• Title/Summary/Keyword: Tracking Location

Search Result 906, Processing Time 0.023 seconds

Development of Location/Safety Tracking System for Construction Site Workers by Using MEMS Sensors (MEMS 센서를 활용한 건설현장 작업자 위치/안전 정보 추적 시스템 개발)

  • Kim, Jin-Young;Ahn, Sung-Soo;Kang, Joon-Hee
    • 전자공학회논문지 IE
    • /
    • v.49 no.1
    • /
    • pp.12-17
    • /
    • 2012
  • Fast development of ubiquitous technology prompted the broadening of the related application area. Application of ubiquitous techniques and system into the construction sites may give us many benefits. There are always a lot of hazard situations in construction sites, and the falling is known to have the high accident rate. To prevent the falling, there has been a lot of efforts including safety education and use of safety gears. In this study, we designed, fabricated and tested a system that can monitor the worker's safety and location informations in real time by using the wireless technology of TOA and RSSI. We used ATmegal28 that is popular in the industrial equipments as MCU and NanoPan 5357 module from Nanotron and CC2500 chipset from TI for radio circuits. We also used 3-axis accelerometer and pressure MEMS sensors to obtain the environmental information, and therefore to aquire the informations of the worker's movement and altitude. We used Labview software from National Instrument to monitor and control the system. We developed the system to send the warning alarms to the server operator and the workers when the workers in the danger zone did not wear the safety hook.

A Study on Implementation Integrated Operation & Management System for Intermodal Connectivity Center (복합환승센터 통합운영시스템 구축방안에 관한 연구)

  • Kim, Sung-Eun;Lim, Jung-Sil;Moon, Young-Jun;Oh, Jae-Hak;Lee, Won-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.24-35
    • /
    • 2011
  • This paper demonstrates a methodology of integrated operation and management system for intermodal connectivity center (ICC), which is planning to be build up as a large scale public transit facilities for green growth strategy by the national government. The ICC needs to be capable of providing the integrated location based information for the public transit users in terms of collaborating a variety of transit modes and complex facility in a large scale center. Recently, the upcoming information and communication technologies enable to come up with real time information provision on nomadic and portable devices, i.e. smart phones and/or tablet PCs, as what the users actually need to get on demand. In order to provide the public transit users in ICC with the integrated information on their smart phones for example, the integrated operation and management system plays a key role to collect the data utilizing the wireless communication with real time location tracking and to manage them to be effective and operational sources for applicable personalized services. Thus, this paper defines a type of services, subsystems, and relevant technologies for the system integration so called a "Smart Garatagi Service" and shows a filed test demonstration case in the existing airport terminal, Gimpo Domestic.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

Tag Trajectory Generation Scheme for RFID Tag Tracing in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 RFID 태그 추적을 위한 태그 궤적 생성 기법)

  • Kim, Jong-Wan;Oh, Duk-Shin;Kim, Kee-Cheon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One of major purposes of a RFID system is to track moving objects using tags attached to the objects. Because a tagged object has both location and time information expressed as the location of the reader, we can index the trajectory of the object like existing spatiotemporal objects. More efficient tracking may be possible if a spatiotemporal trajectory can be formed of a tag, but there has not been much research on tag trajectory indexes. A characteristic that distinguishes tags from existing spatiotemporal objects is that a tag creates a separate trajectory in each reader by entering and then leaving the reader. As a result, there is a trajectory interruption interval between readers, in which the tag cannot be located, and this makes it difficult to track the tag. In addition, the point tags that only enter and don't leave readers do not create trajectories, so cannot be tracked. To solve this problem, we propose a tag trajectory index called TR-tree (tag trajectory R-tree in RFID system) that can track a tag by combining separate trajectories among readers into one trajectory. The results show that TR-tree, which overcomes the trajectory interruption superior performance than TPIR-tree and R-tree.

Evaluation of Angle Dependence on Positional Radioisotope Source Detector using Monte Carlo Simulation in NDT (몬테카를로 시뮬레이션을 이용한 방사선원 위치 검출기의 각도의존성 연구)

  • Han, Moojae;Heo, Seunguk;Shin, Yohan;Jung, Jaehoon;Kim, Kyotae;Heo, Yeji;Lee, Deukhee;Cho, Heunglae;Park, Sungkwang
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.1
    • /
    • pp.141-146
    • /
    • 2019
  • Radiation sources used in the field of industrial non-destructive pose a risk of exposure due to ageing equipment and operator carelessness. Thus, the need for a safety management system to trace the location of the source is being added. In this study, Monte Carlo Simulation was performed to analyse the angle dependence of the unit-cell comprising the line-array dosimeter for tracking the location of radiation sources. As a result, the margin of error for the top 10% of each slope was 5.90% at $0^{\circ}$, 8.08% at $30^{\circ}$, and 20.90% at $60^{\circ}$. The ratio of the total absorbed dose was 83.77% at $30^{\circ}$ and 53.36% at $60^{\circ}$ based on $0^{\circ}$(100%) and showed a tendency to decrease with increasing slope. For all gradients, the maximum number was shown at $30^{\circ}$ No. 9 pixels, and for No. 10, there was a tendency to drop 7.24 percent. This study has shown a large amount of angle dependence, and it is estimated that the proper distance between the source and line-array dosimeters should be maintained at a distance of not less than 1 cm to reduce them.

A Study on the Methodology for Analyzing the Effectiveness of Traffic Safety Facilities Using Drone Images (드론 영상기반 교통안전시설 효과분석 방법론 연구)

  • Yong Woo Park;Yang Jung Kim;Shin Hyoung Park
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.5
    • /
    • pp.74-91
    • /
    • 2023
  • Several that analyzed the effectiveness of traffic safety facilities a method of comparing changes in the number of accidents, accident severity, speed through traffic accident data before and after installation or speed data collected from vehicle detection systems (VDS). , when traffic accident data is used, it takes a long time to collect because must be collected for at least one year before and after installation. , the road environment may change during this period, such as the addition of other traffic safety facilities in addition to the facilities to be analyzed. , the location of the VDSs for speed data is often different from the location where analysis is required, and there is a problem in that the investigators are exposed to the risk of traffic accident during on-site investigation. Therefore, this study a case study by establishing a methodology to determine effectiveness video images with a drone, extracting data using a program, and comparing vehicle driving speeds before and after speed reduction facilities. Vehicle speed surveys using drones are much safer than observational surveys conducted on highways and have the advantage of tracking speed changes along the vehicle, it is expected that they will be used for various traffic surveys in the future.

A method for localization of multiple drones using the acoustic characteristic of the quadcopter (쿼드콥터의 음향 특성을 활용한 다수의 드론 위치 추정법)

  • In-Jee Jung;Wan-Ho Cho;Jeong-Guon Ih
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.3
    • /
    • pp.351-360
    • /
    • 2024
  • With the increasing use of drone technology, the Unmanned Aerial Vehicle (UAV) is now being utilized in various fields. However, this increased use of drones has resulted in various issues. Due to its small size, the drone is difficult to detect with radar or optical equipment, so acoustical tracking methods have been recently applied. In this paper, a method of localization of multiple drones using the acoustic characteristics of the quadcopter drone is suggested. Because the acoustic characteristics induced by each rotor are differentiated depending on the type of drone and its movement state, the sound source of the drone can be reconstructed by spatially clustering the results of the estimated positions of the blade passing frequency and its harmonic sound source. The reconstructed sound sources are utilized to finally determine the location of multiple-drone sound sources by applying the source localization algorithm. An experiment is conducted to analyze the acoustic characteristics of the test quadcopter drones, and the simulations for three different types of drones are conducted to localize the multiple drones based on the measured acoustic signals. The test result shows that the location of multiple drones can be estimated by utilizing the acoustic characteristics of the drone. Also, one can see that the clarity of the separated drone sound source and the source localization algorithm affect the accuracy of the localization for multiple-drone sound sources.

Authentication Protocol of Private Code-based for Advanced Security of RFID System (RFID 시스템 보안 강화를 위한 비공개 코드 기반의 인증 프로토콜)

  • Jang, Bong-Im;Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.737-744
    • /
    • 2010
  • The use of RFID recently tends to increase and is expected to expand all over the industry and life. However, RFID is much vulnerable to the malign threats such as eavesdropping, replay attack, spoofing attack, location tracking in the process of authentication. In particular, it is difficult to apply authentication protocol used in the other previous system to low-priced RFID tag. After all, this paper suggests the scheme of efficient authentication protocol for RFID privacy protection. Compared to the previous scheme, suggested scheme reinforces the checking process of transmission data and is secure from eavesdropping and spoofing attack. It minimizes the operation work of the tag and is very useful to apply to the low-priced tag. It also has the merit to confirm the efficiency of communication by reducing the communication rounds.

A Method on the Implementation of Intelligent Security Service Application based on Spatial Information (공간정보기반 지능형 방범서비스 어플리케이션 개발)

  • Choi, Woo Chul;Na, Joon Yeop
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.89-98
    • /
    • 2015
  • In this study, The criteria for assessing the security-related functions and services using spatial information is deduced, and orders of priority a priority for the applicable alternatives of functions/services of intelligent security service application based on spatial information are suggested by calculating relative importance. Also this study suggested connection plan about service implementation of national security services by government ministry & local government. And, the intelligent security app service model which has possible substantiation and commercialization is proposed. This study performed the AHP as the final assessment criterions by 3 item in 1st class and 12 item in 2nd class. And, tried to implementation methods of the intelligent security service application(ex. control of emergency and the crime opportunity, real-time location tracking of protector, the device for missing child & dementia patient, user participation & provision of information).

Improved Dynamic Window Approach With Path-Following for Unmanned Surface Vehicle (무인수상정을 위한 경로선 추종이 가능한 개선된 Dynamic Window Approach)

  • Kim, Hyogon;Yun, Sung-Jo;Choi, Young-Ho;Lee, Jung-Woo;Ryu, Jae-KWan;Won, Byong-Jae;Suh, Jin-Ho
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.5
    • /
    • pp.295-301
    • /
    • 2017
  • Recently, autonomous navigation technology, obstacle recognition, and obstacle collision avoidance technology are actively being developed for an unmanned surface vehicle (USV). The path to move from the current location to the destination should be planned, in order for an USV to autonomously operate safely to its destination. The dynamic window approach (DWA) is a well-known navigation scheme as a local path planning. The DWA algorithm derives the linear velocity and angular velocity by evaluating the destination direction, velocity, and distance from the obstacle. However, because DWA algorithm does not consider tracking the path, when using only the DWA algorithm, the ship may navigate away from the path line after avoiding obstacles. In this paper, we propose an improved DWA algorithm that can follow path line. And we implemented the simulation and compared the existing DWA algorithm with the improved DWA algorithm proposed in this paper. As a result, it is confirmed that the proposed DWA algorithm follows the path line better.