• Title/Summary/Keyword: Remote Inspection System

Search Result 98, Processing Time 0.024 seconds

Implementation of an Expert System for COTS Fault Diagnosis (COTS 고장진단을 위한 전문가 시스템 구현)

  • Kim, A-Ram;Roh, Jin-Song;Rhee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.275-281
    • /
    • 2013
  • This space is for the of your study in English. If simple menu item changes or the addition of check items are necessary on GUI menu of existing test equipments for military facilities that are programmed by using RAD tools such as Visual C++, they should go through complex steps, such as numerous conducting steps, coding, flash design modification, recompiling and distribution. It is cumbersome process and waste much time. Also, on implementing them, it was worried about leaking secrets because a number of military security considerations were included. To solve such as the above problem, we proposed commercial RIA technologies and a COTS fault diagnostic knowledge-based system that implemented by the XML data design technique in this research. The proposed approach solves the problem of existing methods, reduced inspection time, and improved performance, usability, and maintainability.

Cloud Detection Using HIMAWARI-8/AHI Based Reflectance Spectral Library Over Ocean (Himawari-8/AHI 기반 반사도 분광 라이브러리를 이용한 해양 구름 탐지)

  • Kwon, Chaeyoung;Seo, Minji;Han, Kyung-Soo
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.5_1
    • /
    • pp.599-605
    • /
    • 2017
  • Accurate cloud discrimination in satellite images strongly affects accuracy of remotely sensed parameter produced using it. Especially, cloud contaminated pixel over ocean is one of the major error factors such as Sea Surface Temperature (SST), ocean color, and chlorophyll-a retrievals,so accurate cloud detection is essential process and it can lead to understand ocean circulation. However, static threshold method using real-time algorithm such as Moderate Resolution Imaging Spectroradiometer (MODIS), Advanced Himawari Imager (AHI) can't fully explained reflectance variability over ocean as a function of relative positions between the sun - sea surface - satellite. In this paper, we assembled a reflectance spectral library as a function of Solar Zenith Angle (SZA) and Viewing Zenith Angle (VZA) from ocean surface reflectance with clear sky condition of Advanced Himawari Imager (AHI) identified by NOAA's cloud products and spectral library is used for applying the Dynamic Time Warping (DTW) to detect cloud pixels. We compared qualitatively between AHI cloud property and our results and it showed that AHI cloud property had general tendency toward overestimation and wrongly detected clear as unknown at high SZA. We validated by visual inspection with coincident imagery and it is generally appropriate.

Development of Remote Mornitoring Web System for National Control Points using RFID Tags (RFID를 이용한 국가기준점 원격 모니터링 웹 시스템 개발)

  • Oh, Yoon-Seuk;Lee, Young-Kyun;Park, Jae-Min
    • Spatial Information Research
    • /
    • v.15 no.3
    • /
    • pp.237-249
    • /
    • 2007
  • There are about 22,000 national control points throughout this nation. However, in order to identify the location data of a national control point, a control point result table is needed. And although the control points are important national facilities, due to the fact that these points located at remote areas such as on top of mountains, the facilities are being maintained via on-site inspection without any protections around them. In this research, by taking the locations where the control points are placed into consideration, a specialized RFID tags that can be attached to the national control point's marker has been developed, and CDMA-ready PDA based mobile Web System and national control point control system are developed as well. With help of these systems, control point data can be checked at the seen, and national control point maintenance personnel can find out about maintenance status and keep track of usage record. When these systems are taken into effect, access to the national control point data becomes easy, fast response to the change in data can be possible, and management efficiency will go up. When the Ubiquitous society becomes reality, the importance of location information will be high. Therefore, national control points using above mentioned RFID tags will not only be useful to the control point users and maintenance personnels such as professional land surveyors, but also useful when providing location based services to people, and it will become an important national infrastructure in terms of providing absolute location information.

  • PDF

Development of a Facility Management System for Underground Conduits Using Web Technologies (웹 기술을 이용한 지하 공동구의 시설물 관리 시스템 개발)

  • Ku, Kyong-I;Kim, Ji-Yoon;Ahn, Hyo-Jin;Kim, Joo-Sung;Kang, Jae-Mo;Kim, Youug-Jin;Kim, Yoo-Sung
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.2 s.14
    • /
    • pp.29-38
    • /
    • 2005
  • Even though underground conduits have became important city-infra structures which should be exhaustively and efficiently managed, there is few systems which supports the well-defined facility management standards. Due to the lack of the supporting systems, experts must visit underground conduits scattered several cities over the country to see and check the status of the underground conduits including built-in facilities. This type of management gives us a little bit delayed status information at the end of so much time and money costs. In this paper, to solve this problem and manage the conduit synthetically, we developed a web-based facility management system for underground conduits by using information technologies. The developed management system has a simplified map drawing interface to depict the overall architectures and locations of underground conduits and their built-in facilities into sketch maps. And, the system uses the 3D panorama image technology with zooming functions in addition to still images and video images to give the feeling of a spot inspection. Moreover, since the system accumulates the data of repair/reinforcement, occasional inspections and safety diagnosis, conduit managers can synthetically and effectively manage the facilities within underground conduits and themselves.

  • PDF

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

Exploring the Independent Application of Elementary Information Education through Analysis of Digital Literacy in Elementary School Textbooks (초등 교과서의 디지털 리터러시 현황 분석을 통한 초등 정보 교과 독립 적용 탐구)

  • Sung, Young-Hoon
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.2
    • /
    • pp.265-277
    • /
    • 2021
  • With the development of technology, the concept of digital literacy is expanding from the focus of function and tool utilization to the extent of communication and participation in social and cultural contexts. In particular, learners' digital literacy capabilities are more important and necessary in remote learning environments such as Corona19. In this study, we studied how to improve digital literacy education through analysis and inspection of digital literacy shown in elementary school textbooks. To this end, we analyze it through compliance consisting of 8 fundamental pieces of knowledge, 20 sub technical skills, and 10 keys of competencies that constitute digital literacy. As a result of the study, the contents of digital literacy education in elementary school textbooks were presented centered on functions and tools, and as they were biased in certain areas, they were found to be lacking in systematicity and connectivity. Therefore, it proposed the composition of the curriculum system of digital literacy through the independence of elementary informatics curriculum, the specific composition of curriculum, and the strengthening of pre-service teachers' practical skills.

The Study on Design of lead monoxide based radiation detector for Checking the Position of a Radioactive Source in an NDT (비파괴검사 분야에서 방사선원의 위치 확인을 위한 산화납 기반 방사선 검출기 설계에 관한 연구)

  • Ahn, Ki-Jung
    • Journal of the Korean Society of Radiology
    • /
    • v.11 no.4
    • /
    • pp.183-188
    • /
    • 2017
  • In recent years, the automatic remote control controller of the gamma ray irradiator malfunctions, and radiation workers are continuously exposed to radiation exposure accidents. In the non-destructive testing field, much time and resources are invested in establishing a radioactive source monitoring system in order to prevent potential incidents of radiation. In this study, the gamma-ray response properties of the lead monoxide-based radiation detector were estimated through monte carlo simulation as a previous study for the development of a radioactive source location monitoring system that can be applied universally to various non-destructive testing equipment. As a result of the study, the optimized thickness of the radiation detector varies according to the gamma-ray energy emitted from the radioactive source, and the optimized thickness gradually increases with increasing energy. In conclusion, the optimized thickness of the lead monoxide-based radiation detector was $200{\mu}m$ for the Ir-192, $150{\mu}m$ for the Se-75 and $300{\mu}m$ for the Co-60. Based on these results, the appropriate thickness of lead monoxide-based radiation detector considering secondary-electron equilibrium was evaluated to be $300{\mu}m$ for general application. These results can be used as a basic data for determining the appropriate thickness required in the radiation detector when developing a radiation source location monitoring system for universal application to various non-destructive testing equipment in the future.

Creation of Actual CCTV Surveillance Map Using Point Cloud Acquired by Mobile Mapping System (MMS 점군 데이터를 이용한 CCTV의 실질적 감시영역 추출)

  • Choi, Wonjun;Park, Soyeon;Choi, Yoonjo;Hong, Seunghwan;Kim, Namhoon;Sohn, Hong-Gyoo
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_3
    • /
    • pp.1361-1371
    • /
    • 2021
  • Among smart city services, the crime and disaster prevention sector accounted for the highest 24% in 2018. The most important platform for providing real-time situation information is CCTV (Closed-Circuit Television). Therefore, it is essential to create the actual CCTV surveillance coverage to maximize the usability of CCTV. However, the amount of CCTV installed in Korea exceeds one million units, including those operated by the local government, and manual identification of CCTV coverage is a time-consuming and inefficient process. This study proposed a method to efficiently construct CCTV's actual surveillance coverage and reduce the time required for the decision-maker to manage the situation. For this purpose, first, the exterior orientation parameters and focal lengths of the pre-installed CCTV cameras, which are difficult to access, were calculated using the point cloud data of the MMS (Mobile Mapping System), and the FOV (Field of View) was calculated accordingly. Second, using the FOV result calculated in the first step, CCTV's actual surveillance coverage area was constructed with 1 m, 2 m, 3 m, 5 m, and 10 m grid interval considering the occluded regions caused by the buildings. As a result of applying our approach to 5 CCTV images located in Uljin-gun, Gyeongsnagbuk-do the average re-projection error was about 9.31 pixels. The coordinate difference between calculated CCTV and location obtained from MMS was about 1.688 m on average. When the grid length was 3 m, the surveillance coverage calculated through our research matched the actual surveillance obtained from visual inspection with a minimum of 70.21% to a maximum of 93.82%.