• Title/Summary/Keyword: ESM

Search Result 192, Processing Time 0.031 seconds

A Study on Performance Improvement of Electroic Warfare Direction Finding System in Muiti Radio Environment (다중 전파 환경에서의 전자전 방향탐지 시스템 성능향상에 관한 연구)

  • Choi, Sun-ho;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.206-209
    • /
    • 2016
  • High end commercial communication system, such as contemporary mobile technology (CDMA, LTE, Wi-FI, etc.) and extension of frequency band, may affect the performance of the shipborne electronic support measurement system in modern battle field. In this paper, we suggest a way to improve the performance of electronic warfare system based on direction finding algorithm simulation after discussing the limits of traditional system.

  • PDF

Simulation Assessment of GCM Model in Case of Daily Precipitation and Temperature (일 강우량 및 기온 자료의 모의를 위한 GCM 모형의 평가)

  • Son, Minwoo;Byun, Jisun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.307-307
    • /
    • 2019
  • General Ciculation Model (GCM) 모형에 대한 평가를 본 연구에서 수행한다. 모형의 적용을 위해서는 국지적 일 강우량 및 기온자료를 이용한다. 31개의 GCM 모의를 통해 도출되는 결과가 성능 평가에서 활용되었다. 일 최대, 최소 기온와 강우량이 파키스탄 지역을 대상으로 모의되었다. 모의를 위해서는 Gridded 데이터가 적용되었으며 각각 Asian Precipitation-Highly-Resolved Observational Data Integration Toward Evaluation, Berkeley Earth Surface Temperature, Princeton Global Meteorological Forcing, Climate Prediction Centre에 해당된다. GCM의 순위를 결정하기 위해서는 Symmetrical Uncertainty 방법이 이용된다. 결과를 통해서 Gridded 데이터의 종류에 따라 가장 높은 효율을 나타내는 GCM의 공간 분포가 달라진다는 점을 확인하였다. 이러한 특성은 기온과 강우량 자료 모두에서 확인된다. 기온의 경우에는 Commonwealth Scientific and Industrial Research Organization, Australia-MK3-6-0과 Max Planck Institute-ESM-LR이 우수한 결과를 모의하는 것으로 나타났다. 반면 강우량의 경우에는 EC-Earth와 MIROC가 우수한 것으로 나타났다. 파키스탄 지역에서의 기온 및 강우량 자료의 합리적 반영을 위해서는 ACCESS1-3, CESM1-BGC, CMCC-CM, HadGEM2-CC, HadGEM2-ES, MIRCO5와 같은 6개 GCM을 이용하였을 때 다양한 기상 인자를 고려한 모의가 가능한 것으로 평가된다.

  • PDF

A Study on Security Event Detection in ESM Using Big Data and Deep Learning

  • Lee, Hye-Min;Lee, Sang-Joon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.42-49
    • /
    • 2021
  • As cyber attacks become more intelligent, there is difficulty in detecting advanced attacks in various fields such as industry, defense, and medical care. IPS (Intrusion Prevention System), etc., but the need for centralized integrated management of each security system is increasing. In this paper, we collect big data for intrusion detection and build an intrusion detection platform using deep learning and CNN (Convolutional Neural Networks). In this paper, we design an intelligent big data platform that collects data by observing and analyzing user visit logs and linking with big data. We want to collect big data for intrusion detection and build an intrusion detection platform based on CNN model. In this study, we evaluated the performance of the Intrusion Detection System (IDS) using the KDD99 dataset developed by DARPA in 1998, and the actual attack categories were tested with KDD99's DoS, U2R, and R2L using four probing methods.

Research on 'Flow' and Creativity as Observed in the Daily Lives of Science-Gifted Students (과학 영재학생들의 일상에서 나타나는 몰입과 창의성에 대한 연구)

  • Lee, Nam Ju;Paik, Seoung Hey
    • Journal of The Korean Association For Science Education
    • /
    • v.34 no.2
    • /
    • pp.147-153
    • /
    • 2014
  • The purpose of this study is to investigate various types of 'flow' that can be observed in the daily lives of science-gifted students, and the correlation between 'flow' and creativity. For two months, we have gathered data on 'flow' in the main activities of science-gifted students through a qualitative application of the Experience Sampling Method (ESM). We then use correlation analysis to determine whether there have been correlations between 'flow' and creativity. Among the four channels, activities involving 'flow' have been the most common (40.4%) in the daily lives of the students. The types of tasks done by the students are, in descending order of frequency, productive activities, social activities, leisure activities, and basic activities. The students have shown the least interest in tasks that do not require specific skills or pose significant challenges; thus the least interest show in basic activities and the most interest has been shown in productive activities. 'Flow' and creativity are significantly correlated at the level of 0.01, which means that the more the students experience 'flow,' the more they express creativity. Based on the results above, we have found that there is a need for the development of science programs or environments, including productivity while at the same time, to reduce uneasiness and patience raising activities, where students can experience more 'flow' in daily life.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

Assessing the skills of CMIP5 GCMs in reproducing spatial climatology of precipitation over the coastal area in East Asia (CMIP5 GCM의 동아시아 해안지역에 대한 공간적 강우특성 재현성 평가)

  • Hwang, Syewoon;Cho, Jeapil;Yoon, Kwang Sik
    • Journal of Korea Water Resources Association
    • /
    • v.51 no.8
    • /
    • pp.629-642
    • /
    • 2018
  • Future variability of the spatial patterns of rainfall events is the point of water-related risks and impacts of climate change. Recent related researches are mostly conducted based on the outcomes from General Circulation Models (GCMs), especially Coupled Model Intercomparison Project, phase 5 (CMIP5) GCMs which are the most advanced version of climate modeling system. GCM data have been widely used for various studies as the data utility keep getting improved. Meanwhile the model performances especially for raw GCM outputs are rarely evaluated prior to the applications although the process would essential for reasonable use of model forecasts. This study attempt to quantitatively evaluate the skills of 29 CMIP5 GCMs in reproducing spatial climatologies of precipitation in East Asia. We used 3 different gridded observational data as the references available over the study area and calculated correlation and errors of spatial patterns simulated by GCMs. As a result, the study presented diversity of the GCM evaluation in the performance, rank, or accuracy by different configurations, such as target area, evaluation method, and observation data. Yet, we found that Hadley-centre affiliated models comparatively performs better for the meso-scale area in East Asia and MPI_ESM_MR and CMCC family showed better performance specifically for the korean peninsula. We expect that the results and thoughts of this study would be considered in screening suitable GCMs for specific area, and finally contribute to extensive utilization of the results from climate change related researches.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Climate Change in Corn Fields of the Coastal Region of Ecuador

  • Borja, Nicolas;Cho, Jaepil;Choi, KyungSook
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.271-271
    • /
    • 2015
  • The Ecuadorian coast has two different climate regions. One is humid region where the annual rainfall is above 2000 mm and rain falls in almost all months of the year, and the other is dry region where the annual rainfall can fall below 50 mm and rainfall can be very seasonal. The agriculture is frequently limited by the seasons during the year and the availability of rainfall amounts. The corn fields in Ecuador are cultivated during the rainy season, due to this reason. The weather conditions for optimum development of corn growth require a monthly average rainfall of 120 mm to 140 mm and a temperature range of $22^{\circ}C{\sim}32^{\circ}C$ for the dry region, and a monthly average rainfall of 200 mm to 400 mm and a temperature range of $25^{\circ}C{\sim}30^{\circ}C$ for the humid area. The objective of this study is to predict how the weather conditions are going to change in corn fields of the coastal region of Ecuador in the future decades. For this purpose, this study selected six General Circulation Models (GCM) including BCC-CSM1-1, IPSL-CM5A-MR, MIROC5, MIROC-ESM, MIROC-ESM-CHEM, MRIC-CGC3 with different climate scenarios of the RCP 4.5, RCP 6.0, and RCP 8.5, and applied for the period from 2011 to 2100. The climate variables information was obtained from the INAMHI (National Institute of Meteorology and Hydrology) in Ecuador for the a base line period from 1986 to 2012. The results indicates that two regions would experience significant changes in rainfall and temperature compared to the historical data. In the case of temperature, an increment of $1^{\circ}C{\sim}1.2^{\circ}C$ in 2025s, $1.6^{\circ}C{\sim}2.2^{\circ}C$ in 2055s, $2.1^{\circ}C{\sim}3.5^{\circ}C$ in 2085s were obtained from the dry region while less increment were shown from the humid region with having an increment of $1^{\circ}C$ in 2025s, $1.4^{\circ}C{\sim}1.8^{\circ}C$ in 2055s, $1.9^{\circ}C{\sim}3.2^{\circ}C$ in 2085s. Significant changes in rainfall are also projected. The rainfall projections showed an increment of 8%~11% in 2025s, 21%~33% in 2055s, and 34%~70% in 2085s for the dry region, and an increment of 2%~10%, 14%~30% and 23%~57% in 2025s, 2055s and 2085s decade respectively for humid region.

  • PDF

Low-Flow Projection according to the Actual Evapotranspiration scenarios under the Climate Change -Chungju Dam Case- (기후변화 실제증발산 시나리오에 따른 갈수량전망 - 충주댐 사례 -)

  • Sun, HoYoung;Kang, BooSik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.104-104
    • /
    • 2018
  • 이수안전도의 기준이 되는 갈수량에 대해 기후변화 시나리오에 따른 전망을 제시하였다. 충주 댐 유역을 대상으로 기준기간(1986~2000년)에서의 기상청의 관측 기상자료와 IPCC 보고서의 RCP 4.5/8.5 시나리오를 대상으로 CMIP5(Coupled Model Intercomparison Project Phase 5)에서 제공하는 기후변화 자료 중 5개의 모델(ACCESS1.3 CanESM2, CNRM-CM5, GFDL-ESM2G, HadGEM2-AO)의 기준기간과 미래기간(2011~2100년)의 기상자료를 수집하였다. 기후변화 자료는 정상성/비정상성 분위사상법과 베이지안 모델 평균기법을 통해 불확실성과 통계적 오차를 저감하였다. 미래기간에서, 강우는 RCP 4.5에서 1.74mm/year, RCP 8.5에서 3.22mm/year, 실제증발산은 RCP 4.5에서 1.09mm/year, RCP 8.5에서 1.78mm/year의 증가율을 보였다. 실제증발산을 입력자료로 활용할 수 있도록 IHACRES모델의 CMD(Catchment Moisture Deficit) 비선형 모듈의 매개변수를 변이하여 유효강우량 산정 과정을 개선하였다. 기준기간에서 관측유량자료와 IHACRES의 시뮬레이션을 통해 산정된 유량자료의 R-squared는 0.65이다. 기준기간에서의 매개변수를 고정하여 미래기간의 유량을 산정하고 유황분석을 통해 갈수량 전망하였다. 유량은 RCP 4.5에서 4.41MCM/year, RCP 8.5에서 9.66MCM/year의 증가율을 보였다. 갈수량은 RCP 4.5에서 0.30MCM/year, RCP 8.5에서 -0.47MCM/year의 증감율을 보였다. 연간 강수량 대비 실제증발산의 비율의 추세분석 결과, RCP 4.5에서는 홍수기에는 0.014%/year, 비홍수기에는 0.027%/year의 증가율을 보이며 거의 변화가 없는 추세를 확인할 수 있었다. RCP 8.5의 홍수기에는 -0.042%/year, 비홍수기에서는 0.167%/year의 증감율을 보이며 홍수기에는 실제증발산에 비해 강수량의 증가가 확연히 보였으며 비홍수기에는 강수량에 비해 실제증발산의 증가가 뚜렷이 확인되었다. RCP 8.5에서 비홍수기의 강수량 대비 실제증발산의 증가가 갈수량의 감소로 반영된 것을 확인할 수 있었다. 미래기간의 RCP 4.5/8.5에서 실제증발산의 증가로 인하여 강수량이 증가함에 따라 유입량이 증가함에도 불구하고 갈수량의 증가로 이어지지 않았다. 미래 갈수량의 감소는 하천의 건전성과 이수안전도의 위협이 될 수 있다.

  • PDF

Emotional Experience of Korean Urban Elderly in Everyday Lives using Experience Sampling Method: A focus on gender differences (경험표집법을 통해 살펴본 도시노인의 일상생활 경험: 공간/대인맥락과 정서경험에서의 젠더차이를 중심으로)

  • Han, Gyounghae;Son, Jeongyeon
    • 한국노년학
    • /
    • v.29 no.3
    • /
    • pp.1159-1182
    • /
    • 2009
  • The purpose of this study is to examine everyday emotional experience of urban elderly in Korea. Specifically, this study explores gender differences in the effect of place/location of activity and companionship on the daily emotional experience. Data were collected from 148 urban elderly (men=76, women=72) in Seoul, using Experience Sampling Method(ESM). The unit of analysis was the self-report and in total 5,530 self-reports were provided. The statistical methods used for the data analyses were descriptive statistics, t-test, χ2 verification, and ANOVA. The major findings are as follows. First, the elderly in Korea spend a quite substantial portion of their time at home, and they spend the largest share of their time in company with their spouse. Second, women report higher intensity of stress and irritation than men in terms of overall emotional experience. Third, the effect of activity location and companionship on emotional experience turned out to be different depending on gender. Emotional experience of daily lives and overall quality of life are shown to be inter-related. Based on these findings, this study provides a significant implication that situational contexts of experience should be considered in order to understand the daily emotional experience of the contemporary Korean elderly.