• Title/Summary/Keyword: security

Search Result 25,262, Processing Time 0.055 seconds

Monitoring on Crop Condition using Remote Sensing and Model (원격탐사와 모델을 이용한 작황 모니터링)

  • Lee, Kyung-do;Park, Chan-won;Na, Sang-il;Jung, Myung-Pyo;Kim, Junhwan
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.5_2
    • /
    • pp.617-620
    • /
    • 2017
  • The periodic monitoring of crop conditions and timely estimation of crop yield are of great importance for supporting agricultural decision-makings, as well as for effectively coping with food security issues. Remote sensing has been regarded as one of effective tools for crop condition monitoring and crop type classification. Since 2010, RDA (Rural Development Administration) has been developing technology for monitoring on crop condition using remote sensing and model. These special papers address recent state-of-the-art of remote sensing and geospatial technologies for providing operational agricultural information, such as, crop yield estimation methods using remote sensing data and process-oriented model, crop classification algorithm, monitoring and prediction of weather and climate based on remote sensing data,system design and architecture of crop monitoring system, history on rice yield forecasting method.

Empirical Analysis on Economic Factors of Infringement on Ocean Sovereignty from Chinese fishing boats (중국어선 해양주권 침해의 경제적 요인에 관한 실증적 연구)

  • Oh, Sang-Jin;Choi, Kyoung-Hoon;Park, Gyei-Kark
    • Journal of Korea Port Economic Association
    • /
    • v.33 no.3
    • /
    • pp.69-90
    • /
    • 2017
  • Areas of marine activity have expanded into exclusive economic zones and the continental shelf since the United Nations Convention on the Law of the Sea(UNCLOS) in 1994, The signatory countries have been enforcing their maritime rights and competition in the international community has become intensified. Marine-related issues, including maritime sovereignty, has become an increasingly important issue with many national security and related studies following this trend. However, while there are many policy-related studies there remain few empirical studies. This paper conducted a study of illegal cases of Chinese fishing boats which are quite frequently for an empirical study on maritime sovereignty. This study conducted empirical analysis regarding factors relating to ocean sovereignty infringement by using correlation and multiple regression analysis. The result of observed increases in illegal Chinese fishing boats decreased the production of aquatic products, whish resulted in economic fishery losses to Korea households and inflation in the Korean economy.

Automatic Machine Fault Diagnosis System using Discrete Wavelet Transform and Machine Learning

  • Lee, Kyeong-Min;Vununu, Caleb;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1299-1311
    • /
    • 2017
  • Sounds based machine fault diagnosis recovers all the studies that aim to detect automatically faults or damages on machines using the sounds emitted by these machines. Conventional methods that use mathematical models have been found inaccurate because of the complexity of the industry machinery systems and the obvious existence of nonlinear factors such as noises. Therefore, any fault diagnosis issue can be treated as a pattern recognition problem. We present here an automatic fault diagnosis system of hand drills using discrete wavelet transform (DWT) and pattern recognition techniques such as principal component analysis (PCA) and artificial neural networks (ANN). The diagnosis system consists of three steps. Because of the presence of many noisy patterns in our signals, we first conduct a filtering analysis based on DWT. Second, the wavelet coefficients of the filtered signals are extracted as our features for the pattern recognition part. Third, PCA is performed over the wavelet coefficients in order to reduce the dimensionality of the feature vectors. Finally, the very first principal components are used as the inputs of an ANN based classifier to detect the wear on the drills. The results show that the proposed DWT-PCA-ANN method can be used for the sounds based automated diagnosis system.

Copyright Protection for Digital Image by Watermarking Technique

  • Ali, Suhad A.;Jawad, Majid Jabbar;Naser, Mohammed Abdullah
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.599-617
    • /
    • 2017
  • Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

Exploring Spatial Patterns of Theft Crimes Using Geographically Weighted Regression

  • Yoo, Youngwoo;Baek, Taekyung;Kim, Jinsoo;Park, Soyoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.35 no.1
    • /
    • pp.31-39
    • /
    • 2017
  • The goal of this study was to efficiently analyze the relationships of the number of thefts with related factors, considering the spatial patterns of theft crimes. Theft crime data for a 5-year period (2009-2013) were collected from Haeundae Police Station. A logarithmic transformation was performed to ensure an effective statistical analysis and the number of theft crimes was used as the dependent variable. Related factors were selected through a literature review and divided into social, environmental, and defensive factors. Seven factors, were selected as independent variables: the numbers of foreigners, aged persons, single households, companies, entertainment venues, community security centers, and CCTV (Closed-Circuit Television) systems. OLS (Ordinary Least Squares) and GWR (Geographically Weighted Regression) were used to analyze the relationship between the dependent variable and independent variables. In the GWR results, each independent variable had regression coefficients that differed by location over the study area. The GWR model calculated local values for, and could explain the relationships between, variables more efficiently than the OLS model. Additionally, the adjusted R square value of the GWR model was 10% higher than that of the OLS model, and the GWR model produced a AICc (Corrected Akaike Information Criterion) value that was lower by 230, as well as lower Moran's I values. From these results, it was concluded that the GWR model was more robust in explaining the relationship between the number of thefts and the factors related to theft crime.

Implementation of the Access Control System for Hangul Document System (한글 문서 접근 제어시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.323-329
    • /
    • 2018
  • In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system. The system structure designed in this paper is to transform header information of Hangul document by analyzing the structure of Hangul document. By modifying the function of a specific field of the header information in Hangul document, it prevents users that do not have data for the modified information to open and view the document. By controlling the access rights to important Hangul documents, it is possible to manage Hangul files more safely. In this paper, the actual design of information was implemented and experiments were carried out. Results of the experiment confirmed that the access control system is operated in normal way. In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system.

Implementation of Home Network Services Using OpenWRT-based Wireless Access Point and Zigbee Communications (OpenWRT 기반 유무선 공유기와 Zigbee 통신을 이용한 홈 네트워크 서비스 구축)

  • Kwon, Kisu;Lee, Kyoung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.375-381
    • /
    • 2018
  • As smart home network services such as home CCTV, outdoor control of home appliances, home security and disaster prevention services become popular, there appear various affiliated products including smart home gateway and smart speaker. Since those services are generally developed on the vendors' individual hardware and software platforms, it is not much expected for them to interwork well among different architecture and communication methods. In this paper, we propose a new home network service system running on an open source platform to address such issues. We implemented a home network system using OpenWRT-based wireless router(or access point) and Zigbee communication technology. In the proposed system, a wireless router replaces a commercial home gateway and small control units implemented with Arduino control electronic devices and sensors in home. Several service scenarios are also implemented to verify the operability of the proposed system.

A Survey of the Transmission-Power-Control Schemes in Wireless Body-Sensor Networks

  • Lee, Woosik;Kim, Heeyoul;Hong, Min;Kang, Min-Goo;Jeong, Seung Ryul;Kim, Namgi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1854-1868
    • /
    • 2018
  • A wireless body-sensor network (WBSN) refers to a network-configured environment in which sensors are placed on both the inside and outside of the human body. The sensors are much smaller and the energy is more constrained when compared to traditional wireless sensor network (WSN) environments. The critical nature of the energy-constraint issue in WBSN environments has led to numerous studies on the reduction of energy consumption of WBSN sensors. The transmission-power-control (TPC) technique adjusts the transmission-power level (TPL) of sensors in the WBSN and reduces the energy consumption that occurs during communications. To elaborate, when transmission sensors and reception sensors are placed in various parts of the human body, the transmission sensors regularly send sensor data to the reception sensors. As the reception sensors receive data from the transmission sensors, real-time measurements of the received signal-strength indication (RSSI), which is the value that indicates the channel status, are taken to determine the TPL that suits the current-channel status. This TPL information is then sent back to the transmission sensors. The transmission sensors adjust their current TPL based on the TPL that they receive from the reception sensors. The initial TPC algorithm made linear or binary adjustments using only the information of the current-channel status. However, because various data in the WBSN environment can be utilized to create a more efficient TPC algorithm, many different types of TPC algorithms that combine human movements or fuse TPC with other algorithms have emerged. This paper defines and discusses the design and development process of an efficient TPC algorithm for WBSNs. We will describe the WBSN characteristics, model, and closed-loop mechanism, followed by an examination of recent TPC studies.

A Study of the Reasonable Space for Each Person about Inner Evacuated Facility (대피시설의 1인당 적정 수용면적에 관한 연구)

  • Hong, Eunki;Kim, Minseok;Yeom, Taejun;Park, Mijin
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.1
    • /
    • pp.15-25
    • /
    • 2017
  • Since the late 19th century, the annual average temperature of the Earth has risen due to excessive emission of greenhouse gases, and abnormal weather phenomena such as heavy rain and heavy snowfall have been increasing frequently all over the world. In a city with high population growth due to high economic growth, fire and terrorist accidents can cause serious property damage and human casualties. The purpose of this study is to propose the need for evacuated facilities to protect victims, and suggest adequate shelters' size which can be protectable them. In spite of the Ministry of Public Safety and Security designated 3.3 square meters of per capita capacity, they does not specify the basis about setting this criterion.

The study of meanings and follow-up tasks for enactment of Assistive Technology Act in Korea (한국의 보조기기법 제정 의의와 후속과제에 대한 연구)

  • Nam, Se-hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.535-542
    • /
    • 2016
  • This study was to explore the meanings and follow-up tasks for enactment of Act on Supply and Utilization Promotion of Assistive Technology Devices for People with Disabilities and Seniors(Assistive Technology Act) in Korea. I conducted analysis about contents and establishment process of the Act. The study found meaningful effects ; it provided the basis for supporting assistive technology devices based on the social model, it led to an Implementation of the national obligations such as UN Convention on the Rights of Persons with Disabilities, it provided terms related to assistive technology. It is suggested to conduct follow-up studies and to put the efforts to strengthen additional laws for backing up the effective policy for extended support of assistive technology devices and for security of budget, for establishing regional service centers, for phasing of professional qualification, for controlling quality, for establishing an information system, and for promoting industries.