• Title/Summary/Keyword: Detection Methodology

Search Result 596, Processing Time 0.023 seconds

A study on the implementation of Korea's traditional pagoda WebXR service

  • Byong-Kwon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.69-75
    • /
    • 2024
  • This study focuses on enhancing the understanding of the form and characteristics of traditional towers, or 'pagodas,' by utilizing WebXR technology to enable users to explore 3D models and experience them in virtual reality on the web. Traditional towers in Korea pose challenges for direct on-site verification due to their size, making it difficult to examine the structure and features of each level. To address these issues, this research aims to provide users with a WebXR service that allows them to remotely explore and analyze towers without geographical or temporal constraints. The research methodology involves utilizing WebAR to offer a web-based service where users can directly view the original form of the tower's 3D model using smart devices both online and on-site. However, outdoor conditions may affect performance, and to address this, a tower-outline detection and matching technique was employed. Consequently, we propose a remote support service for traditional towers, allowing users to remotely access information and features of various towers nationwide on the web. Meanwhile, on-site visits can involve experiencing augmented reality representations of towers using smart devices.

Structural Analysis of Composite Wind Blade Using Finite Element Technique (유한요소기법을 이용한 복합재 풍력 블레이드 구조해석)

  • Unseong Kim;Kyeongryeol Park;Seongmin Kang;Yong Seok Choi;Kyungeun Jeong;Soomin Lee;Kyungjun Lee
    • Tribology and Lubricants
    • /
    • v.40 no.4
    • /
    • pp.133-138
    • /
    • 2024
  • This study evaluates the structural safety of wind turbine blades, analyzes the behavior of composite laminate structures with and without defects, and assesses surface erosion wear. The NREL 5 MW standard is applied to assign accurate composite material properties to each blade section. Modeling and analysis of the wind turbine blades reveal stable behavior under individual load conditions (gravity, motor speed, wind speed), with the web bearing most of the load. Surface erosion wear analysis in which microparticle impacts are simulated on the blade coating shows a maximum stress and maximum displacement of 14 MPa and 0.02 mm, respectively, indicating good initial durability, but suggest potential long-term performance issues due to cumulative effects. The study examines defect effects on composite laminate structures to compare the stress distribution, strain, and stiffness characteristics between normal and cracked states. Although normal conditions exhibit stable behavior, crack defects lead to fiber breakage, high-stress concentration in the vulnerable resin layer, and decreased rigidity. This demonstrates that local defects can compromise the safety of the entire structure. The study utilizes finite element analysis to simulate various load scenarios and defect conditions. Results show that even minor defects can significantly alter stress distributions and potentially lead to catastrophic failure if left unaddressed. These findings provide valuable insights for wind turbine blade safety evaluations, surface protection strategies, and composite structure health management. The methodology and results can inform the design improvements, maintenance strategies, and defect detection techniques of the wind energy industry.

A Study on Detection Methodology for Influential Areas in Social Network using Spatial Statistical Analysis Methods (공간통계분석기법을 이용한 소셜 네트워크 유력지역 탐색기법 연구)

  • Lee, Young Min;Park, Woo Jin;Yu, Ki Yun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.4
    • /
    • pp.21-30
    • /
    • 2014
  • Lately, new influentials have secured a large number of volunteers on social networks due to vitalization of various social media. There has been considerable research on these influential people in social networks but the research has limitations on location information of Location Based Social Network Service(LBSNS). Therefore, the purpose of this study is to propose a spatial detection methodology and application plan for influentials who make comments about diverse social and cultural issues in LBSNS using spatial statistical analysis methods. Twitter was used to collect analysis object data and 168,040 Twitter messages were collected in Seoul over a month-long period. In addition, 'politics,' 'economy,' and 'IT' were set as categories and hot issue keywords as given categories. Therefore, it was possible to come up with an exposure index for searching influentials in respect to hot issue keywords, and exposure index by administrative units of Seoul was calculated through a spatial joint operation. Moreover, an influential index that considers the spatial dependence of the exposure index was drawn to extract information on the influential areas at the top 5% of the influential index and analyze the spatial distribution characteristics and spatial correlation. The experimental results demonstrated that spatial correlation coefficient was relatively high at more than 0.3 in same categories, and correlation coefficient between politics category and economy category was also more than 0.3. On the other hand, correlation coefficient between politics category and IT category was very low at 0.18, and between economy category and IT category was also very weak at 0.15. This study has a significance for materialization of influentials from spatial information perspective, and can be usefully utilized in the field of gCRM in the future.

A Methodology of Ship Detection Using High-Resolution Satellite Optical Image (고해상도 광학 인공위성 영상을 활용한 선박탐지 방법)

  • Park, Jae-Jin;Oh, Sangwoo;Park, Kyung-Ae;Lee, Min-Sun;Jang, Jae-Cheol;Lee, Moonjin
    • Journal of the Korean earth science society
    • /
    • v.39 no.3
    • /
    • pp.241-249
    • /
    • 2018
  • As the international trade increases, vessel traffics around the Korean Peninsula are also increasing. Maritime accidents hence take place more frequently in the southern coast of Korea where many big and small ports are located. Accidents involving ship collision and sinking result in a substantial human and material damage as well as the marine environmental pollution. Therefore, it is necessary to locate the ships quickly when such accidents occur. In this study, we suggest a new ship detection index by comparing and analyzing the reflectivity of each channel of the Korea MultiPurpose SATellite-2 (KOMPSAT-2) images of the area around the Gwangyang Bay. A threshold value of 0.1 is set based on a histogram analysis, and all vessels are detected when compared with RGB composite images. After selecting a relatively large ship as a representative sample, the distribution of spatial reflectivity around the ship is studied. Uniform shadows are detected on the northwest side of the vessel. This indicates that the sun is in the southeast, the azimuth of the actual satellite image is $144.80^{\circ}$, and the azimuth angle of the sun can be estimated using the shadow position. The reflectivity of the shadows is 0.005 lower than the surrounding sea and ship. The shadow height varies with the position of the bow and the stern, perhaps due to the relative heights of the ship deck and the structure. The results of this study can help search technology for missing vessels using optical satellite images in the event of a marine accident around the Korean Peninsula.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Implementation of the Automated De-Obfuscation Tool to Restore Working Executable (실행 파일 형태로 복원하기 위한 Themida 자동 역난독화 도구 구현)

  • Kang, You-jin;Park, Moon Chan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.785-802
    • /
    • 2017
  • As cyber threats using malicious code continue to increase, many security and vaccine companies are putting a lot of effort into analysis and detection of malicious codes. However, obfuscation techniques that make software analysis more difficult are applied to malicious codes, making it difficult to respond quickly to malicious codes. In particular, commercial obfuscation tools can quickly and easily generate new variants of malicious codes so that malicious code analysts can not respond to them. In order for analysts to quickly analyze the actual malicious behavior of the new variants, reverse obfuscation(=de-obfuscation) is needed to disable obfuscation. In this paper, general analysis methodology is proposed to de-obfuscate the software used by a commercial obfuscation tool, Themida. First, We describe operation principle of Themida by analyzing obfuscated executable file using Themida. Next, We extract original code and data information of executable from obfuscated executable using Pintool, DBI(Dynamic Binary Instrumentation) framework, and explain the implementation results of automated analysis tool which can deobfuscate to original executable using the extracted original code and data information. Finally, We evaluate the performance of our automated analysis tool by comparing the original executable with the de-obfuscated executable.

A Study on Establishment of the Levee GIS Database Using LiDAR Data and WAMIS Information (LiDAR 자료와 WAMIS 정보를 활용한 제방 GIS 데이터베이스 구축에 관한 연구)

  • Choing, Yun-Jae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.17 no.3
    • /
    • pp.104-115
    • /
    • 2014
  • A levee is defined as an man-made structure protecting the areas from temporary flooding. This paper suggests a methodology for establishing the levee GIS database using the airborne topographic LiDAR(Light Detection and Ranging) data taken in the Nakdong river basins and the WAMIS(WAter Management Information System) information. First, the National Levee Database(NLD) established by the USACE(United States Army Corps Engineers) and the levee information tables established by the WAMIS are compared and analyzed. For extracting the levee information from the LiDAR data, the DSM(Digital Surface Model) is generated from the LiDAR point clouds by using the interpolation method. Then, the slope map is generated by calculating the maximum rates of elevation difference between each pixel of the DSM and its neighboring pixels. The slope classification method is employed to extract the levee component polygons such as the levee crown polygons and the levee slope polygons from the slope map. Then, the levee information database is established by integrating the attributes extracted from the identified levee crown and slope polygons with the information provided by the WAMIS. Finally, this paper discusses the advantages and limitations of the levee GIS database established by only using the LiDAR data and suggests a future work for improving the quality of the database.

A Qualitative Study on Intervening Work Experiences of Hospital-Based Child Protection Team on Child Abuse Death Cases (병원 학대피해아동보호팀의 아동학대 사망사건 개입경험 연구)

  • Kim, Kyunghee;Lee, Heeyoun;Chung, Ickjoong;Kim, Jihae;Kim, Sewon
    • Korean Journal of Social Welfare
    • /
    • v.65 no.4
    • /
    • pp.61-88
    • /
    • 2013
  • The aim of this study was to explore the work experiences of hospital-based child protection team staffs who had intervened the child abuse cases resulting in death. In order to gather the relevant data, all 62 child protection teams registered nationwide were contacted and 5 teams which had actually experienced at least one child abuse deaths were found. The staffs (hospital social workers and doctors) who belonged to these teams were intensively interviewed, and the interviewed materials were thoroughly analyzed by qualitative research methodology. The result showed that treatment delay was the most important obstacle to prevent unnecessary deaths of the victims. Some abused victims were sent to the hospital only after their physical condition had so gravely deteriorated. In other cases, custodians' bland denial or refusal to treatment made impossible the timely intervention to save the child lives. Nevertheless, child protection team staffs' reasonable suspicion and active intervention could sometimes uncover the hidden truth that child abuse was the actual cause of death. These incidents were regarded as a team's meaningful accomplishments by team members. Meanwhile, lack of awareness and excessive burden about the role and responsibility of mandated reporter precluded medical staffs' active involvement. Also, substantiating the abuse suspicion by securing positive evidences was found to be a facilitatory factor for the rapid public intervention. On the basis of these results, several practice and policy implications were discussed to improve the early detection process, securing evidence and uncovering the actual cause of death in child abuse deaths.

  • PDF

The Detection and Diagnosis Methods of Infectious Viroids caused Plant Diseases (식물체에 감염성 질병을 유발하는 바이로이드 검출 및 진단 방법)

  • Lee, Se Hee;Kim, Yang-Hoon;Ahn, Ji-Young
    • Journal of Life Science
    • /
    • v.26 no.5
    • /
    • pp.620-631
    • /
    • 2016
  • Viroids are about 250-400 base pair of short single strand RNA fragments have been associated with economically important plant diseases. Due to the lack of protein expression capacity associated with replication, it is very difficult to diagnosis viroid diseases in serological methods. For detecting viroid at plants, molecular-based techniques such as agarose gel electrophoresis, polyacrylamide gel electrophoresis (PAGE), DNA-hybridization, blotting analysis and conventional RT-PCR are reliable. Real-time RT-PCR methods that grafted on RT-PCR methods with improved confirmation methods have been also utilized. However, they are still labor-intensive, time-consuming, and require personnel with expertise. Loop-mediated Isothermal Amplification (LAMP) method is a nucleic acid amplification method under the isothermal condition. The LAMP methodology has been reported to be simple, rapid, sensitive and field applicable in detecting a variety of pathogens. The results of LAMP method can be colorized by adding a visible material such as SYBR green I, Evagreen, Calcein, Berberine and Hydroxy naphthol blue (HNB) with simple equipment or naked eyes. The combination of LAMP method and nucleic pathogens, viroids, can be used to realize simple diagnosis platform for the genetic point-of care testing system. The aim at this review is to summary viroid-caused diseases and the simple visible approach for diagnosing viroids using Loop-mediated Isothermal Amplification (LAMP) method.

Methodology to Apply Low Spatial Resolution Optical Satellite Images for Large-scale Flood Mapping (대규모 홍수 매핑을 위한 저해상도 광학위성영상의 활용 방법)

  • Piao, Yanyan;Lee, Hwa-Seon;Kim, Kyung-Tak;Lee, Kyu-Sung
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.5
    • /
    • pp.787-799
    • /
    • 2018
  • Accurate and effective mapping is critical step to monitor the spatial distribution and change of flood inundated area in large scale flood event. In this study, we try to suggest methods to use low spatial resolution satellite optical imagery for flood mapping, which has high temporal resolution to cover wide geographical area several times per a day. We selected the Sebou watershed flood in Morocco that was occurred in early 2010, in which several hundred $km^2$ area of the Gharb lowland plain was inundated. MODIS daily surface reflectance product was used to detect the flooded area. The study area showed several distinct spectral patterns within the flooded area, which included pure turbid water and turbid water with vegetation. The flooded area was extracted by thresholding on selected band reflectance and water-related spectral indices. Accuracy of these flooding detection methods were assessed by the reference map obtained from Landsat-5 TM image and qualitative interpretation of the flood map derived. Over 90% of accuracies were obtained for three methods except for the NDWI threshold. Two spectral bands of SWIR and red were essential to detect the flooded area and the simple thresholding on these bands was effective to detect the flooded area. NIR band did not play important role to detect the flooded area while it was useful to separate the water-vegetation mixed flooded classes from the purely water surface.