• Title/Summary/Keyword: User safety

Search Result 1,240, Processing Time 0.026 seconds

Transponder and Ground Station Systems for Drones

  • Kim, Ki-Su;Ha, Heon-Seong;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.9-15
    • /
    • 2020
  • In this paper, we propose a case that drone (unmanned aerial vehicle), one of the representative technologies of the 4th Industrial Revolution, threatens airport safety and privacy infringement, and describes a drone control system proposal to solve the problem. Unmanned aerial vehicle (Drone) is creating a serious problem recently, In Korea, on May 21, 19, according to the Jeju Regional Aviation Administration, drones flew over Jeju Jeongseok Airfield twice in the same month, causing problems in aircraft operation. In overseas cases, two drones near the runway of Gatwick International Airport in the UK There has been a disturbance in which the takeoff and landing of the aircraft flies for a while, and various problems have occurred, such as voyeuring the private life of an individual using a drone. This paper is equipped with an Acess Point transponder mounted on a drone (unmanned aerial vehicle), and unspecified many who want to receive flight information (coordinates, altitude, and obstacles) of the drone access the drone AP, receive and receive the flight information of the drone, and receive unspecified multiple Drone AP flight information is collected and collected to provide the information of the drone currently floating on one user interface screen. In addition, an AP transponder is proposed to operate a safe drone (unmanned aerial vehicle) and the drone's flight information is transmitted., To receive and collect and collect data.

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing (모바일 엣지 컴퓨팅 환경에서 안전 복사를 활용한 도커 컨테이너 마이그레이션 성능 분석)

  • Byeon, Wonjun;Lim, Han-wool;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.901-909
    • /
    • 2021
  • Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.

Key Determinants of Dissatisfaction on COVID-19 Contact Tracing and Exposure Notification Apps (COVID-19 접촉추적과 노출알림 앱사용자의 항의 및 불만요인 탐색)

  • Leem, Byung-hak;Hong, Han-Kook
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.176-183
    • /
    • 2021
  • Digital medical technology is very effective and at the same time faces the challenge of protecting privacy. However, for contact tracking and exposure notification apps in COVID-19 environment, there is always a trade-off between privacy measures and the effectiveness of the app's use. Today, many countries have developed and used contact tracking and exposure notification apps in various forms to prevent the spread of COVID-19, but the suspicion of digital surveillance (digital panopticon) is unavoidable. Therefore, this study aims to identify the factors of personal information infringement and dissatisfaction through text mining analysis by extracting user reviews of "Self-Quarantine Safety Protection" in Korea. As a result of the text mining analysis, we derived four groups, 'Address recognition error', 'Exit warning error', 'Access error', and 'App. program error'. Since 'Address recognition error' and 'Exit warning error' can give the app users a strong perception that they are keeping under surveillanc by the app, transparent management of personal information protection and consent procedures related to personal information collection are required. In addition, if the other two groups are not corrected immediately due to an error in an app function or a program bug, the complaints of users can be maximized and a protest against the monitor can be raised.

Analysis of Causes and Impact of Change Orders in the U.S. Military Construction Projects (미군 시설공사 설계변경 요인과 영향에 대한 연구)

  • Park, Insung;Kim, Harim;Lee, Hak-Ju;Kim, Do-Hyung;Min, Yoon-Gi;Cho, Hunhee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.3
    • /
    • pp.213-219
    • /
    • 2021
  • Change orders that occur frequently during the construction phase, af ect the construction performance in terms of cost, time, quality, safety and environment, and place a huge burden for stakeholders of given projects. This study analyzed the causes of change orders and their impact on the basis of 721 cases and a questionnaire of 164 domestic U.S. military construction participants in a total of 24 U.S. military projects. Important factors for change orders in the US military construction projects were engineering change due to design errors (348 cases, 48.3%), user requests change(86 cases, 11.9%), and different site conditions (69 cases, 9.6%). In addition, due to the change orders, construction cost increased by 6.56% on average and construction period was extended by 21.1% compared to the original schedule. As a result, it is anticipated that domestic construction companies can obtain a better understanding of change orders and construction performance, which may be difficult due to accessibility and limitations to military facilities. Also, it is proposed a successor study that guides in the right direction for the U.S. Military Construction.

Implementation of Spatial Augmented Reality Using Fog Screen (포그 스크린을 이용한 공간증강현실(SAR) 구현)

  • Park, Yoenyong;Jung, Moonryul
    • Journal of the Korea Computer Graphics Society
    • /
    • v.25 no.3
    • /
    • pp.43-54
    • /
    • 2019
  • In this paper, we review the applicability of fog screen to implement 'Spatial Augmented Reality' which displays the image on the whole space of real space or in real space by separating display equipment and user, in contrast to the traditional Augmented Reality. Through three exhibitions and one performance, we confirmed t hat the fog screen, which can be passed through, is a suitable material for implementing the Spatial Augment ed Reality. We found that the hologram production was easier than before because of fog screen. Through the questionnaire survey conducted on performers along with the exhibition, we found that only about half of people know what a fog screen is, and about 10% of the total respondents saw the fog screen. In order to investigate the effect of fog screen on the surrounding space, we conducted an experiment to observe the change of humidity according to the time and distance in the Children's Culture Center of the Asian Culture Center. We found that the humidity within a radius of 5m around the fog screen could increase by 2~3%($6,400m^3$ standard). Thus we provided some safety requirement with fog screen when works made of materials vulnerable to moisture such as paint, paper, and wood are exhibited at the same time with fog screen in the exhibition hall.

Detecting and Avoiding Dangerous Area for UAVs Using Public Big Data (공공 빅데이터를 이용한 UAV 위험구역검출 및 회피방법)

  • Park, Kyung Seok;Kim, Min Jun;Kim, Sung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.243-250
    • /
    • 2019
  • Because of a moving UAV has a lot of potential/kinetic energy, if the UAV falls to the ground, it may have a lot of impact. Because this can lead to human casualities, in this paper, the population density area on the UAV flight path is defined as a dangerous area. The conventional UAV path flight was a passive form in which a UAV moved in accordance with a path preset by a user before the flight. Some UAVs include safety features such as a obstacle avoidance system during flight. Still, it is difficult to respond to changes in the real-time flight environment. Using public Big Data for UAV path flight can improve response to real-time flight environment changes by enabling detection of dangerous areas and avoidance of the areas. Therefore, in this paper, we propose a method to detect and avoid dangerous areas for UAVs by utilizing the Big Data collected in real-time. If the routh is designated according to the destination by the proposed method, the dangerous area is determined in real-time and the flight is made to the optimal bypass path. In further research, we will study ways to increase the quality satisfaction of the images acquired by flying under the avoidance flight plan.

Effectiveness Analysis of Installation of Turbo Roundabouts (터보형 회전교차로 설치 효과분석)

  • Lim, Chang-Sik;Choi, Yang-Won
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.6
    • /
    • pp.925-932
    • /
    • 2018
  • This study deals with Turbo-Roundabout of Special-Roundabouts. Recently, many rotary intersections are being constructed in Korea, but the effect of the rotary intersection depends on the total entrance traffic volume and the area of the paper. The purpose of this study is to analyze the operation and accident reduction effect of turning traffic signal intersection with small traffic volume into turbo - type turning intersection. The main results are as follows. First, when the traffic volume of the main road is high, the traffic volume of the subway is less than 10 ~ 15%, or when the left turn ratio is less than 30%, it is improved when switching to the turbo type turn intersection instead of the first turn type and second turn type turn intersection Was analyzed. Second, it is considered that turbo type rotary intersection is more effective than first - type rotary intersection, and it is more effective in increasing road capacity because the area of paper is smaller than that of second - order rotary intersection. Third, the number of traffic accidents decreased by 45.9% and the number of injured persons decreased by 76.5% after the conversion of the turnover type turnover to turbo type. 100%), the number of car accidents was 0.3, and the number of casualties was 0 (100%). Finally, the positive evaluation of the user satisfaction survey showed that the improvement in safety, accessibility, and convenience was improved by 60.4%, which was improved by 16.4% to 76.8% after the conversion to the turbo type turnover.

Development of Street Crossing Assistive Embedded System for the Visually-Impaired Using Machine Learning Algorithm (머신러닝을 이용한 시각장애인 도로 횡단 보조 임베디드 시스템 개발)

  • Oh, SeonTaek;Jeong, Kidong;Kim, Homin;Kim, Young-Keun
    • Journal of the HCI Society of Korea
    • /
    • v.14 no.2
    • /
    • pp.41-47
    • /
    • 2019
  • In this study, a smart assistive device is designed to recognize pedestrian signal and to provide audio instructions for visually impaired people in crossing streets safely. Walking alone is one of the biggest challenges to the visually impaired and it deteriorates their life quality. The proposed device has a camera attached on a pair of glasses which can detect traffic lights, recognize pedestrian signals in real-time using a machine learning algorithm on GPU board and provide audio instructions to the user. For the portability, the dimension of the device is designed to be compact and light but with sufficient battery life. The embedded processor of device is wired to the small camera which is attached on a pair of glasses. Also, on inner part of the leg of the glasses, a bone-conduction speaker is installed which can give audio instructions without blocking external sounds for safety reason. The performance of the proposed device was validated with experiments and it showed 87.0% recall and 100% precision for detecting pedestrian green light, and 94.4% recall and 97.1% precision for detecting pedestrian red light.

Analysis of Automotive HMI Characteristics through On-road Driving Research (실차 주행 연구를 통한 차량별 HMI 특성 분석)

  • Oh, Kwangmyung
    • Journal of the HCI Society of Korea
    • /
    • v.14 no.2
    • /
    • pp.49-60
    • /
    • 2019
  • With the appearance of self-driving cars and electric cars, the automobile industry is rapidly changing. In the midst of these changes, HMI studies are becoming more important as to how the driver obtains safety and convenience with controlling the vehicle. This study sought to understand how automobile manufacturers understand the driving situation, and how they define and limit driver interaction. For this, prior studies about HMI were reviewed and 15 participants performed an on-road study to drive vehicles from five manufacturers with using their interfaces. The results of the study confirmed that buttons and switches that are easily controlled by the user while driving were different from manufacturer to manufacturer. And there are some buttons that are more intensively controlled and others that are difficult to control while driving. It was able to derive 'selection and concentration' from Audi's vehicle, 'optimization of the driving ' from BMW's, 'simple and minimize' from Benz's vehicle, 'remove the manual distraction' from the vehicle of Lexus, and 'visual stability' from KIA's vehicle as the distinctive keywords for the HMI. This shows that each manufacturer has a different definition and interpretation of the driver's driving control area. This study has a distinct value in that it has identified the characteristics of vehicle-specific HMI in actual driving conditions, which is not apparent in appearance. It is expected that this research approach can be useful to see differences in interaction through actual driving despite changes in driving environment such as vehicle platooning and self-driving technology.

Development of Real-time Video Search System Using the Intelligent Object Recognition Technology (지능형 객체 인식 기술을 이용한 실시간 동영상 검색시스템)

  • Chang, Jae-Young;Kang, Chan-Hyeok;Yoon, Jae-Min;Cho, Jae-Won;Jung, Ji-Sung;Chun, Jonghoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.85-91
    • /
    • 2020
  • Recently, video-taping equipment such as CCTV have been seeing more use for crime prevention and general safety concerns. Since these video-taping equipment operates all throughout the day, the need for security personnel is lessened, and naturally costs incurred from managing such manpower should also decrease. However, technology currently used predominantly lacks self-sufficiency when given the task of searching for a specific object in the recorded video such as a person, and has to be done manually; current security-based video equipment is insufficient in an environment where real-time information retrieval is required. In this paper, we propose a technology that uses the latest deep-learning technology and OpenCV library to quickly search for a specific person in a video; the search is based on the clothing information that is inputted by the user and transmits the result in real time. We implemented our system to automatically recognize specific human objects in real time by using the YOLO library, whilst deep learning technology is used to classify human clothes into top/bottom clothes. Colors are also detected through the OpenCV library which are then all combined to identify the requested object. The system presented in this paper not only accurately and quickly recognizes a person object with a specific clothing, but also has a potential extensibility that can be used for other types of object recognition in a video surveillance system for various purposes.