• Title/Summary/Keyword: 경고 방송

Search Result 39, Processing Time 0.023 seconds

식수오염문제 드디어 정치문제화

  • the National parks of Association of Korea
    • 공원문화
    • /
    • s.43
    • /
    • pp.30-31
    • /
    • 1989
  • 지난 7월 25일 경부터 10일간 호남지방을 때린 호우와 그뒤에 불어 닥친 폭태풍주디호의 내습에 의한 경남.전남지방의 농사.도로.항만파손, 가옥유실피해는 7월중의 통계만봐도 인명 164명(실종포함)에 재산피해액 2,593억원에 달하고 있다. (중앙재해대책본부집계) 매스콤은 일제히 수재의연금품 모집의 사고와 기사를 싣고 동포애발휘를 호소하면서 8월초순에 접어들자 전국의 신문.방송.TV는 홍수피해기사와 연달아 8일자 조선일보1면톱 "하수하루 240만톤강에 방류.5개직할시 처리시설 부족. 하천오염.건설부국회자료" 기사를 효시로 5대강이 썩어감에 따른 식수비상을 일제히 대서특필하기 시작했다. 한강등의 중금속오염경고 학계발표를 인용보도한것은 4공화국의 말기였고 한때 문교부가 학계발표에 제동을 걸어 식수오염문제발표는 위축되어 초점을 잃고 죽은 어류사진과 거품이 떠내려가는 말초적인 현황보도에 그쳤고 원인분석등 심층보도는 연구기관의 공식발표에 의존할 방법밖에 없어 "알듯모르듯"하는 선에서 방황했었다. 8월초순부터 20일 동안은 하천오염에 따른 오늘의 식수문제가 성대의 이슈로 지면을 덮었고 반드시 개선돼야 할 중대사이기에 기록해둔다.

  • PDF

A Study on the Application Technologies and Operational Cases of Military Loudspeakers (군사용 확성기 적용기술 및 운용사례 조사연구)

  • Yong Kim;Dae Woong Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.6
    • /
    • pp.197-204
    • /
    • 2024
  • This study investigates the key application technologies for military loudspeakers and examines their operational cases in conjunction with the Korean military, foreign militaries, and other weapon systems. The purpose of this research is to propose major considerations and strategies for the optimal operation of loudspeakers tailored to military operational environments, thereby enhancing the efficiency and effectiveness of military operations.

Effective Emergency-Warning Message Transmission in the Vehicle-to-Vehicle Communication Environment (차량 간 통신 환경에서 효과적인 위험 경고 메시지 전송 방안)

  • Byun, Jae-Uk;Kwon, Sung-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1B
    • /
    • pp.1-8
    • /
    • 2012
  • In this paper, we propose an algorithm to improve collision avoidance in Vehicle-to-Vehicle (V2V) networks based on IEEE 802.11p. Since IEEE 802.11p adopts CSMA/CA as a multiple access scheme and an emergency warning message (EWM) is delivered to behind vehicles in a multi-hop manner, due to transmission collision, the more vehicles in the vehicle chain results in a longer delay. The longer delay increases the possibility of a rear-end collision. In order to ensure message reception with low latency, we consider implicit acknowledgement of a broadcasted EWM message and propose an algorithm to reduce redundant message transactions, called Two-Way Implicit Acknowledgement (TWIA). By simulations, we show that our proposed algorithm can reduce the latency until the last car receives the message by 9% and the success rate every car receives the message within 0.7sec by 12% at 100 fixed-number-of-car environment.

Design of an Intrusion Detection and Self-treatment System for IoT (사물인터넷을 위한 침입탐지 및 자가 치료 시스템의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2018
  • With the advent of the 5G communication era recently, advancement of the convergence technologies related to IoT has been progressed rapidly. IoT convergence technologies using various sensors are actively applied many fields in our lives, and it contributes to the popularization of these convergence technologies among many people successfully. The security problem of the IoT which connects many things on the network is critically vulnerable and is one of the most important challenge to be solved urgently. In this paper, we design an intrusion detection and self-treatment system for IoT, which can detect external attacks and anomalies in order to solve the security problems in IoT, perform self-treatment by operating the vaccine program according to the intrusion type whenever it detects certain intrusion. Furthermore, we consider the broadcasting of intrusion alarm message according to the frequency of similar circumstances in order to block intrusion contagious in IoT.

A Study on Improvement of Pedestrian Care System for Cooperative Automated Driving (자율협력주행을 위한 보행자Care 시스템 개선에 관한 연구)

  • Lee, Sangsoo;Kim, Jonghwan;Lee, Sunghwa;Kim, Jintae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.111-116
    • /
    • 2021
  • This study is a study on improving the pedestrian Care system, which delivers jaywalking events in real time to the autonomous driving control center and Autonomous driving vehicles in operation and issues warnings and announcements to pedestrians based on pedestrian signals. In order to secure reliability of object detection method of pedestrian Care system, the inspection method combined with camera sensor with Lidar sensor and the improved system algorithm were presented. In addition, for the occurrence events of Lidar sensors and intelligent CCTV received during the operation of autonomous driving vehicles, the system algorithm for the elimination of overlapping events and the improvement of accuracy of the same time, place, and object was presented.

Estimation of a Driver's Physical Condition Using Real-time Vision System (실시간 비전 시스템을 이용한 운전자 신체적 상태 추정)

  • Kim, Jong-Il;Ahn, Hyun-Sik;Jeong, Gu-Min;Moon, Chan-Woo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.213-224
    • /
    • 2009
  • This paper presents a new algorithm for estimating a driver's physical condition using real-time vision system and performs experimentation for real facial image data. The system relies on a face recognition to robustly track the center points and sizes of person's two pupils, and two side edge points of the mouth. The face recognition constitutes the color statistics by YUV color space together with geometrical model of a typical face. The system can classify the rotation in all viewing directions, to detect eye/mouth occlusion, eye blinking and eye closure, and to recover the three dimensional gaze of the eyes. These are utilized to determine the carelessness and drowsiness of the driver. Finally, experimental results have demonstrated the validity and the applicability of the proposed method for the estimation of a driver's physical condition.

  • PDF

Alarm System for Sudden Infant Death using Bio-Signals (생체 신호를 활용한 영아 돌연사 알람 시스템)

  • Yun, Su-Jeong;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.197-202
    • /
    • 2016
  • In this paper, a danger signal to tell caregivers when a dangerous situation occurs, the bio-signal analysis in infants to prevent sudden infant death sudden infant death propose a monitoring system. The Sudden infant death (SID) refers to a healthy baby is unexplained deaths between birth year in the month. Sudden infant death proposed monitoring system is composed of a processor unit and the monitoring and alarm part for processing part and the biological signal sensing biological signals. Using the PPG sensor to sense the bio-signal and the processor unit the signal obtained through the sensor by removing the motion artifact was able to alarm and monitoring the parent.The proposed system will send the alarm to monitoring and alerting caregivers if the risk situation by analyzing the heart rate of the infant. With the actual implementation of the system to evaluate the performance of the monitoring system.

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.

A Study on Security System of 4G Network System (4세대 네트워크 시스템의 보안시스템에 관한 연구)

  • Kim, Hee-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.15-23
    • /
    • 2016
  • In this paper we presented 4G security models in an open environment. 4G networks have still more security holes and open issues for expert to notice. In here. we show that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. it tells about the security issues and vulnerabilities present in the above 4G standards.. we try to present several architectures behind 4G infrastructure for example WiMAX and 3GPP LTE architecture. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention. When you make a big dada program, If you use this network architecture then you can improve your learning speed.

A Big Data Application for Anomaly Detection in VANETs (VANETs에서 비정상 행위 탐지를 위한 빅 데이터 응용)

  • Kim, Sik;Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.175-181
    • /
    • 2014
  • With rapid growth of the wireless mobile computing network technologies, various mobile ad hoc network applications converged with other related technologies are rapidly disseminated nowadays. Vehicular Ad Hoc Networks are self-organizing mobile ad hoc networks that typically have moving vehicle nodes with high speeds and maintaining its topology very short with unstable communication links. Therefore, VANETs are very vulnerable for the malicious noise of sensors and anomalies of the nodes in the network system. In this paper, we propose an anomaly detection method by using big data techniques that efficiently identify malicious behaviors or noises of sensors and anomalies of vehicle node activities in these VANETs, and the performance of the proposed scheme is evaluated by a simulation study in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.