• Title/Summary/Keyword: 이벤트 인지

Search Result 96, Processing Time 0.027 seconds

A Design of Gateway with Video Control for Facility Management in Wireless Sensor Networks (무선 센서네트워크에서 시설물 관리를 위한 영상제어 게이트웨이 설계)

  • Choi, Byeong-Cheol;Lee, Byeong-Bok;Bae, Myeong-Nam;Lee, In-Hwan;Jun, Jong-Arm
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1053-1054
    • /
    • 2009
  • 무선 센서네트워크에서 지상시설물 관리를 위하여 대상 시설물에 대한 이벤트 발생 메시지 및 상황보고 메시지에 의한 데이터 수집 및 분석에 따르는 기존의 방식에 의해서는 시설물 상황 파악의 한계를 가지고 있다. 따라서 본 논문에서는 기존의 무선 센서네트워크에 적용되는 게이트웨이 기술에 영상 카메라를 이용한 영상제어 게이트웨이를 제안한다. 영상제어 게이트웨이를 적용함으로서 이벤트가 발생한 해당 센서노드에 대한 상황을 영상으로 인지하고 운용자 및 관리자의 시각적인 영상 정보 확인으로 관리대상 시설물의 상황 파악에 대한 정확도 및 신뢰도를 증대시킬 수 있다.

Dual CNN Structured Sound Event Detection Algorithm Based on Real Life Acoustic Dataset (실생활 음향 데이터 기반 이중 CNN 구조를 특징으로 하는 음향 이벤트 인식 알고리즘)

  • Suh, Sangwon;Lim, Wootaek;Jeong, Youngho;Lee, Taejin;Kim, Hui Yong
    • Journal of Broadcast Engineering
    • /
    • v.23 no.6
    • /
    • pp.855-865
    • /
    • 2018
  • Sound event detection is one of the research areas to model human auditory cognitive characteristics by recognizing events in an environment with multiple acoustic events and determining the onset and offset time for each event. DCASE, a research group on acoustic scene classification and sound event detection, is proceeding challenges to encourage participation of researchers and to activate sound event detection research. However, the size of the dataset provided by the DCASE Challenge is relatively small compared to ImageNet, which is a representative dataset for visual object recognition, and there are not many open sources for the acoustic dataset. In this study, the sound events that can occur in indoor and outdoor are collected on a larger scale and annotated for dataset construction. Furthermore, to improve the performance of the sound event detection task, we developed a dual CNN structured sound event detection system by adding a supplementary neural network to a convolutional neural network to determine the presence of sound events. Finally, we conducted a comparative experiment with both baseline systems of the DCASE 2016 and 2017.

Media exposure analysis of official sponsors and general companies of mega sport event (메가 스포츠이벤트의 공식스폰서와 일반기업의 미디어 노출 분석)

  • Kim, Joo-Hak;Cho, Sun-Mi
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.171-181
    • /
    • 2018
  • As the proportion of sports events in the sports industry grows, the official sponsor market for sports events is also increasing. But because official sponsors are limited and expensive, some companies approach sporting events by way of Ambush marketing. This study is to analyze the differences of media exposure between official sponsors and general companies of mega sport events. To accomplish the purpose of the study, we collected text articles and analyzed them from the period of 2016 Rio Olympics, one year before the Olympics and one year after the Olympics. Web crawling was performed using Python for the collection of articles. Morphological and frequency analysis was performed using the KoNLP package and the TM package of statistical program R. In addition, the opinions of the related experts group were gathered to classify the companies or organizations in the media as the Organizing Committees for the Olympic Games(OCOGs), official sponsor, and general companies. As a result of the analysis, 5,220 times appeared related to the OCOGs, 7,845 times appeared related to the official sponsor, and 7,028 times appeared related to general companies. There isn't much difference in the frequency of exposure between official sponsors and general companies. It implies that Ambush marketing is recognized as a strategic marketing technique. The International Olympic Committee(IOC) has to recognize these social phenomena and establish reasonable standards for the marketing activities of official sponsors and general companies. And this study will serve as a basis for fair sponsor activities or marketing activities of sports events.

On-board and Ground Autonomous Operation Methods of a Low Earth Orbit Satellite for the Safety Enhancement (저궤도 위성의 안전성 향상을 위한 위성체 및 지상의 자율 운영 방안)

  • Yang, Seung-Eun
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.51-57
    • /
    • 2016
  • Many kinds of telemetry should be monitored to check the state of spacecraft and it leads the time consumption. However, it is very important to define the status of satellite in short time because the contact number and time of low earth orbit satellite is limited. Also, on-board fault management should be prepared for non-contact operation because of the sever space environment. In this paper, on-board and ground autonomous operation method for the safety enhancement is described. Immediate fault detection and response is possible in ground by explicit anomaly detection through satellite event and error information. Also, satellite operation assistant system is proposed for ground autonomy that collect event sequence in accordance with related telemetry and recommend or execute an appropriate action for abnormal state. Critical parameter monitoring method with checking rate, mode and threshold is developed for on-board autonomous fault management. If the value exceeds the limit, pre-defined command sequence is executed.

A Multi-hop Reservation Method for End-to-End Latency Performance Improvement in Asynchronous MAC-based Wireless Sensor Networks (비동기식 MAC프로토콜 기반의 무선 센서 네트워크에서 단대단 시간 지연 성능 향상을 위한 멀티 홉 예약 기법의 제안)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2638-2647
    • /
    • 2010
  • X-MAC reduces transmission delay and energy consumption by using a short preamble instead of the existing long preamble. To solve the problem of X-MAC, this paper proposes a new MAC protocol called Express-MAC. The wireless sensor network is mainly used for the purpose of gathering event data or situation information. Especially, the transmission pattern of the sensor network with the purpose of event detection such as intrusion detection is very intermittent as well as successively occurring when a single event takes place in most cases. By reflecting sensor network's key transmission patterns as above, EX-MAC has used multi-hub path's path reservation system and awake section's transmission time reservation method in data transmission when the first event takes place. The awake time reservation in transmission path has improved successive data transmission's end-to-end delay, and it has also increased efficiency in terms of energy consumption by reducing the preamble length of data transmission and reception node.

A Study on Development of Private Security Service: -Focused on event security service- (민간경비업무의 발전방안 연구: 이벤트 경비업무를 중심으로)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.157-176
    • /
    • 2018
  • The purpose of this study is to explore the development methods of private security services based on the problems that field experts in charge of event security are currently aware of. In order to accomplish the purpose of this study, we conducted interviews with 4 professors in relevant fields and 6 field experts with more than 10 years experience and analyzed the data. They suggested the development of private security services as follows. First, education that is related to event security work is necessary. Second, training should be conducted in response to audience and audience complaints. Third, service-related training is required. Fourth, in the Security Law, the provisions of the collective complaints field should be adjusted to the reality. Fifth, improving poor working conditions. Sixth, it is necessary to educate to develop responsibility and sense of mission.

Network Security Visualization for Trend and Correlation of Attacks (네트워크 공격 추이 및 공격 연관 정보 시각화)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.27-34
    • /
    • 2017
  • Network security visualization technique using security alerts provide the administrator with intuitive network security situation by efficiently visualizing a large number of security alerts occurring from the security devices. However, most of these visualization techniques represent events using overlap the timelines of the alerts or Top-N analysis by their frequencies resulting in failing to provide information such as the attack trend, the relationship between attacks, the point of occurrence of attack, and the continuity of the attack. In this paper, we propose an effective visualization technique which intuitively explains the transition of the whole attack and the continuity of individual attacks by arranging the events spirally according to timeline and marking occurrence point and attack type. Furthermore, the relationship between attackers and victims is provided through a single screen view, so that it is possible to comprehensively monitor not only the entire attack situation but also attack type and attack point.

The RTP Payload Format for Telepointing in Collaboration (공동작업에서의 텔리포인팅을 위한 RTP 페이로드 형식)

  • 전재우;오삼권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04b
    • /
    • pp.393-395
    • /
    • 2000
  • CSCW 시스템은 효율적인 공동작업의 인지를 위해 텔리포인팅, 스냅샷, 문서/프로젝트 추적등과 같은 기능들을 제공한다. 이 중 텔리포인팅은 지역 시스템의 공유윈도우에서 텔리포인터를 통해 발생한 이벤트를 원격지 시스템의 공유윈도우에 동기적으로 표현하는 기법이다. 텔리포인팅은 여러 연구들에서 응용된 바 있으나, 텔리포인팅의 프로토콜에 관한 연구는 미흡하다. 본 논문은 RTP(Real-Time Transport Protocol) 기반의 텔리포인팅을 위한 RTP 페이로드 형식을 정의한다.

  • PDF

A Study Based on Dangerous Situation Recognition using Smartphone Sensor. (스마트폰 센서 기반 위험상황인지에 관한 연구)

  • Choi, Jaehyun;Jang, Hyesun;Lim, Yangwon;Lim, Hankyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1713-1716
    • /
    • 2012
  • 최근 우리 사회에는 여성과 아동을 대상으로 하는 강력범죄들이 많이 발생하고 있어 개인 위치확인 및 안전에 대한 서비스들이 최근 재조명을 받고 있다. 하지만 서비스가 시작된 기간에 비해 아직도 높은 단말기 가격대와 월 사용료, 그리고 위험상황에서의 사용성은 상대적으로 미약한 발전을 이루었다. 그나마 스마트폰이 많이 보급되어 해당 서비스들의 가격이 조금씩 인하되고, GPS를 활용한 위치정보의 정확도를 개선하는 등 많은 노력을 기울이고 있지만 그 효과는 미비하다. 따라서 본 논문에서는 스마트폰의 다양한 센서를 이용하여, 스마트폰을 꺼낼 수 없는 위험상황에서 사용자가 위험상황에서 특정 이벤트를 발생시켜, 인지된 상태정보를 전송하는 방식을 분석하고, 이를 기반으로 앞으로 개인 안전에 대한 서비스가 발전할 방향을 제시하고자 한다.

Integration and Decision Algorithm for Location-Based Road Hazardous Data Collected by Probe Vehicles (프로브 수집 위치기반 도로위험정보 통합 및 판단 알고리즘)

  • Chae, Chandle;Sim, HyeonJeong;Lee, Jonghoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.173-184
    • /
    • 2018
  • As the portable traffic information collection system using probe vehicles spreads, it is becoming possible to collect road hazard information such as portholes, falling objects, and road surface freezing using in-vehicle sensors in addition to existing traffic information. In this study, we developed a integration and decision algorithm that integrates time and space in real time when multiple probe vehicles detect events such as road hazard information based on GPS coordinates. The core function of the algorithm is to determine whether the road hazard information generated at a specific point is the same point from the result of detecting multiple GPS probes with different GPS coordinates, Generating the data, (3) continuously determining whether the generated event data is valid, and (4) ending the event when the road hazard situation ends. For this purpose, the road risk information collected by the probe vehicle was processed in real time to achieve the conditional probability, and the validity of the event was verified by continuously updating the road risk information collected by the probe vehicle. It is considered that the developed hybrid processing algorithm can be applied to probe-based traffic information collection and event information processing such as C-ITS and autonomous driving car in the future.