• Title/Summary/Keyword: Cloud

Search Result 5,568, Processing Time 0.032 seconds

Utilization of Drone LiDAR for Field Investigation of Facility Collapse Accident (붕괴사고 현장조사를 위한 드론 LiDAR 활용)

  • Yonghan Jung ;Eontaek Lim ;Jaewook Suk;Seul Koo;Seongsam Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_2
    • /
    • pp.849-858
    • /
    • 2023
  • Investigating disaster sites such as earthquakes and landslides involves significant risks due to potential secondary disasters like facility collapse. In situations where direct access is challenging, there is a need to develop methods for safely acquiring high-precision 3D disaster information using light detection and ranging (LiDAR) equipped drone survey systems. In this study, the feasibility of using drone LiDAR in disaster scenarios was examined, focusing on the collapse accident at Jeongja Bridge in Bundang-gu, Seongnam City, in April 2023. High-density point clouds for the accident bridge were collected, and the bridge's 3D terrain information was reconstructed and compared to the measurement performance of 10 ground control points. The results showed horizontal and vertical root mean square error values of 0.032 m and 0.055 m, respectively. Additionally, when compared to a point cloud generated using ground LiDAR for the same target area, a vertical difference of approximately 0.08 m was observed, but overall shapes showed minimal discrepancies. Moreover, in terms of overall data acquisition and processing time, drone LiDAR was found to be more efficient than ground LiDAR. Therefore, the use of drone LiDAR in disaster sites with significant risks allows for safe and rapid onsite investigations.

Characteristics and Manufacturing Technology of the Angbuilgu Treasure with Plate Pillars Decorated with a Dragon in Clouds (운룡주(雲龍柱) 보물 앙부일구의 특성과 제작 기술)

  • YUN Yonghyun;MIHN Byeonghee;KIM Sanghyuk
    • Korean Journal of Heritage: History & Science
    • /
    • v.56 no.4
    • /
    • pp.24-37
    • /
    • 2023
  • This study analyzes the materials and external characteristics of the Angbu-ilgu, a kind of scaphe sundial, which was newly designated as a Korean Treasure in 2022. The Angbu-ilgu Treasure is owned by three institutions - the National Palace Museum Of Korea, Gyeongju National Museum, and Sungshin Women's University Museum - and is similar as a twin in its material, size, outward appearance, as well as production techniques that include casting, silver inlays, and metal joints. The Three-Treasure Angbu-ilgu is made of brass in the ratio of 90.6: 6.0: 1.8 with Cu: Zn: Pb. This composition clearly differs from Treasure No. 845, an Angbuilgu which has a composition ratio of 82.2: 3.7: 11.8 with Cu: Zn: Pb. In this new Angbu-ilgu Treasure, the hemisphere's stand has four vertical pillars sculpted in a dragon pattern and bilateral wings carved in a cloud pattern on the pillars, which are joined to the hemisphere's horizontal ring with rivets and silver solders, respectively. The dragon-in-clouds pillar (雲龍柱) shows the most outstanding formative beauty of the various Angbu-ilgu pillars produced in the late Joseon Dynasty. It can be seen that the altitude of the north pole engraved on the Angbu-ilgu was made after 1713. Production is, however, actually estimated to have occurred close to the 19th century, the era of the Jinju Kang family, who were professional Angbuilgu makers. Hopefully, this study will lead to a historical science and technology review with modern scientific instruments analyzing the materials and external characteristics of the three Angbu-ilgus designated as a Korean Treasure in 2022.

Protecting Multi Ranked Searchable Encryption in Cloud Computing from Honest-but-Curious Trapdoor Generating Center (트랩도어 센터로부터 보호받는 순위 검색 가능한 암호화 다중 지원 클라우드 컴퓨팅 보안 모델)

  • YeEun Kim;Heekuck Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1077-1086
    • /
    • 2023
  • The searchable encryption model allows to selectively search for encrypted data stored on a remote server. In a real-world scenarios, the model must be able to support multiple search keywords, multiple data owners/users. In this paper, these models are referred to as Multi Ranked Searchable Encryption model. However, at the time this paper was written, the proposed models use fully-trusted trapdoor centers, some of which assume that the connection between the user and the trapdoor center is secure, which is unlikely that such assumptions will be kept in real life. In order to improve the practicality and security of these searchable encryption models, this paper proposes a new Multi Ranked Searchable Encryption model which uses random keywords to protect search words requested by the data downloader from an honest-but-curious trapdoor center with an external attacker without the assumptions. The attacker cannot distinguish whether two different search requests contain the same search keywords. In addition, experiments demonstrate that the proposed model achieves reasonable performance, even considering the overhead caused by adding this protection process.

Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model (카메라-라이다 융합 모델의 오류 유발을 위한 스케일링 공격 방법)

  • Yi-ji Im;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1099-1110
    • /
    • 2023
  • The recognition system of autonomous driving and robot navigation performs vision work such as object recognition, tracking, and lane detection after multi-sensor fusion to improve performance. Currently, research on a deep learning model based on the fusion of a camera and a lidar sensor is being actively conducted. However, deep learning models are vulnerable to adversarial attacks through modulation of input data. Attacks on the existing multi-sensor-based autonomous driving recognition system are focused on inducing obstacle detection by lowering the confidence score of the object recognition model.However, there is a limitation that an attack is possible only in the target model. In the case of attacks on the sensor fusion stage, errors in vision work after fusion can be cascaded, and this risk needs to be considered. In addition, an attack on LIDAR's point cloud data, which is difficult to judge visually, makes it difficult to determine whether it is an attack. In this study, image scaling-based camera-lidar We propose an attack method that reduces the accuracy of LCCNet, a fusion model (camera-LiDAR calibration model). The proposed method is to perform a scaling attack on the point of the input lidar. As a result of conducting an attack performance experiment by size with a scaling algorithm, an average of more than 77% of fusion errors were caused.

Intelligent Motion Pattern Recognition Algorithm for Abnormal Behavior Detections in Unmanned Stores (무인 점포 사용자 이상행동을 탐지하기 위한 지능형 모션 패턴 인식 알고리즘)

  • Young-june Choi;Ji-young Na;Jun-ho Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.73-80
    • /
    • 2023
  • The recent steep increase in the minimum hourly wage has increased the burden of labor costs, and the share of unmanned stores is increasing in the aftermath of COVID-19. As a result, theft crimes targeting unmanned stores are also increasing, and the "Just Walk Out" system is introduced to prevent such thefts, and LiDAR sensors, weight sensors, etc. are used or manually checked through continuous CCTV monitoring. However, the more expensive sensors are used, the higher the initial cost of operating the store and the higher the cost in many ways, and CCTV verification is difficult for managers to monitor around the clock and is limited in use. In this paper, we would like to propose an AI image processing fusion algorithm that can solve these sensors or human-dependent parts and detect customers who perform abnormal behaviors such as theft at low costs that can be used in unmanned stores and provide cloud-based notifications. In addition, this paper verifies the accuracy of each algorithm based on behavior pattern data collected from unmanned stores through motion capture using mediapipe, object detection using YOLO, and fusion algorithm and proves the performance of the convergence algorithm through various scenario designs.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

How Market Reacts on the Metaverse Initiatives? An Event Study (메타버스 투자 추진이 기업 가치에 미치는 영향 분석: 이벤트 연구 방법론)

  • Mina Baek;Jeongha Kim;Dongwon Lee
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.183-204
    • /
    • 2023
  • Due to the COVID-19 pandemic, lots of occasions need to be held in online environment. This is the reason why "Metaverse" gets lots of attention in 2021. A number of companies made announcements on Metaverse, and this situation also boomed stock market. This paper investigates the relationship between Metaverse initiatives and business value of the firm (i.e., stock prices). We examine this relationship by using event study method with Lexis-Nexis News data from 2019 to 2021. The results indicate that Metaverse initiatives significantly impact positive influence on firm's value. In the technological perspective, technical factors affect more positive market returns, including Metaverse enablers (e.g., NFT, VR devices, digital twin) and common infrastructure (e.g., semiconductor, AI, cloud), and especially virtual environment was emphasized. Additionally, in the strategical perspective, radical innovation (e.g., pivoting, acquisition) impact more positive market return rather than incremental innovation (e.g., partnership, investment). Also, firms from non-service industries can achieve benefits from Metaverse initiatives rather than service industry in some degree.

Implementation of IoT-Based Irrigation Valve for Rice Cultivation (벼 재배용 사물인터넷 기반 물꼬 구현)

  • Byeonghan Lee;Deok-Gyeong Seong;Young Min Jin;Yeon-Hyeon Hwang;Young-Gwang Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.93-98
    • /
    • 2023
  • In paddy rice farming, water management is a critical task. To suppress weed emergence during the early stages of growth, fields are deeply flooded, and after transplantation, the water level is reduced to promote rooting and stimulate stem generation. Later, water is drained to prevent the production of sterile tillers. The adequacy of water supply is influenced by various factors such as field location, irrigation channels, soil conditions, and weather, requiring farmers to frequently check water levels and control the ingress and egress of water. This effort increases if the fields are scattered in remote locations. Automated irrigation systems have been considered to reduce labor and improve productivity. However, the net income from rice production in 2022 was about KRW 320,000/10a on average, making it financially unfeasible to implement high-cost devices or construct new infrastructure. This study focused on developing an IoT-Based irrigation valve that can be easily integrated into existing agricultural infrastructure without additional construction. The research was carried out in three main areas: Firstly, an irrigation valve was designed for quick and easy installation on existing agricultural pipes. Secondly, a power circuit was developed to connect a low-power Cat M1 communication modem with an Arduino Nano board for remote operation. Thirdly, a cloud-based platform was used to set up a server and database environment and create a web interface that users can easily access.

Study on Applicability of Cloth Simulation Filtering Algorithm for Segmentation of Ground Points from Drone LiDAR Point Clouds in Mountainous Areas (산악지형 드론 라이다 데이터 점군 분리를 위한 CSF 알고리즘 적용에 관한 연구)

  • Seul Koo ;Eon Taek Lim ;Yong Han Jung ;Jae Wook Suk ;Seong Sam Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_2
    • /
    • pp.827-835
    • /
    • 2023
  • Drone light detection and ranging (LiDAR) is a state-of-the-art surveying technology that enables close investigation of the top of the mountain slope or the inaccessible slope, and is being used for field surveys in mountainous terrain. To build topographic information using Drone LiDAR, a preprocessing process is required to effectively separate ground and non-ground points from the acquired point cloud. Therefore, in this study, the point group data of the mountain topography was acquired using an aerial LiDAR mounted on a commercial drone, and the application and accuracy of the cloth simulation filtering algorithm, one of the ground separation techniques, was verified. As a result of applying the algorithm, the separation accuracy of the ground and the non-ground was 84.3%, and the kappa coefficient was 0.71, and drone LiDAR data could be effectively used for landslide field surveys in mountainous terrain.

A Study on the Revitalization of Digital Contents Industry (디지털콘텐츠 산업육성 사업 구조개편 방안 연구)

  • Jin-Hyeon Chang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.159-167
    • /
    • 2023
  • Due to the convergence of digital technology and the rapidly changing characteristics of the digital industry, the development projects in each technology field that have been carried out so far have blurred the boundaries of the business, dispersed business effects, and reached the limit in fostering a flexible industry that accommodates technological development. It appears that Therefore, the goal is to support the policy of the digital content development project by suggesting a plan to reorganize the structure and improve the management system of the digital content industry development project to effectively respond to the changing direction of the future digital content industry. Through structural analysis and diagnosis of government supported projects, it was proposed to reorganize the existing 19 key projects and 49 detailed projects into 7 key projects projects and 17 detailed projects. As a plan to improve the project management system, there are too many project implementation agencies and the absence of a general agency for detailed project support management, which limits the promotion of large-scale projects for organic linkage between projects and market creation. To improve this, a general agency that oversees the project management function was selected, and it was suggested that there was a need to unify project management into a general organization to manage the project efficiently.