• Title/Summary/Keyword: Vulnerable Time

Search Result 725, Processing Time 0.027 seconds

Developing Coast Vulnerable Area Information Management System using Web GIS (Web GIS를 이용한 연안위험취약지역 정보시스템 구축)

  • Pak, Hyeon-Cheol;Kim, Hyoung-Sub;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.4
    • /
    • pp.155-164
    • /
    • 2005
  • The coast has been known as very vulnerable area. This area has nature disasters such as typhoon, tidal wave, flood and storm almost every year. In this study, coast vulnerable area information management system was developed to manage the coastal facilities and vulnerable area through Web GIS. This system is able to visualize the damage area and support the official work related to coast as efficient DSS(Decision Supporting System). Moreover, the foundation for domestic coast information management is expected by acquiring less cost and time. For this, GIS DB was first constructed by acquiring damage factor data such as typhoon, tidal wave, flood and storm. Then GIS analysis methods and high resolution satellite images are used to possibly present the results of retrieve as table, map, graph, inundation simulation in real time.

  • PDF

Automatic Vehicle Delivery Algorithm to reflect time complexity for the Transportation Vulnerable (교통약자를 위한 시간 복잡도를 반영한 자동배차 알고리즘)

  • Park, Hyungsoo;Kim, Hoonki;Kim, Youngseong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.43-51
    • /
    • 2017
  • Since Korea joined the ranks of the developed countries, the interests in people with disabilities are rising. In particular, as disabled people become more active, to improve the transportation vulnerable's the right of movement have been required more strongly. Thus each municipality has been various efforts to do this. In this study we provide a understanding of each local government authority status which associated with operation of special transport systems, a call-taxi for transportation vulnerable and investigate the implementation status of mobility support system for traffic vulnerable which provided with automatic vehicle delivery. Also, with identification of automatic vehicle delivery problems the system, we design and implement a best-effort automatic vehicle delivery algorithm to improve these problems. Algorithm proposed in this study actually applied to commercial system of local governments to resolve the existing problems and to check to operate normally. The results are expected to provide to more exact and faster automatic vehicle delivery to transportation vulnerable and to improve the convenience of transportation vulnerable's movement.

Executable Code Sanitizer to Strengthen Security of uC/OS Operating System for PLC (PLC용 uC/OS 운영체제의 보안성 강화를 위한 실행코드 새니타이저)

  • Choi, Gwang-jun;You, Geun-ha;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.365-375
    • /
    • 2019
  • A PLC (Programmable Logic Controller) is a highly-reliable industrial digital computer which supports real-time embedded control applications for safety-critical control systems. Real-time operating systems such as uC/OS have been used for PLCs and must meet real-time constraints. As PLCs have been widely used for industrial control systems and connected to the Internet, they have been becoming a main target of cyberattacks. In this paper, we propose an execution code sanitizer to enhance the security of PLC systems. The proposed sanitizer analyzes PLC programs developed by an IDE before downloading the program to a target PLC, and mitigates security vulnerabilities of the program. Our sanitizer can detect vulnerable function calls and illegal memory accesses in development of PLC programs using a database of vulnerable functions as well as the other database of code patterns related to pointer misuses. Based on these DBs, it detects and removes abnormal use patterns of pointer variables and existence of vulnerable functions shown in the call graph of the target executable code. We have implemented the proposed technique and verified its effectiveness through experiments.

Vulnerable Analysis of Emergency Medical Facilities based on Accessibility to Emergency Room and 119 Emergency Center (응급실과 119 안전센터의 접근성을 고려한 응급의료 취약지 분석)

  • Jeon, Jeongbae;Park, Meejeong;Jang, Dodam;Lim, Changsu;Kim, Eunja
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.4
    • /
    • pp.147-155
    • /
    • 2018
  • The purpose of this study was to identify vulnerable area of emergency medical care. In the existing method, the emergency medical vulnerable area is set as an area that can not reach the emergency room within 30 minutes. In this study, we set up an area that can not reach within 30 minutes including the accessibility of 119 emergency center. To accomplish this, we obtained information on emergency room and 119 emergency center through Open API and constructed road network using digital map to perform accessibility analysis. As a result, 509 emergency room are located nationwide, 78.0% of them are concentrated in the region, 1,820 emergency center are located, and 61.0% of them are located in rural areas. The average access time from the center of the village to the emergency room was analyzed as 15.3 minutes, and the average access time considering the 119 emergency center was 21.8 minutes, 6.5 minutes more. As a result of considering the accessibility of 119 emergency center, vulnerable areas increased by 2.5 times, vulnerable population increased by 2.0 times, and calculating emergency medical care vulnerable areas, which account for more than 30% of the urban unit population, it was analyzed that it increased from 17 to 34 cities As a further study, it will be necessary to continuously monitor and research the real-time traffic information, medical personnel, medical field, and ambulance information to reflect the reality and to diagnose emergency medical care in the future.

A Priority Signal Control Strategy for Vulnerable Considering Traffic Flow - Focusing on crosswalks in coordinated arterial sections - (교통흐름을 고려한 교통약자 우선신호 운영방안 연구 -연동화 가로구간내 횡단보도를 대상으로-)

  • Ryu, Junil;Kim, Wonchul;Kim, Hyoungchul
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.4
    • /
    • pp.12-19
    • /
    • 2014
  • A signal plan focused on vehicle traffic could easily overlook vulnerable priority signals, although the importance of vulnerable movements is increasingly recognized in recent years. Especially, the vulnerable are sometimes faced with dangerous situations when crossing roads with a signal plan based on design values of average, non-vulnerable persons. This study is focused on how to minimize the vehicle delay while simultaneously considering traffic flow and providing traffic safety by increasing road crossing time for pedestrians. For this purpose, a priority signal control strategy for the vulnerable, considering vehicle traffic flow, has been tested. Practical implication and a microscopic computer simulation has shown that the proposed method could provide a small decrease (about 6.2%) in pedestrian delay, a small increase (about 8.5~13.3%) in travel speed of passing traffic, and a considerable decrease (16.2~26.9%) in vehicle travel time. These findings suggest that the proposed signal control strategy could increase pedestrian safety and diminish delay of vehicle travel.

An Exploratory Study on the Analysis of Characteristics of Pedestrian Accident Vulnerable Points using Road View: Focusing on Sasang-gu, Busan (로드뷰를 활용한 보행자 사고 취약 지점 특징 분석 탐색적 연구: 부산광역시 사상구를 중심으로)

  • Dong Kyu Lee;Jae Seon Kim;Kyung Soo Pyo;Min Kim
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.2
    • /
    • pp.351-368
    • /
    • 2024
  • Purpose: In general, traffic accidents occur sporadically, so there are various limitations in terms of time and cost when conducting field investigations to prepare prevention and prevention measures. In particular, with the transition to a non-face-to-face society after the COVID-19, there is a greater need to prepare a replacement for field surveys. Therefore, in this study, Roadview provided by various websites was used as an alternative to field surveys in Sasang-gu, Busan City. The possibility was evaluated. Method: The research method was to extract vulnerable points for traffic accidents that occurred between 2016 and 22 and analyze road views based on the field survey evaluation items provided in the Traffic Safety Diagnosis Guidelines. Result: The main result was that Sasang-gu was most vulnerable to accidents involving elderly pedestrians at Sasang-ro, Daedong-ro, and Hakjang-ro. As a result of a detailed analysis of vulnerable points through Road View, Sasang-ro needed control of commercial vehicles and protection of the transportation vulnerable in the market commercial area. Daedong-ro was vulnerable to illegal on-street parking and slope merging sections, and Hakjang-ro was vulnerable to roads that were prone to speeding. When evaluating the possibility of replacing Roadview's field survey based on the results of this analysis, Roadview was able to effectively evaluate most items, such as separation of sidewalks and the location and spacing of safety facilities. However, there were limitations in items such as actual measurement performance. Conclusion: In other words, the road view can replace most field surveys, and the actual measurement evaluation items can be judged to be useful as auxiliary data, resulting in time and cost savings and high efficiency.

Performance-based framework for soil-structure systems using simplified rocking foundation models

  • Smith-Pardo, J. Paul
    • Structural Engineering and Mechanics
    • /
    • v.40 no.6
    • /
    • pp.763-782
    • /
    • 2011
  • Results from nonlinear time-history analyses of wall-frame structural models indicate that the condition of vulnerable foundations -for which uplifting and reaching the bearing capacity of the supporting soil can occur before yielding at the base of the shear walls- may not be necessarily detrimental to the drift response of buildings under strong ground motions. Analyses also show that a soil-foundation system can inherently have deformation capacity well in excess of the demand and thus act as a source of energy dissipation that protects the structural integrity of the shear walls.

Numerical Studies on the Structural-health Evaluation of Subway Stations based on Statistical Pattern Recognition Techniques (패턴인식 기반 역사 구조건전성 평가기법 개발을 위한 수치해석 연구)

  • Shin, Jeong-Ryol;An, Tae-Ki;Lee, Chang-Gil;Park, Seung-Hee
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1735-1741
    • /
    • 2011
  • The safety of station structures among railway infrastructures should be considered as a top priority because hundreds of thousands passengers a day take a subway. The station structures, which have been being operated since the 1970s, are especially vulnerable to the earthquake and long-term vibrations such as ambient train vibrations as well. This is why the structural-health monitoring system of station structures should be required. For these reason, Korean government has made an effort to develop the structural health-monitoring system of them, which can evaluate the health-state of station structures as well as can monitor the vulnerable structural members in real-time. Then, through the monitoring system, the vulnerable structural members could be retrofitted. For the development of health-state evaluation method for station structures with the real-time sensing data measured in the fields, authors carried out the numerical simulations to develop evaluation algorithms based on statistical pattern recognition techniques. In this study, the dynamic behavior of Chungmuro station in Seoul was numerically analyzed and then critical members were chosen. Damages were artificially simulated at the selected critical members of the numerical model. And, the supervised and unsupervised learning based pattern recognition algorithms were applied to quantify and localize the structural defects.

  • PDF

A Consecutive Motion and Situation Recognition Mechanism to Detect a Vulnerable Condition Based on Android Smartphone

  • Choi, Hoan-Suk;Lee, Gyu Myoung;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.16 no.3
    • /
    • pp.1-17
    • /
    • 2020
  • Human motion recognition is essential for user-centric services such as surveillance-based security, elderly condition monitoring, exercise tracking, daily calories expend analysis, etc. It is typically based on the movement data analysis such as the acceleration and angular velocity of a target user. The existing motion recognition studies are only intended to measure the basic information (e.g., user's stride, number of steps, speed) or to recognize single motion (e.g., sitting, running, walking). Thus, a new mechanism is required to identify the transition of single motions for assessing a user's consecutive motion more accurately as well as recognizing the user's body and surrounding situations arising from the motion. Thus, in this paper, we collect the human movement data through Android smartphones in real time for five targeting single motions and propose a mechanism to recognize a consecutive motion including transitions among various motions and an occurred situation, with the state transition model to check if a vulnerable (life-threatening) condition, especially for the elderly, has occurred or not. Through implementation and experiments, we demonstrate that the proposed mechanism recognizes a consecutive motion and a user's situation accurately and quickly. As a result of the recognition experiment about mix sequence likened to daily motion, the proposed adoptive weighting method showed 4% (Holding time=15 sec), 88% (30 sec), 6.5% (60 sec) improvements compared to static method.

Vision and Lidar Sensor Fusion for VRU Classification and Tracking in the Urban Environment (카메라-라이다 센서 융합을 통한 VRU 분류 및 추적 알고리즘 개발)

  • Kim, Yujin;Lee, Hojun;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.4
    • /
    • pp.7-13
    • /
    • 2021
  • This paper presents an vulnerable road user (VRU) classification and tracking algorithm using vision and LiDAR sensor fusion method for urban autonomous driving. The classification and tracking for vulnerable road users such as pedestrian, bicycle, and motorcycle are essential for autonomous driving in complex urban environments. In this paper, a real-time object image detection algorithm called Yolo and object tracking algorithm from LiDAR point cloud are fused in the high level. The proposed algorithm consists of four parts. First, the object bounding boxes on the pixel coordinate, which is obtained from YOLO, are transformed into the local coordinate of subject vehicle using the homography matrix. Second, a LiDAR point cloud is clustered based on Euclidean distance and the clusters are associated using GNN. In addition, the states of clusters including position, heading angle, velocity and acceleration information are estimated using geometric model free approach (GMFA) in real-time. Finally, the each LiDAR track is matched with a vision track using angle information of transformed vision track and assigned a classification id. The proposed fusion algorithm is evaluated via real vehicle test in the urban environment.