• Title/Summary/Keyword: 위치추적시스템

Search Result 1,295, Processing Time 0.03 seconds

인터넷 기반 원스톱서비스 시스템 개발에 관한 연구+ -수출컨테이너화물 원스톱서비스 시스템 개발-

  • 박남규;최형림;김현수;박영재;조재형;이철우
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 1999.10a
    • /
    • pp.299-308
    • /
    • 1999
  • 오늘날 우리 나라가 당면한 최우선 경제과제중 하나는 물류부분의 혁신을 통한 국가경쟁력 강화라고 할 수 있으며, 이를 위해 정부도 1993년 물류체계 개선을 위한 장기구상으로 ‘화물유통체계 개선 10개년 기본계획’을 수립하여 적극 추진 중에 있다. 그러나 이러한 노력에도 불구하고 PORT-MIS사용자를 상대로 한 설문조사에서는 선박입출항 업무 관련 서류의 40%, 항만시설 사용 업무와 관련된 서류의 31%, 하역업무 관련 서류의 10%만이 EDI를 활용하고 있었다. EDI 활용이 저조한 사유로는 전송시간이 많이 걸리며, EDI 소프트웨어가 작동되지 않으며, 수신확인이 되지 않기 때문이라 응답을 하였다. 이처럼 오늘날 항만물류산업이 겪고 있는 물류 데이터 흐름이 단절적 현상은 시간이 흐를수록 해결 될 기미가 보이고 있지 않다. 따라서 본 논문에서는 우리 나라가 겪고 있는 물류관련 업무를 한번의 데이터 입력으로 해결할 수 있는 원스톱 서비스 시스템개발을 목표로 우선 PORT-MIS EDI 업무를 처리할 수 있는 시스템을 구축하였다. 이는 향후 화주, 운송사, 선사, 포워더, 창고업자,하역회사, 철도청, 화물터미널, 컨테이너 터미널, 해양수산청, 관세청, 출입국관리사무소, 검역소 사이에 서로 교환되는 적하목록, Booking List, 컨테이너 Pick up정보, 위험물 정보, COPINO 정보를 비롯하여 대 관세청 신고 등 수출컨테이너 화물업무의 전반적인 영역으로까지 쉽게 확대할 수 있을 것이다. 본 연구결과 구축된 시스템은 원천정보를 중앙의 통합데이터베이스에 저장하여 이를 사용자의 요구에 의해 인터넷을 통해 전달하는 FTP와 웹 EDI 방식을 결합한 하이브리드 형태이다.CS Cell 방식에 의한 위치결정방식을 채택하였는데, 이것은 PCS망을 기반으로 데이터를 주고받이며 인터넷 단말기로 확장 가능한 PCS 단말기를 사용해서 위치추적을 하는 시스템이다. 이러한 시스템을 선정하게된 배경은 단말기아 망 이용료의 가격이 저렴하여 현실적으로 트럭이 쉽게 부착할 수 있다는 장점이 있으며 나아가 인터넷 단말기를 활용하여 차량과 관제센터사이에 메시지 전송 등 부가적인 서비스가 가능하기 때문이다.비교한 결과 토사 유출 억제효과는 한지형과 나지형잔디들의 혼합형(MixtureIII)과 자생처리구(MixtureV), Italian ryegrass와 자생식물의 혼합형(MixtureIV)등에서 비교적 낮은 수치를 토사유출량을 기록하였다. 이러한 결과는 자생식물들이 비록 초기생육속도는 외래도입초종에 떨어지지만 토사유출의 억제효과면에서는 이들 외래초종에 필적할 수 있음을 나타낸다고 할 수 있겠다.중량이 약 115kg/$m^2$정도로 나타났다.소 들(환경의 의미, 사람의 목적과 지식)보다 미학적 경험에 주는 영향이 큰 것으로 나타났으며, 모든 사람들에게 비슷한 미학적 경험을 발생시키는 것 이 밝혀졌다. 다시 말하면 모든 사람들은 그들의 문화적인 국적과 사회적 인 직업의 차이, 목적의 차이, 또한 환경의 의미의 차이에 상관없이 아름다 운 경관(High-beauty landscape)을 주거지나 나들이 장소로서 선호했으며, 아름답다고 평가했다. 반면에, 사람들이 갖고 있는 문화의 차이, 직업의 차 이, 목적의 차이, 그리고 환경의 의미의 차이에 따라 경관의 미학적 평가가 달라진 것으로 나타났다.corner$적 의도에 의한 경관구성의 일면을 확인

  • PDF

Development and Application of a Scenario Analysis System for CBRN Hazard Prediction (화생방 오염확산 시나리오 분석 시스템 구축 및 활용)

  • Byungheon Lee;Jiyun Seo;Hyunwoo Nam
    • Journal of the Korea Society for Simulation
    • /
    • v.33 no.3
    • /
    • pp.13-26
    • /
    • 2024
  • The CBRN(Chemical, Biological, Radiological, and Nuclear) hazard prediction model is a system that supports commanders in making better decisions by creating contamination distribution and damage prediction areas based on the weapons used, terrain, and weather information in the events of biochemical and radiological accidents. NBC_RAMS(Nuclear, Biological and Chemical Reporting And Modeling S/W System) developed by ADD (Agency for Defense Development) is used not only supporting for decision making plan for various military operations and exercises but also for post analyzing CBRN related events. With the NBC_RAMS's core engine, we introduced a CBR hazard assessment scenario analysis system that can generate contaminant distribution prediction results reflecting various CBR scenarios, and described how to apply it in specific purposes in terms of input information, meteorological data, land data with land coverage and DEM, and building data with pologon form. As a practical use case, a technology development case is addressed that tracks the origin location of contaminant source with artificial intelligence and a technology that selects the optimal location of a CBR detection sensor with score data by analyzing large amounts of data generated using the CBRN scenario analysis system. Through this system, it is possible to generate AI-specialized CBRN related to training and analysis data and support planning of operation and exercise by predicting battle field.

Real-Time Tracking of Moving Object by Adaptive Search in Spatial-temporal Spaces (시공간 적응탐색에 의한 실시간 이동물체 추적)

  • Kim, Gye-Young;Choi, Hyung-Ill
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.11
    • /
    • pp.63-77
    • /
    • 1994
  • This paper describes the real-time system which, through analyzing a sequence of images, can extract motional information on a moving object and can contol servo equipment to always locate the moving object at the center of an image frame. An image is a vast amount of two-dimensional signal, so it takes a lot of time to analyze the whole quantity of a given image. Especially, the time needed to load pixels from a memory to processor increase exponentially as the size of an image increases. To solve such a problem and track a moving object in real-time, this paper addresses how to selectively search the spatial and time domain. Based on the selective search of spatial and time domain, this paper suggests various types of techniques which are essential in implementing a real-time tracking system. That is, this paper describes how to detect an entrance of a moving object in the field of view of a camera and the direction of the entrance, how to determine the time interval of adjacent images, how to determine nonstationary areas formed by a moving object and calculated velocity and position information of a moving object based on the determined areas, how to control servo equipment to locate the moving object at the center of an image frame, and how to properly adjust time interval(${\Delta}$t) to track an object taking variable speed.

  • PDF

Study on Improvement of Target Tracking Performance for RASIT(RAdar of Surveillance for Intermediate Terrain) Using Active Kalman filter (능동형 Kalman filter를 이용한 지상감시레이더의 표적탐지능력 향상에 관한 연구)

  • Myung, Sun-Yang;Chun, Soon-Yong
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.3
    • /
    • pp.52-58
    • /
    • 2009
  • If a moving target has a linear characteristics, the Kalman filter can estimate relatively accurate the location of a target, but this performance depends on how the dynamic status characteristics of the target is accurately modeled. In many practical problems of tracking a maneuvering target, a simple kinematic model can fairly accurately describe the target dynamics for a wide class of maneuvers. However, since the target can exhibit a wide range of dynamic characteristics, no fixed SKF(Simple Kalman filter) can be matched to estimate, to the required accuracy, the states of the target for every specific maneuver. In this paper, a new AKF(Active Kalman filter) is proposed to solve this problem The process noise covariance level of the Kalman filter is adjusted at each time step according to the study result which uses the neural network algorithm. It is demonstrated by means of a computer simulation that the tracking capability of the proposed AKF(Active Kalman filter) is better than that of the SKF(Simple Kalman Filter).

Tag Trajectory Generation Scheme for RFID Tag Tracing in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 RFID 태그 추적을 위한 태그 궤적 생성 기법)

  • Kim, Jong-Wan;Oh, Duk-Shin;Kim, Kee-Cheon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One of major purposes of a RFID system is to track moving objects using tags attached to the objects. Because a tagged object has both location and time information expressed as the location of the reader, we can index the trajectory of the object like existing spatiotemporal objects. More efficient tracking may be possible if a spatiotemporal trajectory can be formed of a tag, but there has not been much research on tag trajectory indexes. A characteristic that distinguishes tags from existing spatiotemporal objects is that a tag creates a separate trajectory in each reader by entering and then leaving the reader. As a result, there is a trajectory interruption interval between readers, in which the tag cannot be located, and this makes it difficult to track the tag. In addition, the point tags that only enter and don't leave readers do not create trajectories, so cannot be tracked. To solve this problem, we propose a tag trajectory index called TR-tree (tag trajectory R-tree in RFID system) that can track a tag by combining separate trajectories among readers into one trajectory. The results show that TR-tree, which overcomes the trajectory interruption superior performance than TPIR-tree and R-tree.

FPGA Design of Adaptive Digital Receiver for Wireless Identification (무선인식을 위한 적응적 디지털 수신기의 FPGA 설계)

  • Seo Young-Ho;Kim Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.745-752
    • /
    • 2005
  • In this paper we propose and implement a digital part of a receiver system for identifying a moving object and its tracking position in wireless environment. We assumed UWB(Ultra Wide Band)-based communication system for target application and used serial communication method(RS-232). The proposed digital receiver consists of RS-232-type1/RS-232-type2 for input and output of serial communication, ID Detector for detecting IDs, and PISO&Buffer circuit to buffer input signals for appropriate operation of ID Detector. We implemented the digital receiver with minimal hardware(H/W) resource according to target application of UWB-based communication system. So it correlates input patterns with pre-stored patterns though repeated detecting method for multiple IDs. Since it has reference panerns in the Ve-stored form, it can detect various IDs instantly. Also we can program content and size of reference patterns considering compatibility with other systems .The implemented H/W was mapped into XC2S100PQ208-5 FPGA of Xilinx, occupied 727($30\%$) cells, and stably operated in the clock frequency of 75MHz(13.341ns).

High-Speed Satellite Detection in High-Resolution Image Using Image Processing (영상 처리를 이용한 고해상도 영상 내 위성의 고속 검출)

  • Shin, Seunghyeok;Lee, Jongmin;Lee, Sangwook;Yang, Taeseok;Kim, Whoi-Yul
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.5
    • /
    • pp.427-435
    • /
    • 2018
  • Many countries are trying to deploy satellite surveillance systems for their national defense, and one of these system uses optical systems to observe the satellites above their territories. The optical satellite surveillance system requires the coordinates of the satellites in an acquired image and expects that those coordinates to be delivered to the tracking system. The proposed method detects the satellite sources in a high-resolution image with fast image processing for the optical surveillance system. To achieve faster detection, the proposed method reduces the size of the original image and approximates the trajectory of a satellite, so image processing methods are only applied to the nearby area of the approximated trajectory in the original image. The proposed method shows the similar detection performance faster than the previous method.

Smart device research for the prevention of missing child (미아 방지용 스마트 디바이스 구현에 관한 연구)

  • Ahn, Jong-Chan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.437-440
    • /
    • 2007
  • Recently embedded system developed a lot. Physically, embedded systems range from portable devices such as digital watches and MP3 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. This paper focuses on implementation of portable device which is applicable to the child-kidnap or missing child prevention system in residential area or public area. To be specific, this device is to transmit video data which comes from the camera in the device into the host PC via WLAN. Embedded hardware platform consists of s3c2440 with ARM9 core, WindowsCE OS and other sensors. OS enables the platform to do multitasking jobs which are handling GPS data, taking video, capturing audio via microphone in the device and transfer all kind of realtime data to the host PC.

  • PDF

SmartPuck System : Tangible Interface for Physical Manipulation of Digital Information (스마트 퍽 시스템 : 디지털 정보의 물리적인 조작을 제공하는 실감 인터페이스 기술)

  • Kim, Lae-Hyun;Cho, Hyun-Chul;Park, Se-Hyung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.4
    • /
    • pp.226-230
    • /
    • 2007
  • In the conventional desktop PC environment, keyboard and mouse are used to process the user input and monitor displays the visual information as an output device. In order to manipulate the digital information, we move the virtual cursor to select the desired graphical icon on the monitor The cursor represents the relative motion of the physical mouse on the desk. This desktop metaphor does not provide intuitive interface through human sensation. In this paper, we introduce a novel tangible interface which allows the user to interact with computers using a physical tool called "Smartpuck". SmartPuck system bridges the gap between analog perception and response in human being and digital information on the computer. The system consists of table display based on a PDP, SmartPuck equipped with rotational part and button for the user's intuitive and tactile input, and a sensing system to track the position of SmartPuck. Finally, we will show examples working with the system.

A Secure RFID Search Protocol Protecting Mobile Reader's Privacy Without On-line Server (온라인 서버가 없는 환경에서 이동형 리더의 프라이버시를 보호하는 안전한 RFID 검색 프로토콜)

  • Lim, Ji-Wwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2010
  • Recently, Tan et al. introduced a serverless search protocol in which a mobile reader maintains a tag authentication list and authenticates a tag using the list without connecting authentication server. A serverless RFID system is different from general RFID systems which use on-line server models. In the serverless RFID system, since the mobility of a personalized reader must be considered, we have to protect not only the privacy of a tag but also the privacy of a mobile reader. In this paper, we define new security requirements for serverless RFID search system and propose a secure serverless RFID search system. In our system, since tag authentication information maintained by a reader is updated in every session, we can provide the backward untraceability of a mobile reader. Also we use an encrypted timestamp to block a replay attack which is major weakness of search protocols. In addition, we define a new adversary model to analyze a serverless RFID search system and prove the security of our proposed system using the model.