• Title/Summary/Keyword: Emergency protocol

Search Result 226, Processing Time 0.03 seconds

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

Development of Intelligent CCTV System Using CNN Technology (CNN 기술을 사용한 지능형 CCTV 개발)

  • Do-Eun Kim;Hee-Jin Kong;Ji-Hu Woo;Jae-Moon Lee;Kitae Hwang;Inhwan Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.99-105
    • /
    • 2023
  • In this paper, an intelligent CCTV was designed and experimentally developed by using an IOT device, Raspberry Pi, and artificial intelligence technology. Object Detection technology was used to detect the number of people on the CCTV screen, and Action Detection technology provided by OpenPose was used to detect emergency situations. The proposed system has a structure of CCTV, server and client. CCTV uses Raspberry Pi and USB camera, server uses Linux, and client uses iPhone. Communication between each subsystem was implemented using the MQTT protocol. The system developed as a prototype could transmit images at 2.7 frames per second and detect emergencies from images at 0.2 frames per second.

Using 2-mSv Appendiceal CT in Usual Practice for Adolescents and Young Adults: Willingness Survey of 579 Radiologists, Emergency Physicians, and Surgeons from 20 Hospitals

  • Hyuk Jung Kim;Kyoung Ho Lee;Min-Jeong Kim;Sung Bin Park;Yousun Ko;LOCAT Group
    • Korean Journal of Radiology
    • /
    • v.21 no.1
    • /
    • pp.68-76
    • /
    • 2020
  • Objective: To survey care providers' willingness to use 2-mSv computed tomography (CT) in their usual practice for adolescents and young adults with suspected appendicitis. Materials and Methods: An ethical committee approved this prospective study. We introduced 2-mSv CT in 20 hospitals through a pragmatic clinical trial. At the final phase of the trial, we invited 698 potentially-involved care providers in the survey regarding their willingness to use 2-mSv CT. Multivariable logistic regression analyses were performed to identify factors associated with willingness. Nine months after the completion of the trial patient recruitment, we surveyed whether the hospitals were using 2-mSv CT in usual practice. Results: The analyses included responses from 579 participants (203 attendings and 376 trainees; 221 radiologists, 196 emergency physicians, and 162 surgeons). Regarding the willingness to immediately change their standard practice to 2-mSv CT, 158 (27.3%), 375 (64.8%), and 46 (7.9%) participants responded as "yes" (consistently), "partly" (selectively), and "no", respectively. Willingness varied considerably across the hospitals, but only slightly across the participants' departments or job titles. Willingness was significantly associated with attendings (p = 0.004), intention to maintain the dedicated appendiceal CT protocol (p < 0.001), belief in compelling evidence on the carcinogenic risk of conventional-dose CT radiation (p = 0.028), and hospitals having more than 1000 beds (p = 0.031). Fourteen of the 20 hospitals kept using 2-mSv appendiceal CT in usual practice after the trial. Conclusion: Despite the extensive efforts over the years of this clinical trial, many care providers were willing to use 2-mSv CT selectively or not willing to use.

Research on Metadata Schema for Data Exchange between Smart Housing Fire Service and Smart City Integration Platform (스마트하우징 화재 서비스의 스마트시티 플랫폼 연계 데이터 교환용 메타데이터 스키마 연구)

  • Dae-Kug Lee;Dae-Gyu Lee;Hyun-Kook Kahng;Choong-Ho Cho
    • Journal of Internet Computing and Services
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2024
  • Recently, cutting-edge ICT technologies such as artificial intelligence, blockchain, edge computing, and the Internet of Things have been applied in various fields to create new services and a new digital era. Along with these technological developments, various policies are being implemented in Korea to transform the country from a "Smart City" to a "Platform City". We can create new services and values by linking with the Smart City Integrated Platform and Smart Housing Platform. This paper defines a linkage scenario between a Smart Housing Platform and the Smart 119 Emergency Dispatch Support Service, one of the Smart City Safety Nets. We propose a data transmission protocol and a metadata schema for data exchange between the Smart Housing Platform and the Smart City Integrated Platform to provide the Smart 119 Emergency Dispatch Support Service.

Hybrid Multipath Routing in Mobile Ad Hoc Networks (MANET환경에서 적용 가능한 복합적 다중 라우팅 기술)

  • Ninh, Khanhchi;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.49-56
    • /
    • 2011
  • One of the most important VANET applications is providing active safety by broadcasting emergency messages. In order to prevent broadcast storm of flooding-based broadcasting scheme in which any node receiving message will rebroadcast, the existing protocols use the different methods to limit the number of relay nodes. Nevertheless, the existing protocols have low delivery ratio with high traffic density and cause message overhead. Currently, the dramatic increase in the number of vehicles equipped with Global Positioning System (GPS) and onboard radar created new application scenarios that were not feasible before. Consequently, we proposed a broadcasting protocol that selects relay node by using GPS-based position information and detecting neighboring vehicles with the help of onboard radar to. Simulation results show that our proposed protocol has better performance than the existing schemes.

Big Data Management System for Biomedical Images to Improve Short-term and Long-term Storage

  • Qamar, Shamweel;Kim, Eun Sung;Park, Peom
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.2
    • /
    • pp.66-71
    • /
    • 2019
  • In digital pathology, an electronic system in the biomedical domain storage of the files is a big constrain and because all the analysis and annotation takes place at every user-end manually, it becomes even harder to manage the data that is being shared inside an enterprise. Therefore, we need such a storage system which is not only big enough to store all the data but also manage it and making communication of that data much easier without losing its true from. A virtual server setup is one of those techniques which can solve this issue. We set a main server which is the main storage for all the virtual machines(that are being used at user-end) and that main server is controlled through a hypervisor so that if we want to make changes in storage overall or the main server in itself, it could be reached remotely from anywhere by just using the server's IP address. The server in our case includes XML-RPC based API which are transmitted between computers using HTTP protocol. JAVA API connects to HTTP/HTTPS protocol through JAVA Runtime Environment and exists on top of other SDK web services for the productivity boost of the running application. To manage the server easily, we use Tkinter library to develop the GUI and pmw magawidgets library which is also utilized through Tkinter. For managing, monitoring and performing operations on virtual machines, we use Python binding to XML-RPC based API. After all these settings, we approach to make the system user friendly by making GUI of the main server. Using that GUI, user can perform administrative functions like restart, suspend or resume a virtual machine. They can also logon to the slave host of the pool in case of emergency and if needed, they can also filter virtual machine by the host. Network monitoring can be performed on multiple virtual machines at same time in order to detect any loss of network connectivity.

A Study on the Design of OSPF Area and Data Flow in the Tactical Data Networks (전술 데이터망에서 OSPF Area 설정과 데이터 흐름에 관한 연구)

  • Kwon, Soo-Gab;Jeong, Kyu-Young;Kim, Jeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.267-276
    • /
    • 2007
  • In OSPF, the larger and more unstable the area, the greater the likelihood for performance problems associated with routing protocol recalculation. Generally, an area should have no more than 50 routers. Areas with unstable links should be smaller. Military tactical data network is used for military operations during war-time. It consists of wireless network for mobility of node. Thus, it has low-bandwidth and unstable property. In addition, it is expected that many kinds of router-failure, Link-failure and recovery at emergency period. However, Military tactical data network is designed with about one and half times the number of recommendation. This paper proves that the traffic is limited by the increase of re-calculation of area.

Time Slot Exchange Protocol in a Reservation Based MAC for MANET

  • Koirala, Mamata;Ji, Qi;Choi, Jae-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.3
    • /
    • pp.181-185
    • /
    • 2009
  • Recently, much attention to a self-organizing mobile ad-hoc network is escalating along with progressive deployment of wireless networks in our everyday life. Being readily deployable, the MANET (mobile ad hoc network) can find its applications to emergency medical service, customized calling service, group-based communications, and military purposes. In this paper we investigate a time slot exchange problem found in the time slot based MAC, that is designed for IEEE 802.11b interfaces composing a MANET. The paper provides a method to maintain the quality of voice call by providing a new time slot when the channel assigned for that time slot gets noisy with interferences induced from other nodes, which belong to the same and/or other subgroups. In order to assess the performance of the proposed algorithm, a set of simulations using the OPNET modeler has been performed assuming that the IEEE 802.11b interfaces are operating under a modified MAC, which is a time slot based reservation MAC implemented in the PCF part of the superframe. In a real-time voice call service over a MANET of a size 500 ${\times}$ 500 meter squares with the number of nodes up to 100, the simulation results are collected and analyzed with respect to the packet loss rate and packet delay. The results show us that the proposed time slot exchange protocol improves the quality of voice call over that of plain DCF.

  • PDF

Implementation of Extended Automatic Callback Service in SIP-based VoIP System (SIP 기반의 VoIP 시스템에서의 확장된 자동 콜백 서비스의 구현)

  • Jo Hyun-Gyu;Lee Ky-Soo;Jang Choon-Seo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.251-260
    • /
    • 2005
  • On the internet phone or PSTN(Public Switched Telephone Network), the automatic callback is an useful service in the case of busy state when one user calls the other. By using this service, automatic redial is possible when the other party hangs up. However, in the basic automatic callback service, the user who wants callback should wait until the other party hangs up even in the case of emergency. Therefore in this paper, to solve this problem we have extended CPL(Call Processing Language) and, within user system we have included and linked this extended CPL processing module and dialog event package which processes SIP INVITE initiated dialog state informations. We have implemented this system for being used in SIP(Session Initiation Protocol)-based VoIP(Voice over IP) system.

An Improvement of Fault Tolerant for Routing using Secondary Header in CBRP (CBRP에서 보조헤더를 이용한 라우팅 고장 극복 개선)

  • 허태성;이균하
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.7
    • /
    • pp.983-996
    • /
    • 2001
  • Mobile Ad Hoc Network (MANET) is a network architecture which has no backborn network and is deployed temporarily and rapidly in emergency or war without fixed mobile infrastructures. All communications between network entities are carried in ad-hoc networks over the wireless medium. Due to the radio communications being extremely vulnerable to propagation impairments, connectivity between network nodes is not guaranteed. Therefore, previously developed routing algorithms in wired networks cannot be used. And many new algorithms have been undergone. This study proposes the Secondary Header approach to the cluster based routing protocol (CBRP). In case, the main header becomes abnormal status so that the main header can not participate the communications between network entities, the secondary header immediately replaces the primary header without selecting process of the new primary header. The performances of proposed algorithm CBRP-SH(Cluster Based Routing Protocol using Secondary Header) are compared with CBRP and results are presented in order to show the effectiveness of the algorithm.

  • PDF