• 제목/요약/키워드: location tracing

검색결과 115건 처리시간 0.023초

상수관망에서 누수탐지를 위한 역추적계산법 (Back Tracing Calculation Method for the Leakage Detection in Water Distribution System)

  • 권혁재
    • 상하수도학회지
    • /
    • 제27권5호
    • /
    • pp.611-619
    • /
    • 2013
  • In this study, Back Tracing Calculation Method was developed to determine the leakage location and leakage amount. Previously developed determination method of monitoring location and newly developed Back Tracing Calculation Method were applied to the sample pipe network and real size pilot plant. After leakage was assumed in the pilot plant, leakage location and leakage amount could be traced by Back Tracing Calculation Method. From the results, it was found that Back Tracing Calculation Method can be applied for the leakage detection in water distribution system. Furthermore, this method can be applied for the pressure management or leakage detection as a pressure control method in water distribution system.

Development and Embodiment of Automatic Location Tracing Service for Rescue Requester

  • Kim, Sun-Hyo;Kim, Jung-Hun;Kim, Hee-Sun;Yoon, Sung-wook
    • Journal of Multimedia Information System
    • /
    • 제8권1호
    • /
    • pp.11-16
    • /
    • 2021
  • This study developed a design to estimate the location of rescue demander using the sound system at disaster site, in the conditions of indoor positioning cannot be performed properly. It is a location tracing system through smart phone application. It generates sound wave information of rescuer at the rescue site, and it can be used as assistant means for indoor location tracing at the disaster site using sound wave receiving measurement technology.

무선 센서 네트워크에서의 도착지 위치 기밀을 강화하는 라우팅 (On Routing for Enhancing Destination-Location Privacy in Wireless Sensor Networks)

  • 차영환
    • 한국정보통신학회논문지
    • /
    • 제14권7호
    • /
    • pp.1715-1722
    • /
    • 2010
  • 이 논문에서는 패킷 추적 과정에서 획득한 위치 정보를 이용하여 추적 노드를 결정하는 방안을 고려한다. 한편, 추적에 대응하는 라우팅 전략으로는 위치 보호가 필요한 노드들과 근접하지 않은 노드들로 라우팅 경로를 구성하고, 가능한 경로 궤적이 지그-재그나 앞뒤로 이동하지 않도록 한다. 시뮬레이션을 통해 추적 성공률이 매우 향상됨을 확인 하였고, 제안된 라우팅 기법은 다수의 보호 대상들이 존재하는 환경에서 더 많은 패킷들을 전달하면서도, 추적자로 하여금 더 많은 거리를 이동하도록 유인함을 알 수 있었다.

A Close Contact Tracing Method Based on Bluetooth Signals Applicable to Ship Environments

  • Qianfeng Lin;Jooyoung Son
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.644-662
    • /
    • 2023
  • There are still outbreaks of COVID-19 across the world. Ships increase the risk of worldwide transmission of the virus. Close contact tracing remains as an effective method of reducing the risk of virus transmission. Therefore, close contact tracing in ship environments becomes a research topic. Exposure Notifications API (Application Programming Interface) can be used to determine the encountered location points of close contacts on ships. Location points of close contact are estimated by the encountered location points. Risky areas in ships can be calculated based on the encountered location points. The tracking of close contacts is possible with Bluetooth technology without the Internet. The Bluetooth signal can be used to judge the proximity among detecting devices by using the feature that Bluetooth has a strong signal at close range. This Bluetooth feature makes it possible to trace close contacts in ship environments. In this paper, we propose a method for close contact tracing and showing the risky area in a ship environment by combining beacon and Exposure Notification API using Bluetooth technology. This method does not require an Internet connection for tracing close contacts and can protect the personal information of close contacts.

On Sensor Network Routing for Cloaking Source Location Against Packet-Tracing

  • Tscha, Yeong-Hwan
    • 한국통신학회논문지
    • /
    • 제34권3B호
    • /
    • pp.213-224
    • /
    • 2009
  • Most of existing routing methods in wireless sensor networks to counter the local eavesdropping-based packet-tracing deal with a single asset and suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. Recently, the author proposed a routing method, GSLP-w(GPSR-based Source-Location Privacy with crew size w), that enhances location privacy of the packet-originating node(i.e., active source) in the presence of multiple assets, yet taking a path of not too long. In this paper, we present a refined routing(i.e., next-hop selection) procedure of it and empirically study privacy strength and delivery latency with varying the crew size w(i.e., the number of packets being sent per path). It turns out that GSLP-w offers the best privacy strength when the number of packets being sent per path is randomly chosen from the range [$1,h_{s-b}/4$] and that further improvements on the privacy are achieved by increasing the random walk length TTLrw or the probability prw that goes into random walk(where, $h_{s-b}$ is the number of hops of the shortest path between packet-originating node s and sink b).

Routing for Enhancing Source-Location Privacy in Wireless Sensor Networks of Multiple Assets

  • Tscha, Yeong-Hwan
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.589-598
    • /
    • 2009
  • In wireless sensor networks, a node that reports information gathered from adjacent assets should relay packets appropriately so that its location context is kept private, and thereby helping ensure the security of the assets that are being monitored. Unfortunately, existing routing methods that counter the local eavesdropping-based tracing deal with a single asset, and most of them suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. In this paper, we propose a routing method, greedy perimeter stateless routing-based source-location privacy with crew size w (GSLP-w), that enhances location privacy of the packet-originating node (i.e., active source) in the presence of multiple assets. GSLP-w is a hybrid method, in which the next-hop node is chosen in one of four modes, namely greedy, random, perimeter, and retreat modes. Random forwarding brings the path diversity, while greedy forwarding refrains from taking an excessively long path and leads to convergence to the destination. Perimeter routing makes detours that avoid the nodes near assets so that they cannot be located by an adversary tracing up the route path. We study the performance of GSLP-w with respect to crew size w (the number of packets being sent per path) and the number of sources. GSLP-w is compared with phantom routing-single path (PR-SP), which is a notable routing method for source-location privacy and our simulation results show that improvements from the point of the ratio of safety period and delivery latency become significant as the number of source nodes increases.

온도구배가 있는 필릿용접에서 초음파의 전파와 탐촉자의 위치 결정 (The determination of transducer location and ultrasonic wave propagation through temperature gradients in fillet are welding)

  • 정선국;조형석
    • Journal of Welding and Joining
    • /
    • 제15권3호
    • /
    • pp.109-117
    • /
    • 1997
  • The temperature gradient in weldment changes the transit time and distorts the direction of the ultrasound beam to the higher temperature regions due to the lower sound speed in the hotter regions of the weldment. This paper describes a ray-tracing method for calculating the effects of temperature gradients on ultrasonic propagation in fillet arc weldig. In the method, weldment is conceptually devided into a number of layers and the refraction and sound speed at each layer is calculated using the temperature which calculated from analytical solution. Calculating the time and location of echoes arrived from various interfaces around a molten weld pool determines the optimum location of ultrasonic transducers and the correct position of flaws.

  • PDF

에지 트레이싱 기법을 이용한 사각형 물체의 선형 특징점 검출 (Linear Feature Detection of Rectangular Object Area using Edge Tracing-based Algorithm)

  • 오중원;한희일
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅳ
    • /
    • pp.2092-2095
    • /
    • 2003
  • In this paper, we propose an algorithm to extract rectangular object area such 3s Data Matrix two-dimensional barcode using edge tracing-based linear feature detection. Hough transform is usually employed to detect lines of edge map. However, it requires parametric image space, and does not find the location of end points of the detected lines. Our algorithm detects end points of the detected lines using edge tracing and extracts object area using its shape information.

  • PDF

광선 역추적 방식을 이용한 비구면 렌즈의 설계 (Aspherical Lens Design by using Ray Reverse Tracing Method)

  • 김한섭;박규열
    • 대한기계학회:학술대회논문집
    • /
    • 대한기계학회 2003년도 춘계학술대회
    • /
    • pp.992-997
    • /
    • 2003
  • Aspherical lens design method named ray reverse tracing method is introduced. Differently from the traditional design method, the ray reverse tracing method traces the shape and location of a real object by use of its virtual image. From the result, it was convinced that spherical aberration free aspherical lens could be designed by use of the ray reverse tracing method. Furthermore, it could reduce the degree of dependence of optical characteristics on designer's ability, because deformation terms and optimization can be eliminated, which has been performed in conventional lens design process.

  • PDF

광선추적방식을 적용한 비구면 렌즈 설계 (Design of Aspheric Lens by using Ray Tracing Method)

  • 김수용;한민식;김태호;박정우;김민주;전언찬
    • 한국기계가공학회지
    • /
    • 제6권1호
    • /
    • pp.7-12
    • /
    • 2007
  • The optic industry is a high value-added advanced technology industry combined with the precision machine industry and the digital electronics industry. The aspheric lens, one of optic parts, is a key technology having a significant influence on the performance of optic equipment. So this study relates to designing an aspheric lens to which a ray-tracing method is applied. In the ray-tracing method, a refractive index of material is used, which take an advantage that the location of a light source and incident angle can be fixed, unlike the ray back-tracing scheme.

  • PDF