• Title/Summary/Keyword: U-Prevention System Design

Search Result 34, Processing Time 0.024 seconds

A study on the Design of a u-railroad Disaster Prevention System for Urban Disaster Prevention Management (도시 재난 관리를 위한 u-철도 방재시스템 설계에 관한 연구)

  • Ham, Eun-Gu;Roh, Sam-Kew
    • Fire Science and Engineering
    • /
    • v.24 no.1
    • /
    • pp.72-80
    • /
    • 2010
  • This study suggests ubiquitous railway disaster prevention system that gearing Ubiquitous Sensor Network system information take to the subway fire accident information which emergency response procedure as occurring subway fire accident scenario. Also it is proposed that emergency response system though fire scenario. collected Information was analyzed each system over providing information and it is designed to exchanging information structure though relation system. The ubiquitous railway disaster prevention system basically consists by four unit stages as prevention, preparedness, response and recovery system. Especially, in this system can supply real time accident information to the relevant government offices and public through forecasting and warning system by utilizing recognition of the five senses in case of accident. also, it is build that to make decisions as linking 2-dimension and 3-dimension space information interface of ubiquitous sensor networks and expected scenarios.

A Study on the Improvement Plans of Disaster Response Capabilities for U-city (U-City 재난 대응역량 제고방안에 관한 연구)

  • Park, Hee-Soon;Lee, Jeong-Il;Yoon, Hyung-Goog
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.5
    • /
    • pp.55-66
    • /
    • 2010
  • As people's living standards and expectations for life increase, by applying advanced technology in the city, to enhance the convenience and safety needs are being expanded gradually. Accordingly, so the future of the city to see a viable alternative to that the ubiquitous city fused information communication technologies, large-scale projects conducted at the national level. Sectoral Disaster Prevention is ready for sure how much the lack of response capabilities in the field for checking solution has been suggested for The National Emergency Management Agency. These results present a Sectoral Disaster Prevention response capabilities somewhat different in were identified. Through these are proposed policy recommendations about Sectoral Disaster Prevention and insufficient areas of step response capabilities and building fire protection system approach combines ubiquitous technology in the new paradigm rather than traditional disaster management, greet era of ubiquitous.

Ontology-based u-Healthcare System for Patient-centric Service (환자중심서비스를 위한 온톨로지 기반의 u-Healthcare 시스템)

  • Jung, Yong Gyu;Lee, Jeong Chan;Jang, Eun Ji
    • Journal of Service Research and Studies
    • /
    • v.2 no.2
    • /
    • pp.45-51
    • /
    • 2012
  • U-healthcare is real-time monitoring of personal biometric information using by portable devices, home network and information and communication technology based healthcare systems, and fused together automatically to overcome the constraints of time and space are connected with hospitals and doctors. As u-healthcare gives health service in anytime and anywhere, it becomes to be a new type of medical services in patients management and disease prevention. In this paper, recent changes in prevention-oriented care is analyzed in becoming early response for Healthcare Information System by requirements analysis for technology development trend. According to the healthcare system, PACS, OCS, EMR and emergency medical system, U-healthcare is presenting the design of a patient-centered integrated client system. As the relationship between the meaning of the terms is used in the ontology, information models in the system is providing a common vocabulary with various levels of formality. In this paper, we propose an ontology-based system for patient-centered services, including the concept of clustering to clustering the data to define the relationship between these ontologies for more systematic data.

  • PDF

System Safety Application for the Weapon System (무기체계 시스템안전 적용방안)

  • Park, Suncheol;Kim, Jinsung;Jin, Jonghoon;Yoon, Donghwan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.106-112
    • /
    • 2021
  • In the early 1960s, US Air Force lost missile launch bases during ICBM development by a defect in the missile design and operation plan. U.S. DoD realized the limitation of the existing accident prevention method. Therefore, the weapon development required system safety activity, and procurement projects of U.S. DoD applied MIL-STD-882(System Safety). Development projects of U.S. DoD more emphasized the importance of system safety after the space shuttle Challenger exploded in 1986. Currently, Airworthiness certification for military aircraft uses system safety to minimize accidents. The domestic defense aviation R&D projects also use the system safety for the airworthiness certification. However, non-aviation weapon R&D projects rarely applied system safety. This paper presents a system safety application method for domestic weapon R&D projects by studying the U.S. military standards/organizations and domestic defense aviation projects.

Spatial Analysis of the Difference between Real Crime and Fear of Crime (도시내 범죄발생과 범죄 두려움 위치의 공간적 차이 분석)

  • Heo, Sun-Young;Moon, Tae-Heon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.4
    • /
    • pp.194-207
    • /
    • 2011
  • This study tries to find the possibility to prevent crime by improving urban spatial environment through the analysis of spatial environment property that mutually coincides or differs by comparing the place where crime actually occurs and the place where citizen is afraid of crime. The method of study is as follows. First, the ontents scope and method of study was established by theoretic investigation of case study related to crime. Second, as crime cannot be prevented by police power only, CPSCP(Citizen Participation System for Crime Prevention) was developed so that all citizen can cooperatively participate in the crime prevention anytime and anywhere. Third, the data on the place where people feel fear in the region was collected by directly indicating the place where citizen is afraid of crime in the space by utilizing CPSCP. Fourth, the place where crime actually occurs and the place where citizen is afraid of crime are redundantly analyzed for comparative analysis of 2 places. The result shows that environmental design improving physical environment of urban space is necessary to prevent crime and to eliminate the fear of crime. The CPSCP developed by this study which will be advanced to U-crime prevention system will contribute to making citizen's own neighborhood a smart safety city autonomously.

A Study on Security Event Detection in ESM Using Big Data and Deep Learning

  • Lee, Hye-Min;Lee, Sang-Joon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.42-49
    • /
    • 2021
  • As cyber attacks become more intelligent, there is difficulty in detecting advanced attacks in various fields such as industry, defense, and medical care. IPS (Intrusion Prevention System), etc., but the need for centralized integrated management of each security system is increasing. In this paper, we collect big data for intrusion detection and build an intrusion detection platform using deep learning and CNN (Convolutional Neural Networks). In this paper, we design an intelligent big data platform that collects data by observing and analyzing user visit logs and linking with big data. We want to collect big data for intrusion detection and build an intrusion detection platform based on CNN model. In this study, we evaluated the performance of the Intrusion Detection System (IDS) using the KDD99 dataset developed by DARPA in 1998, and the actual attack categories were tested with KDD99's DoS, U2R, and R2L using four probing methods.

Advanced u-Healthcare Service using A Multimodal Sensor in Ubiquitous Smart Space (유비쿼터스 지능공간에서 멀티모달센서를 이용한 향상된 u-헬스케어 서비스 구현에 대한 연구)

  • Kim, Hyun-Woo;Byun, Sung-Ho;Park, Hui-Jung;Lee, Seung-Hwan;Jung, Yoo-Suk;Cho, We-Duke
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.27-35
    • /
    • 2009
  • A paradigm of medical industry is changing quickly to u-healthcare according to entry toward an aging society and improvement of quality of life(QoL). The change toward u-healthcare is meaningful since meaning of healthcare is redefined by prevention and management instead of medical service such as diagnosis of disease and treatment. However, the interest about u-healthcare is only concentrated to derivation of new healthcare service, development of medical measurement appliances(Sensors), and integration and standardization of medical information. Therefore, in this paper, the main ai of this study is trying to realize and implement u-healthcare technology through primary philosophies of ubiquitous composition such as Disappear Computing, Invisible Computing, and Calm Computing and development of user-centered technology.

A Study on the Data Sharing Mechanism Design in Android-Based Fitness System (안드로이드 기반 휘트니스 시스템에서의 데이터 공유 메커니즘 설계)

  • Kang, Hee-beom;Jang, Jae-myung;Lee, Jong-won;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.614-616
    • /
    • 2015
  • Current U-Healthcare has become specialized in Wellness center in the prevention of future health care concept of a health center, treatment. Wellness is the development of which has been emerging field of fitness system to evolve along with the key areas of U-Healthcare. Traditional Fitness system, one between the trainer and the user: 1. Consultation was only possible, the number of trainers are limited, this problem can be reduced individual coaching time existed as more number of users who can receive coaching at certain times of the day. In this paper, we design a mechanism that allows management by grouping field value of a DB table in the user's BMI(Body Mass Index) index and fitness trainer system to efficiently coaching a plurality of users similar BMI index.

  • PDF

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

A Trend Analysis and Technology Application of Defense Technology Protection (방위산업 기술보호 동향분석 및 기법적용)

  • Lee, Hyo Keun;Lee, Woon Soon;Oh, Yoo Jin;Park, ShinSuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.579-586
    • /
    • 2017
  • The defense industry has become a global industry, and military technology is actively being traded between countries to increase their military capabilities. The Republic of Korea has been ranked one of the top 10 countries for exports of military technology. To maintain competitive advantages in the global defense industry, it is essential to protect key technologies employed by exported weapon systems. Various techniques have been developed for protection of confidential technologies in weapon systems, and the U.S. DoD has been leading the development of the protection techniques. This paper reviews current anti-tampering techniques that prevent leakage of key technology from weapon exportation or pillage. Based on the protection techniques employed by the U.S. DoD Anti-Tamper Executive Agent, this paper suggests novel design methods for protection of confidential technologies. The proposed design methods were tested on an actual weapon system.