• Title/Summary/Keyword: Monitoring Verification System

Search Result 304, Processing Time 0.034 seconds

Application of Urban Hydrologic Monitoring System for Urban Runoff Analysis (도시유출해석을 위한 도시수문 모니터링 기법 적용)

  • Seo, Kyu-Woo
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.5 no.2 s.17
    • /
    • pp.37-44
    • /
    • 2005
  • It reflects well feature of slope that is characteristic of urban river basin of Busan local. In this study, process various hydrological data and basin details data which is collected through basin basis data, hydrological monitoring system(EMS-DEU) and automatic water level equipment(AWS-DEU) for urban flood disaster prevention and use as basin input data of ILLUDAS, SWMM and HEC-HMS in order to examine outflow feature of experiment basin and then use in reservoir design of experiment basin through calibration and verification about HEC-HMS. Inserted design rainfall for 30 years that is design criteria of creek into HEC-HMS and then calculated design floods according to change aspect of the impermeable rate. Capacity of reservoir was determined on the outflow mass curve. Designed detention pond(volume $54,000m^3$) at last outlet upper stream of experiment basin, after designing reservoir. It could be confirmed that the peak flow was reduced resulting from examining outflow aspect. Designing reservoir must decrease outflow of urban areas.

Study on UAV Flight Patterns and Simulation Modelling for UTM (저고도 무인기 교통관리 체계에서 무인기 비행패턴 분류 및 시뮬레이션 모형 개발)

  • Jung, Kyu-sur;Kim, Se-Yeon;Lee, Keum-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.1
    • /
    • pp.13-19
    • /
    • 2018
  • In this paper, we classified a flight pattern of unmanned aerial vehicle(UAV) which will be operating in UTM system and analyzed its flight pattern by purpose of use. Flight patterns of UAV are sorted into three patterns which are circling, monitoring and delivery. We considered four cases of industry areas using UAV which are agriculture, infrastructure monitoring, public safety & security(p.s.s) and delivery. It is necessary to build a simulation model as a verification tool for applying the flight pattern according to the use of UAV to the real UTM system. Therefore, we propose the simulation model of UAV with updating states over time. We applied simulation to UAV monitoring flight pattern, and confirmed that the flight was done by the given input data. The simulation model will be used in the future to verify that the UAV has various flight patterns and can operate safely and efficiently for the intended use.

USN-based Water Treatment Plant Facilities Data Management Techniques and Reliability (USN 기반 수직형 정수처리시설 데이터 최적관리 및 신뢰성 검증연구)

  • Jang, Sang-Bok;Shin, Gang-Wook;Hong, Sung-Taek;Lee, An-Kyu;Park, Hye-Mi;Chun, Myung-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2736-2744
    • /
    • 2013
  • In this paper, we present a Smart Water Treatment Plant using Zigbee USN devices and a real-time monitoring system in K-water Flow Meter Calibration Center Building. For verification, the data of vertical type WTP such as flow rate, pressure, water level and water temperature are obtained by the Zigbee USN devices, operating in 2.45 GHz band, and be wirelessly surveilled by the real-time monitoring system. The received data from the sensor is transmitted to the data processing device, and then the processed data can be monitored on a smart phone. Consequently, the pilot plant based on the low-cost and high-efficiency USN has been developed with the performance analysis for the communication network and remote monitoring system on mobile devices.

A Development of Sensor Monitoring System for Offshore Plant Cargo Lift (해양플랜트용 Cargo Lift 센서 모니터링 시스템에 관한 연구)

  • Kim, Bae-sung;Hwang, Hun-gyu;Shin, Il-sik;Choi, Jung-sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.364-366
    • /
    • 2017
  • Unlike general ships, offshore plants require high reliability due to their long operating time at fixed positions when they are operated. Sensor-based status information is required for user and maintenance worker to ensure safety. In this paper, we propose a monitoring system for safety diagnosis and inspection of cargo lift for offshore plant. It consists of a sensor unit mounted on the cargo Lift, an embedded system measurement unit, and a monitoring unit for real-time data verification. It is based on the ship standard network IEC 61162-450 for the exchange of operating information and sensor measurement information in accordance with the upgrading and integration of equipment in maritime.

  • PDF

Active Lamb Wave Propagation-based Structural Health Monitoring for Steel Plate (능동 램파 전파에 기초한 강판의 구조건전성 모니터링)

  • Jeong, Woon;Seo, Ju-Won;Kim, Hyeung-Yun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.5A
    • /
    • pp.421-431
    • /
    • 2009
  • This paper is the study on the verification of structural health monitoring (SHM) algorithm based on the ultrasonic guided wave. An active inspection system using Lamb wave (LW) for SHM was considered. The basic study about the application of this algorithm was performed for detecting the circular notch defect in steel plate. LW testing technique, pitch-catch method, was used for interpretation of circular notch defect with depth of 50% of plate thickness and 7 mm width. Damage characterization takes place by comparing $S_0$ mode sensor signals collected before and after the damage event. By subtracting the signals of both conditions from each other, a scatter signal is produced which can be used for damage localization. The continuous Gabor wavelet transform is used to attain the time between the arrivals of the scatter and sensor signals. A new practical damage monitoring algorithm, based on damage monitoring polygon and pitch-catch method, has been proposed and verified with good accuracy. The possible damage location can be estimated by the average on calculated location points and the damage extent by the standard deviation.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

A Study About Grid Impose Method On Real-Time Simulator For Wind-Farm Management System (풍력발전단지 관리·분석 시스템의 Real-Time Simulator 도입을 위한 계통모델 연동방안 연구)

  • Jung, Seungmin;Yoo, Yeuntae;Kim, Hyun-Wook;Jang, Gilsoo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.29 no.7
    • /
    • pp.28-37
    • /
    • 2015
  • Owing to the variability of large-scaled wind power system, the development of wind farm management technologies and related compensation methods have been receiving attention. To provide an accurate and reliable output power, certain wind farm adopts a specified management system including a wind prediction model and grid expectation solutions for considering grid condition. Those technologies are focused on improving the reliability and stability issues of wind farms, which can affect not only nearby system devices but also a voltage condition of utility grid. Therefore, to adapt the develop management system, an expectation process about voltage condition of Point of Common Coupling should be integrated in operating system for responding system requirements in real-time basis. This paper introduce a grid imposing method for a real-time based wind farm management system. The expected power can be transferred to the power flow section and the required quantity about reactive power can be calculated through the proposed system. For the verification process, the gauss-seidel method is introduced in the Matlab/Simulink for analysing power flow condition. The entire simulation process was designed to interwork with PSCAD for verifying real power system condition.

Design of Face Recognition based Embedded Home Security System

  • Sahani, Mrutyunjanya;Subudhi, Subhashree;Mohanty, Mihir Narayan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1751-1767
    • /
    • 2016
  • Home security has become the prime concern for everyone in present scenario. In this work an attempt has been made to develop a home security system which is accessible, affordable and yet effective.The proposed system is based on 'Remote Embedded Control System' (RECS) which works both on the web and gsm platform for authentication and monitoring. This system is therefore cost effective as it relies on existing network infrastructure. As PCA is most popular and efficient algorithm for face recognition, it has been usedin this work. Next to it an interface has been developed for communication purpose in the embedded security system through the ZigBee module. Based on this embedded system, automated control of door movement has been implemented through electromagnetic door lock technology. This helps the users to monitor the real-time activities through web services/SMS. The web service consists of either web browser command or e-mail provision. The system establishes the communication between the system and authenticated user. The e-mail received by the system from the authorized person will monitor and control the real-time operation and door lock. The entire control system is reinforced using ARM1176JZF-S microcontroller and tested for actual use in the home environment. The result shows the experimental verification of the proposed system.

Vibration Characteristic Analysis of the Main Transformer for KTX (KTX 주변압기의 진동특성 분석)

  • Kim, Jin-Woo;Yang, Jae-Cheol;Heo, Min-Woong;Kim, Dae-Sik;Kim, Ho-Soon
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.649-655
    • /
    • 2011
  • In this paper, the content to carry out the modal testing and to analyze the data as the target of the main transformer installed on KTX is mentioned. The main transformer for KTX is a structure which is over 10 Ton. For the possibility to occur a stress concentration phenomenon exists, the dynamic durability of the system is experimentally needed to understand. To do this, we obtained the vibration data using an accelerometer, an impact hammer, a measuring instrument and gained the frequency response function of the main transformer based on the acquisition data. In this content, when the theoretical model for structural analysis should be established, we think it will be used for the property verification of analytical model. Also, we expect that the measured and analysed data will offer basic research material to maintain the system and diagnose the condition by monitoring the natural frequency of the main transformer for KTX periodically.

  • PDF

Application of Hydrological Monitoring System for Urban Flood Disaster Prevention (도시홍수방재를 위한 수문모니터링시스템의 적용)

  • Seo, Kyu-Woo;Na, Hyun-Woo;Kim, Nam-Gil
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.1209-1213
    • /
    • 2005
  • It reflects well feature of slope that is characteristic of city river basin of Pusan local. Process various hydrological datas and basin details datas which is collected through basin basis data. weather satellite equipment(EMS-DEU) and automatic water level equipment(AWS-DEU) and use as basin input data of ILLUDAS model, SWMM model and HEC-HMS model In order to examine outflow feature of experiment basin and then use in reservoir design of experiment basin through calibration and verification about HEC-HMS model. Inserted design rainfall for 30 years that is design criteria of creek into HEC-HMS model and then calculated design floods according to change aspect of the impermeable rate. Capacity of reservoir was determined on the outflow mass curve. Designed imagination reservoir(volume $54,000m^3$) at last outlet upper stream of experiment basin, after designing reservoir. It could be confirmed that the peak flow was reduced resulting from examining outflow aspect. Designing reservoir must decrease outflow of urban areas.

  • PDF