• Title/Summary/Keyword: Centralized Monitoring

Search Result 86, Processing Time 0.028 seconds

Integrated Object Detection and Blockchain Framework for Remote Safety Inspection at Construction Sites

  • Kim, Dohyeong;Yang, Jaehun;Anjum, Sharjeel;Lee, Dongmin;Pyeon, Jae-ho;Park, Chansik;Lee, Doyeop
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.136-144
    • /
    • 2022
  • Construction sites are characterized by dangerous situations and environments that cause fatal accidents. Potential risk detection needs to be improved by continuously monitoring site conditions. However, the current labor-intensive inspection practice has many limitations in monitoring dangerous conditions at construction sites. Computer vision technology that can quickly analyze and collect site conditions from images has been in the spotlight as a solution. Nonetheless, inspection results obtained via computer vision are still stored and managed in centralized systems vulnerable to tampering with information by the central node. Blockchain has been used as a reliable and efficient decentralized information management system. Despite its potential, only limited research has been conducted integrating computer vision and blockchain. Therefore, to solve the current safety management problems, the authors propose a framework for construction site inspection that integrates object detection and blockchain network, enabling efficient and reliable remote inspection. Object detection is applied to enable the automatic analysis of site safety conditions. As a result, the workload of safety managers can be reduced with inspection results stored and distributed reliably through the blockchain network. In addition, errors or forgery in the inspection process can be automatically prevented and verified through a smart contract. As site safety conditions are reliably shared with project participants, project participants can remotely inspect site conditions and make safety-related decisions in trust.

  • PDF

The Comparative Study on Post-Marketing Surveillance System for Pharmaceuticals (의약품의 시판후 조사제도 비교연구)

  • Kim, In-Beom;Kim, Hong-Jin;Sohn, Uy-Dong
    • YAKHAK HOEJI
    • /
    • v.50 no.3
    • /
    • pp.145-153
    • /
    • 2006
  • The adverse events which do not appear in the approval process tend to occur more frequently at the early stage of the use. Therefore new drugs, drugs with different active substances or routes of administration, or drugs with explicitly different efficacy added are particularly chosen for re-examination, and go through a study, which is conducted on 600 to 3,000 subjects over 4 to 6 years. Since the re-examination system was implemented in January 1995, 880 drug products have been designated as the subject of re-examination and among them 194 drugs have been completed their re-examination as of until March 2005. Post Marketing Surveillance to insure drug safety should be correlated with re-examination of new drug, re-evaluation of drug, and adverse event monitoring system. And the first labeling change should reflect all information collected for a defined period of time after the marketing authorization is granted. Furthermore centralized management through spontaneous reporting system of adverse event for whole period of time would be the most desirable type of system.

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.

Clustering Ad hoc Network Scheme and Classifications Based on Context-aware

  • Mun, Chang-Min;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.475-479
    • /
    • 2009
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Current research activity for the Minimum Energy Multicast (MEM) problem has been focused on devising efficient centralized greedy algorithms for static ad hoc networks. In this paper, we consider mobile ad hoc networks(MANETs) that could provide the reliable monitoring and control of a variety of environments for remote place. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. In this paper, we propose a new method, the CACH(Context-aware Clustering Hierarchy) algorithm, a hybrid and clustering-based protocol that could analyze the link cost from a source node to a destination node. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. The proposed CACH could use localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient. As a result, our simulation results would show that CACH could find energy efficient depth of hierarchy of a cluster.

Design and Implementation of Rate-Based Traffic Controller for Performance Improvement of FA-Networks Employing LonWorks (LonWorks를 이용한 공장자동화용 네트웍의 성능향상을 위한 전송률기반 트래픽제어기의 설계와 구현)

  • Kim, Byoung-Hee;Cho, Kwang-Hyun;Park, Kyoung-Sup
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.4
    • /
    • pp.313-319
    • /
    • 2000
  • As the interest of flexible manufacturing systems and computer integrated manufacturing systems increase, the distribution of centralized control systems using industrial control networks is getting more attention. In this paper, we investigate the rate-based traffic control of industrial control networks to improve the performance regarding the throughput, fairness, and error rates. Especially, we consider the protocol of Lon-$Works^{(TM)}$ which consists of all OSI 7-layers and supports various communication media at a low cost. Basically, the proposed rate-based traffic control system is closed loop by utilizing the feedback channel errors, which shows improved performance when compared with other industrial control networks commonly operated in open loop. To this end, an additional network node called monitoring node is introduced to check the channel status without increasing the channel load. The Proposed control loop is in effect whenever the feedback channel error becomes greater than an admittable value. We demonstrate the improved performance of the controlled network system in view of throughput and fairness measures by implementing the lab-scale network system based on LonWorks and through the experimentation upon it.

  • PDF

An Implementation of Image Security System Based on Web (웹기반 화상 감시 시스템의 구현)

  • Park Young-Seak;Cho Pyung-Kee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.1
    • /
    • pp.74-81
    • /
    • 2000
  • In this paper we have developed an image security system based on Internet Web in order to overcome the problem of existing systems that use the dedicated network. The developed system resolves the safety problem of the centralized control model by adapting the distributed control model based on Web, and has the functions of remote control and automatic monitoring for grouped multiple sites on remote Web browser. And the system can operate various computers or operating system because it' s operating software was designed by the concepts of Java Virtual Machine and Virtual Instrument. Also, our system has not need of additional cost for network construction by using Internet and can greatly improve the managemental efficiency of system because the maintenance and publishing of software updates can be performed through Web Server.

  • PDF

Development and Effects Analysis of The Decentralized Rainwater Management System by Field Application

  • Han, Young Hae;Lee, Tae Goo
    • KIEAE Journal
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2014
  • In this study, we developed a modular rainwater infiltration system that can be applied for general purposes in urban areas to prepare for localized heavy rain caused by climatic change. This study also analyzed the system's effects on reducing runoff. An analysis of the system's effects on reducing runoff based on rainfall data and monitoring data obtained between September 2012 and December 2013 after the system was installed showed that approximately 20~22% of the runoff overflowed from the infiltration facility. Also, an analysis of the runoff that occurred during the monsoon season showed that 25% of the runoff overflowed through the storm sewer system of the urban area. These results show that the rainwater overflows after infiltrating the detention facility installed in the area during high-intensity rainfall of 100mm or higher or when precipitation is 100mm for 3~4 days without the prior rainfall. According to precipitation forecasts, torrential rainfall is becoming increasingly prevalent in Korea which is increasing the risk of floods. Therefore, the standards for storm sewer systems should be raised when planning and redeveloping urban areas, and not only should centralized facilities including sewer systems and rainwater pump facilities be increased, but a comprehensive plan should also be established for the water cycle of urban areas. This study indicates that decentralized rainwater management can be effective in an urban area and also indicates that the extended application of rainwater infiltration systems can offer eco-friendly urban development.

Rule-Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks

  • Gowri, Muthukrishnan;Paramasivan, Balasubramanian
    • ETRI Journal
    • /
    • v.38 no.6
    • /
    • pp.1145-1152
    • /
    • 2016
  • Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rule-based anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain predefined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN.

Development of Multi-Sensor Station for u-Surveillance to Collaboration-Based Context Awareness (협업기반 상황인지를 위한 u-Surveillance 다중센서 스테이션 개발)

  • Yoo, Joon-Hyuk;Kim, Hie-Cheol
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.8
    • /
    • pp.780-786
    • /
    • 2012
  • Surveillance has become one of promising application areas of wireless sensor networks which allow for pervasive monitoring of concerned environmental phenomena by facilitating context awareness through sensor fusion. Existing systems that depend on a postmortem context analysis of sensor data on a centralized server expose several shortcomings, including a single point of failure, wasteful energy consumption due to unnecessary data transfer as well as deficiency of scalability. As an opposite direction, this paper proposes an energy-efficient distributed context-aware surveillance in which sensor nodes in the wireless sensor network collaborate with neighbors in a distributed manner to analyze and aware surrounding context. We design and implement multi-modal sensor stations for use as sensor nodes in our wireless sensor network implementing our distributed context awareness. This paper presents an initial experimental performance result of our proposed system. Results show that multi-modal sensor performance of our sensor station, a key enabling factor for distributed context awareness, is comparable to each independent sensor setting. They also show that its initial performance of context-awareness is satisfactory for a set of introductory surveillance scenarios in the current interim stage of our ongoing research.

Data Alignment for Data Fusion in Wireless Multimedia Sensor Networks Based on M2M

  • Cruz, Jose Roberto Perez;Hernandez, Saul E. Pomares;Cote, Enrique Munoz De
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.229-240
    • /
    • 2012
  • Advances in MEMS and CMOS technologies have motivated the development of low cost/power sensors and wireless multimedia sensor networks (WMSN). The WMSNs were created to ubiquitously harvest multimedia content. Such networks have allowed researchers and engineers to glimpse at new Machine-to-Machine (M2M) Systems, such as remote monitoring of biosignals for telemedicine networks. These systems require the acquisition of a large number of data streams that are simultaneously generated by multiple distributed devices. This paradigm of data generation and transmission is known as event-streaming. In order to be useful to the application, the collected data requires a preprocessing called data fusion, which entails the temporal alignment task of multimedia data. A practical way to perform this task is in a centralized manner, assuming that the network nodes only function as collector entities. However, by following this scheme, a considerable amount of redundant information is transmitted to the central entity. To decrease such redundancy, data fusion must be performed in a collaborative way. In this paper, we propose a collaborative data alignment approach for event-streaming. Our approach identifies temporal relationships by translating temporal dependencies based on a timeline to causal dependencies of the media involved.