• Title/Summary/Keyword: 전력통신

Search Result 5,662, Processing Time 0.033 seconds

A Study on Smart Ground Resistance Measurement Technology Based on Aduino (아두이노 기반 IT융합 스마트 대지저항 측정 기술 연구)

  • Kim, Hong Yong
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.684-693
    • /
    • 2021
  • Purpose: The purpose is to establish a safe facility environment from abnormal voltages such as lightning by developing a smart land resistance measuring device that can acquire real-time land resistance data using Arduino. Method: This paper studied design models and application cases by developing a land resistance acquisition and analysis system with Arduino and a power line communication (PLC) system. Some sites in the wind power generation complex in Gyeongsangnam-do were selected as test beds, and real-time land resistance data applied with new technologies were obtained. The electrode arrangement adopted a smart electrode arrangement using a combination of a Wenner four electrode arrangement and a Schlumberger electrode arrangement. Result: First, the characteristic of this technology is that the depth of smart multi-electrodes is organized differently to reduce the error range of the acquired data even in the stratigraphic structure with specificity between floors. Second, IT convergence technology was applied to enable real-time transmission and reception of information on land resistance data acquired from smart ground electrodes through the Internet of Things. Finally, it is possible to establish a regular management system and analyze big data accumulated in the server to check the trend of changes in various elements, and to model the optimal ground algorithm and ground system design for the IT convergence environment. Conclusion: This technology will reduce surge damage caused by lightning on urban infrastructure underlying the 4th industrial era and design an optimized ground system model to protect the safety and life of users. It is also expected to secure intellectual property rights of pure domestic technology to create jobs and revitalize our industry, which has been stagnant as a pandemic in the post-COVID-19 era.

Development of optimal cross-section design methods for bored utility tunnels: case study of overseas typical cross-sections and design criteria (터널식 공동구 최적단면 설계기술 개발: 해외 표준단면 사례 및 설계기준 분석)

  • Park, Kwang-Joon;Yun, Kyoung-Yeol
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.20 no.6
    • /
    • pp.1073-1090
    • /
    • 2018
  • Since the domestic utility tunnels were built mainly in the development project of the new city, they are all in the form of cut-and-cover box tunnel. But, in the case of overseas construction of utility tunnels for existing urban areas, the bored tunnel types are mainly adopted. It is reasonable to install bored tunnels in a downtown area because it is difficult to block the roads or install bypass roads due to heavy traffic and civil complaints. In order to activate the utility tunnels in bored type, it is necessary to secure optimized cross-sectional design technology considering the optimal supplying capacity and mutual influencing factors (Thermal Interference, electrolytic corrosion, efficiency of the maintenance, etc.) of utilities (power cables, telecommunication cables, water pipes, etc.). The optimal cross-section design method for bored utility tunnels is ultimately to derive the optimal arrangement technique for the utilities. In order to develop the design methods, firstly, the cases of tunnel cross-section (Shield TBM, Conventional Tunneling) in overseas shall be investigated to analyze the characteristics of the installation of utilities in the section and installation of auxiliary facilities, It is necessary to sort out and analyze the criteria related to the inner cross-section design (arrangement) presented in the standards and guidelines.

A Study on Improvement of Collected Data Performance in Real-time Railway Safety Supervisory Platform (실시간 철도안전관제 플랫폼에서의 수집 데이터 성능 개선 방안 연구)

  • Shin, Kwang-Ho;Park, Jee-Won;Ahn, Jin
    • Journal of The Korean Society For Urban Railway
    • /
    • v.6 no.4
    • /
    • pp.233-241
    • /
    • 2018
  • Recently, integrated railway safety monitoring and control system, which is a convergence system based on data distribution service for railway safety monitoring and control, is under development. It collects safety data of vehicle, signal, power and safety monitoring facilities in real time and adopts communication middleware based on distributed service for mass data processing. However, in the case of a server device used as an existing control server, the performance of the distributed service middleware can not be exhibited due to low hardware performance due to safety reasons. In the safety control system, 200,000 packets per second were set as the transmission target, but the performance test of the LAB was not satisfied. In this paper, we analyze the characteristics of railway data to improve the data collection performance of existing equipment and apply DDS-based streaming transmission method to the data model of signal facilities and vehicle facilities with large packet amount according to the analysis result. As a result, it was confirmed that the throughput was improved about 30.4 times when the hardware performance was the same. We plan to improve the data processing performance by applying it to real-time railway safety integrated monitoring and control system in the future.

A Study and Analysis on Case Study of Security Evaluation Tool (보안성 평가 도구 사례 분석 연구)

  • Kim, Hyun-il;Park, Kyungyun;Seo, Changho;Moon, Daesung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.347-356
    • /
    • 2019
  • Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.

A Study on Backup PNT Service for Korean Maritime Using NDGNSS (NDGNSS 인프라를 활용한 국내 해상 백업 PNT 서비스 연구)

  • Han, Young-Hoon;Lee, Sang-Heon;Park, Sul-Gee;Fang, Tae-Hyun;Park, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.43 no.1
    • /
    • pp.42-48
    • /
    • 2019
  • The significance of PNT information in the fourth industrial revolution is viewed differently in relation to the past. Autonomous vehicles, autonomous vessels, smart grids, and national infrastructure require sustainable and reliable services in addition to their high precision service. Satellite navigation system, which is the most representative system for providing PNT information, receive signals from satellites outside the earth so signal reception power is low and signal structures for civilian use are open to the public. Therefore, it is vulnerable to intentional and unintentional interference or hacking. Satellite navigation systems, which can easily acquire high performance of PNT information at low cost, require alternatives due to its vulnerability to the hacking. This paper proposed R-Mode (Ranging Mode) technology that utilizes currently operated navigation and communication infrastructure in terms of Signals of OPportunity (SoOP). For this, the Nationwide Differential Global Navigation Satellite System (NDGNSS), which currently gives a service of Medium Frequency (MF) navigation signal broadcasting, was used to validate the feasibility of a backup infrastructure in domestic maritime areas through simulation analysis.

Analysis of E2E Latency for Data Setup in 5G Network (5G 망에서 Data Call Setup E2E Latency 분석)

  • Lee, Hong-Woo;Lee, Seok-Pil
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.113-119
    • /
    • 2019
  • The key features of 5G mobile communications recently commercialized can be represented by High Data Rate, Connection Density and Low Latency, of which the features most distinct from the existing 4G will be low Latency, which will be the foundation for various new service offerings. AR and self-driving technologies are being considered as services that utilize these features, and 5G Network Latency is also being discussed in related standards. However, it is true that the discussion of E2E Latency from a service perspective is much lacking. The final goal to achieve low Latency at 5G is to achieve 1ms of air interface based on RTD, which can be done through Ultra-reliable Low Latency Communications (URLLC) through Rel-16 in early 20 years, and further network parity through Mobile Edge Computing (MEC) is also being studied. In addition to 5G network-related factors, the overall 5G E2E Latency also includes link/equipment Latency on the path between the 5G network and the IDC server for service delivery, and the Processing Latency for service processing within the mobile app and server. Meanwhile, it is also necessary to study detailed service requirements by separating Latency for initial setup of service and Latency for continuous service. In this paper, the following three factors were reviewed for initial setup of service. First, the experiment and analysis presented the impact on Latency on the Latency in the case of 1 Data Lake Setup, 2 CRDX On/Off for efficient power, and finally 3H/O on Latency. Through this, we expect Low Latency to contribute to the service requirements and planning associated with Latency in the initial setup of the required services.

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.

Automatic Bee-Counting System with Dual Infrared Sensor based on ICT (ICT 기반 이중 적외선 센서를 이용한 꿀벌 출입 자동 모니터링 시스템)

  • Son, Jae Deok;Lim, Sooho;Kim, Dong-In;Han, Giyoun;Ilyasov, Rustem;Yunusbaev, Ural;Kwon, Hyung Wook
    • Journal of Apiculture
    • /
    • v.34 no.1
    • /
    • pp.47-55
    • /
    • 2019
  • Honey bees are a vital part of the food chain as the most important pollinators for a broad palette of crops and wild plants. The climate change and colony collapse disorder (CCD) phenomenon make it challenging to develop ICT solutions to predict changes in beehive and alert about potential threats. In this paper, we report the test results of the bee-counting system which stands out against the previous analogues due to its comprehensive components including an improved dual infrared sensor to detect honey bees entering and leaving the hive, environmental sensors that measure ambient and interior, a wireless network with the bluetooth low energy (BLE) to transmit the sensing data in real time to the gateway, and a cloud which accumulate and analyze data. To assess the system accuracy, 3 persons manually counted the outgoing and incoming honey bees using the video record of 360-minute length. The difference between automatic and manual measurements for outgoing and incoming scores were 3.98% and 4.43% respectively. These differences are relatively lower than previous analogues, which inspires a vision that the tested system is a good candidate to use in precise apicultural industry, scientific research and education.

A Study on Improvement of Directional Errors for K-MLRS Launcher (천무 발사대 방향성 오류현상 개선에 관한 연구)

  • Kim, Hyeeun;Kim, Minchang;Yu, Hanjun;Bae, Gongmyeong;Oh, Eunbin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.705-713
    • /
    • 2021
  • Because the cage assembly serves as the launch platform, an accurate aim is essential to ensure shooting accuracy for the target. On the other hand, the abnormal rotation of the cage due to the directional errors of the K-MLRS has continuously caused quality problems. The quality problem of weapon systems may have a negative impact on the military's power loss. In this study, improvement plans were derived by examining the defects and analyzing the directional errors of the K-MLRS launcher. In addition, all possible causes of directional errors were derived from the flow diagram for cage directionality. Based on the results, the defense design through the software program was intended to prevent the loss of direction. Through this study, the signal error of the resolver was improved by preventing unspecific signals in the data. Furthermore, the directional judgment method was improved to minimize the impact of data distortion. Lastly, directional storage and verification methods were improved so that data for the cage rotation direction would not be affected by errors. For the design improvement method, the reliability was verified through the system applicability. This study is expected to be a reference for failure analysis and design for similar weapon systems in the future.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.