• Title/Summary/Keyword: Intelligent Equipment

Search Result 446, Processing Time 0.03 seconds

Analysis of the Impact of Transmission Towers on the Performance of RF Scanners for Drone Detection (드론탐지용 RF스캐너의 성능에 송전탑이 미치는 영향 분석)

  • Moon-Hee Lee;Jeong-Ju Bang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.1
    • /
    • pp.112-122
    • /
    • 2024
  • Recently, as unmanned aerial vehicle technology such as drones has developed, there are many environmental, social and economic benefits, but if there is malicious intent against important national facilities such as airports, public institutions, power plants, and the military, it can seriously affect national safety and people's lives. It can cause damage. To respond to these drone threats, attempts are being made to introduce detection equipment such as RF scanners. In particular, power transmission towers installed in substations, power plants, and Korea's power system can affect detection performance if the transmission tower is located in the RF scanner detection path. In the experiment, a commercial drone was used to measure the signal intensity emitted from the drone and confirm the attenuation rate. The average and maximum attenuation rates showed similar trends in the 2.4 GHz and 5.8 GHz bands, and were also affected by the density of the structure.

Infrastructure 2D Camera-based Real-time Vehicle-centered Estimation Method for Cooperative Driving Support (협력주행 지원을 위한 2D 인프라 카메라 기반의 실시간 차량 중심 추정 방법)

  • Ik-hyeon Jo;Goo-man Park
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.1
    • /
    • pp.123-133
    • /
    • 2024
  • Existing autonomous driving technology has been developed based on sensors attached to the vehicles to detect the environment and formulate driving plans. On the other hand, it has limitations, such as performance degradation in specific situations like adverse weather conditions, backlighting, and obstruction-induced occlusion. To address these issues, cooperative autonomous driving technology, which extends the perception range of autonomous vehicles through the support of road infrastructure, has attracted attention. Nevertheless, the real-time analysis of the 3D centroids of objects, as required by international standards, is challenging using single-lens cameras. This paper proposes an approach to detect objects and estimate the centroid of vehicles using the fixed field of view of road infrastructure and pre-measured geometric information in real-time. The proposed method has been confirmed to effectively estimate the center point of objects using GPS positioning equipment, and it is expected to contribute to the proliferation and adoption of cooperative autonomous driving infrastructure technology, applicable to both vehicles and road infrastructure.

Distributed Social Medical IoT for Monitoring Healthcare and Future Pandemics in Smart Cities

  • Mansoor Alghamdi;Sami Mnasri;Malek Alrashidi;Wajih Abdallah;Thierry Val
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.135-155
    • /
    • 2024
  • Urban public health monitoring in smart cities focuses on the control of conditions and health challenges in urban environments. Considering the rapid spread of diseases and pandemics, it is important for health authorities to trace people carrying the virus. In smart cities, this tracing must be interoperable and intelligent, especially in indoor surfaces characterized by small distances between people. Therefore, to fight pandemics, it is necessary to start with the already-existing digital equipment of the Internet of Things, such as connected objects and smartphones. In this study, the developed system is employed to provide a social IoT network and suggest a strategy which allows reliable traceability without threatening the privacy of users. This IoT-based system allows respecting the social distance between persons sharing public services in smart cities without applying smartphone applications or severe confinement. It also permits a return to normal life in case of viral pandemic and ensures the much-desired balance between economy and health. The present study analyses previous proposed social distance systems then, unlike these studies, suggests an intelligent and distributed IoT based strategy for positioning students. Two scenarios of static and dynamic optimization-based placement of Bluetooth Low Energy devices are proposed and an experimental study shows the contribution and complementarity of the introduced contact tracing strategy with the applications on smartphones.

Smart Care System on a Small Boat for an Effective Emergency Service (효과적인 응급대응을 위한 소형선박의 위치기반 스마트케어시스템)

  • Shin, Dong-Young;Lee, Byung-Mun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.8
    • /
    • pp.59-68
    • /
    • 2012
  • The existing ship monitoring system currently in use has a limitation, which is that it can only identify a boat's location for finding a safe harbor or give an answer to a rescue signal. In addition to this, it is very difficult to add an expensive, more effective monitoring system to small boats because of their small infrastructure in comparison with large boats. Therefore, this study suggests that a new model could be required to better cater to the needs of small boats. The 'Smart Care System', based on location, is better able to monitor the boat and the crew of small boats in comparison with the existing ship monitoring system. Using biomedical data transmission equipment, it is able to survey and send biomedical data so that it can continuously monitor the crew's health. The boat has an intelligent interface device, which has the functions of GPS and attitude sensors, and a web based management system. We have conducted three experiments for the assessment of this system. The experiment of biological data transmission had a success rate of 98 percent, and the tests conducted for recognizing emergency situations also had a 98 percent success rate. In conclusion we confirmed the efficiency of this system.

A Study on Static Situation Awareness System with the Aid of Optimized Polynomial Radial Basis Function Neural Networks (최적화된 pRBF 뉴럴 네트워크에 의한 정적 상황 인지 시스템에 관한 연구)

  • Oh, Sung-Kwun;Na, Hyun-Suk;Kim, Wook-Dong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.12
    • /
    • pp.2352-2360
    • /
    • 2011
  • In this paper, we introduce a comprehensive design methodology of Radial Basis Function Neural Networks (RBFNN) that is based on mechanism of clustering and optimization algorithm. We can divide some clusters based on similarity of input dataset by using clustering algorithm. As a result, the number of clusters is equal to the number of nodes in the hidden layer. Moreover, the centers of each cluster are used into the centers of each receptive field in the hidden layer. In this study, we have applied Fuzzy-C Means(FCM) and K-Means(KM) clustering algorithm, respectively and compared between them. The weight connections of model are expanded into the type of polynomial functions such as linear and quadratic. In this reason, the output of model consists of relation between input and output. In order to get the optimal structure and better performance, Particle Swarm Optimization(PSO) is used. We can obtain optimized parameters such as both the number of clusters and the polynomial order of weights connection through structural optimization as well as the widths of receptive fields through parametric optimization. To evaluate the performance of proposed model, NXT equipment offered by National Instrument(NI) is exploited. The situation awareness system-related intelligent model was built up by the experimental dataset of distance information measured between object and diverse sensor such as sound sensor, light sensor, and ultrasonic sensor of NXT equipment.

Threat Unification using Multi-Sensor Simulator of Battlefield Helicopter and Its Implementation (전장 헬기의 다중센서 시뮬레이터를 통한 위협통합 및 구현)

  • Park, Hun-Woo;Kang, Shin-Bong;Noh, Sang-Uk;Jeong, Un-Seob
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.35-49
    • /
    • 2009
  • In electronic warfare settings, battlefield helicopters identify various threats based upon threat data, which are acquired using their multi-sensors of aircraft survivability equipment (ASE). To continually function despite of potential threats and successfully execute their missions, the battlefield helicopters have to repeatedly report threats in simulated battlefield situations. Toward this ends, the paper presents threat unification using multi-sensor simulator and its implementation. The simulator consists of (1) threat attributes generator, which models threats against battlefield helicopters and defines their specific attributes, (2) threat data generator, which generates threats, being similar to real ones, using normal, uniform, and exponential distributions, and (3) graphic display for threat analysis and unification, which shows unified threat information, for example, threat angle and its level. We implement a multi-sensor threat simulator that can be repeatedly operable in various simulated battlefield settings. Further, we report experimental results that, in addition to tangibly modeling the threats to battlefield helicopters, test the capabilities of threat unification using our simulator.

  • PDF

A Study on the Acoustic Absorption Panel by the Theory of Resonator (공명 원리를 이용한 흡음벽에 관한 연구)

  • Yu, Young-Hun;Yi, Jong-Keun
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.11a
    • /
    • pp.125-129
    • /
    • 2006
  • It is very important to remove the noise levels made by an electric home appliance and machines they are located in the auditory region. The noise of ship engine room is known as it is not easy to lower so the working environment of the engine room is the worst condition because the improvement for the noise seemed insignificant and the hearing loss is occurred. As the monitoring equipment and an intelligent control system are improved rapidly the main engine of the ship can be enclosed with an acoustic barrier and any other absorbtion equipment. In this study, the sound absorbtion barrier is experimentally researched by change the volume and the length of the neck for the Helmholtz resonator as the resonator can absorb the noise effectively.

  • PDF

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network (스마트 팩토리 망에서 DPI와 자기 유사도 기술 기반의 OPC-UA 프로토콜 게이트웨이 융합 보안 기술)

  • Shim, Jae-Yoon;Lee, June-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1305-1311
    • /
    • 2016
  • The smart factory, a combination of ICT technology to the entire production process of a product, means can you intelligent factory is to achieve such reduction and process improvement of the production cost. To implement the smart factory, inevitably must have an internal equipment connections to the external network, this is by equipment which is operated by the existing closure network is exposed to the outside network, the security vulnerability so that gender is increased. In order to solve this problem, it is possible to apply security solutions that are used in normal environments. However, it is impossible to have just completely blocking security threats that can occur in a smart factory network. Further, considering the economic damage that can occur during security breach accident, which cannot be not a serious problem. Therefore, in this paper, a look to know the security measures that can be applied to smart factory, to introduce the main fusion security technology necessary to smart factory dedicated security gateway.