• Title/Summary/Keyword: 이상탐지 시스템

Search Result 574, Processing Time 0.022 seconds

A Comparison of Symbol Error Performance for SC-FDE and OFDM Transmission Systems in Modeled Underwater Acoustic Communication Channel (모델링된 수중음향 채널환경에서 SC-FDE와 OFDM 전송방식의 심볼오율 비교)

  • Hwang, Ho-Seon;Park, Gyu-Tae;Joo, Jae-Hoon;Shin, Kee-Cheol
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.3
    • /
    • pp.139-146
    • /
    • 2018
  • Underwater acoustic communication can be applied to various area such as scientific, commercial and military survey using Autonomous Underwater Vehicles and Unmanned Underwater Vehicles. Underwater communication is studying very actively by advanced country like United States. But differ from wireless communication in the air, underwater acoustic communication has some difficult problems, ISI(Inter Symbol Interference) due to multipath and limit of transmission bandwidth due to slow propagation of sound wave. In this paper, SC-FDE and OFDM transmission system for the cancellation of ISI in conjunction with underwater acoustic channel modeling are applied to the underwater simulation of communication. The performance of these methods in the simulation guide to possibility of adopting in underwater acoustic communication algorithm. For this purpose, we compare SER performance of SC-FDE with that of OFDM for modelled underwater channel. Underwater channel is generated by Bellhop model. Simulation results show above 5dB SNR gain at 10-3 SER. And it demonstrate SC-FDE is efficient method for underwater acoustic communication.

Vegetation Water Status Monitoring around China and Mongolia Desert using Satellite Data (위성자료를 이용한 중국과 몽골 사막주변의 식생수분상태 모니터링)

  • Lee, Ga-Lam;Kim, Young-Seup;Han, Kyoung-Soo;Lee, Chang-Suk;Yeom, Jong-Min
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.4
    • /
    • pp.94-100
    • /
    • 2008
  • Recently, global warming for climate system is a crucial issue over the world and it brings about severe climate change, abnormal temperature, a downpour, a drought, and so on. Especially, a drought over the earth surface accelerates desertification which has been advanced over the several years mainly originated from a climatic change. The objective of this study is to detect variation of vegetation water condition around China and Mongolia desert by using satellite data having advantage in observing surface biological system. In this study, we use SPOT/VEGETATION satellite image to calculate NDWI (Normalized Difference Water Index) around study area desert for monitoring of status of vegetation characteristics. The vegetation water status index from remotely sensing data is related to desertification since dry vegetation is apt to desertify. We can infer vegetation water status using NDWI acquired by NIR (Near infrared) and SWIR (Short wave infrared) bands from SPOT/VGT. The consequence is that NDWI decreased around desert from 1999 to 2006. The areas that NDWI was decreased are located in the northeast of Mongolian Gobi desert and the southeast of China Taklamakan desert.

  • PDF

Evaluation of Utilization of Satellite Remote Sensing Data for Drought Monitoring (가뭄 모니터링을 위한 인공위성 원격탐사자료의 활용 가능성 평가)

  • Won, Jeongeun;Son, Youn-Suk;Lee, Sangho;Kang, Limseok;Kim, Sangdan
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.6_2
    • /
    • pp.1803-1818
    • /
    • 2021
  • As the frequency of drought increases due to climate change, it is very important to have a monitoring system that can accurately determine the situation of widespread drought. However, while ground-based meteorological data has limitations in identifying all the complex droughts in Korea, satellite remote sensing data can be effectively used to identify the spatial characteristics of drought in a wide range of regions and to detect drought. This study attempted to analyze the possibility of using remote sensing data for drought identification in South Korea. In order to monitor various aspects of drought, remote sensing and ground observation data of precipitation and potential evapotranspiration, which are major variables affecting drought, were collected. The evaluation of the applicability of remote sensing data was conducted focusing on the comparison with the observation data. First, to evaluate the applicability and accuracy of remote sensing data, the correlations with observation data were analyzed, and drought indices of various aspects were calculated using precipitation and potential evapotranspiration for meteorological drought monitoring. Then, to evaluate the drought monitoring ability of remote sensing data, the drought reproducibility of the past was confirmed using the drought index. Finally, a high-resolution drought map using remote sensing data was prepared to evaluate the possibility of using remote sensing data for actual drought in South Korea. Through the application of remote sensing data, it was judged that it would be possible to identify and understand various drought conditions occurring in all regions of South Korea, including unmeasured watersheds in the future.

A Study on the Estimation of Multi-Object Social Distancing Using Stereo Vision and AlphaPose (Stereo Vision과 AlphaPose를 이용한 다중 객체 거리 추정 방법에 관한 연구)

  • Lee, Ju-Min;Bae, Hyeon-Jae;Jang, Gyu-Jin;Kim, Jin-Pyeong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.279-286
    • /
    • 2021
  • Recently, We are carrying out a policy of physical distancing of at least 1m from each other to prevent the spreading of COVID-19 disease in public places. In this paper, we propose a method for measuring distances between people in real time and an automation system that recognizes objects that are within 1 meter of each other from stereo images acquired by drones or CCTVs according to the estimated distance. A problem with existing methods used to estimate distances between multiple objects is that they do not obtain three-dimensional information of objects using only one CCTV. his is because three-dimensional information is necessary to measure distances between people when they are right next to each other or overlap in two dimensional image. Furthermore, they use only the Bounding Box information to obtain the exact coordinates of human existence. Therefore, in this paper, to obtain the exact two-dimensional coordinate value in which a person exists, we extract a person's key point to detect the location, convert it to a three-dimensional coordinate value using Stereo Vision and Camera Calibration, and estimate the Euclidean distance between people. As a result of performing an experiment for estimating the accuracy of 3D coordinates and the distance between objects (persons), the average error within 0.098m was shown in the estimation of the distance between multiple people within 1m.

Landslide Susceptibility Prediction using Evidential Belief Function, Weight of Evidence and Artificial Neural Network Models (Evidential Belief Function, Weight of Evidence 및 Artificial Neural Network 모델을 이용한 산사태 공간 취약성 예측 연구)

  • Lee, Saro;Oh, Hyun-Joo
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.2
    • /
    • pp.299-316
    • /
    • 2019
  • The purpose of this study was to analyze landslide susceptibility in the Pyeongchang area using Weight of Evidence (WOE) and Evidential Belief Function (EBF) as probability models and Artificial Neural Networks (ANN) as a machine learning model in a geographic information system (GIS). This study examined the widespread shallow landslides triggered by heavy rainfall during Typhoon Ewiniar in 2006, which caused serious property damage and significant loss of life. For the landslide susceptibility mapping, 3,955 landslide occurrences were detected using aerial photographs, and environmental spatial data such as terrain, geology, soil, forest, and land use were collected and constructed in a spatial database. Seventeen factors that could affect landsliding were extracted from the spatial database. All landslides were randomly separated into two datasets, a training set (50%) and validation set (50%), to establish and validate the EBF, WOE, and ANN models. According to the validation results of the area under the curve (AUC) method, the accuracy was 74.73%, 75.03%, and 70.87% for WOE, EBF, and ANN, respectively. The EBF model had the highest accuracy. However, all models had predictive accuracy exceeding 70%, the level that is effective for landslide susceptibility mapping. These models can be applied to predict landslide susceptibility in an area where landslides have not occurred previously based on the relationships between landslide and environmental factors. This susceptibility map can help reduce landslide risk, provide guidance for policy and land use development, and save time and expense for landslide hazard prevention. In the future, more generalized models should be developed by applying landslide susceptibility mapping in various areas.

A Security Nonce Generation Algorithm Scheme Research for Improving Data Reliability and Anomaly Pattern Detection of Smart City Platform Data Management (스마트시티 플랫폼 데이터 운영의 이상패턴 탐지 및 데이터 신뢰성 향상을 위한 보안 난수 생성 알고리즘 방안 연구)

  • Lee, Jaekwan;Shin, Jinho;Joo, Yongjae;Noh, Jaekoo;Kim, Jae Do;Kim, Yongjoon;Jung, Namjoon
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.75-80
    • /
    • 2018
  • The smart city is developing an energy system efficiently through a common management of the city resource for the growth and a low carbon social. However, the smart city doesn't counter a verification effectively about a anomaly pattern detection when existing security technology (authentication, integrity, confidentiality) is used by fixed security key and key deodorization according to generated big data. This paper is proposed the "security nonce generation based on security nonce generation" for anomaly pattern detection of the adversary and a safety of the key is high through the key generation of the KDC (Key Distribution Center; KDC) for improvement. The proposed scheme distributes the generated security nonce and authentication keys to each facilities system by the KDC. This proposed scheme can be enhanced to the security by doing the external pattern detection and changed new security key through distributed security nonce with keys. Therefore, this paper can do improving the security and a responsibility of the smart city platform management data through the anomaly pattern detection and the safety of the keys.

Bridge Safety Determination Edge AI Model Based on Acceleration Data (가속도 데이터 기반 교량 안전 판단을 위한 Edge AI 모델)

  • Jinhyo Park;Yong-Geun Hong;Joosang Youn
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.4
    • /
    • pp.1-11
    • /
    • 2024
  • Bridges crack and become damaged due to age and external factors such as earthquakes, lack of maintenance, and weather conditions. With the number of aging bridge on the rise, lack of maintenance can lead to a decrease in safety, resulting in structural defects and collapse. To prevent these problems and reduce maintenance costs, a system that can monitor the condition of bridge and respond quickly is needed. To this end, existing research has proposed artificial intelligence model that use sensor data to identify the location and extent of cracks. However, existing research does not use data from actual bridge to determine the performance of the model, but rather creates the shape of the bridge through simulation to acquire data and use it for training, which does not reflect the actual bridge environment. In this paper, we propose a bridge safety determination edge AI model that detects bridge abnormalities based on artificial intelligence by utilizing acceleration data from bridge occurring in the field. To this end, we newly defined filtering rules for extracting valid data from acceleration data and constructed a model to apply them. We also evaluated the performance of the proposed bridge safety determination edge AI model based on data collected in the field. The results showed that the F1-Score was up to 0.9565, confirming that it is possible to determine safety using data from real bridge, and that rules that generate similar data patterns to real impact data perform better.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Anisotrpic radar crosshole tomography and its applications (이방성 레이다 시추공 토모그래피와 그 응용)

  • Kim Jung-Ho;Cho Seong-Jun;Yi Myeong-Jong
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2005.09a
    • /
    • pp.21-36
    • /
    • 2005
  • Although the main geology of Korea consists of granite and gneiss, it Is not uncommon to encounter anisotropy Phenomena in crosshole radar tomography even when the basement is crystalline rock. To solve the anisotropy Problem, we have developed and continuously upgraded an anisotropic inversion algorithm assuming a heterogeneous elliptic anisotropy to reconstruct three kinds of tomograms: tomograms of maximum and minimum velocities, and of the direction of the symmetry axis. In this paper, we discuss the developed algorithm and introduce some case histories on the application of anisotropic radar tomography in Korea. The first two case histories were conducted for the construction of infrastructure, and their main objective was to locate cavities in limestone. The last two were performed In a granite and gneiss area. The anisotropy in the granite area was caused by fine fissures aligned in the same direction, while that in the gneiss and limestone area by the alignment of the constituent minerals. Through these case histories we showed that the anisotropic characteristic itself gives us additional important information for understanding the internal status of basement rock. In particular, the anisotropy ratio defined by the normalized difference between maximum and minimum velocities as well as the direction of maximum velocity are helpful to interpret the borehole radar tomogram.

  • PDF

Application of SP Monitoring in the Pohang Geothermal Field (포항 지열 개발지역에서의 SP 장기 관측)

  • Lim Seong Keun;Lee Tae Jong;Song Yoonho;Song Sung-Ho;Yasukawa Kasumi;Cho Byong Wook;Song Young Soo
    • Geophysics and Geophysical Exploration
    • /
    • v.7 no.3
    • /
    • pp.164-173
    • /
    • 2004
  • To delineate geothermal water movement at the Pohang geothermal development site, Self-Potential (SP) survey and monitoring were carried out during pumping tests. Before drilling, background SP data have been gathered to figure out overall potential distribution of the site. The pumping test was performed in two separate periods: 24 hours in December 2003 and 72 hours in March 2004. SP monitoring started several days before the pumping tests with a 128-channel automatic recording system. The background SP survey showed a clear positive anomaly at the northern part of the boreholes, which may be interpreted as an up-flow Bone of the deep geothermal water due to electrokinetic potential generated by hydrothermal circulation. The first and second SP monitoring during the pumping tests performed to figure out the fluid flow in the geothermal reservoir but it was not easy to see clear variations of SP due to pumping and pumping stop. Since the area is covered by some 360 m-thick tertiary sediments with very low electrical resistivity (less than 10 ohm-m), the electrokinetic potential due to deep groundwater flow resulted in being seriously attenuated on the surface. However, when we compared the variation of SP with that of groundwater level and temperature of pumping water, we could identify some areas responsible to the pumping. Dominant SP changes are observed in the south-west part of the boreholes during both the preliminary and long-term pumping periods, where 3-D magnetotelluric survey showed low-resistivity anomaly at the depth of $600m\~1,000m$. Overall analysis suggests that there exist hydraulic connection through the southwestern part to the pumping well.