• Title/Summary/Keyword: 데이터 모니터링 시스템

Search Result 1,851, Processing Time 0.029 seconds

A study on the 3-step classification algorithm for the diagnosis and classification of refrigeration system failures and their types (냉동시스템 고장 진단 및 고장유형 분석을 위한 3단계 분류 알고리즘에 관한 연구)

  • Lee, Kangbae;Park, Sungho;Lee, Hui-Won;Lee, Seung-Jae;Lee, Seung-hyun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.31-37
    • /
    • 2021
  • As the size of buildings increases due to urbanization due to the development of industry, the need to purify the air and maintain a comfortable indoor environment is also increasing. With the development of monitoring technology for refrigeration systems, it has become possible to manage the amount of electricity consumed in buildings. In particular, refrigeration systems account for about 40% of power consumption in commercial buildings. Therefore, in order to develop the refrigeration system failure diagnosis algorithm in this study, the purpose of this study was to understand the structure of the refrigeration system, collect and analyze data generated during the operation of the refrigeration system, and quickly detect and classify failure situations with various types and severity . In particular, in order to improve the classification accuracy of failure types that are difficult to classify, a three-step diagnosis and classification algorithm was developed and proposed. A model based on SVM and LGBM was presented as a classification model suitable for each stage after a number of experiments and hyper-parameter optimization process. In this study, the characteristics affecting failure were preserved as much as possible, and all failure types, including refrigerant-related failures, which had been difficult in previous studies, were derived with excellent results.

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.

A Study on The RFID/WSN Integrated system for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 RFID/WSN 통합 관리 시스템에 관한 연구)

  • Park, Yong-Min;Lee, Jun-Hyuk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.31-46
    • /
    • 2012
  • The most critical technology to implement ubiquitous health care is Ubiquitous Sensor Network (USN) technology which makes use of various sensor technologies, processor integration technology, and wireless network technology-Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN)-to easily gather and monitor actual physical environment information from a remote site. With the feature, the USN technology can make the information technology of the existing virtual space expanded to actual environments. However, although the RFID and the WSN have technical similarities and mutual effects, they have been recognized to be studied separately, and sufficient studies have not been conducted on the technical integration of the RFID and the WSN. Therefore, EPCglobal which realized the issue proposed the EPC Sensor Network to efficiently integrate and interoperate the RFID and WSN technologies based on the international standard EPCglobal network. The proposed EPC Sensor Network technology uses the Complex Event Processing method in the middleware to integrate data occurring through the RFID and the WSN in a single environment and to interoperate the events based on the EPCglobal network. However, as the EPC Sensor Network technology continuously performs its operation even in the case that the minimum conditions are not to be met to find complex events in the middleware, its operation cost rises. Moreover, since the technology is based on the EPCglobal network, it can neither perform its operation only for the sake of sensor data, nor connect or interoperate with each information system in which the most important information in the ubiquitous computing environment is saved. Therefore, to address the problems of the existing system, we proposed the design and implementation of USN integration management system. For this, we first proposed an integration system that manages RFID and WSN data based on Session Initiation Protocol (SIP). Secondly, we defined the minimum conditions of the complex events to detect unnecessary complex events in the middleware, and proposed an algorithm that can extract complex events only when the minimum conditions are to be met. To evaluate the performance of the proposed methods we implemented SIP-based integration management system.

A Study on Termite Monitoring Method Using Magnetic Sensors and IoT(Internet of Things) (자력센서와 IoT(사물인터넷)를 활용한 흰개미 모니터링 방법 연구)

  • Go, Hyeongsun;Choe, Byunghak
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.1
    • /
    • pp.206-219
    • /
    • 2021
  • The warming of the climate is increasing the damage caused by termites to wooden buildings, cultural properties and houses. A group removal system can be installed around the building to detect and remove termite damage; however, if the site is not visited regularly, every one to two months, you cannot observe whether termites have spread within, and it is difficult to take prompt effective action. In addition, since the system is installed and operated in an exposed state for a long period of time, it may be ineffective or damaged, resulting in a loss of function. Furthermore if the system is installed near a cultural site, it may affect the aesthetic environment of the site. In this study, we created a detection system that uses wood, cellulose, magnets, and magnetic sensors to determine whether termites have entered the area. The data was then transferred to a low power LoRa Network which displayed the results without the necessity of visiting the site. The wood was made in the shape of a pile, and holes were made from the top to the bottom to make it easier for termites to enter and produce a cellulose sample. The cellulose sample was made in a cylindrical shape with a magnet wrapped in cellulose and inserted into the top of a hole in the wood. Then, the upper part of the wood pile was covered with a stopper to prevent foreign matter from entering. It also served to block external factors such as light and rainfall, and to create an environment where termites could add cellulose samples. When the cellulose was added by the termites, a space was created around the magnet, causing the magnet to either fall or tilt. The magnetic sensor inside the stopper was fixed on the top of the cellulose sample and measured the change in the distance between the magnet and the sensor according to the movement of the magnet. In outdoor experiments, 11 cellulose samples were inserted into the wood detection system and the termite inflow was confirmed through the movement of the magnet without visiting the site within 5 to 17 days. When making further improvements to the function and operation of the system it in the future, it is possible to confirm that termites have invaded without visiting the site. Then it is also possible to reduce damage and fruiting due to product exposure, and which would improve the condition and appearance of cultural properties.

A Study on Resolving Shadow Area of LoRa-based Communication for Workplace Safety (작업현장의 안전을 위한 LoRa기반 통신의 음영지역 해소를 위한 연구)

  • Kim, Seungyong;Kim, Dongsik;Hwang, Incheol;Kim, Kyoungsoo;Kim, Gyoungyong
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.2
    • /
    • pp.402-410
    • /
    • 2020
  • Purpose: The purpose of this research is to eliminate communication shadowing loss of the 'smart safety management system'. The 'smart safety management system' can monitor and relay real time data of workers working in high risk workplace (i.e: industrial scene, disaster scene). The data will provide the rescue team the 'golden hour' in their rescue operations. Method: In this research, safety tag was designed and implemented so that it acts as a repeater for the user. Result: In other words, when communication in-between the safety tag and headquarters' communication terminal is jeopardized, the safety tag will act as a repeater-terminal for other safety tags in the area. Conclusion: The research tested if a specific building with communication shadowing loss problem was resolved when safety tags were implemented. Communication shadowing was first identified in-between the safety tag and headquarters' communication terminal. When extra safety tags were deployed in the same situation, the results showed that the communication shadowing loss was resolved. The repeater safety tags could resolve communication shadowing loss of up to three basement levels in this test building.

A Study on Evaluation System of Track Support Stiffness for Concrete Tracks (콘크리트궤도의 궤도지지강성 평가시스템에 관한 연구)

  • Choi, Jung-Youl;Kim, Man-Hwa;Kim, Hyun-Soo;Chung, Jee-Seung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.535-541
    • /
    • 2020
  • A conventional elastic material replacement and performance evaluation are very complicated and time-consuming, and it is difficult to know when to replace the elastic material in advance. By comparing with the product limit and the functional limit, the necessity of elastic material replacement and the improvement of track support stiffness according to replacement can be immediately demonstrated based on experimental data. Using an evaluation system of track support stiffness, the performance evaluation data for elastic materials obtained through field tests using software for track support stiffness is integrated and managed on the administrator's computer. Therefore, the replacement plan is established and maintenance history is managed by identifying the replacement time and location of elastic materials. It is possible to evaluate the performance and condition of the elastic material at the various points during the working time of the track inspection and the track performance (track support stiffness) and durability of the elastic material (aging level, spring stiffness variation rate, etc.) at the operation condition. The elastic material could be replaced timely, and the deterioration of the elastic material can be continuously monitored.

Implementation of Acceleration Sensor-based Human activity and Fall Classification Algorithm (가속도 센서기반의 인체활동 및 낙상 분류를 위한 알고리즘 구현)

  • Hyun Park;Jun-Mo Park;Yeon-Chul, Ha
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.76-83
    • /
    • 2022
  • With the recent development of IT technology, research and interest in various biosignal measuring devices is increasing. As an aging society is in full swing, research on the elderly population using IT-related technologies is continuously developing. This study is about the development of life pattern detection and fall detection algorithm, which is one of the medical service areas for the elderly, who are rapidly developing as they enter a super-aged society. This study consisted of a system using a 3-axis accelerometer and an electrocardiogram sensor, collected data, and then analyzed the data. It was confirmed that behavioral patterns could be classified from the actual research results. In order to evaluate the usefulness of the human activity monitoring system implemented in this study, experiments were performed under various conditions, such as changes in posture and walking speed, and signal magnitude range and signal vector magnitude parameters reflecting the acceleration of gravity of the human body and the degree of human activity. was extracted. And the possibility of discrimination according to the condition of the subject was examined by these parameter values.

A Case Study on Field Campaign-Based Absolute Radiometric Calibration of the CAS500-1 Using Radiometric Tarp (Radiometric Tarp를 이용한 현장관측 기반의 차세대중형위성 1호 절대복사보정 사례 연구)

  • Woojin Jeon;Jong-Min Yeom;Jae-Heon Jung;Kyoung-Wook Jin;Kyung-Soo Han
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.6_1
    • /
    • pp.1273-1281
    • /
    • 2023
  • Absolute radiometric calibration is a crucial process in converting the electromagnetic signals obtained from satellite sensors into physical quantities. It is performed to enhance the accuracy of satellite data, facilitate comparison and integration with other satellite datasets, and address changes in sensor characteristics over time or due to environmental conditions. In this study, field campaigns were conducted to perform vicarious calibration for the multispectral channels of the CAS500-1. Two valid field observations were obtained under clear-sky conditions, and the top-of-atmosphere (TOA) radiance was simulated using the MODerate resolution atmospheric TRANsmission 6 (MODTRAN 6) radiative transfer model. While a linear relationship was observed between the simulated TOA radiance of tarps and CAS500-1 digital numbers(DN), challenges such as a wide field of view and saturation in CAS500-1 imagery suggest the need for future refinement of the calibration coefficients. Nevertheless, this study represents the first attempt at absolute radiometric calibration for CAS500-1. Despite the challenges, it provides valuable insights for future research aiming to determine reliable coefficients for enhanced accuracy in CAS500-1's absolute radiometric calibration.

A Study on the Application Service of 3D BIM-based Disaster Integrated Information System Management for Effective Disaster Response (효과적인 재난 대응을 위한 3차원 BIM 기반 재난 통합정보 시스템 활용 서비스 제시)

  • Kim, Ji-Eun;Hong, Chang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.143-150
    • /
    • 2018
  • Periodic and systemic disaster management has become more important than ever owing to the recent continuous occurrence of disasters, such as fires, earthquakes, and flooding. This management goes beyond simple disaster preparedness, which was introduced minimally under the existing legal system. For effective disaster management, facilities should be managed through regular maintenance on a daily basis, and in the case of an emergency, intuitive and accurate communication is essential regarding the situation and purpose. BIM manages the entire building property data using the effective 3D visualization model, so it can be used for various management purposes from design to facility maintenance. In this study, through an expert survey on the use of services in a BIM-based integrated disaster information system, the available areas of BIM data were organized in terms of facility information management, 3D visualization, and disaster control. Later, through the use service and DB definition within the BIM-based disaster integration information system, the main facilities monitoring and response services based on BIM and BIM-based spatial management service are proposed. Based on this study, it is hoped that the BIM-based application service functions within the system will be implemented to enable an effective system response.

An Adaptive Authentication Protocol for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 적응형 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.19-26
    • /
    • 2018
  • In recent years, the substantial increase in the population's average age leads to an exceeded number of older persons comparing with the number of any other age group. As a result, both industry and academia are focused on the development of several solutions aimed to guarantee a healthy and safe lifestyle to the elderly. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can also provide more safety for the elderly, offering emergency response mechanisms, fall detection solutions, and video surveillance systems. Unfortunately, due to the sensitive nature of AAL data, AAL systems should satisfy security requirements such as integrity, confidentiality, availability, anonymity, and others. In this paper, we propose an adaptive authentication protocol for the AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.