• Title/Summary/Keyword: 집중 관제

Search Result 60, Processing Time 0.027 seconds

테마파크의 소방.방재.안전.감시시스템

  • Takao, Shigeki;Nakano, Nobuhiko;Motomura, Masanori
    • The Magazine of the Society of Air-Conditioning and Refrigerating Engineers of Korea
    • /
    • v.32 no.12
    • /
    • pp.77-87
    • /
    • 2003
  • 본고에서는 테마파크내의 이용객의 안전 지원시스템인 소방·재해방지·안전·감시시스템에 대해서 소개한다. 소방·방재설비시스템에서는 소방용 설비 및 본격 소방활동 지원시스템의 개요에 대해서 소개한다. 그리고 각 시설의 방재정보를 집중 감시하는 종합 방재 정보시스템과 소방서에 의한 24시간 체제의 방화관리·운영체제 및 이용객의 안전성 확보를 위한 테마파크 특유의 쇼·라이드설비와 방재설비 관련에 대해서 소개한다. 또한, 정보·감시시스템에서는 파크전체의 정보를 감시하는 BMS(빌딩 매니지먼트 시스템), 정보통신 시스템, 안전 시스템 등에 대해서 소개한다.

  • PDF

A Model Using IOT Based Railway Infrastructure Sensor Data for Recognition of Abnormal state (IOT기반 철도인프라 데이터를 활용한 이상상황 인식모델)

  • Jang, Gyu-JIn;Ahn, Tae-Ki;Kim, Young-Nam;Jung, Jae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.771-773
    • /
    • 2018
  • 인공지능(AI), 사물인터넷(IoT)등의 4차 산업기술은 철도안전의 핵심수단으로 부상하고 있으며 차량, 위험관리, 운행관리, 보안관리 등의 점진적인 적용분야 확장을 통해 철도안전에 대한 신뢰성을 향상시킬 수 있는 방안에 대한 관심이 집중되고 있다. 본 논문에서는 IoT 기반의 다양한 철도인프라 데이터를 활용하여 열차주행상태에 영향을 줄 수 있는 이상상황 인식 모델 및 열차자율주행을 위한 제어기술에 필요한 정보로 인프라 상태를 제공하는 방식을 제안한다. 철도 인프라 상황인지에 필요한 데이터는 레일온도, 선로 지정물, 승객 수, 선로 적설량을 지정하였고, 제안 인식모델의 스게노 퍼지추론 방식을 적용한 후 철도차량 운전관련 취급규정 및 취급세척을 기반으로 퍼지규칙(Fuzzy Rule)을 15개 생성하였다. 인프라데이터셋을 활용하여 제안모델의 인식률 평가에 사용하였으며 인식률 결과는 약 86%의 정확성을 보였다. 퍼지추론 기반 방식의 철도인프라 이상상태 인식모델을 철도분야에 접목시킨다면 기존의 관제기반 방식보다 효율적인 철도인프라 상황인식이 가능할 것으로 판단된다.

A Study on Preventive Measures against Large Oil Spills in the Korean Coastal Waters-1 - Analyzing the Spill Accident from M/T Hebei Spirit - (우리나라 연안역에서의 대형해양오염사고 방지책에 관한 연구-1 - Hebei Spirit 호 오염사고를 중심으로 -)

  • Yun, Jong-Hwui
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2008.05a
    • /
    • pp.249-255
    • /
    • 2008
  • IOn 7th of Dec. 2007, large oil spill took place the seas off the Taean coast caused by the collision between VLCC Hebei Spirit and crane floating barge Samsung-1 and a lot of problems were revealed during response to the accident. The author, accordingly, examined to analyze the cause of this accident on the aspect of spill prevention and presented some preventive measures, such as strictness to the current standard for tug operation, expansion of VTS service area and transfer of the VTS responsibility to Korea Coast Guard, designation of appropriate anchorage per ship's type, cargo and visiting purpose, and special management for dangerous goods carriers.

  • PDF

Cooperative Architecture for Centralized Botnet Detection and Management (협업 기반의 중앙집중형 봇넷 탐지 및 관제 시스템 설계)

  • Kwon, Jong-Hoon;Im, Chae-Tae;Choi, Hyun-Sang;Ji, Seung-Goo;Oh, Joo-Hyung;Jeong, Hyun-Cheol;Lee, Hee-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.83-93
    • /
    • 2009
  • In recent years, cyber crimes were intended to get financial benefits through malicious attempts such as DDoS attacks, stealing financial information and spamming. Botnets, a network composed of large pool of infected hosts, lead such malicious attacks. The botnets have adopted several evasion techniques and variations. Therefore, it is difficult to detect and eliminate them. Current botnet solutions use a signature based detection mechanism. Furthermore, the solutions cannot cover broad areas enough to detect world-wide botnets. In this study, we suggest an architecture to detect and regulate botnets using cooperative design which includes modules of gathering network traffics and sharing botnet information between ISPs or nations. Proposed architecture is effective to reveal evasive and world-wide botnets, because it does not depend on specific systems or hardwares, and has broadband cooperative framework.

Application for en-Route mission to Decentralized Task Allocation (경로가 주어진 임무 상황에서 분산 임무할당 알고리즘의 적용 방안 연구)

  • Kim, Sung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.156-161
    • /
    • 2020
  • In an environment that operates multiple UAVs, the use of a decentralized task allocation algorithm has more robustness from a single failure of UAV on the mission because there is no central command center. In addition, UAVs have situational awareness and redistribute tasks among themselves, which can expand the mission range. The use of multiple UAVs in a mission has increased as the agent hardware has decreased in size and cost. The decentralized mission-planning algorithm has the advantages of a larger mission range and robustness to a single failure during the mission. This paper extended the type of mission the uses CBBA, which is the most well-known decentralized task allocation algorithm, to the point mission and en-route mission. This will describe the real mission situation that has the purpose of surveillance. A Monte-Carlo simulation was conducted in the case of multiple agents in the task-rich environment, and the global rewards of each case were compared.

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.

Proposal of a method of using HSV histogram data learning to provide additional information in object recognition (객체 인식의 추가정보제공을 위한 HSV 히스토그램 데이터 학습 활용 방법 제안)

  • Choi, Donggyu;Wang, Tae-su;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.6-8
    • /
    • 2022
  • Many systems that use images through object recognition using deep learning have provided various solutions beyond the existing methods. Many studies have proven its usability, and the actual control system shows the possibility of using it to make people's work more convenient. Many studies have proven its usability, and actual control systems make human tasks more convenient and show possible. However, with hardware-intensive performance, the development of models is facing some limitations, and the ease with the use and additional utilization of many unupdated models is falling. In this paper, we propose how to increase utilization and accuracy by providing additional information on the emotional regions of colors and objects by utilizing learning and weights from HSV color histograms of local image data recognized after conventional stereotyped object recognition results.

  • PDF

A study on the developmental plan of Alarm Monitoring Service (기계경비의 발전적 대응방안에 관한 연구)

  • Chung, Tae-Hwang;So, Seung-Young
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.145-168
    • /
    • 2010
  • Since Alarm Monitoring Service was introduced in Korea in 1981, the market has been increasing and is expected to increase continually. Some factors such as the increase of social security need and the change of safety consciousness, increase of persons who live alone could be affected positively on Alarm Monitoring Service industry. As Alarm Monitoring Service come into wide use, the understanding of electronic security service is spread and consumer's demand is difficult, so consideration about new developmental plan is need to respond to the change actively. Electronic security system is consist of various kinds of element, so every element could do their role equally. Alarm Monitoring Service should satisfy consumer's various needs because it is not necessary commodity, also electronic security device could be easily operated and it's appearance has to have a good design. To solve the false alarm problem, detection sensor's improvement should be considered preferentially and development of new type of sensor that operate dissimilarly to replace former sensor is needed. On the other hand, to settle the matter that occurred by response time, security company could explain the limit on Alarm Monitoring System to consumer honestly and ask for an understanding. If consumer could be joined into security activity by security agent's explanation, better security service would be provided with mutual confidence. To save response time the consideration on the introduction of GIS(Global Information System) is needed rather than GPS(Global Positioning System). Although training program for security agents is important, several benefits for security agents should be considered together. The development of new business model is required for preparation against market stagnation and the development of new commodity to secure consumer for housing service rather than commercial facility service. for the purpose of those, new commodity related to home-network system and video surveillance system could be considered, also new added service with network between security company and consumer for a basis is to be considered.

  • PDF

Efficient Multicasting Mechanism for Mobile Computing Environment (산불 발생지역에서의 산불 이동속도 예측 및 안전구역 확보에 관한 연구)

  • Woo, Byeong-hun;Koo, Nam-kyoung;Oh, Young-jun;Jang, Kyung-sik;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.89-92
    • /
    • 2015
  • In this paper, we propose a method to reduce the fire suppression time. Our suggestions can secure a safe area according to the diffusion path and speed of the fire, forest fire prediction minimize casualties and property damage forests. The existing path prediction method wildfire spread predict the wildfire spread model and speed through topography, weather, fuel factor and the image information. In this case, however, occur to control a large mountain huge costs. Also Focus on the diffusion model predictions and the path identified by the problem arises that insufficient efforts to ensure the safe area. In this paper, we estimate the moving direction and speed of fire at a lower cost, and proposes an algorithm to ensure the safety zone for fire suppression. The proposed algorithm is a technique to analyze the attribute information that temperature, wind, smoke measured over time. According to our algorithm forecast wildfire moving direction and ensure the safety zone. By analyzing the moving speed and the moving direction of the simulated fire in a given environment is expected to be able to quickly reduce the damage to the forest fire fighters.

  • PDF

The Political Background of the Installation of the Crown Prince During the Period of King Munjong in the Goryeo Dynasty (고려 문종대 왕태자(王太子) 책봉(冊封)과 태자(太子) 관련 제도(制度) 정비의 의미)

  • Kim, Seon-mi
    • Journal of Korean Historical Folklife
    • /
    • no.45
    • /
    • pp.263-289
    • /
    • 2014
  • King Munjong(文宗), the eleventh King of the Goryeo Dynasty, was the son of King Hyeonjong(顯宗), the eighth king, and the younger stepbrother(異母弟) of King Jeongjong(靖宗), the 10th king. Although King Jeongjong had four sons, he abdicated the throne to King Munjong. King Taejo(太祖) had opened the possibility for sons other than the eldest son to succeed to the throne. When King Jeongjong died, his sons were children under the age of 10 years. In the early period of the Goryeo Dynasty, when kings had young sons, there were precedents of abdicating the throne to their grown-up younger brothers. In addition, King Jeongjong and Munjong had an identical blood background. During the period, Goryeo people also naturally accepted the fact that a former king's younger brother succeeded to the throne. In this background, King Munjong ascended the throne. However, King Munjong did not ascend the throne after identifying state affairs with politic power. Therefore, he needed to increase his authority as the king. Moreover, as the sons of King Jeongjong had grown up, they could stir up trouble in future succession to the throne. Therefore, King Munjong intended to concentrate power on himself and remove trouble in future succession to the throne by selecting his son as successor to the throne. After the installation of Wangtaeja(王太子, the Crown Prince), King Munjong expanded and organized Donggunggwan(東宮官, the establishment of Secretariat of Wangtaeja) and carried out various rituals related to Wangtaeja. The control system for Donggunggwan was completed institutionally in 1068. At this time, the newly organized Donggunggwan was operated as a miniature version of the central government office. In addition, the ritual for the installation of Taeja, which was held in 1054, complied with regulated procedures. After the ritual of the installation, a ceremony to congratulate on Jangheungjeol(長興節, the birthday of Wangtaeja) was held in 1056. In 1064, the wedding ritual of Taeja took place, and the ritual for Taeja regulated in Yeji(禮志) of "Goryeosa(高麗史)" was carried out. In addition, the installation of Wangtaeja was made known overseas, and the Taeja of Goryeo was proclaimed by the Kitan three times. Such various measures played an important role in strengthening the status of Taeja as the man of authority next to the king. Later, Taeja demonstrated his status as the man of authority following the king by participating in state affairs on behalf of King Munjong who was not able to move about freely in his later years.