• Title/Summary/Keyword: real events

Search Result 727, Processing Time 0.025 seconds

A Design and Implementation of Security Image Information Search Service System using Location Information Based RSSI of ZigBee (ZigBee의 RSSI 위치정보기반 보안 영상정보 검색 시스템 설계 및 구현)

  • Kim, Myung-Hwan;Chung, Yeong-Jee
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.243-258
    • /
    • 2011
  • With increasing interest in ubiquitous computing technology, an infrastructure for the short-distance wireless communication has been extended socially, bringing spotlight to the security system using the image or location. In case of existing security system, there have been issues such as the occurrences of blind spots, difficulty in recognizing multiple objects and storing of the unspecified objects. In order to solve this issue, zone-based location-estimation search system for the image have been suggested as an alternative based on the real-time location determination technology combined with image. This paper intends to suggest the search service for the image zone-based location-estimation. For this, it proposed the location determination algorism using IEEE 802.15.4/ZigBee's RSSI and for real-time image service, the RTP/RTCP protocol was applied. In order to combine the location and image, at the event of the entry of the specified target, the record of the time for image and the time of occurrence of the event on a global time standard, it has devised a time stamp, applying XML based meta data formation method based on the media's feature data based in connection with the location based data for the events of the object. Using the proposed meta data, the service mode which can search for the image from the point in time when the entry of the specified target was proposed.

A Real-time Monitoring and Modeling of Turbidity Flow into a Reservoir (실시간 저수지 탁수 감시 및 예측 모의)

  • Chung, Se-Woong;Ko, Ick-Hwan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.1184-1188
    • /
    • 2005
  • The impacts of turbidity flow induced by summer rainfall events on water supply, aquatic ecosystems, and socioeconomics are significant and major concerns in most of reservoirs operations. As a decision support tool, the real-time turbidity flow monitoring and modeling system RTMMS is under development using a laterally integrated two-dimensional (2D) hydrodynamic and water quality model. The objectives of this paper is to present the preliminary field observation results on the characteristics of rainfall-induced turbidity flows and their density flow regimes, and the model performance in replicating the fate and transport of turbidity plume in a reservoir. The rainfall-induced turbidity flows caused significant drop of river water temperature by 5 to $10^{\circ}C$ and resulted in density differences of 1.2 to $2.6kg/m^3$ between inflow water and ambient reservoir water, which consequently led development of density flows such as plunge flow and interflow in the reservoir. The 2D model was set up for the reservoir. and applied to simulate the temperature stratification, density flow regimes, and temporal and spatial turbidity distributions during flood season of 2004 After intensive refinements on grid resolutions , the model showed efficient and satisfactory performance in simulating the observed reservoir thermal stratification and turbidity profiles that all are essentially required to enhance the performance of RTMMS.

  • PDF

Performance Analysis of an On-line Game Abuse Pattern Monitoring Method (온라인 게임 악용 패턴 모니터링 방법의 성능 분석)

  • Roh, Chang-Hyun;Son, Han-Seong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.71-77
    • /
    • 2011
  • CEP(Complex Event Processing) is a technique to find complex event pattern in a massive information system. Based on CEP technique, an abuse pattern monitoring method has been developed to provide an real-time detection. In the method, the events occurred by game-play are observed to be against the rules using CEP. User abuse patterns are pre-registered in CEP engine. And CEP engine monitors user abuse after aggregating the game data transferred by game logging server. This article provides the performance analysis results of the abuse pattern monitoring method using real game DB. We results that the method proposed in previous study is effective to monitor abusing users.

Quantitative nondestructive evaluation of thin plate structures using the complete frequency information from impact testing

  • Lee, Sang-Youl;Rus, Guillermo;Park, Tae-Hyo
    • Structural Engineering and Mechanics
    • /
    • v.28 no.5
    • /
    • pp.525-548
    • /
    • 2008
  • This article deals the theory for solving an inverse problem of plate structures using the frequency-domain information instead of classical time-domain delays or free vibration eigenmodes or eigenvalues. A reduced set of output parameters characterizing the defect is used as a regularization technique to drastically overcome noise problems that appear in imaging techniques. A deconvolution scheme from an undamaged specimen overrides uncertainties about the input signal and other coherent noises. This approach provides the advantage that it is not necessary to visually identify the portion of the signal that contains the information about the defect. The theoretical model for Quantitative nondestructive evaluation, the relationship between the real and ideal models, the finite element method (FEM) for the forward problem, and inverse procedure for detecting the defects are developed. The theoretical formulation is experimentally verified using dynamic responses of a steel plate under impact loading at several points. The signal synthesized by FEM, the residual, and its components are analyzed for different choices of time window. The noise effects are taken into account in the inversion strategy by designing a filter for the cost functional to be minimized. The technique is focused toward a exible and rapid inspection of large areas, by recovering the position of the defect by means of a single accelerometer, overriding experimental calibration, and using a reduced number of impact events.

The study of frictional damper with various control algorithms

  • Mirtaheri, Masoud;Samani, Hamid Rahmani;Zandi, Amir Peyman
    • Earthquakes and Structures
    • /
    • v.12 no.5
    • /
    • pp.479-487
    • /
    • 2017
  • Frictional dampers are used in structural engineering as means of passive control. Meanwhile, frictional damper shave a disadvantage compared to viscous rivals since the slippage force must be exceeded to activate the device, and cannot be ideal full range of possible events. The concept of semi-active control is utilized to overcome this shortcoming. In this paper, a new semi-active frictional damper called Smart Adjustable Frictional (SAF) damper is introduced. SAF damper consists of hydraulic, electronic units and sensors which are all linked with an active control discipline. SAF acts as a smart damper which can adapt its slippage threshold during a dynamic excitation by measuring and controlling the structural response. The novelty of this damper is, while it controls the response of the structure in real time with acceptable time delay. The paper also reports on the results of a series of experiments which have been performed on SAF dampers to obtain their prescribed hysteretic behavior for various control algorithms. The results show that SAF can produce the desired slippage load of various algorithms in real time. Numerical models incorporating control simulations are also made to obtain the hysteretic response of the system which agrees closely with test results.

Fine Grain Real-Time Code Scheduling Using an Adaptive Genetic Algorithm (적합 유전자 알고리즘을 이용한 실시간 코드 스케쥴링)

  • Chung, Tai-Myoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1481-1494
    • /
    • 1997
  • In hard real-time systems, a timing fault may yield catastrophic results. Dynamic scheduling provides the flexibility to compensate for unexpected events at runtime; however, scheduling overhead at runtime is relatively large, constraining both the accuracy of the timing and the complexity of the scheduling analysis. In contrast, static scheduling need not have any runtime overhead. Thus, it has the potential to guarantee the precise time at which each instruction implementing a control action will execute. This paper presents a new approach to the problem of analyzing high-level language code, augmented by arbitrary before and after timing constraints, to provide a valid static schedule. Our technique is based on instruction-level complier code scheduling and timing analysis, and can ensure the timing of control operations to within a single instruction clock cycle. Because the search space for a valid static schedule is very large, a novel adaptive genetic search algorithm was developed.

  • PDF

Exhibition Monitoring System using USN/RFID based on ECA (USN/RFID를 이용한 ECA기반 전시물 정보 모니터링 시스템)

  • Kim, Gang-Seok;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.95-100
    • /
    • 2009
  • Nowadays there are many studies and there's huge development about USN/RFID which have great developmental potential to many kinds of applications. More and more real time application apply USN/RFID technology to identify data collect and locate objects. Wide deployment of USN/RFID will generate an unprecedented volume of primitive data in a short time. Duplication and redundancy of primitive data will affect real time performance of application. Thus, security applications must filter primitive data and correlate them for complex pattern detection and transform them to events that provide meaningful, actionable information to end application. In this paper, we design a ECA Rule system for security monitoring of exhibition. This system will process USN/RFID primitive data and event and perform data transformation. It's had applied each now in exhibition hall through this study and efficient data transmission and management forecast that is possible.

  • PDF

An Expert System for the Real-Time Computer Control of the Large-Scale System (대규모 시스템의 실시간 컴퓨터 제어를 위한 전문가 시스템)

  • Ko, Yun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.6
    • /
    • pp.781-788
    • /
    • 1999
  • In this paper, an expert system is proposed, which can be effectively applied to the large-scale systems with the diversity time constraints, the objectives and the unfixed system structure. The inference scheme of the expert system have the integrated structure composed of the intuitive inference module and logical inference module in order to support effectively the operating constraints of system. The intuitive inference module is designed using the pattern matching or pattern recognition method in order to search a same or similar pattern under the fixed system structure. On the other hand, the logical inference module is designed as the structure with the multiple inference mode based on the heuristic search method in order to determine the optimal or near optimal control strategies satisfing the time constraints for system events under the unfixed system structure, and in order to use as knowledge generator. Here, inference mode consists of the best-first, the local-minimum tree, the breadth-iterative, the limited search width/time method. Finally, the application results for large-scale distribution SCADA system proves that the inference scheme of the expert system is very effective for the large-scale system. The expert system is implemented in C language for the dynamic mamory allocation method, database interface, compatability.

  • PDF

Inundation Map at Imwon Port with Past and Virtual Tsunamis (과거 및 가상 지진해일에 의한 임원항의 침수예상도)

  • Kim, Tae-Rim;Cho, He-Rin;Cho, Yong-Sik
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.21 no.1
    • /
    • pp.1-9
    • /
    • 2017
  • The scale of disaster and damage witnessed in the 2004 Indian Ocean Tsunami and the 2011 Great East Japan Tsunami has motivated researchers in developing foolproof disaster mitigation techniques for safety of coastal communities. This study focuses on developing tsunami hazard map by numerical modeling at Imwon Port to minimize losses of human beings and property damage when a real tsunami event occurs. A hazard map is developed based on inundation maps obtained by numerical modeling of 3 past and 11 virtual tsunami cases. The linear shallow-water equations with manipulation of frequency dispersion and the non-linear shallow-water equations are employed to obtain inundation maps. The inundation map gives the maximum extent of expected flooded area and corresponding inundation depths which helps in identifying vulnerable areas for unexpected tsunami attacks. The information can be used for planning and developing safety zones and evacuation structures to minimize damage in case of real tsunami events.

T-START: Time, Status and Region Aware Taxi Mobility Model for Metropolis

  • Wang, Haiquan;Lei, Shuo;Wu, Binglin;Li, Yilin;Du, Bowen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3018-3040
    • /
    • 2018
  • The mobility model is one of the most important factors that impacts the evaluation of any transportation vehicular networking protocols via simulations. However, to obtain a realistic mobility model in the dynamic urban environment is a very challenging task. Several studies extract mobility models from large-scale real data sets (mostly taxi GPS data) in recent years, but they do not consider the statuses of taxi, which is an important factor affected taxi's mobility. In this paper, we discover three simple observations related to the taxi statuses via mining of real taxi trajectories: (1) the behavior of taxi will be influenced by the statuses, (2) the macroscopic movement is related with different geographic features in corresponding status, and (3) the taxi load/drop events are varied with time period. Based on these three observations, a novel taxi mobility model (T-START) is proposed with respect to taxi statuses, geographic region and time period. The simulation results illustrate that proposed mobility model has a good approximation with reality in trajectory samples and distribution of nodes in four typical time periods.