• Title/Summary/Keyword: 관제업무

Search Result 191, Processing Time 0.032 seconds

Application for en-Route mission to Decentralized Task Allocation (경로가 주어진 임무 상황에서 분산 임무할당 알고리즘의 적용 방안 연구)

  • Kim, Sung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.156-161
    • /
    • 2020
  • In an environment that operates multiple UAVs, the use of a decentralized task allocation algorithm has more robustness from a single failure of UAV on the mission because there is no central command center. In addition, UAVs have situational awareness and redistribute tasks among themselves, which can expand the mission range. The use of multiple UAVs in a mission has increased as the agent hardware has decreased in size and cost. The decentralized mission-planning algorithm has the advantages of a larger mission range and robustness to a single failure during the mission. This paper extended the type of mission the uses CBBA, which is the most well-known decentralized task allocation algorithm, to the point mission and en-route mission. This will describe the real mission situation that has the purpose of surveillance. A Monte-Carlo simulation was conducted in the case of multiple agents in the task-rich environment, and the global rewards of each case were compared.

A Study on the Effective application scheme of Subway optical communication system (지하철 광통신 시스템의 효율적 운용방안에 대한 고찰)

  • Kwon, Gi-Jung;Lee, Gi-Seung;Ko, Young-Yun
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.1541-1550
    • /
    • 2007
  • A subway is one of many public transportation means that contributes toward our society including seoul and offering of its service and expression of various information are in need due to users high demand. And there are various class of users. For that reason an optical communication network in the general contorl center and station buildings was installed. Considering the importance of safe operation of subway, optical communication exists to enhance customer satisfaction. Safe operation is essential as its level of reliance accounts for about 95%. this paper will look for ways to promote mutual information interchange and operation know-how with systems of the same kind and sharing a capable of effective operation of systems in place. Optical communication network in the metropolis railroad accepts various kinds of control networks and data networks for train operation. As occasion demands, this paper presents effective application scheme and specialized organization about an optical communication operating system.

  • PDF

A Study on Data Mapping for Integrated Analysis of Railway Safety Data (철도 위험관리 데이터 연계 분석을 위한 기준 데이터 매핑 연구)

  • Byun, Hyun-Jin;Lee, Yong-Sang
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.5
    • /
    • pp.703-712
    • /
    • 2017
  • The railway system is an interface industry that can be safely operated by organically operating the lines, vehicles, controls, etc. Various data are generated in the operation and maintenance activities of the railway system. These data are utilized in cooperation with safety and maintenance activities in each field, but amount of data is insufficient for data analysis of safety management due to relevant data being produced without any synchronous criteria such as time or space. In particular, reference data such as location and time of failure data for each field are set to different criteria according to the work characteristics in each field. So, it is not easy to analyze data integrally based on location and time. Therefore, mapping of reference data can be required for integrated analysis of data defined in different formats. By selecting data mapping tools and verifying the results of safety relevant data with the same criteria, the purpose of this paper is to enable integrated analysis of railway safety management data occurring in different fields based on location and time.

Real-Time License Plate Detection Based on Faster R-CNN (Faster R-CNN 기반의 실시간 번호판 검출)

  • Lee, Dongsuk;Yoon, Sook;Lee, Jaehwan;Park, Dong Sun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.11
    • /
    • pp.511-520
    • /
    • 2016
  • Automatic License Plate Detection (ALPD) is a key technology for a efficient traffic control. It is used to improve work efficiency in many applications such as toll payment systems and parking and traffic management. Until recently, the hand-crafted features made for image processing are used to detect license plates in most studies. It has the advantage in speed. but can degrade the detection rate with respect to various environmental changes. In this paper, we propose a way to utilize a Faster Region based Convolutional Neural Networks (Faster R-CNN) and a Conventional Convolutional Neural Networks (CNN), which improves the computational speed and is robust against changed environments. The module based on Faster R-CNN is used to detect license plate candidate regions from images and is followed by the module based on CNN to remove False Positives from the candidates. As a result, we achieved a detection rate of 99.94% from images captured under various environments. In addition, the average operating speed is 80ms/image. We implemented a fast and robust Real-Time License Plate Detection System.

Quantitative Analysis of Workload for Classifying the Operating Area of Distribution Control Center (배전관제센터의 운전영역 구분을 위한 정량적 업무량 분석)

  • Go, Seok-Il;Seo, Dong-Kwen;Choi, Joon-Ho;Ahn, Seon-Ju;Kim, Hyun-Woo;Yun, Sang-Yun
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.4
    • /
    • pp.200-207
    • /
    • 2018
  • In recent, KEPCO (Korea Electric Power Corporation) faced difficulties of the DCC (distribution control center) due to the increase of field equipment and operational cost, and aging of operating staffs. In response to these changes in the DCC, KEPCO is trying to change the organization and system of the DCC. In this paper, we present a new attempt to change organization and structure of distribution control center, which was implemented by KEPCO recently. This paper is divided into three major parts. First, to examine the adequacy of the divided basis of current DCCs based on the quantity of installed electrical equipment, we analyzed the correlation between the operational history of the DCCs and the number of equipment. Through the analysis, we confirmed that there is little relationship between the number of equipment and actual workload. Second, we conducted visits and questionnaire surveys of all the DCCs to identify factors affecting the actual workload of distribution operators and then summarized the results. Third, based on this survey, a general formula for analyzing the workload of a DCC was derived, and each DCC's average annual total workload, day/night workload, and required number of personnel were calculated. Through this study, we proposed a more realistic management method of DCCs that can overcome the division criteria based on equipment quantity.

For the financial institution computer system security, research (금융기관 전산시스템 보안 강화에 대한 연구)

  • Kim, Myung-Soo;Choi, Dae-Young;Seo, Won-Woo;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.67-70
    • /
    • 2014
  • Last was the main issue of financial security in the future will be more emphasis on security. Such as March 20, 2013 Computational crisis, June 25 Cyber terrorism information to credit card companies and customers due to carrier spill in Financial computational security measures 'released in 2014 and the financial authorities' customer information leakage prevention measures "were published the efforts to protect customers' information assets and ensure the stability of the financial transactions carried out by financial institutions protected status check "the information annually authorities This study business operations for the protection of information technology services for IT systems security equipment, data security operating services, security management services operations, operational management of IT systems security requirements from the point to the need for information security, IT systems administrator it would be great help.

  • PDF

Services analysis and improvement of MKE(Ministry of Knowledge Economy) Cyber Security Center (지식경제사이버안전센터의 대응활동분석과 개선방안)

  • Lee, Seung-Won;Roh, Young-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.249-258
    • /
    • 2012
  • Cyber attacks expose sensitive information and cause fatal damage in both the public and the private sectors. Therefore, MKE (Ministry of Knowledge Economy) Cyber Security Center was founded on July 25, 2008, to perform three major roles. First, it detects and analyzes cyber attacks for the both sectors. Second, its ISAC (Information Sharing & Analysis Center) service analyzes and evaluates the vulnerability of the communication and network infrastructure to security threats, including control systems. Third, it provides CERT/CC (Computer Emergency Response Team Coordination Center) service to prevent and to respond to computer security incidents. This study focuses on the MKE Cyber Security Center's service analysis, which is playing an increasingly larger role in the both sectors. Based on this analysis, after grasping the response services activity and pointing out the problems, this study suggests improvements to the MKE Cyber Security Center.

Proposal of a method of using HSV histogram data learning to provide additional information in object recognition (객체 인식의 추가정보제공을 위한 HSV 히스토그램 데이터 학습 활용 방법 제안)

  • Choi, Donggyu;Wang, Tae-su;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.6-8
    • /
    • 2022
  • Many systems that use images through object recognition using deep learning have provided various solutions beyond the existing methods. Many studies have proven its usability, and the actual control system shows the possibility of using it to make people's work more convenient. Many studies have proven its usability, and actual control systems make human tasks more convenient and show possible. However, with hardware-intensive performance, the development of models is facing some limitations, and the ease with the use and additional utilization of many unupdated models is falling. In this paper, we propose how to increase utilization and accuracy by providing additional information on the emotional regions of colors and objects by utilizing learning and weights from HSV color histograms of local image data recognized after conventional stereotyped object recognition results.

  • PDF

The introduction of Traffic Inducement Security System in Korea - Centering on Curriculums - (한국의 교통유도경비 도입방안 -교과과정을 중심으로-)

  • Lee, Sang-Won;Lee,, Seung-Chal
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.147-164
    • /
    • 2010
  • A variety of work zone including road single-sharing construction add surrounding disorder and increase inconvenience of vehicles and pedestrians and furthermore danger of traffic accidents, which sometimes result in human life damages. Traffic delay due to vehicles and users generating in the course of using large-scale multiplex facilities bring about a great economic loss. Now, a lot of regulations and laws related to traffic safety system on construction sites etc. are established, but can not display efficacy desirably. It brings about continuous economic loss due to human life accidents and delay. For the purpose of solving the problems, it is necessary to import systems such as traffic inducement Security (Japan) and traffic controller (CANADA, USA) This article suggest how improve civil safety and reduce Social cost. therefore This thesis aims at analyzing advanced cases of foreign countries, looking into Korean status, and presenting importing ways of traffic inducement Security appropriate to Korea. It is reasonable to grant grade1, grade2, and technical experts to traffic inducement Security who pass regulated educations and examinations. In addition, by reversing regulations and laws, it is necessary only those who have the licenses of traffic induction guarder etc. can establish construction sites and disordered places on roads. Theory educations for education time must include basic educations and expert educations. Basic educations must include understanding regulations and laws and understanding affairs. Expert educations must include traffic control, safety educations, understanding of traffic accidents, operation of traffic control facilities, and traffic accident settlements. Traffic affairs educations must include traffic induction affairs in sites (hand signals, safety material establishment, traffic accident settlements, and urgent treatments).

  • PDF

A study on Operation Rules of Korean Air Defence Identification Zone (한국 방공식별구역 운영규칙에 관한 고찰)

  • Kwon, Jong-Pil;Lee, Yeong H.
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.189-217
    • /
    • 2017
  • Declaration of Air Defense and Identification Zones started with the United States in 1950, which was followed by declaration of KADIZ by the Republic of Korea in 1951. Initial ADIZ were solely linked with air defense missions, but their roles have changed as nations around the globe manifested a tendency to expand their influence over maritime resources and rights. In particular, China declared ADIZ over the East China Sea in October 2013 and forced all passing aircraft to submit flight plan to ATC or military authority, saying failure of submission will be followed by armed engagement. China announced it would declare another zone over the South China Sea despite the ongoing conflict in the area, clearly showing ADIZ's direct connection with territorial claim and EEZ and that it serves as a zone within which a nation can execute its rights. The expanded KADIZ, which was expanded in Dec 15, 2013 in response to Chinese actions, overlaps with the Chinese ADIZ over the East China Sea and the Japanese ADIZ. The overlapping zone is an airspace over waters where not only the Republic of Korea but also of China and Japan argue to be covering their continental shelf and EEZ. Military conventions were signed to prevent contingencies among the neighboring nations while conducting identifications in KADIZ, including the overlapping zone. If such military conventions and practice of air defense identification continue to be respected among states, it is under the process of turning into a regional customary law, although ADIZ is not yet recognized by international law or customary law. Moreover, identification within ADIZ is carried out by military authorities of states, and misguided customary procedures may cause serious negative consequences for national security since it may negatively impact neighboring countries in marking the maritime border, which calls for formulation of operation rules that account for other state activities and military talks among regional stake holders. Legal frameworks need to be in place to guarantee freedom of flights over international seas which UN Maritime Law protects, and laws regarding military aircraft operation need to be supplemented to not make it a requirement to submit flight plan if the aircraft does not invade sovereign airspace. Organizational instructions that require approval of Chairman of Joint Chiefs of Staff for entrance and exit of ADIZ for military aircraft need to be amended to change the authority to Minister of National Defense or be promoted to a law to be applicable for commercial aircraft. Moreover, in regards to operation and management of ADIZ, transfer of authority should be prohibited to account for its evolution into a regional customary law in South East Asia. In particular, since ADIZ is set over EEZ, military conventions that yield authority related to national security should never be condoned. Among Korea, China, Japan and Russia, there are military conventions that discuss operation and management of ADIZ in place or under negotiation, meaning that ADIZ is becoming a regional customary law in North East Asia region.

  • PDF