• Title/Summary/Keyword: 자동탐지

Search Result 619, Processing Time 0.023 seconds

A study on the Development of Smoke Detector Sensitivity Test Equipment (휴대용 연기감도시험기 개발에 관한 연구)

  • Kim, Hyeong-Gweon;Kwon, Seong-Pil;Yoon, Hun-Ju;SaKong, Seong-Ho
    • Fire Science and Engineering
    • /
    • v.23 no.5
    • /
    • pp.125-132
    • /
    • 2009
  • In this study we could contribute to the development of a precise checking tool with which the reliability of the automatic fire detection systems was enhanced and the safety of the people was ensured. In the same way as the domestic technical standard, the portable smoke sensitivity tester, which was developed in this work, could be used to check the capability of the smoke detectors installed in the field. Its heater inside was warmed up to $400^{\circ}C$ in 40 seconds and the paper as a smoke source was burned to produce smoke for the test. With the Photoelectric smoke detector it was possible to measure and control the smoke concentration in a range from 0%/m to 25%/m. With the adjustment of rpm of the fan, it was possible to keep a constant wind velocity in a range from 20cm/sec to 40cm/sec.

A Study on Design and Implementation of an Analog Addressable Detector and a Fire Alarm System (아날로그 주소형 감지기와 자동화재탐지 시스템의 설계 및 구현사례에 대한 고찰)

  • Kim, Chong-Tai;Hong, Se-Kwun;Yoo, Young-Shin;Jung, Hae-Sung
    • Fire Science and Engineering
    • /
    • v.24 no.4
    • /
    • pp.1-11
    • /
    • 2010
  • This paper describes a design and implementation of an analog detector and a fire alarm system with recent technology on information and communication. A hierarchical architecture design from the detector to the main system enables to accommodate medium to large size buildings located nearby or far-away. And a software design from communication protocol to application program handles large amount of events efficiently to show information on a large LCD. A PC-based alarm system provides higher speed and larger capacity in a large LCD screen compared with foreign microprocessor-based small screen systems. Thus, very large buildings with several thousands of analog detectors can be easily covered in a single system. When an alarm occurs, a staff alarm scenario specially attempted only in the system is considered to play a major role to distinguish a real fire from unwanted alarms.

Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System) (W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.93-100
    • /
    • 2007
  • Internet had spread in all fields with the fast speed during the last 10 years. Lately, wireless network is also spreading rapidly. Also, number of times that succeed attack attempt and invasion for wireless network is increasing rapidly TMS system was developed to overcome these threat on wireless network. Existing TMS system supplies active confrontation mechanism on these threats. However, existent TMS has limitation that new form of attack do not filtered efficiently. Therefor this paper proposes a new method that it automatically compute the threat from the imput packets with vector space model and detect anomaly detection of wireless network. Proposed mechanism in this research analyzes similarity degree between packets, and detect something wrong symptom of wireless network and then classify these threats automatically.

Intelligent Mobile Surveillance System Based on Wireless Communication (무선통신에 기반한 지능형 이동 감시 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • In this paper, we develop an intelligent mobile surveillance system based on binary CDMA for the unmanned automatic tracking and surveillance. That is, we implement a intelligent surveillance system using the binary CDMA wireless communication technology which is applied the merit of CDMA and TDMA on it complexly. This system is able to monitor the site of the accident on network in real time and process the various situations by implementing the security surveillance system. This system pursues an object by the 360-degree using camera, expands image using a PTZ(Pan/Tilt/Zoom) camera zooming function, identifies the mobile objects image within a screen and transfers the identified image to the remote site. Finally, we show the efficiency of the implemented system through the simulation of the controlled situations, such as tracking coverage on objects, object expansion, object detection number, monitoring the remote transferred image, number of frame per second by the image output signal etc..

Development of Automatic Inspection System for ALC Block Using Distortion Correction Technique (왜곡 보정 기법을 이용한 ALC 블럭의 자동 검사 시스템 개발)

  • Han, Kwang-Hee;Huh, Kyung-Moo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.1
    • /
    • pp.1-6
    • /
    • 2010
  • The lens distortion in the machine vision system is inevitable phenomenon. Distortion is getting worse, due to the selection of lens in the trend of reducing prices and size of the system. In this trend, the distortion correction becomes more important. But, the traditional correction methods has problems, such as complexity and requiring more operations. Effective distorted digital image correction is the precondition of target detection and recognition based on vision inspection. To overcome the disadvantage of traditional distortion correction algorithms, such as complex modeling, massive computation and marginal information loss, an image distortion correction algorithm based on photogrammetry method is proposed in this paper. In our method, we use the lattice image as the measurement target. Through the experimental results, we could find that we can reduce the processing time by 4ms. And also the inspection failure rate of our method was reduced by 2.3% than human-eyes inspection method.

Automatic Fire Detector Spacing Calculation for Performance Based Design (성능위주설계를 위한 화재감지기배치의 공학적연구)

  • Park, Dong-Ha
    • Fire Science and Engineering
    • /
    • v.24 no.1
    • /
    • pp.15-23
    • /
    • 2010
  • Placement method for fire detectors prescribed in current fire safety regulation is just about placing a prescribed number of detectors according to the areas. However, this regulation has no scientific basis and standards from foreign countries are just introduced and fire detectors are installed complying with them. There are two standards in designing fire protection systems; Prescriptive-Based Design that follows stipulated regulations like fire safety standards and Performance-Based Design based on engineering knowledge such as fire dynamics, structural dynamics, mechanics of materials, fluid mechanics, and thermo dynamics. Recently, Fire Protection System Construction Business Act was revised so that fire protection systems can be designed using Performance-Based Design method ('05. 8. 4), though the method has not activated until now. In addition, the enforcement decree defines the range for specific objects of fire protection to which Performance-Based Design is applied ('07, 1. 24). At the moment, by manufacturing simulator so that formulas can be introduced and calculated with software in order to install fire detector of automatic fire detection systems keeping optimized distance, comparing the results with the state of fire detector placed according to Performance-Based Design and analyzing them, this study was intended to settle Performance-Based Design method in the future.

A Method of DTM Generation from KOMPSAT-3A Stereo Images using Low-resolution Terrain Data (저해상도 지형 자료를 활용한 KOMPSAT-3A 스테레오 영상 기반의 DTM 생성 방법)

  • Ahn, Heeran;Kim, Taejung
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.5_1
    • /
    • pp.715-726
    • /
    • 2019
  • With the increasing prevalence of high-resolution satellite images, the need for technology to generate accurate 3D information from the satellite images is emphasized. In order to create a digital terrain model (DTM) that is widely used in applications such as change detection and object extraction, it is necessary to extract trees, buildings, etc. that exist in the digital surface model (DSM) and estimate the height of the ground. This paper presents a method for automatically generating DTM from DSM extracted from KOMPSAT-3A stereo images. The technique was developed to detect the non-ground area and estimate the height value of the ground by using the previously constructed low-resolution topographic data. The average vertical accuracy of DTMs generated in the four experimental sites with various topographical characteristics, such as mountainous terrain, densely built area, flat topography, and complex terrain was about 5.8 meters. The proposed technique would be useful to produce high-quality DTMs that represent precise features of the bare-earth's surface.

iRF: Integrated Red Team Framework for Large-Scale Cyber Defence Exercise (iRF: 대규모 사이버 방어 훈련을 위한 통합 레드팀 프레임워크)

  • Jang, In Sook;Cho, Eun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1045-1054
    • /
    • 2021
  • As APT attacks become more frequent and sophisticated, not only the advancement of the security systems but also the competence of the cybersecurity officers of each institution that operates them is becoming increasingly important. In a large-scale cyber defence exercise with many blue teams participating and many systems to simulate and defend against, it should be possible to simulate attacks to generate various attack patterns, network payloads, and system events. However, if one RT framework is used, there is a limitation that it can be easily detected by the blue team. In the case of operating multiple RT frameworks, a lot of time and effort by experts for exercise setup and operation for each framework is required. In this paper, we propose iRF(integrated RT framework) that can automatically operate large-scale cyber defence exercise by integrating a number of open RT frameworks and RT frameworks created by ourselves.

Automatic Object Extraction from Electronic Documents Using Deep Neural Network (심층 신경망을 활용한 전자문서 내 객체의 자동 추출 방법 연구)

  • Jang, Heejin;Chae, Yeonghun;Lee, Sangwon;Jo, Jinyong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.11
    • /
    • pp.411-418
    • /
    • 2018
  • With the proliferation of artificial intelligence technology, it is becoming important to obtain, store, and utilize scientific data in research and science sectors. A number of methods for extracting meaningful objects such as graphs and tables from research articles have been proposed to eventually obtain scientific data. Existing extraction methods using heuristic approaches are hardly applicable to electronic documents having heterogeneous manuscript formats because they are designed to work properly for some targeted manuscripts. This paper proposes a prototype of an object extraction system which exploits a recent deep-learning technology so as to overcome the inflexibility of the heuristic approaches. We implemented our trained model, based on the Faster R-CNN algorithm, using the Google TensorFlow Object Detection API and also composed an annotated data set from 100 research articles for training and evaluation. Finally, a performance evaluation shows that the proposed system outperforms a comparator adopting heuristic approaches by 5.2%.

CNN Based Face Tracking and Re-identification for Privacy Protection in Video Contents (비디오 컨텐츠의 프라이버시 보호를 위한 CNN 기반 얼굴 추적 및 재식별 기술)

  • Park, TaeMi;Phu, Ninh Phung;Kim, HyungWon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.63-68
    • /
    • 2021
  • Recently there is sharply increasing interest in watching and creating video contents such as YouTube. However, creating such video contents without privacy protection technique can expose other people in the background in public, which is consequently violating their privacy rights. This paper seeks to remedy these problems and proposes a technique that identifies faces and protecting portrait rights by blurring the face. The key contribution of this paper lies on our deep-learning technique with low detection error and high computation that allow to protect portrait rights in real-time videos. To reduce errors, an efficient tracking algorithm was used in this system with face detection and face recognition algorithm. This paper compares the performance of the proposed system with and without the tracking algorithm. We believe this system can be used wherever the video is used.