• Title/Summary/Keyword: 탐지방안

Search Result 789, Processing Time 0.023 seconds

Estimating Travel Frequency of Public Bikes in Seoul Considering Intermediate Stops (경유지를 고려한 서울시 공공자전거 통행발생량 추정 모형 개발)

  • Jonghan Park;Joonho Ko
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.3
    • /
    • pp.1-19
    • /
    • 2023
  • Bikes have recently emerged as an alternative to carbon neutrality. To understand the demand for public bikes, we endeavored to estimate travel frequency of public bike by considering the intermediate stops. Using the GPS trajectory data of 'Ttareungyi', a public bike service in Seoul, we identified a stay point and estimated travel frequency reflecting population, land use, and physical characteristics. Application of map matching and a stay point detection algorithm revealed that stay point appeared in about 12.1% of the total trips. Compared to a trip without stay point, the trip with stay point has a longer average travel distance and travel time and a higher occurrence rate during off-peak hours. According to visualization analysis, the stay points are mainly found in parks, leisure facilities, and business facilities. To consider the stay point, the unit of analysis was set as a hexagonal grid rather than the existing rental station base. Travel frequency considering the stay point were analyzed using the Zero-Inflated Negative Binomial (ZINB) model. Results of our analysis revealed that the travel frequency were higher in bike infrastructure where the safety of bike users was secured, such as 'Bikepath' and 'Bike and pedestrian path'. Also, public bikes play a role as first & last mile means of access to public transportation. The measure of travel frequency was also observed to increase in life and employment centers. Considering the results of this analysis, securing safety facilities and space for users should be given priority when planning any additional expansion of bike infrastructure. Moreover, there is a necessity to establish a plan to supply bike infrastructure facilities linked to public transportation, especially the subway.

A Study on the Density Analysis of Multi-objects Using Drone Imaging (드론 영상을 활용한 다중객체의 밀집도 분석 연구)

  • WonSeok Jang;HyunSu Kim;JinMan Park;MiSeon Han;SeongChae Baek;JeJin Park
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.69-78
    • /
    • 2024
  • Recently, the use of CCTV to prevent crowd accidents has been promoted, but research is needed to compensate for the spatial limitations of CCTV. In this study, pedestrian density was measured using drone footage, and based on a review of existing literature, a threshold of 6.7 people/m2 was selected as the cutoff risk level for crowd accidents. In addition, we conducted a preliminary study to determine drone parameters and found that the pedestrian recognition rate was high at a drone altitude of 20 meters and an angle of 60°. Based on a previous study, we selected a target area with a high concentration of pedestrians and measured pedestrian density, which was found to be 0.27~0.30 per m2. The study shows it is possible to measure risk levels by determining pedestrian densities in target areas using drone images. We believe drone surveillance will be utilized for crowd safety management in the near future.

A Study on Establishment of Drone-Based Coastal Debris Monitoring Standards Using Meta-Analysis (메타분석을 적용한 드론 기반 해안 쓰레기 모니터링 기준 마련에 관한 연구)

  • Bo-Ram KIM;Hyun-Woo CHOI;Chol-Young LEE;Tae-Hoon KIM
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.27 no.1
    • /
    • pp.99-114
    • /
    • 2024
  • Domestic coastal debris monitoring encounters challenges due to labor-intensive methods and limited survey scope. Consequently, research is utilizing remote sensing techniques to enhance efficiency in data collection. However, standards for domestic remote sensing based monitoring methods remain insufficient. In this study, we conducted a meta-analysis of 19 coastal debris monitoring studies utilizing drones and other remote sensing devices. We analyzed data collection methods, collected data information, monitoring target details, monitoring status, detection targets, and utilization models. Based on our meta-analysis results, we proposed monitoring criteria, recommended items, and performance standards for monitoring coastal debris using drones. Our findings define necessary conditions and standards for establishing operational guidelines for coastal debris monitoring using drones. Furthermore, we anticipate that incorporating foreign case analyses and field application results will enable the development of national-level guidelines for coastal debris monitoring utilizing remote sensing devices.

Study on Legal Position of Aviation Security Subject in Aviation Safety and Security (공항보안요원의 법적 지위에 관한 연구)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.2
    • /
    • pp.157-179
    • /
    • 2006
  • According to the Annex 17 to the Convention on International Civil Aviation, an appropriate authority of each contracting state has to define and allocate tasks and coordinate activities between the departments, agencies and other organizations of the State, airport and aircraft operators and other entities concerned with or responsible for the implementation of various aspects of the national civil aviation security programme. The airport has to take leading role in implementing security tasks at airport area because the airport operator is the provider of airport facilities and services to its customer and the security activities belong to its services. So Republic of Korea Government enact the Law, Aviation Safety and Security. The Purpose of this Act is to prevent any unlawful act in airport facilities with international conventions, including the ICAO to provide for standards, procedures and mandatory matters needed to ensure the safety and security of civil aviation. But the Act has some error. So is this paper to review the revision of aviation security regulation and the changes of aviation security responsibilities and task assignment. There is the term "aviation security personnel", who are charged with the task of preventing any act of disrupting the order and safety in airport. But there is no term "security screening personnel" who performs to detect or search for dangerous object, such as weapons or explosives, which may be used for the unlawful obstruction.

  • PDF

Multi-Dimensional Analysis Method of Product Reviews for Market Insight (마켓 인사이트를 위한 상품 리뷰의 다차원 분석 방안)

  • Park, Jeong Hyun;Lee, Seo Ho;Lim, Gyu Jin;Yeo, Un Yeong;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.57-78
    • /
    • 2020
  • With the development of the Internet, consumers have had an opportunity to check product information easily through E-Commerce. Product reviews used in the process of purchasing goods are based on user experience, allowing consumers to engage as producers of information as well as refer to information. This can be a way to increase the efficiency of purchasing decisions from the perspective of consumers, and from the seller's point of view, it can help develop products and strengthen their competitiveness. However, it takes a lot of time and effort to understand the overall assessment and assessment dimensions of the products that I think are important in reading the vast amount of product reviews offered by E-Commerce for the products consumers want to compare. This is because product reviews are unstructured information and it is difficult to read sentiment of reviews and assessment dimension immediately. For example, consumers who want to purchase a laptop would like to check the assessment of comparative products at each dimension, such as performance, weight, delivery, speed, and design. Therefore, in this paper, we would like to propose a method to automatically generate multi-dimensional product assessment scores in product reviews that we would like to compare. The methods presented in this study consist largely of two phases. One is the pre-preparation phase and the second is the individual product scoring phase. In the pre-preparation phase, a dimensioned classification model and a sentiment analysis model are created based on a review of the large category product group review. By combining word embedding and association analysis, the dimensioned classification model complements the limitation that word embedding methods for finding relevance between dimensions and words in existing studies see only the distance of words in sentences. Sentiment analysis models generate CNN models by organizing learning data tagged with positives and negatives on a phrase unit for accurate polarity detection. Through this, the individual product scoring phase applies the models pre-prepared for the phrase unit review. Multi-dimensional assessment scores can be obtained by aggregating them by assessment dimension according to the proportion of reviews organized like this, which are grouped among those that are judged to describe a specific dimension for each phrase. In the experiment of this paper, approximately 260,000 reviews of the large category product group are collected to form a dimensioned classification model and a sentiment analysis model. In addition, reviews of the laptops of S and L companies selling at E-Commerce are collected and used as experimental data, respectively. The dimensioned classification model classified individual product reviews broken down into phrases into six assessment dimensions and combined the existing word embedding method with an association analysis indicating frequency between words and dimensions. As a result of combining word embedding and association analysis, the accuracy of the model increased by 13.7%. The sentiment analysis models could be seen to closely analyze the assessment when they were taught in a phrase unit rather than in sentences. As a result, it was confirmed that the accuracy was 29.4% higher than the sentence-based model. Through this study, both sellers and consumers can expect efficient decision making in purchasing and product development, given that they can make multi-dimensional comparisons of products. In addition, text reviews, which are unstructured data, were transformed into objective values such as frequency and morpheme, and they were analysed together using word embedding and association analysis to improve the objectivity aspects of more precise multi-dimensional analysis and research. This will be an attractive analysis model in terms of not only enabling more effective service deployment during the evolving E-Commerce market and fierce competition, but also satisfying both customers.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

A Study on the Possibility of Short-term Monitoring of Coastal Topography Changes Using GOCI-II (GOCI-II를 활용한 단기 연안지형변화 모니터링 가능성 평가 연구)

  • Lee, Jingyo;Kim, Keunyong;Ryu, Joo-Hyung
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_2
    • /
    • pp.1329-1340
    • /
    • 2021
  • The intertidal zone, which is a transitional zone between the ocean and the land, requires continuous monitoring as various changes occur rapidly due to artificial activity and natural disturbance. Monitoring of coastal topography changes using remote sensing method is evaluated to be effective in overcoming the limitations of intertidal zone accessibility and observing long-term topographic changes in intertidal zone. Most of the existing coastal topographic monitoring studies using remote sensing were conducted through high spatial resolution images such as Landsat and Sentinel. This study extracted the waterline using the NDWI from the GOCI-II (Geostationary Ocean Color Satellite-II) data, identified the changes in the intertidal area in Gyeonggi Bay according to various tidal heights, and examined the utility of DEM generation and topography altitude change observation over a short period of time. GOCI-II (249 scenes), Sentinel-2A/B (39 scenes), Landsat 8 OLI (7 scenes) images were obtained around Gyeonggi Bay from October 8, 2020 to August 16, 2021. If generating intertidal area DEM, Sentinel and Landsat images required at least 3 months to 1 year of data collection, but the GOCI-II satellite was able to generate intertidal area DEM in Gyeonggi Bay using only one day of data according to tidal heights, and the topography altitude was also observed through exposure frequency. When observing coastal topography changes using the GOCI-II satellite, it would be a good idea to detect topography changes early through a short cycle and to accurately interpolate and utilize insufficient spatial resolutions using multi-remote sensing data of high resolution. Based on the above results, it is expected that it will be possible to quickly provide information necessary for the latest topographic map and coastal management of the Korean Peninsula by expanding the research area and developing technologies that can be automatically analyzed and detected.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

Analysis of promising countries for export using parametric and non-parametric methods based on ERGM: Focusing on the case of information communication and home appliance industries (ERGM 기반의 모수적 및 비모수적 방법을 활용한 수출 유망국가 분석: 정보통신 및 가전 산업 사례를 중심으로)

  • Jun, Seung-pyo;Seo, Jinny;Yoo, Jae-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.175-196
    • /
    • 2022
  • Information and communication and home appliance industries, which were one of South Korea's main industries, are gradually losing their export share as their export competitiveness is weakening. This study objectively analyzed export competitiveness and suggested export-promising countries in order to help South Korea's information communication and home appliance industries improve exports. In this study, network properties, centrality, and structural hole analysis were performed during network analysis to evaluate export competitiveness. In order to select promising export countries, we proposed a new variable that can take into account the characteristics of an already established International Trade Network (ITN), that is, the Global Value Chain (GVC), in addition to the existing economic factors. The conditional log-odds for individual links derived from the Exponential Random Graph Model (ERGM) in the analysis of the cross-border trade network were assumed as a proxy variable that can indicate the export potential. In consideration of the possibility of ERGM linkage, a parametric approach and a non-parametric approach were used to recommend export-promising countries, respectively. In the parametric method, a regression analysis model was developed to predict the export value of the information and communication and home appliance industries in South Korea by additionally considering the link-specific characteristics of the network derived from the ERGM to the existing economic factors. Also, in the non-parametric approach, an abnormality detection algorithm based on the clustering method was used, and a promising export country was proposed as a method of finding outliers that deviate from two peers. According to the research results, the structural characteristic of the export network of the industry was a network with high transferability. Also, according to the centrality analysis result, South Korea's influence on exports was weak compared to its size, and the structural hole analysis result showed that export efficiency was weak. According to the model for recommending promising exporting countries proposed by this study, in parametric analysis, Iran, Ireland, North Macedonia, Angola, and Pakistan were promising exporting countries, and in nonparametric analysis, Qatar, Luxembourg, Ireland, North Macedonia and Pakistan were analyzed as promising exporting countries. There were differences in some countries in the two models. The results of this study revealed that the export competitiveness of South Korea's information and communication and home appliance industries in GVC was not high compared to the size of exports, and thus showed that exports could be further reduced. In addition, this study is meaningful in that it proposed a method to find promising export countries by considering GVC networks with other countries as a way to increase export competitiveness. This study showed that, from a policy point of view, the international trade network of the information communication and home appliance industries has an important mutual relationship, and although transferability is high, it may not be easily expanded to a three-party relationship. In addition, it was confirmed that South Korea's export competitiveness or status was lower than the export size ranking. This paper suggested that in order to improve the low out-degree centrality, it is necessary to increase exports to Italy or Poland, which had significantly higher in-degrees. In addition, we argued that in order to improve the centrality of out-closeness, it is necessary to increase exports to countries with particularly high in-closeness. In particular, it was analyzed that Morocco, UAE, Argentina, Russia, and Canada should pay attention as export countries. This study also provided practical implications for companies expecting to expand exports. The results of this study argue that companies expecting export expansion need to pay attention to countries with a relatively high potential for export expansion compared to the existing export volume by country. In particular, for companies that export daily necessities, countries that should pay attention to the population are presented, and for companies that export high-end or durable products, countries with high GDP, or purchasing power, relatively low exports are presented. Since the process and results of this study can be easily extended and applied to other industries, it is also expected to develop services that utilize the results of this study in the public sector.