• Title/Summary/Keyword: 탐지방안

Search Result 800, Processing Time 0.024 seconds

Convergence of Remote Sensing and Digital Geospatial Information for Monitoring Unmeasured Reservoirs (미계측 저수지 수체 모니터링을 위한 원격탐사 및 디지털 공간정보 융합)

  • Hee-Jin Lee;Chanyang Sur;Jeongho Cho;Won-Ho Nam
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_4
    • /
    • pp.1135-1144
    • /
    • 2023
  • Many agricultural reservoirs in South Korea, constructed before 1970, have become aging facilities. The majority of small-scale reservoirs lack measurement systems to ascertain basic specifications and water levels, classifying them as unmeasured reservoirs. Furthermore, continuous sedimentation within the reservoirs and industrial development-induced water quality deterioration lead to reduced water supply capacity and changes in reservoir morphology. This study utilized Light Detection And Ranging (LiDAR) sensors, which provide elevation information and allow for the characterization of surface features, to construct high-resolution Digital Surface Model (DSM) and Digital Elevation Model (DEM) data of reservoir facilities. Additionally, bathymetric measurements based on multibeam echosounders were conducted to propose an updated approach for determining reservoir capacity. Drone-based LiDAR was employed to generate DSM and DEM data with a spatial resolution of 50 cm, enabling the display of elevations of hydraulic structures, such as embankments, spillways, and intake channels. Furthermore, using drone-based hyperspectral imagery, Normalized Difference Vegetation Index (NDVI) and Normalized Difference Water Index (NDWI) were calculated to detect water bodies and verify differences from existing reservoir boundaries. The constructed high-resolution DEM data were integrated with bathymetric measurements to create underwater contour maps, which were used to generate a Triangulated Irregular Network (TIN). The TIN was utilized to calculate the inundation area and volume of the reservoir, yielding results highly consistent with basic specifications. Considering areas that were not surveyed due to underwater vegetation, it is anticipated that this data will be valuable for future updates of reservoir capacity information.

A Study on Optimal Operation for Flare systems (플레어 시스템의 최적 운영방안에 대한 연구)

  • Song, Bang-Un;Bok, Hyeong-Jun;Woo, In-Sung
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.6
    • /
    • pp.1-7
    • /
    • 2019
  • Most oil refineries and chemical plants have flare systems designed to mitigate pressure rises in process facilities in case of emergencies that require the release of large amounts of gas due to sudden process shutdowns such as power outages. However, the rise of the flame of the flare system causes civil complaints from residents around the factory due to visible pollution, and economic loss occurs in the company, which requires constant management. In this study, two items were diagnosed and analyzed in order to derive the optimal operation method of flare system. First, to detect the cause of the rise in flame height, the acoustic leak detector was used to check gas leaks in safety valves and pressure control valves. Second, to identify the cause of flame instability, the pulsation phenomenon was diagnosed through the CFD simulation and modeling experiments of the sealing drum. By confirming the leak at 4.3% of the safety valve and 10% of the pressure control valve, the cause of abnormal sparking was derived. The information presented in this study can be easily applied to any company that has a flare system, and is expected to prevent complaints and product loss.

Status of Development of Pyroprocessing Safeguards at KAERI (한국원자력연구원 파이로 안전조치 기술개발 현황)

  • Park, Se-Hwan;Ahn, Seong-Kyu;Chang, Hong Lae;Han, Bo Young;Kim, Bong Young;Kim, Dongseon;Kim, Ho-Dong;Lee, Chaehun;Oh, Jong-Myeong;Seo, Hee;Shin, Hee-Sung;Won, Byung-Hee;Ku, Jeong-Hoe
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.15 no.3
    • /
    • pp.191-197
    • /
    • 2017
  • The Korea Atomic Energy Research Institute (KAERI) has developed a safeguards technology for pyroprocessing based on the Safeguards-By-Design (SBD) concept. KAERI took part in a Member-State Support Program (MSSP) to establish a pyroprocessing safeguards approach. A Reference Engineering-scale Pyroprocessing Facility (REPF) concept was designed on which KAERI developed its safeguards system. Recently the REPF is being upgraded to the REPF+, a scaled-up facility. For assessment of the nuclear-material accountancy (NMA) system, KAERI has developed a simulation program named Pyroprocessing Material Flow and MUF Uncertainty Simulation (PYMUS). The PYMUS is currently being upgraded to include a Near-Real-Time Accountancy (NRTA) statistical analysis function. The Advanced Spent Fuel Conditioning Process Safeguards Neutron Counter (ASNC) has been updated as Non-Destructive Assay (NDA) equipment for input-material accountancy, and a Hybrid Induced-fission-based Pu-Accounting Instrument (HIPAI) has been developed for the NMA of uranium/transuranic (U/TRU) ingots. Currently, performance testing of Compton-suppressed Gamma-ray measurement, Laser-Induced Breakdown Spectroscopy (LIBS), and homogenization sampling are underway. These efforts will provide an essential basis for the realization of an advanced nuclear-fuel cycle in the ROK.

GIS based Effective Methodology for GAS Accident Management (GIS를 이용한 효율적인 가스사고관리 방법에 관한 연구)

  • 김태일;김계현;전방진;곽태식
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2004.03a
    • /
    • pp.399-406
    • /
    • 2004
  • 최근 급속한 도시의 팽창과 산업의 발전으로 인하여 가스시설은 급속히 확대되고 있는 실정이다. 이러한 가스시설물의 중요성을 인식하고 많은 도시가스업체에서는 가스관망 시설정보를 전산화하여 항상 최신의 현황을 유지할 수 있는 가스시설물관리시스템을 개발하여 사용하고 있다. 그러나 이러한 시스템은 가스시설물의 현황파악 및 유지관리를 위한 기본적인 기능만을 제공하는 관계로, 가스 누출사고 발생시 정확한 사태의 파악과 함께 신속한 대책 마련을 위한 의사결정 지원이 어려운 실정이다. 따라서 체계적인 가스사고관리를 수행할 수 있는 응용시스템의 필요성이 증대되고 있다. 이러한 시점에서 본 연구에서는 가스사고분석을 신속하고 체계적으로 수행할 수 있는 가스사고관리 적용알고리즘 분석 및 최적의 알고리즘을 정립하여 가스사고관리시스템을 구현하였다. 본 연구를 통한 결과는 1ㆍ2차 차단밸브의 산정이 가능해짐으로써 빈번한 가스 누출사고 발생시 실시간으로 적정대처방안의 제시가 가능하게 되었다. 또한, 누출 최대가스량을 제시함으로써 누출에 대한 피해예상 분석을 위한 정보 제공 및 가스의 신속한 재공급을 위해 필요한 의사결정 지원 정보의 제공이 가능하게 되었다. 아울러, 가스누출사고에 의한 가스공급중단 관로 및 수용가에 대한 속성현황의 파악은 물론 시각적인 도식을 통한 전체적 현황파악이 가능하였다. 이러한 가스사고관리시스템의 개발을 통하여 사고 발생시 신속한 사고방안 제시 및 사고피해의 최소화를 위해 필요한 의사결정 지원 정보의 제공이 가능하게 됨으로써 국민의 안전 및 복지와 도시가스업체의 업무 효율화로 인한 예산절감 효과를 기대할 수 있다. 가시권 분석기능을 이용하여 실제 지형공간상에서 전파경로 손실치를 도시화함으로써 전파관리자가 무선서비스지역 설계, 전파음영지역 판단, 최적 중계기와 기지국 위치 선정에 기여할 것으로 판단된다.하지 않은 지역과 서로 다른 분광특성을 나타내므로 별도의 Segment를 형성하게 된다. 따라서 임상도의 경계선으로부터 획득된 Super-Object의 분광반사 값과 그 안에서 형성된 Sub-Object의 분광반사값의 차이를 이용하여 임상도의 갱신을 위한 변화지역을 탐지하였다.라서 획득한 시추코아에 대해서도 각 연구기관이 전 구간에 대해 동일하게 25%의 소유권을 가지고 있다. ?스굴 시추사업은 2008년까지 수행될 계획이며, 시추작업은 2005년까지 완료될 계획이다. 연구 진행과 관련하여, 공동연구의 명분을 높이고 분석의 효율성을 높이기 위해서 시료채취 및 기초자료 획득은 4개국의 연구원이 모여 공동으로 수행한 후의 결과물을 서로 공유하고, 자세한 전문분야 연구는 각 국의 대표기관이 독립적으로 수행하는 방식을 택하였다 ?스굴에 대한 제1차 시추작업은 2004년 3월 말에 실시하였다. 시추작업 결과, 약 80m의 시추 코아가 성공적으로 회수되어 현재 러시아 이르쿠츠크 지구화학연구소에 보관중이다. 이 시추코아는 2004년 8월 중순경에 4개국 연구팀원들에 의해 공동으로 기재된 후에 분할될 계획이다. 분할된 시료는 국내로 운반되어 다양한 전문분야별 연구에 이용될 것이다. 한편, 제2차 시추작업은 2004년 12월에서 2005년 2월 사이에 실시될 계획이다. 수백만년에 이르는 장기간에 걸쳐 지구환경변화 기록이 보존되어 있는 ?스굴호에 대한

  • PDF

A Study on Protecting for forgery modification of User-input on Webpage (웹 페이지에서 사용자 입력 값 변조 방지에 관한 연구)

  • Yu, Chang-Hun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.635-643
    • /
    • 2014
  • Most of the web-based services are provided by a web browser. A web browser receives a text-based web page from the server and translates the received data for the user to view. There are a myriad of add-ons to web browsers that extend browser features. The browser's add-ons may access web pages and make changes to the data. This makes web-services via web browsers are vulnerable to security threats. A web browser stores web page data in memory in the DOM structure. One method that prevents modifications to web page data applies hash values to certain parts in the DOM structure. However, a certain characteristic of web-pages renders this method ineffective at times. Specifically, the user-input data is not pre-determined, and the hash value cannot be calculated prior to user input. Thus the modification to the data cannot be prevented. This paper proposes a method that both detects and inhibits any attempt to change to user-input data. The proposed method stores user-input from the keyboard and makes a comparison with the data transmitted from the web browser to detect any anomalies.

A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow (Netflow를 활용한 대규모 서비스망 불법 접속 추적 모델 연구)

  • Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.11-18
    • /
    • 2021
  • To protect tangible and intangible assets, most of the companies are conducting information protection monitoring by using various security equipment in the IT service network. As the security equipment that needs to be protected increases in the process of upgrading and expanding the service network, it is difficult to monitor the possible exposure to the attack for the entire service network. As a countermeasure to this, various studies have been conducted to detect external attacks and illegal communication of equipment, but studies on effective monitoring of the open service ports and construction of illegal communication monitoring system for large-scale service networks are insufficient. In this study, we propose a framework that can monitor information leakage and illegal communication attempts in a wide range of service networks without large-scale investment by analyzing 'Netflow statistical information' of backbone network equipment, which is the gateway to the entire data flow of the IT service network. By using machine learning algorithms to the Netfllow data, we could obtain the high classification accuracy of 94% in identifying whether the Telnet service port of operating equipment is open or not, and we could track the illegal communication of the damaged equipment by using the illegal communication history of the damaged equipment.

A methodology for Identification of an Air Cavity Underground Using its Natural Poles (물체의 고유 Pole을 이용한 지하 속의 빈 공간 식별 방안)

  • Lee, Woojin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.566-572
    • /
    • 2021
  • A methodology for the identification and coordinates estimation of air cavities under urban ground or sandy soil using its natural poles and natural resonant frequencies is presented. The potential of this methodology was analyzed. Simulation models of PEC (Perfect Electric Conductor)s with various shapes and dimensions were developed using an EM (Electromagnetic) simulator. The Cauchy method was applied to the obtained EM scattering response of various objects from EM simulation models. The natural poles of objects corresponding to its instinct characterization were then extracted. Thus, a library of poles can be generated using their natural poles. The generated library of poles provided the possibility of identifying a target by comparing them with the computed natural poles from a target. The simulation models were made assuming that there is an air cavity under urban ground or sandy soil. The response of the desired target was extracted from the electromagnetic wave scattering data from its simulation model. The coordinates of the target were estimated using the time delay of the impulse response (peak of the impulse response) in the time domain. The MP (Matrix Pencil) method was applied to extract the natural poles of a target. Finally, a 0.2-m-diameter spherical air cavity underground could be estimated by comparing both the pole library of the objects and the calculated natural poles and the natural resonant frequency of the target. The computed location (depth) of a target showed an accuracy of approximately 84 to 93%.

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

A Study on Test Set to prevent illegal films searches (불법촬영물 검색 방지를 위한 시험 세트 방안 연구)

  • Yong-Nyuo Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.27-33
    • /
    • 2023
  • Countries around the world are calling for stronger law enforcement to combat the production and distribution of child sexual exploitation images, such as child grooming. Given the scale and importance of this social problem, it requires extensive cooperation between law enforcement, government, industry, and government organizations. In the wake of the Nth Room Case, there have been some amendments to the Enforcement Decree of the Telecommunications Business Act regarding additional telecommunications services provided by precautionary operators in Korea. While Naver and others in Korea use Electronics and Telecommunications Research Institute's own technology to filter illegal images, Microsoft uses its own PhotoDNA technology. Microsoft's PhotoDNA is so good at comparing and identifying illegal images that major global operators such as Twitter are using it to detect and filter images. In order to meet the Korean government's testing standards, Microsoft has conducted more than 16 performance tests on "PhotoDNA for Video 2.0A," which is being applied to the Bing service, in cooperation with the Korea Communications Commission and Telecommunications Technology Association. In this paper, we analyze the cases that did not pass the standards and derive improvement measures related to adding logos. In addition, we propose to use three video datasets for the performance test of filtering against illegal videos.

How to build an AI Safety Management Chatbot Service based on IoT Construction Health Monitoring (IoT 건축시공 건전성 모니터링 기반 AI 안전관리 챗봇서비스 구축방안)

  • Hwi Jin Kang;Sung Jo Choi;Sang Jun Han;Jae Hyun Kim;Seung Ho Lee
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.106-116
    • /
    • 2024
  • Purpose: This paper conducts IoT and CCTV-based safety monitoring to analyze accidents and potential risks occurring at construction sites, and detect and analyze risks such as falls and collisions or abnormalities and to establish a system for early warning using devices like a walkie-talkie and chatbot service. Method: A safety management service model is presented through smart construction technology case studies at the construction site and review a relevant literature analysis. Result: According to 'Construction Accident Statistics,' in 2021, there were 26,888 casualties in the construction industry, accounting for 26.3% of all reported accidents. Fatalities in construction-related accidents amounted to 417 individuals, representing 50.5% of all industrial accident-related deaths. This study suggests implementing AI chatbot services for construction site safety management utilizing IoT-based health monitoring technologies in smart construction practices. Construction sites where stakeholders such as workers participate were demonstrated by implementing an artificial intelligence chatbot system by selecting major risk areas within the workplace, such as scaffolding processes, openings, and access to hazardous machinery. Conclusion: The possibility of commercialization was confirmed by receiving more than 90 points in the satisfaction survey of participating workers regarding the empirical results of the artificial intelligence chatbot service at construction sites.