DOI QR코드

DOI QR Code

Development of Checking System for Emergency using Behavior-based Object Detection

행동기반 사물 감지를 통한 위급상황 확인 시스템 개발

  • Kim, MinJe (Dept. of Smart Information and Communication Engineering, Sangmyung University) ;
  • Koh, KyuHan (Dept. of Computer Science, California State University Stanislaus) ;
  • Jo, JaeChoon (Division of Computer Engineering, Hanshin University)
  • 김민제 (상명대학교 스마트 정보통신공학과) ;
  • 고규한 (캘리포니아 주립대학교 컴퓨터학과) ;
  • 조재춘 (한신대학교 컴퓨터공학부)
  • Received : 2020.04.27
  • Accepted : 2020.06.20
  • Published : 2020.06.28

Abstract

Since the current crime prevention systems have a standard mechanism that victims request for help by themselves or ask for help from a third party nearby, it is difficult to obtain appropriate help in situations where a prompt response is not possible. In this study, we proposed and developed an automatic rescue request model and system using Deep Learning and OpenCV. This study is based on the prerequisite that immediate and precise threat detection is essential to ensure the user's safety. We validated and verified that the system identified by more than 99% of the object's accuracy to ensure the user's safety, and it took only three seconds to complete all necessary algorithms. We plan to collect various types of threats and a large amount of data to reinforce the system's capabilities so that the system can recognize and deal with all dangerous situations, including various threats and unpredictable cases.

기존의 방범 시스템은 피해자가 직접 구조를 요청하거나 인근 제 3자에 의해 도움을 받아야 하는 구조이기 때문에 신속하게 대응이 불가능한 상황에서는 경우에 따라 적절한 도움을 받기 힘들다. 본 연구에서는 Deep Learning과 OpenCV를 활용한 자동 구조 요청 모델을 제안하고 시스템을 개발하였다. 본 연구는 사용자의 안전을 보장할 수 있어야 하기 때문에 신속히 정확한 결과를 도출할 수 있어야 한다는 전제 조건이 밑바탕 되어 객체의 정확성은 약 99% 이상을 확인할 수 있었으며 모든 알고리즘이 종료되는 데까지의 소요 시간을 약 3초까지 단축시킬 수 있었다. 다양한 위협 요소와 예측 불가능한 특수한 경우 등 모든 위험 상황을 인식하기 위해 다양한 종류의 위협 요소와 많은 양의 데이터를 수집하여 예기치 못한 상황에도 대처할 수 있도록 강화하여야 할 것이다.

Keywords

References

  1. K. R. Park.(2013). A Study of the Probability to Crime according to Time Status Change. Korean Society of Computer Information, 18(5), 147-156. DOI : 10.9708/jksci.2013.18.5.147
  2. H. J. Park (2014). A Study on the arrest effect of CCTV for crime prevention. Korea convergence Security Association, 14(6), 25-33.
  3. J. W. Kim. (2017.3.30.). 'Secure Golden Time'..Police scene response time is advanced by one second. Seoul Economic, https://www.sedaily.com/NewsVIew/1ODKMI28PE
  4. SDAcademy. (2018.4.6.). DeepLearning implement Library, Pytorch(Pyorch). Naverblog(Online). https://blog.naver.com/sundooedu/221246686541
  5. M. Fey & J. E. Lenssen. (2019). Fast Graph Representation Learning With PyTorch Geometric. arXiv preprint arXiv:1903.02428.
  6. A. Pazke et al. (2017). Automatic differentiation in Pytorch. In Proceedings of Neural Information Processing Systems.
  7. J. Redmon & A. Farhadi. (2018.). YOLOv3: An Incremental Improvement. arXiv preprint arXiv:1804.02767.
  8. S. Gupta, W. Zhang & F. Wang. (2016). Model accuracy and runtime tradeoff in distributed deep learning: A systematic study. In 2016 IEEE 16th International Conference on Data Mining (ICDM) (pp. 171-180). IEEE.
  9. W. Liu. et al. (2016). Ssd: Single shot multibox detector. In European conference on computer vision (pp. 21-37). Springer, Cham.
  10. C. Yoo, H. W. Jin & S. C. Kwon. (2001). Asynchronous UDP. IEICE Transactions on Communications, E84-B(12), 3243-3251.
  11. https://github.com/real-logic/aeron
  12. S. Robertson. (2008). A new interpretation of average precision. In Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval (pp. 689-690).
  13. C. szegedy, V. Vanhoucke, S. Ioffe, J. Shlens &Z. Wojna (2016). Rethinking the inception architecture for computer vision. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 2818-2826).
  14. J. Back. (2018.10.12.). What's the 1x1 convolution : Easy explanation for graduate students. tistory(Onlie). https://hwiyong.tistory.com/45
  15. S. H. Woo. (2020). The method to real-time communication on Android operating system
  16. M, K. Yoshihito. (2015.06.09.). SAKURAKO make choice of kitchen knife. flickr(Onlie). https://www.flickr.com/photos/mujitra/21178904802
  17. Y. H. Moon. (2017.02.07). 01.Characteristics of life phenomenon-3. Responds to stimuli. NaverBlog.(Online). https://m.blog.naver.com/haniclinic/221109710124