• Title/Summary/Keyword: 자동탐지

Search Result 619, Processing Time 0.027 seconds

Refinement of Building Boundary using Airborne LiDAR and Airphoto (항공 LiDAR와 항공사진을 이용한 건물 경계 정교화)

  • Kim, Hyung-Tae;Han, Dong-Yeob
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.3
    • /
    • pp.136-150
    • /
    • 2008
  • Many studies have been carried out for automatic extraction of building by LiDAR data or airphoto. Combining the benefits of 3D location information data and shape information data of image can improve the accuracy. So, in this research building recognition algorithm based on contour was used to improve accuracy of building recognition by LiDAR data and elaborate building boundary recognition by airphoto. Building recognition algorithm based on contour can generate building boundary and roof structure information. Also it shows better accuracy of building detection than the existing recognition methods based on TIN or NDSM. Out of creating buffers in regular size on the building boundary which is presumed by contour, this research limits the boundary area of airphoto and elaborate building boundary to fit into edge of airphoto by double active contour. From the result of this research, 3D building boundary will be able to be detected by optimal matching on the constant range of extracted boundary in the future.

  • PDF

Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management (사이버위협 관리를 위한 인터넷 위협 및 취약점 정보 수집기 설계 및 구현)

  • Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2006
  • Beginning flag security it was limited in Firewall but currently many information security solutions like Anti-virus, IDS, Firewall are come to be many. For efficiently managing different kinds of information security products ESM (Enterprise Security management) are developed and operated. Recently over the integrated security management system, TMS (Threat Management System) is rising in new area of interest. It follows in change of like this information security product and also collection information is being turning out diversification. For managing cyber threats, we have to analysis qualitative information (like vulnerabilities and malware codes, security news) as well as the quantity event logs which are from information security products of past. Information Threats and Vulnerability Auto Collector raises the accuracy of cyber threat judgement and can be utilized to respond the cyber threat which does not occur still by gathering qualitative information as well as quantity information.

  • PDF

Development of Solar Activity Monitoring Map and Its Application to the Space Weather Forecasting System

  • Shin, Junho;Moon, Yong-Jae;Lee, Jae-Hyung
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.2
    • /
    • pp.83.1-83.1
    • /
    • 2017
  • SDO/AIA와 STEREO/EUVI 두 태양 관측 위성의 193 파장에서의 실시간 영상 이미지를 이용하여 Stonyhurst Heliographic Map을 작성하고 각각의 위성 데이터 분석으로부터 얻어진 결과들을 종합적으로 재구성하여 태양 전면 및 후면의 활동 영역들을 동시에 표출하는 태양 활동성 지도 (Solar Activity Monitoring Map)를 작성하는 프로그램을 제작하였다. 태양 활동성 지도를 이용하여 태양 후면에서의 극자외선 밝기 분포를 경도에 따라 등간격으로 나눈 후 각 지역에서 얻은 극자외선량을 실시간으로 갱신하며 그래프를 작성하는 프로그램도 함께 제작하고 그로부터 태양 후면 영역의 활동성이 향후 지구에 어떠한 방식으로 영향을 미칠 것인지 사전에 예측 가능하도록 하였다. 또한 태양 후면에서 발생하는 활동 영역 (Active Region) 및 코로나홀들을 자동적으로 탐지한 후 실시간으로 변화 정도를 추적 및 기록하는 프로그램도 제작하였다. 태양 활동성 지도는 193 파장에서 뿐만 아니라 두 위성이 공유하는 세 개의 동일 혹은 유사한 파장대 (171,211,304)에서 얻어진 데이터들도 함께 이용하여 각 파장대에서 독립적으로 작성하였는데 이로 인해 각각의 에너지 영역의 특성에 해당하는 태양 활동성을 동시에 표출하는 것이 가능하게 되었다. 이러한 프로그램을 이용하여 태양 후면에서의 활동 영역의 발생 및 변화를 사전에 인식하고 그들이 태양 전면으로 나타나기 전에 대비할 수 있는 예보 장치가 마련되었다. 본 연구들과 더불어 극자외선 영역에서의 태양 활동성 조사로부터 플레어의 발생을 예측할 수 있을 것인지의 가능성 여부를 타진하기 위해 과거 극자외선 관측에서 얻어진 활동 영역들의 데이터와 연 X-선 관측으로부터 기록된 플레어 발생 여부의 상관관계를 조사하는 연구가 현재 진행 중이다. 이러한 연구로부터 긍정적인 결과가 도출되는 경우 극자외선 영역에서의 관측 데이터를 이용하여 플레어 발생 가능성을 예측하는 새로운 방법을 제시하는 것이 가능해질 것이다.

  • PDF

Knowledge Graph-based Korean New Words Detection Mechanism for Spam Filtering (스팸 필터링을 위한 지식 그래프 기반의 신조어 감지 매커니즘)

  • Kim, Ji-hye;Jeong, Ok-ran
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.79-85
    • /
    • 2020
  • Today, to block spam texts on smartphone, a simple string comparison between text messages and spam keywords or a blocking spam phone numbers is used. As results, spam text is sent in a gradually hanged way to prevent if from being automatically blocked. In particular, for words included in spam keywords, spam texts are sent to abnormal words using special characters, Chinese characters, and whitespace to prevent them from being detected by simple string match. There is a limit that traditional spam filtering methods can't block these spam texts well. Therefore, new technologies are needed to respond to changing spam text messages. In this paper, we propose a knowledge graph-based new words detection mechanism that can detect new words frequently used in spam texts and respond to changing spam texts. Also, we show experimental results of the performance when detected Korean new words are applied to the Naive Bayes algorithm.

Detecting Abnormal Patterns of Network Traffic by Analyzing Linear Patterns and Intensity Features (선형패턴과 명암 특징을 이용한 네트워크 트래픽의 이상현상 감지)

  • Jang, Seok-Woo;Kim, Gye-Young;Na, Hyeon-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.21-28
    • /
    • 2012
  • Recently, the necessity for good techniques of detecting network traffic attack has increased. In this paper, we suggest a new method of detecting abnormal patterns of network traffic data by visualizing their IP and port information into two dimensional images. The proposed approach first generates four 2D images from IP data of transmitters and receivers, and makes one 2D image from port data. Analyzing those images, it then extracts their major features such as linear patterns or high intensity values, and determines if traffic data contain DDoS or DoS Attacks. To comparatively evaluate the performance of the proposed algorithm, we show that our abnormal pattern detection method outperforms the existing algorithm in terms of accuracy and speed.

An Implementation of Smart Flowerpot made with 3D Printer and NodeMCU (3D 프린터와 NodeMCU를 사용한 스마트 화분의 구현)

  • Na, Chaebin;Choi, YeonWoong;Kim, SeKwang;Seo, JangGui;Hwang, Kitae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.231-237
    • /
    • 2017
  • This paper presents an implementation of a smart flowerpot which can adjust humidity and illumination automatically after monitoring the temperature, humidity, and illumination. We made a container of the flowerpot with a 3D printer and embedded a NodeMCU micro controller in it. We attached a temperature sensor, a humidity sensor, an illumination sensor, and a water pump to the NodeMCU. We developed a control program that adjusts humidity and illumination and ran it on the NodeMCU. Also we developed an Android application and set up an MQTT server. Using the MQTT server, the NodeMCU and the Android application can exchange messages which keep sensor values and commands. Using the Android application. the user can send the proper temperature, humidity, and illumination to the smart flowerpot and monitor the sensor values.

Detection of Premature Ventricular Contraction Using Discrete Wavelet Transform and Fuzzy Neural Network (이산 웨이블릿 변환과 퍼지 신경망을 이용한 조기심실수축 추출)

  • Jang, Hyoung-Jong;Lim, Joon-Shik
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.3
    • /
    • pp.451-459
    • /
    • 2009
  • This paper presents an approach to detect premature ventricular contraction(PVC) using discrete wavelet transform and fuzzy neural network. As the input of the algorithm, we use 14 coefficients of d3, d4, and d5, which are transformed by a discrete wavelet transform(DWT). This paper uses a neural network with weighted fuzzy membership functions(NEWFM) to diagnose PVC. The NEWFM discussed in this paper classifies a normal beat and a PVC beat. The size of the window of DWT is $-31/360{\sim}+32/360$ second(64 samples) whose center is the R wave. Using the seven records of the MIT-BIH arrhythmia database used in Shyu's paper, the classification performance of the proposed algorithm is 99.91%, which outperforms the 97.04% of Shyu's analysis. Using the forty records of the M1T-BIH arrhythmia database used in Inan's paper, the classification performance of the proposed algorithm is 98.01%, which outperforms 96.85% of Inan's one. The SE and SP of the proposed algorithm are 84.67% and 99.39%, which outperforms the 82.57% and 98.33%, respectively, of Inan's study.

  • PDF

Autofocus Phase Compensation of Velocity Disturbed UUV by DPC Processing with Multiple-Receiver (다중 수신기 DPC 처리에 의한 속도 교란 수중 무인체의 자동초점 위상 보상)

  • Kim, Boo-il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1973-1980
    • /
    • 2017
  • In the case of a small UUV operating an active synthetic aperture sonar, various velocity disturbances may occur on the path due to the influence of external underwater environment, and this causes phase errors in coherent synthetic aperture processing, which has a large influence on the detected image. In this paper, when a periodic sinusoidal velocity disturbance is generated in the traveling direction, the phase generated by the round trip slope range at each position is estimated the cross correlation coefficient for multiple received signals and compensated the position variation in the overlapped DPC by the average value within the maximum allowable width. Through simulations, it has been confirmed that the images degraded by the velocity disturbance amplitude and fluctuating frequency of the UUV are removed from the false targets and the performance of azimuth resolution is improved by the proposed phase compensation method.

Matching Points Extraction Between Optical and TIR Images by Using SURF and Local Phase Correlation (SURF와 지역적 위상 상관도를 활용한 광학 및 열적외선 영상 간 정합쌍 추출)

  • Han, You Kyung;Choi, Jae Wan
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.1
    • /
    • pp.81-88
    • /
    • 2015
  • Various satellite sensors having ranges of the visible, infrared, and thermal wavelengths have been launched due to the improvement of hardware technologies of satellite sensors development. According to the development of satellite sensors with various wavelength ranges, the fusion and integration of multisensor images are proceeded. Image matching process is an essential step for the application of multisensor images. Some algorithms, such as SIFT and SURF, have been proposed to co-register satellite images. However, when the existing algorithms are applied to extract matching points between optical and thermal images, high accuracy of co-registration might not be guaranteed because these images have difference spectral and spatial characteristics. In this paper, location of control points in a reference image is extracted by SURF, and then, location of their corresponding pairs is estimated from the correlation of the local similarity. In the case of local similarity, phase correlation method, which is based on fourier transformation, is applied. In the experiments by simulated, Landsat-8, and ASTER datasets, the proposed algorithm could extract reliable matching points compared to the existing SURF-based method.

Extraction and Modeling of Curved Building Boundaries from Airborne Lidar Data (항공라이다 데이터의 건물 곡선경계 추출 및 모델링)

  • Lee, Jeong Ho;Kim, Yong Il
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.4
    • /
    • pp.117-125
    • /
    • 2012
  • Although many studies have been conducted to extract buildings from airborne lidar data, most of them assume that all the boundaries of a building are straight line segments. This makes it difficult to model building boundaries containing curved segments correctly. This paper aims to model buildings containing curved segments as combination of straight lines and arcs. First, two sets of boundary points are extracted by adaptive convex hull algorithm and local convex hull algorithm with a larger radius. Then, arc segments are determined by average spacing of boundary points and intersection ratio of perpendicular lines. Finally, building boundary is modeled through regularization of least squares line or circle fitting. The experimental results showed that the proposed method can model the curved building boundaries as arc segments correctly by completeness of 69% and correctness of 100%. The approach will be utilized effectively to create automatically digital map that meets the conditions of the Korean digital mapping.