• Title/Summary/Keyword: 관제통신

Search Result 447, Processing Time 0.031 seconds

Unmanned Enforcement System for Illegal Parking and Stopping Vehicle using Adaptive Gaussian Mixture Model (적응적 가우시안 혼합 모델을 이용한 불법주정차 무인단속시스템)

  • Youm, Sungkwan;Shin, Seong-Yoon;Shin, Kwang-Seong;Pak, Sang-Hyon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.396-402
    • /
    • 2021
  • As the world is trying to establish smart city, unmanned vehicle control systems are being widely used. This paper writes about an unmanned parking control system that uses an adaptive background image modeling method, suggesting the method of updating the background image, modeled with an adaptive Gaussian mixture model, in both global and local way according to the moving object. Specifically, this paper focuses on suggesting two methods; a method of minimizing the influence of a moving object on a background image and a method of accurately updating the background image by quickly removing afterimages of moving objects within the area of interest to be monitored. In this paper, through the implementation of the unmanned vehicle control system, we proved that the proposed system can quickly and accurately distinguish both moving and static objects such as vehicles from the background image.

Development of an intelligent edge computing device equipped with on-device AI vision model (온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발)

  • Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.17-22
    • /
    • 2022
  • In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.

Utilizing Software-Defined Radio, Reception Test of AIS Payload Used in a Cube-Satellite (소프트웨어 정의 라디오를 활용한 초소형위성용 선박정보수집장치의 수신시험)

  • Kim, Shin-Hyung;Lee, Chang-Hyun;Kim, Gun-Woo;Cho, Dong-Hyun
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.121-136
    • /
    • 2022
  • Automatic Identification System used in ship communication is required for marine control way, including monitoring of vessel operation in coastal and exchanging of information for safety navigation between them. But, it uses a very high frequency band of approximately 160 MHz, and at the same time, due to the curvature of Earth, there is a limit to the communication distance. Several demonstrations were made successfully over satellite, but not much work has been done yet through cube-satellite which has low-orbit at 500 km altitude. Here, we demonstrate a reception test of AIS (automatic identification system) receiver for a cube-satellites using software-defined radio (SDR). We collected AIS data from ship at port of Busan, Korea, using R8202T2 SDR and established to transmit them using Adam-Pluto and Matlab Simulink. The process of weakening the signal strength to a satellite was constructed using attenuator. Through above process, we demonstrated whether AIS data was successfully received from the AIS payload.

An Acceleration Method for Processing LiDAR Data for Real-time Perimeter Facilities (실시간 경계를 위한 라이다 데이터 처리의 가속화 방법)

  • Lee, Yoon-Yim;Lee, Eun-Seok;Noh, Heejeon;Lee, Sung Hyun;Kim, Young-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.101-103
    • /
    • 2022
  • CCTV is mainly used as a real-time detection system for critical facilities. In the case of CCTV, although the accuracy is high, the viewing angle is narrow, so it is used in combination with a sensor such as a radar. LiDAR is a technology that acquires distance information by detecting the time it takes to reflect off an object using a high-power pulsed laser. In the case of lidar, there is a problem in that the utilization is not high in terms of cost and technology due to the limitation of the number of simultaneous processing sensors in the server due to the data throughput. The detection method by the optical mesh sensor is also vulnerable to strong winds and extreme cold, and there is a problem of maintenance due to damage to animals. In this paper, by using the 1550nm wavelength band instead of the 905nm wavelength band used in the existing lidar sensor, the effect on the weather environment is strong and we propose to develop a system that can integrate and control multiple sensors.

  • PDF

Attack Detection Technology through Log4J Vulnerability Analysis in Cloud Environments (클라우드 환경에서 Log4J 취약점 분석을 통한 공격 탐지 기술)

  • Byeon, Jungyeon;Lee, Sanghee;Yoo, Chaeyeon;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.557-559
    • /
    • 2022
  • The use of open source has the advantage that the development environment is convenient and maintenance is easier, but there is a limitation in that it is easy to be exposed to vulnerabilities from a security point of view. In this regard, the LOG4J vulnerability, which is an open source logging library widely used in Apache, was recently discovered. Currently, the risk of this vulnerability is at the 'highest' level, and developers are using it in many systems without being aware of such a problem, so there is a risk that hacking accidents due to the LOG4J vulnerability will continue to occur in the future. In this paper, we analyze the LOG4J vulnerability in detail and propose a SNORT detection policy technology that can detect vulnerabilities more quickly and accurately in the security control system. Through this, it is expected that in the future, security-related beginners, security officers, and companies will be able to efficiently monitor and respond quickly and proactively in preparation for the LOG4J vulnerability.

  • PDF

A Study on the Procedure for Applying Digital Twin to Disaster and Aging Management of Port Infrastructure (항만 인프라 재해와 노후화 관리를 위한 디지털 트윈 적용 절차에 관한 연구)

  • Hye-Jung Chang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.3
    • /
    • pp.138-151
    • /
    • 2023
  • Korea's port infrastructure is rapidly aging, with old port facilities with more than 30 years of public life expected to surge from about 23% in 2019 to 47% in 2029. Traditional, aging ports lose competitiveness in logistics processing, reducing development around the port and increasing human casualties due to the human resource-based maintenance of the facilities. Therefore, it is necessary to solve this problem by establishing systematic management technology based on a digital twin. This research aimed to present the specific implementation steps of a digital twin reflecting smart port technology through cases of port infrastructure disasters, aging status, and smart ports. The study analyzed the port infrastructure linkage system and created and mapped scenarios essential for digital twin implementation. Three-dimensional (3D) modeling and simulation data for disaster and aging management among existing port infrastructure systems were collected. A digital twin port was implemented with 3D modeling. It implements a port digital twin simulation that links data such as sensing data and image data acquired from the port infrastructure in real time. Implementing a digital twin port for port infrastructure disasters and aging management can secure predictive port infrastructure management and disaster safety

Mobile-based smart same-time broadcasting services using locational information of urban railway users (도시철도 이용자의 위치정보를 활용한 모바일 기반 스마트 일제방송 서비스)

  • Eung-young Cho;Joong-Yoon Lee;Joo-Yeoun Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.207-213
    • /
    • 2023
  • The control center of an urban railway operator provides railway users with various information on railway use through a 1:N same-time broadcasting system. However, the facilities of the broadcasting system are aging, exposing many limitations in meeting the needs of urban railway users who have become familiar with mobile services. To overcome these challenges, this study analyzed the mobile-based same-time broadcasting services using location information of urban railway users and the requirements of various stakeholders (urban railway users, an operator, and external service providers, etc.) to suggest optimal service models and physical structures. Through this study, it aims to secure safer operations of urban railway as well as to improve better disaster responses through rapid and efficient spread of the situation in case of disaster.

A Method to Acquire Bigdata for Predicting Accidents on Power Switchboards (배전반 안전사고 예측을 위한 빅데이터 자료 획득 방안)

  • Lee, Hyeon Sup;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.351-353
    • /
    • 2021
  • In recent years, while the demand for electricity is rapidly increasing, fire accidents due to negligence in management of switchboards. In particular, switchboards for industrial and electrical resource control can cause serious problems. Thus, for the safety management of power switchboard, a secondary response is conducted to control firing when a specific condition value is satisfied, but in this case, it is highly likely that a considerable amount of time has elapsed after firing. In this paper, we propose a method to acquire big data for the development of a switchboard temperature and power control system that can actively respond to the current situation by monitoring and learning the temperature of the switchboard's busbar connection in real time. Specifically, a method for periodically acquiring and managing data such as temperature and power from various scattered sensors is proposed.

  • PDF

Proposal of a method of using HSV histogram data learning to provide additional information in object recognition (객체 인식의 추가정보제공을 위한 HSV 히스토그램 데이터 학습 활용 방법 제안)

  • Choi, Donggyu;Wang, Tae-su;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.6-8
    • /
    • 2022
  • Many systems that use images through object recognition using deep learning have provided various solutions beyond the existing methods. Many studies have proven its usability, and the actual control system shows the possibility of using it to make people's work more convenient. Many studies have proven its usability, and actual control systems make human tasks more convenient and show possible. However, with hardware-intensive performance, the development of models is facing some limitations, and the ease with the use and additional utilization of many unupdated models is falling. In this paper, we propose how to increase utilization and accuracy by providing additional information on the emotional regions of colors and objects by utilizing learning and weights from HSV color histograms of local image data recognized after conventional stereotyped object recognition results.

  • PDF

Modification of the V-PASS Storage Structure for Precise Analysis of Maritime Vessel Accident (해양사고 정밀분석을 위한 V-PASS 저장구조 개선 연구)

  • Byung-Gil Lee;Dong-Hol Kang;Ki-Hyun Jyung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.98-99
    • /
    • 2023
  • In the maritime digital forensic part, it is very important and difficult process that analysis of data and information with vessel navigation system's binary log data for situation awareness of maritime accident. In recent years, analysis of vessel's navigation system's trajectory information is an essential element of maritime accident investigation. So, we made an experiment about corruption with various memory device in navigation system. The analysis of corruption test in seawater give us important information about the valid pulling time of sunken ship for acquirement useful trajectory information.

  • PDF