• Title/Summary/Keyword: smart safety

Search Result 1,463, Processing Time 0.024 seconds

WAVE System Performance for Platooning Vehicle Service Requirements Under Highway Environments (고속도로 환경에서 군집주행 서비스 요구사항에 대한 WAVE 통신시스템 성능 분석)

  • Song, Yoo-seung;Choi, Hyun Kyun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.1
    • /
    • pp.147-156
    • /
    • 2017
  • This paper analyzes the performance limit of WAVE system for the platooning service requirements which is referred from the de facto standards. The performance of the packet error rate and mean delay as key parameters in the wireless communication systems should be satisfied to provide safety to the platooning vehicles. The test scenarios are conducted by considering the following vehicle groups: platooning vehicles, vehicles within a hop distance and vehicles within two hop distance( called hidden node vehicles). The models of packet error rate and delay deals with the topology of aforementioned vehicle groups, vehicle speed and communication range. The numerical results are obtained in terms of packet size, packet arrival rate and data transmission rate. Finally, this paper suggests the robust range of packet error rate and delay for the WAVE system to provide the platooning vehicle service.

Online condition assessment of high-speed trains based on Bayesian forecasting approach and time series analysis

  • Zhang, Lin-Hao;Wang, You-Wu;Ni, Yi-Qing;Lai, Siu-Kai
    • Smart Structures and Systems
    • /
    • v.21 no.5
    • /
    • pp.705-713
    • /
    • 2018
  • High-speed rail (HSR) has been in operation and development in many countries worldwide. The explosive growth of HSR has posed great challenges for operation safety and ride comfort. Among various technological demands on high-speed trains, vibration is an inevitable problem caused by rail/wheel imperfections, vehicle dynamics, and aerodynamic instability. Ride comfort is a key factor in evaluating the operational performance of high-speed trains. In this study, online monitoring data have been acquired from an in-service high-speed train for condition assessment. The measured dynamic response signals at the floor level of a train cabin are processed by the Sperling operator, in which the ride comfort index sequence is used to identify the train's operation condition. In addition, a novel technique that incorporates salient features of Bayesian inference and time series analysis is proposed for outlier detection and change detection. The Bayesian forecasting approach enables the prediction of conditional probabilities. By integrating the Bayesian forecasting approach with time series analysis, one-step forecasting probability density functions (PDFs) can be obtained before proceeding to the next observation. The change detection is conducted by comparing the current model and the alternative model (whose mean value is shifted by a prescribed offset) to determine which one can well fit the actual observation. When the comparison results indicate that the alternative model performs better, then a potential change is detected. If the current observation is a potential outlier or change, Bayes factor and cumulative Bayes factor are derived for further identification. A significant change, if identified, implies that there is a great alteration in the train operation performance due to defects. In this study, two illustrative cases are provided to demonstrate the performance of the proposed method for condition assessment of high-speed trains.

Symmetry structured SPN block cipher algorithm (대칭구조 SPN 블록 암호 알고리즘)

  • Kim, Gil-Ho;Park, Chang-Soo;Cho, Gyeong-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1093-1100
    • /
    • 2008
  • Feistel and SPN are the two main structures in designing a block cipher algorithm. Unlike Feistel, an SPN has an asymmetric structure in encryption and decryption. In this paper we propose an SPN algorithm which has a symmetric structure in encryption and decryption. The whole operations in our SPN algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2, applies function and the last half of them, (N+1)/2 to N, employs inverse function. Symmetry layer is executed to create a symmetry block in between function layer and inverse function layer. AES encryption and decryption algorithm, whose safety is already proved, are exploited for function and inverse function, respectively. In order to be secure enough against the byte or word unit-based attacks, 32bit rotation and simple logical operations are performed in symmetry layer. Due to the simplicity of the proposed encryption and decryption algorithm in hardware configuration, the proposed algorithm is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.

  • PDF

Integrated Manpower Information Systems on Construction Site - Using RFID and QR-Code - (RFID와 QR-코드를 활용한 건설현장 통합노무정보관리 효율화 체계 구축)

  • Choi, Yun-Gil;Yoon, Su-Won;Chin, Sang-Yoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.4
    • /
    • pp.106-116
    • /
    • 2011
  • It is very important to collect and manage labor information in the construction industry that is labor-intensive. Although research and cases that utilize RFID are increasing for more effective labor management, labor management is limited to the checking-in and -out information management at the entrance of a construction site due to high expense of an RFID reader. Labor and safety information is still managed based on the redundant process that is hand-written in a book and re-input of information by using a personnel-computer. Therefore, the objective of this paper is to develop more effective and efficient process for labor information record and management. This paper presents a prototype application that supports integrated labor information management by incorporating QR-code into RFID-based labor management system and verifies the application through a pilot test and comparison with the existing labor management syste.

Detection Scheme of Heart and Respiration Signals for a Driver of Car with a Doppler Radar (도플러 레이더 기반 차량 운전자의 심박 및 호흡 신호 검출 기법 연구)

  • Yun, Younguk;Lee, Jeongpyo;Kim, Jinmyung;Kim, Youngok
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.1
    • /
    • pp.87-95
    • /
    • 2020
  • Purpose: In this paper, we propose an algorithm for detecting respiratory rate and heart beat of a driver of car by exploiting Doppler radar, and verifying the feasibility of the study through experiments. Method: In this paper, we propose a weighted peak detection technique using peak frequency values. The tests are performed in stop-state and driving-state, and the experiment result is analyzed by two proposed algorithms. Result: The results showed more than 95% and 96% accuracy of respiratory and heart rate, respectively. It also showed more than 72% and 84% accuracy of those even for driving experiments. Conclusion: The proposed detection scheme for vital signs can be used for the safety of the driver as well as for prevention of a large size of car accidents.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Development of Sleeve Patterns of Structural Firefighting Protective Clothing using by 3D Body Shape and 3D Motion Analysis (3차원 인체형상과 3차원 동작분석에 의한 방화복 소매패턴 개발)

  • Han, Sul-Ah;Nam, Yun-Ja;Yoon, Hye-Jun;Lee, Sang-Hee;Kim, Hyun-Joo
    • Fashion & Textile Research Journal
    • /
    • v.14 no.1
    • /
    • pp.109-121
    • /
    • 2012
  • This study aims at developing ergonomics patterns for the sleeve of structural firefighting protective clothing through 3D motion analysis in order to ensure efficiency and safety of firefighters who are exposed to harmful environment at work. A new research pattern was developed by applying the total results of 3D motion analysis, changes of body surface length measurements, and 2D data on 3D body shape analysis on the size 3 patterns of the existing coat sleeve. For the sleeves, we used the body surface length of the range of shoulder's flexion and the joint angle of the range of wrist's ulnar deviation. And for the production of structural firefighting protective clothing using the research pattern, we recruited a recognized producer of structural firefighting protective clothing designated by KFI. Unlike everyday clothes, structural firefighting protective clothing should be able to fully protect the wearers from the harmful environment that threatens their lives and should not cause any restrictions on their movement. Therefore, the focus of research and development of such protective clothing should be placed on consistent development of new technologies and production methods that will provide protection and comfort for the wearer rather than production cost reduction or operational efficiency. This study is meaningful as it applied 3D motion analysis instead of the existing methods to develop the patterns. In particular, since 3D motion analysis enables the measurement of the range of motion, there should be continuous research on the development of ergonomics patterns that consider workers' range of motion.

Evaluating the bond strength of FRP in concrete samples using machine learning methods

  • Gao, Juncheng;Koopialipoor, Mohammadreza;Armaghani, Danial Jahed;Ghabussi, Aria;Baharom, Shahrizan;Morasaei, Armin;Shariati, Ali;Khorami, Majid;Zhou, Jian
    • Smart Structures and Systems
    • /
    • v.26 no.4
    • /
    • pp.403-418
    • /
    • 2020
  • In recent years, the use of Fiber Reinforced Polymers (FRPs) as one of the most common ways to increase the strength of concrete samples, has been introduced. Evaluation of the final strength of these specimens is performed with different experimental methods. In this research, due to the variety of models, the low accuracy and impact of different parameters, the use of new intelligence methods is considered. Therefore, using artificial intelligent-based models, a new solution for evaluating the bond strength of FRP is presented in this paper. 150 experimental samples were collected from previous studies, and then two new hybrid models of Imperialist Competitive Algorithm (ICA)-Artificial Neural Network (ANN) and Artificial Bee Colony (ABC)-ANN were developed. These models were evaluated using different performance indices and then, a comparison was made between the developed models. The results showed that the ICA-ANN model's ability to predict the bond strength of FRP is higher than the ABC-ANN model. Finally, to demonstrate the capabilities of this new model, a comparison was made between the five experimental models and the results were presented for all data. This comparison showed that the new model could offer better performance. It is concluded that the proposed hybrid models can be utilized in the field of this study as a suitable substitute for empirical models.

Simultaneous out-of-plane and in-plane vibration mitigations of offshore monopile wind turbines by tuned mass dampers

  • Zuo, Haoran;Bi, Kaiming;Hao, Hong
    • Smart Structures and Systems
    • /
    • v.26 no.4
    • /
    • pp.435-449
    • /
    • 2020
  • To effectively extract the vast wind resource, offshore wind turbines are designed with large rotor and slender tower, which makes them vulnerable to external vibration sources such as wind and wave loads. Substantial research efforts have been devoted to mitigate the unwanted vibrations of offshore wind turbines to ensure their serviceability and safety in the normal working condition. However, most previous studies investigated the vibration control of wind turbines in one direction only, i.e., either the out-of-plane or in-plane direction. In reality, wind turbines inevitably vibrate in both directions when they are subjected to the external excitations. The studies on both the in-plane and out-of-plane vibration control of wind turbines are, however, scarce. In the present study, the NREL 5 MW wind turbine is taken as an example, a detailed three-dimensional (3D) Finite Element (FE) model of the wind turbine is developed in ABAQUS. To simultaneously control the in-plane and out-of-plane vibrations induced by the combined wind and wave loads, another carefully designed (i.e., tuned) spring and dashpot are added to the perpendicular direction of each Tuned Mass Damper (TMD) system that is used to control the vibrations of the tower and blades in one particular direction. With this simple modification, a bi-directional TMD system is formed and the vibrations in both the out-of-plane and in-plane directions are simultaneously suppressed. To examine the control effectiveness, the responses of the wind turbine without control, with separate TMD system and the proposed bi-directional TMD system are calculated and compared. Numerical results show that the bi-directional TMD system can simultaneously control the out-of-plane and in-plane vibrations of the wind turbine without changing too much of the conventional design of the control system. The bi-directional control system therefore could be a cost-effective solution to mitigate the bi-directional vibrations of offshore wind turbines.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.