• Title/Summary/Keyword: Intelligent Monitoring System

Search Result 663, Processing Time 0.029 seconds

Real Time Abandoned and Removed Objects Detection System (실시간 방치 및 제거 객체 검출 시스템)

  • Jeong, Cheol-Jun;Ahn, Tae-Ki;Park, Jong-Hwa;Park, Goo-Man
    • Journal of Broadcast Engineering
    • /
    • v.16 no.3
    • /
    • pp.462-470
    • /
    • 2011
  • We proposed a realtime object tracking system that detects the abandoned or disappeared objects. Because these events are caused by human, we used the tracking based algorithm. After the background subtraction by Gaussian mixture model, the shadow removal is applied for accurate object detection. The static object is classified as either of abandoned objects or disappeared object. We assigned monitoring time to the static object to overcome a situation that it is being overlapped by other object. We obtained more accurate detection by using region growing method. We implemented our algorithm by DSP processor and obtained an excellent result throughout the experiment.

Design and Implementation of a Cloud-Based Recovery System against Ransomware Attacks (클라우드 기반 랜섬웨어 복구 시스템 설계 및 구현)

  • Ha, Sagnmin;Kim, Taehoon;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.521-530
    • /
    • 2017
  • In this paper, we propose a protection solution against intelligent Ransomware attacks by encrypting not only source files but also backup files of external storage. The system is designed to automatically back up to the cloud server at the time of file creation to perform monitoring and blocking in case a specific process affects the original file. When client creates or saves a file, both process identifiers, parent process identifiers, and executable file hash values are compared and protected by the whitelist. The file format that is changed by another process is monitored and blocked to prevent from suspicious behavior. By applying the system proposed in this paper, it is possible to protect against damage caused by the modification or deletion of files by Ransomware.

A study on the development of a ship-handling simulation system based on actual maritime traffic conditions (선박조종 시뮬레이터를 이용한 연안 해역 디지털 트윈 구축에 연구)

  • Eunkyu Lee;Jae-Seok Han;Kwang-Hyun Ko;Eunbi Park;Kyunghun Park;Seong-Phil Ann
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.200-201
    • /
    • 2023
  • Digital twin technology is used in various fields as a method of creating a virtual world to minimize the cost of solving problems in the real world, and is also actively used in the maritime field, such as large-scale systems such as ships and offshore plants. In this paper, we tried to build a digital twin of coastal waters using a ship-handling simulator. The digital twin of the coastal waters developed in this way can be used to safely manage Korea's coastal waters, where maritime traffic is complicated, by providing a actual maritime traffic data. It can be usefully used to develop and advance technologies related to maritime autonomous surface ships and intelligent maritime traffic information services in coastal waters. In addition, it can be used as a 3D-based monitoring equipment for areas where physical monitoring is difficult but real-time maritime traffic monitoring is necessary, and can provide functions to safely manage maritime traffic situations such as aerial views of ports/control areas, bridge views/blind sector views of ships in operation.

  • PDF

Monitoring the water absorption in GFRE pipes via an electrical capacitance sensors

  • Altabey, Wael A.;Noori, Mohammad
    • Advances in aircraft and spacecraft science
    • /
    • v.5 no.4
    • /
    • pp.499-513
    • /
    • 2018
  • One of the major problems in glass fiber reinforced epoxy (GFRE) composite pipes is the durability under water absorption. This condition is generally recognized to cause degradations in strength and mechanical properties. Therefore, there is a need for an intelligent system for detecting the absorption rate and computing the mass of water absorption (M%) as a function of absorption time (t). The present work represents a new non-destructive evaluation (NDE) technique for detecting the water absorption rate by evaluating the dielectric properties of glass fiber and epoxy resin composite pipes subjected to internal hydrostatic pressure at room temperature. The variation in the dielectric signatures is employed to design an electrical capacitance sensor (ECS) with high sensitivity to detect such defects. ECS consists of twelve electrodes mounted on the outer surface of the pipe. Radius-electrode ratio is defined as the ratio of inner and outer radius of pipe. A finite element (FE) simulation model is developed to measure the capacitance values and node potential distribution of ECS electrodes on the basis of water absorption rate in the pipe material as a function of absorption time. The arrangements for positioning12-electrode sensor parameters such as capacitance, capacitance change and change rate of capacitance are analyzed by ANSYS and MATLAB to plot the mass of water absorption curve against absorption time (t). An analytical model based on a Fickian diffusion model is conducted to predict the saturation level of water absorption ($M_S$) from the obtained mass of water absorption curve. The FE results are in excellent agreement with the analytical results and experimental results available in the literature, thus, validating the accuracy and reliability of the proposed expert system.

The Intelligent Traffic Information Searching System Based on Disaster Occurrence of Multipoint (다지점의 재해발생을 고려한 지능형 교통정보 검색 시스템)

  • Kwon, Won-Seok;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.7
    • /
    • pp.933-939
    • /
    • 2011
  • Recent heavy rains have caused natural disasters such as flooding and landslides nationwide. Because of flooding occurrence in most of the roads, traffic congestion and isolation caused many loss especially at rush hour. Constant monitoring and analysis of past disaster history data are needed to prevent disasters on areas prone to floods and disaster risk areas. If we managed to obtain traffic volume, speed, phase around intersection using disaster history data when disasters occurred, we can analyse traffic congestion, change of disaster scale and rainfall. In this study, We select a target district to develop by using a route from Dae-nam intersection in Busan Namgu Daeyoeon-dong, over Gwangan large bridge up until Haeundae Olympic intersection, We developed a system which searches disaster history information, traffic volume using disaster history data based on user selection of the road.

Design of Efficient Edge Computing based on Learning Factors Sharing with Cloud in a Smart Factory Domain (스마트 팩토리 환경에서 클라우드와 학습된 요소 공유 방법 기반의 효율적 엣지 컴퓨팅 설계)

  • Hwang, Zi-on
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2167-2175
    • /
    • 2017
  • In recent years, an IoT is dramatically developing according to the enhancement of AI, the increase of connected devices, and the high-performance cloud systems. Huge data produced by many devices and sensors is expanding the scope of services, such as an intelligent diagnostics, a recommendation service, as well as a smart monitoring service. The studies of edge computing are limited as a role of small server system with high quality HW resources. However, there are specialized requirements in a smart factory domain needed edge computing. The edges are needed to pre-process containing tiny filtering, pre-formatting, as well as merging of group contexts and manage the regional rules. So, in this paper, we extract the features and requirements in a scope of efficiency and robustness. Our edge offers to decrease a network resource consumption and update rules and learning models. Moreover, we propose architecture of edge computing based on learning factors sharing with a cloud system in a smart factory.

Virtual City System Based on 3D-Web GIS for U-City Construction (U-City 구현을 위한 3D-Web GIS 기반의 가상도시 시스템)

  • Jo, Byung-Wan;Lee, Yun-Sung;Yoon, Kwang-Won;Park, Jung-Hun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.25 no.5
    • /
    • pp.389-395
    • /
    • 2012
  • U-City has been promoted nation-wide by development of recent IT technology. This paper studied the concept of 3D-virtual city in order to realize the current Ubiquitous City(U-City) efficiently, and to manage all the RFID/USN monitoring data in the real U-City. 3D-Virtual City is the concept of the reproduction of real world U-City, for embodying Ubiquitous technology while using Digital map, satellite image, VRML(Virtual Reality Modeling Language). U&V-City is the four-dimensional future city that real-time wire/wireless communication network and 3D-web GIS shall be connected that massive database, intelligent service be perceived through employing EAI(External Authoring Interface) that provides HTML&JAVA, and interface for efficient removal/process of massive information/ service and also by employing GPS/LBS/Navigation in support of world-wide orientation concept, and RTLS(Real Time Location System).

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Enhancement of Enterprise Security System Using Zero Trust Security (제로 트러스트 보안을 활용한 기업보안시스템 강화 방안)

  • Lee, Seon-a;Kim, Beom Seok;Lee, Hye in;Park, Won hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.214-216
    • /
    • 2021
  • It proposes a plan to strengthen the limitations of existing corporate security systems based on Zero-Trust. With the advent of the era of the Fourth Industrial Revolution, the paradigm of security is also changing. As remote work becomes more active due to cloud computing and COVID-19, security issues arising from the changed IT environment are raised. At the same time, in the current situation where attack techniques are becoming intelligent and advanced, companies should further strengthen their current security systems by utilizing zero trust security. Zero-trust security increases security by monitoring all data communications based on the concept of doubting and trusting everything, and allowing strict authentication and minimal access to access requestors. Therefore, this paper introduces a zero trust security solution that strengthens the existing security system and presents the direction and validity that companies should introduce.

  • PDF

Proper Orthogonal Decomposition Based Intrusive Reduced Order Models to Accelerate Computational Speed of Dynamic Analyses of Structures Using Explicit Time Integration Methods (외연적 시간적분법 활용 동적 구조해석 속도 향상을 위한 적합직교분해 기반 침습적 차수축소모델 적용 연구)

  • Young Kwang Hwang;Myungil Kim
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.37 no.1
    • /
    • pp.9-16
    • /
    • 2024
  • Using the proper orthogonal decomposition (POD) based intrusive reduced order model (ROM), the total degrees of freedom of the structural system can be significantly reduced and the critical time step satisfying the conditional stability increases in the explicit time integrations. In this study, therefore, the changes in the critical time step in the explicit time integrations are investigated using both the POD-ROM and Voronoi-cell lattice model (VCLM). The snapshot matrix is composed of the data from the structural response under the arbitrary dynamic loads such as seismic excitation, from which the POD-ROM is constructed and the predictive capability is validated. The simulated results show that the significant reduction in the computational time can be achieved using the POD-ROM with sufficiently ensuring the numerical accuracy in the seismic analyses. In addition, the validations show that the POD based intrusive ROM is compatible with the Voronoi-cell lattice based explicit dynamic analyses. In the future study, the research results will be utilized as an elemental technology for the developments of the real-time predictive models or monitoring system involving the high-fidelity simulations of structural dynamics.