• Title/Summary/Keyword: Data fusion system

Search Result 590, Processing Time 0.026 seconds

Compensation of Light Scattering Method for Real-Time Monitoring of Particulate Matters in Subway Stations (지하역사 내 미세먼지 실시간 모니터링을 위한 광산란법 보정)

  • Kim, Seo-Jin;Kang, Ho-Seong;Son, Youn-Suk;Yoon, Sang-Lyeor;Kim, Jo-Chun;Kim, Gyu-Sik;Kim, In-Won
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.26 no.5
    • /
    • pp.533-542
    • /
    • 2010
  • The $PM_{10}$ concentrations in the underground should be monitored for the health of commuters on the underground subway system. Seoul Metro and Seoul Metropolitan Rapid Transit Corporation are measuring several air pollutants regularly. As for the measurement of $PM_{10}$ concentrations, instruments based on $\beta$-ray absorption method and gravimetric methods are being used. But the instruments using gravimetric method give us 20-hour-average data and the $\beta$-ray instruments can measure the $PM_{10}$ concentration every one hour. In order to keep the $PM_{10}$ concentrations under a healthy condition, the air quality of the underground platform and tunnels should be monitored and controlled continuously. The $PM_{10}$ instruments using light scattering method can measure the $PM_{10}$ concentrations every less than one minute. However, the reliability of the instruments using light scattering method is still not proved. The purpose of this work is to study the reliability of the instruments using light scattering method to measure the $PM_{10}$ concentrations continuously in the underground platforms. One instrument using $\beta$-ray absorption method and two different instruments using light scattering method (LSM1, LSM2) were placed at the platform of the Jegi station of Seoul metro line Number 1 for 10 days. The correlation between the $\beta$-ray instrument and the LSM2 ($r^2$=0.732) was higher than that between the $\beta$-ray instrument and the LSM1 ($r^2$=0.393). Thus the LSM2 was chosen for further analysis. Three different regression analysis methods were tested: Linear regression analysis, Nonlinear regression analysis and Orthogonal regression analysis. When the instruments using light scattering method were used, the data measured these instruments have to be converted to actual $PM_{10}$ concentrations using some factors. With these analyses, the factors could be calculated successfully as linear and nonlinear forms with respect to the data. And the orthogonal regression analysis was performed better than the ordinary least squares method by 28.45% reduction of RMSE. These findings propose that the instruments using light scattering method light scattering method can be used to measure and control the $PM_{10}$ concentrations of the underground subway stations.

Development of Compression and Transmission Technology of GIS-based High Resolution Image Data in Flood Disaster Situation (홍수재난 상황에서 GIS 기반의 고해상도 영상데이터의 압축 및 전송 기술 개발)

  • Lee, Seung Hyeon;Lee, Eung Joon;Choung, Yun Jae
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.7
    • /
    • pp.1038-1045
    • /
    • 2017
  • The increase in frequency and scale of natural disasters is the typical negative examples of the global climate change and the change of the human living environment. The damage caused by natural disasters in particular including human and physical damage is directly linked to the safety and properties of citizens. Besides, damage occurs directly or indirectly to the SOC facility, and the damaged SOC facility violates the citizens' safety rights. Therefore, a plan to provide prompt and effective risk map information by linking a 3D disaster information display system, which handles the information of the damage that may occur to SOC facilities at the time of disasters, with an on-site assistance application is suggested in this study. The prompt provision of risk map information is defined as a dynamic expression technology in this study. It also processes and compresses the system to display disaster information, a spreading system that can utilize on-site information, and a module developed to organically link with the DB system that builds information and relationships. Based on the module, the effective disaster information compression plan will be prepared, and the prompt information transmission system will be secured.

A Study on Event Log Correlation Analysis for Control System Threat Analysis (제어시스템 위협분석을 위한 Event Log 상관분석에 관한 연구)

  • Kim, Jongmin;Kim, Minsu;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.35-40
    • /
    • 2017
  • The control system can have such threats as information leakage and falsification through various routes due to communications network fusion with public network. As the issues about security and the infringe cases by new attack methods are diversified recently, with the security system that makes information data database by simply blocking and checking it is difficult to cope with new types of threats. It is also difficult to respond security threats by insiders who have security access authority with the existing security equipment. To respond the threats by insiders, it is necessary to collect and analyze Event Log occurring in the internal system realtime. Therefore, this study could find out whether there is correlation of the elements among Event Logs through correlation analysis based on Event Logs that occur real time in the control system, and based on the analysis result, the study is expected to contribute to studies in this field.

A Study on the Reorganization of the National Spatial Information System (국가공간정보시스템 개편 추진 방향 연구)

  • Kim, Jeong Hyun;Kim, Soon Han;Kim, Sun Kyu;Kim, Sang Min;Jung, Jae Hoon;Heo, Joon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.5
    • /
    • pp.373-383
    • /
    • 2015
  • Spatial information has been widely used for efficient land use and management, disaster management, environment management, infrastructure management, corporate marketing, and cultural assets management, and the need for spatial information is expected to be increased. For this reason, central government, local government and public institutions must establish a National Spatial Information System (Fifteen systems related to spatial information managed by National Spatial Data Infrastructure Policy office, NSIS) framework that guarantees high accuracy and quality. The NSIS will provide convenience usage of spatial information in the field of decision-making or civil support. However the current National Spatial Information System is mainly established with separate processes, which causes data redundancy, deterioration of information, passive opening, and sharing of the spatial data. This study suggests 4 standards, which has been derived by applying value-chain model to NSIS data flow, and they are ‘Production and Establishment’, ‘Integration and Sharing’, ‘Application and Fusion’ and ‘Release and Opening’. Based on these standards, the 15 NSIS were analyzed to draw out implications and reforming directions were suggested. By following these suggestions we expect more recent, consist, accurate, and connected National Spatial Information Service which will be more open to public and then satisfy the demands.

Current Status and Problems of PET/CT Data on CD for Inter-hospital Transfer (병원간 전송용 PET/CT 영상 CD자료의 현황 및 문제점)

  • Hyun, Seung-Hyup;Choi, Joon-Young;Lee, Su-Jin;Cho, Young-Seok;Lee, Ji-Young;Cheon, Mi-Ju;Cho, Suk-Kyong;Lee, Kyung-Han;Kim, Byung-Tae
    • Nuclear Medicine and Molecular Imaging
    • /
    • v.43 no.2
    • /
    • pp.137-142
    • /
    • 2009
  • Purpose: This study was performed to find the current problems of positron emission tomography/computed tomography(PET/CT) data on CD for inter-hospital transfer. Materials and Methods: The subjects were 746 consecutive $^{18}F$-fluorodeoxyglucose PET/CT data CDs from 56 hospitals referred to our department for image interpretation. The formats and contents of PET/CT data CDs were reviewed and the email questionnaire survey about this was performed. Results: PET/CT data CDs from 21 of 56 hospitals(37.5%) included all transaxial CT and PET images with DICOM standard format which were required for authentic interpretation. PET/CT data from the others included only secondary capture images or fusion PET/CT images. According to this survey, the main reason of limited PET/CT data on CD for inter-hospital transfer was that the data volume of PET/CT was too large to upload to the Picture Archiving and Communication System. Conclusion: The majority of hospitals provided limited PET/CT data on CD for inter-hospital transfer, which could be inadequate for accurate interpretation and clinical decision making. It is necessary to standardize the format of PET/CT data on CD for inter-hospital transfer including all transaxial CT and PET images with DICOM standard format.

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.

Image Fusion Watermarks Using Multiresolution Wavelet Transform (다해상도 웨이블릿 변환을 이용한 영상 융합 워터마킹 기법)

  • Kim Dong-Hyun;Ahn Chi-Hyun;Jun Kye-Suk;Lee Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.83-92
    • /
    • 2005
  • This paper presents a watermarking approach that the 1-level Discrete Wavelet Transform(DWT) coefficients of a $64{\ast}64$ binary logo image as watermarks are inserted in LL band and other specific frequency bands of the host image using Multi-Resolution Analysis(MRA) Wavelet transform for copyright protection of image data. The DWT coefficients of the binary logo image are inserted in blocks of LL band and specific bands of the host image that the 3-level DWT has been performed in the same orientation. We investigate Significant Coefficients(SCs) in each block of the frequency areas in order to prevent the quality deterioration of the host image and the watermark is inserted by SCs. When the host image is distorted by difference of the distortion degree in each frequency, we set the thresholds of SCs on each frequency and completely insert the watermark in each frequency of the host image. In order to be invisibility of the watermark, the Human Visual System(HVS) is applied to the watermark. We prove the proper embedding method by experiment. Thereby, we rapidly detect the watermark using this watermarking method and because the small size watermarks are inserted by HVS and SCs, the results confirm the superiority of the proposed method on invisibility and robustness.

Scenario-based Vulnerability Assessment of Hydroelectric Power Plant (시나리오 기반 수력플랜트 설비의 취약성 평가)

  • Nam, Myeong Jun;Lee, Jae Young;Jung, Woo Young
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.9-21
    • /
    • 2021
  • Recently, the importance of eco-friendly power generation facility using renewable energy has newly appeared. Hydropower plant is a very important source of electricity generation and supply which is very important to secure safety because it is commonly connected with multi facility and operated on a large scale. In this study, a scenario-based analysis method was suggested to assess vulnerability of a penstock system caused by water hammer commonly occurred in the operation of hydropower plants. A hypothetical hydropower plant was used to demonstrate the applicability of a transient analysis model. In order to verify reliability of the model, the prediction of pressure behaviors were compared with the results of commercial model (SIMSEN) and measured data, then a real hydroelectric power plant was applied to develop all potential water hammer scenarios during the actual operation. The scenario-based simulation and vulnerability assessment for water hammer in the penstock system were performed with internal and external load conditions. The simulation results indicated that the vulnerability of a penstock system was varied with the operating conditions of hydropower facilities and significantly affected by load combination consisting of different load scenarios. The proposed numerical method could be an useful tool for the vulnerabilityty assessment of the hydropower plants due to water hammer.

Development of Underwater Positioning System using Asynchronous Sensors Fusion for Underwater Construction Structures (비동기식 센서 융합을 이용한 수중 구조물 부착형 수중 위치 인식 시스템 개발)

  • Oh, Ji-Youn;Shin, Changjoo;Baek, Seungjae;Jang, In Sung;Jeong, Sang Ki;Seo, Jungmin;Lee, Hwajun;Choi, Jae Ho;Won, Sung Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.352-361
    • /
    • 2021
  • An underwater positioning method that can be applied to structures for underwater construction is being developed at the Korea Institute of Ocean Science and Technology. The method uses an extended Kalman filter (EKF) based on an inertial navigation system for precise and continuous position estimation. The observation matrix was configured to be variable in order to apply asynchronous measured sensor data in the correction step of the EKF. A Doppler velocity logger (DVL) can acquire signals only when attached to the bottom of an underwater structure, and it is difficult to install and recover. Therefore, a complex sensor device for underwater structure attachment was developed without a DVL in consideration of an underwater construction environment, installation location, system operation convenience, etc.. Its performance was verified through a water tank test. The results are the measured underwater position using an ultra-short baseline, the estimated position using only a position vector, and the estimated position using position/velocity vectors. The results were compared and evaluated using the circular error probability (CEP). As a result, the CEP of the USBL alone was 0.02 m, the CEP of the position estimation with only the position vector corrected was 3.76 m, and the CEP of the position estimation with the position and velocity vectors corrected was 0.06 m. Through this research, it was confirmed that stable underwater positioning can be carried out using asynchronous sensors without a DVL.

Design and Implementation of CNN-based HMI System using Doppler Radar and Voice Sensor (도플러 레이다 및 음성 센서를 활용한 CNN 기반 HMI 시스템 설계 및 구현)

  • Oh, Seunghyun;Bae, Chanhee;Kim, Seryeong;Cho, Jaechan;Jung, Yunho
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.777-782
    • /
    • 2020
  • In this paper, we propose CNN-based HMI system using Doppler radar and voice sensor, and present hardware design and implementation results. To overcome the limitation of single sensor monitoring, the proposed HMI system combines data from two sensors to improve performance. The proposed system exhibits improved performance by 3.5% and 12% compared to a single radar and voice sensor-based classifier in noisy environment. In addition, hardware to accelerate the complex computational unit of CNN is implemented and verified on the FPGA test system. As a result of performance evaluation, the proposed HMI acceleration platform can be processed with 95% reduction in computation time compared to a single software-based design.