• Title/Summary/Keyword: Disaster-Monitoring

Search Result 676, Processing Time 0.027 seconds

Soil Volume Computation Technique at Slope Failure Using Photogrammetric Information (영상정보를 활용한 사면 붕괴 토사량 산정 기법)

  • Bibek, Tamang;Lim, Hyuntaek;Jin, Jihuan;Jang, Sukhyun;Kim, Yongseong
    • Journal of the Korean GEO-environmental Society
    • /
    • v.19 no.12
    • /
    • pp.65-72
    • /
    • 2018
  • The uses of unmanned aerial vehicles (UAV) have been expanding in agriculture surveys, obtaining real time updates of dangerous facilities where human access is difficult, disaster monitoring, and 3D modeling. In reality, there is an upsurge in the application of UAVs in fields like, construction, infrastructure, imaging, surveying, surveillance and transportation. Especially, when the slope failure such as landslide occurs, the uses of UAVs are increasing. Since, the UAVs can fly in three dimensions, they are able to obtain spatial data in places where human access is nearly impossible. Despite of these advantages, however, the uses of UAVs are still limited during slope failure. In order to overcome these limitations, this study computes the soil volume change during slope failure through the computation technique using photogrammetric information obtained from UAV system. Through this study, it was found that photogrammetric information from UAV can be used to acquire information on amount of earthworks required for repair works when slope collapse occurs in mountainous areas, where human access in difficult.

Mobile Robot-based Leak Detection and Tracking System for Advanced Response and Training to Hazardous Materials Incidents (화학물질 저장시설의 사고대응 및 훈련을 위한 로봇기반 누출감지 및 추적시스템)

  • Park, Myeongnam;Kim, Chang Won;Kim, Tae-Ok;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.2
    • /
    • pp.17-27
    • /
    • 2019
  • In recent years, dangerous materials and gas leak accidents have been frequently occurred. The hazardous materials storage facility accidents are not rapidly controlled when a leak is detected, unlike other chemical plants can be controled. Externally, the human has to approach and respond to the source of leaking directly. As a result, the human and material damage are likely to larger result in the process. The current approach has been passive response after ringing the alarm. In this study, the suggested tracking system of the leak resource is designed system to track the resource actively by utilizing the mobile sensor robot platform, which can be made easily through recent rapid development technology, is verified through prototype system. Thus, a suggested system should pave the way for minimizing the spread and damage of the accident based on the exact site situation of the initial leak and quick and early measures.

GCP Chip Automatic Extraction of Satellite Imagery Using Interest Point in North Korea (특징점 추출기법을 이용한 접근불능지역의 위성영상 GCP 칩 자동추출)

  • Lee, Kye Dong;Yoon, Jong Seong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.4
    • /
    • pp.211-218
    • /
    • 2019
  • The Ministry of Land, Infrastructure and Transport is planning to launch CAS-500 (Compact Advanced Satellite 500) 1 and 2 in 2019 and 2020. Satellite image information collected through CAS-500 can be used in various fields such as global environmental monitoring, topographic map production, analysis for disaster prevention. In order to utilize in various fields like this, it is important to get the location accuracy of the satellite image. In order to establish the precise geometry of the satellite image, it is necessary to establish a precise sensor model using the GCP (Ground Control Point). In order to utilize various fields, step - by - step automation for orthoimage construction is required. To do this, a database of satellite image GCP chip should be structured systematically. Therefore, in this study, we will analyze various techniques for automatic GCP extraction for precise geometry of satellite images.

Adjacent Matrix-based Hole Coverage Discovery Technique for Sensor Networks

  • Wu, Mary
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.169-176
    • /
    • 2019
  • Wireless sensor networks are used to monitor and control areas in a variety of military and civilian areas such as battlefield surveillance, intrusion detection, disaster recovery, biological detection, and environmental monitoring. Since the sensor nodes are randomly placed in the area of interest, separation of the sensor network area may occur due to environmental obstacles or a sensor may not exist in some areas. Also, in the situation where the sensor node is placed in a non-relocatable place, some node may exhaust energy or physical hole of the sensor node may cause coverage hole. Coverage holes can affect the performance of the entire sensor network, such as reducing data reliability, changing network topologies, disconnecting data links, and degrading transmission load. It is possible to solve the problem that occurs in the coverage hole by finding a coverage hole in the sensor network and further arranging a new sensor node in the detected coverage hole. The existing coverage hole detection technique is based on the location of the sensor node, but it is inefficient to mount the GPS on the sensor node having limited resources, and performing other location information processing causes a lot of message transmission overhead. In this paper, we propose an Adjacent Matrix-based Hole Coverage Discovery(AMHCD) scheme based on connectivity of neighboring nodes. The method searches for whether the connectivity of the neighboring nodes constitutes a closed shape based on the adjacent matrix, and determines whether the node is an internal node or a boundary node. Therefore, the message overhead for the location information strokes does not occur and can be applied irrespective of the position information error.

A Study on the Secure Plan of Security in SCADA Systems (SCADA 시스템의 안전성 확보방안에 관한 연구)

  • Kim, Young-Jin;Lee, Jung-Hyun;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.145-152
    • /
    • 2009
  • SCADA(Supervisory Control And Data Acquisition) systems are widely used for control and monitoring of critical infrastructures including electricity, gas and transportation. Any compromise in the security of SCADA systems could result in massive chaos and disaster at a national level if a malicious attacker takes the control of the system. Therefore, sound countermeasures must be provided when the SCADA systems are being developed as well as when they are being operated. Unlike general information processing system, SCADA systems have different service responses, communication protocols and network architectures and therefore a different approach should be applied to each SCADA systems that takes into consideration of each system's security characteristics and architectures. In addition, legal basis should be established to ensure the nationwide management of the systems security. This paper examines the vulnerabilites of SCADA systems and proposes action plans to protect the systems against cyber attacks.

Assessment of Livestock Infectious Diseases Exposure by Analyzing the Livestock Transport Vehicle's Trajectory Using Big Data (빅데이터 기반 가축관련 운송차량 이동경로 분석을 통한 가축전염병 노출수준 평가)

  • Jeong, Heehyeon;Hong, Jungyeol;Park, Dongjoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.134-143
    • /
    • 2020
  • With the worldwide spread of African swine fever, interest in livestock epidemics is growing. Livestock transport vehicles are the main cause of the spread of livestock epidemics, but no empirical quarantine procedures and standards related to the mobility of livestock transport vehicles in South Korea. This study extracted livestock-related vehicles' trajectory by utilizing the facility visit history data from the Korea Animal Health Integrated System and the DTG (Digital Tachograph) data from the Korea Transportation Safety Authority and presented them as exposure indexes aggregating the link-time occupancy of each vehicle. As a result, a total of 274,519 livestock-related vehicle trajectories were extracted, and exposure values by link and zone were quantitatively derived. Through this study, it is expected that prior monitoring of livestock transport vehicles and the establishment of post-disaster prevention policies would be provided.

A Study on the Path Loss of Underwater Acoustic Channel Based on At-sea Experiment at the South Sea of Korea (남해 실해역 시험 기반 수중음향채널 경로손실에 관한 연구)

  • Kim, Min-Sang;Lee, Tae-Seok;Cho, Yong-Ho;Im, Tae-Ho;Ko, Hak-Lim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.405-411
    • /
    • 2020
  • Recently, studies on underwater communication, related to the development of underwater resources, disaster monitoring and defense, have been actively carried out. In the design of wireless communication systems, path loss is the most important information to derive a link budget that is required to guarantee communication reliability by calculating received power level for the given communication link. The underwater acoustic channel have different characteristics according to geographical location and relevant environmental factors such as water temperature, depth, wave height, algae, and turbidity. Subsequently, many research institutes aiming to develop underwater acoustic communication systems are researching actively on the underwater acoustic channels in various sea areas. In Korea, however, studies on the path loss of the acoustic channel are still insufficient. Therefore, in this study, the path loss of the acoustic channel are studied based on measurement data of the at-sea experiment conducted at Geohae-do, southern sea of Korea.

Comparison of the Machine Learning Models Predicting Lithium-ion Battery Capacity for Remaining Useful Life Estimation (리튬이온 배터리 수명추정을 위한 용량예측 머신러닝 모델의 성능 비교)

  • Yoo, Sangwoo;Shin, Yongbeom;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.6
    • /
    • pp.91-97
    • /
    • 2020
  • Lithium-ion batteries (LIBs) have a longer lifespan, higher energy density, and lower self-discharge rates than other batteries, therefore, they are preferred as an Energy Storage System (ESS). However, during years 2017-2019, 28 ESS fire accidents occurred in Korea, and accurate capacity estimation of LIB is essential to ensure safety and reliability during operations. In this study, data-driven modeling that predicts capacity changes according to the charging cycle of LIB was conducted, and developed models were compared their performance for the selection of the optimal machine learning model, which includes the Decision Tree, Ensemble Learning Method, Support Vector Regression, and Gaussian Process Regression (GPR). For model training, lithium battery test data provided by NASA was used, and GPR showed the best prediction performance. Based on this study, we will develop an enhanced LIB capacity prediction and remaining useful life estimation model through additional data training, and improve the performance of anomaly detection and monitoring during operations, enabling safe and stable ESS operations.

Tafoni Patterns on Tuff Slopes in Gogulsa Temple, Gyeongju and Its Microstructural Properties (경주 골굴사 응회암 사면의 타포니 분포 특성과 미세구조)

  • Choo, Chang-Oh;Lee, Jin-Kook
    • The Journal of Engineering Geology
    • /
    • v.32 no.3
    • /
    • pp.339-350
    • /
    • 2022
  • There are a variety of types in tafoni formed in Miocene tuff from Golgulsa, Gyeongju. Tuff bearing tafoni was quite weathered, composed of quartz, feldspars, micas, vermiculite, chlorite, smectite, and analcite. In the early stage of the tafoni development, tafoni preferentially formed from cavities where volcanic breccias were removed or from microcavities where microcrystals were chemically altered. Small tafoni grew into large one by merging each other. The orientation of tafoni is inversely arranged to slopes, with slight inclination toward the inner cavity. Height, width, and depth of tafoni are closely interrelated: the correlation coefficients are 0.839 (width-height), 0.900 (width-depth), and 0.856 (height-depth), respectively. Removal of walls between tafoni resulted in lenticular or crescent forms, and small tafoni laterally combined to large tafoni. Large tafoni is weak because of high porosity and low strength compared to normal slope. Therefore, systematic monitoring for slope strength, pore proportion and volume, and growth of cavity needs to secure the slope stability where tafoni in Golgulsa is widespread.

Research Trend of the Remote Sensing Image Analysis Using Deep Learning (딥러닝을 이용한 원격탐사 영상분석 연구동향)

  • Kim, Hyungwoo;Kim, Minho;Lee, Yangwon
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_3
    • /
    • pp.819-834
    • /
    • 2022
  • Artificial Intelligence (AI) techniques have been effectively used for image classification, object detection, and image segmentation. Along with the recent advancement of computing power, deep learning models can build deeper and thicker networks and achieve better performance by creating more appropriate feature maps based on effective activation functions and optimizer algorithms. This review paper examined technical and academic trends of Convolutional Neural Network (CNN) and Transformer models that are emerging techniques in remote sensing and suggested their utilization strategies and development directions. A timely supply of satellite images and real-time processing for deep learning to cope with disaster monitoring will be required for future work. In addition, a big data platform dedicated to satellite images should be developed and integrated with drone and Closed-circuit Television (CCTV) images.