• Title/Summary/Keyword: Real-Time monitoring

Search Result 3,597, Processing Time 0.029 seconds

An Algorithm for Segmenting the License Plate Region of a Vehicle Using a Color Model (차량번호판 색상모델에 의한 번호판 영역분할 알고리즘)

  • Jun Young-Min;Cha Jeong-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.2 s.308
    • /
    • pp.21-32
    • /
    • 2006
  • The license plate recognition (LPR) unit consists of the following core components: plate region segmentation, individual character extraction, and character recognition. Out of the above three components, accuracy in the performance of plate region segmentation determines the overall recognition rate of the LPR unit. This paper proposes an algorithm for segmenting the license plate region on the front or rear of a vehicle in a fast and accurate manner. In the case of the proposed algorithm images are captured on the spot where unmanned monitoring of illegal parking and stowage is performed with a variety of roadway environments taken into account. As a means of enhancing the segmentation performance of the on-the-spot-captured images of license plate regions, the proposed algorithm uses a mathematical model for license plate colors to convert color images into digital data. In addition, this algorithm uses Gaussian smoothing and double threshold to eliminate image noises, one-pass boundary tracing to do region labeling, and MBR to determine license plate region candidates and extract individual characters from the determined license plate region candidates, thereby segmenting the license plate region on the front or rear of a vehicle through a verification process. This study contributed to addressing the inability of conventional techniques to segment the license plate region on the front or rear of a vehicle where the frame of the license plate is damaged, through processing images in a real-time manner, thereby allowing for the practical application of the proposed algorithm.

Research on Communication and The Operating of Server System for Vehicle Diagnosis and Monitoring (차량진단 및 모니터링을 위한 통신과 서버시스템 운용에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.6
    • /
    • pp.41-50
    • /
    • 2011
  • This article is concerned with the technology to provide car driver the car's status which are composed of car trouble code in car engine and many sensors. In addition, it installs vehicle diagnostic programs on wireless communication's portable device, for example, Smart phone, PDA, PMP, UMPC. As a result, this is to provide car manager with many information of car sensors when we go to car maintenance. it can monitor relevant information on vehicle by portable device in real time, alert drivers with specific messages and also enable them to address abnormalities immediately. Moreover, the technology could help the drivers who perhaps don't know very well about their vehicles to drive safely and economically as well; the reason is because the whole system is composed of just Vehicle-information collecting device and personal wireless communication's portables and transfers the relating data to server computers through wireless network in order to handle information on vehicles. This technology make us monitor vehicle's running, failure and disorder by using wireless communication's portable device. Finally, this study system is composed of a lot of application to display us the car's status which get car's inner sensor information while driving a car.

Manufacturing Method for Sensor-Structure Integrated Composite Structure (센서-구조 일체형 복합재료 구조물 제작 방법)

  • Han, Dae-Hyun;Kang, Lae-Hyong;Thayer, Jordan;Farrar, Charles
    • Composites Research
    • /
    • v.28 no.4
    • /
    • pp.155-161
    • /
    • 2015
  • A composite structure was fabricated with embedded impact detection capabilities for applications in Structural Health Monitoring (SHM). By embedding sensor functionality in the composite, the structure can successfully perform impact localization in real time. Smart resin, composed of $Pb(Ni_{1/3}Nb_{2/3})O_3-Pb(Zr,\;Ti)O_2$ (PNN-PZT) powder and epoxy resin with 1:30 wt%, was used instead of conventional epoxy resin in order to activate the sensor function in the composite structure. The embedded impact sensor in the composite was fabricated using Hand Lay-up and Vacuum Assisted Resin Transfer Molding(VARTM) methods to inject the smart resin into the glass-fiber fabric. The electrodes were fabricated using silver paste on both the upper and bottom sides of the specimen, then poling treatment was conducted to activate the sensor function using a high voltage amplifier at 4 kV/mm for 30 min at room temperature. The composite's piezoelectric sensitivity was measured to be 35.13 mV/N by comparing the impact force signals from an impact hammer with the corresponding output voltage from the sensor. Because impact sensor functionality was successfully embedded in the composite structure, various applications of this technique in the SHM industry are anticipated. In particular, impact localization on large-scale composite structures with complex geometries is feasible using this composite embedded impact sensor.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

Research on Light Application System for the Dynamic Moving Effect of The Design on Porcelain (도자기 표면의 문양을 역동적으로 움직이는 효과를 갖는 광응용 시스템연구)

  • Ryoo, Hee Soo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.205-210
    • /
    • 2014
  • This is concerned with the technology to display the design on Porcelain and adjust malfunction for moving effect and light intensity by curator. More precisely, the technology makes it possible that the porcelain is connected to Light module which is the device for controlling light emission and rotating rolling plate, etc that are connected to LED light module, optical fiber and controller that is for scenario from the given storytelling. In addition, with a WiFi portable device (Smart-phone, other mobile device). equipped with a scenario programs, information for operation, failure and malfunction can be obtained and analyzed in real-time, and menu color and alarm is alerted when the displaying design is in abnormal status, which makes the early reactions to the status. Furthermore, the collected data can be sent through WiFi network to the device and PC managed by the curator specialized in managing the design on the Porcelain, thus the technology could help the curator who have less knowledge about moving pattern on the Porcelain. There is always a possibility of malfunction due to various condition that are caused by wring-harness when modules are wired-connected. In this research, in order to overcome this problem, we propose a system configuration that can do monitoring and diagnosis with a device for collecting data from LED control module, Light emission sensor and a personal WiFi device. Also, we performed connection between optical Fiber and LED and interlock for the system defined by the definition for information and storytelling scenario.

Characterizing Par ticle Matter on the Main Section of the Seoul Subway Line-2 and Developing Fine Particle Pollution Map (서울시 지하철 2호선 본선구간의 입자상물질 농도 특성 및 미세분진의 오염지도 개발)

  • Lee, Eun-Sun;Park, Min-Bin;Lee, Tae-Jung;Kim, Shin-Do;Park, Duck-Shin;Kim, Dong-Sool
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.32 no.2
    • /
    • pp.216-232
    • /
    • 2016
  • In present, the Seoul City is undergoing traffic congestion problems caused by rapid urbanization and population growth. Thus the City government has reorganized the mass transportation system since 2004 and the subway has become a very important means for public transit. Since the subway system is typically a closed environment, the indoor air quality issues have often raised by the public. Especially since a huge amount of PM (particulate matter) is emitted from ground tunnels passing through the subway train, it is now necessary to assess the characteristics and behaviors of fine PM inside the tunnel. In this study, the concentration patterns of $PM_1$, $PM_{2.5}$, and $PM_{10}$ in the Seoul subway line-2 were analyzed by real-time measurement during winter (Jan 13, 2015) and summer (Aug 7, 2015). The line-2 consisting of 51 stations is the most busy circular line in Seoul having the railway of 60.2 km length. The the one-day average $PM_{10}$ concentrations were $148{\mu}g/m^3$ in winter and $66.3{\mu}g/m^3$ in summer and $PM_{2.5}$ concentrations were $118{\mu}g/m^3$ and $58.5{\mu}g/m^3$, respectively. The $PM_{2.5}/PM_{10}$ ratio in the underground tunnel was lower than the outdoor ratio and also the ratio in summer is higher than in winter. Further the study examined structural types of underground subsections to explain the patterns of elevated PM concentrations in the line-2. The subsections showing high PM concentration have longer track, shorter curvature radius, and farther from the outdoor stations. We also estimated the outdoor PM concentrations near each station by a spatial statistical analysis using the $PM_{10}$ data obtained from the 40 Seoul Monitoring Sites, and further we calculated $PM_{2.5}/PM_{10}$ and $PM_1/PM_{10}$ mass ratios near the outdoor subway stations by using our observed outdoor $PM_1$, $PM_{2.5}$, and $PM_{10}$ data. Finally, we could develop pollution maps for outdoor $PM_1$ and $PM_{2.5}$ near the line-2 by using the kriging method in spatial analysis. This methodology may help to utilize existing $PM_{10}$ database when managing and control fine particle problems in Korea.

A-team Based Approach for Reactive Power/Voltage Control Considering Steady State Security Assessment (정태 안전성 평가를 고려한 무효전력 전압제어를 위한 A-team기반 접근법)

  • Kim, Doo-Hyun
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.2
    • /
    • pp.150-159
    • /
    • 1996
  • In this paper, an A-team(Asynchronous Team ) based approach for Reactive power and volage control considering static security assessment in a power system with infrastructural deficiencies is proposed. Reactive power and voltage control problem is the one of optimally establishing voltage level given several constraints such as reactive generation, voltage magnitude, line flow, and other switchable reactive power sources. It can be formulated as a mixed-integer linear programming(MILP) problem without deteriorating of solution accuracy to a certain extent. The security assessment is to estimate the relative robustness of the system in Its present state through the evaluation of data provided by security monitoring. Deterministic approach based on AC load flow calculations is adopted to assess the system security, especially voltage security. A security metric, as a standard of measurement for power system security, producting a set of discrete values rather than binary values, is employed. In order to analyze the above two problems, reactive power/voltage control problem and static security assessment problem, in an integrated fashion for real-time operations, a new organizational structure, called an A-team, is adopted. An A-team is an organization for agents which ale all autonomeus, work in parallel and communicate asynchronously, which is well-suited to the development of computer-based, multi-agent systems for operations. This A-team based approach, although it is still in the beginning stage, also has potential for handling other difficult power system problems.

  • PDF

An Efficient Feedback Collection for Multimedia Multicast (멀티미디어 멀티캐스트를 위한 효율적인 피드백 정보 수집)

  • Kung, Sang-Hwan;Kang, Min-Gyu;Koo, Yeon-Seol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.751-762
    • /
    • 1998
  • The purpose of this study is to enhance the quality of multimedia service under the heterogeneous end-terminals and network environment by monitoring the data receiving status of the group members regularly when the sender multicasts real-time multimedia data to a group. Especially, it focuses to reduce the total number of status information responded to the sender from the receivers. Accordingly. it upgrades the sender's performance by suppressing the number of status information packets generated by the receivers. The key idea of this study starts from how we profile the activity of all the members in a group. We assume that the receiver status in the worst status, so called primary receiver, represents the status of the whole group. This means that the whole group is assumed as being degraded in performance if the primary receiver is degraded, and that the whole group is assumed as being upgraded if the primary one is upgraded. In this algorithm, the primary receiver announces its status information to the whole group prior to other receivers, ana every receiver listening to the primary and other receivers' status compares its own status with them. Accordingly, any receiver may give up the status notification in case its status is not worse than others, resulting in the reduction of unnecessary responses to the sender.

  • PDF

Study on the Low Energy Sewage Management Based on Pre-sensing Technology and Automatic Blower Control (사전감지기술 및 송풍량 자동제어를 기반으로 한 저에너지 하수관리기술에 관한 연구)

  • Lee, Seungmyoung;Kim, Hanlae;Ki, Kyoungseo
    • Journal of Environmental Impact Assessment
    • /
    • v.28 no.6
    • /
    • pp.592-603
    • /
    • 2019
  • This study is about the implementation of low energy sewage management technology through effective control of blower which consumes the most energy in sewage treatment. In calculating the amount of oxygen required for microorganisms, unlike the existing method using the operating index in the bioreactor or TMS data in the discharge port, the CODcr and NH4+-N concentration changes in sewage flowing into the sewage treatment plant were detected in advance before entering the bioreactor and the amount of air was controlled based on this. The pre-sensing was found to have a high correlation compared with conventional products. As a result of blower control, it was possible to save about 9.9% energy more than the manual control. Consequently, this study suggested the possibility of blower's real-time control combined with pre-sensing technology. Also, it is expected that the low energy sewage treatment can be applied to sewage treatment facilities dependent on operation by manpower, and it will contribute to the reduction of greenhouse gas emissions.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.