• Title/Summary/Keyword: 추적방안

Search Result 608, Processing Time 0.029 seconds

A STUDY ON THE ASTRONOMICAL OBSERVATIONAL ENVIRONMENTS AT THE CHOEJUNG-SAN GEODSS SITE: I. SEEING AND NIGHT SKY BRIGHTNESS MEASUREMENTS AND UTILIZING PLAN FOR THE GEODSS SITE (최정산 위성추적소의 천체관측 환경에 관한 조사 연구: I. SEEING 및 야천광 관측과 위성추적소의 활용 방안)

  • Kang, Yong-Hui;Yun, Tae-Seok;Park, Byeong-Gon;Lee, Gi-Won;Choi, Yeong-Jun;Choi, Eun-Woo
    • Publications of The Korean Astronomical Society
    • /
    • v.11 no.1
    • /
    • pp.177-196
    • /
    • 1996
  • We have investigated the astronomical observational environments at the Choejung-san GEODSS site which is located at the south of Taegu, Korea. As a part of the investigation, seeing and night sky brightness were measured outside nearby the GEODSS site using the Celestron 8-inch portable reflector with $192{\times}165$ pixels Lynxx CCD camera during the period of December 1994 to April 1996. The average seeing values of 4.8 arcsecond in B filter and 5.1 arcsecond in V filter were determined using the IRAF software. These values might be overestimated and would be reduced by at least 1 arc second in both filters if they were measured by more stable telescope system with solid mount and under a dome. We also compare the average seeing value at the GEODSS site with those at three other observatories, the Bohyunsan Optical Astronomy Observatory, the Sobaeksan Optical Astronomy Observatory, and the Seoul National University Observatory, for justification of the above guess. Unfortunately the night sky brightness measurement was not successful mainly due to the short exposure time. The utilizing plan of the GEOSS site is discussed based on the average seeing value, naked-eye sky brightness measurement, analysis of the existing thirty-year weather data and twenty-year urban planning of the metropolitan Taegu city for the year of 2016.

  • PDF

An Application of Safety Management for Tunnel Construction Using RTLS Technology (RTLS기술을 이용한 터널공사현장의 실시간 안전관리 적용방안)

  • Kim, Dae-Won;Moon, Sung-Mo;Cho, Hun-Hee;Kang, Kyung-In
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.2
    • /
    • pp.12-20
    • /
    • 2011
  • Recently, construction site scale has been growing larger along with the growth of national economy. As construction market requires time reduction, cost saving, and improving quality, a cutting-edge technology applied research has been gradually studied for more efficient project management. In particular, the Real Time Location System (RTLS) technology, a real-time location tracking system of construction resources, can be effectively used in safety management. This technology has been studied and applied in various industries including architectural, marine, urban, and other industries. However, although tunnel construction in civil engineering has a narrow space and many safety risks, there are not researched about this content. Therefore, this study proposes an advanced safety management model for tunnel construction using the RTLS technology and a measurement method of the feasibility of this model in the construction site.

Study for Tracing Zombie PCS and Botnet Using an Email Spam Trap (이메일 스팸트랩을 이용한 좀비 PC 및 봇넷 추적 방안연구)

  • Jeong, Hyun-Cheol;Kim, Huy-Kang;Lee, Sang-Jin;Oh, Joo-Hyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.101-115
    • /
    • 2011
  • A botnet is a huge network of hacked zombie PCs. Recognizing the fact that the majority of email spam is sent out by botnets, a system that is capable of detecting botnets and zombie PCS will be designed in this study by analyzing email spam. In this study, spam data collected in "an email spam trail system", Korea's national spam collection system, were used for analysis. In this study, we classified the spam groups by the URLs or attached files, and we measured how much the group has the characteristics of botnet and how much the IPs have the characteristics of zombie PC. Through the simulation result in this study, we could extract 16,030 zombie suspected PCs for one hours and it was verified that email spam can provide considerably useful information in tracing zombie PCs.

Design of Real-time MR Contents using Substitute Videos of Vehicles and Background based on Black Box Video (블랙박스 영상 기반 차량 및 배경 대체 영상을 이용한 실시간 MR 콘텐츠의 설계)

  • Kim, Sung-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.213-218
    • /
    • 2021
  • In this paper, we detect and track vehicles by type based on highway daytime driving videos taken with black boxes for vehicles. In addition, we design a real-time MR contents production method that can be newly created by placing substitute videos of each type of detected vehicles in the same location as the new background video. To detect and track vehicles by type, we use the YOLO algorithm. And we also use the mask technique based on RGB color for substitute videos of each type of vehicles detected. The size of the vehicle substitute videos to be used for MR content are substituted by the same size as the area size of the detected vehicles. In this paper, we confirm that real-time MR contents design is possible as a result of experiments and simulations and believe that It will be usefully utilized in the field of VR contents.

RFID Ubiquitous Public Information Documental Administration System construction and Security research (RFID 유비쿼터스 영구기록물관리시스템 구축과 보안 연구)

  • Jang, Young-Sang;Lee, Sung-Yooung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.111-121
    • /
    • 2009
  • Public Information Documental of the administrative, legislative and judicial etc. is lastingness documental and need administration. Whenever the crime event happens, judicature's documental is lent frequently to reference data and is returned, event posting of documental, hysteresis inquiry, lending/return, conservation search, documental exhaust management must consist for administration of lastingness documental. RFID is utilized by the practical use plan of recent Ubiquitous information. Because attaching tag to lastingness documental that use RFID in this treatise, register and manage documental, and chase hysteresis, and design upkeep, present condition analysis of lastingness documental to search, S/W, H/W, network layout, Ubiquitous RFID lastingness recording administration system. Construct lastingness recording administration system after a performance experiment and a chase experiment that is applied in spot that attach 900MHz important duty's RFID tag. After construction practice, create link sex with connection system, security analysis and Forensic data and analyze improvement effect. Is going to contribute Ubiquitous information technology application and Forensic technology development in country documental administration through. research of this treatise.

A Study for Standardizing and Efficient Maintaining Multi-dimensional Geospatial River Data (다차원 하천공간정보 표준화 및 효율적 유지관리 기술 연구)

  • Kim, Dongsu;Kim, Kyungdong;You, Hojun;Yeo, Hong-koo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.56-56
    • /
    • 2021
  • 하천단면이나 하상변동 추적 등 하천공간정보는 유량이나 강우 등 수문시계열 정보와 더불어 계획홍수위 산정이나 하천구조물 신설로 인한 하천의 변화를 추적하는 데 있어 근간을 이루는 주요 정보로 국가차원의 유지 및 관리가 필요하다. 국내의 하천공간정보는 RIMGIS, WAMIS, 하천 일람, WINS와 같은 웹기반 시스템에서 정보화 되어 관리되고 있다. 그러나, RIMGIS는 여러 가지 문제점을 노정하고 있어 개선을 적극적으로 검토해볼 시점이라고 볼 있다. 우선, RIMGIS는 구축이 10년 이상된 기술로 구성되어 온라인 시스템 실행속도가 느리고, 물관리 일원화 와중에 관리주체가 불분명해진 상태이며, 제공되는 정보도 하천망이나 유역 정도로 차원 및 정확도도 낮고 활용도 및 현행화도 부족한 상태이다. 또한 공간정보 관리 DB표준으로 효율적인 관계형 구조 대신 하천대장 등을 수치화한 개념의 레이어 단위의 주제도로 관리하다보니 자료중복이 불가피하여 시스템이 무겁고, 자료간 연관검색이 거의 불가하고, 신속한 하천지형 변화 업데이트가 어려운 상태이다. 최근 진행되고 있는 RIMGIS 개선 사업은 여전히 종래의 레이어 단위의 주제도들을 추가하거나 개정하는 데 머물고 있는 상태이다. 이러다 보니 현재 우리나라의 대표적인 하천정보시스템인 RIMGIS의 실무 활용도는 낮은 것으로 알려져 있다. 가장 실무활용도를 저하시키고 현행화 상의 문제로 지적되는 부분은 하천정비기본계획 수립 시 발생한 공간자료 관리 부실이다. 현재 RIMGIS에서는 하천기본계획보고서만 PDF 형태로 제공할 뿐, 실제 지형자료는 과업을 수행한 설계사에 개별 보관되어 활용도뿐만아니라 망실의 우려가 높은 상황이다. 본 연구에서는 하천기본계획수립 시 측량되는 단면을 포함한 다양한 공간자료를 관계형으로 표준화 DB에 효율적으로 저장할 수 있게 하는 방안을 제시하고자 한다.

  • PDF

A Study on the Detection of Marine Debris in Collection Blind Spots using Drones and a Method for Matching Latitude and Longitude (드론을 활용한 수거사각지대 해양쓰레기 탐지 및 위경도 매칭 방법에 관한 연구)

  • Sang-Hyun Ha;Eun-Sung Choi;Ji Yeon Kim;Sung-Hoon Oh;Seok Chan Jeong
    • The Journal of Bigdata
    • /
    • v.8 no.1
    • /
    • pp.73-82
    • /
    • 2023
  • Marine debris not only affects the survival of marine life, water pollution, and scenery but also has secondary effects on economic loss and human health. While research on underwater and surface debris is actively ongoing, solutions to marine debris in hard-to-reach blind spots are being developed slowly. To address this problem, we utilize drones to detect and track marine debris in blind spots such as tetrapods. The detected debris is then visualized by calculating its location coordinates using the drone's GPS, altitude, and heading values. The proposed method of using drones for detecting marine debris and matching it with longitude and latitude coordinates provides an effective solution to the problem of marine debris in blind spots.

A Study on Tracking Method for Command and Control Framework Tools (명령 제어 프레임워크 (Command and Control Framework) 도구 추적 방안에 대한 연구)

  • Hyeok-Ju Gwon;Jin Kwak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.721-736
    • /
    • 2023
  • The Command and Control Framework was developed for penetration testing and education purposes, but threat actors such as cybercrime groups are abusing it. From a cyber threat hunting perspective, identifying Command and Control Framework servers as well as proactive responding such as blocking the server can contribute to risk management. Therefore, this paper proposes a methodology for tracking the Command and Control Framework in advance. The methodology consists of four steps: collecting a list of Command and Control Framework-related server, emulating staged delivery, extracting botnet configurations, and collecting certificates that feature is going to be extracted. Additionally, experiments are conducted by applying the proposed methodology to Cobalt Strike, a commercial Command and Control Framework. Collected beacons and certificate from the experiments are shared to establish a cyber threat response basis that could be caused from the Command and Control Framework.

Designing a smart safe transportation system within a university using object detection algorithm

  • Na Young Lee;Geon Lee;Min Seop Lee;Yun Jung Hong;In-Beom Yang;Jiyoung Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.51-59
    • /
    • 2024
  • In this paper, we propose a novel traffic safety system designed to reduce pedestrian traffic accidents and enhance safety on university campuses. The system involves real-time detection of vehicle speeds in designated areas and the interaction between vehicles and pedestrians at crosswalks. Utilizing the YOLOv5s model and Deep SORT method, the system performs speed measurement and object tracking within specified zones. Second, a condition-based output system is developed for crosswalk areas using the YOLOv5s object detection model to differentiate between pedestrians and vehicles. The functionality of the system was validated in real-time operation. Our system is cost-effective, allowing installation using ordinary smartphones or surveillance cameras. It is anticipated that the system, applicable not only on university campuses but also in similar problem areas, will serve as a solution to enhance safety for both vehicles and pedestrians.

A study on the Private Investigator usage for Cyber Crime (사이버범죄의 효과적인 대응을 위한 민간조사제도의 도입방안)

  • Shin, Hyun-Joo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.63-86
    • /
    • 2016
  • The object of this study is to propose a study on the Private Investigator usage for Cyber Crime. The latest trend of cyber crime is being evolve in sophisticated and complex way over the global, like internet fraud, cyber gambling, hacking and etc. Hence national investigative authority mobilize high specialized skills and method of criminal investigation by each nation. But it is hard to respond in rapid and effective way because of propoor, distribution of group and insufficient of related legal system. Already in other countries, not considerable amount of services are given to private investigators in detection and tracking part which is inefficient by nation. So it has significantly meaningful to compensate the defect and study about private investigator usage as companion of cooperation policing for effectively respond to cyber-crime. The way to effectively deal with the cyber-crime is reevaluate meaning of partnership policing and need of private investigator usage. Also it is to analyze the main issue about introduction of a system and suggest the effective way of introduction. First, legislation of private investigator usage which is based upon partnership policing should be made up. Moreover, to establish the range of private investigator's business and enhance the reliability, it is to propose introduction of leading professional global certificate and license system with sufficient education and test. We are expecting introduction of private investigator usage can improve efficiency of investigation and promote effective countermeasures of cyber-crime.

  • PDF