized the physical implementation. In the test result of implemented limiter, when the pin diode switch is all off, it is possible to transmit the incoming signal without distortion. Also when the pin diode switch is turned on sequentially, the input signal is attenuated about 20dB or more step by step. Finally when all of them were turned on, attenuation about 50dB or more were measured for a wide bandwidth(1000MHz) in Ku-band.