• Title/Summary/Keyword: network based system monitoring

Search Result 1,160, Processing Time 0.034 seconds

A Study on Deep Learning-based Pedestrian Detection and Alarm System (딥러닝 기반의 보행자 탐지 및 경보 시스템 연구)

  • Kim, Jeong-Hwan;Shin, Yong-Hyeon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.4
    • /
    • pp.58-70
    • /
    • 2019
  • In the case of a pedestrian traffic accident, it has a large-scale danger directly connected by a fatal accident at the time of the accident. The domestic ITS is not used for intelligent risk classification because it is used only for collecting traffic information despite of the construction of good quality traffic infrastructure. The CNN based pedestrian detection classification model, which is a major component of the proposed system, is implemented on an embedded system assuming that it is installed and operated in a restricted environment. A new model was created by improving YOLO's artificial neural network, and the real-time detection speed result of average accuracy 86.29% and 21.1 fps was shown with 20,000 iterative learning. And we constructed a protocol interworking scenario and implementation of a system that can connect with the ITS. If a pedestrian accident prevention system connected with ITS will be implemented through this study, it will help to reduce the cost of constructing a new infrastructure and reduce the incidence of traffic accidents for pedestrians, and we can also reduce the cost for system monitoring.

Secure Disjointed Multipath Routing Scheme for Multimedia Data Transmission in Wireless Sensor Networks (무선 센서 네트워크 환경에서 멀티미디어 데이터 전송을 위한 보안성 있는 비-중첩 다중 경로 라우팅 기법)

  • Lee, Sang-Kyu;Kim, Dong-Joo;Park, Jun-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.60-68
    • /
    • 2012
  • In recent years, the requirements on the high quality environment monitoring by using the sensor nodes which can handle the multimedia data in WSN have been increased. However, because the volume of multimedia data is tremendous, the limited bandwidth of a wireless channel may incur the bottleneck of a system. To solve such a problem, most of the existing distributed multi-path routing protocols based on multimedia data just focused on overcoming the limited bandwidth in order to enhance the energy efficiency and the transmission rate. However, because the existing methods can not apply a key-based technique to encrypt the multimedia data, they are very weak for the security. In this paper, we propose a secure disjointed multipath routing scheme for multimedia data transmission. Since our proposed scheme divides multimedia data(eg. image) into pixels and sends them through disjointed multipath routing, it can provide security to the whole network without using the key-based method. Our experimental results show that our proposed scheme reduces about 10% the amount of the energy consumption and about 65% the amount of the missed data packets caused by malicious nodes over the existing methods on average.

Vulnerability Assessment of Total Pollution Load Management System in the Guem River Basin National Monitoring Data (수질오염총량 측정망 자료를 활용한 금강수계 오염총량관리 취약성 평가)

  • Sang-Jun Lim;Dongil Seo
    • Journal of Environmental Impact Assessment
    • /
    • v.33 no.5
    • /
    • pp.228-251
    • /
    • 2024
  • It is clear that the implementation of Total Pollution Load Management (TPLM) has contributed to the improvement of river water quality in Korea. However, it is also true that the TPLM has focused on point source pollution management, with limitations in addressing non-point source pollution. This study examined the issues of the current TPLM from the perspective of non-point source pollution, which is closely related to high-flow conditions, by analyzing Load Duration Curves (LDC) using water quality and flow data collected over the past four years from 21 sub-watersheds in the Geum River Basin. Since the current TPLM is based on water quality predictions using a static water body model that applies the average flow of the dry season, we found that the reduction in loads required under actual flow conditions could be up to 140 times greater than under the reference flow condition, indicating that load amounts under high-flow conditions are not reflected. Additionally, there were abnormal correlations between discharge loads and water quality in several sub-watersheds, and illogical situations arose where compliance with allocated loads did not align with achieving the target water quality. While the causes of such abnormal and illogical situations are diverse and complex, this study highlights the need for rational reflection of non-point source loads under high-flow conditions in water quality modeling. As a solution, we propose the application of watershed models and dynamic water body models.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.

A Study of Measuring Traffic Congestion for Urban Network using Average Link Travel Time based on DTG Big Data (DTG 빅데이터 기반의 링크 평균통행시간을 이용한 도심네트워크 혼잡분석 방안 연구)

  • Han, Yohee;Kim, Youngchan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.5
    • /
    • pp.72-84
    • /
    • 2017
  • Together with the Big Data of the 4th Industrial Revolution, the traffic information system has been changed to an section detection system by the point detection system. With DTG(Digital Tachograph) data based on Global Navigation Satellite System, the properties of raw data and data according to processing step were examined. We identified the vehicle trajectory, the link travel time of individual vehicle, and the link average travel time which are generated according to the processing step. In this paper, we proposed a application method for traffic management as characteristics of processing data. We selected the historical data considering the data management status of the center and the availability at the present time. We proposed a method to generate the Travel Time Index with historical link average travel time which can be collected all the time with wide range. We propose a method to monitor the traffic congestion using the Travel Time Index, and analyze the case of intersections when the traffic operation method changed. At the same time, the current situation which makes it difficult to fully utilize DTG data are suggested as limitations.

Frequency Domain Pattern Recognition Method for Damage Detection of a Steel Bridge (강교량의 손상감지를 위한 주파수 영역 패턴인식 기법)

  • Lee, Jung Whee;Kim, Sung Kon;Chang, Sung Pil
    • Journal of Korean Society of Steel Construction
    • /
    • v.17 no.1 s.74
    • /
    • pp.1-11
    • /
    • 2005
  • A bi-level damage detection algorithm that utilizes the dynamic responses of the structure as input and neural network (NN) as pattern classifier is presented. Signal anomaly index (SAI) is proposed to express the amount of changes in the shape of frequency response functions (FRF) or strain frequency response function (SFRF). SAI is calculated using the acceleration and dynamic strain responses acquired from intact and damaged states of the structure. In a bi-level damage identification algorithm, the presence of damage is first identified from the magnitude of the SAI value, then the location of the damage is identified using the pattern recognition capability of NN. The proposed algorithm is applied to an experimental model bridge to demonstrate the feasibility of the algorithm. Numerically simulated signals are used for training the NN, and experimentally-acquired signals are used to test the NN. The results of this example application suggest that the SAI-based pattern recognition approach may be applied to the structural health monitoring system for a real bridge.

Comparison of The Importance of Evaluation Items for Landscape Performance and Sustainability Using Analytic Network Process (ANP) (ANP기법을 이용한 조경성능 및 친환경 평가항목 중요도 비교)

  • Ryu, Myeung-Ji;Lee, Hyung-Sook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.6
    • /
    • pp.45-52
    • /
    • 2019
  • As international criteria and standards are required in the fields of design and construction, landscape performance must also be considered not only for the value of the landscape but also for providing quality assurance and sustainability. Given the lack of research on landscape performance, the present research was purposed to analyze the importance of potential assessment categories and items using an analytical network process. A list of assessment items, which is composed of 20 items and 6 categories, was derived through a literature review and a preliminary survey of 11 landscape professionals. An ANP model was established and a survey was conducted among 30 landscape practitioners to determine the weight of priorities considering the criteria. The results of ANP showed that the categories of site selection, preservation and health, and convenience had high priorities while materials had the lowest importance score. For the assessment items, a monitoring plan was the highest importance, followed by cultural/ historic preservation, management cost reduction, and natural ground areas. Despite the difficulties in quantifying landscape achievements, most respondents agreed that there needs to be an evaluation system for landscape performance in order to assure the quality and sustainability of landscape development. More research and discussion are needed to develop an assessment system for landscape performance that is applicable to Korean context.

A Network Module and a Web Server for Web-based Remote Control of Embedded Systems (웹 기반 원격 제어를 위한 내장형 시스템용 네트워크 모듈 및 웹 서버)

  • 선동국;김성조;이재호;김선자
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.231-242
    • /
    • 2004
  • Remote control and monitoring of information appliances require RTOS and TCP/IP network module to communicate each other. Traditional TCP/IP protocol stacks, however, require relatively large resources to be useful in small 8 or 16-bit systems both in terms of code size and memory usage. It motivates design and implementation of micro TCP/IP that is lightweight for embedded systems. Micro embedded web server is also required to control and monitor information appliances through the Web. In this paper, we design and implement micro TCP/IP and Web server for information appliances. For this goal, we investigate requirements for the interoperability of embedded systems with the Internet and the Web-based control of embedded systems. Next, we compare our micro TCP/IP protocol stack with that of RTIP and QPlus in terms of object code size and performance. The size of micro TCP/IP protocol stack can be reduced by 3/2 and 1/4, respectively, comparing with that of RTIP and QPlus. We also show that the performance of our micro TCP/IP is similar to that of RTIP and QPlus since it handles 2.9Mbps when delayed ACK is not adapted.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

Web-based Measurement of ECU Signals on Vehicle using Embedded Linux

  • Choi, Kwang-Hun;Lee, Lee;Lee, Young-Choon;Kwon, Tae-Kyu;Lee, Seong-Cheol
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.138-142
    • /
    • 2004
  • In this paper, we present a new method for monitoring of ECU's sensor signals of vehicle. In order to measure the ECU's sensor signals, the interfaced circuit is designed to communicate ECU and the Embedded Linux is used to monitor communication result through Web the Embedded Linux system and this system is said "ECU Interface Part". In ECU Interface Part the interface circuit is designed to match voltage level between ECU and SA-1110 micro controller and interface circuit to communicate ECU according to the ISO, SAE communication protocol standard. Because Embedded Linux does not allow to access hardware directly in application level, anyone who wants to modify any low level hardware must develop device driver. To monitor ECU's sensor signals the most important thing is to match serial level between ECU and ECU Interface Part. It means to communicate correctly between two hardware we need to match voltage and signal level, and need to match baudrate. The voltage of SA-1110 is 0 ${\sim}$ +3.3V and ECU is 0 ${\sim}$ +12V and, ECU's communication Line K does multiple operation so, the interface circuit is used to match voltage and signal level. In Addition to ECU's baudrate is 10400bps, it's not standard baudrate in computer environment. So, we need to develop a device driver to control the interface circuit, and change baudrate. To monitor ECU's sensor signals through web there's a network socket program is working in Embedded Linux. It works as server program and manages user's connections and commands. Anyone who wants to monitor ECU's sensor signals he just only connect to Embedded Linux system with web browser then, Embedded Linux webserver will return the ActiveX webbased measurement software. It works in web browser and inits ECU, as a result it returns sensor signals through web. All the programs are developed with GCC(GNU C Compiler) and, webbased measurement software is developed with Borland C++ Builder.

  • PDF