• Title/Summary/Keyword: 관제정보의 활용

Search Result 280, Processing Time 0.023 seconds

Transponder and Ground Station Systems for Drones

  • Kim, Ki-Su;Ha, Heon-Seong;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.9-15
    • /
    • 2020
  • In this paper, we propose a case that drone (unmanned aerial vehicle), one of the representative technologies of the 4th Industrial Revolution, threatens airport safety and privacy infringement, and describes a drone control system proposal to solve the problem. Unmanned aerial vehicle (Drone) is creating a serious problem recently, In Korea, on May 21, 19, according to the Jeju Regional Aviation Administration, drones flew over Jeju Jeongseok Airfield twice in the same month, causing problems in aircraft operation. In overseas cases, two drones near the runway of Gatwick International Airport in the UK There has been a disturbance in which the takeoff and landing of the aircraft flies for a while, and various problems have occurred, such as voyeuring the private life of an individual using a drone. This paper is equipped with an Acess Point transponder mounted on a drone (unmanned aerial vehicle), and unspecified many who want to receive flight information (coordinates, altitude, and obstacles) of the drone access the drone AP, receive and receive the flight information of the drone, and receive unspecified multiple Drone AP flight information is collected and collected to provide the information of the drone currently floating on one user interface screen. In addition, an AP transponder is proposed to operate a safe drone (unmanned aerial vehicle) and the drone's flight information is transmitted., To receive and collect and collect data.

Height Determination Using Vanishing Points of a Single Camera for Monitoring of Construction Site (건설현장 모니터링을 위한 단안 카메라 기반의 소실점을 이용한 높이 결정)

  • Choi, In-Ha;So, Hyeong-Yoon;Kim, Eui-Myoung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.51 no.2
    • /
    • pp.73-82
    • /
    • 2021
  • According to the government's announcement of the safety management enhancement policy for small and medium-sized private construction sites, the subject of mandatory CCTV installation has been expanded from large construction sites to small and medium-sized construction sites. However, since the existing CCTV at construction sites has been used for simple control for safety management, so research is needed for monitoring of construction sites. Therefore, in this study, three vanishing points were calculated based on a single image taken with a monocular camera, and then a camera matrix containing interior orientation parameters information was determined. And the accuracy was verified by calculating the height of the target object from the height of the reference object. Through height determination experiments using vanishing points based on a monocular camera, it was possible to determine the height of target objects only with a single image without separately surveying of ground control points. As a result of the accuracy evaluation, the root mean square error was ±0.161m. Therefore, it is determined that the progress of construction work at the construction sites can be monitored through the single image taken using the single camera.

Analysis on Orbital Dynamics Operation Results of KOMPSAT-3 during Early Phase after Launch (다목적실용위성 3호 발사 후 초기 궤도 운영결과 분석)

  • Jung, Ok-Chul;Yim, Hyeonjeong;Chung, Dae-Won;Kim, Eun-Kyou;Kim, Hak-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.4
    • /
    • pp.319-326
    • /
    • 2013
  • This paper describes the orbital dynamics operation results for the launch and early operations phase (LEOP) of KOMPSAT-3, which was successfully launched on May 18, 2012. At the initial phase, operational orbit determination was carried out using ground tracking data and GPS navigation solution. And, both in-plane and out-of plane maneuvers were executed in order to change the orbit from the injection orbit to the mission orbit. In addition, the accuracy of precise orbit determination was indirectly evaluated by overlapping method using GPS raw data of KOMPSAT-3 and international GNSS service data from worldwide-distributed ground stations. Currently, KOMPSAT-3 is operated in pre-defined mission orbit, and its various kinds of orbit data are generated and distributed to support the normal mission operations.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Design of Deep Learning-Based Automatic Drone Landing Technique Using Google Maps API (구글 맵 API를 이용한 딥러닝 기반의 드론 자동 착륙 기법 설계)

  • Lee, Ji-Eun;Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.18 no.1
    • /
    • pp.79-85
    • /
    • 2020
  • Recently, the RPAS(Remote Piloted Aircraft System), by remote control and autonomous navigation, has been increasing in interest and utilization in various industries and public organizations along with delivery drones, fire drones, ambulances, agricultural drones, and others. The problems of the stability of unmanned drones, which can be self-controlled, are also the biggest challenge to be solved along the development of the drone industry. drones should be able to fly in the specified path the autonomous flight control system sets, and perform automatically an accurate landing at the destination. This study proposes a technique to check arrival by landing point images and control landing at the correct point, compensating for errors in location data of the drone sensors and GPS. Receiving from the Google Map API and learning from the destination video, taking images of the landing point with a drone equipped with a NAVIO2 and Raspberry Pi, camera, sending them to the server, adjusting the location of the drone in line with threshold, Drones can automatically land at the landing point.

Analysis of Operational Issues for ICT-based On-Board Train Control System (ICT 기반 차상제어시스템 개발에 따른 운영 이슈 분석)

  • Kim, Young-Hoon;Choi, Won-Suk
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.6
    • /
    • pp.575-583
    • /
    • 2011
  • In order to minimize the maintenance cost at local lines, Information & Communication Technology based onboard train control system is being developed. Unlike the central traffic control based fixed block system, this system use a moving block method and railway driver direct control switch and railway crossing. The purpose of this paper is to analyze the concerned main operational issues are as follows: the preparation of train operation, drivability, the role of driver and controller, block system and cost. We defined the role of driver and driver's input data for train service, and we designed the business process of driver using UML tool. We considered the aspect of drivability, DMI is needed to support the braking moment for the driver and driver training simulator. We designed the driver business process for control of switch and railway crossing. We analyzed the fixed block system and moving block system to confirm the difference with the existing operational method. The cost analysis structure is also needed for the operation cost comparison.

A Study on the Development of Convergence Security with the Changes in Security Environments (시큐리티 환경변화에 따른 융합보안의 대두와 물리보안업체의 대응)

  • Ahn, Hwang-Kwon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.31-40
    • /
    • 2011
  • As new technologies emerge and threats become increasingly complex and unpredictable, security professionals who are living in the age of information face an increasingly complex array of challenges. In recent, virtually all organizations with physical and IT assets protect those assets in a variety of methods. There are physical systems to protect facilities and their contents from unlawful trespassing. It is important to note that the integration of physical and IT security is to be required: When done correctly, the integration starts with laws, strategies, policies and procedures. Integration of physical and IT security systems is done not for its own sake but in support of security policies and procedures. Significant security improvements can be made by integrating physical and IT security management without necessarily integrating physical and logical electronic security systems. Up to now, the private security industries of the Republic of Korea have been operated and developed by the separation of physical security and industrial security. However, considering the fast changing security environments, physical security companies should turn their attention to security convergence field to cope with the new trends in the security matters. At the same time, governmental supports on the improvement of various laws, regulations and policies in such a way to meet the realistic needs of the industries should be followed.

Designing a FRBR Work Grouping Algorithm of Bibliographic Records using a Role Term Dictionary of Authors (저자역할용어사전 구축 및 저작군집화에 관한 연구)

  • Yun, Jaehyuk;Do, Seulki;Oh, Sam G.
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.2
    • /
    • pp.197-223
    • /
    • 2020
  • The purpose of this study is to analyze the issues resulted from the process of grouping KORMARC records using FRBR WORK concept and to suggest a new method. The previous studies did not sufficiently address the criteria or processes for identifying representative authors of records and their derivatives. Therefore, our study focused on devising a method of identifying the representative author when there are multiple contributors in a work. The study developed a method of identifying representative authors using an author role dictionary constructed by extracting role-terms from the statement of responsibility field (245). We also designed another way to group records as a work by calculating similarity measures of authors and titles. The accuracy rate of WORK grouping was the highest when blank spaces, parentheses, and controling processes were removed from titles and the measured similarity rates of authors and titles were higher than 80 percent. This was an experiment study where we developed an author-role dictionary that can be utilized in selecting a representative author and measured the similarity rate of authors and titles in order to achieve effective WORK grouping of KORMARC records. The future study will attempt to devise a way to improve the similarity measure of titles, incorporate FRBR Group 1 entities such as expression, manifestation and item data into the algorithm, and a method of improving the algorithm by utilizing other forms of MARC data that are widely used in Korea.

Demonstration of Disaster Information and Evacuation Support Model for the Safety Vulnerable Groups (안전취약계층을 위한 재난정보 및 대피지원 모델 실증)

  • Son, Min Ho;Kweon, Il Ryong;Jung, Tae Ho;Lee, Han Jun
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.465-486
    • /
    • 2021
  • Purpose: Since most disaster information systems are centered on non-disabled people, the reality is that there is a lack of disaster information delivery systems for the vulnerable, such as the disabled, the elderly, and children, who are relatively vulnerable to disasters. The purpose of the service is to improve the safety of the disabled and the elderly by eliminating blind spots of informatization and establishing customized disaster information services to respond to disasters through IoT-based integrated control technology. Method: The model at the core of this study is the disaster alert propagation model and evacuation support model, and it shall be developed by reflecting the behavioral characteristics of the disabled and the elderly in the event of a disaster. The disaster alert propagation model spreads disaster situations collected using IoT technology, and the evacuation support model uses geomagnetic field-based measuring technology to identify the user's indoor location and help the disabled and the elderly evacuate safely. Results: Demonstration model demonstration resulted in an efficient qualitative evaluation of indoor location accuracy, such as the suitability of evacuation route guidance and satisfaction of services from the user's perspective. Conclusion: Disaster information and evacuation support services were established for the safety vulnerable groups of mobile app for model verification. The disaster situation was demonstrated through experts in the related fields and the disabled by limiting it to the fire situation. It was evaluated as "satisfaction" in the adequacy of disaster information delivery and evacuation support, and its functional satisfaction and user UI were evaluated as "normal" due to the nature of the pilot model. Through this, the disaster information and evacuation support services presented in this study were evaluated to support the safety vulnerable groups to a faster disaster evacuation without missing the golden time of disaster evacuation.

Development of Video Watermark System for Low-specification System as Android Platforms (저 사양 안드로이드 기반 동영상 보안을 위한 워터마크 시스템 개발)

  • Hwang, Seon-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.141-149
    • /
    • 2014
  • This paper describes a method to insert and detect watermark or fingerprint to/from videos in low-computing powered system as Android platforms. Fingerprint, which is a kind of watermark, has features such as patterns that contain information. The inserting frame numbers in video-stream and the positions in a picture were chosen from the encrypted user ID to insert the watermarks. The used encrypt algorithm is the HIGHT algorithm which was developed for low-computing powered systems by KISA(Korean Internet & Security Agency). Subtracting an inferred picture from the previous picture was used to extract a candidate feature. Median filtering was used to get rid of noise and stabilize the candidate feature. New algorithm that reduces calculating steps of the median filtering was developed and applied for low-specification systems. The stabilized features were accumulated over 150 times and calculated by correlation coefficient method to recognize the patterns. We examined 22 videos and successfully detected the patterns from 21 videos. The correlation coefficient r values that we examined through this study exceeded over 0.79 more than the threshold (0.7).