• Title/Summary/Keyword: Disaster information

Search Result 3,479, Processing Time 0.036 seconds

A Study on the 3D Precise Modeling of Old Structures Using Merged Point Cloud from Drone Images and LiDAR Scanning Data (드론 화상 및 LiDAR 스캐닝의 정합처리 자료를 활용한 노후 구조물 3차원 정밀 모델링에 관한 연구)

  • Chan-hwi, Shin;Gyeong-jo, Min;Gyeong-Gyu, Kim;PuReun, Jeon;Hoon, Park;Sang-Ho, Cho
    • Explosives and Blasting
    • /
    • v.40 no.4
    • /
    • pp.15-26
    • /
    • 2022
  • With the recent increase in old and dangerous buildings, the demand for technology in the field of structure demolition is rapidly increasing. In particular, in the case of structures with severe deformation of damage, there is a risk of deterioration in stability and disaster due to changes in the load distribution characteristics in the structure, so rapid structure demolition technology that can be efficiently dismantled in a short period of time is drawing attention. However, structural deformation such as unauthorized extension or illegal remodeling occurs frequently in many old structures, which is not reflected in structural information such as building drawings, and acts as an obstacle in the demolition design process. In this study, as an effective way to overcome the discrepancy between the structural information of old structures and the actual structure, access to actual structures through 3D modeling was considered. 3D point cloud data inside and outside the building were obtained through LiDAR and drone photography for buildings scheduled to be blasting demolition, and precision matching between the two spatial data groups was performed using an open-source based spatial information construction system. The 3D structure model was completed by importing point cloud data matched with 3D modeling software to create structural drawings for each layer and forming each member along the structure slab, pillar, beam, and ceiling boundary. In addition, the modeling technique proposed in this study was verified by comparing it with the actual measurement value for selected structure member.

Research on Channel-Wise Preprocessing for Enhanced Infrared Object Detection

  • Jae-Uk Kim;Byung-In Choi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.11
    • /
    • pp.153-161
    • /
    • 2024
  • In this paper, we address the limitation of single-channel infrared (IR) images, which are difficult to directly apply to RGB-based detection models. Previously, a single channel was often replicated into three channels; however, this approach may limit detection performance due to information redundancy. To overcome this limitation, we propose a method that replicates the single-channel IR image into three channels, with each channel processed using different preprocessing techniques, such as CLAHE (Contrast Limited Adaptive Histogram Equalization), Laplacian Filter, and Top-hat transform, to improve detection performance. In this study, we utilized the RT-DETRv2 detection model and the Anti-UAV300 dataset, using IR images sampled at 10-frame intervals for our experiments. By evaluating the effects of each preprocessing technique and deriving the optimal configuration, our method achieved a 2.2% improvement in mean Average Precision (mAP) over conventional methods. This confirms that our method enhances performance over simple replication, presenting a novel approach to improving object detection performance in IR imaging, with promising applications across various fields, particularly in disaster situations where infrared cameras are utilized, as well as in nighttime surveillance and reconnaissance.

FBcastS: An Information System Leveraging the K-Maryblyt Forecasting Model (K-Maryblyt 모델 구동을 위한 FBcastS 정보시스템 개발)

  • Mun-Il Ahn;Hyeon-Ji Yang;Eun Woo Park;Yong Hwan Lee;Hyo-Won Choi;Sung-Chul Yun
    • Research in Plant Disease
    • /
    • v.30 no.3
    • /
    • pp.256-267
    • /
    • 2024
  • We have developed FBcastS (Fire Blight Forecasting System), a cloud-based information system that leverages the K-Maryblyt forecasting model. The FBcastS provides an optimal timing for spraying antibiotics to prevent flower infection caused by Erwinia amylovora and forecasts the onset of disease symptoms to assist in scheduling field scouting activities. FBcastS comprises four discrete subsystems tailored to specific functionalities: meteorological data acquisition and processing, execution of the K-Maryblyt model, distribution of web-based information, and dissemination of spray timing notifications. The meteorological data acquisition subsystem gathers both observed and forecasted weather data from 1,583 sites across South Korea, including 761 apple or pear orchards where automated weather stations are installed for fire blight forecast. This subsystem also performs post-processing tasks such as quality control and data conversion. The model execution subsystem operates the K-Maryblyt model and stores its results in a database. The web-based service subsystem offers an array of internet-based services, including weather monitoring, mobile services for forecasting fire blight infection and symptoms, and nationwide fire blight monitoring. The final subsystem issues timely notifications of fire blight spray timing alert to growers based on forecasts from the K-Maryblyt model, blossom status, pesticide types, and field conditions, following guidelines set by the Rural Development Administration. FBcastS epitomizes a smart agriculture internet of things (IoT) by utilizing densely collected data with a spatial resolution of approximately 4.25 km to improve the accuracy of fire blight forecasts. The system's internet-based services ensure high accessibility and utility, making it a vital tool in data-driven smart agricultural practices.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

An Efficient KNN Query Processing Method in Sensor Networks (센서 네트워크에서 효율적인 KNN 질의처리 방법)

  • Son, In-Keun;Hyun, Dong-Joon;Chung, Yon-Dohn;Lee, Eun-Kyu;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.32 no.4
    • /
    • pp.429-440
    • /
    • 2005
  • As rapid improvement in electronic technologies makes sensor hardware more powerful and capable, the application range of sensor networks Is getting to be broader. The main purpose of sensor networks is to monitor the phenomena in interesting regions (e.g., factory warehouses, disaster areas, wild fields, etc) and return required data. The k Nearest Neighbor (KNN) query that finds k objects which are geographically close to the given point is an Important application in sensor networks. However, most previous approaches are either seem to be impractical or are not energy-efficient in resource-limited sensor networks. In this paper. we propose an efficient KNN query processing method in sensor networks. In the proposed method, we dynamically increase searching boundary, if necessary, and traverse nodes inside the boundary until finding k nearest neighbors. Since only the representative sensor nodes are visited, our algorithm reduces a number of messages. We show thorough experiments that the proposed method performs better than the existing method in various network environments.

Key Exchange Protocol based on Signcryption in SMART Highway (SMART Highway 환경에서의 사인크립션 기반 키 교환 프로토콜)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.2
    • /
    • pp.180-189
    • /
    • 2013
  • The SMART Highway project combines road construction with advanced technology and vehicle telecommunications. Its expected outcome is a world-leading intelligent road that is green, fast, and comfortable. A vehicular ad-hoc network(VANET) is the core technology of the SMART Highway, whose transport operation is based on road vehicles. The VANET is a next-generation networking technology that enables wireless communication between vehicles or between vehicles and a road side unit(RSU). In the VANET system, a vehicle accident is likely to cause a serious disaster. Therefore, some information on safety is essential to serve as the key exchange protocol for communication between vehicles. However, the key exchange scheme of the general network proposed for a fast-moving communication environment is unsuitable for vehicles. In this paper, communication between multiple vehicles more efficient and secure key exchange at the vehicle certification by signcryption is proposed.

A study of the methodology for the long-term preservation of electronic records : focus on the preservation concept (전자기록물의 장기보존을 위한 방안 연구 : 개념을 중심으로)

  • Nam, Sung-Un;Yoon, Dai-Hyun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.2
    • /
    • pp.101-119
    • /
    • 2001
  • In this paper we explain the definition and component of electronic records, and reestablish the principle of the preservation. Also we discuss the conceptual approaches and requirements for long-term preservation in an electronic environment. The preservation in digital environment is to protect itself of record identity with the reliability and authenticity, and to ensure the accessibility of records. It needs to be periodical migration along with digital environment change for the long-term preservation of the electronic records. and to select software independent standard format. to ensure the integrity of electronic records along with this preservation strategy, process and relative information required for digital preservation are to record in the form of metadata. The preservation system is separated into four functional entities ; registration process, preservation process, access process, main record management system. Also, this article is conceptually to introduce the selection criteria of storage media, the security provision for the archive collections and the disaster recovery which apply to the digital archives.

The Study on the Integrated Emergency Management System using Network GR-type Receiver and Control Desk (네트워크 GR형 수신기와 컨트롤데스크를 이용한 통합방재관리시스템에 대한 연구)

  • Baek, Dong-Hyun;Song, Ho-Bin;Kang, Won-Shun
    • Fire Science and Engineering
    • /
    • v.26 no.1
    • /
    • pp.96-101
    • /
    • 2012
  • The buildings of domestic wear the upper floors and an underground in-depth reconciliation tendency to do and the possibility of fire occurrence at the time of formation accident is coming to be high. Therefore will be scattered to various place and is established and prevention of disaster information of the receiver which will integrate there is a necessity which will manage. In this paper away where each receiver is installed in the fire for the remote monitoring and controld able to connect to the Internet and fiber optic cable that can be networked fire receiver and control desk was constructed. Between each device can be used by the fire, and more depending on the status of monitoring and alarm, control and maintenance can be performed to develop an integrated management system. The system is evaluated by the criteria of the KFI, and for each segment of the signal propagation time to perform experiments confirmed the reliability of the performance.

Health Damages and Lessons of the Use of Humidifier Disinfectants in Korea (가습기살균제 피해사건과 교훈)

  • Choi, Ye-Yong;Lim, Heung-Kyu;Lim, Sin-Ye;Paek, Do-Myung
    • Journal of Environmental Health Sciences
    • /
    • v.38 no.2
    • /
    • pp.166-174
    • /
    • 2012
  • Introduction: After 17 years since the first production of humidifier disinfectants in Korea, Korea Centers for Disease Control and Prevention (KCDC) announced that the odds ratio of lung injury related with humidifier disinfectant usage was 47.3 (95% confidence interval 6.0-369.7) according to a case-control study with 18 adult cases, including 8 pregnant women at a university hospital in Seoul. Results: From September 2011 to April 2012, one-hundred and seventy four victim cases have been reported to an environmental non-governmental group (NGO). We summarized timetable of humidifier disinfectants accidents, analyzed health outcomes (death, lung or lung and heart transplantation, pulmonary disease) of reported victims, and classified some information for humidifier disinfectants with health outcomes, and government action for this accident. Among the victims, number of death cases are 52 (30.0%), including 26 babies less than 3 years old. Sixty-nine victims come from twenty-seven family with 2 to 4 members per family. About twenty types of humidifier disinfectant products and about 600,000 product items a year have been sold. Fifty-two death cases used 7 different types of disinfectant products, including imported goods and some private brands of well-known supermarkets. KCDC confirmed inhalation toxicity of 6 products through an animal experimental test, and based on this observation recalled disinfectants containing PHMG (polyhexamethylene guanidine) and PGH (Oligo(2-(2-ethoxy)ethoxyethyl guanidinium chloride). Discussions: The use of these biocides involved highly fatal consequences among biologically vulnerable victims, such as pregnant women, several family member victims after semi-acute exposure. This is the first biocide disaster in Korea with non-specific targets, and unknown scale of victims, warranting concerns on use of biocides in the living environment. Conclusions: Special administrative agency for chemical safety and compensation act for environmental health victims are needed to prevent similar problems.

A Numerical Modeling of Smoke Behavior and Detection for Fire Developed in International Space Station (국제우주정거장 내부 화재시 연기거동 및 감지특성에 관한 수치 모델링)

  • Park, Seul-Hyun;Lee, Joo-Hee;Kim, Youn-Kyu;Hwang, Cheol-Hong
    • Fire Science and Engineering
    • /
    • v.26 no.6
    • /
    • pp.51-56
    • /
    • 2012
  • The onset of fire on the International Space Station (ISS) is a critical problem that can threaten the life of crew members onboard and thus instantaneous fire detection and extinguishment technology has been considered as one of the most important aspects in the ISS operation. In the present study, a numerical analysis was performed to better understanding of the characteristics of smoke behaviors and detection in a pressurized module of the ISS using the NIST Fire Dynamic Simulator (FDS). Numerical results indicate that the smoke flow patterns under zero-gravity condition are clearly different from those under normal gravity condition. In addition, the results obtained from numerical simulations coupled with the PM internal flows are expected to provide basic and useful information in designing the microgravity fire detection devices and establishing in fire response protocol for astronauts or the crew members.