• Title/Summary/Keyword: 관제정보의 신뢰성

Search Result 40, Processing Time 0.024 seconds

The Development of the Anchor Dragging Risk Assessment Program (선박 주묘 위험성 판별 프로그램 개발에 관한 연구)

  • Kim, Joo-Sung;Park, Jun-Mo;Jung, Chang-Hyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.6
    • /
    • pp.646-653
    • /
    • 2018
  • Marine accidents caused by dragging anchors occur constantly due to enlargement of ships' size and unusual weather conditions. Nevertheless, vessel operators rely on their experience because the calculations of actual holding power and external forces are complex and inconvenient. The purpose of this study was to propose a program for the anchor dragging risk assessment in order to provide crew and VTSO with the information to determine easily the danger of dragging and take appropriate action. The input data in this program were composed of the ship's basic particulars, anchoring condition, and external environment etc. on calculating for the wind pressure, frictional force, drift force, and holding power. Three dragging anchor accidents were applied to the program's data input at the time of the day, then the result was assessed by 'warning', which was verified with a high confidence. As a result, the risk of dragging anchors can be predicted in advance through this program. In further studies, it is necessary to simplify the input data and improve user convenience through automatic input from various equipment.

The Design of Monitoring & Control(M&C) for KUS RFS in KASS (KASS 위성통신국 RF시스템 감시제어장치 설계)

  • Kim, Taehee;Sin, Cheonsig
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.50-55
    • /
    • 2017
  • In this paper, the design of the RF system monitoring and control system of KUS (KASS: KASS Uplink Station) which constitutes KASS (Korea Augmentation Satellite System) is described. The Korean satellite calibration system is named KASS and aims to develop the SBAS system of the APV-1 level SoL service level and the CAT-1 test operation technology. Software and hardware development environment, function and algorithm of supervisory control device, structure of supervisory control device, and user interface were designed to implement KUS / RFS monitoring control device. We have secured the stability and reliability of the system by using the monitoring and control system design of the COMS (Communication Ocean & Meteorological Satellite) and the Korea Satellite 5A / 7 control system, which has already been used for the design of the surveillance control system. In addition, we have made it possible to provide the user interface according to the actual operator's request more conveniently.

A Study on the Realization of ADS-B 1090ES Ground Station Receivers (ADS-B 1090ES 지상국 수신기 구현에 관한 연구)

  • Park, Chan-Sub;Yoon, Jun-Chul;Cho, Ju-Yong;Shin, Hee-Sung;Seo, Jong-Deok;Park, Hyo-Dal;Kang, Suk-Youb
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.79-88
    • /
    • 2015
  • This paper introduces surveillance equipment "ADS-B", the core subject of traffic control system and study of ADS-B 1090ES ground receiver. The standard is set not only for functional but also its reliability by analyzing international standard documents and existing products. The Bias circuit is designed for less power consumption, low noise and high gain for RF module. The signal processing is capable of overcoming its bad conditions. MCU part is configured with the latest CPU for high speed communication with external parts and SNMP is selected for remote control communication. The performance of developed receiver satisfies national and international standards and its functions are more advanced compared to foreign receivers.

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.

A Study on Building the HD Map Prototype Based on Web GIS for the Generation of the Precise Road Maps (정밀도로지도 제작을 위한 Web GIS 기반 HD Map 프로토타입 구축 연구)

  • KWON, Yong-Ha;CHOUNG, Yun-Jae;CHO, Hyun-Ji;GU, Bon-Yup
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.2
    • /
    • pp.102-116
    • /
    • 2021
  • For the safe operation of autonomous vehicles, the representative technology of the 4th industrial revolution era, a combination of various technologies such as sensor technology, software technology and car technology is required. An autonomous vehicle is a vehicle that recognizes current location and situation by using the various sensors, and makes its own decisions without depending on the driver. Perfect recognition technology is required for fully autonomous driving. Since the precise road maps provide various road information including lanes, stop lines, traffic lights and crosswalks, it is possible to minimize the cognitive errors that occur in autonomous vehicles by using the precise road maps with location information of the road facilities. In this study, the definition, necessity and technical trends of the precise road map have been analyzed, and the HD(High Definition) map prototype based on the web GIS has been built in the autonomous driving-specialized areas of Daegu Metropolitan City(Suseong Medical District, about 24km), the Happy City of Sejong Special Self-Governing City(about 33km), and the FMTC(Future Mobility Technical Center) PG(Proving Ground) of Seoul National University Siheung Campus using the MMS(Mobile Mapping System) surveying results given by the National Geographic Information Institute. In future research, the built-in precise road map service will be installed in the autonomous vehicles and control systems to verify the real-time locations and its location correction algorithm.

The Design of IoT Device System for Disaster Prevention using Sound Source Detection and Location Estimation Algorithm (음원탐지 및 위치 추정 알고리즘을 이용한 방재용 IoT 디바이스 시스템 설계)

  • Ghil, Min-Sik;Kwak, Dong-Kurl
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.53-59
    • /
    • 2020
  • This paper relates to an IoT device system that detects sound source and estimates the sound source location. More specifically, it is a system using a sound source direction detection device that can accurately detect the direction of a sound source by analyzing the difference of arrival time of a sound source signal collected from microphone sensors, and track the generation direction of a sound source using an IoT sensor. As a result of a performance test by generating a sound source, it was confirmed that it operates very accurately within 140dB of the acoustic detection area, within 1 second of response time, and within 1° of directional angle resolution. In the future, based on this design plan, we plan to commercialize it by improving the reliability by reflecting the artificial intelligence algorithm through big data analysis.

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.

End to End Model and Delay Performance for V2X in 5G (5G에서 V2X를 위한 End to End 모델 및 지연 성능 평가)

  • Bae, Kyoung Yul;Lee, Hong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.107-118
    • /
    • 2016
  • The advent of 5G mobile communications, which is expected in 2020, will provide many services such as Internet of Things (IoT) and vehicle-to-infra/vehicle/nomadic (V2X) communication. There are many requirements to realizing these services: reduced latency, high data rate and reliability, and real-time service. In particular, a high level of reliability and delay sensitivity with an increased data rate are very important for M2M, IoT, and Factory 4.0. Around the world, 5G standardization organizations have considered these services and grouped them to finally derive the technical requirements and service scenarios. The first scenario is broadcast services that use a high data rate for multiple cases of sporting events or emergencies. The second scenario is as support for e-Health, car reliability, etc.; the third scenario is related to VR games with delay sensitivity and real-time techniques. Recently, these groups have been forming agreements on the requirements for such scenarios and the target level. Various techniques are being studied to satisfy such requirements and are being discussed in the context of software-defined networking (SDN) as the next-generation network architecture. SDN is being used to standardize ONF and basically refers to a structure that separates signals for the control plane from the packets for the data plane. One of the best examples for low latency and high reliability is an intelligent traffic system (ITS) using V2X. Because a car passes a small cell of the 5G network very rapidly, the messages to be delivered in the event of an emergency have to be transported in a very short time. This is a typical example requiring high delay sensitivity. 5G has to support a high reliability and delay sensitivity requirements for V2X in the field of traffic control. For these reasons, V2X is a major application of critical delay. V2X (vehicle-to-infra/vehicle/nomadic) represents all types of communication methods applicable to road and vehicles. It refers to a connected or networked vehicle. V2X can be divided into three kinds of communications. First is the communication between a vehicle and infrastructure (vehicle-to-infrastructure; V2I). Second is the communication between a vehicle and another vehicle (vehicle-to-vehicle; V2V). Third is the communication between a vehicle and mobile equipment (vehicle-to-nomadic devices; V2N). This will be added in the future in various fields. Because the SDN structure is under consideration as the next-generation network architecture, the SDN architecture is significant. However, the centralized architecture of SDN can be considered as an unfavorable structure for delay-sensitive services because a centralized architecture is needed to communicate with many nodes and provide processing power. Therefore, in the case of emergency V2X communications, delay-related control functions require a tree supporting structure. For such a scenario, the architecture of the network processing the vehicle information is a major variable affecting delay. Because it is difficult to meet the desired level of delay sensitivity with a typical fully centralized SDN structure, research on the optimal size of an SDN for processing information is needed. This study examined the SDN architecture considering the V2X emergency delay requirements of a 5G network in the worst-case scenario and performed a system-level simulation on the speed of the car, radius, and cell tier to derive a range of cells for information transfer in SDN network. In the simulation, because 5G provides a sufficiently high data rate, the information for neighboring vehicle support to the car was assumed to be without errors. Furthermore, the 5G small cell was assumed to have a cell radius of 50-100 m, and the maximum speed of the vehicle was considered to be 30-200 km/h in order to examine the network architecture to minimize the delay.

Implementaion Mechanism of Homepage Failure Notification System in Public Sector in IDC Environment (IDC환경에서 공공부문 홈페이지 장애상황공지 시스템 구축방안)

  • Kim, Yong-Tae;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.426-433
    • /
    • 2021
  • Investment in public sector information services has been on the rise in recent years. The supply of high-speed Internet and smartphones has become more common, and the stability of the information system provided to the public in the public sector has become an important management factor. In other words, tasks such as handling civil complaints and issuing certificates by public institutions, financial transactions by banks, customs clearance work, and e-commerce by individuals or institutions are mostly done online. Therefore, how to deal with obstacles arising from the information system, which is in charge of important civil service affairs, is becoming a very important issue. In other words, in the case of a disability that does not function normally even for a short period of time, various problems can occur when the work is delayed, as well as causing serious financial damage to the civil petitioner. This could be accompanied by a decline in public confidence and various other damages such as filing civil complaints. The reasons for the occurrence of information system failures are very diverse and realistically difficult to predict when. Among the various measures to cope with disability, this paper proposed a plan to establish a disability situation notification system that can minimize confusion caused by disability in the event of a homepage malfunction. The proposed disability situation notification system was established in the public IDC environment to show the possibility of utilization.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF