• Title/Summary/Keyword: Disaster Information Monitoring

Search Result 322, Processing Time 0.027 seconds

Probabilistic Monitoring of Effect of Meteorological Drought on Stream BOD Water Quality (기상학적 가뭄이 하천 BOD 수질에 미치는 영향의 확률론적 모니터링)

  • Jiyu Seo;Jeonghoon Lee;Hosun Lee;Sangdan Kim
    • Journal of Korean Society on Water Environment
    • /
    • v.39 no.1
    • /
    • pp.9-19
    • /
    • 2023
  • Drought is a natural disaster that can have serious social impacts. Drought's impact ranges from water supply for humans to ecosystems, but the impact of drought on river water quality requires careful investigation. In general, drought occurs meteorologically and is classified as agricultural drought, hydrological drought, and environmental drought. In this study, the BOD environmental drought is defined using the bivariate copula joint probability distribution model between the meteorological drought index and the river BOD, and based on this, the environmental drought condition index (EDCI-BOD) was proposed. The results of examining the proposed index using past precipitation and BOD observation data showed that EDCI-BOD expressed environmental drought well in terms of river BOD water quality. In addition, by classifying the calculated EDCI-BOD into four levels, namely, 'attention', 'caution', 'alert', and 'seriousness', a practical monitoring stage for environmental drought of BOD was constructed. We further estimated the sensitivity of the stream BOD to meteorological drought, and through this, we could identify the stream section in which the stream BOD responded relatively more sensitively to the occurrence of meteorological drought. The results of this study are expected to provide information necessary for river BOD management in the event of meteorological droughts.

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

Performance Analysis of a Media Access Control Protocol for Magnetic Field Communication (자기장 통신을 위한 매체 접근 제어 프로토콜의 성능분석)

  • Jeong, Eui-Hoon;Won, Yun-Jae;Kim, Sun-Hee;Lim, Seung-Ok;Bang, Young-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5A
    • /
    • pp.464-472
    • /
    • 2011
  • As wireless sensor networks are applied to various applications such as environment monitoring and disaster sensing system, there are increased needs for wireless communication in underground environment. Since the previous wireless communication technology using electromagnetic wave is not appropriate for the underground environment, a new alternative is required. Recently a magnetic field communication technology has been proposed and standardized as a domestic KS standard. In this paper, we analyze the media access control protocol of the KS standard by an analysis and a simulation study.

The Application of Satellite Imagery in Droughts Analysis of Large Area (광역의 가뭄 분석을 위한 위성영상의 활용)

  • Jeong, Soo;Shin, Sha-Chul
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.14 no.2 s.36
    • /
    • pp.55-62
    • /
    • 2006
  • Droughts have been an important factor in disaster management in Korea because she has been grouped into nations of lack of water. Satellite imagery can be applied to droughts monitoring because it can provide periodic data for large area for long time. This study aims to present a process to analyze droughts in large area using satellite imagery. We estimated evapotranspiration in large area using NDVI data acquired from satellite imagery. For satellite imagery, we dealt with MODIS data operated by NASA. The evapotranspiration estimated from satellite imagery was combined with precipitation data and potential evapotranspiration data to estimate water balances. Using water balances we could analyze droughts effectively in our object area. As the result of this study, we could increase the usability of satellite imagery, especially in droughts analysis.

  • PDF

Development of Application Service for Secure Container Transport Based on CSD (CSD 기반의 컨테이너 안전운송 응용 서비스 개발)

  • Choo, Young-Yeol;Choi, Su-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2203-2208
    • /
    • 2011
  • In this paper, we describe application service development for secure land and marine transport based on CSD (Conveyance Security Device) systems. Based on CSD systems, we present application service and security service according to relevant standards as well as test procedure of developed services. Exploiting temperature, moisture, impact sensors, state monitoring function of container freight was developed to prevent disaster during transportation in addition to security function with CSD. For confidentiality of messages exchanged among application service entity and CSD systems, Encryption and decryption functions going by RC5 and AES-128 algorithms were implemented at desktop PC and 8 bit CPU environments, respectively. Measuring the elapsed time during encryption and decryption shows that two algorithms are allowable for the application service.

Image Map Generation Using Low-altitude Photogrammetric UAV (저고도촬영시스템을 이용한 영상지도 제작)

  • Yoo, Hwan-Hee;Park, Jang-Whan;Shim, Jae-Hyun;Kim, Seong-Sam
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.14 no.1 s.35
    • /
    • pp.37-47
    • /
    • 2006
  • In the last years a low-altitude image acquisition technology has been developed in application of frequent change monitoring in urban area md speedy surveillance in disaster area. A low-altitude photogrammetric system have advantages of accurate observation and free data-acquisition time. Especially, an unmaned RC-helicopter, improving safety, durability and portability, comes into the spotlight as a built-in vehicle in close range photogrammetric application due to their capability of safe near-by observation and effective flight performance. This paper gives a methodology for generating image map by development of low cost and timesaving low-altitude photogrammetric UAV(unmaned aerial vehicles) for collecting high-resolution image data, and implement of geo-rectification and image mosaicking.

  • PDF

Real-Time Tank Monitoring System based on CAN (CAN을 기반으로 하는 실시간 탱크 모니터링 시스템)

  • 박진우;진기홍;노동규;박재한;지석준;이장명
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.274-277
    • /
    • 1999
  • Y2k will be able to enormous disaster. The many make an effort to find a solution to problem of Y2k. Problem of Y2k must solution to as follow. First, problem of Y2k solution organization must constructed. Second, in step with each stage\ulcornerthe first, developing and complete stage, stage of Y2k solution must be constructed. Third, solution of Y2k must construct to hierarchy. hierarchy structure constructed form six stage to first stage, first stage is investigation resources, second stage is estimation influence, third stage is planing conversion, fourth stage is working conversion, fifte spot, sixth stage is diffusion on the spot.

  • PDF

Emergency response system for safe operation of ships (선박 안전운전을 위한 응급대응 시스템 설계)

  • Kim, Yong Su
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.81-87
    • /
    • 2016
  • In line with the sharp increase of container traffic from globalization, ships have become larger with an aim of improving the maritime transport capacity in addition to the growing interest in monitoring danger areas on ships considering the quantity increase of ships, along with the tightening of international standard for ship safety by IMO(international Maritime Organization). Korea established a location based ship accident forecasting and preventing system in 2012 by Korea Coast Guard, however its poor response in ship accidents has been pointed out in the wake of the recent disaster of Sewol ferry. To resolve this problem, this study attempts to design a wearable type, instant emergency response system that has DGPS to issue an alert on danger areas and automatically send ship's location and operation information in emergency situation.

A Study on the Development of ICT-based Disaster Prevention Monitoring System for Shipbuilding Safety (선박 안전 건조를 위한 ICT 기반 재해방지 감시시스템 개발에 관한 연구)

  • Kim, Gi-Back;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.785-788
    • /
    • 2014
  • Even though Korea is No.1 shipbuilding country around the world, there have been a lot of accident and man-made calamity incurring in shipyards these days. Therefore most of Korea major shipyard and mid-small size shipyard deeply agonize about safety management countermeasure. As a result of it, many shipyards pour their effort on developing man watching system, PF wireless communication system, portable measuring system to prevent from accident such as fire, suffocation incurring. In this paper, analyze conventional accident & man-made calamity preventing system adopted by most of shipyard and enable the user to watch accident for 24 hours and notify it to user when it is incurring through state of the art ICT technology. And as a result of it the user can prevent the accident and man-made calamity at the beginning.

  • PDF

Federated Learning modeling for defense against GPS Spoofing in UAV-based Disaster Monitoring Systems (UAV 기반 재난 재해 감시 시스템에서 GPS 스푸핑 방지를 위한 연합학습 모델링)

  • Kim, DongHee;Doh, InShil;Chae, KiJoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.198-201
    • /
    • 2021
  • 무인 항공기(UAV, Unmanned Aerial Vehicles)는 높은 기동성을 가지며 설치 비용이 저렴하다는 이점이 있어 홍수, 지진 등의 재난 재해 감시 시스템에 이용되고 있다. 재난 재해 감시 시스템에서 UAV는 지상에 위치한 사물인터넷(IoT, Internet of Things) 기기로부터 데이터를 수집하는 임무를 수행하기 위해 계획된 항로를 따라 비행한다. 이때 UAV가 정상 경로로 비행하기 위해서는 실시간으로 GPS 위치 확인이 가능해야 한다. 만일 UAV가 계산한 현재 위치의 GPS 정보가 잘못될 경우 비행경로에 대한 통제권을 상실하여 임무 수행을 완료하지 못하는 결과가 초래될 수 있다는 취약점이 존재한다. 이러한 취약점으로 인해 UAV는 공격자가 악의적으로 거짓 GPS 위치 신호를 전송하는GPS 스푸핑(Spoofing) 공격에 쉽게 노출된다. 본 논문에서는 신뢰할 수 있는 시스템을 구축하기 위해 지상에 위치한 기기가 송신하는 신호의 세기와 GPS 정보를 이용하여 UAV에 GPS 스푸핑 공격 여부를 탐지하고 공격당한 UAV가 경로를 이탈하지 않도록 대응하기 위해 연합학습(Federated Learning)을 이용하는 방안을 제안한다.