• Title/Summary/Keyword: 모니터링 기법

Search Result 1,641, Processing Time 0.035 seconds

Developing algorithms for providing evacuation and detour route guidance under emergency conditions (재난.재해 시 대피 및 우회차량 경로 제공 알고리즘 개발)

  • Yang, Choong-Heon;Son, Young-Tae;Yang, In-Chul;Kim, Hyun-Myoung
    • International Journal of Highway Engineering
    • /
    • v.11 no.3
    • /
    • pp.129-139
    • /
    • 2009
  • The transportation network is a critical infrastructure in the event of natural and human caused disasters such as rainfall, snowfall, and terror and so on. Particularly, the transportation network in an urban area where a large number of population live is subject to be negatively affected from such events. Therefore, efficient traffic operation plans are required to assist rapid evacuation and effective detour of vehicles on the network as soon as possible. Recently, ubiquitous communication and sensor network technology is very useful to improve data collection and connection related emergency information. In this study, we develop a specific algorithm to provide evacuation route and detour information only for vehicles under emergency situations. Our algorithm is based on shortest path search technique and dynamic traffic assignment. We perform the case study to evaluate model performance applying hypothetical scenarios involved terror. Results show that the model successfully describe effective path for each vehicle under emergency situation.

  • PDF

Reflection Signal Analysis for Time Division Multiplexing of Fiber Optic FBG Sensors (광섬유 FBG 센서의 시간 분할 다중화를 위한 반사 신호의 분석)

  • Kim, Geun-Jin;Kwon, Il-Bum;Yoon, Dong-Jin;Hwang, Du-Sun;Chung, Young-Joo
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.30 no.1
    • /
    • pp.6-12
    • /
    • 2010
  • Fiber optic sensor using fiber Bragg grating(FBG) probes is used for monitoring strain and temperature distributed on the wide surfaces of large structures. In this paper, in order to use many FBG probes in one optical fiber line, we propose a complex multiplexing technology which is composed of two techniques, one is time division multiplexing and another is wavelength division multiplexing. However, we only investigate the characteristics of time division multiplexing because FBG sensors basically can be operated by wavelength division multiplexing. We calculate the optimal reflectivities and the lengthwise location of five FBG probes in serial connection in order to obtain the unique reflected intensities from the FBG probes. We fabricate five FBG probes with the reflectivities of 13%, 16%, 25%, 40% and 80%, which are determined by the theoretical calculation, and observe the signal reflected from each FBG in the time domain from the experiment. There are differences between experimental and theoretical results caused by the signal noise and the differences of reflectivities of FBG probes. But the experimental results shows the reflected signals of five FBG probes which prove the availability of complex multiplexing.

Evaluation of Coastal Urban Flood Warning Alarm Rule Using Real Hydrologic Monitoring Observation (실 수문관측을 통한 해안도시홍수 경보발령기준안 검정)

  • Shin, Hyun-Suk;Kang, Doo-Kee;Kim, Hong-Tae;Song, Young-Hyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.336-340
    • /
    • 2007
  • 국내 산업 및 기능적 측면에서 중추역할을 수행하고 있는 부산 울산 인천 등 전체 도시의 40%를 이루고 있는 해안도시들이 하천범람과 같은 홍수피해, 해일피해 등에 대한 체계적인 대비가 전무한 실정으로서 본 연구는 모형화 기법을 이용하여 해안도시홍수 경보발령 기준안을 도출하고 이를 실 수문관측 자료를 이용한 검정을 통해 경보발령 기준안의 문제점을 파악하여 그 개선방향을 제시하였다. 대상유역은 대표적 해안도시하천의 특성을 지니고 있는 부산시 온천천유역으로 강우-수위 관측 모니터링 시스템을 구축, 운영을 통해 10분 간격 강우 및 수위 자료를 구축하였으며, 수위 자료는 수위 유량 관계곡선을 이용하여 유량으로 환산하였다. 미계측 상태에서의 수리 수문 모형화를 통해 도출된 경보발령기준안에 대한 평가 및 문제점 도출을 위해 본 연구는 유역내 실시간 수문관측을 통해 얻은 강우 및 유출 특성 자료를 이용하였다. 대상 유역내 경보발령 지점인 세병교 지점의 20분 누가기준 경보발령 기준우량은 한계수위 $H_{c1},\;H_{c2},\;H_{c4}$인 경우 각각 4mm, 5mm, 6mm로서 20개월 동안 이러한 기준을 이용하여 관측된 강우사상 중 경보발령 기준안의 평가가 가능한 26개의 강우사상을 분류할 수 있었다. 그 결과 약 60%의 강우사상(case_1)이 성공한 경보발령 기준우량 임을 관측할 수 있었으며 이러한 발생강우에 대해 $20{\sim}150$분의 대피여유시간을 확보할 수 있었다. 그러나. 경보발령에 실패한 40%의 강우사상은 발생 강우의 총강우량이 대체적으로 적은 경우 및 지속기간 동안 경보발령기준에 준하는 강우를 발생하였으나 수위에 영향이 미비하여 한계수위에 도달하지 못한 경우(case_2), 20분 누가강우는 기준에 도달하지 않았으나 강우 지속시간이 길어 이미 선행강우로 인해 경보발령 이전에 한계수위를 넘어서는 경우(case_3)로서 분석되었다. 이러한 실패한 경보발령의 경우에 대한 원인분석 결과, 기존의 모형화를 통해 고려되지 못하였던 해안도시 홍수의 특성 중 총강우량에 대한 고려, 선행강우 여부 및 강우 지속시간, 지속시간 내 강우집중도 그리고 선정지점 내 조위의 영향과 유역내 합류식 하수관거 시스템의 영향 등 자연유역과는 다른 다소 복잡한 요소를 고려한 해안도시홍수 경보발령 기준에 대한 개선이 필요함을 확인할 수 있었다.

  • PDF

The Comparison of Water Budget and Nutrient Loading from Paddy Field According to the Irrigation Methods (관개방법에 따른 논에서의 수문 및 수질특성에 미치는 영향)

  • Jeon, Ji-Hong;Choi, Jin-Kyu;Yoon, Kwang-Sik;Yoon, Chun-Gyeong
    • Korean Journal of Ecology and Environment
    • /
    • v.38 no.1 s.110
    • /
    • pp.118-127
    • /
    • 2005
  • The comparison of water balance and nutrient loading from paddy field with different irrigation management were carried out during 1999 ${\sim}$ 2002 at two different sites; one is irrigated with groundwater and the other is irrigated with surface water. For the surface water irrigated paddy field, irrigation was performed continuously during growing season. Whereas, initial irrigation with groundwater was applied during initial growing season, and the ponded water depth was maintained by natural precipitation since initial irrigation. The runoff frequency of groundwater irrigated paddy field was less than that of surface water irrigated paddy field. The nutrient concentration of ponded water was high by fertilization at early cultural periods, so reducing surface drainage during fertilization period can reduce nutrient loading from paddy fields. Amount of irrigation water to surface water irrigated paddy field was higher than to groundwater irrigated paddy field and evapotranspiration was similar because it is influenced by climate. Overall input in and output from paddy field irrigated with goundwater were less than that with surface water. This study indicate that efficient water management can reduce surface drainage outflow, save water, and protect water quality. It might be important BMPs for paddy field.

Code Generation for Integrity Constraint Check in Objectivity/C++ (Objectivity/C++에서 무결성 제약조건 확인을 위한 코드 생성)

  • Kim, In-Tae;Kim, Gi-Chang;Yu, Sang-Bong;Cha, Sang-Gyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.416-425
    • /
    • 1999
  • 복잡한 무결성 제약 조건을 효율적으로 확인하기 위해 제약 조건들을 룰 베이스(rule base)에 저장하고 별도의 룰 관리 시스템과 제약 조건 관리 시스템을 통해 제약 조건을 확인하는 기법이 많은 연구자들에 의해 연구되고 발표되었다. 그러나 제약 조건 관리 시스템이 실행시간에 응용 프로그램을 항상 모니터링하고 있다가 데이타의 수정이 요청될 때마다 개입하여 프로세스를 중단시키고 관련 제약 조건을 확인하는 기존의 방법들은 처리 시간의 지연을 피할 수 없다. 본 논문은 컴파일 시간에 제약 조건 확인 코드를 응용 프로그램에 미리 삽입할 것을 제안한다. 응용 프로그램 자체 내에 제약 조건 확인 코드가 삽입되기 때문에 실행 시간에 다른 시스템의 제어를 받지 않고 직접 제약 조건의 확인 및 데이타베이스의 접근이 가능해져서 처리 시간의 지연을 피할 수 있을 것이다. 이를 위해 어떤 구문이 제약 조건의 확인을 유발하는 지를 추적하였고, 컴파일러가 그러한 구문을 어떻게 전처리 과정에서 검색하는지 그리고 그러한 구문마다 어떻게 해당 제약 조건 확인 코드를 삽입할 수 있는 지를 객체지향1) 데이타베이스 언어인 Objectivity/C++에 대해 gcc의 YACC 코드를 변경함으로써 보여 주었다.Abstract To cope with the complexity of handling integrity constraints, numerous researchers have suggested to use a rule-based system, where integrity constraints are expressed as rules and stored in a rule base. A rule manager and an integrity constraint manager cooperate to check the integrity constraints efficiently. In this approach, however, the integrity constraint manager has to monitor the activity of an application program constantly to catch any database operation. For each database operation, it has to check relevant rules with the help of the rule manager, resulting in considerable delays in database access. We propose to insert the constraints checking code in the application program directly at compile time. With constraints checking code inserted, the application program can check integrity constraints by itself without the intervention of the integrity constraint manager. We investigate what kind of statements require the checking of constraints, show how the compiler can detect those statements, and show how constraints checking code can be inserted into the program, by modifying the GCC YACC file for Objectivity/C++, an object-oriented database programming language.

Multiplexing of UHDTV Based on MPEG-2 TS (MPEG-2 TS 기반의 UHDTV 다중화)

  • Jang, Euy-Doc;Park, Dong-Il;Kim, Jae-Gon;Lee, Eung-Don;Cho, Suk-Hee;Choi, Jin-Soo
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.205-216
    • /
    • 2010
  • In this paper, a method of MPEG-2 Transport Stream (TS) multiplexing for Ultra HDTV (UHDTV) and its design and implementation as a SW tool is described. In practice, UHD video may be divided into several HD videos and each video is encoded in parallel. Therefore, it is necessary to synchronize and multiplex multiple bitstreams encoding each HD video for transmitting and storing UHD video. In this paper, it is assumed that 4 HD videos partitioning a UHD spatially are encoded as H.264/AVC and two 5.0 channel audios are encoded by AC-3. Therefore, 4 H.264/AVC elementary streams (ESs) and 2 AC-3 ESs is mainly considered in the TS multiplexing of UHD. For the carriage of H.264/AVC and AC-3 over MPEG-2 TS, PES packetization and TS multiplexing are designed and implemented based on the extended specification of the MPEG-2 Systems and ATSC (Digital audio compressed standard), respectively. The implemented UHD TS multiplexing tool emulates real time HW operation in the time unit corresponding to the duration of one TS packet transmission in a given TS rate. In particular, in order to satisfy the timing model, the buffers defined in the TS System Target Decoder (T-STD) are monitored and their statuses are considered in the scheduling of TS multiplexing. For UHD multiplexing, two kinds of multiplexing structures, which are UHD re-multiplexing and UHD program multiplexing, are implemented and their strength and weakness are investigated. The developed UHD TS multiplexing tool is tested and verified in terms of the syntax and semantics conformance and functionalities by using a commercial analyzer and real-time presentation tools.

Development of severity-adjusted length of stay in knee replacement surgery (무릎관절치환술 환자의 중증도 보정 재원일수 모형 개발)

  • Hong, Sung-Ok;Kim, Young-Teak;Choi, Youn-Hee;Park, Jong-Ho;Kang, Sung-Hong
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.215-225
    • /
    • 2015
  • This study was conducted to develop a severity-adjusted LOS(Length of Stay) model for knee replacement patients and identify factors that can influence the LOS by using the Korean National Hospital Discharge in-depth Injury Survey data. The comorbidity scoring systems and data-mining methods were used to design a severity-adjusted LOS model which covered 4,102 knee replacement patients. In this study, a decision tree model using CCS comorbidity scoring index was chosen for the final model that produced superior results. Factors such as presence of arthritis, patient sex and admission route etc. influenced patient length of stay. And there was a statistically significant difference between real LOS and adjusted LOS resulted from health-insurance type, bed size, and hospital location. Therefore the policy alternative on excessive medical utilization is needed to reduce variation in length of hospital stay in patients who undergo knee replacement.

A Landscape Ecological Model for Assessing the Korean Urban Forests (도시숲 평가를 위한 경관생태학적 모형 개발)

  • Oh, Jeong-Hak;Kwon, Jin-O;You, Ju-Han;Kim, Kyung-Tae
    • Korean Journal of Environment and Ecology
    • /
    • v.24 no.2
    • /
    • pp.178-185
    • /
    • 2010
  • The purpose of this study is to verify the effectiveness of the biotope model in applying and developing Korean urban forests. We found that there are 17 biotope assessment indicators, including forest layer structure, site conditions, ratio of broad-leaved trees, species richness, etc. In terms of correlation analysis between indicators, the stand ages and the period of space formation have the highest relativity(coefficient 0.684). On the other hand, indicators that have negative relativity are layer structure and risk, with a coefficient of -0.412. Ten models were developed for the multiple regression analysis. 10 variables(site conditions(X2), ratio of broad-leaved trees(X3) and so forth except layer structure(X1), species richness(X4)) were found to have a 95% significance level The results from comparing the regression model and adding-up estimation matrix, the most accurate one was Model 3, which has a 91.7% out of the 10 models. However more monitoring will be needed to improve the accuracy of models for the Korean urban forests in future.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Optimization of monitoring methods for air-borne bacteria in the environmental conditions of pig facilities (무균 돈사 환경 모니터링을 위한 대기 중 미생물 탐지기법 확립)

  • Lee, Deok-Yong;Seo, Yeon-Soo;Kang, Sang-Gyun;Yoo, Han Sang
    • Korean Journal of Veterinary Research
    • /
    • v.46 no.3
    • /
    • pp.255-261
    • /
    • 2006
  • Experimental animals have been used to biological and medical purposes and the animals must be, for these purposes, healthy and clean to microbial infection. However, the animals can be easily exposed to pathogenic microorganism via several routes. Of the routes, environmental conditions are the most important factors to keep the animals healthy and clean, especially air condition. Monitoring of air-condition has been required to keep the animal healthy and clean. However, any guideline is not available for experimental conditions with pigs. Therefore, the sampling times and points were compared in different conditions to establish an optimal protocol for monitoring of air borne bacteria. Tryptic soy agar(TSA), blood agar containing 5% defibrinated sheep blood and Sabraud dextrose agar(SDA) were used as media to capture total bacteria, pathogenic bacteria and fungi, respectively. Two methods, compulsive capture using an air-sampler and capturing fall-down bacteria were used to capture the microorganisms in the air. The points and time of capturing were different at each experiment. Air borne microorganisms were captured at three and five points in the open and closed equipments, respectively. Air was collected using an air-sampler for 1 min and 5 min and the agar plates as open status were left from 30 min to 2hr. At first, we monitored an experimental laboratory which dealt with several pathogenic bacteria and then, a protocol obtained from the investigation was applied to open or close experimental conditions with pigs. Number of bacteria was high from 10:00 to 15:00, especially on 13:30-15:30 but sharply decreased after 17:00. The tendency of the number of bacteria was similar between two methods even though the absolute number was higher with air sampler. Critical difference in the number of cells was observed at 5 min with air sampler and 2 hr with fall-down capturing method. However, 1 min with air sampler and 1 hr with fall-down capturing were the best condition to identify bacterial species collected from the air. Number of bacteria were different depending on the sampling points in closed condition but not in opened condition. Based on our results, a guide-line was suggested for screening air-borne microorganism in the experimental conditions with pigs.