• Title/Summary/Keyword: 스마트카드데이터

Search Result 113, Processing Time 0.033 seconds

Building an Energy Saving System using IoT (IoT를 활용한 에너지절약 시스템 구축)

  • Lee, Su-Jin;Lim, Sang-Hyeon;Choi, Yun-A;Yoo, Sang-Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.1075-1078
    • /
    • 2021
  • 우리나라의 1인당 전력 소비량이 가파르게 증가하고 있으며 이에 따른 에너지 절약의 필요성이 대두되고 있다. 본 논문은 IoT 기술을 활용하여 더욱 간단하고 효율적인 저비용 에너지 절약 시스템을 제안한다. 실시간 모니터링과 센서 데이터를 기반으로 한 에너지 절약 시나리오 제공이 큰 특징이다. 구현한 시스템은 전력 사용량 peak 값과 전체적인 편차가 줄어드는 결과를 가져왔다. 더 나아가 가정뿐만 아니라 더 넓은 범위에 적용 가능할 것으로 기대된다.

Smart CCTV Artificial Intelligence Self-driving Security Service (스마트 CCTV 인공지능 자율주행 방범 서비스)

  • Kim, Jun-Hyeong;Kim, A-Young;Kim, Ye-Bin;Lee, Dong-Yeop;Lee, Ji-Hyeon;Yoo, Sang-Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.1071-1074
    • /
    • 2021
  • 본 논문은 펌웨어와 인공지능을 이용하여 지형의 사각지대를 이동하며 순찰 및 방범의 목적을 지닌 시스템을 소개하기 위함에 있다. 기존의 보안 시스템은 비상 상황 발생 시 인력이 직접 출동하여 상황을 해결함으로써 날로 증가하는 최저임금을 고려했을 때 이들의 인건비를 감당하기 어렵다는 단점이 있다. [1] 이러한 문제점을 해결하기 위해 앱 개발을 통해 RC카를 제어하는 아두이노와 연결하여 자율주행을 하게끔 하는 시스템을 개발했다. 또한, 라즈베리파이 웹캠을 부착해 실시간으로 현장을 촬영하여 사용자가 웹에만 접속하면 현장을 모두 감시할 수 있도록 시스템을 개발하였고, 단시간 푸리에 변환(STFT)을 통해 얻은 음성 데이터 변환맵을 인공지능 프로세서인 인텔리노에 학습 데이터로 학습시킨 후에 주변 환경에서 비명 소리만 감지할 수 있도록 시스템을 구현하였다. 본 논문에서는 이러한 시스템들이 기존의 인건비 증가에 대한 문제점을 해소할 수 있다고 생각하여 더욱 효율적으로 방범이 가능한 시스템을 소개한다.

A Study on the Effects of Urban Public Transportation Retrofitting for Sustainability (지속가능성을 위한 도시 대중교통 레트로핏(Retrofitting) 효과분석)

  • KIM, Seunghyun;NA, Sungyoung;KIM, Jooyoung;LEE, Seungjae
    • Journal of Korean Society of Transportation
    • /
    • v.36 no.1
    • /
    • pp.23-37
    • /
    • 2018
  • In recent years, it is very difficult to construct and expand new infrastructures in a city center because of long-term low growth and lack of space due to urban overcrowding. So, there is a need to study a variety of Retrofitting techniques and urban applications that can lead to sustainable development while efficiently utilizing existing facilities. 'Retrofit' means a sustainable urban retrofitting as a directed alteration of the structures, formations and systems of existing facilities to improve energy, water and waste efficiencies. In this study, we applied a hierarchical network design technique that can reflect the structural hierarchy of a city to study how to retrofit public transportation routes in Seoul. The hierarchical network design means dividing the hierarchy according to the functions of hubs and connecting different hierarchies to form a hierarchical network. As a result of comparing the application results of various retrofitting scenarios of public transport, the differences of daily PKT and PHT by about 2.6~3.2% less than before the improvement address that the convenience of passengers is increased. Therefore, it is expected that if the route planning is established according to the proposed method, it will increase the number of passengers and the operational efficiency by the improved convenience of public transit passengers.

Fabrication of smart alarm service system using a tiny flame detection sensor based on a Raspberry Pi (라즈베리파이 기반 미소 불꽃 감지를 이용한 스마트 경보 서비스 시스템 구현)

  • Lee, Young-Min;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.9
    • /
    • pp.953-958
    • /
    • 2015
  • Raspberry Pi is a credit card-sized computer with support for a large number of input and output peripherals. This makes it the perfect platform for interaction with many different devices and for usage in a wide range of applications. When combined with Wi-Fi, it can communicate remotely, therefore increasing its suitability for the construction of wireless sensor nodes. In addition, data processing and decision-making can be based on artificial intelligence, what is performed in developed testbed on the example of monitoring and determining the confidence of fire. In this paper, we demonstrated the usage of Raspberry Pi as a sensor web node for fire-safety monitoring in a building. When the UV-flame sensors detect a flame as thin as that of a candle, the Raspberry Pi sends a push-message to notify the assigned smartphone of the on-site situation through the GCM server. A mobile app was developed to provide a real-time video streaming service in order to determine a false alarm. If an emergency occurs, one can immediately call for help.

A Study about Measurement Method for Quantitative Classification of Breeding Pig's Locomotor Behaviors using Ultrasonic Sensor Array (초음파 센서 어레이를 이용한 모돈 지제이상 정량분석 방법 연구)

  • Cho, Jinho;Oh, Jong-woo;Lee, DongHoon
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 2017.04a
    • /
    • pp.163-163
    • /
    • 2017
  • 모돈은 교배, 임신, 분만, 포유, 이유를 순환적 반복을 요구하는 개체로서 스마트 농장 시스템의 생산성 향상에 있어서 중요한 요소이다. 본 연구에서는 모돈 능력의 극대화 및 최적의 시스템 관리를 위해서 초음파 센서를 활용한 모돈의 지제 이상 징후를 실시간으로 계측할 수 있는 시스템을 개발하였다. 이 시스템은 높이에 따라 상-중-하(30 cm 간격), 위치에 따라 전면부-후면부에 초음파 센서를 설치하고 이를 마이크로 컨트롤러에 연결하여 모돈의 지제 이상 유무 측정이 가능하도록 하였다. 모돈의 체형과 위치를 고려하여 설치된 초음파 센서의 위치 조절이 가능하도록 하였다. 또한 소형 LCD 모듈을 내장하여 실시간 모니터링이 가능하도록 하였으며, 측정된 데이터는 저장장치인 microSD 카드에 저장되도록 하였다. 모돈사의 환경을 고려하여 방밀형 구조로 하우징 마감하였다. 이 모돈 지체 이상 분석 시스템에 사용된 툴은 C언어를 이용하였다. 건강한 모돈을 대상으로 모돈의 지제의 관찰을 위하여 총 12회의 현장 실증실험이 수행되었으며, 현장 실증 시험 중 소요된 시간은 현장의 상황에 따라 다소 상이하였다 (8시간-28일). 높이 상에 위치한 전면부 및 후면부 초음파 센서 모두에서 모돈이 검출이 된 경우 정상 기립으로 간주하였고, 높이 상에 위치한 전면-후면부 초음파 센서 모두에서 모돈이 검출이 되지 않은 경우 정상적으로 누워 있는 걸로 간주하였다. 높이 하에 위치한 전면부 혹은 후면부 초음파 센서 한곳만 모돈이 검출된 경우 비정상적인 기립으로 간주하였다. 취득된 데이터를 분석한 결과 모돈의 정상적 상태 (기립상태, 누운 상태, 앉은 상태)와 그 외의 비정상적 상태로 분류가 가능하다. 또한 측정된 초음파 센서의 진동의 유무 및 파동형태에 따라서 모돈의 상태 예측이 가능하다. 초음파 센서의 진동 파동이 크고 안정된 상태인 경우 정상적인 활동 상태로 판단하였으며, 진동 파동이 작고 안정적인 경우는 수면 상태로 분류하였다. 실시간으로 지속적인 데이터 획득을 위하여 차후 초음파 센서 및 시스템의 보완작업이 필요하다. 이와같은 모돈의 행동 패턴에 따른 취득된 데이터를 분류하여 모돈의 발정에 의한 행동 특성(기립시간) 분석에 따른 발정 적기 발견 및 정량화 기술 개발에 활용이 가능하다.

  • PDF

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

An Investigation of Rider Behavior to Transfer Seoul Metropolitan Transit Using Public Transport Card Data (교통카드 데이터를 이용한 수도권 광역급행철도 환승행태에 관한 연구)

  • Gun ki Jung;Dong min Lee;Sun hoon Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.146-164
    • /
    • 2022
  • Recently, the Korean government promoted the construction of metropolitan express subway to connect major transportation hub in the metropolitan area within 30 minutes. Most stations of the metropolitan express subway are connected to existing subway stations, so the importance of transfer increased. Although many studies have been conducted on the effect of transfer penalty on route choice, there are few studies on the transfer behavior of the metropolitan express subway. Therefore, in this study, a transfer behavior analysis was conducted on the Shinbundang Line, a representative metropolitan express subway. To analyze the transfer behavior according to the degree of traffic congestion and the presence of fare payment, route choice models were made using transport card data divided according to week, time, and user characteristics. As a result of the analysis, users of the metropolitan express subway had greater disutility to the transfer waiting time compared to the transfer moving time. Furthermore, especially during the peak time, EIVM(Equivalent in-vehicle minutes) of the transfer waiting time was 3.51. In this study, EIVM for metropolitan express subway users were analyzed to be 2.6 minutes, which is significantly lower than the results of previous studies on subways. This suggests that there is a difference in the transfer penalty between subways and metropolitan express subway, and that it is necessary to apply the transfer penalty between subways and express subway differently when forecasting subway traffic demand.

Determination of Service Areas and Operating Numbers for Free-floating Personal Mobility Sharing Services (First-mile과 Last-mile을 고려한 자유 주차방식(Free-floating) 개인형 이동장치 공유 서비스 권역 및 운영대수 결정)

  • Sang-Wook Han;Dong-Kyu Kim;Sedong Moon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.106-118
    • /
    • 2024
  • Interest in personal mobility has increased with the growing significance of first-mile and last-mile connectivity in smart mobility services. This study aims to propose a methodology for setting the service area of free-floating personal mobility sharing services and determining the optimal fleet size for the selected shared service area to address first-mile and last-mile challenges. We utilize population data, smart card data, and building data. Additionally, we estimate latent demand by incorporating age-specific and distance-specific utilization rates based on personal mobility device data. Along with the latent demand, we determine the service area based on locations of transit stops and buildings. We apply the proposed methodology to Yeongjong Island, Incheon. As a result, dense residential areas and popular beachside locations are designated as personal mobility sharing service areas. The fleet size for personal mobility in the dense residential service area is determined to be 1,022 units, while the fleet size for the beachside service area is set at 269 units.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

A Measurement of Passengers' Walking Speed on Passenger Ship(II) (연안여객선 일반 승선자의 보행속도 실측(II) -비숙련 일반인을 대상으로 한 실험-)

  • Hwang, Kwang-Il;Son, Byeung-Hun;Na, Wook-Jung;Ahn, Chang-Hwan;Hong, Won-Hwa;Lee, Soo-Ho;Koo, Jae-Hyeok;Jeon, Byeong-Cheong
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2012.06a
    • /
    • pp.206-207
    • /
    • 2012
  • We need to develop intelligent smart card made unskilled general public's to the shelter on Passenger Ship. prior to development, we have to study passenger of characteristic. so we researched about domestic unskilled general public's of walking speed in refuge situation.

  • PDF