• Title/Summary/Keyword: Convergence safety engineering

Search Result 847, Processing Time 0.031 seconds

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

Comparative analysis of fusion factors affecting the accuracy of injection amount of remote fluid monitoring system (원격 수액모니터링 시스템의 주입량의 정확도에 영향을 주는 융합인자의 비교 분석)

  • Kim, Seon-Chil
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.125-131
    • /
    • 2022
  • Recently, the prevalence of remotely managed patient care systems in medical institutions is increasing due to COVID-19. In particular, in the case of fluid monitoring, hospitals are considering introducing it as a system that can reduce patient safety and nurses' work. There are two products under development: a load cell method that measures weight and a method that detects drops of sap by infrared sensing. Although each product has differences in operation principle, sensor type, size, usage, and price, medical institutions are highly interested in the accuracy of the data obtained.In this study, two prototypes with different sensor methods were manufactured and the total amount of infusion per hour was measured to test the accuracy, which is the core of the infusion monitoring device. In addition, when there was an external movement, the change in the measured value of the sap was tested to evaluate the accuracy according to the measurement method. As a result of the experiment, there was a difference of less than 5% in the measurement value error of the two devices, and the load cell method showed a difference in the low-capacity measurement value and the infrared method in the high-capacity measurement value. As a result of this experiment, there was little difference in accuracy according to the sensor method of the infusion monitoring device, and it is considered that there is no problem in accuracy when used in a medical institution.

Contactless User Identification System using Multi-channel Palm Images Facilitated by Triple Attention U-Net and CNN Classifier Ensemble Models

  • Kim, Inki;Kim, Beomjun;Woo, Sunghee;Gwak, Jeonghwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.33-43
    • /
    • 2022
  • In this paper, we propose an ensemble model facilitated by multi-channel palm images with attention U-Net models and pretrained convolutional neural networks (CNNs) for establishing a contactless palm-based user identification system using conventional inexpensive camera sensors. Attention U-Net models are used to extract the areas of interest including hands (i.e., with fingers), palms (i.e., without fingers) and palm lines, which are combined to generate three channels being ped into the ensemble classifier. Then, the proposed palm information-based user identification system predicts the class using the classifier ensemble with three outperforming pre-trained CNN models. The proposed model demonstrates that the proposed model could achieve the classification accuracy, precision, recall, F1-score of 98.60%, 98.61%, 98.61%, 98.61% respectively, which indicate that the proposed model is effective even though we are using very cheap and inexpensive image sensors. We believe that in this COVID-19 pandemic circumstances, the proposed palm-based contactless user identification system can be an alternative, with high safety and reliability, compared with currently overwhelming contact-based systems.

A Study on Improvement Measures to Strengthen the Police's Ability to Respond to CBRN Terrorism at the Scene (경찰의 화생방테러 현장대응역량 강화를 위한 개선방안 연구)

  • Lee, Deok-Jae;Song, Chang Geun
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.116-125
    • /
    • 2022
  • Recent aspects of terrorism varies in various ways according to means, targets, and regions. In particular, the 9/11 terrorist attacks in the United States in 2001 changed the paradigm of each country's terrorism, and the South Korea also participated in the enactment and enforcement of the Anti-Terrorism Act in 2016. Based on this, CBRN terrorism is included in general terrorism, and the National Police Agency plays the role of a control tower, and a system supported by related organizations such as the Ministry of Environment is being built and operated. However, restrictions were confirmed in the organizational system, manpower composition, and equipment and materials in operation in preparation for CBRN within the police. Based on the identified limitations, we proposed improvement plans to strengthen the capacity for CBRN terrorism: establishing a dedicated CBRN organization; creating research organization; and securing additional dedicated personnel. Based on this, as an improvement plan to strengthen the capability of CBRN, the establishment of an organization dedicated to CBRN and a research organization within the National Police Agency, and expansion of electronic equipment suitable for the characteristics of CBRN were proposed. It is expected that the police's on-site response capability system for CBRN terrorism will be strengthened via the proposed improvement measures to recover the various restrictions on the response to CBRN terrorism.

Numerical Estimation of Wind Loads on FLNG by Computational Fluid Dynamics (전산유체역학을 이용한 FLNG의 풍하중 추정에 관한 연구)

  • Sang-Eui, Lee
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.491-500
    • /
    • 2022
  • It has been noted that an accurate estimation of wind loads on offshore structures such as an FLNG (Liquefied Natural Gas Floating P roduction Storage Offloading Units, LNG FPSOs) with a large topside plays an important role in the safety design of hull and mooring system. Therefore, the present study aims to develop a computational model for estimating the wind load acting on an FLNG. In particular, it is the sequel to the previous research by the author. The numerical computation model in the present study was modified based on the previous research. Numerical analysis for estimating wind loads was performed in two conditions for an interval of wind direction (α), 15° over the range of 0° to 360°. One condition is uniform wind speed and the other is the NPD model reflecting the wind speed profile. At first, the effect of sand-grain roughness on the speed profile of the NPD model was studied. Based on the developed NPD model, mesh convergence tests were carried out for 3 wind headings, i.e. head, quartering, and beam. Finally, wind loads on 6-degrees of freedom were numerically estimated and compared by two boundary conditions, uniform speed, and the NPD model. In the present study, a commercial RANS-based viscous solver, STAR-CCM+ (ver. 17.02) was adopted. In summary, wind loads in surge and yaw from the wind speed profile boundary condition were increased by 20.35% and 34.27% at most. Particularly, the interval mean of sway (45° < α <135°, 225° < α < 315°) and roll (60° < α < 135°, 225° < α < 270°) increased by 15.60% and 10.89% against the uniform wind speed (10m/s) boundary condition.

Additive Manufacturing for Sensor Integrated Components (센서 융합형 지능형 부품 제조를 위한 적층 제조 기술 연구)

  • Jung, Im Doo;Lee, Min Sik;Woo, Young Jin;Kim, Kyung Tae;Yu, Ji-Hun
    • Journal of Powder Materials
    • /
    • v.27 no.2
    • /
    • pp.111-118
    • /
    • 2020
  • The convergence of artificial intelligence with smart factories or smart mechanical systems has been actively studied to maximize the efficiency and safety. Despite the high improvement of artificial neural networks, their application in the manufacturing industry has been difficult due to limitations in obtaining meaningful data from factories or mechanical systems. Accordingly, there have been active studies on manufacturing components with sensor integration allowing them to generate important data from themselves. Additive manufacturing enables the fabrication of a net shaped product with various materials including plastic, metal, or ceramic parts. With the principle of layer-by-layer adhesion of material, there has been active research to utilize this multi-step manufacturing process, such as changing the material at a certain step of adhesion or adding sensor components in the middle of the additive manufacturing process. Particularly for smart parts manufacturing, researchers have attempted to embed sensors or integrated circuit boards within a three-dimensional component during the additive manufacturing process. While most of the sensor embedding additive manufacturing was based on polymer material, there have also been studies on sensor integration within metal or ceramic materials. This study reviews the additive manufacturing technology for sensor integration into plastic, ceramic, and metal materials.

Routing for Enhancing Source-Location Privacy in Wireless Sensor Networks of Multiple Assets

  • Tscha, Yeong-Hwan
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.589-598
    • /
    • 2009
  • In wireless sensor networks, a node that reports information gathered from adjacent assets should relay packets appropriately so that its location context is kept private, and thereby helping ensure the security of the assets that are being monitored. Unfortunately, existing routing methods that counter the local eavesdropping-based tracing deal with a single asset, and most of them suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. In this paper, we propose a routing method, greedy perimeter stateless routing-based source-location privacy with crew size w (GSLP-w), that enhances location privacy of the packet-originating node (i.e., active source) in the presence of multiple assets. GSLP-w is a hybrid method, in which the next-hop node is chosen in one of four modes, namely greedy, random, perimeter, and retreat modes. Random forwarding brings the path diversity, while greedy forwarding refrains from taking an excessively long path and leads to convergence to the destination. Perimeter routing makes detours that avoid the nodes near assets so that they cannot be located by an adversary tracing up the route path. We study the performance of GSLP-w with respect to crew size w (the number of packets being sent per path) and the number of sources. GSLP-w is compared with phantom routing-single path (PR-SP), which is a notable routing method for source-location privacy and our simulation results show that improvements from the point of the ratio of safety period and delivery latency become significant as the number of source nodes increases.

Design of Bottom Shape and Forming Analysis of Hydrogen Pressure Vessel with Maximum Volume (최대 내용적을 갖는 수소압력용기의 형상설계 및 성형해석)

  • Park, Gun Young;Kwak, Hyo Seo;Lee, Kwang O;Kim, Chul
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.10
    • /
    • pp.941-948
    • /
    • 2017
  • Recently, hydrogen energy has been in the spotlight as an alternative to diminishing fossil fuels and as a potential solution to environmental pollution. The development of hydrogen-fueled vehicles and the demands for improved fuel efficiencies have resulted in the need to increase the volume of the hydrogen pressure vessels. Pressure vessels having an elliptical bottom, as opposed to one that is hemispherical, allow for a greater capacity. However, there are insufficient studies on the feasibility of the forming process required for an elliptical bottom. In this study, the liner capacity is calculated according to the ratios of the major to the minor axes of the elliptical bottom part in a hydrogen pressure vessel. Structural safety is verified through finite element analyses, and the results are compared to the theoretical results. The feasibility of the proposed elliptical shape of the pressure vessel bottom, while filled to maximum capacity, is validated through forming analysis.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

Intelligent Emergency Alarm System based on Multimedia IoT for Smart City

  • Kim, Shin;Yoon, Kyoungro
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.3
    • /
    • pp.122-126
    • /
    • 2019
  • These-days technology related to IoT (Internet of Thing) is widely used and there are many types of smart system based IoT like smart health, smart building and so on. In smart health system, it is possible to check someone's health by analyzing data from wearable IoT device like smart watch. Smart building system aims to collect data from sensor such as humidity, temperature, human counter like that and control the building for energy efficiency, security, safety and so forth. Furthermore, smart city system can comprise several smart systems like smart building, smart health, smart mobility, smart energy and etc. In this paper, we propose multimedia IoT based intelligent emergency alarm system for smart city. In existing IoT based smart system, it communicates lightweight data like text data. In the past, due to network's limitations lightweight IoT protocol was proposed for communicating data between things but now network technology develops, problem which is to communicate heavy data is solving. The proposed system obtains video from IP cameras/CCTVs, analyses the video by exploiting AI algorithm for detecting emergencies and prevents them which cause damage or death. If emergency is detected, the proposed system sends warning message that emergency may occur to people or agencies. We built prototype of the intelligent emergency alarm system based on MQTT and assured that the system detected dangerous situation and sent alarm messages. From the test results, it is expected that the system can prevent damages of people, nature and save human life from emergency.