• Title/Summary/Keyword: Fire detection

Search Result 638, Processing Time 0.026 seconds

A Study on the Comparison between an Optical Fiber and a Thermal Sensor Cable for Temperature Monitoring (온도 모니터링을 위한 광섬유 센서와 온도센서 배열 케이블의 비교 연구)

  • Kim, Jung-Yul;Kim, Yoo-Sung;Song, Yoon-Ho
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2006.03a
    • /
    • pp.1100-1109
    • /
    • 2006
  • In this study, two different technologies which can measure temperature simultaneously at many points are introduced. One is to use a thermal sensor cable that is comprised of addressable thermal sensors connected in parallel within a single cable. The other is to use an optic fiber with Distributed Temperature Sensing (DTS) system. The difference between two technologies can be summarized as follows. A thermal sensor cable has a concept of 'point sensing' that can measure temperature at accurate position of a thermal sensor. So the accuracy and resolution of temperature measurement are up to the ability of the thermal sensor. Whereas optic fiber sensor has a concept of 'distributed sensing' because temperature is measured by ratio of Stokes and anti-Stokes component intensities of Raman backscatter that is generated when laser pulse travels along an optic fiber. It's resolution is determined by measuring distance, measuring time and spatial resolution. The purpose of this study is that application targets of two temperature measurement techniques are checked in technical and economical phases by examining the strength and weakness of them. Considering the functions and characteristics of two techniques, the thermal sensor cable will be suitable to apply to the assessment of groundwater flow, geothermal distribution and grouting efficiency within 300m distance. It is expected that the optic fiber sensor can be widely utilized at various fields (for example: pipe line inspection, tunnel fire detection, power line monitoring etc.) which need an information of temperature distribution over relatively long distance.

  • PDF

Home Security System Based on IoT (IoT 기반 홈 보안 시스템)

  • Kim, Kang-Chul;Wang, Ding-Hua;Han, Seok-Bung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.147-154
    • /
    • 2017
  • This paper aims to build a home security system based on IoT to monitor a home on a mobile phone. The system consists of data gathering sensors, camera, gateway and Xively platform. The Raspberry Pi collects data from the three sensors and sends the data to Xively, and sends the video stream of home to a client in a smart phone through a internet. The servers are composed of Xively, socket server in Raspberry Pi and E-mail server in Google. The proposed system transmits e-mail, text message, and video stream when there are motion, fire, and gas leakage, and can control the gas valve through Raspberry Pi. The experimental results show that a user gets 'emergency E-mail' and text message and watches the video stream of the home through WIFI or LTE on a smart phone.

North Korean military provocations and the corresponding direction - Focus on the threat that resulted in unequal power wood box mines provocation - (북한군의 군사적 도발 및 대응방향 - 목함 지뢰 도발에 이어진 비대칭전력 위협을 중심으로-)

  • Kim, Gyu Nam
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.59-67
    • /
    • 2015
  • Our vision is to see the North and there is a large visual target that the two exchanges and cooperation and unity that put the main enemy of enemies in mind in need. North Korea is the main enemy was illegal invasion June 25, 1950 July 27, 1953 has continued after the armistice join the illegal provocations and cease fire violations so far. August 4, 2015, North Korea was operating by the power differential that operate on an all-out war and declared the initial state after the exhibition gave another provocative DMZ wood box mines. US-ROK military was in the process of real-time detection of the North Korean power operation and the results were broadcast live through the media. Looking at these military provocations on the threat of asymmetrical power of North Korea's military threat, we would like to present how to respond.

Clustering Algorithm for Efficient Energy Consumption in Wireless Sensor Networks (무선 센서 네트워크에서 효율적인 에너지 사용을 위한 클러스터링 알고리즘)

  • Na, Sung-Won;Choi, Seung-Kwon;Lee, Tae-Woo;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.6
    • /
    • pp.49-59
    • /
    • 2014
  • Recently, wireless sensor networks(WSNs) are widely used for intrusion detection and ecology, environment, atmosphere, industry, traffic, fire monitoring. In this paper, an energy efficient clustering algorithm is proposed. The proposed algorithm forms clusters uniformly by selecting cluster head that optimally located based on receiving power. Besides, proposed algorithm can induce uniform energy consumption regardless of location of nodes by multi-hop transmission and MST formation with limited maximum depth. Through the above, proposed algorithm elongates network life time, reduces energy consumption of nodes and induces fair energy consumption compared to conventional LEACH and HEED. The results of simulation show that the proposed clustering algorithm elongates network life time through fair energy consumption.

A Study on the Countermeasures of Iskander (이스칸데르 미사일 대응방안 연구)

  • Kim, Sea Ill;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.109-115
    • /
    • 2019
  • The North's short-range projectiles and missiles are the Iskander-class missiles of the S-300 series, with a range of 270-420 kilometers and an altitude of 40-50 kilometers, making it very difficult to respond with South Korea's detection radar or striking weapons. The North's handling of the Seoul sea of fire also makes it very urgent for the South to deploy the weapons to power or introduce them as soon as possible, as it can identify its intention to strike the Seoul metropolitan area by equipping such short-range rockets and missiles with nuclear or chemical weapons. We will be prepared to prep are for reckless provocations by securing our own technology by continuously developing the Korean missile defense system and striking system, Kill Chain, which is designed to defend short-range missiles in the long-term, and securing our own technology.

K-Band Radar Development for the Ground Moving Vehicle (지상 이동 차량용 K-대역 레이다 개발)

  • Lee, Jong-Min;Cho, Byung-Lae;Sun, Sun-Gu;Lee, Jung-Soo;Park, Sang-Soon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.3
    • /
    • pp.362-370
    • /
    • 2011
  • This paper presents a K-band radar system installed on the ground moving vehicle to detect and track a high-speed target. The presented radar is separated into three search regions to satisfy a wide area detection and a limitation of the installing space of the radar, and each region performs detecting the target independently and tracking the detected target automatically. The presented radar radiating K-band FMCW waveform acquires range and velocity information of the target at the every dwell and receiving antenna of the radar is applied the multiple baseline interferometer to extract the precise angle information of the target. 3-dimensional tracking accuracy of the radar is 0.25 m RMSE measured actually through a fire experiment of an imitation target.

A Study on Methodology for Standardized Platform Design to Build Network Security Infrastructure (네트워크 보안 인프라 구성을 위한 표준화된 플랫폼 디자인 방법론에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.1
    • /
    • pp.203-211
    • /
    • 2012
  • Network security infrastructure is constantly developing based on the combination and blending of various types of devices. From the form of distributed control, the phased defense policy such as fire walls, virtual private communication network, invasion prevention system, invasion detection system, corporate security management, and TSM (Telebiometrics System Mechanism), now it consolidates security devices and solutions to be developed to the step of concentration and artificial intelligence. Therefore, this article suggests network security infrastructure design types concentrating security devices and solutions as platform types and provides network security infrastructure design selecting methodology, the foundational data to standardize platform design according to each situation so as to propose methodology that can realize and build the design which is readily applied and realized in the field and also can minimize the problems by controlling the interferences from invasion.

Development of M2M-based Underground Space (subway) Disaster Response Network and EL Display Integrated Board (M2M기반 지하공간(지하철) 재난대응 네트워크 및 EL 디스플레이 통합 보드 개발)

  • Park, Miyun;Kwon, Segon;Park, EunChurn;Lee, Jeonhun
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.422-441
    • /
    • 2017
  • Notifying emergency evacuation methods, accurate disaster location and evacuation route guidance can be very active alternatives to quickly minimize evacuation and casualties in disaster situation in the development of subway disaster prevention detection system that detects the disaster signs at the subway station early on the basis of Internet of things and leads passengers to evacuate. It's not easy to ensure perfect functioning of fire fighting facilities and equipments due to underground space structure with narrow exits. Therefore, we developed disaster provision EL Display integrated board that can induce the most efficient evacuation and the field experiment was conducted to examine the practical application in this study. Especially the applicability was verified by field application test because there is no case in which EL panels are used to evacuate disasters.

A Study on Performance Evaluation and Security Measures of U-IT Electrical Safety Integrated Management System's Module (U-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dea-Woo;Choi, Choung-Moon;Kim, Eung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.307-310
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. U-City in order to prevent the disaster of U-IT Power Equipment Performance Module and the security for the safety of the U-City is necessary. In this paper, the power unit of U-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation and security measures will be studied. U-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as U-IT integrated management system for electrical safety and strengthen the security, safety and security with a U-City will contribute to the construction and operation.

  • PDF

AE Characteristic under Tensile of Carbon Steel for High-Pressure Pipe (고압배관용 탄소강의 인장시 음향방출 특성)

  • Nam Kiwoo;Lee Siyoon
    • Journal of the Korean Institute of Gas
    • /
    • v.7 no.2 s.19
    • /
    • pp.48-53
    • /
    • 2003
  • This study is to look at the effect for deformation of carbon steel for high-presure pipe, on the AE signals produced by tensile test. Acoustic emission(AE) has been widely used in various fields because of its extreme sensitivity, dynamic detection ability and location of growing defects. We investigated a relationship failure mode and AE signals by tensile test, From the tensile test, we could divide into four ranges of the failure modes of elastic range, yield range, plastic range before $\sigma$u, plastic range after $\sigma$u. And failure behaviors of elastic range, yield range, plastic range before $\sigma$u, plastic range after $\sigma$u could be evaluated in tensile test by AE counts, accumulation counts and time frequency analysis. It is expected to be basic data that can protect a risk according to tensile test and bending of pipe material for pressure vessel, as a real time test of AE.

  • PDF