• Title/Summary/Keyword: 비디오 감시

Search Result 188, Processing Time 0.024 seconds

A Study on Measurement of Penetration Depth of Steel Pipe Using the Impact-Echo Method (충격탄성파법에 의한 강관구조물 근입깊이 측정에 관한 연구)

  • Lee, Sang Hun;Kumagai, Takayuki;Endo, Takao;Han, Youn Hee
    • 한국방재학회:학술대회논문집
    • /
    • 2011.02a
    • /
    • pp.89-89
    • /
    • 2011
  • 도로의 가드레일 지주 근입깊이의 부족에 의한 자동차의 전락사고 이 후, 일본의 국토교통성 등의 관계자들이 그 대책 세우기에 부심해 왔으나, 기설 지주의 근입깊이를 측정할 수 있는 방법은 아직까지 알려져 있지 않으며, 현재로서는 작업의 전 과정을 비디오로 촬영하여 그 기록을 남기도록 되어있다. 그러나 그것은 상당히 비효율적인 작업으로 엄밀한 감시기능을 다하지 못하고 있으며, 감독자와 시공자의 양자로부터 계측 도구의 개발이 절실히 요구되고 있다. 일부의 초음파 측정기 업자가 가드레일 지주의 근입깊이를 측정할 수 있다고 주장하고 있으나, 시장에는 아직 나타나지 않고 있으며, 그 측정시스템의 측정여부와 성능의 검증이 이루어지지 않고 있는 상황이다. 지금까지 충격탄성파법 또는 초음파법을 이용하여, 매설된 가드레일 지주의 근입깊이를 측정한 성공사례가 정식으로 보고된 바는 없으며, 같은 강관주인 눈사태 방지책의 지주 파이프에 대한 근입깊이의 측정은 본 연구그룹의 의해 행하여진 바가 있다. 검사봉이나 해머 등으로 대상물을 두드려서 탄성파를 발생시키고, 그것을 가속도계 또는 속도계의 진동센서로 감지하여 그 파형을 분석함으로써 대상물의 치수 등을 측정하는 충격탄성파법은, 특히 콘크리트를 대상으로 공동 및 매설물 등의 탐사, 균열깊이의 측정 등에 폭 넓게 사용되고 있다. 하지만 이 측정방법을 가드레일의 지주의 근입깊이 측정에 적용할 경우, 일반적으로 행하여지는 방법, 즉 진동센서를 대상물의 상단부(캡)에 설치하는 방법으로는 접합부에 의한 탄성파의 손실과 캡의 휨 진동에 의한 노이즈 등을 해결하기가 곤란해진다. 또한 지반의 존재로 인한 진동 모드의 변화와 진동에너지의 감소 등의 문제점을 해결하지 않으면 안 된다. 본 연구는 충격탄성파법을 이용하여 지반에 설치된 눈사태 방지책이나 가드레일의 지주와 같은 강관 구조물의 근입깊이를 측정하고자 하는 연구이다. 이를 위해 진동센서를 캡이 아닌 측면부에 취부장치를 이용하여 설치함으로써 길이방향의 탄성파를 측정할 수 있도록 하고, 실제 구조물에 대해 측정을 실시하여 그 측정시스템의 성능과 유용성을 검토하고자 한다. 또한 다양한 길이의 실험용 강관 파이프를 매설하고 측정실험을 실시하여 측정시스템의 적용성에 대해서도 검토하였다. 본 연구를 통하여, 수신센서를 파이프의 측면에 선접촉하게 함으로서 종파를 감지하여 근입깊이를 포함한 파이프의 전 길이를 측정하는 본 측정시스템은 매설된 강관 구조물의 길이 측정에 기본적으로 적용 가능함을 확인할 수 있었다. 특히 오거 굴착으로 시공된 경우에는 높은 정도의 측정성능을 보여주었다. 또한 항타관입 파이프에 대해서는 지반의 영향을 고려함으로써 길이의 측정이 가능하다는 것을 확인할 수 있었다. 즉, 오거 굴착 또는 항타 관입 등 시공방법에 따라 측정결과에 대한 지반의 영향 정도가 달라지며 파형 분석 및 길이 산정시 그 영향을 고려하여야 함을 확인하였다.

  • PDF

Integration of Condensation and Mean-shift algorithms for real-time object tracking (실시간 객체 추적을 위한 Condensation 알고리즘과 Mean-shift 알고리즘의 결합)

  • Cho Sang-Hyun;Kang Hang-Bong
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.273-282
    • /
    • 2005
  • Real-time Object tracking is an important field in developing vision applications such as surveillance systems and vision based navigation. mean-shift algerian and Condensation algorithm are widely used in robust object tracking systems. Since the mean-shift algorithm is easy to implement and is effective in object tracking computation, it is widely used, especially in real-time tracking systems. One of the drawbacks is that it always converges to a local maximum which may not be a global maximum. Therefore, in a cluttered environment, the Mean-shift algorithm does not perform well. On the other hand, since it uses multiple hypotheses, the Condensation algorithm is useful in tracking in a cluttered background. Since it requires a complex object model and many hypotheses, it contains a high computational complexity. Therefore, it is not easy to apply a Condensation algorithm in real-time systems. In this paper, by combining the merits of the Condensation algorithm and the mean-shift algorithm we propose a new model which is suitable for real-time tracking. Although it uses only a few hypotheses, the proposed method use a high-likelihood hypotheses using mean-shift algorithm. As a result, we can obtain a better result than either the result produced by the Condensation algorithm or the result produced by the mean-shift algorithm.

Face Detection in Color Images Based on Skin Region Segmentation and Neural Network (피부 영역 분할과 신경 회로망에 기반한 칼라 영상에서 얼굴 검출)

  • Lee, Young-Sook;Kim, Young-Bong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.1-11
    • /
    • 2006
  • Many research demonstrations and commercial applications have been tried to develop face detection and recognition systems. Human face detection plays an important role in applications such as access control and video surveillance, human computer interface, identity authentication, etc. There are some special problems such as a face connected with background, faces connected via the skin color, and a face divided into several small parts after skin region segmentation in generally. It can be allowed many face detection techniques to solve the first and second problems. However, it is not easy to detect a face divided into several parts of regions for reason of different illumination conditions in the third problem. Therefore, we propose an efficient modified skin segmentation algorithm to solve this problem because the typical region segmentation algorithm can not be used to. Our algorithm detects skin regions over the entire image, and then generates face candidate regions using our skin segmentation algorithm For each face candidate, we implement the procedure of region merging for divided regions in order to make a region using adjacency between homogeneous regions. We utilize various different searching window sizes to detect different size faces and a face detection classifier based on a back-propagation algorithm in order to verify whether the searching window contains a face or not.

  • PDF

An Adaptive Authentication Protocol for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 적응형 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.19-26
    • /
    • 2018
  • In recent years, the substantial increase in the population's average age leads to an exceeded number of older persons comparing with the number of any other age group. As a result, both industry and academia are focused on the development of several solutions aimed to guarantee a healthy and safe lifestyle to the elderly. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can also provide more safety for the elderly, offering emergency response mechanisms, fall detection solutions, and video surveillance systems. Unfortunately, due to the sensitive nature of AAL data, AAL systems should satisfy security requirements such as integrity, confidentiality, availability, anonymity, and others. In this paper, we propose an adaptive authentication protocol for the AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

Robust Motorbike License Plate Detection and Recognition using Image Warping based on YOLOv2 (YOLOv2 기반의 영상워핑을 이용한 강인한 오토바이 번호판 검출 및 인식)

  • Dang, Xuan-Truong;Kim, Eung-Tae
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.713-725
    • /
    • 2019
  • Automatic License Plate Recognition (ALPR) is a technology required for many applications such as Intelligent Transportation Systems and Video Surveillance Systems. Most of the studies have studied were about the detection and recognition of license plates on cars, and there is very little about detecting and recognizing license plates on motorbikes. In the case of a car, the license plate is located at the front or rear center of the vehicle and is a straight or slightly sloped license plate. Also, the background of the license plate is mainly monochromatic, and license plate detection and recognition process is less complicated. However since the motorbike is parked by using a kickstand, it is inclined at various angles when parked, so the process of recognizing characters on the motorbike license plate is more complicated. In this paper, we have developed a 2-stage YOLOv2 algorithm to detect the area of a license plate after detection of a motorbike area in order to improve the recognition accuracy of license plate for motorbike data set parked at various angles. In order to increase the detection rate, the size and number of the anchor boxes were adjusted according to the characteristics of the motorbike and license plate. Image warping algorithms were applied after detecting tilted license plates. As a result of simulating the license plate character recognition process, the proposed method had the recognition rate of license plate of 80.23% compared to the recognition rate of the conventional method(YOLOv2 without image warping) of 47.74%. Therefore, the proposed method can increase the recognition of tilted motorbike license plate character by using the adjustment of anchor boxes and the image warping which fit the motorbike license plate.

High Quality Video Streaming System in Ultra-Low Latency over 5G-MEC (5G-MEC 기반 초저지연 고화질 영상 전송 시스템)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.2
    • /
    • pp.29-38
    • /
    • 2021
  • The Internet including mobile networks is developing to overcoming the limitation of physical distance and providing or acquiring information from remote locations. However, the systems that use video as primary information require higher bandwidth for recognizing the situation in remote places more accurately through high-quality video as well as lower latency for faster interaction between devices and users. The emergence of the 5th generation mobile network provides features such as high bandwidth and precise location recognition that were not experienced in previous-generation technologies. In addition, the Mobile Edge Computing that minimizes network latency in the mobile network requires a change in the traditional system architecture that was composed of the existing smart device and high availability server system. However, even with 5G and MEC, since there is a limit to overcome the mobile network state fluctuations only by enhancing the network infrastructure, this study proposes a high-definition video streaming system in ultra-low latency based on the SRT protocol that provides Forward Error Correction and Fast Retransmission. The proposed system shows how to deploy software components that are developed in consideration of the nature of 5G and MEC to achieve sub-1 second latency for 4K real-time video streaming. In the last of this paper, we analyze the most significant factor in the entire video transmission process to achieve the lowest possible latency.

From Frankenstein to Torture Porn -Monstrous Technology and the Horror Film (프랑켄슈타인에서 고문 포르노까지 -괴물화하는 테크놀로지와 호러영화)

  • Chung, Young-Kwon
    • Journal of Popular Narrative
    • /
    • v.26 no.1
    • /
    • pp.243-277
    • /
    • 2020
  • This paper examines a social and cultural history of horror films through the keyword "technology", focusing on The Spark of Fear: Technology, Society and the Horror Film (2015) written by Brian N. Duchaney. Science fiction film is closely connected with technology in film genres. On the other hand, horror films have been explained in terms of nature/supernatural. In this regard, The Spark of Fear, which accounts for horror film history as (re)actions to the development of technology, is remarkable. Early horror films which were produced under the influence of gothic novels reflected the fear of technology that had been caused by industrial capitalism. For example, in the film Frankenstein (1931), an angry crowd of people lynch the "monster", the creature of technology. This is the action which is aroused by the fear of technology. Furthermore, this mob behavior is suggestive of an uprising of people who have been alienated by industrial capitalism during the Great Depression. In science fiction horror films, which appeared in the post-war boom, the "other" that manifests as aliens is the entity that destroys the value of prosperity during post-war America. While this prosperity is closely related to the life of the middle class in accordance with the suburbanization, the people live conformist lives under the mantle of technologies such as the TV, refrigerator, etc. In the age of the Vietnam War, horror films demonize children, the counter-culture generation against a backdrop of the house that is the place of isolation and confinement. In this place, horror arises from the absolute absence of technology. While media such as videos, internet, and smartphones have reinforced interconnectedness with the outside world since the 1980s, it became another outside influence that we cannot control. "Found-footage" and "torture porn" which were rife in post-9/11 horror films show that the technologies of voyeurism/surveillance and exposure/exhibitionism are near to saturation. In this way, The Spark of Fear provides an opportune insight into the present day in which the expectation and fear of the progress of technology are increasingly becoming inseparable from our daily lives.

Ictal Hyperperfusion of Cerebellum and Basal Ganglia in Temporal Lobe Epilepsy: SPECT Subtraction (측두엽 간질에서 발작기 소뇌와 기저핵의 뇌혈류 변화: SPECT 감영영상)

  • Shin, Won-Chul;Hong, Seung-Bong;Tae, Woo-Suk;Seo, Dae-Won;Kim, Sang-Eun
    • The Korean Journal of Nuclear Medicine
    • /
    • v.35 no.1
    • /
    • pp.12-22
    • /
    • 2001
  • Purpose: The ictal perfusion patterns of cerebellum and basal ganglia have not been systematically investigated in patients with temporal lobe epilepsy (TLE). Their ictal perfusion patterns were analyzed in relation with temporal lobe and frontal lobe hyperperfusion during TLE seizures using SPECT subtraction. Materials and Methods: Thirty-three TLE patients had interictal and ictal SPECT, video-EEG monitoring, SPGR MRI, and SPECT subtraction with MRI co-registration. Results: The vermian cerebellar hyperperfusion (CH) was observed in 26 patients (78.8%) and hemispheric CH in 25 (75.8%). Compared to the side of epileptogenic temporal lobe, there were seven ipsilateral hemispheric CH (28.0%), fifteen contralateral hemispheric CH (60.0%) and three bilateral hemispheric CH (12.0%). CH was more frequently observed in patients with additional frontal hyperperfusion (14/15, 93.3%) than in patients without frontal hyperperfusion (11/18, 61.1%). The basal ganglia hyperperfusion (BGH) was seen in 11 of the 15 patients with frontotemporal hyperperfusion (73.3%) and 11 of the 18 with temporal hyperperfusion only (61.1%). In 17 patients with unilateral BGH, contralateral CH to the BGH was observed in 14 (82.5%) and ipsilateral CH to BGH in 2 (11.8%) and bilateral CH in 1 (5.9%). Conclusion: The cerebellar hyperperfusion and basal ganglia hyperperfusion during seizures of TLE can be contralateral, ipsilateral or bilateral to the seizure focus. The presence of additional frontal or basal ganglia hyperperfusion was more frequently associated with contralateral hemispheric CH to their sides. However, temporal lobe hyperperfusion appears to be related with both ipsilateral and contralateral hemispheric CH.

  • PDF