• Title/Summary/Keyword: Security model

Search Result 3,949, Processing Time 0.033 seconds

Performance Analysis of Automatic Target Recognition Using Simulated SAR Image (표적 SAR 시뮬레이션 영상을 이용한 식별 성능 분석)

  • Lee, Sumi;Lee, Yun-Kyung;Kim, Sang-Wan
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.3
    • /
    • pp.283-298
    • /
    • 2022
  • As Synthetic Aperture Radar (SAR) image can be acquired regardless of the weather and day or night, it is highly recommended to be used for Automatic Target Recognition (ATR) in the fields of surveillance, reconnaissance, and national security. However, there are some limitations in terms of cost and operation to build various and vast amounts of target images for the SAR-ATR system. Recently, interest in the development of an ATR system based on simulated SAR images using a target model is increasing. Attributed Scattering Center (ASC) matching and template matching mainly used in SAR-ATR are applied to target classification. The method based on ASC matching was developed by World View Vector (WVV) feature reconstruction and Weighted Bipartite Graph Matching (WBGM). The template matching was carried out by calculating the correlation coefficient between two simulated images reconstructed with adjacent points to each other. For the performance analysis of the two proposed methods, the Synthetic and Measured Paired Labeled Experiment (SAMPLE) dataset was used, which has been recently published by the U.S. Defense Advanced Research Projects Agency (DARPA). We conducted experiments under standard operating conditions, partial target occlusion, and random occlusion. The performance of the ASC matching is generally superior to that of the template matching. Under the standard operating condition, the average recognition rate of the ASC matching is 85.1%, and the rate of the template matching is 74.4%. Also, the ASC matching has less performance variation across 10 targets. The ASC matching performed about 10% higher than the template matching according to the amount of target partial occlusion, and even with 60% random occlusion, the recognition rate was 73.4%.

Monthly Water Balance Analysis of Hwanggang Dam Reservoir for Imjin river in Border Area using Optical Satellite (광학위성을 활용한 임진강 접경지역 황강댐 저수지의 월단위 물수지 분석)

  • KIM, Jin-Gyeom;KANG, Boo-Sik;YU, Wan-Sik;HWANG, Eui-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.4
    • /
    • pp.194-208
    • /
    • 2021
  • The Hwanggang Dam in North Korea is located upstream of the Imjin River which is a shared river in the border area. It is known to have a reservoir capacity of 350 million cubic meters and releases a discharge primarily for generating hydroelectric power and partly for transferring to the Yesung River basin. Due to the supply of water from the Hwanggang Dam to another basin, the flow of the Imjin River has decreased, which has a negative impact on the water supply, river maintenance flow, water quality, and ecological environment in Korea. However, due to the special national security issue of the South and North Korea border region, the hydrological data is not shared, and the operation method of the Hwanggang Dam is unknown, so there is a risk of damage to the southern part of the downstream area. In this study, the monthly diversion as the long-term runoff concept was derived through the calibrated hydrological model based on optical remotely sensed Images and water balance analysis. As a result of the water balance analysis from January 2019 to September 2021, the average diversion of the Hwanggang Dam was 29.2m3/s, which is equivalent to 922 million tons per year and 45.6% of the annual inflow of 2.02 million tons into the Hwanggang Dam.

Convergence Plan of IT Social Safety and SIB by Expanding Sharing Information Data (공유정보 데이터 확대로 인한 IT와 SIB의 사회인식)

  • Seo, DaeSung;Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.97-105
    • /
    • 2022
  • This study deals with the credibility of citizens when investing in uncertain project companies, as well as the Social Performance Compensation Project (SIB) and the IT sharing economy. This allows the convergence of the three sectors to address investment inequalities in economic effectiveness and social security. Activates the model of the overall Social Impact Bond (SIB) process that successfully activates the exchange of information. The empirical presentation of the operations and techniques for social IT service finance examines how the innovation ecosystem can be created with social performance and reward projects. The analysis shows that small sharing institutions or citizens can participate directly to create the ability to connect with private investors, identify the possibility of recognizing non-shared barriers to participation, and show the great impact of citizen trust in IT sharing projects in uncertain areas. As a result, for the sake of social sharing and IT cooperation promoted by the City of Seoul, before the project has the ability to design directly, it will be responsible for reliability and safety in the planning of the project. Therefore, non-shared citizens can also participate in the platform that has been effectively constructed and created.

An Evaluation Technique for the Path-following Control Performance of Autonomous Surface Ships (자율운항선박의 항로추정성능 평가기법 개발에 관한 연구)

  • Daejeong Kim;ChunKi Lee;Jeongbin Yim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.1
    • /
    • pp.10-17
    • /
    • 2023
  • A series of studies on the development of autonomous surface ships have been promoted in domestic and foreign countries. One of the main technologies for the development of autonomous ships is path-following control, which is closely related to securing the safety of ships at sea. In this regard, the path-following performance of an autonomous ship should be first evaluated at the design stage. The main aim of this study was to develop a visual and quantitative evaluation method for the path-following control performance of an autonomous ship at the design stage. This evaluation technique was developed using a computational fluid dynamics (CFD)-based path-following control model together with a line-of-sight (LOS) guidance algorithm. CFD software was utilized to visualize waves around the ship, performing path-following control for visual evaluation. In addition, a quantitative evaluation was carried out using the difference between the desired and estimated yaw angles, as well as the distance difference between the planned and estimated trajectories. The results demonstrated that the ship experienced large deviations from the planned path near the waypoints while changing its course. It was also found that the fluid phenomena around the ship could be easily identified by visualizing the flow generated by the ship. It is expected that the evaluation method proposed in this study will contribute to the visual and quantitative evaluation of the path-following performance of autonomous ships at the design stage.

Multi-Objective Onboard Measurement from the Viewpoint of Safety and Efficiency (안전성 및 효율성 관점에서의 다목적 실선 실험)

  • Sang-Won Lee;Kenji Sasa;Ik-Soon Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.116-118
    • /
    • 2023
  • In recent years, the need for economical and sustainable ship routing has emerged due to the enforced regulations on environmental issues. Despite the development of weather forecasting technology, maritime accidents by rough waves have continued to occur due to incorrect weather forecasts. In this study, onboard measurements are conducted to observe the acutal situation on merchant ships in operation encountering rough waves. The types of measured data include information related to navigation (Ship's position, speed, bearing, rudder angle) and engine (engine revolutions, power, shaft thrust, fuel consumption), weather conditions (wind, waves), and ship motions (roll, pitch, and yaw). These ship experiments was conducted to 28,000 DWT bulk carrier, 63,000 DWT bulk carrier, 20,000 TEU container ship, and 12,000 TEU container ship. The actual ship experiment of each ship is intended to acquire various types of data and utilize them for multi-objective studies related to ship operation. Additionally, in order to confirm the sea conditions, the directional wave spectrum was reproduced using a wave simulation model. Through data collection from ship experiments and wave simulations, various studies could be proceeding such as the measurement for accurate wave information by marine radar and analysis for cargo collapse accidents. In addition, it is expected to be utilized in various themes from the perspective of safety and efficiency in ship operation.

  • PDF

Identifying Analog Gauge Needle Objects Based on Image Processing for a Remote Survey of Maritime Autonomous Surface Ships (자율운항선박의 원격검사를 위한 영상처리 기반의 아날로그 게이지 지시바늘 객체의 식별)

  • Hyun-Woo Lee;Jeong-Bin Yim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.410-418
    • /
    • 2023
  • Recently, advancements and commercialization in the field of maritime autonomous surface ships (MASS) has rapidly progressed. Concurrently, studies are also underway to develop methods for automatically surveying the condition of various on-board equipment remotely to ensure the navigational safety of MASS. One key issue that has gained prominence is the method to obtain values from analog gauges installed in various equipment through image processing. This approach has the advantage of enabling the non-contact detection of gauge values without modifying or changing already installed or planned equipment, eliminating the need for type approval changes from shipping classifications. The objective of this study was to identify a dynamically changing indicator needle within noisy images of analog gauges. The needle object must be identified because its position significantly affects the accurate reading of gauge values. An analog pressure gauge attached to an emergency fire pump model was used for image capture to identify the needle object. The acquired images were pre-processed through Gaussian filtering, thresholding, and morphological operations. The needle object was then identified through Hough Transform. The experimental results confirmed that the center and object of the indicator needle could be identified in images of noisy analog gauges. The findings suggest that the image processing method applied in this study can be utilized for shape identification in analog gauges installed on ships. This study is expected to be applicable as an image processing method for the automatic remote survey of MASS.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

Proposal for Research Model of High-Function Patrol Robot using Integrated Sensor System (통합 센서 시스템을 이용한 고기능 순찰 로봇의 연구모델 제안)

  • Byeong-Cheon Yoo;Seung-Jung Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.77-85
    • /
    • 2024
  • In this dissertation, a we designed and implemented a patrol robot that integrates a thermal imaging camera, speed dome camera, PTZ camera, radar, lidar sensor, and smartphone. This robot has the ability to monitor and respond efficiently even in complex environments, and is especially designed to demonstrate high performance even at night or in low visibility conditions. An orbital movement system was selected for the robot's mobility, and a smartphone-based control system was developed for real-time data processing and decision-making. The combination of various sensors allows the robot to comprehensively perceive the environment and quickly detect hazards. Thermal imaging cameras are used for night surveillance, speed domes and PTZ cameras are used for wide-area monitoring, and radar and LIDAR are used for obstacle detection and avoidance. The smartphone-based control system provides a user-friendly interface. The proposed robot system can be used in various fields such as security, surveillance, and disaster response. Future research should include improving the robot's autonomous patrol algorithm, developing a multi-robot collaboration system, and long-term testing in a real environment. This study is expected to contribute to the development of the field of intelligent surveillance robots.

An Empirical Analysis of the Determinants of Defense Cost Sharing between Korea and the U.S. (한미 방위비 분담금 결정요인에 대한 실증분석)

  • Yonggi Min;Sunggyun Shin;Yongjoon Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.183-192
    • /
    • 2024
  • The purpose of this study is to empirically analyze the determining factors (economy, security, domestic politics, administration, and international politics) that affect the ROK-US defense cost sharing decision. Through this, we will gain a deeper understanding of the defense cost sharing decision process and improve the efficiency of defense cost sharing calculation and execution. The scope of the study is ROK-US defense cost sharing from 1991 to 2021. The data used in the empirical analysis were various secondary data such as Ministry of National Defense, government statistical data, SIPRI, and media reports. As an empirical analysis method, multiple regression analysis using time series was used and the data was analyzed using an autoregressive model. As a result of empirical research through multiple regression analysis, we derived the following results. It was analyzed that the size of Korea's economy, that is, GDP, the previous year's defense cost share, and the number of U.S. troops stationed in Korea had a positive influence on the decision on defense cost sharing. This indicates that Korea's economic growth is a major factor influencing the increase in defense cost sharing, and that the gradual increase in the budget and the negotiation method of the Special Agreement (SMA) for cost sharing of stationing US troops in Korea play an important role. On the other hand, the political tendencies of the ruling party, North Korea's military threats, and China's defense budget were found to have no statistically significant influence on the decision to share defense costs.

Risks and Network Effect upon Cloud ERP Investments: Real Options Approach (위험 및 네트워크 효과가 클라우드 ERP 투자에 미치는 효과에 대한 연구)

  • Seunghyeon Nam;Taeha Kim
    • Information Systems Review
    • /
    • v.20 no.4
    • /
    • pp.43-57
    • /
    • 2018
  • We propose network effects upon the investment decision of cloud-based ERP. Using the survey data collected from 82 companies in 2015, we examine whether IT managers have an intention to adopt real options in order to manage the risk of cloud-based ERP investments and how the network effects influence upon the intention to adopt real options. Based on prior literature, we propose a research model with 4 hypotheses. We find partial support of the hypotheses from the empirical analysis: technological risks has a positive impact upon the adoption of real options such as defer, contract, and abandon. In contrast, we find no significant impact of security risks upon real options. We validate positive network effects upon the adoption of real options such as defer, contract, and abandon. This work empirically find that IT managers in Korean middle and small sized firms have an intention to adopt real options when the managers realize economic, technological, and relationship risks and when they expect network effects.