• 제목/요약/키워드: 관제통신

검색결과 447건 처리시간 0.025초

Smart Escape Support System for Passenger Ship : Active Dynamic Signage & Real-time Escape Routing (능동형 피난유도기기와 실시간 피난경로생성 기술을 적용한 여객선 스마트 인명대피 시스템)

  • Choi, James;Yang, Chan-Su
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 한국항해항만학회 2017년도 추계학술대회
    • /
    • pp.79-85
    • /
    • 2017
  • It is critical that passengers should be given timely and correct escape or evacuation guidance from captain and crews when there are hazardous situations in a ship. Otherwise the consequences could be disastrous as "SEWOL Ferry" the South Korean passenger ship which sank in southern coastal area on 16th April 2014. Due to the captain's delayed evacuation decision and lack of sufficient number of crews to guide passengers' evacuation, the accident recorded many casualties, most of whom were high school students (302 passengers sank down with the ship while 172 rescued). Building a passenger ship with well-designed physical escape routes is one thing and guiding passengers to those escape routes in real disaster situation is another. Passengers get panic and move to a wrong direction, bottleneck makes situation worse, and even crews get panic also - passive static escape route signage and small number of trained crews might not be enough to take care of them. SESS (Smart Escape Support System) is being developed sponsored by South Korea Ministry of Ocean and Fisheries starting from 2016 with 4 years of roadmap. SESS comprises multiple active dynamic signage devices which communicate with real-time escape routing server software via LoRa (Long Range) proprietary wireless network.

  • PDF

Development of Mobile System for Crop Situation Investigation using GPS based on GIS (GIS기반 GPS를 이용한 농작물 작황 조사 모바일 시스템 구축)

  • Mun, Young-Chae;Lee, Hong-Ro
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • 제11권4호
    • /
    • pp.22-31
    • /
    • 2008
  • Recently, with the develop of the location tracking technology using GPS and mobile device such as PDA and UMPC, it is used in various application fields that is coordinate transformation and compensation using GPS, is client development for Mobile GIS using GIS and is development of surface survey system for archaeological site based on mobile. In this paper, we develop the system that can investigate the growth information and production information of rice in crop of the field using mobile device, show position information of user and rice in digital map using GIS and save the investigated crop information and position information in database in server. The system which is developed in this paper consists of modules that the user management module is able to restrict database approaches in authority by of the user, the crops management module is able to save and search crop information in database in server, the map module is able to show position information of user and crops in digital map, the location information module is able to convert received location information from GPS and the communication module is able to send and receive data between GPS and mobile device and between mobile device and database. Finally, this paper shall contribute to efficient management and investigation of birth information of crop in field.

  • PDF

Development of Remote Mornitoring Web System for National Control Points using RFID Tags (RFID를 이용한 국가기준점 원격 모니터링 웹 시스템 개발)

  • Oh, Yoon-Seuk;Lee, Young-Kyun;Park, Jae-Min
    • Spatial Information Research
    • /
    • 제15권3호
    • /
    • pp.237-249
    • /
    • 2007
  • There are about 22,000 national control points throughout this nation. However, in order to identify the location data of a national control point, a control point result table is needed. And although the control points are important national facilities, due to the fact that these points located at remote areas such as on top of mountains, the facilities are being maintained via on-site inspection without any protections around them. In this research, by taking the locations where the control points are placed into consideration, a specialized RFID tags that can be attached to the national control point's marker has been developed, and CDMA-ready PDA based mobile Web System and national control point control system are developed as well. With help of these systems, control point data can be checked at the seen, and national control point maintenance personnel can find out about maintenance status and keep track of usage record. When these systems are taken into effect, access to the national control point data becomes easy, fast response to the change in data can be possible, and management efficiency will go up. When the Ubiquitous society becomes reality, the importance of location information will be high. Therefore, national control points using above mentioned RFID tags will not only be useful to the control point users and maintenance personnels such as professional land surveyors, but also useful when providing location based services to people, and it will become an important national infrastructure in terms of providing absolute location information.

  • PDF

Design of an Efficient Control System for Harbor Terminal based on the Commercial Network (상용망 기반의 항만터미널 효율적인 관제시스템 설계)

  • Kim, Yong-Ho;Ju, YoungKwan;Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • 제16권1호
    • /
    • pp.21-26
    • /
    • 2018
  • The Seaborne Trade Volume accounts for 97% of the total. This means that the port operation management system can improve port efficiency, reducing operating costs, and the manager who manages all operations at the port needs to check and respond quickly when delays of work and equipment support is needed. Based on the real-time location information confirmation of yard automation equipment used the existing system GPS, the real-time location information confirmation system is a GPS system of the tablet, rather than a port operation system that monitors location information for the entered information, depending on the completion of the task or the start of the task. Network configurations also reduce container processing delays by using commercial LTE services that do not have shading due to containers in the yard also reduce container processing delays. Trough introduction of smart devices using Android or IOS and container processing scheduling utilizing artificial intelligence, we will build a minimum delay system with Smart Device usage of container processing applications and optimization of container processing schedule. The adoption of smart devices and the minimization of container processing delays utilizing artificial intelligence are expected to improve the quality of port services by confirming the processing containers in real time to consumers who are container information demanders.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제33권2호
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • 제19호
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

A study on the impact and activation plan of unmanned aerial vehicle service (무인항공기 서비스 영향성과 활성화 방안 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제22권2호
    • /
    • pp.1-7
    • /
    • 2022
  • The purpose of this study is to discuss the impact of unmanned aerial vehicle service and how to activate it. The discussion on the impact of the introduction of the unmanned aerial vehicle service was examined in terms of economic, environmental, and social acceptance, and a plan to revitalize the industry was presented. In terms of economic impact, if transportation services are increased using unmanned aerial vehicles in the future, road-based transportation cargo may decrease and road movement speed may increase due to reduced road congestion. This can have a positive effect on the increase in the value of land or real estate assets, and it also provides an impact on smart city design. In terms of environmental impact, unmanned aerial vehicles (UAVs) generally move through electricity, so they emit less exhaust gas compared to other existing devices, such as vehicles and railroads, and thus have less environmental impact. However, noise can have a negative impact on the habitat in the presence of wild animals along their migration routes. In terms of social acceptability of unmanned aerial vehicles (UAV) technology, areas that are declining due to the emergence of new services may appear, and at the same time, organizations that create profits may appear, causing conflicts between industries. Therefore, it is essential to form a social consensus on the acceptance of emerging industries. The government should come up with various countermeasures to minimize the negative impact that reflects the characteristics of the unmanned aerial vehicle use service. Just as various systems such as road signs were introduced so that vehicles can be operated on the ground to secure air routes in the mid- to long-term for revitalization of unmanned-based industries, development and establishment of services that should be introduced and applied prior to constructing air routes I need this. In addition, the design and implementation of information collection and operation plans for unmanned air traffic management in Korea and a plan to secure a control system for each region should also be made. This study can contribute to providing ideas for mid- to long-term research on new areas with the development of the unmanned aerial vehicle industry.