• Title/Summary/Keyword: Maritime Search and Detect System

Search Result 6, Processing Time 0.022 seconds

Optimal Acoustic Search Path Planning Based on Genetic Algorithm in Discrete Path System (이산 경로 시스템에서 유전알고리듬을 이용한 최적음향탐색경로 전략)

  • CHO JUNG-HONG;KIM JUNG-HAE;KIM JEA-SOO;LIM JUN-SEOK;KIM SEONG-IL;KIM YOUNG-SUN
    • Journal of Ocean Engineering and Technology
    • /
    • v.20 no.1 s.68
    • /
    • pp.69-76
    • /
    • 2006
  • The design of efficient search path to maximize the Cumulative Detection Probability(CDP) is mainly dependent on experience and intuition when searcher detect the target using SONAR in the ocean. Recently with the advance of modeling and simulation method, it has been possible to access the optimization problems more systematically. In this paper, a method for the optimal search path calculation is developed based on the combination of the genetic algorithm and the calculation algorithm for detection range. We consider the discrete system for search path, space, and time, and use the movement direction of the SONAR for the gene of the genetic algorithm. The developed algorithm, OASPP(Optimal Acoustic Search Path Planning), is shown to be effective, via a simulation, finding the optimal search path for the case when the intuitive solution exists. Also, OASPP is compared with other algorithms for the measure of efficiency to maximize CDP.

Pattern Recognition of Ship Navigational Data Using Support Vector Machine

  • Kim, Joo-Sung;Jeong, Jung Sik
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.268-276
    • /
    • 2015
  • A ship's sailing route or plan is determined by the master as the decision maker of the vessel, and depends on the characteristics of the navigational environment and the conditions of the ship. The trajectory, which appears as a result of the ship's navigation, is monitored and stored by a Vessel Traffic Service center, and is used for an analysis of the ship's navigational pattern and risk assessment within a particular area. However, such an analysis is performed in the same manner, despite the different navigational environments between coastal areas and the harbor limits. The navigational environment within the harbor limits changes rapidly owing to construction of the port facilities, dredging operations, and so on. In this study, a support vector machine was used for processing and modeling the trajectory data. A K-fold cross-validation and a grid search were used for selecting the optimal parameters. A complicated traffic route similar to the circumstances of the harbor limits was constructed for a validation of the model. A group of vessels was composed, each vessel of which was given various speed and course changes along a specified route. As a result of the machine learning, the optimal route and voyage data model were obtained. Finally, the model was presented to Vessel Traffic Service operators to detect any anomalous vessel behaviors. Using the proposed data modeling method, we intend to support the decision-making of Vessel Traffic Service operators in terms of navigational patterns and their characteristics.

A Study on the Digital Electronic Compass by Integration of GPS Receiver and Earth's Magnetic Field Sensor (GPS수신기와 지자기센서 병행식 디지털 전자콤파스에 대한 연구)

  • Yun, Jae-Jun;Park, Gyei-Kark;Choi, Jo-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.168-172
    • /
    • 2005
  • An autopilot system of a ship is very important for a safe and convenient navigation, which is realized with getting an azimuth data from a gyrocompass, a magnetic compass and a GPS(Global Positioning System) compass. Magnetic compass an azimuth error is generated by a vessel magnetism material such as steels. The magnetic pole is detected by the magnetic field sensor, it does not coincide with the true north, therefore, the detected azimuth data can not but accompany error. In this paper, in order to detect the minimum change of azimuth data which generates errors of azimuth information, a search algorithm using the Kalman Filtering method is utilized. The digital electronic compass is designed with the integration algorithm using the merits of an earth's magnetic field sensor and a GPS receiver.

  • PDF

Smart monitoring system with multi-criteria decision using a feature based computer vision technique

  • Lin, Chih-Wei;Hsu, Wen-Ko;Chiou, Dung-Jiang;Chen, Cheng-Wu;Chiang, Wei-Ling
    • Smart Structures and Systems
    • /
    • v.15 no.6
    • /
    • pp.1583-1600
    • /
    • 2015
  • When natural disasters occur, including earthquakes, tsunamis, and debris flows, they are often accompanied by various types of damages such as the collapse of buildings, broken bridges and roads, and the destruction of natural scenery. Natural disaster detection and warning is an important issue which could help to reduce the incidence of serious damage to life and property as well as provide information for search and rescue afterwards. In this study, we propose a novel computer vision technique for debris flow detection which is feature-based that can be used to construct a debris flow event warning system. The landscape is composed of various elements, including trees, rocks, and buildings which are characterized by their features, shapes, positions, and colors. Unlike the traditional methods, our analysis relies on changes in the natural scenery which influence changes to the features. The "background module" and "monitoring module" procedures are designed and used to detect debris flows and construct an event warning system. The multi-criteria decision-making method used to construct an event warring system includes gradient information and the percentage of variation of the features. To prove the feasibility of the proposed method for detecting debris flows, some real cases of debris flows are analyzed. The natural environment is simulated and an event warning system is constructed to warn of debris flows. Debris flows are successfully detected using these two procedures, by analyzing the variation in the detected features and the matched feature. The feasibility of the event warning system is proven using the simulation method. Therefore, the feature based method is found to be useful for detecting debris flows and the event warning system is triggered when debris flows occur.

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.