• Title/Summary/Keyword: Warning Message

Search Result 105, Processing Time 0.028 seconds

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Development of Slope Information Retrieval and Real-time Warnings System for a Landslide Disaster Reduction from Mobile Environments (모바일 환경에서의 산사태 재해 저감을 위한 사면 정보 검색 및 실시간 경고 시스템 개발)

  • Kim, Sung-Ho;Ji, Young-Hwan;Lee, Seung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.81-88
    • /
    • 2010
  • This paper describes a development of next generation information remote retrieval and warning system that enables the user to make slope information retrieval remotely for a rockfall and landslide disaster reduction from mobile environments. And this system will be able to warn with a real-time stability condition about the slope which circumference are contiguous in standard user location. Slope information which provides to the user, become the service which upgrades from depth deep information directness will be able to confirm in order from field with applies multimedia style information which is various. In order to retrieve slope information with the wire and wireless internet from the remote place, we used mobile PC carrying is simple. Also this system attached GPS receiver to mobile PC in order to confirm user location as a real-time from the electronic map from field. Specially this system user location divide the safety of the slope which within the area where are fixed in the center are representative with 'safe area', 'collapse area' and 'collapse forecast area' etc. And to indicate with the icon of each other different color simultaneously in the electronic map. With like that reason, this system which sees the user even while moving safety condition about circumferential slope from the electronic map is having the strong point will be able to grasp with a real-time in one eye. Also warning message leads at the case real-time when the collapse will occur in specific slope, to inform to the user. Therefore this system which sees will be able to reduce the disaster which is caused by in landslide a very big strong point and has.

Design of T-DMB Automatic Emergency Alert Service Standard: Part 2 Service Model, Transport Channel, and Service Signaling (지상파 DMB 자동재난경보방송표준 설계: 제2부 서비스 모델, 전송 채널, 서비스 시그널링)

  • Choi, Seong-Jong;Kwon, Dae-Bok;Kim, Jae-Yeon;Oh, Keon-Sik;Chang, Tae-Uk;Hahm, Young-Kwon
    • Journal of Broadcast Engineering
    • /
    • v.12 no.6
    • /
    • pp.630-640
    • /
    • 2007
  • This paper presents the design of service model, transport channel, and service signaling for the Terrestrial DMB Automatic Emergency Alert Service (AEAS) Standard. The paper begins with the analysis of technical backgrounds related to the design topics. Next, the raper presents the design of service model for the AEAS. Since, unlike the regular T-DMB services, the AEAS is event-driven and common to all services, some problems have been identified to design a service model conforming to the T-DMB standard. So, the paper proposes a new concept, called the common service, and the AEAS is modeled using the common service. Next, in order to decide the transport channel for the alert information, the paper proposes to divide the alert information into the message which contains code/text-based essential information, and the supplemental multimedia information. Then, the paper tries to find the most efficient transport channels. Emergency Warning Service (EWS) which uses FIG 5/2 is selected for the delivery of the message. The paper proposes no constraints on delivery of supplemental information except that it shall use the MSC. Finally, it proposes the service signaling for the common service and transport channel. Due to the problems of conventional signaling using the MCI, it proposes a new signaling method. The paper will contribute as a guideline to the development for emergency alert service standards fur other broadcasting media.

A Simulation of 3-D Navigation System of the Helicopter based on TRN Using Matlab

  • Kim, Eui-Hong;Lee, Hong-Ro
    • Spatial Information Research
    • /
    • v.15 no.4
    • /
    • pp.363-370
    • /
    • 2007
  • This study has been carried for the development of the basic algorithm of helicopter navigation system based on TRN (Terrain Referenced Navigation) with information input from the GPS. The helicopter determines flight path due to Origination-Destination analysis on the Cartesian coordinate system of 3-D DTM. This system shows 3-D mesh map and the O-D flight path profile for the pilot's acknowledgement of the terrain, at first. The system builds TCF (terrain clearance floor) far the buffer zone upon the surface of ground relief to avid the ground collision. If the helicopter enters to the buffer zone during navigation, the real-time warning message which commands to raise the body pops up using Matlab menu. While departing or landing, control of the height of the body is possible. At present, the information (x, y, z coordinates) from the GPS is assumed to be input into the system every 92.8 m of horizontal distance while navigating along flight path. DTM of 3" interval has been adopted from that which was provided by ChumSungDae Co., Ltd..

  • PDF

Design and Development of Network for Housing Estate Security System

  • Nachin, Awacharin;Mitatha, Somsak;Dejhan, Kobchai;Kirdpipat, Patchanon;Miyanaga, Yoshikazu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1480-1484
    • /
    • 2003
  • This paper presents the design and development of network for housing estate security system. The system can cover up to 961 houses which can be up to 1,200 meters long transfer rate of 9,600 bps. This system uses checking and warning the abnormal situation. More over this system has ability to control switch on/off the electrical equipment in the house via AC line control system. The system consists of 4 parts. The first part is a security system of each house using MCS-51 microcontroller as a central processing unit scan 32 sensors and control 8 appliances and send alarm. The MCS-51 microcontroller received control signal via telephone used DTMF circuit. The second part is distributed two levels master/slave network implementing after RS-485 serial communication standard. The protocol its base on the OSI (Open Systems Interconnection) 7 layers protocol model design focus on speed, reliability and security of data that is transferred. The network security using encrypt by DES algorithm, message sequence, time stamp checking and authentication system when user to access and when connect new device to this system. Flow control in system is Poll/Select and Stop-and-Wait method. The third part is central server that using microcomputer which its main function are storing event data into database and can check history event. The final part is internet system which users can access their own homes via the Internet. This web service is based on a combination of SOAP, HTTP and TCP/IP protocols. Messages are exchanged using XML format [6]. In order to save the number of IP address, the system uses 1 IP address for the whole village in which all homes and appliance in this village are addressed using internal identification numbers. This proposed system gives the data transfer accuracy over 99.8% and maximum polling time is 1,120 ms.

  • PDF

Development of Vehicle LDW Application Service using AUTOSAR Platform on Multi-Core MCU (멀티코어 상의 AUTOSAR 플랫폼을 활용한 차량용 LDW 응용 서비스 개발)

  • Park, Mi-Ryong;Kim, Dongwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.113-120
    • /
    • 2014
  • In this paper, we examine Asymmetric Multi-Processing Environment to provide LDW service. Asymmetric Multi-Processing Environment consists of high-speed MCU to support rapid image processing and low-speed MCU for controlling with other ECU at the control domain. Also we designed rapid image process application and LDW application Software Component(SW-C) according to the development process rule of AUTOSAR. To communicate between two MCUs, timer based polling based IPC was designed. Also to communicate with other ECUs(Electronic Control Units), we designed CAN messages to provide alarm information and receiving CAN message to catch the Turn signal. We confirm the possibility of the various ADAS development using an Asymmetric Multi-Processing Environment and AUTOSAR platform. We also expect providing ISO 26262 functional safety.

A Study for Avoidance Alarm Algorithm with ADS-B Message (ADS-B 메시지를 이용한 충돌 경보 알고리즘에 관한 연구)

  • Ju, Yo-Han;Ku, SungKwan;Hong, Gyo-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.379-388
    • /
    • 2015
  • In the end of 1990's, future free flight technology had been developed and tested in America and government established the plan for free flight until 2017. Aircraft separation assurance must be secured essentially to avoid collision between aircrafts before Free Flight comes true. Now, Civil aircraft has rules about avoidance activity with traffic collision avoidance system (TCAS) but it can't apply to light aircraft. So there is a need about alternative method to apply light-aircraft because it has space and price problem to use TCAS. In this paper, TCAS algorithm has been modified and verified by simulating with LABVIEW program under ADS-B condition to get miniaturization and weight lighting cheaply. By simulating, collision alert algorithm is analyzed and verified with collision situation proposed by ICAO, and 100% checked for performing the alert announciation on all cases by TCAS standards.

A Study of Dementia Patient Care Monitoring System Based on Indoor Location Using Bluetooth Beacon (블루투스 비콘을 활용한 실내위치기반 치매환자 모니터링 시스템에 관한 연구)

  • Kwon, Dae-Won
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.217-225
    • /
    • 2016
  • In this study, a dementia patient care monitoring system is suggested that uses a wearable type bluetooth beacon to prevent them from going missing. This system shows whether the patients stay within the manageable area and sends a warning message to their monitoring managers' or guardians' smart devices when they leave it. The feature of the system is that it provides the service based on indoor location that makes the beacon worn by dementia patients continuously transmit their location information to the managing server through the smart terminal installed indoors or in hospitals and that enables the monitoring managers or the guardians to receive messages sent from the server that tell the patients' whereabouts through their smart devices. The system suggested in this paper is believed to be a system that effectively contributes to the prevention of the dementia patients' going astray from the hospitals and facilities where they are taking care.

A New Interference-Aware Dynamic Safety Interval Protocol for Vehicular Networks

  • Yoo, Hongseok;Chang, Chu Seock;Kim, Dongkyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.2
    • /
    • pp.1-13
    • /
    • 2014
  • In IEEE 802.11p/1609-based vehicular networks, vehicles are allowed to exchange safety and control messages only within time periods, called control channel (CCH) interval, which are scheduled periodically. Currently, the length of the CCH interval is set to the fixed value (i.e. 50ms). However, the fixed-length intervals cannot be effective for dynamically changing traffic load. Hence, some protocols have been recently proposed to support variable-length CCH intervals in order to improve channel utilization. In existing protocols, the CCH interval is subdivided into safety and non-safety intervals, and the length of each interval is dynamically adjusted to accommodate the estimated traffic load. However, they do not consider the presence of hidden nodes. Consequently, messages transmitted in each interval are likely to overlap with simultaneous transmissions (i.e. interference) from hidden nodes. Particularly, life-critical safety messages which are exchanged within the safety interval can be unreliably delivered due to such interference, which deteriorates QoS of safety applications such as cooperative collision warning. In this paper, we therefore propose a new interference-aware Dynamic Safety Interval (DSI) protocol. DSI calculates the number of vehicles sharing the channel with the consideration of hidden nodes. The safety interval is derived based on the measured number of vehicles. From simulation study using the ns-2, we verified that DSI outperforms the existing protocols in terms of various metrics such as broadcast delivery ration, collision probability and safety message delay.

Interface Construction for Printout Security Management System (출력물 보안 관리 시스템을 위한 인터페이스 구축)

  • Hon, Jung-Soo;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.235-241
    • /
    • 2018
  • The printout management system should analyze the pattern of existence of personal information (resident number, card number) in the output log and users should be provided with functions such as warning message pop-up, forced printing termination, mailing to administrator, independently logs management. Authentication management can also be performed only by registered users by installing an agent on a user PC, and it should have a restriction function to permit or deny work according to user information. In addition, when printing/copying/scanning using this equipment, it is possible to use document printing and multifunction copier after ID card authentication and ID/PW should be input to device when ID card is not used. In this study, we developed these interfaces with WOWSOFT co., Ltd, a security company that has better technology than the existing printout security methods, to construct the printout management system. Also we designed the interface of basic functions necessary for printout management and contributed to the establishment of printout management system.