• Title/Summary/Keyword: 차량 탐지

Search Result 232, Processing Time 0.015 seconds

Performance Enhancement Algorithm using Supervised Learning based on Background Object Detection for Road Surface Damage Detection (도로 노면 파손 탐지를 위한 배경 객체 인식 기반의 지도 학습을 활용한 성능 향상 알고리즘)

  • Shim, Seungbo;Chun, Chanjun;Ryu, Seung-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.3
    • /
    • pp.95-105
    • /
    • 2019
  • In recent years, image processing techniques for detecting road surface damaged spot have been actively researched. Especially, it is mainly used to acquire images through a smart phone or a black box that can be mounted in a vehicle and recognize the road surface damaged region in the image using several algorithms. In addition, in conjunction with the GPS module, the exact damaged location can be obtained. The most important technology is image processing algorithm. Recently, algorithms based on artificial intelligence have been attracting attention as research topics. In this paper, we will also discuss artificial intelligence image processing algorithms. Among them, an object detection method based on an region-based convolution neural networks method is used. To improve the recognition performance of road surface damage objects, 600 road surface damaged images and 1500 general road driving images are added to the learning database. Also, supervised learning using background object recognition method is performed to reduce false alarm and missing rate in road surface damage detection. As a result, we introduce a new method that improves the recognition performance of the algorithm to 8.66% based on average value of mAP through the same test database.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF