• Title/Summary/Keyword: 현상파악 데이터

Search Result 275, Processing Time 0.03 seconds

Uncertainty Analysis of various soil moisture measurement in mountains. (산지 토양수분량의 불확실성 분석)

  • Kim, Kiyoung;Lee, Yeongil;Jung, Sungwon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.316-316
    • /
    • 2019
  • 최근 빈번한 자연재해로 인해 기상 및 지구물리학적 요소들을 관측하는 연구들이 활발히 진행되고 있으며, 그중 지표와 기상을 연결해주는 토양수분 관측은 지구에서 일어나는 현상에 대한 이해도를 높이기 위한 중요한 요소로써 인식되고 있다. 이러한 토양수분 자료는 지난 몇 년 동안 다양한 측정 방법과 알고리즘 개발이 이루어져왔으나 이러한 방식으로 산출된 데이터를 무분별하게 이용하기에 앞서 최적의 사용을 위해 오류 구조를 파악하고 정량적으로 측정하는 분석이 필요하다. 따라서 Triple collocation(TC) 기법을 활용하여 가상의 실제값(hypothetical truth)을 가정하고 각각의 산출데이터의 측정 불확도와 상관성을 추정할 수 있다. 본 연구에서는 인공위성, 모델자료와 같은 측정 방법뿐만 아니라 지점에 설치하여 물리적인 방법을 통한 토양수분 산출방식에도 관측상의 오차가 존재함을 인지하고, 이러한 오차가 존재하는 다양한 데이터들을 분석하였다. 이용된 데이터는 설마천 산지 사면에 설치된 유전율식(TDR, Time Domain Reflectometer) 측정장비, Cosmic-Ray newtron Probe, Noah 지표모델을 활용한 자료 동화 자료인 Global Land Data Assimilation System (GLDAS)를 입력 자료로 하여 TC 기법에 적용하였다. 분석 결과는 유역의 토양수분 관측에 대한 다양한 방법의 불확실성을 규명하는데 가장 중요한 연구로써 활용될 것으로 기대 된다.

  • PDF

Analysis of Atmospheric Conditions Using Long-Range Surveillance Radar (장거리 탐지 레이다를 이용한 대기상태 분석)

  • Kang, Maneg Chang;Kwon, Sewoong;Lee, Jong-hyun;Lee, Kiwon;Sun, Woong;Byun, Gangil;Choo, Hosung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.2
    • /
    • pp.120-128
    • /
    • 2017
  • The refraction phenomenon of radio waves should be considered to improve the detection accuracy of target altitudes for long-range surveillance radars, however, it is difficult to estimate accurate refractivity of atmosphere for every location. In this paper, we propose the atmosphere evaluation metric(AEM) to estimate atmospheric conditions at target locations using target altitudes obtained from primary surveillance radar(PSR) and secondary surveillance radar(SSR). To verify the suitability of the proposed metric, we observed atmospheric conditions and calculated estimation errors of target altitudes using measured data.

Analyzing Technological Convergence for IoT Business Using Patent Co-classification Analysis and Text-mining (특허 동시분류분석과 텍스트마이닝을 활용한 사물인터넷 기술융합 분석)

  • Moon, Jinhee;Gwon, Uijun;Geum, Youngjung
    • Journal of Technology Innovation
    • /
    • v.25 no.3
    • /
    • pp.1-24
    • /
    • 2017
  • With the rise of internet of things (IoT), there have been several studies to analyze the technological trend and technological convergence. However, previous work have been relied on the qualitative work that investigate the IoT trend and implication for future business. In response, this study considers the patent information as the proxy measure of technology, and conducts a quantitative and analytic approach for analyzing technological convergence using patent co-classification analysis and text mining. First, this study investigate the characteristics of IoT business, and characterize IoT business into four dimensions: device, network, platform, and services. After this process, total 923 patent classes are classified into four types of IoT technology group. Since most of patent classes are classified into device technology, we developed a co-classification network for both device technology and all technologies. Patent keywords are also extracted and these keywords are also classified into four types: device, network, platform, and services. As a result, technologies for several IoT devices such as sensors, healthcare, and energy management are derived as a main convergence group for the device network. For the total IoT network, base network technology plays a key role to characterize technological convergence in the IoT network, mediating the technological convergence in each application area such as smart healthcare, smart home, and smart grid. This work is expected to effectively be utilized in the technology planning of IoT businesses.

Monitoring Network Security Situation Based on Flow Visualization (플로우 시각화 기반의 네트워크 보안 상황 감시)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper we propose a new method of security visualization, VisFlow, using traffic flows to solve the problems of existing traffic flows based visualization techniques that were a loss of end-to-end semantics of communication, reflection problem by symmetrical address coordinates space, and intuitive loss problem in mass of traffic. VisFlow, a simple and effective security visualization interface, can do a real-time analysis and monitoring the situation in the managed network with visualizing a variety of network behavior not seen in the individual traffic data that can be shaped into patterns. This is a way to increase the intuitiveness and usability by identifying the role of nodes and by visualizing the highlighted or simplified information based on their importance in 2D/3D space. In addition, it monitor the network security situation as a way to increase the informational effectively using the asymmetrical connecting line based on IP addresses between pairs of nodes. Administrator can do a real-time analysis and monitoring the situation in the managed network using VisFlow, it makes to effectively investigate the massive traffic data and is easy to intuitively understand the entire network situation.

Policy Achievements and Tasks for Using Big-Data in Regional Tourism -The Case of Jeju Special Self-Governing Province- (지역관광 빅데이터 정책성과와 과제 -제주특별자치도를 사례로-)

  • Koh, Sun-Young;JEONG, GEUNOH
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.579-586
    • /
    • 2021
  • This study examines the application of big data and tasks of tourism based on the case of Jeju Special Self-Governing Province, which used big data for regional tourism policy. Through the use of big data, it is possible to understand rapidly changing tourism trends and trends in the tourism industry in a timely and detailed manner. and also could be used to elaborate existing tourism statistics. In addition, beyond the level of big data analysis to understand tourism phenomena, its scope has expanded to provide a platform for providing real-time customized services. This was made possible by the cooperative governance of industry, government, and academia for data building, analysis, infrastructure, and utilization. As a task, the limitation of budget dependence and institutional problems such as the infrastructure for building personal-level data for personalized services, which are the ultimate goal of smart tourism, and the Personal Information Protection Act remain. In addition, expertise and technical limitations for data analysis and data linkage remain.

Calibration and Validation of SWAT for the Neponset River Watershed in Boston (보스턴 넷폰셋강의 수질체계에 대한 스왓모델의 교정과 유효성 검증)

  • Lee, Ja-Won
    • Journal of the Korean association of regional geographers
    • /
    • v.14 no.1
    • /
    • pp.19-26
    • /
    • 2008
  • A validation study has been performed using the Soil and Water Assessment Tool(SWAT) model with data collected for the Neponset River watershed, which includes roughly 130 square miles of land located southwest of Boston. All of this land drains into the Neponset River, and ultimately into Boston Harbor. This paper presents the methodology of a SWAT model. The calculated contribution of the baseflow to the streamflow is far too high whereas the interflow is strongly underestimated. Alternatively, the modified and calibrated model yields far better results for the catchment. The modification allows hydrological processes to be modeled while not restraining the applicability of the model to catchments with other characteristics. For this study, the SWAT 2005 model is used with ArcGIS 9.1 as an interlace, and sensitivity analysis is performed to provide rough estimated values before adjusting sensitive input parameters during calibration period.

  • PDF

Seamless Recording Algorithm Using MPEG System and Service Information in Mobile Broadcasting (MPEG 시스템 및 서비스 정보를 이용한 끊김 없는 모바일 방송 녹화 방법)

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Kim, Kang-Wook;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.10
    • /
    • pp.1185-1195
    • /
    • 2012
  • In the general recording method of mobile broadcasting, all incoming broadcasting streams after recording time will be saved regardless of its content. In this case, as such that viewers do not want to record, commercial advertisement, are saved together. In order to solve these problems, the proposed method checks if the contents such as advertisements are exist in the target stream by analysing the splicing in incoming MPEG-2 TS streams and, if splicing happened, excludes incoming stream after the splicing in the recording process. In the proposed method, first the splice in the recording stream is verified using the related flags of adaptation field in the TS packet and, if judged to cause a splice, the time of splicing is to be estimated by evaluating the value of splice_countdown filed. In this way, the proposed algorithm provides the seamless recording method by estimating the time of splice and excluding the contents after the splicing. To evaluate the proposed seamless recording method, the simulation was carried out by modifying the software of the existing mobile broadcasting terminal.

Visualization of network traffic attack using time series radial axis and cylindrical coordinate system (시계열 방사축과 원통좌표계를 이용한 네트워크 트래픽 공격 시각화)

  • Chang, Beom-Hwan;Choi, Younsung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.17-22
    • /
    • 2019
  • Network attack analysis and visualization methods using network traffic session data detect network anomalies by visualizing the sender's and receiver's IP addresses and the relationship between them. The traffic flow is a critical feature in detecting anomalies, but simply visualizing the source and destination IP addresses symmetrically from up-down or left-right would become a problematic factor for the analysis. Also, there is a risk of losing timely security situation when designing a visualization interface without considering the temporal characteristics of time-series traffic sessions. In this paper, we propose a visualization interface and analysis method that visualizes time-series traffic data by using the radial axis, divide IP addresses into network and host portions which then projects on the cylindrical coordinate system that could effectively monitor network attacks. The proposed method has the advantage of intuitively recognizing network attacks and identifying attack activity over time.

A Case Study on the Big Data Analysis Curriculum for the Efficient Use of Data (데이터의 효율적 활용을 위한 빅데이터 분석 교육과정 사례 연구)

  • Song, Young-A
    • Journal of Practical Engineering Education
    • /
    • v.12 no.1
    • /
    • pp.23-29
    • /
    • 2020
  • Data generated by the development of ICT, the diversification of ICT devices and services and the expansion of social media are categorized as big data characterized by the amount, variety and speed of the data. The spread of the use of big data is expected to have the effects of identifying the status quo by analyzing data in all industries, predicting the future, and creating opportunities to apply it. However, while it is imperative for these things to be done, the nation still lacks professional training institutions or curricula. In this case study, we will investigate and compare the state of education for the training of big data personnel in Korea, find out what level and level of education is being trained to nurture balanced professionals, and prepare an opportunity to think about how it can help students create value at a time when the need for education is growing in the wake of awareness of big data.

Prediction of Water Quality in Large Rivers with Tributary Input using Artificial Neural Network Model (인공신경망 모델을 이용한 지천유입이 있는 대하천의 수질예측)

  • Seo, Il Won;Yun, Se Hun;Jung, Sung Hyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.45-45
    • /
    • 2018
  • 오염물의 혼합거동을 해석하기 위해 물리기반 모델을 이용하는 경우 모델을 구축하고 운용하는데 많은 시간과 재정이 소요되며 현장검증을 통한 검증이 반드시 필요하다. 하지만 데이터 기반 모델의 경우 축적된 데이터만으로도 예측을 수행할 수 있으며 물리기반모델에 비해 결정해야할 입력인자가 적어 모델운용이 용이하다는 장점이 있다. 다양한 데이터 모델 중 인공신경망(ANN) 모델은 데이터가 가지는 불확실성 및 비정상성, 복잡한 상호관련성에 효과적으로 대응할 수 있는 모델로 수자원 및 환경 분야에서 자주 사용되고 있다. 본 연구에서는 인공신경망 모델을 이용하여 지천유입이 있는 대하천의 수질인자 (pH, 전기전도도, DO, chl-a)를 예측하였다. 다른 데이터기반 모델과 같이 인공신경망 모델 또한 수집된 데이터 질에 크게 영향을 받으며, 내부 입력인자의 선택이 모델의 예측 결과에 큰 영향을 미친다. 이러한 인공신경망 모델의 특성을 바탕으로 예측모형의 정확도를 향상하기 위해서는 크게 데이터 처리부분과 모델구축 부분에서의 접근이 필요하다. 본 연구에서는 데이터 처리 과정에서 연구대상지점의 각각의 수질인자가 가지는 분포 특성을 유지하기 위해 층화표츨추출법을 이용하여 데이터를 구성하였다. 모델의 구축 과정에서는 초기가중치 값의 영향을 줄이기 위해 앙상블기법을 사용하였으며, 좀 더 견고하고 정확한 결과를 예측하기 위해 탄력적 역전파알고리즘을 추가하였다. 추가적으로 합류 후 본류의 미 계측지역 수질 예측 정확도 향상을 위해 본류의 수질인자뿐만 아니라 지류의 수질인자를 입력자료로 사용하여 모의를 수행하였다. 또한 동일 구간에서 수행한 현장추적자실험 자료를 이용하여 수질인자의 분포특성을 비교, 검증하였다. 개발된 모델을 이용하여 낙동강과 금호강 합류부 하류의 수질인자를 예측한 결과 지류의 수질인자를 입력자료로 추가한 경우 예측의 정확도가 증가하였으며, 현장실험 자료를 통해 밝혀진 오염물의 거동현상을 인공신경망 모델로도 동일하게 재현하는 것으로 나타났다. 본 연구에서 제안한 인공신경모델을 이용한다면 물리기반 수치모델을 대체하여 지천으로 유입된 오염물의 거동을 정확하고 효율적으로 파악할 수 있을 것이다.

  • PDF