• Title/Summary/Keyword: 위험 상황 인식

Search Result 305, Processing Time 0.028 seconds

Driving Anomaly Pattern Detection System Based on Vehicle Internal Diagnostic Data Analysis (차량 내부 진단 데이터 분석 기반의 주행 이상 패턴 감지 시스템)

  • Tae-jeong Park;Ji-ho Park;Bo-yoon Seo;Jun-ha Shin;Kyung-hwan Choi;Hongseok Yoo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.299-300
    • /
    • 2024
  • 첨단 기술의 발전과 함께 지능형 운전자 보조 시스템의 성능 및 교통 시스템 체계가 고도화됨에 따라 전반적인 교통사고 발생 건수는 줄어드는 추세지만 대한민국의 교통사고 발생 빈도는 아직 OECD 평균 대비 높은 실정이다. 특히, 2020년 경제 협력 개발 기구(OECD) 통계에 따르면 대한민국의 인구 10만 명당 교통사고 사망자 수는 회원국 36개 중 29위로 매우 높은 축에 속한다. 따라서, 본 논문에서는 교통사고 발생률을 낮추는 데 도움을 줄 수 있는 주행 이상 패턴 감지 시스템을 제안한다. 제안한 방법에서는 실시간 영상 분석을 통해 신호등 및 차선을 인식함과 동시 차량 내부 진단 데이터에 대한 시계열 분석을 기반으로 운전자의 운전 패턴을 분석한 후 평소와 다른 이상 징후를 발견하면 운전자에게 경고 알림을 제공하여 위험한 상황을 회피할 수 있도록 지원한다.

  • PDF

The Effect of Career Identity and Krumboltz's Task Approach Skills on Career Maturity, Career Barriers, and Career Aspiration (진로정체감과 Krumboltz의 과제접근기술이 진로성숙도, 진로장벽, 진로포부에 미치는 영향)

  • Kim, Kyoung-Mi;Bae, Young-Kwang;Min, Yi-Seul;Jang, Sung-Hwa
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.497-508
    • /
    • 2014
  • The current study examined the relationships between task-approach skills of optimism, bearability, intolerance of uncertainty, career identity, career maturity, career barriers, and career aspiration. Data was collected from two-hundred sixty nine college students who matriculated in colleges located in Seoul, Gyeoungi and Chungchung provinces in Korea. The correlation analysis and multiple linear regression were carried out to explore the relationship among the variables mentioned above. The results of this study were as follows: First, career identity was positively correlated with career maturity, aspiration and negatively with career barrier. optimism was negatively correlated with career barrier. in addition, intolerance of uncertanity was positively correlated with career maturity. and negatively with career barriers. Second, multiple linear regression revealed that career identity, optimism and lacking intolerance of uncertanity significantly influenced career maturity, career identity, optimism and intolerance of uncertanity significantly influnced career barriers. In addition, only optimism influnced career aspiration. These findings implied that career counselors need to assist clients developing optimism, flexibility, bearability and counselors should be aware of the effect of task-approach skills on career, barriers, and aspiration. Further discussions regarding results are included.

A Comparative Study of on-site Action Manual for People with Disaster Vulnerability (재난취약자의 현장조치 행동매뉴얼 비교연구 - 한국과 일본의 장애인 대상으로)

  • Kim, Soodong;Lee, Sahong;Choi, Kilhyun;Cheung, Chongsoo
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.155-162
    • /
    • 2017
  • This study has some issues about the elderly, the disabled, and the vulnerable groups whose economic ability is low even if the disaster or disaster situation is not a big problem for the people. we should emphasize the necessity of disaster preparedness action manual considering the characteristics of disaster vulnerable classes and taking serious risks to them even in the same situation. We also want to conduct research only for people with disabilities who are choosing the same definition of the world among the vulnerable groups. I would like to provide a basis for developing a site action manual for people with disabilities by comparing the cases of Korea and Japan. Therefore, through the cases of Japan and Korea, it is possible to maintain the independence of everyday life during disasters, the communication function in disasters, the method of moving information and mobile information, the function of recognizing emergency response, Action Emphasize the urgency of developing action manuals. From this domestic situation, we will conclude the discussion on the disaster safety and action manual for the disabled.

PID Controled UAV Monitoring System for Fire-Event Detection (PID 제어 UAV를 이용한 발화 감지 시스템의 구현)

  • Choi, Jeong-Wook;Kim, Bo-Seong;Yu, Je-Min;Choi, Ji-Hoon;Lee, Seung-Dae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.1-8
    • /
    • 2020
  • If a dangerous situation arises in a place where out of reach from the human, UAVs can be used to determine the size and location of the situation to reduce the further damage. With this in mind, this paper sets the minimum value of the roll, pitch, and yaw using beta flight to detect the UAV's smooth hovering, integration, and derivative (PID) values to ensure that the UAV stays horizontal, minimizing errors for safe hovering, and the camera uses Open CV to install the Raspberry Pi program and then HSV (color, saturation, Brightness) using the color palette, the filter is black and white except for the red color, which is the closest to the fire we want, so that the UAV detects the image in the air in real time. Finally, it was confirmed that hovering was possible at a height of 0.5 to 5m, and red color recognition was possible at a distance of 5cm and at a distance of 5m.

Smart Jewelry System for Health Management based on IoT (사물인터넷 기반 건강관리 스마트 주얼리 시스템)

  • Kang, Yun-Jeong;Yin, Li;Choi, DongOun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1494-1502
    • /
    • 2016
  • With the increasing availability of medical sensors and Internet of Things(IoT) devices for personal use, considering the interaction with users, it is planned to add intelligent function design to the fashionable jewelry, and develop composite multi-function intelligent jewelry through sensors identification. By means of IoT technology, while possessing communication function of intelligent jewelry, the function of intelligent jewelry can be expanded to the linkage network. In order to rapidly manage the mass data produced by intelligent jewelry sensors based on IoT, an intelligent jewelry system for health management is designed and an ontology model of intelligent jewelry system based on IoT is worked out. After the state of the services through the smart phone application is shown. The application provides a personalized service to the user and to determine the risk to show the guide lines according to the disease.

A Development of Traffic Safety Education Application Using Mixed Reality (혼합현실을 활용한 교통 안전교육 애플리케이션 개발)

  • Kim, Kang-Ho;Rhee, Dae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1602-1608
    • /
    • 2019
  • In this study, we developed a "Zetton Children's Traffic Safety Education" application using mixed reality to help children experience a variety of traffic situations indirectly and to help them defend themselves from accidents. We analyze the types of high mortality child traffic accidents to set learning goal. And we developed the experience-oriented contents that players could acquire signal systems and traffic information naturally and funny in the course of playing scenarios according to designed various traffic situations. In order to verify the educational effectiveness of the developed application, children were given traffic safety education through after-school education activities. The result shows that the frequency of right answers to questions related to traffic safety awareness and learning objectives is increased.

Evaluation of an Applicability of HEC-RAS 5.0 for 2-D Flood Inundation Analysis (2차원 홍수범람해석을 위한 HEC-RAS 5.0 적용성 평가)

  • Lee, Choon-Ho;Lee, Tae-Geun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.726-733
    • /
    • 2016
  • Recently, the flood frequency and magnitude have increased due to heavy rainfall. Considering the present condition, a flood risk map has been published in many countries to raise awareness about flood damage to people. A flood inundation analysis model, which is used to publish the flood risk map, can be classified as river and inland inundation models according to the inundation cause. Although a variety of flood inundation analysis models are utilized both domestically and overseas, their usability is limited by the expensive price, except for the HEC-RAS model developed by U.S. Army Corps of Engineers (USACE). In the situation, the USACE has developed a 2-D HEC-RAS model that can be linked to the existing 1-D model. This model has been released as a beta version under the name, HEC-RAS 5.0. In this study, the HEC-RAS 5.0 model's features, usability, applicability, and accuracy were evaluated by comparing the performances on Gokgyo-cheon with the FLUMEN model, which is used for domestic flood risk mapping. The results of this study will contribute to river inundation analysis in many different ways after the HEC-RAS 5.0 model is stabilized.

A Study on the Brand Service Design for Measuring and Managing Indoor Air Quality (실내공기질 측정 및 관리를 위한 브랜드 서비스디자인 연구)

  • Kim, Seung-Beom;Kim, Hwoi-Kwang
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.325-333
    • /
    • 2018
  • The quality of indoor air quality is facing a very serious situation due to the impact of the quality of the atmosphere in the atmosphere and the surrounding environment. While awareness of the danger of these populations is increasing, there is no way to detect the quality of the indoor air quality as well as the measures to detect the quality of indoor air quality as well as the countermeasures. The study drew a general problem with the design of the service design, the general purpose of the general office, and the use of the public facilities for the purpose of measuring the usage of indoor air quality, the general purpose of public facilities, and the interpretation of the current law. Based on this research, most of the general users' perception of the seriousness of the disease is not reflected in the perception that the dust and indoor air are accumulated in the eyes of the general public.

Investigation of Science Gifted Students' Value-Judgement and Decision Making Writing on Space Exploration Enterprise (과학영재들의 우주개발사업에 대한 가치판단과 의사결정 글쓰기 분석)

  • Yu, Eun-Jeong;Ko, Sun-Young
    • Journal of Gifted/Talented Education
    • /
    • v.23 no.6
    • /
    • pp.861-879
    • /
    • 2013
  • The purpose of this study was to explore the science gifted students' value-judgments and decision making writing on the space exploration enterprise. Sixty-four first graders of a gifted science school took the seminar-style decision making instruction for 10 hours in one month. After having the seminar-style decision making instruction, we have analyzed science gifted students' value-judgments and decision making process utilizing questionnaires and their writings. As a result, gifted students were aware of both sides of the space exploration enterprise, benefits and risks, and showed different decision making depending on their priorities of evidence interpretation. Although the majority of gifted students were very well aware of the importance of space exploration enterprise, they would still need to know the background information of space exploration enterprise. Based on this study, implications of SSI education and future research about space exploration enterprise were discussed in the result.

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol (암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구)

  • Kim, Jin-Woo;Lee, Keun-Ho;Yun, Sunghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.86-91
    • /
    • 2019
  • Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.