• Title/Summary/Keyword: 영역감시

Search Result 497, Processing Time 0.023 seconds

MIRIS 지구관측 적외선카메라 인증모델 성능 시험 및 Field Test

  • Mun, Bong-Gon;Park, Yeong-Sik;Lee, Chang-Hui;Park, Seong-Jun;Cha, Sang-Mok;Lee, Dae-Hui;Jeong, Ung-Seop;Nam, Uk-Won;Park, Jang-Hyeon;Yuk, In-Su;Ga, Neung-Hyeon;Lee, Mi-Hyeon;Lee, Deok-Haeng;Yang, Sun-Cheol;Kim, Yeong-Ju;Lee, Gi-Hun;Jeong, Han;Lee, Seung-U;Han, Won-Yong
    • Bulletin of the Korean Space Science Society
    • /
    • 2009.10a
    • /
    • pp.45.1-45.1
    • /
    • 2009
  • 과학기술위성 3호의 주탑재체인 MIRIS (Multi-purpose InfraRed Imaging System)는 우주관측카메라 (Space Observation Camera, SOC)와 지구관측카메라 (Earth Observation Camera, EOC)가 독립적인 시스템으로 구성되어 있다. 지구관측카메라는 유효 구경 100 mm, F/5의 광학계로 3-5 마이크론 파장영역을 관측하며, 국내에서 개발된 적외선 검출기의 우주 인증 시험과 유사시 한반도 적외선 감시를 주요 목적으로 하고 있다. 고도 700km에서 지상을 볼 때 약 42m/pixel의 공간분해능을 나타낼 것으로 기대하고 있다. 지구관측카메라의 인증 모델(Qualification Model)은 냉동기를 제외한 모든 부품이 국내기술로 제작되었으며, 미러 본딩 및 릴레이 렌즈 조립 기술, 적외선 영상 검교정 기술 등 다양한 경험과 도전을 제공했다. 이 발표에서는 지구관측카메라 인증모델을 이용하여 수행한 주요 시험 과정을 소개한다. 국내 회사 (주)i3 system에서 제작된 적외선 검출기는 $320\times256$ HgCdTe array (평균 양자효율 80% 이상) 이며 77K에서 정상적으로 운영된다. Micro Stirling Cooler에 의해 듀어는 전원을 켠 후 5분 이내에 검출기 운영온도인 77K까지 내려간다. 적외선 광학계의 정렬, 시스템 MTF 측정, 흑체 측정 및 검교정 작업을 수행한 후 야외에서 다양한 경우에 대해 Field Test를 진행했다. 이 발표에서는 Field Test 과정과 이를 통해 얻은 결과를 발표하고, FM (Flight Model) 제작에 있어 수정해야 할 사항들을 제안해 본다.

  • PDF

A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing (클라우드 컴퓨팅에서 패스워드기반의 사용자 정보 가상화를 통한 사용자 프라이버시 보장 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • As the area of informatization has been expanding followed by the development of information communication technology, cloud computing which can use infra sources like server, storage, and network in IT area as an efficient service whenever and wherever skyrockets. But users who use cloud computing technology may have some problems like exposure personal data, surveillance on person, and process on commercial purpose on their personal data. This paper proposes a security technique which protect user's privacy by creating imaginary user information not to be used by other people. The proposed technique virtualizes user's information as an anonymity value not to let other people know user's identity by combining PIN code with it and guarantees user's anonymity. Also it can manage and certificate personal information that is important in cloud computing, so that it can solve security problem of cloud computing which centers all informations. Therefore this paper can assist upgrading of the level of information of poor SMBs through safe use of cloud computing.

  • PDF

Impact of Northeast Asian Biomass Burning Activities on Regional Atmospheric Environment (동북아시아 지역의 바이오매스 연소 활동이 지역 대기 환경에 미치는 영향)

  • Lee, Kwon-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.1
    • /
    • pp.184-196
    • /
    • 2012
  • Biomass burning activities(BBA) are caused by both natural and anthropogenic origins. Due to emissions of greenhouse gases and atmospheric aerosols during the burning process, BBA has been known to be one of important sources of atmospheric pollution and the climate change. However, the monitoring of BBA and its effects on atmospheric environment are not simple. This study evaluates the trends of BBA and its impact on atmospheric environment by using earth observing satellite. The results show that the most BBA were found over ever green, green vegetation types, and irrigated land cover types in study region. The trends of BBA and aerosol optical thickness which represents relative aerosol loading in the atmosphere, show similar pattern. Aerosol increases caused by BBA highlight the effectiveness of these mechanisms and would affect the regional atmospheric environment and climate change.

Estimation of Aerosol Vertical Profile from the MODIS Aerosol Optical Thickness and Surface Visibility Data (MODIS 에어러솔 광학두께와 지상에서 관측된 시정거리를 이용한 대기 에어러솔 연직분포 산출)

  • Lee, Kwon-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.2
    • /
    • pp.141-151
    • /
    • 2013
  • This study presents a modeling of aerosol extinction vertical profiles in Korea by using the Moderate Resolution Imaging Spectro-radiometer(MODIS) derived aerosol optical thickness(AOT) and ground based visibility observation data. The method uses a series of physical equations for the derivation of aerosol scale height and vertical profiles from MODIS AOT and surface visibility data. The modelled results under the standard atmospheric condition showed small differences with the standard aerosol vertical profile used in the radiative transfer model. Model derived aerosol scale heights for two cases of clean(${\tau}_{MODIS}=0.12{\pm}0.07$, visibility=$21.13{\pm}3.31km$) and hazy atmosphere(${\tau}_{MODIS}=1.71{\pm}0.85$, visibility=$13.33{\pm}5.66km$) are $0.63{\pm}0.33km$ and $1.71{\pm}0.84km$. Based on these results, aerosol extinction profiles can be estimated and the results are transformed into the KML code for visualization of dataset. This has implications for atmospheric environmental monitoring and environmental policies for the future.

A Camera Based Traffic Signal Generating Algorithm for Safety Entrance of the Vehicle into the Joining Road (차량의 안전한 합류도로 진입을 위한 단일 카메라 기반 교통신호 발생 알고리즘)

  • Jeong Jun-Ik;Rho Do-Hwan
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.66-73
    • /
    • 2006
  • Safety is the most important for all traffic management and control technology. This paper focuses on developing a flexible, reliable and real-time processing algorithm which is able to generate signal for the entering vehicle at the joining road through a camera and image processing technique. The images obtained from the camera located beside and upon the road can be used for traffic surveillance, the vehicle's travel speed measurement, predicted arriving time in joining area between main road and joining road. And the proposed algorithm displays the confluence safety signal with red, blue and yellow color sign. The three methods are used to detect the vehicle which is driving in setted detecting area. The first method is the gray scale normalized correlation algorithm, and the second is the edge magnitude ratio changing algorithm, and the third is the average intensity changing algorithm The real-time prototype confluence safety signal generation algorithm is implemented on stored digital image sequences of real traffic state and a program with good experimental results.

USN Security Enhancement Using System IDs (시스템 ID를 이용한 USN의 보안 취약성 개선)

  • Kim, Hyun-Jue;Chung, Jong-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.73-80
    • /
    • 2009
  • Security is critically important for ubiquitous sensor networks that are usually used for the military and serveillance in environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for ubiquitous sensor networks. ZigBee is used for low data rate and low power wireless sensor network applications. To deploy ubiquitous sensor networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

A Method of ISAR Geometric Calibration for Point Target Using Impulse-Radio UWB (임펄스 초광대역 레이다를 이용한 점표적의 ISAR 기하 보정 방법)

  • Yu, Jiwoong;Nikitin, Konstantin;Paek, Inchan;Jang, Jong Hun;Ka, Min-Ho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.4
    • /
    • pp.397-403
    • /
    • 2015
  • In this paper, a method of ISAR geometric calibration is represented by using impulse-radio UWB radar. The ir-UWB is good for using a signal processing in time domain, so, it does not occur a multi-path or coupling problem. If a signal that between antennas and target is assumed a plane wave, a center of rotation in ISAR geometry model can be estimated by using point target. Before image is reconstructed with sinogram, the center of rotation can be calculated by using least square fitting. This method can be obtained a more contrast image, and a maximum value of entropy of image. The method, that estimates a center of rotation in received data, will be used a initial setup of instruments or a periodic compensation to reconstruct image. It would be useful in medical, security and surveillance imaging equipments that have a fixed geometry.

Technology of Sensors with Human Sensitivity (인간과 같은 감도를 가진 오감센서 기술)

  • Song, Byung-Taeck
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.507-514
    • /
    • 2015
  • The Internet of Things era is approaching where all the things are equipped with smart sensors and communicate through internet. The three core technologies of the Internet of Things are 'detection technology' to get information from things and the environment, 'wired and wireless communications and network infrastructure skills' that support to connect things to the internet, and 'service interface technology' that processes the information appropriate to various services. Smart sensor application can expand to smartphone, smart cars, smart home systems, wearable electronic devices, telemedicine systems, and environmental monitoring systems, etc. In particular, technologies that mimic the five human senses. This study reviews the biological principles of the human senses and the principles of operation, research & development status, technology trends and market analysis of the sensors.

Derivation the Correction of the Component of the Recorder and the Application of Hilbert Transformation to Calculating the Frequency Response of the Sensor (지진기록계 보정과 힐버트 변환 적용에 의한 센서 주파수 응답 계산)

  • Cho, Chang Soo
    • Geophysics and Geophysical Exploration
    • /
    • v.19 no.2
    • /
    • pp.84-90
    • /
    • 2016
  • The validation of performance test for newly developed or old-used sensor is very important in the earthquake monitoring and seismology using earthquake data. Especially the frequency response of the sensor is mainly used to correct the earthquake data. The technique of the calculation of phase and amplitude with Hilbert transformation for earthquake data that is filtered with band limited frequency in time domain is applied to calculate the frequency response of the sensor. This technique was tested for the acceleration sensors, CMG-5T of 1g and 2g installed on the vibration table at the laboratory and we could obtain satisfactory result. Tohoku large earthquake in 2011 observed at the station SNU that has accelerometer, ES-T and seismometer, STS-2 operated by KIGAM was also used to test the field data applicability. We could successfully get the low frequency response of broad band sensor, STS-2. The technique by using band limited frequency filter and Hilbert transformation showed the superior frequency response to the frequency spectrum ratio method for noisy part in data.

The Face Authentication Mechanism of Learner for the Efficient E-Learning (효율적인 이러닝을 위한 학습자 얼굴 인증 기술)

  • Jang, Eun-Gyeom;Kim, Gyoung-Bae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.67-74
    • /
    • 2010
  • E-learning technology which effectively supports the learning methodologies between students and professors and which provides location and time benefits to students is being researched now a days. However, E-learning classes produce bad effects comparing with offline classes in learning procedures including scholastic achievements. Bad effects of E-learning system could be proxy attendance, lack of concentration, and bad attitude of students. These environmental problems must be solved first to achieve the advantages of E-learning technology. To get rid of these problems, in this paper, we proposed a mechanism which provides effective learning progress by using face authentication method. This mechanism supervise the student by using real time face recognition which prevents proxy attendance, illegal activities, and student's absences.