• Title/Summary/Keyword: 체계 연동

Search Result 497, Processing Time 0.026 seconds

A Study on Deep Learning-based Pedestrian Detection and Alarm System (딥러닝 기반의 보행자 탐지 및 경보 시스템 연구)

  • Kim, Jeong-Hwan;Shin, Yong-Hyeon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.4
    • /
    • pp.58-70
    • /
    • 2019
  • In the case of a pedestrian traffic accident, it has a large-scale danger directly connected by a fatal accident at the time of the accident. The domestic ITS is not used for intelligent risk classification because it is used only for collecting traffic information despite of the construction of good quality traffic infrastructure. The CNN based pedestrian detection classification model, which is a major component of the proposed system, is implemented on an embedded system assuming that it is installed and operated in a restricted environment. A new model was created by improving YOLO's artificial neural network, and the real-time detection speed result of average accuracy 86.29% and 21.1 fps was shown with 20,000 iterative learning. And we constructed a protocol interworking scenario and implementation of a system that can connect with the ITS. If a pedestrian accident prevention system connected with ITS will be implemented through this study, it will help to reduce the cost of constructing a new infrastructure and reduce the incidence of traffic accidents for pedestrians, and we can also reduce the cost for system monitoring.

Development of Korean Warrior Platform Architecture (한국형 워리어플랫폼 아키텍처 개발 연구)

  • Kim, Wukki;Shin, Kyuyong;Cho, Seongsik;Baek, Seungho;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.111-117
    • /
    • 2021
  • With the rapid development of advanced science and technology including the 4th industrial revolution, the future battlefield environment is evolving at a rapid pace. In order to actively respond to issues such as reduction of military resources and shortening of service period, and to emphasize the realization of human-centered values, the Ministry of National Defense is re-establishing the role of the Army in accordance with the defense reform and is promoting the Warrior Platform, a next-generation individual combat system. In this paper, we intend to present the optimal warrior platform architecture suitable for the Korean Army by realizing the concept of future ground operations and analyzing overseas cases. We analyze the essential abilities required of individual combatants and the abilities required for each unit type, and specifically presents a plan for integration and linkage of warrior platform equipment. We also propose an efficient business promotion direction by presenting the data flow and power connection diagram between the devices that need integration and interworking.

A Service Identification Scheme for the Convergence of Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 융합을 위한 서비스 식별 체계)

  • Uhm, Huy-Jung;Eun, Seong-Bae;Jun, Jung-Ho;Kang, Gwon-U;Ju, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.104-113
    • /
    • 2011
  • While converging USN Services, a single physical infrastructure can be used in several services and in several physical infrastructures can make up a single service. Therefore the physical infrastructure and service have to manage separately for effective convergence of USN Services. However, established Identification Scheme is not suitable to distinguish various services that USN provides. This paper suggests USN Service Identification Scheme that can be separated and managed. Through USN Service Identification Scheme suggested, firstly, it is possible to obtain Service Identification Scheme utilizing various technology such as RFID TAG, QR Code, radio broadcasting, etc. because it is possible to process USN Service Identification Scheme. Secondly, it is easy to mange the service, develope the user application program and interlock with established USN Standard technique as view from service provider. Thirdly, it is possible to manage systematically USN Service. Fourthly, users can search USN Service easily, so it can contribute actively for invigoration of USN service. This thesis, firstly, has analyzed about standard related USN Service and USN Identification Scheme. Secondly, this has suggested brand-new USN Service Identification Scheme based on established USN Identification Scheme.

A study on Mutual Authentication of Copyright between Korea-China and Trade Cooperation (한.중 저작권 상호인증과 통상협력과제)

  • Lee, Chan-Do
    • International Commerce and Information Review
    • /
    • v.16 no.1
    • /
    • pp.3-24
    • /
    • 2014
  • When the Korean Wave was sweeping over China, Asia, Other Countries, Some people worried that the ambiguity of the copyright act would obstruct export of the entertainment contents. To solve this problem, the copyright authentication was introduced in the copyright act, enforcement for its, etc. There are two authentication systems at copyright. One is right authentication protected by copyright, Other one is licence authentication received from the owner. This study is meant to seeking the problem of insufficient regulation related to copyright authentication. According to analysis of FGI in this study, the existing system does not support a proper and specific way how to suggest a long term perspective in the transaction of Korean Contents between Korea and China. The key to success of copyright authentication system between Korea and China depends upon the implementation of the system of copyright mutual authentication. To do so, In reality, laws, institutions, technologies, policies, and operations, etc. should be Inter-operability. Also we should realize that this system gives mutual benefits at transaction between the two countries. Thus, it is important for two countries to effort trade cooperation continuously.

  • PDF

Application and Evaluation of a Traffic Signal Control Algorithm based on Travel Time Information for Coordinated Arterials (연동교차로를 위한 통행시간기반 신호제어 알고리즘의 현장 적용 및 평가)

  • Jeong, Yeong-Je;Kim, Yeong-Chan
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.5
    • /
    • pp.179-187
    • /
    • 2009
  • This study develops a real-time signal control algorithm based on sectional travel times and includes a field test and evaluation. The objective function of the signal control algorithm is the equalization of delay of traffic movements, and the main process is calculating dissolved time of the queue and delay using the sectional travel time and detection time of individual vehicles. Then this algorithm calculates the delay variation and a targeted red time and calculates the length of the cycle and phase. A progression factor from the US HCM was applied as a method to consider the effect of coordinating the delay calculation, and this algorithm uses the average delay and detection time of probe vehicles, which were collected during the accumulated cycle for a stabile signal control. As a result of the field test and evaluation through the application of the traffic signal control algorithm on four consecutive intersections at 400m intervals, reduction of delay and an equalization effect of delay against TOD control were confirmed using the standard deviation of delay by traffic movements. This study was conducted to develop a real-time traffic signal control algorithm based on sectional travel time, using general-purpose traffic information detectors. With the current practice of disseminating ubiquitous technology, the aim of this study was a fundamental change of the traffic signal control method.

Design of Integrated Address Analysis Mechanism for the Next-Generation Integrated Network (차세대 통합 망을 위한 통합형 주소분석 메커니즘 설계)

  • 신현순;조기성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.39-45
    • /
    • 2004
  • This paper proposes an algorithm of address analysis for the next-generation networks. That is, we present integrated address analysis of the Numbering Plans of public telecommunication networks such as those of the ATM network. The purpose of implementing software for integrated address analysis is to actively and flexibly cope with a large change of information while operating the system and the network. By designing and implementing a database structure and an address analysis algorithm, interworking is possible among part (local) networks that each have a different Addressing Plan within an integrated network. Proposed relational model database structure has effect that do to manage address information of complicated network efficiently. Also, apply in real environment and proved excellency through interworking test to verify mechanism that propose.

Development of the Characteristic Information Architecture for the Digitalization of the Power Devices and Facilities (전력기기 및 설비 디지털화를 위한 특성정보체재 개발)

  • Jang, Moon-Jong;Cho, Sun-Ku;Lee, Jin-Kee;Kim, Sun-Ic;Yu, In-Hyeob;Ko, Jong-Min;Oh, Do-Eun
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2930-2932
    • /
    • 2005
  • 최근 정보통신 기술의 비약적인 발전에 힘입어 정보통신 산업이 다른 산업분야에도 영향을 미치고 있다. 전력산업도 이런 환경적 변화에 부응하여 다양한 IT 기술의 융합을 시도함에 따라 전력계통의 전 분야에 걸쳐 디지털화가 확산되고 있는 추세이다. 그러나, 이런 도입의 방식이 개별 업무단위로 적용됨에 따라 다양한 디지털 전력설비들이 계통 전체에 걸쳐 혼재하게 되고, 이에 따라 기기 상호간 연동의 어려움이 야기되고 있다. 그 결과 계통운영에 있어서 신규 투자 및 유지보수비용의 상승과 함께 새로운 미래지향적 전력부가서비스 창출에 걸림돌로 작용하고 있다. 이를 극복하고자 전력기기 및 설비에 대해 전체 정보구조와 ID 구조 및 체계, 인터페이스 표준, 통신접속 표준 등과 같은 특성정보체계의 정립이 필요하며, 이를 통해 전력공급의 신뢰성과 안정성, 전력품질 향상의 기반 확보가 용이할 것으로 기대된다.

  • PDF

Development of Telepresence System for Schedule Management in Railway Construction Project (철도시설공사의 현장 공정관리를 위한 원격 영상 운영체계 개발)

  • Kang, Leen-Seok;Kim, Hyeon-Seung;Park, Jin-Jung;Moon, Hyoun-Seok;Shin, Min-Ho
    • Journal of the Korean Society for Railway
    • /
    • v.13 no.1
    • /
    • pp.23-30
    • /
    • 2010
  • In the construction phase, the existing schedule management system by 4D CAD has been difficult to check for a status and progress of construction product in real-time because it simulates only VR (virtual reality) object based on a planned schedule. This study suggests a construction schedule management system by telepresence technique that can visualize progress status in real-time by using 4D CAD system based on remote monitoring. The telepresence methodology and system were developed in the study and they were verified for a railway construction project. The developed system can examine the status and progress of construction because it can compare 4D simulation based on planned schedule with real-time site images through web-camera.

Estimating System for Concrete Bridge using 3D Bridge Information Models (3차원 교량정보모델에 기반한 콘크리트 교량의 견적 시스템)

  • Shim, Chang-Su;Kim, Deok-Won;Lee, Kwang-Myong
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2009.05a
    • /
    • pp.43-44
    • /
    • 2009
  • 3D bridge information models for a concrete box-girder bridge were built and a typical application example for the estimation linked with the 3D models was proposed. 3D geometry objects with PBS (product breakdown structure) were constructed using standard classification codes and 2D drawings. Information on the amount of materials according to the classification codes was utilized for the estimation system. A process for the estimation of concrete and rebars was developed and verified through the pilot test. Optimization of rebar fabrication was suggested as an additional function and was utilized for the cost reduction and standard fabrication.

  • PDF

Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes (악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현)

  • Moon, Yoon Jong
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.69-82
    • /
    • 2015
  • This dissertation introduce how to react against the cybercrime and analysis of malware detection. Also this dissertation emphasize the importance about efficient control of correspond process for the information security. Cybercrime and cyber breach are becoming increasingly intelligent and sophisticated. To correspond those crimes, the strategy of defense need change soft kill to hard kill. So this dissertation includes the study of weak point about OS, Application system. Also this dissertation suggest that API structure for handling and analyzing big data forensic.