• Title/Summary/Keyword: 실시간 감시 시스템

Search Result 912, Processing Time 0.025 seconds

Introduction of Satellite Remote Sensing Technologies to Korea Coast Guard (해양경찰청 위성활용 방안)

  • Yang, Chan-Su;Oh, Jeong-Hwan
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2011.11a
    • /
    • pp.154-155
    • /
    • 2011
  • 2010년 천리안위성의 성공적인 발사에 따라 인공위성의 활용에 대한 기대가 커지고 있다. 천리안 해양관측위성(GOCI)이외에 아리랑 2호가 현재 운용중인 우리나라 위성들이다. 가까운 시기에 아리랑 5호(2011년 말), 아리랑 3호(2012년), 아리랑 3A호(2013년)가 발사될 예정이다. 즉, 해양적용을 위한 위성환경은 이제부터 준비되고 있다고 볼 수 있다. 대외적으로 보면, 인공위성 자원은 아주 많다. 문제는 이와 같은 자원을 어떻게 활용할 것인가 인데 이의 활용 기술 개발적 측면에서는 많이 소홀한 것이 사실이다. 전세계적으로 이 시스템 개발을 위한 치열한 경쟁이 진행 중에 있다. 이미 소말리아 주변 감시체계는 많은 부분을 위성에 의지하고 있다. 우리나라에서 최초로 위성활용 가능성을 보여준 사건이 허베이스피리트호 원유유출 사고이다. 이 사고는 2007년 12월7일 아침 7시6분경 서해안 만리포 북서쪽 10km 해상에서 크레인을 적재한 1만1800t급 바지선이 정박 중인 홍콩 선적 유조선 허베이 스피리트호(14만6000t급)와 부딪치면서 발생했다. 이와 같은 기름 유출 사고의 경우, 유출 범위를 정확하게 이해하는 것이 중요하다. 거의 준비된 상태가 아님에도 불구하고 12월 8일 아침 최초로 유출된 기름을 모습을 보여주는 위성이미지(광학위성)가 얻어졌다. 하지만 이와 같은 자료가 관련 전문가가 이용할 수 있기까지 많은 시간이 소용되었고, 이 정보를 전달할 수 있는 방법도 없었다. 사실 단순한 이미지가 아니라 지리정보체계를 가진 오염정보를 제공할 방법도 준비도 되어 있지 못한 상황이었다. 본 발표를 통하여, 허베이스피리트호 사고뿐만 아니라, 2011년 6월부터 수개월간 지속된 발해만 오염사고 적용 등 다양한 사례 소개를 하고, 이를 기반으로 해양경찰청에서 업무활용을 위한 방안을 제시한다. 먼저, 해경청의 주요 임무인, 경비, 수색구조, 오염대응 분야별로 현황 분석을 수행하였다. 또한 국외사례에 대한 조사를 한 후, 최종 인공위성 원격탐사기술의 해경청 도입방안에 대한 설계를 실시하였다. 국제적으로 인공위성을 이용한 해양 경비, 수색구조, 오염 모니터링기술 개발이 이루어지고 있으며, 유럽 국가는 시범도입을 진행 중에 있다. 유럽해사안전국(EMSA)은 해양경비 및 수색구조를 위한 선박통항 및 보고 서비스와 오염대비대응(Pollution Preparedness and Response, PPR) 위성 서비스를 회원국에 제공하고 있다. 해양경찰청 임무 수행뿐만 아니라, 해양영토 관리적 측면에서 첨단 위성장비 활용, 선진국형 해상경비 패러다임의 전환 필요성이 크다고 할 수 있다.

  • PDF

Design of FPGA Camera Module with AVB based Multi-viewer for Bus-safety (AVB 기반의 버스안전용 멀티뷰어의 FPGA 카메라모듈 설계)

  • Kim, Dong-jin;Shin, Wan-soo;Park, Jong-bae;Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.11-17
    • /
    • 2016
  • In this paper, we proposed a multi-viewer system with multiple HD cameras based AVB(Audio Video Bridge) ethernet cable using IP networking, and FPGA(Xilinx Zynq 702) for bus safety systems. This AVB (IEEE802.1BA) system can be designed for the low latency based on FPGA, and transmit real-time with HD video and audio signals in a vehicle network. The proposed multi-viewer platform can multiplex H.264 video signals from 4 wide-angle HD cameras with existed ethernet 1Gbps. and 2-wire 100Mbps cables. The design of Zynq 702 based low latency to H.264 AVC CODEC was proposed for the minimization of time-delay in the HD video transmission of car area network, too. And the performance of PSNR(Peak Signal-to-noise-ratio) was analyzed with the reference model JM for encoding and decoding results in H.264 AVC CODEC. These PSNR values can be confirmed according the theoretical and HW result from the signal of H.264 AVC CODEC based on Zynq 702 the multi-viewer with multiple cameras. As a result, proposed AVB multi-viewer platform with multiple cameras can be used for the surveillance of audio and video around a bus for the safety due to the low latency of H.264 AVC CODEC design.

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Study on Improvement of Target Tracking Performance for RASIT(RAdar of Surveillance for Intermediate Terrain) Using Active Kalman filter (능동형 Kalman filter를 이용한 지상감시레이더의 표적탐지능력 향상에 관한 연구)

  • Myung, Sun-Yang;Chun, Soon-Yong
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.3
    • /
    • pp.52-58
    • /
    • 2009
  • If a moving target has a linear characteristics, the Kalman filter can estimate relatively accurate the location of a target, but this performance depends on how the dynamic status characteristics of the target is accurately modeled. In many practical problems of tracking a maneuvering target, a simple kinematic model can fairly accurately describe the target dynamics for a wide class of maneuvers. However, since the target can exhibit a wide range of dynamic characteristics, no fixed SKF(Simple Kalman filter) can be matched to estimate, to the required accuracy, the states of the target for every specific maneuver. In this paper, a new AKF(Active Kalman filter) is proposed to solve this problem The process noise covariance level of the Kalman filter is adjusted at each time step according to the study result which uses the neural network algorithm. It is demonstrated by means of a computer simulation that the tracking capability of the proposed AKF(Active Kalman filter) is better than that of the SKF(Simple Kalman Filter).

Human Tracking Technology using Convolutional Neural Network in Visual Surveillance (서베일런스에서 회선 신경망 기술을 이용한 사람 추적 기법)

  • Kang, Sung-Kwan;Chun, Sang-Hun
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.173-181
    • /
    • 2017
  • In this paper, we have studied tracking as a training stage of considering the position and the scale of a person given its previous position, scale, as well as next and forward image fraction. Unlike other learning methods, CNN is thereby learning combines both time and spatial features from the image for the two consecutive frames. We introduce multiple path ways in CNN to better fuse local and global information. A creative shift-variant CNN architecture is designed so as to alleviate the drift problem when the distracting objects are similar to the target in cluttered environment. Furthermore, we employ CNNs to estimate the scale through the accurate localization of some key points. These techniques are object-independent so that the proposed method can be applied to track other types of object. The capability of the tracker of handling complex situations is demonstrated in many testing sequences. The accuracy of the SVM classifier using the features learnt by the CNN is equivalent to the accuracy of the CNN. This fact confirms the importance of automatically optimized features. However, the computation time for the classification of a person using the convolutional neural network classifier is less than approximately 1/40 of the SVM computation time, regardless of the type of the used features.

Implementation of Video-Forensic System for Extraction of Violent Scene in Elevator (엘리베이터 내의 폭행 추출을 위한 영상포렌식 시스템 구현)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2427-2432
    • /
    • 2014
  • Color-$X^2$ is used as a method for scene change detection. It extracts a violent scene in an elevator and then could be used for real-time surveillance of criminal acts. The scene could be also used to secure after-discovered evidences and to prove analysis processes. Video Forensic is defined as a research on various methods to efficiently analyze evidences upon crime-related visual images in the field of digital forensic. The method to use differences of color-histogram detects the difference values of histogram for RGB color from two frames respectively. Our paper uses Color-$X^2$ histogram that is composed of merits of color histogram and ones of $X^2$ histogram, in order to efficiently extract violent scenes in elevator. Also, we use a threshold so as to find out key frame, by use of existing Color-$X^2$ histogram. To increase the probability that discerns whether a real violent scene or not, we take advantage of statistical judgments with 20 sample visual images.

Crop Monitoring Technique Using Spectral Reflectance Sensor Data and Standard Growth Information (지상 고정형 작물 원격탐사 센서 자료와 표준 생육정보를 융합한 작물 모니터링 기법)

  • Kim, Hyunki;Moon, Hyun-Dong;Ryu, Jae-Hyun;Kwon, Dong-Won;Baek, Jae-Kyeong;Seo, Myung-Chul;Cho, Jaeil
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_1
    • /
    • pp.1199-1206
    • /
    • 2021
  • Accordingly, attention is also being paid to the agricultural use of remote sensing technique that non-destructively and continuously detects the growth and physiological status of crops. However, when remote sensing techniques are used for crop monitoring, it is possible to continuously monitor the abnormality of crops in real time. For this, standard growth information of crops is required and relative growth considering the cultivation environment must be identified. With the relationship between GDD (Growing Degree Days), which is the cumulative temperature related to crop growth obtained from ideal cultivation management, and the vegetation index as standard growth information, compared with the vegetation index observed with the spectralreflectance sensor(SRSNDVI & SRSPRI) in each rice paddy treated with standard cultivation management and non-fertilized, it was quantitatively identified as a time series. In the future, it is necessary to accumulate a database targeting various climatic conditions and varieties in the standard cultivation management area to establish a more reliable standard growth information.

Characteristic Analysis of Wireless Channels to Construct Wireless Network Environment in Underground Utility Tunnels (지하공동구 내 무선 네트워크 환경구축을 위한 무선채널 특성 분석)

  • Byung-Jin Lee;Woo-Sug Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.27-34
    • /
    • 2024
  • The direct and indirect damages caused by fires in underground utility tunnels have a great impact on society as a whole, so efforts are needed to prevent and manage them in advance. To this end, research is ongoing to prevent disasters such as fire flooding by applying digital twin technology to underground utility tunnels. A network is required to transmit the sensed signals from each sensor to the platform. In essence, it is necessary to analyze the application of wireless networks in the underground utility tunnel environments because the tunnel lacks the reception range of external wireless communication systems. Within the underground utility tunnels, electromagnetic interference caused by transmission and distribution cables, and diffuse reflection of signals from internal structures, obstacles, and metallic pipes such as water pipes can cause distortion or size reduction of wireless signals. To ensure real-time connectivity for remote surveillance and monitoring tasks through sensing, it is necessary to measure and analyze the wireless coverage in underground utility tunnels. Therefore, in order to build a wireless network environment in the underground utility tunnels. this study minimized the shaded area and measured the actual cavity environment so that there is no problem in connecting to the wireless environment inside the underground utility tunnels. We analyzed the data transmission rate, signal strength, and signal-to-noise ratio for each section of the terrain of the underground utility tunnels. The obtained results provide an appropriate wireless planning approach for installing wireless networks in underground utility tunnels.

Development of UAV Flight Control Software using Model-Based Development(MBD) Technology (모델기반 개발기술을 적용한 무인항공기 비행제어 소프트웨어 개발)

  • Moon, Jung-Ho;Shin, Sung-Sik;Choi, Seung-Kie;Cho, Shin-Je;Rho, Eun-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.12
    • /
    • pp.1217-1222
    • /
    • 2010
  • This paper describes the Model-Based Development(MBD) process behind the flight control software of a close-range unmanned aerial vehicle(KUS-9). An integrated development environment was created using a commercial tool(MATLAB $Simulink^{(R)}$), which was utilized to design models for linear/nonlinear simulation, flight control law, operational logic and HILS(Hardware In the Loop Simulation) system. Software requirements were validated through flight simulations and peer reviews during the design process, whereas the models were verified through the application of a DO-178B verification tool. The integrity of automatically generated C code was verified by using a separate S/W testing tool. The finished software product was embedded on two different types of hardware and real-time operating system(uC/OS-II, VxWorks) to perform HILS and flight tests. The key findings of this study are that MBD Technology enables the development of a reusable and an extensible software product and auto-code generation technology allows the production of a highly reliable flight control software under a compressed time schedule.