• Title/Summary/Keyword: 관제석

Search Result 53, Processing Time 0.021 seconds

A Study of Location Based Services Using Location Data Index Techniques (위치데이터인덱스 기법을 적용한 위치기반서버스에 관한 연구)

  • Park Chang-Hee;Kim Jang-Hyung;Kang Jin-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.595-605
    • /
    • 2006
  • In this thesis, GPS and the electronic mapping were used to realize such a system by recognizing license plate numbers and identifying the location of objects that move at synchronous times with simulated movement in the electronic map. As well, throughout the study, a camera attached to a PDA, one of the mobile devices, automatically recognized and confirmed acquired license plate numbers from the front and back of each car. Using this mobile technique in a wireless network, searches for specific plate numbers and information about the location of the car is transmitted to a remote server. The use of such a GPS-based system allows for the measurement of topography and the effective acquisition of a car's location. The information is then transmitted to a central controlling center and stored as text to be reproduced later in the form of diagrams. Getting positional information through GPS and using image-processing with a PDA makes it possible to estimate the correct information of a car's location and to transmit the specific information of the car to a control center simultaneously, so that the center will get information such as type of the car, possibility of the defects that a car might have, and possibly to offer help with those functions. Such information can establish a mobile system that can recognize and accurately trace the location of cars.

  • PDF

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Using the SIEM Software vulnerability detection model proposed (SIEM을 이용한 소프트웨어 취약점 탐지 모델 제안)

  • Jeon, In-seok;Han, Keun-hee;Kim, Dong-won;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.961-974
    • /
    • 2015
  • With the advancement of SIEM from ESM, it allows deep correlated analysis using huge amount of data. By collecting software's vulnerabilities from assessment with certain classification measures (e.g., CWE), it can improve detection rate effectively, and respond to software's vulnerabilities by analyzing big data. In the phase of monitoring and vulnerability diagnosis Process, it not only detects predefined threats, but also vulnerabilities of software in each resources could promptly be applied by sharing CCE, CPE, CVE and CVSS information. This abstract proposes a model for effective detection and response of software vulnerabilities and describes effective outcomes of the model application.

A Study on the Degree of Collision Risk through Analysing the Risk Attitude of Vessel Traffic Service Operators (해상교통관제사의 위험태도 분석을 통한 선박 충돌 위험도 연구)

  • Lee, Jin-Suk;Song, Chae-Uk
    • Journal of Navigation and Port Research
    • /
    • v.41 no.3
    • /
    • pp.93-102
    • /
    • 2017
  • When VTSOs (Vessel Traffic Service Operator) determine the degree of collision risk for two vessels, they consider comprehensive information about each vessel's course, speed, DCPA, TCPA, and encountering situation. In this study, we proposed a utility function based on the risk attitudes of VTSOs toward the Risk Index (RI). The RI was calculated using the risk of encounter, the risk of approach, and the risk of time for two vessels in order to predict each ship's collision risk from the VTS viewpoint. We obtained each coefficient of the RI and the risk attitude through a survey of collision risks among VTSOs of Korea. In order to verify whether the proposed utility is reasonable, we validated by applying the degree of collision risk to some historical cases of accidents in Busan port along with the Ship of ES value($ES_S$) of ES(Environmental Stress) model.

Real-Time License Plate Detection Based on Faster R-CNN (Faster R-CNN 기반의 실시간 번호판 검출)

  • Lee, Dongsuk;Yoon, Sook;Lee, Jaehwan;Park, Dong Sun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.11
    • /
    • pp.511-520
    • /
    • 2016
  • Automatic License Plate Detection (ALPD) is a key technology for a efficient traffic control. It is used to improve work efficiency in many applications such as toll payment systems and parking and traffic management. Until recently, the hand-crafted features made for image processing are used to detect license plates in most studies. It has the advantage in speed. but can degrade the detection rate with respect to various environmental changes. In this paper, we propose a way to utilize a Faster Region based Convolutional Neural Networks (Faster R-CNN) and a Conventional Convolutional Neural Networks (CNN), which improves the computational speed and is robust against changed environments. The module based on Faster R-CNN is used to detect license plate candidate regions from images and is followed by the module based on CNN to remove False Positives from the candidates. As a result, we achieved a detection rate of 99.94% from images captured under various environments. In addition, the average operating speed is 80ms/image. We implemented a fast and robust Real-Time License Plate Detection System.

A Study on the Institutional Improvement for Establishment of Occupational Identity and Occupational Prestige of Private Security (민간경비의 직업정체성과 직업명망 확립을 위한 제도적 개선방안 연구 : 한국표준직업분류상 경비원 직업분류의 개선을 중심으로)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.187-203
    • /
    • 2017
  • This study focuses on analyzing the problems of the Korean standard classification of occupations(KSCO), which is a formal and institutional implementation method that affects the occupational identity and Occupational Prestige of Private Security, and suggests ways to improve it. The following should be supplemented. (1) It is necessary to unify occupations related to private security that are classified into simple labor workers. (2) Delete the Technical Security Guards(4123) and create a Security Guard(4123) instead. (3) Facility Security Guards(41230), Convoy Security Guards, Technical Security Guards(41232), Security monitoring and control personnel(41233), and Special Security Guards(National important facility security guard)(41234) will be newly established. (4) Change the name of subclassification and subclassification in simple labor worker of Major Class 9(Code 9), and adjust Security Guards(9421) to the Surveillance Personnel(9421).

A Study on Phase of Arrival Pattern using K-means Clustering Analysis (K-Means 클러스터링을 활용한 선박입항패턴 단계화 연구)

  • Lee, Jeong-Seok;Lee, Hyeong-Tak;Cho, Ik-Soon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2020.11a
    • /
    • pp.54-55
    • /
    • 2020
  • In 4th Industrial Revolution, technologies such as artificial intelligence, Internet of Things, and Big data are closely related to the maritime industry, which led to the birth of autonomous vessels. Due to the technical characteristics of the current vessel, the speed cannot be suddenly lowered, so complex communication such as the help of a tug boat, boarding of a pilot, and control of the vessel at the onshore control center is required to berth at the port. In this study, clustering analysis was used to resolve how to establish control criteria for vessels to enter port when autonomous vessels are operating. K-Means clustering was used to quantitatively stage the arrival pattern based on the accumulated AIS(Automatic Identification System) data of the incoming vessel, and the arrival phase using SOG(Speed over Ground), COG(Course over Ground), and ROT(Rate of Turn) Was divided into six phase.

  • PDF

A Study on the Traffic Improvement at an Approach Area of Busan Harbor (부산항 제1항로 진입 해역의 통항 개선에 관한 연구)

  • Lee, Yun-Sok;Jung, Min;Song, Chae-Uk;Park, Jin-Soo;Park, Young-Soo;Cho, Ik-Soon
    • Journal of Navigation and Port Research
    • /
    • v.31 no.5 s.121
    • /
    • pp.345-351
    • /
    • 2007
  • In approaching sea area of Busan harbour, there are many traffic vessels and external forces such as strong seasonal wind and lateral flow are existed. Since the area caused the risk of navigation and ship operators feel hard to enter/depart on Busan port, we carried our the evaluation of traffic risk and propriety at Busan no.1 fairway. In order to assess the safety in the fairway, we analyzed ship's traffic stream based on the marine traffic survey and evaluated the traffic safety of present Traffic Separation Schemes(TSS) and suggest TSS in the research using full mission ship-handling simulators. As a result, the suggested TSS has an effect on improving the traffic safety. In addition, this paper was to suggest the dredging area of depth of water, the passage of towing vessels and control of warships for preventing of maritime accidents in the Busan no.1 fairway.

A Study on the Traffic Stream and Navigational Characteristics at the Adjacent Sea Area of Busan Central Wharf (부산 중앙부두 주변 해역의 교통 흐름 및 통항 특성에 관한 연구)

  • Kim Se-Won;Lee Yun-Sok;Park Young-Soo;Kim Jong-Sung;Yun Gwi-Ho;Kim Dae-Hee
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2005.10a
    • /
    • pp.103-109
    • /
    • 2005
  • At the adjacent sea area of Busan Central Wharf, a variety of vessels, such as middle-large passenger ships, small fast sailing ships, container ships, cargo ships and working ships as well as small miscellaneous vessels are freely sailing comparatively without special steering and sailing Rules and marine traffic control because exclusive wharfs in accord with their purpose and use have been arranged in each wharf. In this research, we analyzed traffic stream and navigational characteristics of main traffic route based on statistics and distribution of tracks by ship's type and tonnage of the passing vessels after conducting marine traffic survey twice using exclusive software by targeting the sea area during the period of time. We examined the traffic safety of the passing vessels by classifying the sea area by each function based on the analysis about this traffic situation, and analyzing the effect by designating 'Buknea passage'. We also studied the plan for the effective rearrangement of Central Wharf considering basically the traffic safety oif arrival and departure in a point if view of navigators.

  • PDF

Basic Research for the Development of Collision Risk Model of Passing Vessels at an Anchorage (Safety Domain) (정박지 통항선박의 충돌위험 모델 개발을 위한 기초연구 - 정박지 통항선박의 안전 -)

  • Lee, Jin-Suk;Kwon, Yumin;Choi, Jung-Suk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.1
    • /
    • pp.67-73
    • /
    • 2021
  • The purpose of this study is to obtain a safe area for a passing vessel between anchored vessels by developing a model to predict the collision risk, frequent collisions occur between the anchored vessel and the passing vessel through the anchorage. For this, this study selected the southern anchorage of Busan port, which is the largest harbor in Korea, as the target area and extracted and analyzed VTS (Vessel Traffic Service) data during the period in which anchored vessels were the most waited. The ratio of D/L for each bearing was obtained to determine the safe distance (D) passes based on the length (L) of the passing vessel between anchored vessels. Based on the average domain of the D/L ratio distribution, the percentage of anchored vessels within the scope of the pre-studied ship's domain was analyzed to obtain a domain reflecting the degree of risk of VTSOs. Further research will evaluate and analyze the collision risk of a passing vessel using Domain-watch, the minimum safe distance between anchored vessels, and the safe domain of a passing vessel through anchorage, to develop a model for VTS to manage anchorages more efficiently and safely.