• Title/Summary/Keyword: 실시간 모니터링 시스템

Search Result 1,840, Processing Time 0.03 seconds

Characteristic Analysis of Wireless Channels to Construct Wireless Network Environment in Underground Utility Tunnels (지하공동구 내 무선 네트워크 환경구축을 위한 무선채널 특성 분석)

  • Byung-Jin Lee;Woo-Sug Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.27-34
    • /
    • 2024
  • The direct and indirect damages caused by fires in underground utility tunnels have a great impact on society as a whole, so efforts are needed to prevent and manage them in advance. To this end, research is ongoing to prevent disasters such as fire flooding by applying digital twin technology to underground utility tunnels. A network is required to transmit the sensed signals from each sensor to the platform. In essence, it is necessary to analyze the application of wireless networks in the underground utility tunnel environments because the tunnel lacks the reception range of external wireless communication systems. Within the underground utility tunnels, electromagnetic interference caused by transmission and distribution cables, and diffuse reflection of signals from internal structures, obstacles, and metallic pipes such as water pipes can cause distortion or size reduction of wireless signals. To ensure real-time connectivity for remote surveillance and monitoring tasks through sensing, it is necessary to measure and analyze the wireless coverage in underground utility tunnels. Therefore, in order to build a wireless network environment in the underground utility tunnels. this study minimized the shaded area and measured the actual cavity environment so that there is no problem in connecting to the wireless environment inside the underground utility tunnels. We analyzed the data transmission rate, signal strength, and signal-to-noise ratio for each section of the terrain of the underground utility tunnels. The obtained results provide an appropriate wireless planning approach for installing wireless networks in underground utility tunnels.

Analysis of Behavioral Characteristics of Broilers by Feeding, Drinking, and Resting Spaces according to Stocking Density using Image Analysis Technique (영상분석기법을 활용한 사육밀도에 따른 급이·급수 및 휴식공간별 육계의 행동특성 분석)

  • Kim, Hyunsoo;Kang, HwanKu;Kang, Boseok;Kim, ChanHo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.558-569
    • /
    • 2020
  • This study examined the frequency of a broiler's stay in each area as stock density using an ICT-based image analysis technique from the perspective of precision livestock farming (PLF) according to the increase in the domestic broiler farms to understand the normal behavior patterns of broilers by age. The broiler was used in the experimental box (3.3×2.7 m) in a poultry house in Gyeonggi province. The stock densities were 9.5 birds/㎡ (n=85) and 19 birds/㎡ (n=170), respectively, and the frequency of stay by feeding, water, and rest area was monitored using a top-view camera. The image data of three-colored-specific broilers identified as the stock density were acquired by age (12, 16, 22, 27, and 29 days) for six hours. In the collected image data, the object tracking technique was used to record the cumulative movement path by connecting approximately 640,000 frames at 30 fps to quantify the frequency of stay in each area. In each stock density, it was significant in the order of the rest area, feeding, and water area (p<0.001). In 9.5 birds/㎡, it was at 57.9, 24.2, and 17.9 %, and 73.2, 16.8, and 10 % in 19 birds/㎡. The frequency of a broiler's stay could be evaluated in each area as the stock density using an ICT-based image analysis technique that minimizes stress. This method is expected to be used to provide basic material for developing an ICT-based management system through real-time monitoring.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Detection of Wildfire Burned Areas in California Using Deep Learning and Landsat 8 Images (딥러닝과 Landsat 8 영상을 이용한 캘리포니아 산불 피해지 탐지)

  • Youngmin Seo;Youjeong Youn;Seoyeon Kim;Jonggu Kang;Yemin Jeong;Soyeon Choi;Yungyo Im;Yangwon Lee
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.6_1
    • /
    • pp.1413-1425
    • /
    • 2023
  • The increasing frequency of wildfires due to climate change is causing extreme loss of life and property. They cause loss of vegetation and affect ecosystem changes depending on their intensity and occurrence. Ecosystem changes, in turn, affect wildfire occurrence, causing secondary damage. Thus, accurate estimation of the areas affected by wildfires is fundamental. Satellite remote sensing is used for forest fire detection because it can rapidly acquire topographic and meteorological information about the affected area after forest fires. In addition, deep learning algorithms such as convolutional neural networks (CNN) and transformer models show high performance for more accurate monitoring of fire-burnt regions. To date, the application of deep learning models has been limited, and there is a scarcity of reports providing quantitative performance evaluations for practical field utilization. Hence, this study emphasizes a comparative analysis, exploring performance enhancements achieved through both model selection and data design. This study examined deep learning models for detecting wildfire-damaged areas using Landsat 8 satellite images in California. Also, we conducted a comprehensive comparison and analysis of the detection performance of multiple models, such as U-Net and High-Resolution Network-Object Contextual Representation (HRNet-OCR). Wildfire-related spectral indices such as normalized difference vegetation index (NDVI) and normalized burn ratio (NBR) were used as input channels for the deep learning models to reflect the degree of vegetation cover and surface moisture content. As a result, the mean intersection over union (mIoU) was 0.831 for U-Net and 0.848 for HRNet-OCR, showing high segmentation performance. The inclusion of spectral indices alongside the base wavelength bands resulted in increased metric values for all combinations, affirming that the augmentation of input data with spectral indices contributes to the refinement of pixels. This study can be applied to other satellite images to build a recovery strategy for fire-burnt areas.

Current Status and Results of In-orbit Function, Radiometric Calibration and INR of GOCI-II (Geostationary Ocean Color Imager 2) on Geo-KOMPSAT-2B (정지궤도 해양관측위성(GOCI-II)의 궤도 성능, 복사보정, 영상기하보정 결과 및 상태)

  • Yong, Sang-Soon;Kang, Gm-Sil;Huh, Sungsik;Cha, Sung-Yong
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_2
    • /
    • pp.1235-1243
    • /
    • 2021
  • Geostationary Ocean Color Imager 2 (GOCI-II) on Geo-KOMPSAT-2 (GK2B)satellite was developed as a mission successor of GOCI on COMS which had been operated for around 10 years since launch in 2010 to observe and monitor ocean color around Korean peninsula. GOCI-II on GK2B was successfully launched in February of 2020 to continue for detection, monitoring, quantification, and prediction of short/long term changes of coastal ocean environment for marine science research and application purpose. GOCI-II had already finished IAC and IOT including early in-orbit calibration and had been handed over to NOSC (National Ocean Satellite Center) in KHOA (Korea Hydrographic and Oceanographic Agency). Radiometric calibration was periodically conducted using on-board solar calibration system in GOCI-II. The final calibrated gain and offset were applied and validated during IOT. And three video parameter sets for one day and 12 video parameter sets for a year was selected and transferred to NOSC for normal operation. Star measurement-based INR (Image Navigation and Registration) navigation filtering and landmark measurement-based image geometric correction were applied to meet the all INR requirements. The GOCI2 INR software was validated through INR IOT. In this paper, status and results of IOT, radiometric calibration and INR of GOCI-II are analysed and described.

Risks and Supervisory Challenges of Financial Conglomerates in Korea (금융그룹화와 금융위험: 실증분석 및 정책과제)

  • Hahm, Joon-Ho;Kim, Joon-Kyung
    • KDI Journal of Economic Policy
    • /
    • v.28 no.1
    • /
    • pp.145-191
    • /
    • 2006
  • This paper studies implications of financial conglomeration for both financial risk of individual conglomerates and systemic risk potential in post-crisis Korea. Our analyses suggest that we cannot conclude that financial conglomerates are taking on higher risks relative to non-conglomerate independent institutions. We also find that larger financial institutions show a significantly higher profitability and lower variability in profitability operating on a superior efficient frontier. However, it turns out that the consolidation has raised systemic risk potential as direct and indirect interdependencies among large banking institutions have substantially increased. Furthermore, financial conglomerates have become more vulnerable to contagion risks from non-bank sectors and capital markets. In the face of the shifting risk structure, financial supervisory and regulatory systems must be upgraded toward a more risk-based, consolidated supervision. Prompt corrective action provision for financial conglomerates must be based upon fully consolidated group risks, and effective supervisory devices need to be introduced to avoid inadvertent extension of public safety net to cross-sectoral activities of financial conglomerates. It is also critical to strengthen internal control and risk management capacities at financial conglomerates, and to establish strong market discipline by improving information transparency and monitoring incentives in the financial market.

  • PDF

Evidence of Intrusion of a Rare Species, Peristedion liorhynchus, into Korean Waters Based on High-throughput Sequencing of the Mixed Fish Eggs (희귀종 남방황성대(Peristedion liorhynchus)의 한국해 유입 증거 혼합 어란의 대용량 염기서열 분석법(high-throughput sequencing)으로 발견)

  • Choi, Hae-young;Chin, Byung-sun;Park, Gyung-soo;Kim, Sung
    • Korean Journal of Ichthyology
    • /
    • v.34 no.1
    • /
    • pp.8-15
    • /
    • 2022
  • The appearance of larvae of a rare species, Peristedion liorhynchus, in Korean waters is suggestive of spawning or adult intrusion. We conducted high-throughput sequencing (HTS) on 31,776 pelagic fish eggs collected from 123 stations off the Korean Peninsula during May to August in 2013, 2014 and 2017. A total of 21,621,874 HTS reads were mapped onto the P. liorhynchus COX1 reference sequence. Three consensus sequences (313 bp) were constructed from the three samples, respectively, off Uljin and Goeje Islands in May and off Ulsan in July. These samples were formed a clade with P. liorhynchus in the maximum likelihood tree of Peristedion. The average genetic distance within the P. liorhynchus clade (0.0054±0.0046) was less than that among clades (0.1475±0.0396). The results indicate that the HTS analysis of mixed fish eggs is useful for monitoring the intrusion of rare species such as P. liorhynchus in Korean waters.

SVC Based Multi-channel Transmission of High Definition Multimedia and Its Improved Service Efficiency (SVC 적용에 의한 다매체 멀티미디어 지원 서비스 효율 향상 기법)

  • Kim, Dong-Hwan;Cho, Min-Kyu;Moon, Seong-Pil;Lee, Jae-Yeal;Jun, Jun-Gil;Chang, Tae-Gyu
    • Journal of IKEEE
    • /
    • v.15 no.2
    • /
    • pp.179-189
    • /
    • 2011
  • This paper presents an SVC based multi-channel transmission technique. Transmission of high definition multimedia and its service efficiency can be significantly improved by the proposed method. In this method, the HD stream is divided into the two layer streams, i.e., a base layer stream and an enhancement layer stream. The divided streams are transmitted through a primary channel and an auxiliary channel, respectively. The proposed technique provides a noble mode switching technique which enables a seamless service of HD multimedia even under the conditions of abrupt and intermittent deterioration of the auxiliary channel. When the enhancement layer stream is disrupted by the channel monitoring in the mode switching algorithm, the algorithm works further to maintain the spatial and time resolution of the HD multimedia by upsampling and interpolating the base layer stream, consequently serving for the non disrupted play of the media. Moreover, the adoption of an adaptive switching algorithm significantly reduces the frequency of channel disruption avoiding the unnecessary switching for the short period variations of the channel. The feasibility of the proposed technique is verified through the simulation study with an example application to the simultaneous utilization of both Ku and Ka bands for HD multimedia broadcasting service. The rainfall modeling and the analysis of the satellite channel attenuation characteristics are performed to simulate the quality of service performance of the proposed HD broadcasting method. The simulation results obtained under a relatively poor channel (weather) situations show that the average lasting period of enhancement layer service is extended from 9.48[min] to 23.12[min] and the average switching frequency is reduced from 3.84[times/hour] to 1.68[times/hour]. It is verified in the satellite example that the proposed SVC based transmission technique best utilizes the Ka band channel for the service of HD broadcasting, although it is characterized by its inherent weather related poor reliability causing severe limitations in its independent application.

Implementation of the automatic standby power blocking socket outlet having a blocking power threshold per electronic device by the smart machine (스마트 기기에 의해 전자기기별 차단전력문턱치 설정기능이 장착된 자동대기전력 차단콘센트 구현)

  • Oh, Chang-Sun;Park, Chan-Young;Kim, Dong-Hoi;Kim, Gi-Taek
    • Journal of Digital Contents Society
    • /
    • v.15 no.4
    • /
    • pp.481-489
    • /
    • 2014
  • In this paper, the automatic standby power blocking socket outlet to reduce standby power by blocking power threshold is implemented. Where, the standby power means a flowing power when a disused power electronic is plugged into the socket outlet. The proposed socket outlet can cut off the standby power by establishing a proper block power threshold electronic device according to each electronic device because it can monitor the amount of power through the smart machines such as the real-time PC or mobile phone and directly control the blocking power threshold. The software is implemented by using Visual Studio software, code vision and SN8 C studio, and the hardware is embodied in ATmega128, SN8F27E93S, USB to UART, and relay etc. Through the simulation, we find that the standby power of the proposed method is similar to that of the conventional method in case of the cellular phone but the standby power of the proposed method is much less than that of the conventional method in case of the computer, air conditioning, and set-top box. Therefore, it is proved that the proposed socket outlet has a superior performance in terms of the standby power.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF