• Title/Summary/Keyword: 스마트 안전 시스템

Search Result 877, Processing Time 0.028 seconds

Acoustic Emission (AE) Technology-based Leak Detection System Using Macro-fiber Composite (MFC) Sensor (Macro fiber composite (MFC) 센서를 이용한 음향방출 기술 기반 배관 누수 감지 시스템)

  • Jaehyun Park;Si-Maek Lee;Beom-Joo Lee;Seon Ju Kim;Hyeong-Min Yoo
    • Composites Research
    • /
    • v.36 no.6
    • /
    • pp.429-434
    • /
    • 2023
  • In this study, aimed at improving the existing acoustic emission sensor for real time monitoring, a macro-fiber composite (MFC) transducer was employed as the acoustic emission sensor in the gas leak detection system. Prior to implementation, structural analysis was conducted to optimize the MFC's design. Consequently, the flexibility of the MFC facilitated excellent adherence to curved pipes, enabling the reception of acoustic emission (AE) signals without complications. Analysis of AE signals revealed substantial variations in parameter values for both high-pressure and low-pressure leaks. Notably, in the parameters of the Fast Fourier Transform (FFT) graph, the change amounted to 120% to 626% for high-pressure leaks compared to the case without leaks, and approximately 9% to 22% for low-pressure leaks. Furthermore, depending on the distance from the leak site, the magnitude of change in parameters tended to decrease as the distance increased. As the results, in the future, not only will it be possible to detect a leak by detecting the amount of parameter change in the future, but it will also be possible to identify the location of the leak from the amount of change.

Improvement of Face Recognition Algorithm for Residential Area Surveillance System Based on Graph Convolution Network (그래프 컨벌루션 네트워크 기반 주거지역 감시시스템의 얼굴인식 알고리즘 개선)

  • Tan Heyi;Byung-Won Min
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.1-15
    • /
    • 2024
  • The construction of smart communities is a new method and important measure to ensure the security of residential areas. In order to solve the problem of low accuracy in face recognition caused by distorting facial features due to monitoring camera angles and other external factors, this paper proposes the following optimization strategies in designing a face recognition network: firstly, a global graph convolution module is designed to encode facial features as graph nodes, and a multi-scale feature enhancement residual module is designed to extract facial keypoint features in conjunction with the global graph convolution module. Secondly, after obtaining facial keypoints, they are constructed as a directed graph structure, and graph attention mechanisms are used to enhance the representation power of graph features. Finally, tensor computations are performed on the graph features of two faces, and the aggregated features are extracted and discriminated by a fully connected layer to determine whether the individuals' identities are the same. Through various experimental tests, the network designed in this paper achieves an AUC index of 85.65% for facial keypoint localization on the 300W public dataset and 88.92% on a self-built dataset. In terms of face recognition accuracy, the proposed network achieves an accuracy of 83.41% on the IBUG public dataset and 96.74% on a self-built dataset. Experimental results demonstrate that the network designed in this paper exhibits high detection and recognition accuracy for faces in surveillance videos.

Comparative study of flood detection methodologies using Sentinel-1 satellite imagery (Sentinel-1 위성 영상을 활용한 침수 탐지 기법 방법론 비교 연구)

  • Lee, Sungwoo;Kim, Wanyub;Lee, Seulchan;Jeong, Hagyu;Park, Jongsoo;Choi, Minha
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.3
    • /
    • pp.181-193
    • /
    • 2024
  • The increasing atmospheric imbalance caused by climate change leads to an elevation in precipitation, resulting in a heightened frequency of flooding. Consequently, there is a growing need for technology to detect and monitor these occurrences, especially as the frequency of flooding events rises. To minimize flood damage, continuous monitoring is essential, and flood areas can be detected by the Synthetic Aperture Radar (SAR) imagery, which is not affected by climate conditions. The observed data undergoes a preprocessing step, utilizing a median filter to reduce noise. Classification techniques were employed to classify water bodies and non-water bodies, with the aim of evaluating the effectiveness of each method in flood detection. In this study, the Otsu method and Support Vector Machine (SVM) technique were utilized for the classification of water bodies and non-water bodies. The overall performance of the models was assessed using a Confusion Matrix. The suitability of flood detection was evaluated by comparing the Otsu method, an optimal threshold-based classifier, with SVM, a machine learning technique that minimizes misclassifications through training. The Otsu method demonstrated suitability in delineating boundaries between water and non-water bodies but exhibited a higher rate of misclassifications due to the influence of mixed substances. Conversely, the use of SVM resulted in a lower false positive rate and proved less sensitive to mixed substances. Consequently, SVM exhibited higher accuracy under conditions excluding flooding. While the Otsu method showed slightly higher accuracy in flood conditions compared to SVM, the difference in accuracy was less than 5% (Otsu: 0.93, SVM: 0.90). However, in pre-flooding and post-flooding conditions, the accuracy difference was more than 15%, indicating that SVM is more suitable for water body and flood detection (Otsu: 0.77, SVM: 0.92). Based on the findings of this study, it is anticipated that more accurate detection of water bodies and floods could contribute to minimizing flood-related damages and losses.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Evaluating of the Effectiveness of RTK Surveying Performance Based on Low-cost Multi-Channel GNSS Positioning Modules (다채널 저가 GNSS 측위 모듈기반 RTK 측량의 효용성 평가)

  • Kim, Chi-Hun;Oh, Seong-Jong;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.2
    • /
    • pp.53-65
    • /
    • 2022
  • According to the advancement of the GNSS satellite positioning system, the module of hardware and operation software reflecting accuracy and economical efficiency is implemented in the user sector including the multi-channel GNSS receiver, the multi-frequency external antenna and the mobile app (App) base public positioning analysis software etc., and the multichannel GNSS RTK positioning of the active configuration method (DIY, Do it yourself) is possible according to the purpose of user. Especially, as the infrastructure of multi-GNSS satellite is expanded and the potential of expansion of utilization according to various modules is highlighted, interest in the utilization of multi-channel low-cost GNSS receiver module is gradually increasing. The purpose of this study is to review the multi-channel low-cost GNSS receivers that are appearing in the mass market in various forms and to analyze the utilization plan of the "address information facility investigation project" of the Ministry of Public Administration and Security by constructing the multi-channel low-cost GNSS positioning module based RTK survey system (hereinafter referred to as "multi-channel GNSS RTK module positioning system"). For this purpose, we constructed a low-cost "multi-channel GNSS RTK module positioning system" by combining related modules such as U-blox's F9P chipset, antenna, Ntrip transmission of GNSS observation data and RTK positioning analysis app through smartphone. Kinematic positioning was performed for circular trajectories, and static positioning was performed for address information facilities. The results of comparative analysis with the Static positioning performance of the geodetic receivers were obtained with 5 fixed points in the experimental site, and the good static surveying performance was obtained with the standard deviation of average ±1.2cm. In addition, the results of the test point for the outline of the circular structure in the orthogonal image composed of the drone image analysis and the Kinematic positioning trajectory of the low cost RTK GNSS receiver showed that the trajectory was very close to the standard deviation of average ±2.5cm. Especially, as a result of applying it to address information facilities, it was possible to verify the utility of spatial information construction at low cost compared to expensive commercial geodetic receivers, so it is expected that various utilization of "multi-channel GNSS RTK module positioning system"

An Analytical Study on the Seismic Behavior and Safety of Vertical Hydrogen Storage Vessels Under the Earthquakes (지진 시 수직형 수소 저장용기의 거동 특성 분석 및 안전성에 관한 해석적 연구)

  • Sang-Moon Lee;Young-Jun Bae;Woo-Young Jung
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.27 no.6
    • /
    • pp.152-161
    • /
    • 2023
  • In general, large-capacity hydrogen storage vessels, typically in the form of vertical cylindrical vessels, are constructed using steel materials. These vessels are anchored to foundation slabs that are specially designed to suit the environmental conditions. This anchoring method involves pre-installed anchors on top of the concrete foundation slab. However, it's important to note that such a design can result in concentrated stresses at the anchoring points when external forces, such as seismic events, are at play. This may lead to potential structural damage due to anchor and concrete damage. For this reason, in this study, it selected an vertical hydrogen storage vessel based on site observations and created a 3D finite element model. Artificial seismic motions made following the procedures specified in ICC-ES AC 156, as well as domestic recorded earthquakes with a magnitude greater than 5.0, were applied to analyze the structural behavior and performance of the target structures. Conducting experiments on a structure built to actual scale would be ideal, but due to practical constraints, it proved challenging to execute. Therefore, it opted for an analytical approach to assess the safety of the target structure. Regarding the structural response characteristics, the acceleration induced by seismic motion was observed to amplify by approximately ten times compared to the input seismic motions. Additionally, there was a tendency for a decrease in amplification as the response acceleration was transmitted to the point where the centre of gravity is located. For the vulnerable components, specifically the sub-system (support columns and anchorages), the stress levels were found to satisfy the allowable stress criteria. However, the concrete's tensile strength exhibited only about a 5% margin of safety compared to the allowable stress. This indicates the need for mitigation strategies in addressing these concerns. Based on the research findings presented in this paper, it is anticipated that predictable load information for the design of storage vessels required for future shaking table tests will be provided.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

Symmetric SPN block cipher with Bit Slice involution S-box (비트 슬라이스 대합 S-박스에 의한 대칭 SPN 블록 암호)

  • Cho, Gyeong-Yeon;Song, Hong-Bok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.2
    • /
    • pp.171-179
    • /
    • 2011
  • Feistel and SPN are the two main structures in a block cipher. Feistel is a symmetric structure which has the same structure in encryption and decryption, but SPN is not a symmetric structure. Encrypt round function and decrypt round function in SPN structure have three parts, round key addition and substitution layer with S-box for confusion and permutation layer for defusion. Most SPN structure for example ARIA and AES uses 8 bit S-Box at substitution layer, which is vulnerable to Square attack, Boomerang attack, Impossible differentials cryptanalysis etc. In this paper, we propose a SPN which has a symmetric structure in encryption and decryption. The whole operations of proposed algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2 round, applies a right function and the last half of them, (N+1)/2 to N round, employs an inverse function. And a symmetry layer is located in between the right function layer and the inverse function layer. The symmetric layer is composed with a multiple simple bit slice involution S-Boxes. The bit slice involution S-Box symmetric layer increases difficult to attack cipher by Square attack, Boomerang attack, Impossible differentials cryptanalysis etc. The proposed symmetric SPN block cipher with bit slice involution S-Box is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.

Development of Wireless Smart Sensing Framework for Structural Health Monitoring of High-speed Railway Bridges (고속 철도 교량의 구조 건전성 모니터링을 위한 스마트 무선 센서 프레임워크 개발)

  • Kim, Eunju;Park, Jong-Woong;Sim, Sung-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.1-9
    • /
    • 2016
  • Railroad bridges account for 25% of the entire high-speed rail network. Railway bridges are subject to gradual structural degradation or fatigue accumulation due to consistent and repeating excitation by fast moving trains. Wireless sensing technology has opened up a new avenue for bridge health monitoring owing to its low-cost, high fidelity, and multiple sensing capability. On the other hand, measuring the transient response during train passage is quite challenging that the current wireless sensor system cannot be applied due to the intrinsic time delay of the sensor network. Therefore, this paper presents a framework for monitoring such transient responses with wireless sensing systems using 1) real-time excessive vibration monitoring through ultra-low-power MEMS accelerometers, and 2) post-event time synchronization scheme. The ultra-low power accelerometer continuously monitors the vibration and trigger network when excessive vibrations are detected. The entire network of wireless smart sensors starts sensing through triggering and the post-event time synchronization is conducted to compensate for the time error on the measured responses. The results of this study highlight the potential of detecting the impact load and triggering the entire network, as well as the effectiveness of the post-event time synchronized scheme for compensating for the time error. A numerical and experimental study was carried out to validate the proposed sensing hardware and time synchronization method.

Economic Analysis of Intelligent Security Service for Crime Prevention :Focused on Anyang City Security Demonstration District Project (범죄예방을 위한 지능형 방범 서비스 도입에 따른 경제성 분석 연구 :안양시 방범 실증지구 사업을 중심으로)

  • Yu, In-Jae;Han, Sun-Hee;Shin, Young-Seob;Lee, Jae-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.667-676
    • /
    • 2019
  • In recent years, the occurrence of life and violent crime in the city centered on crime-prone areas has become a big issue, raising the public interest in safety from crime has been higher than ever. As the initial response to crime and the importance of crime prevention are emerging, the government is preparing various measures such as crime prevention service using advanced technology. This project is a demonstration project to select specific target sites and apply that on a trial basis with the main purpose of commercialization of intelligent crime prevention technologies and services. In order to spread the business through the demonstration project, it is expected that the practical economic evaluation as well as the academic and practical value of the project will have a great significance. In this study, the purpose of this research is to derive economic feasibility through technologies and services to be implemented in Indokwon district of Anyang city, which is selected demonstration site of the intelligent security, to promote the spread of business and contribute to the policy activation.