• Title/Summary/Keyword: Real Monitoring System

Search Result 2,985, Processing Time 0.033 seconds

Development and Verification of Eco-hybrid Rolling Mat for Preventing Bank Erosion Based on Large-scale Experiments (실규모 하천 실험을 통한 하안침식 방지 Eco-hybrid 롤링매트 공법 개발 및 검증)

  • Ji, Un;Jang, Eun-Kyung;Ahn, Myeonghui;Kim, Won
    • Ecology and Resilient Infrastructure
    • /
    • v.6 no.4
    • /
    • pp.217-226
    • /
    • 2019
  • Optimum engineering methods for bank protection were classified based on steepness of bank slope and an existence of waterfront facility in the floodplain, and a new concept of eco-hybrid rolling mat method which could be applicable for the unfitted cases with previously developed countermeasures was suggested in this study. The eco-hybrid rolling mat method can be constructed while maintaining the river environment and ecosystem that does not interfere with the ground and slopes, when bank erosion occurs, it is an economical and efficient construction method that can protect the revetment and the bank slope immediately. The developed eco-hybrid rolling mat method was verified for the designed structure, system, function and effect based on large-scale river experiments including field exposure and decomposition test. As a result, the normal operation and effect of the rolling mat ted under low and high velocity conditions were confirmed with respect to bank protection. The effect of bank erosion prevention was quantitatively validated by sediment concentration monitoring and analysis, and the product specification of the eco-hybrid rolling mat was presented based on the standardized mat applied in real-scale tests.

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

Crack Source location Technique for nam Concrete Beam using Acoustic Emission (음향방출을 이용한 무근콘크리트 보의 균열 발생원 탐사기법)

  • 한상훈;이웅종;조홍동;김동규
    • Journal of the Korea Concrete Institute
    • /
    • v.13 no.2
    • /
    • pp.107-113
    • /
    • 2001
  • This study was conducted preliminarily to develop the crack source location technique for plain concrete beam using acoustic emission(AE). Before the main experiment, the test of virtual An source location was achieved in plain concrete block. The sensor layout was mutually compared between triangular layout and rectangular layout. As the results of test, AE source location by triangular layout was evaluated more effective than that by rectangular layout. The specimen to apply he source location technique was man in total nine specimens (each three in 40 %, 50%, 60% of W/C ratio) which the experiment variable was the compressive strength level(W/C ratio). The bending loading method is selected by cyclic loadings to evaluate the degree of concrete damage. It is seen that Kaiser effect and Felicity effect exists through analysis of AE parameters in coming failure experiment. As a result of analyzing the felicity ratio(FR) values, it is shown that this values can be used for evaluating the degree of concerto damage. AE activity is started highly at the 70% of failure load without the compressive strength level. Thus considered by a index in constructing the system of the failure warning at application of the field structure. And the results compared the real cracking location with the source location has perceived by AE monitoring before it is appeared the primary crack by visual observation.

Study on the Low Energy Sewage Management Based on Pre-sensing Technology and Automatic Blower Control (사전감지기술 및 송풍량 자동제어를 기반으로 한 저에너지 하수관리기술에 관한 연구)

  • Lee, Seungmyoung;Kim, Hanlae;Ki, Kyoungseo
    • Journal of Environmental Impact Assessment
    • /
    • v.28 no.6
    • /
    • pp.592-603
    • /
    • 2019
  • This study is about the implementation of low energy sewage management technology through effective control of blower which consumes the most energy in sewage treatment. In calculating the amount of oxygen required for microorganisms, unlike the existing method using the operating index in the bioreactor or TMS data in the discharge port, the CODcr and NH4+-N concentration changes in sewage flowing into the sewage treatment plant were detected in advance before entering the bioreactor and the amount of air was controlled based on this. The pre-sensing was found to have a high correlation compared with conventional products. As a result of blower control, it was possible to save about 9.9% energy more than the manual control. Consequently, this study suggested the possibility of blower's real-time control combined with pre-sensing technology. Also, it is expected that the low energy sewage treatment can be applied to sewage treatment facilities dependent on operation by manpower, and it will contribute to the reduction of greenhouse gas emissions.

The study of improving the performance of lower direction finding ability due to the interfered phase difference of circular array Antennas (원형배열안테나의 위상간섭에 의한 방향탐지 성능저하 개선연구)

  • Chung, Jae-Woo;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.535-539
    • /
    • 2010
  • This paper include to study DoA(Direction of Arrival) for radio collection and monitoring system. The direction finding calculated by applying the CVDF (Correlation Vector Direction Finding) algorithm for the five circular dipole antenna over V / UHF band. To improve the accuracy of direction finding by applying CVDF algorithm needs to obtain ideal phase difference each antennas. However, a circular array antenna phase difference pattern may be distorted on a specific frequency band or to particular direction. The effect of installing each array antennas circularly and the effect of the interference of center pole (located in the center of a circular array antenna mount) may make the distortion of phase pattern. If you use an active antenna instead of passive antenna to obtain good sensitivity, you would measure the more distortion. This paper propose how to change combination of antennas to measure the phase in real-time and how to use antenna beam patterns for minimizing the degradation phenomena at applying simple CVDF algorithm and increasing the direction finding capability.

  • PDF

A Neural Network-Based Tracking Method for the Estimation of Hazardous Gas Release Rate Using Sensor Network Data (센서네트워크 데이터를 이용하여 독성물질 누출속도를 예측하기 위한 신경망 기반의 역추적방법 연구)

  • So, Won;Shin, Dong-Il;Lee, Chang-Jun;Han, Chong-Hun;Yoon, En-Sup
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.2
    • /
    • pp.38-41
    • /
    • 2008
  • In this research, we propose a new method for tracking the release rate using the concentration data obtained from the sensor. We used a sensor network that has already been set surrounding the area where hazardous gas releases can occur. From the real-time sensor data, we detected and analyzed releases of harmful materials and their concentrations. Based on the results, the release rate is estimated using the neural network. This model consists of 14 input variables (sensor data, material properties, process information, meteorological conditions) and one output (release rate). The dispersion model then performs the simulation of the expected dispersion consequence by combining the sensor data, GIS data and the diagnostic result of the source term. The result of this study will improve the safety-concerns of residents living next to storage facilities containing hazardous materials by providing the enhanced emergency response plan and monitoring system for toxic gas releases.

  • PDF

The Distribution of Total Ozone Amounts and Intercomparison of their characteristics Derived from the TOVS Observations over the Korean Peninsula (TOVS로 부터 도출한 한반도 부근의 전오존량 분포 및 그 특성 비교)

  • 정효상;주상원
    • Korean Journal of Remote Sensing
    • /
    • v.11 no.3
    • /
    • pp.23-31
    • /
    • 1995
  • The International TOVS(TIROS Operational Vertical Sounders) Process Package(ITPP-VI), which has been installed at Korea Meteorological Administration(KMA), is only for a global usage to need a surface data to generate atmospheric soundings and total ozone amount. If the initial input process in the ITTP-VI is not modified, it takes climatic surface data for producing sounding data and total ozone amount in general. KMA is trying to improve the quality of TOVS total ozone amount using real-time synoptoc observation in various ways instead of climatological data because this retrieved data in the new scheme for total ozone presently used at the KMA may critically provide to analyze the long-term trend of ozone structure over the Korean peninsula. Two cases in this study show that TOVS retrieved total ozone amounts used by synoptic surface observations can delineate more detailed ozone structures rather than those used by climate surface data. The distribution of TOVS retrieved ozone amount fields with the synoptic surface analyzed data(TOVS-GPV) show more in detail relatively than those with the climate data(TOVS-CLIMAT) as expected. In addition, the collocated inter-comparisons of TOVS-GPV with TOVS-CLIMAT, TOMS observations and Dobsometer observations are performed statistically. TOVS-GPV fields with TOMS observations show smaller bias relatively than TOVS-CLIMAT and also reduce the differences.

The Effect of Communication Distance and Number of Peripheral on Data Error Rate When Transmitting Medical Data Based on Bluetooth Low Energy (저 전력 블루투스 기반으로 의료데이터 전송 시 통신 거리와 연동 장치의 수가 데이터 손실률에 미치는 영향)

  • Park, Young-Sang;Son, ByeongJin;Son, Jaebum;Lee, Hoyul;Jeong, Yoosoo;Song, Chanho;Jung, Euisung
    • Journal of Biomedical Engineering Research
    • /
    • v.42 no.6
    • /
    • pp.259-267
    • /
    • 2021
  • Recently, the market for personal health care and medical devices based on Bluetooth Low Energy(BLE) has grown rapidly. BLE is being used in various medical data communication devices based on low power consumption and universal compatibility. However, since data errors occurring in the transmission of medical data can lead to medical accidents, it is necessary to analyze the causes of errors and study methods to reduce data error. In this paper, the minimum communication speed to be used in medical devices was set to at least 800 byte/sec based on the wireless electrocardiography regulations of the Ministry of Food and Drug Safety. And the data loss rate was tested when data was transmitted at a speed higher than 800 byte/sec. The factors that cause communication data error were classified, and the relationship between each factor and the data error rate was analyzed through experiments. When there were two or more activated peripherals connected to the central, data error occurred due to channel hopping and bottleneck, and the data error rate increased in proportion to the communication distance and the number of activated peripherals. Through this experiment, when the BLE is used in a medical device that intermittently transmits biosignal data, the risk of a medical accident is predicted to be low if the number of peripherals is 3 or less. But, it was determined that BLE would not be suitable for the development of a biosignal measuring device that must be continuously transmitted in real time, such as an electrocardiogram.

Correlation analysis of pollutants using IoT technology in LID facilities (LID 시설 내 IoT 기술을 활용한 오염물질 상관성 분석)

  • Jeon, Minsu;Choi, Hyeseon;kevin, Geronimo Franz;Reyes, N.J.DG.;Kim, Leehyung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.453-453
    • /
    • 2021
  • 도시지역 비점오염원관리, 물순환 회복, 침투 및 증발산량 증가, 열섬현상 저감을 위한 주요한 방안으로 저영향개발(low impact development, LID)과 그린인프라 기법의 적용되고 있다. LID 시설은 소규모 분산형 시설로써 넓은 지역에 많고 다양한 시설들이 적용되어 시설의 개수가 많으며, 수질 및 토양 내 기성제품에 대한 센서들의 가격은 고가로 형성되어 있어 기기의 경제성 및 유지관리 등 적용하는데 제한적이다. 따라서 과거 모니터링 자료를 기반으로 오염물질들과의 상관성 분석을 통하여 계측이 어려운 항목들을 계측가능한 항목들로부터 예측 가능하며, 선정된 항목들에 대한 비용효율적인 센서를 개발하여 실시간 LID 모니터링이 가능한 비용효율적 모니터링을 개발하였다. 공주대학교 천안캠퍼스의 LID 시설들은 2013년에 조성되어 현재까지 시설이 운영되고 있으며, 5년이상의 과거 강우시 모니터링 자료들을 이용하여 오염물질 상관성 분석을 수행가능 하기에 대상지로 선정하였다. 오염물질 상관성 분석은 2013년부터 2017년도에 침투도랑에서 수행된 강우시 모니터링 자료를 활용하여 각 오염물질들의 상관성을 분석을 수행하였다. 침투도랑 내 유입되는 평균 유입수는 TSS 286.1±318.3 mg/L, BOD 22.6±39.5 mg/L, TN 8.96±5.85 mg/L, TP 1.01±1.11 mg/L로 나타났다. 겨울철에 비해 여름철에서의 오염물질의 유입농도가 높은 것으로 분석되었다. 이는 여름철 고온건조로 인한 노면 내 차량의 주행으로 인한 중금속, 폐타이어 등과 장마철 강우 시 유출된 토사로 인하여 유입수의 농도가 높은 것으로 분석되었다. 오염물질 부하량은 TSS와 COD 0.66으로 유의성이 높은 것으로 나왔으며, COD와 TSS, TP, TN 등 유의성이 높은 것으로 분석되었다. Arduino와 Raspberry PI를 활용하여 저비용 센서와 LTE 모뎀통신과 데이터 베이스 연결하여 개발된 프로그램을 통해서 무선으로 LID 시설에 대한 모니터링을 침투화분2와 식생체류지에 조성하였다. 전력공급이 어려운 식생체류지의 경우 태양열(Solar system) 시스템과 보조 전력 배터리를 조성하여 장마철이나 장기적인 악천후로 인한 전력을 생산하지 못할 경우 보조전력배터리에서 전력을 제공하여 지속적인 모니터링이 이루어지도록 설계하였다. 토양함수량, 토양온도와 Conductivity 등 3종류의 센서를 적용하였으며, 프로그램은 현재 2단계를 통한 2차수정을 통하여 프로그램을 구축하였다. 오차, 오작동, 계측값에 대한 검·보정 작업이 필요하다. 또한 대기자료의 구축을 통해 보다 토양과 LID 시설에 대한 영향분석이 필요한 것으로 사료된다.

  • PDF

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.