• Title/Summary/Keyword: Advanced Warning System

Search Result 100, Processing Time 0.025 seconds

Influence on Driver Behavior According to Providing Collision Avoidance Information on Highway (고속도로의 전방 장해물 충돌방지정보 제공이 운전행동에 미치는 영향)

  • Jeon, Yong-Uk;Dae, Mun-Su
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.4
    • /
    • pp.137-143
    • /
    • 2009
  • It is necessary to develop driving assistant information in order to prevent a rear-end collision with a crashed car which is at the blind curve on highway. Laboratory experiments were performed using a driving simulator to keep the traffic environment constant. This research was evaluated the effect of driver behavior according to providing collision avoidance information which was consisted of advisory, caution, and warning information by the dangerous degree of traffic situation. Driver behavior was evaluated to analyze the collision avoidance with a crashed car, and glance behavior was examined to measure the eye movements to the display on which provided the collision avoidance information. After experiment, the significance was evaluated on provided collision avoidance information. As the result of this research, the number of collision accident is reduced when the phased information was provided. In addition, it is clear that auditory information is more important than visual information in the case of providing the second information.

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

Structural health monitoring data anomaly detection by transformer enhanced densely connected neural networks

  • Jun, Li;Wupeng, Chen;Gao, Fan
    • Smart Structures and Systems
    • /
    • v.30 no.6
    • /
    • pp.613-626
    • /
    • 2022
  • Guaranteeing the quality and integrity of structural health monitoring (SHM) data is very important for an effective assessment of structural condition. However, sensory system may malfunction due to sensor fault or harsh operational environment, resulting in multiple types of data anomaly existing in the measured data. Efficiently and automatically identifying anomalies from the vast amounts of measured data is significant for assessing the structural conditions and early warning for structural failure in SHM. The major challenges of current automated data anomaly detection methods are the imbalance of dataset categories. In terms of the feature of actual anomalous data, this paper proposes a data anomaly detection method based on data-level and deep learning technique for SHM of civil engineering structures. The proposed method consists of a data balancing phase to prepare a comprehensive training dataset based on data-level technique, and an anomaly detection phase based on a sophisticatedly designed network. The advanced densely connected convolutional network (DenseNet) and Transformer encoder are embedded in the specific network to facilitate extraction of both detail and global features of response data, and to establish the mapping between the highest level of abstractive features and data anomaly class. Numerical studies on a steel frame model are conducted to evaluate the performance and noise immunity of using the proposed network for data anomaly detection. The applicability of the proposed method for data anomaly classification is validated with the measured data of a practical supertall structure. The proposed method presents a remarkable performance on data anomaly detection, which reaches a 95.7% overall accuracy with practical engineering structural monitoring data, which demonstrates the effectiveness of data balancing and the robust classification capability of the proposed network.

Japan's Missile Detection Capability using Electromagnetic Wave in free space (일본의 자유공간에서 전자파를 이용한 미사일 탐지능력)

  • Lee, Yongsik
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.78-86
    • /
    • 2017
  • Japan has a lot of interest about weapons systems development of surrounding national and has invested heavily in securing intelligence assets to get information about them, because of conflict issues between Japan and Russia with four northern islands, China with Senkaku Islands and entry policy into the Pacific. Japan has used a large budget to detect and intercept ballistic missile for reasons of the launch of the Taepodong missile in 1998. After took over SIGINT equipments which U.S. force had operated in 1950s~1960s, Japan made a technological analysis and advanced IT technology to produce superior equipments. Japan's SDF has installed them in 19 locations across Japan. In addition, Japan's JASDF has installed advanced early warning RADAR to detect aircraft and high speed ballistic missile entering JADIZ with S-band in 28 locations across Japan. It is possible to detect missile launch preparations, engine tests, and launch moments at any time for operation of 6 satellites high resolution reconnaissance system and 6 aegis ships. In close cooperation with the US, Japan is accessible to the SBIRS networks which detects the launch of a ballistic missile in neighboring countries. In the future, Because the United States wants Japan to act as part of the United States in East, south Asia, it is believed that the exchange of intelligence on the surrounding countries between two countries will be enhanced.

Development of Smart Phone Application for the Safe Operation of Inland Vessels (내수면 선박의 안전운항을 위한 스마트폰기반 어플리케이션 개발)

  • Jo, Byung-Wan;Lee, Yun-Sung;Kim, Do-Keun;Kim, Jung-Hoon;Kim, Kil-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.4
    • /
    • pp.442-454
    • /
    • 2016
  • Recently, due to the increment of national income and the living standard of citizens, the leasure business has been dramatically expanded. Among the business, inland water activities such as cruise tour or water taxi have drawn attention from the people. As more people come for a new pleasure, the frequency and the number of services continues to rise yet the safety of people values less recently. In fact, the number of relating accidents also has risen accordingly. In order to prevent such accidents in inland waters, the vessels' real time voyage data, the advanced warning system and the emergency rescuing system are required. In this paper, we have developed navigation guiding application for safety of passengers and vessels in inland waters. Navigation guiding applications not only provide Inland Electronic Navigational Chart(IENC) and vessel information but also allows communication between traffic service center and nearby vessels in case of an emergency situation. In order to implement Navigation guiding applications, developing Inland Electronic Navigational Chart was inevitable. Therefore, IENC of Han River, has developed based on measuring the water depth using multi-beam echo sounder system.

Study for Determination of Management Thresholds of Bridge Structural Health Monitoring System based on Probabilistic Method (확률론적 방법에 의한 교량계측시스템의 관리기준치 설정에 관한 연구)

  • Kim, Haeng-Bae;Song, Jae-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.3
    • /
    • pp.103-110
    • /
    • 2016
  • Recently, structural health monitoring system(SHMS) has been appled cable bridges as the effective maintenance tool and the management threshold is considered to assess the status of the bridge in SHMS. The threshold is generally determined by the allowable limit based on design specification because there is no method and standard for threshold calculation. In case of the conventional thresholds, it is difficult to recognize the event, abnormal behavior and gradual damage within the threshold. Therefore, this study reviewed the problem of previous methods and proposed the advanced methodologies based on probabilistic approach for threshold calculation which can be applied to practice work. Gumbel distribution is adopted in order to calculate the threshold for caution and warning states considering the expectations for return periods of 50 and 100 years. The thresholds were individually determined for measurement data and data variation to detect the various abnormal behaviors within allowable range. Finally, it has confirmed that the thresholds by the proposed method is detectable the abnormal behavior of real-time measuring data from SHMS.

Flexible Intelligent Exit Sign Management of Cloud-Connected Buildings

  • Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Cho, Juphil;Cha, Jaesang
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.58-63
    • /
    • 2017
  • Emergencies and disasters can happen any time without any warning, and things can change and escalate very quickly, and often it is swift and decisive actions that make all the difference. It is a responsibility of the building facility management to ensure that a proven evacuation plan in place to cover various worst scenario to handled automatically inside the facility. To mapping out optimal safe escape routes is a straightforward undertaking, but does not necessarily guarantee residents the highest level of protection. The emergency evacuation navigation approach is a state-of-the-art that designed to evacuate human livings during an emergencies based on real-time decisions using live sensory data with pre-defined optimum path finding algorithm. The poor decision on causalities and guidance may apparently end the evacuation process and cannot then be remedied. This paper propose a cloud connected emergency evacuation system model to react dynamically to changes in the environment in emergency for safest emergency evacuation using IoT based emergency exit sign system. In the previous researches shows that the performance of optimal routing algorithms for evacuation purposes are more sensitive to the initial distribution of evacuees, the occupancy levels, and the type and level of emergency situations. The heuristic-based evacuees routing algorithms have a problem with the choice of certain parameters which causes evacuation process in real-time. Therefore, this paper proposes an evacuee routing algorithm that optimizes evacuation by making using high computational power of cloud servers. The proposed algorithm is evaluated via a cloud-based simulator with different "simulated casualties" are then re-routed using a Dijkstra's algorithm to obtain new safe emergency evacuation paths against guiding evacuees with a predetermined routing algorithm for them to emergency exits. The performance of proposed approach can be iterated as long as corrective action is still possible and give safe evacuation paths and dynamically configure the emergency exit signs to react for real-time instantaneous safe evacuation guidance.

Research on Advanced Measures for Emergency Response to Water Accidents based on Big-Data (빅데이터 기반 수도사고 위기대응 고도화 방안에 관한 연구)

  • Kim, Ho-sung;Kim, Jong-rip;Kim, Jae-jong;Yoon, Young-min;Kim, Dae-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.317-321
    • /
    • 2022
  • In response to Incheon tap water accident in 2019, the Ministry of Environment has created the "Comprehensive Measures for Water Safety Management" to improve water operation management, provide systematic technical support, and respond to accidents. Accordingly, K-water is making a smart water supply management system for the entire process of tap water. In order to advance the response to water accidents, it is essential to secure the reliability of real-time water operation data such as flow rate, pressure, and water level, and to develop and apply a warning algorithm in advance using big data analysis techniques. In this paper, various statistical techniques are applied using water supply operation data (flow, pressure, water level, etc) to prepare the foundation for the selection of the optimal operating range and advancement of the monitoring and alarm system. In addition, the arrival time is analyzed through cross-correlation analysis of changes in raw water turbidity between the water intake and water treatment plants. The purpose of this paper is to study the model that predicts the raw water turbidity of a water treatment plant by applying raw water turbidity data considering the time delay according to the flow rate change.

  • PDF

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

The Pattern Analysis of Financial Distress for Non-audited Firms using Data Mining (데이터마이닝 기법을 활용한 비외감기업의 부실화 유형 분석)

  • Lee, Su Hyun;Park, Jung Min;Lee, Hyoung Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.4
    • /
    • pp.111-131
    • /
    • 2015
  • There are only a handful number of research conducted on pattern analysis of corporate distress as compared with research for bankruptcy prediction. The few that exists mainly focus on audited firms because financial data collection is easier for these firms. But in reality, corporate financial distress is a far more common and critical phenomenon for non-audited firms which are mainly comprised of small and medium sized firms. The purpose of this paper is to classify non-audited firms under distress according to their financial ratio using data mining; Self-Organizing Map (SOM). SOM is a type of artificial neural network that is trained using unsupervised learning to produce a lower dimensional discretized representation of the input space of the training samples, called a map. SOM is different from other artificial neural networks as it applies competitive learning as opposed to error-correction learning such as backpropagation with gradient descent, and in the sense that it uses a neighborhood function to preserve the topological properties of the input space. It is one of the popular and successful clustering algorithm. In this study, we classify types of financial distress firms, specially, non-audited firms. In the empirical test, we collect 10 financial ratios of 100 non-audited firms under distress in 2004 for the previous two years (2002 and 2003). Using these financial ratios and the SOM algorithm, five distinct patterns were distinguished. In pattern 1, financial distress was very serious in almost all financial ratios. 12% of the firms are included in these patterns. In pattern 2, financial distress was weak in almost financial ratios. 14% of the firms are included in pattern 2. In pattern 3, growth ratio was the worst among all patterns. It is speculated that the firms of this pattern may be under distress due to severe competition in their industries. Approximately 30% of the firms fell into this group. In pattern 4, the growth ratio was higher than any other pattern but the cash ratio and profitability ratio were not at the level of the growth ratio. It is concluded that the firms of this pattern were under distress in pursuit of expanding their business. About 25% of the firms were in this pattern. Last, pattern 5 encompassed very solvent firms. Perhaps firms of this pattern were distressed due to a bad short-term strategic decision or due to problems with the enterpriser of the firms. Approximately 18% of the firms were under this pattern. This study has the academic and empirical contribution. In the perspectives of the academic contribution, non-audited companies that tend to be easily bankrupt and have the unstructured or easily manipulated financial data are classified by the data mining technology (Self-Organizing Map) rather than big sized audited firms that have the well prepared and reliable financial data. In the perspectives of the empirical one, even though the financial data of the non-audited firms are conducted to analyze, it is useful for find out the first order symptom of financial distress, which makes us to forecast the prediction of bankruptcy of the firms and to manage the early warning and alert signal. These are the academic and empirical contribution of this study. The limitation of this research is to analyze only 100 corporates due to the difficulty of collecting the financial data of the non-audited firms, which make us to be hard to proceed to the analysis by the category or size difference. Also, non-financial qualitative data is crucial for the analysis of bankruptcy. Thus, the non-financial qualitative factor is taken into account for the next study. This study sheds some light on the non-audited small and medium sized firms' distress prediction in the future.