• Title/Summary/Keyword: 감시정찰 센서 네트워크

Search Result 34, Processing Time 0.028 seconds

Design and Evaluation of AMIDA Algorithm for MIC Sensor Signal Processing in USN (감시정찰용 소리 센서를 위한 AMIDA 알고리즘 설계 및 성능평가)

  • Park, Hong-Jae;Lee, Seung-Je;Ha, Gong-Yong;Kim, Li-Hyung;Kim, Young-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.796-799
    • /
    • 2008
  • 최근 유비쿼터스 컴퓨팅과 유비쿼터스 네트워크를 활용하여 새로운 서비스들을 개발하려는 노력이 진행 중이며, 이와 관련된 기술의 중요성도 급증하고 있다. 특히 감시정찰 센서네트워크의 핵심 구성요소인 저가의 경량 센서노드에서 측정한 미가공 데이터(raw data)를 사용하여 침입 물체의 실시간 탐지, 식별, 추적 및 예측하기 위한 디지털 신호처리 기술은 주요 기술 중 하나이다. 본 논문에서는 감시정찰 센서네트워크의 핵심 구성요소인 소리센서 노드에서 측정한 소리 미가공 데이터를 사용하여 차량을 탐지할 수 있는 소리센서 디지털 신호처리 알고리즘을 설계 및 구현 한다. 알고리즘의 주 목표는 감시정찰용 센서노드의 탐지 신뢰성을 높이기 위한 높은 침입물체 탐지 성공률(success rate)과 낮은 허위신고(false alarm) 횟수를 가지는 것이다. 성능평가 결과에 의하면 제안한 AMIDA 알고리즘은 90% 이상의 탐지 성공률과 2 회 이하의 허위신고 횟수를 가지는 것을 확인할 수 있었다.

Target Localization Method using the Detection Signal Strength of Seismic Sensors for Surveillance Reconnaissance Sensor Network (감시정찰 센서 네트워크에서의 지진동센서 탐지 신호 세기를 이용한 표적 측위 방법)

  • Hyeon-Soo Im;In-Yong Hwang;Hyung-Seok Kim;Sang-Heon Shin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1291-1298
    • /
    • 2023
  • Surveillance reconnaissance sensor network is used for surveillance in wartime and area of operation. In this paper, we propose a target localization method using the detection signal strength of seismic sensors. Relay equipment calculates the target location using coordinate information and detection signal strength of the seismic sensors. Target localization error deviation due to environmental factors was minimized by subtracting the dynamic offset when calculating the target location. Field test shows improvement of target localization through reduction of errors. The average error was decreased to 3.62m. Up to 62% improved result was obtained compared to weighted centroid localization method.

Low Delay Data Transmission Mechanism for Military Surveillance in Wireless Sensor Networks (무선 센서 네트워크에서 군 감시 정찰을 위한 저 지연 데이터 전송 메커니즘)

  • Jeon, Jun-heon;Lee, Sung-choon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.855-860
    • /
    • 2017
  • One of the most important issues in Wireless Sensor Networks is to save energy of the sensor node. But transmission latency is also the problem to solve for some applications such as military surveillance, object tracking. In these applications sensor node needs to send lots of data in limited time when an even such as object appearance occurs. So a delay efficient data transmission method is required. In this paper we propose a MAC protocol adequate for those applications. This paper proposed a low delay data transmission mechanism for military surveillance in wireless sensor networks. In the MAC protocol, a receiver node sends another beacon frame to sender node after receiving data packet. Using this second beacon frame, fast hop-to-hop transmission can be performed. Results have shown that the proposed MAC control mechanism outperformed RI-MAC protocol in the terms of latency.

USN 체계 동향 및 발전방향

  • Kim, Seo-Jin;Jo, Seung-Je;Kim, Yong-Hyeon
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.11a
    • /
    • pp.314-318
    • /
    • 2007
  • 본 논문에서는 유비쿼터스 센서네트워크를 국방분야에 적용하여 운용하고 있는 해외 사례를 소개하고, 특히 미 육군에서 추진중인 미래전투체계(FCS : Future Combat System) 무인화 부분에서의 무인지상센서체계(UGS : Unattended Grounded Sensor)구성요소와 적용사례 및 감시 능력 등을 분석하였다. 또한 국내에서 일부 적용하고 있는 센서네트워크 응용사례를 살펴보았으며, 이러한 국내외 적용사례를 통하여 센서네트워크를 군 환경에 적용하여 실용화해가는 동향에 대해 진단해 보았다. 이를 토대로 "감시정찰센서네트워크"를 통해 기술개발하고 있는 한국형 무인지상센서 네트워크의 발전방향을 제시하였다.

  • PDF

Applications and Strategies on Defense Acquisition based CPS & IoT Technology (사이버물리시스템(CPS)과 사물인터넷(loT) 기술의 군사적 활용방안 및 추진전략)

  • Kye, J.E.;Park, P.J.;Kim, W.T.;Lim, C.D.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.92-101
    • /
    • 2015
  • 미래 전장은 정보 지식 기반의 첨단 전력체계를 확충하기 위해 향후 전력구조를 통합, 지휘통제통신(C4I) 체계와 생존성과 통합성이 향상된 전장의 네트워크중심전(NCW) 수행능력을 향상시킬 것이다. 사이버물리시스템(Cyber-Physical Systems: CPS)은 함정전투체계에 적용되고 있는 DDS를 포함하여 국방 M&S의 근간인 Live, Virture, Constructive(L-V-C) 체계의 큰 축을 형성하고 있다. 사물인터넷(Internet of Things: IoT) 기술은 센서네트워크, 통신, Radio Frequency Identification(RFID), Ubiquitous Sensor Network(USN), Machine to Machine(M2M), D2D 기술 및 상황인지, 지능서비스를 위한 정보수집/가공/융합/분석/예측기술을 포괄적으로 포함한 기술로서 미래산업을 이끌어 갈 차세대 선도 기술이며, 특히 군사적으로도 감시정찰 센서네트워크(USN), 견마형로봇, 경전투로봇과 무인기 기술 및 전술정보통신망체계(TICN) 등 첨단 통신네트워크 기술의 전력화 추세는 IoT 기술의 적용영역을 넓혀주고 있다. 감시정찰체계(Sensor)에서는 감시정찰 분야 영상정보 처리, 표적탐지 등과 관련된 IoT 기술 소요와 지휘통제통신(C4I) 체계의 상호운용성, 데이터링크, 지능형 통신체계 등 C4I 관련 IoT 기술 소요 및 타격체계(Shooter)의 내장형 SW 등 유 무인 무기체계 관련 IoT 기술의 소요가 증대될 것으로 예상된다. 본고는 CPS 및 IoT 기술의 군사적 활용방안 및 획득전략에 대한 적용기술 및 발전방향을 살펴본다.

  • PDF

Resource Reservation Based Image Data Transmission Scheme for Surveillance Sensor Networks (감시정찰 센서 네트워크를 위한 자원예약 기반 이미지 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1104-1113
    • /
    • 2014
  • Future combat systems can be represented as the NCW (Network Centric Warefare), which is based on the concept of Sensor-to-Shooter. A wireless video sensor networking technology, one of the core components of NCW, has been actively applied for the purpose of tactical surveillance. In such a surveillance sensor network, multi-composite sensors, especially consisting of image sensors are utilized to improve reliability for intrusion detection and enemy tracing. However, these sensors may cause a problem of requiring very high network capacity and energy consumption. In order to alleviate this problem, this paper proposes an image data transmission scheme based on resource reservation. The proposed scheme can make it possible to have more reliable image data transmission by choosing proper multiple interfaces, while trying to control resolution and compression quality of image data based on network resource availability. By the performance analysis using NS-3 simulation, we have confirmed the transmission reliability as well as energy efficiency of the proposed scheme.

An Adaptive Person/Vehicle Detection Algorithm for PIR Sensor (적외선 센서 기반의 사람/차량 탐지 적응 알고리즘)

  • Kim, Young-Man;Park, Jang-Ho;Kim, Li-Hyung;Park, Hong-Jae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.577-581
    • /
    • 2009
  • Recently, various new services based on ubiquitous computing and networking have been developed. In this paper, we contrive Adaptive PIR(Pyroelectric Infrared Radiation) Detection Algorithm (APIDA), a PIR-sensor based digital signal processing algorithm, that detects the movement of an invading object by the recognition of heat change in the detection area, since the object like person or car emits heat(i.e., infrared radition), We devised APIDA as a highly reliable signal processing algorithm that increases the successful detection rate and decreases the false alarm rate in the intruding object detection. According to performance evaluation experiment, APIDA shows the successful detection rate of 90% and low false alarm in the plain area.

Efficient Clustering and Data Transmission for Service-Centric Data Gathering in Surveillance Sensor Networks (감시정찰 센서 네트워크에서 서비스 기반 정보수집을 위한 효율적인 클러스터링 및 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Seo, Youn;Ko, Young-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.304-313
    • /
    • 2013
  • Wireless Sensor Networks, especially supporting for surveillance service, are one of the core properties of network-centric warfare(NCW) that is a key factor of victory in future battlefields. Such a tactical surveillance sensor network must be designed not just for energy efficiency but for real-time requirements of emergency data transmission towards a control center. This paper proposes efficient clustering-based methods for supporting mobile sinks so that the network lifetime can be extended while emergency data can be served as well. We analyze the performance of the proposed scheme and compare it with other existing schemes through simulation via Qualnet 5.0.

Ontology-based Context-aware Framework for Battlefield Surveillance Sensor Network System (전장감시 센서네트워크시스템을 위한 온톨로지 기반 상황인식 프레임워크)

  • Shon, Ho-Sun;Park, Seong-Seung;Jeon, Seo-In;Ryu, Keun-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.9-20
    • /
    • 2011
  • Future warfare paradigm is changing to network-centric warfare and effects-based operations. In order to find first and strike the enemy in the battlefield, friendly unit requires real-time target acquisition, intelligence collection, accurate situation assessment, and timely decision. The rapid development in advanced sensor technology and wireless networks requires a significant change in operational concepts of the battlefield surveillance. In particular, the introduction of a battlefield surveillance sensor network system is a big challenge to the ground forces which have lack of automated information collection assets. Therefore this paper proposes an ontology-based context-aware framework for the battlefield surveillance sensor network system which is needed for early finding the enemy and visualizing the battlefield in the ground force operations. Compared with the performance of existing systems, the one of the proposed framework has shown highly positive results by applying the context systems evaluation method. The framework has also proven to be satisfactory by the structured evaluation method using device collaboration. Since the proposed ontology-based context-aware framework has a lot of advantages in terms of scalability and reusability, the ground force's reconnaissance and surveillance system can be widely applied to expand in the future. And, ontology-based model has some weak points such as ontology data size, processing time, and limitation of network bandwidth. However, these problems can be resolved by customizing properly to fit the mission and characteristics of the unit. Moreover, development of the next-generation communication infrastructure can expedite the intelligent surveillance and reconnaissance service and may be expected to contribute greatly to expanding the information capacity.

Energy Efficient Clustering Algorithm for Surveillance and Reconnaissance Applications in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 감시·정찰 응용의 클러스터링 알고리즘 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Jiheon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1170-1181
    • /
    • 2012
  • Wireless Sensor Networks(WSNs) are used in diverse applications. In general, sensor nodes that are easily deployed on specific areas have many resource constrains such as battery power, memory sizes, MCUs, RFs and so on. Hence, first of all, the efficient energy consumption is strongly required in WSNs. In terms of event states, event-driven deliverly model (i.e. surveillance and reconnaissance applications) has several characteristics. On the basis of such a model, clustering algorithms can be mostly used to manage sensor nodes' energy efficiently owing to the advantages of data aggregations. Since a specific node collects packets from its child nodes in a network topology and aggregates them into one packet to relay them once, amount of transmitted packets to a sink node can be reduced. However, most clustering algorithms have been designed without considering can be reduced. However, most clustering algorithms have been designed without considering characteristics of event-driven deliverly model, which results in some problems. In this paper, we propose enhanced clustering algorithms regarding with both targets' movement and energy efficiency in order for applications of surveillance and reconnaissance. These algorithms form some clusters to contend locally between nodes, which have already detected certain targets, by using a method which called CHEW (Cluster Head Election Window). Therefore, our proposed algorithms enable to reduce not only the cost of cluster maintenance, but also energy consumption. In conclusion, we analyze traces of the clusters' movements according to targets' locations, evaluate the traces' results and we compare our algorithms with others through simulations. Finally, we verify our algorithms use power energy efficiently.