• Title/Summary/Keyword: automatic identification

Search Result 649, Processing Time 0.026 seconds

Studies on the Improvement and Analysis of Data Entry Error to the AIS System for the Traffic Ships in the Korean Coastal Area (우리나라 연안해역을 통항하는 선박에 대한 AIS 데이터 입력 오류의 분석 및 개선 방안 연구)

  • JEON, Jae-Ho;JEONG, Tae-Gweon
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.6
    • /
    • pp.1812-1821
    • /
    • 2016
  • The purpose of this study is to survey input data error of ship automatic identification system (AIS) and suggest its improvement. The effects of AIS were observed. Input data error of AIS was investigated by dividing it into dynamic data, static data by targeting actual ships and its improvement method was suggested. The findings are as follows. Looking into accidents before and after AIS is enforced to install on the ship, total collision were decreased after AIS installed. Static data error of AIS took place mainly in the case that ship name, call sign, MMSI, IMO number, ship type, location of antenna (ship length and width) were wrongly input or those data were not input initially. Dynamic data error of AIS was represented by input error of ship's heading. As errors of voyage related data take place as well, confusion is made in sailing or ship condition. Counter measures against the above are as follows. First, reliability of AIS data information should be improved. Second, incessant concern and management should be made on the navigation officers.

A Design and Implementation of EPCIS Repository for RFID and Sensor Data (RFID와 센서 데이터 처리를 위한 EPCIS 저장소 설계 및 구현)

  • Hyun, Seung-Ryul;Lee, Sang-Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.151-162
    • /
    • 2010
  • In order to build up the ubiquitous computer environment, there are many researches on automatic identification, sensor networks, and home networks etc. EPCIS (EPC Information Services), which is proposed by EPCglobal, is a standard on the repository managing tag data that is needed to develop RFID application system. In this paper, the EPCIS repository is designed and implemented. It is able to search the object dependent upon general object recognition and environment information variation. And sensor data, which is also massive data and is changed with position, is integrated into RFID data in the system. By doing so, it is possible to do the convergence managements of object recognition with variations of USN (Ubiquitous Sensor Network) environment.

Study on Application of Real Time AIS Information

  • Hori, Akihiko;Arai, Yasuo;Okuda, Shigeyuki
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2006.10a
    • /
    • pp.63-70
    • /
    • 2006
  • Now AIS (Automatic Identification System) has been under full operation for ocean-going vessels, and it is expected not only to identify target ships but also to take collision avoidance using AIS information with Radar and ARFA information in restricted waters. AIS information is very useful not only for target identifications but also for taking collision avoidance, but OOW (Officer OF Watch-keeping) should take care of systematic observation of AIS because of miss-operation or malfunction of AIS. In this paper, we propose the application of Onboard Ship Handling Simulator with visual system displayed 3D scene added AIS performance such as blind areas of Island, microwave propagation, ok. and maneuvering simulation using TK models, applied real time AIS information and research the effectiveness of this system for ship handling in restricted waters, and discus the principal issues through the on board experiments. Conclusion will be expected that; 1) systematic observation of ASS information using visual scene simulator with AIS information will be effectively done, 2) observation compared with Radar and ARPA information will be also useful to make a systematic observation, 3) using the recording and replay function of simulation will be useful not only for systematic observation but also to measure and to encourage officers' skill.

  • PDF

Preliminary Hazard Analysis of the ATC System for Electrical Hazards (전기적 위험요인에 대한 열차제어시스템의 예비위험요인분석)

  • Joung E. J.;Kim J. K.;Shin D. H.;Kim B. H.;Lee J. W.;Kim Y. M.
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.1415-1417
    • /
    • 2004
  • The system safety must be ensured before customization. There was no specific requirement representing system safety in Korea until now. So we should draw safety requirements to guarantee system safety for the first time. In this paper. the hazard identification and analysis to derive the safety requirements on the train control system are carried out. To analyze hazard, we have to deduce system functions. identify related hazards, derive the effects of the hazards, analyze current risks. define the target risks of the system, and deduce the alternative plans to reduce the effects of the hazards. For the case study, Preliminary Hazard Analysis(PHA) of the Automatic Train Control (ATC) System for Electrical Hazards are carried out.

  • PDF

Passive Remote Chemical Detection of SF6 Clouds in the Atmosphere by FTIR (수동형 FTIR 원격화학 탐지기를 이용한 SF6 오염운의 실시간 탐지)

  • Chong, Eugene;Park, Byeonghwang;Kim, Ju Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.8-14
    • /
    • 2014
  • Brightness temperature spectra acquired from FTIR(Fourier Transform Infrared)-SCADS (Standoff Chemical Agent Detection System) could be available for detection and identification of the chemical agents and pollutants from different background. IR spectrum range of 770 to 1350 $cm^{-1}$ is corresponding to "atmospheric window". A 2-dimensional(2D) brightness temperature spectrum was drawn from combining each data point through automatic continuous scanning of FTIR along with altitude and azimuth. At higher altitude, temperature of background was decreased but scattering effect of atmospheric gases was increased. Increase in temperature difference between background and blackbody in SCADS at higher temperature causes to increases in peak intensity of $SF_6$. This approach shows us a possibility that 2D visual information is acquired from scanning data with a single FTIR-SCADS.

A study for implementation of wireless sensor network to optimize building environment (건물 환경 최적화를 위한 무선 센서 네트워크 구현에 대한 연구)

  • Chung, Sung-Boo;Kim, Joo-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2235-2241
    • /
    • 2009
  • RFID and USN are major technology in Ubiquitous. RFID is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders through RFID reader. USN is wireless sense network and monitoring environment conditions that is temperature, noise, pressure, oscillation. In this paper, we propose wireless sensor network system that is monitoring to optimize environment conditions.

Analysis of Message Receiving Rate for LEO-Satellite AIS (저궤도 위성 AIS의 메시지 수신확률 분석)

  • Kim, Byung-Ok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.237-240
    • /
    • 2010
  • AIS(Automatic Identification System)는 선박과 육상 및 선박 상호간에 선박의 항행관련 정보를 상호 교환함으로써 안전항해를 제고하기 위하여 도입된 무선설비로서 그 활용도가 매우 높아지고 있으며 AIS 탑재 선박도 증가하고 있다. 그러나 AIS에서 사용하고 있는 초단파의 전파 특성으로 인하여 비교적 근거리 통신만 가능하고 장거리 선박추적 관리를 위한 용도로 활용하는 데는 어려움이 있었다. 이러한 통신권의 한계를 극복하기 위한 방안으로 저궤도 위성을 사용하는 위성 AIS의 도입에 대한 연구가 주요 선진국을 중심으로 추진되고 있으며, 성능을 제고하기 위한 기술 기준 연구도 진행되고 있다. 본 연구에서는 저궤도 위성을 사용한 AIS의 문제점인 메시지 수신확률을 분석하기 위하여 현재 사용 중인 지상파 AIS의 특성 및 저궤도 위성 AIS의 문제점을 분석하고 메시지 수신확률에 대한 시뮬레이션을 수행하여 그 결과를 분석하였다. 분석결과 위성 AIS는 지상파 AIS에 비하여 통신권이 크게 확대되는 반면 채널 용량의 한계 및 채널간 간섭으로 인하여 AIS 메시지 충돌이 심하게 발생하고 메시지 수신 확률이 매우 낮음을 알 수 있었다. 따라서 현재의 지상파 AIS 표준을 적용한 위성 AIS의 실시간 정보 교환은 사실상 불가능하며 위성 AIS의 메시지 수신 확률을 제고하기 위해서는 위성 AIS를 위한 별도의 표준을 제정할 필요가 있음을 알 수 있다.

  • PDF

A Design and Implementation of ALE-compliant RFID Middleware System (ALE 기반 RFID 미들웨어 설계 및 구현)

  • Hong, Yeon-Mi;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.648-655
    • /
    • 2007
  • Nowadays, to realize ubiquitous computing environment, many research activities have been going on within various kinds of research domains including automatic identification sensor network, home network, telematics and so on. Especially, RFID middleware that supports the aggregation of RFID tag data, control and management, and the integration with legacy systems has recently gained a lot of attention. Meanwhile, EPCglobal defined an ALE(Application Level Events) standard specification, which exists between RFID readers and applications, and substitutes the previous systems called Savant. In the specification internal structures and implementation technologies of ALE are not mentioned and only external interfaces are defined. This approach easies the verification of standard compliance and inter-operability of the layer. In this paper, we present the design of ALE-compliant RFID middleware systems that process RFID tag data efficiently.

Free vibration of actual aircraft and spacecraft hexagonal honeycomb sandwich panels: A practical detailed FE approach

  • Benjeddou, Ayech;Guerich, Mohamed
    • Advances in aircraft and spacecraft science
    • /
    • v.6 no.2
    • /
    • pp.169-187
    • /
    • 2019
  • This work presents a practical detailed finite element (FE) approach for the three-dimensional (3D) free-vibration analysis of actual aircraft and spacecraft-type lightweight and thin honeycomb sandwich panels. It consists of calling successively in $MATLAB^{(R)}$, via a developed user-friendly GUI, a detailed 3D meshing tool, a macrocommands language translator and a commercial FE solver($ABAQUS^{(R)}$ or $ANSYS^{(R)}$). In contrary to the common practice of meshing finely the faces and core cells, the proposed meshing tool represents each wall of the actual hexagonal core cells as a single two-dimensional (2D) 4 nodes quadrangularshell element or two 3 nodes triangular ones, while the faces meshes are obtained simply using the nodes at the core-faces interfaces. Moreover, as the same 2D FE interpolation type is used for meshing the core and faces, this leads to an automatic handling of their required FE compatibility relations. This proposed approach is applied to a sample made of very thin glass fiber reinforced polymer woven composite faces and a thin aluminum alloy hexagonal honeycomb core. The unknown or incomplete geometric and materials properties are first collected through direct measurements, reverse engineering techniques and experimental-FE modal analysis-based inverse identification. Then, the free-vibrations of the actual honeycomb sandwich panel are analyzed experimentally under different boundary conditions and numerically using different mesh basic cell shapes. It is found that this approach is accurate for the first few modes used for pre-design purpose.

A Study on Cyber Security Requirements of Ship Using Threat Modeling (위협 모델링을 이용한 선박 사이버보안 요구사항 연구)

  • Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.657-673
    • /
    • 2019
  • As various IT and OT systems such as Electronic Chart Display and Information System and Automatic Identification System are used for ships, security elements that take into account even the ship's construction and navigation environment are required. However, cyber security research on the ship and shipbuilding ICT equipment industries is still lacking, and there is a lack of systematic methodologies through threat modeling. In this paper, the Data Flow Diagram was established in consideration of stakeholders approaching the ship system. Based on the Attack Library, which collects the security vulnerabilities and cases of ship systems, STRIDE methodologies and threat modeling using the Attack Tree are designed to identify possible threats from ships and to present ship cyber security measures.