• Title/Summary/Keyword: Visualization Method

Search Result 1,658, Processing Time 0.025 seconds

Network Attacks Visualization using a Port Role in Network Sessions (트래픽 세션의 포트 역할을 이용한 네트워크 공격 시각화)

  • Chang, Beomhwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.47-60
    • /
    • 2015
  • In this paper, we propose a simple and useful method using a port role to visualize the network attacks. The port role defines the behavior of the port from the source and destination port number of network session. Based on the port role, the port provides the brief security features of each node as an attacker, a victim, a server, and a normal host. We have automatically classified and identified the type of node based on the port role and security features. We detected and visualized the network attacks using these features of the node by the port role. In addition, we are intended to solve the problems with existing visualization technologies which are the reflection problem caused an undirected network session and the problem caused decreasing of distinct appearance when occurs a large amount of the sessions. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacker, victim, server, and hosts. In addition, by providing a categorized analysis of network attacks, this method can more precisely detect and distinguish them from normal sessions.

Automatic detection of icing wind turbine using deep learning method

  • Hacıefendioglu, Kemal;Basaga, Hasan Basri;Ayas, Selen;Karimi, Mohammad Tordi
    • Wind and Structures
    • /
    • v.34 no.6
    • /
    • pp.511-523
    • /
    • 2022
  • Detecting the icing on wind turbine blades built-in cold regions with conventional methods is always a very laborious, expensive and very difficult task. Regarding this issue, the use of smart systems has recently come to the agenda. It is quite possible to eliminate this issue by using the deep learning method, which is one of these methods. In this study, an application has been implemented that can detect icing on wind turbine blades images with visualization techniques based on deep learning using images. Pre-trained models of Resnet-50, VGG-16, VGG-19 and Inception-V3, which are well-known deep learning approaches, are used to classify objects automatically. Grad-CAM, Grad-CAM++, and Score-CAM visualization techniques were considered depending on the deep learning methods used to predict the location of icing regions on the wind turbine blades accurately. It was clearly shown that the best visualization technique for localization is Score-CAM. Finally, visualization performance analyses in various cases which are close-up and remote photos of a wind turbine, density of icing and light were carried out using Score-CAM for Resnet-50. As a result, it is understood that these methods can detect icing occurring on the wind turbine with acceptable high accuracy.

Effective Risk Level Assessment Using Three-Dimensional Vector Visualization (3차원 벡터 시각화를 활용한 효과적인 위험 수준 평가)

  • Lee, Ju-young;Cho, In-hyun;Lee, Jae-hee;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1595-1606
    • /
    • 2015
  • Risk analysis is utilized in devising measures to manage information security risk to an acceptable level. In this risk management decision-making, the visualization of risk is important. However, the pre-existing risk visualization method is limited in visualizing risk factors three-dimensionally. In this paper, we propose an improved risk visualization method which can facilitate the identification of risk from the perspective of confidentiality, integrity, and availability respectively or synthetically. The proposed method is applied to an enterprise's risk analysis in order to verify how effective it is. We argue that through the proposed method risk levels can be expressed three-dimensionally, which can be used effectively for information security decision-making process for internal controls.

Visualization method of User Hierarchy of among SNS users (소셜 네트워크 서비스 사용자의 계층 시각화 방법)

  • Park, Sun;Jeong, Jong-Geun;Yeu, Moo-Song;Lee, Seong-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1717-1724
    • /
    • 2012
  • Information of social relationship of users on online is useful information for other services such as recommend information of commercial activity. So, there is a lot of studies analysis with connection to visualization of social network. Most of the previous works of visualization focus on representing user's relationship on social network by a complex multi dimension graph. However, this method is difficult to identify the important of relationship to focus on personal user intuitively. In order to resolve above problem, this paper proposes a new visualization method using the user's correlation and user relationship of network node. The proposed method visualizes the hierarchy relationship of users using the internal relation of network reflecting user's message and external relation of network nodes.

BIM-based visualization technology for blasting in Underground Space (지하공간 BIM 기반 발파진동 영향 시각화 기술)

  • Myoung Bae Seo;Soo Mi Choi;Seong Jong Oh;Seong Uk Kim;Jeong Hoon Shin
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.67-76
    • /
    • 2023
  • We propose a visualization method to respond to civil complaints through an analysis of the impact of blasting. In order to analyze the impact of blasting on tunnel excavation, we propose a simulation visualization method considering the mutual influence of the construction infrastructure by linking measurement data and 3D BIM model. First, the level of BIM modeling required for simulation was defined. In addition, vibration measurement data were collected for the GTX-A construction site, terrain and structure BIM were created, and a method for visualizing measurement data using blast vibration estimation was developed. Next, a spherical blasting influence source library was developed for visualization of the blasting influence source, and a specification table that could be linked with Revit Dynamo automation logic was constructed. Using this result, a method for easily visualizing the impact analysis of blasting vibration in 3D was proposed.

Development of the Guidelines for Expressing Big Data Visualization (공간빅데이터 시각화 가이드라인 연구)

  • Kim, So-Yeon;An, Se-Yun;Ju, Hannah
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.100-112
    • /
    • 2021
  • With the recent growth of the big data technology market, interest in visualization technology has steadily increased over the past few years. Data visualization is currently used in a wide range of disciplines such as information science, computer science, human-computer interaction, statistics, data mining, cartography, and journalism, each with a slightly different meaning. Big data visualization in smart cities that require multidisciplinary research enables an objective and scientific approach to developing user-centered smart city services and related policies. In particular, spatial-based data visualization enables efficient collaboration of various stakeholders through visualization data in the process of establishing city policy. In this paper, a user-centered spatial big data visualization expression request method was derived by examining the spatial-based big data visualization expression process and principle from the viewpoint of effective information delivery, not just a visualization tool.

Topology Preserving Tetrahedral Decomposition Applied To Trilinear Interval Volume Tetrahedrization

  • Sohn, Bong-Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.667-681
    • /
    • 2009
  • We describe a method to decompose a cube with trilinear interpolation into a collection of tetrahedra with linear interpolation, where the isosurface topology is preserved for all isovalues during decomposition. Visualization algorithms that require input scalar data to be defined on a tetrahedral grid can utilize our method to process 3D rectilinear data with topological correctness. As one of many possible examples, we apply the decomposition method to topologically accurate tetrahedral mesh extraction of an interval volume from trilinear volumetric imaging data. The topological correctness of the resulting mesh can be critical for accurate simulation and visualization.

Visualization of Electro-hydrodynamic Ink Jetting using CCD Camera (CCD 카메라를 사용한 전기수력학적 잉크젯 토출 현상 가시화)

  • Kwon, Kye-Si;Lee, Dae-Yong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.29 no.3
    • /
    • pp.295-301
    • /
    • 2012
  • The method for spraying of liquids through an electrical field has become a printing method since it can make very small droplet. For electro-hydrodynamic jet printing to become a reliable jetting tool, the jetting performance should be characterized with respect to various jetting conditions. To optimize jetting conditions, the jetting behavior should be measured. In this study, we present a visualization techniques to measure jetting behavior from electro-hydrodynamic (EHD) inkjet head. Unlike most previous method, we use the CCD camera to measure the jetting behavior. For this purpose, LED light is synchronized with jetting signal and sequential image was obtained by adjusting the delay time of the LED light. Finally, merits and demerits of using CCD camera were discussed to measure jetting image from EHD inkjet head.

A Study on the Scavenging Efficiency Evaluation for the RSSV Configuration of 2-Stroke Engine with Popet Valve Type Using Single-Cycle Method (Single-Cycle 기법을 이용한 포핏밸브형 2-행정기관의 RSSV 형상에 따른 소기효율 측정에 관한 연구)

  • 이진욱;강건용;정용일;이주헌;박정규
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.5 no.2
    • /
    • pp.69-79
    • /
    • 1997
  • This paper deals with the measurement and analysis on the scavenging performance of the oppet-valve type two-stroke engine with different shroud system. The scavenging flow characteristics is investigated by flow visualization under steady condition, in which a dye is introduced into single-cycle method using the difference of specific gravity between two working fluids is used to evaluate the scavenging efficiency and the trapping efficiency. The 90° shroud system was found to be the highest efficiency system through both flow visualization and single-cycle test, as well as the shroud system to generally be efficient for reducing a short-circuiting flow during scavenging process in a two-stoke engine.

  • PDF

An Efficient Network Attack Visualization Using Security Quad and Cube

  • Chang, Beom-Hwan;Jeong, Chi-Yoon
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.770-779
    • /
    • 2011
  • Security quad and cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated in the security devices; however, it takes a lot of time to inspect and analyze them because the security devices generate an overwhelming amount of logs and security events. In this paper, we propose SQC, an efficient method for analyzing network security through visualization. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacks. In addition, by providing a detailed analysis of network attacks, this method can more precisely detect and distinguish them from normal events.