• Title/Summary/Keyword: 관제일지

Search Result 1,631, Processing Time 0.023 seconds

Air Traffic Controllers' Fatigue and Stress based on Heart Rate Measurement (심장박동수 측정을 통한 항공교통 관제사의 피로와 스트레스)

  • Park, Jin-han;An, Deok-bae;Baik, Hojong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.90-98
    • /
    • 2017
  • This paper is concerned with air traffic controllers' fatigue and stress that they experience during their daily job particularly as being shift workers. Previous researches reveal that the controllers' fatigue and stress increase by several factors including time spent at work, traffic intensity, visibility, etc. The researches also indicate that air traffic controllers' fatigue and stress can be reasonably surrogated by their heart rate. We set three hypotheses relating the influencing factors and the fatigue and stress represented by the heart rates. Using wrist bands, air traffic controllers' heart rates at various situations are collected at Choongju airport. The hypothetical tests explicitly confirm that the heart rate is highly correlated with the traffic level and the time spent at work. In particular, it be shown that even when handling the same traffic level, air traffic controllers' stress level increases as the time they spent at work increases.

Data Collection Methods to Standardize Protocols of Safety Supervision System (안전관제시스템 프로토콜 표준화를 위한 데이터 수집 방법)

  • Shin, Kwang-Ho;Um, Tae-Hwa;Lim, Dam-Sub;Ahn, Jin
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.2
    • /
    • pp.159-169
    • /
    • 2016
  • The current railway control system in Korea is comprised of signaling, electric rail power, communication, and maintenance systems that are independent of each other. Further, these systems have different mediums and protocols for transmitting the field equipment data to the central control system. The Safety Supervision System has as its purpose the collecting of safety-related data from each system to predict and prevent accidents, this system utilizes standard protocol. Safety-related data need to be collected from field data transmission devices of the existing control system, the data should be collected without affecting the communication of the existing system. In this study, sniffing skill, which is typically used for network traffic monitoring or security, is used to collect data. The problems arising from the use of sniffing devices are noted, and the Packet Conversion Node is proposed as a solution to the problems. Further, functional and performance testing were completed for the prototype, and the software architecture and packet conversion process were verified.

Design of an Exploration Drone for Digital Twin based Building Control

  • Shin, Sang-Hoon;Park, Myeong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • In this paper, we propose a building exploration drone that can be used for a digital twin-based building control system. The existing building control system using a fixed position sensor box has a problem that a management blind spot occurs. And because people patrol themselves, it takes a lot of human resources. In this paper, a drone equipped with a temperature and humidity sensor and a gas leak detection sensor is used to search the internal path of the building centering on the control blind spot. It also aims to solve the problem of the building control system by transmitting information in real time along with the video. In addition, it has a stable hovering function using an optical floor sensor and can be applied to an existing digital twin-based building control system. The results of this study are believed to be of great help in improving the quality of digital twin control systems using drones.

Development of Integrated Security Control Service Model based on Artificial Intelligence Technology (인공지능 기술기반의 통합보안관제 서비스모델 개발방안)

  • Oh, Young-Tack;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.108-116
    • /
    • 2019
  • In this paper, we propose a method to apply artificial intelligence technology efficiently to integrated security control technology. In other words, by applying machine learning learning to artificial intelligence based on big data collected in integrated security control system, cyber attacks are detected and appropriately responded. As technology develops, many large capacity Is limited to analyzing individual logs. The analysis method should also be applied to the integrated security control more quickly because it needs to correlate the logs of various heterogeneous security devices rather than one log. We have newly proposed an integrated security service model based on artificial intelligence, which analyzes and responds to these behaviors gradually evolves and matures through effective learning methods. We sought a solution to the key problems expected in the proposed model. And we developed a learning method based on normal behavior based learning model to strengthen the response ability against unidentified abnormal behavior threat. In addition, future research directions for security management that can efficiently support analysis and correspondence of security personnel through proposed security service model are suggested.

Research of Deep Learning-Based Multi Object Classification and Tracking for Intelligent Manager System (지능형 관제시스템을 위한 딥러닝 기반의 다중 객체 분류 및 추적에 관한 연구)

  • June-hwan Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.73-80
    • /
    • 2023
  • Recently, intelligent control systems are developing rapidly in various application fields, and methods for utilizing technologies such as deep learning, IoT, and cloud computing for intelligent control systems are being studied. An important technology in an intelligent control system is recognizing and tracking objects in images. However, existing multi-object tracking technology has problems in accuracy and speed. In this paper, a real-time intelligent control system was implemented using YOLO v5 and YOLO v6 based on a one-shot architecture that increases the accuracy of object tracking and enables fast and accurate tracking even when objects overlap each other or when there are many objects belonging to the same class. The experiment was evaluated by comparing YOLO v5 and YOLO v6. As a result of the experiment, the YOLO v6 model shows performance suitable for the intelligent control system.

Navigational Anomaly Detection using a Traffic Network Model (교통 네트워크 모델 기반 이상 운항 선박 식별에 관한 연구)

  • Jaeyong Oh;Hye-Jin Kim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.828-835
    • /
    • 2023
  • Vessel traffic service operators (VTSOs) need to quickly and accurately analyze the maritime traffic situation in the vessel traffic service (VTS) area and provide information to the vessels. However, if traf ic increases rapidly, the workload of VTSOs increases, and they may not be able to provide adequate information. Therefore, it is essential to develop VTSO support technologies that can reduce their workload and provide consistent information. In this paper, we propose a model for automatically detecting abnormal vessels in the VTS area. The proposed model consists of a positional model and a contextual model and is specifically optimized for the traffic characteristics of the target area. The implemented model was tested by using real-world data collected at a test center (Daesan Port VTS). Our experiments confirmed that the model could automatically detect various abnormal situations, and the results were validated through expert evaluation.

A Study on the Operation and System Improvement of Cyber Security Center (사이버보안관제센터 운영 및 제도 개선에 관한 연구)

  • Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.39-45
    • /
    • 2024
  • The purpose of security control in the public sector is to secure the safety of administrative services for the public by preventing resource loss or information infringement in information systems and information and communication networks. The security control system is a process that performs real-time detection, analysis, response, and reporting through system vulnerability analysis and security system detection pattern optimization. This study aims to objectively identify the current situation of the mismatch between the supply and demand of cyber security control centers currently in operation and specialized security control companies that can be entrusted to operate them, and to derive and propose practical and institutional improvement measures. Considering that the operation of security control centers in the public sector is expected to increase in the future, research on the practical supplementation required for the operation process of security control centers and the improvement of the designation system of security control specialized organizations has fundamental and timely significance, and it is an area that requires continuous research in terms of strategic industrialization.

목포연안 여객선 효율적 안전관리 방안에 대한 고찰

  • Kim, Seung-Rin;Kim, Hyeon-Seong;Mun, Hyeon-Jin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.45-47
    • /
    • 2019
  • 목포연안에 존재하는 다수의 여객선과 항로를 관리함에 있어 여객선 현황, 해양사고의 원인 및 운항변수에 따른 위험요소를 분석하고 효율적인 안전관리방안 제시.

  • PDF

선박교통 안전확보를 위한 유·무인선 교신체계 연구

  • 이지연;최경식
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.31-32
    • /
    • 2023
  • 현존선과 자율운항선박의 공존(共存)항해에 대비하여, 해상교통 안전관리 강화 및 국민의 인명·재산 보호를 위해 선박 간 항행의도 확인 및 위험상황 회피를 위한 차세대 교신체계 및 관제지원기술 제안

  • PDF

PC Security Management Control System using Agent (에이전트를 이용한 PC 보안 관제 시스템)

  • 김우년;노원섭;이승우;이종남;강창구
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.44-47
    • /
    • 2002
  • 본 논문에서는 에이전트를 이용하여 개인용 컴퓨터의 보안성을 높이고, 중앙에서 PC 보안 정책을 조직 내에 일괄 적용하고 관리할 수 있는 PC 보안 관제 시스템의 개발에 대해서 설명한다. 에이전트는 각 PC에서 보안 정책을 적용하고 보안 로그를 수집하여 관제 시스템으로 전송하며, 관제 시스템은 이러한 정보를 기반으로 조직내의 PC 보안정책을 일괄 적용할 수 있도록 지원한다. 에이전트를 이용한 PC 보안 관제 시스템은 에이전트에서 수집된 보안 로그를 이용하여 보안 정책을 조직에 알맞게 수립할 수 있으며, 수립된 조직의 정책이 조직내의 PC에 적용할 수 있고, 정책에 위배되는 사항을 실시간으로 확인할 수 있는 장점이 있다.

  • PDF