• Title/Summary/Keyword: CCTV영상

Search Result 603, Processing Time 0.035 seconds

A study for object analysis based on context awareness scenario (상황인식 시나리오 기반 객체분석에 대한 연구)

  • Song, Jiyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3153-3158
    • /
    • 2014
  • Children in schoolzone accidents occur frequently in order to actively respond to the situation on the module for automated recognition research. By the vehicle penetration such like schoolzone, child object recognition, and GPS coordination information, the monitoring scenario can be constructed, and if an event occurs corresponding to strategic scenario so that suitable reaction can be provided to increase safety level to the schoolzone. In this paper, a GPS sensor and the image sensor and the monitoring server on the network based on the integration of context-aware methods have been studied. The image sensor section and the GPS section through analysis of the situation analysis and recognition of the object based on the scenario can actively cope with the situation according to the methods proposed.

Effective machine learning-based haze removal technique using haze-related features (안개관련 특징을 이용한 효과적인 머신러닝 기반 안개제거 기법)

  • Lee, Ju-Hee;Kang, Bong-Soon
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.83-87
    • /
    • 2021
  • In harsh environments such as fog or fine dust, the cameras' detection ability for object recognition may significantly decrease. In order to accurately obtain important information even in bad weather, fog removal algorithms are necessarily required. Research has been conducted in various ways, such as computer vision/data-based fog removal technology. In those techniques, estimating the amount of fog through the input image's depth information is an important procedure. In this paper, a linear model is presented under the assumption that the image dark channel dictionary, saturation ∗ value, and sharpness characteristics are linearly related to depth information. The proposed method of haze removal through a linear model shows the superiority of algorithm performance in quantitative numerical evaluation.

Video System for Real-time Criminal Activity Detection (실시간 범죄행위 감지를 위한 영상시스템)

  • Shin, Kwang-seong;Shin, Seong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.357-358
    • /
    • 2021
  • Although many people watch the scene with multiple surveillance cameras, it is difficult to ensure that immediate action can be taken in the event of a crime. Therefore, there is a need for a "crime behavior detection system" that can analyze images in real time from multiple surveillance cameras installed in elevators, call immediate crime alerts, and track crime scenes and times effectively. In this paper, a study was conducted to detect violent scenes occurring in elevators using Scene Change Detection. For effective detection, an x2-color histogram combining color histogram and histogram was applied.

  • PDF

A Study on the Surveillance System of Multiple Object's Dangerous Behaviors (다중 객체의 위험 행동 감시 시스템 연구)

  • Shim, Young-Bin;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.455-462
    • /
    • 2013
  • This paper proposes a detection system that, by determining whether a dangerous act is being carried out among other pedestrians in the images captured using CCTV, provides pre-warnings and establishes emergency measures. To determine the presence of a dangerous act, after setting zones of interest and danger zones within those zones of interest, the danger level is determined in accordance with the range of encroachment upon detecting an object. Especially, this research aims at detecting a suicide jump from the bridge and extends to detecting a dangerous act among pedestrians from detecting a dangerous act of only one person with no one in the previous research. This system classifies the status into 3 levels as safe, alert, and danger according to the amount of part being over the bridge railing. If a situation is deemed as warning-worthy and emergency, the integrated control center is immediately alerted to facilitate prevention in advance.

A Handover Protocol for the IEEE WAVE-based Wireless Networks (IEEE WAVE 기반의 무선 네트워크를 위한 핸드오버 프로토콜)

  • Choi, Jung-Wook;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.1
    • /
    • pp.76-83
    • /
    • 2011
  • The IEEE WAVE-based communication systems do not provide handover services since most of the application layer messages of a small amount containing text data that are related to safe driving. Multimedia data service such as web pages and CCTV video clips, however, require a seamless handover for continuation of a session via multiple RSUs. In this paper, we propose a new proactive handover protocol based on IEEE WAVE. According to the proposed handover protocol, the OBU notifies the old RSU of its departure from the coverage such that the old RSU forwards to the new RSU the data heading towards the OBU to be cached for the further delivery upon its entry into the new RSU's coverage. The simulation results are presented which shows the performance of the proposed protocol in terms of throughput, delivery ratio and handover delay.

Facial Feature Verification System based on SVM Classifier (SVM 분류기에 의한 얼굴 특징 식별 시스템)

  • Park Kang Ryoung;Kim Jaihie;Lee Soo-youn
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.675-682
    • /
    • 2004
  • With the five-day workweek system in bank and the increased usage of ATM(Automatic Toller Machine), it is required that the financial crime using stolen credit card should be prevented. Though a CCTV camera is usually installed in near ATM, an intelligent criminal can cheat it disguising himself with sunglass or mask. In this paper, we propose facial feature verification system which can detect whether the user's face can be Identified or not, using image processing algorithm and SVM(Support Vector Machine). Experimental results show that FAR(Error Rate for accepting a disguised man as a non-disguised one) is 1% and FRR(Error Rate for rejecting a normal/non-disguised man as a disguised one) is 2% for training data. In addition, it shows the FAR of 2.5% and the FRR of 1.43% for test data.

Robust Object Tracking for Scale Changes (스케일에 강건한 물체 추적 기법)

  • Cheon, Gi-Hong;Kang, Hang-Bong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.194-203
    • /
    • 2008
  • Though conventional video surveillance systems such as CCTV depended on operators, recently developed intelligent surveillance systems no longer needed operators. However, these new intelligent surveillance systems have their own problems such as Occlusion, changing scale of target object, and affine. This paper handled information damage caused by changing the scale of the target object among other objects. Due to the change of the scale, the inaccurate information of target can be obtained when we update the background information. To handle this problem, we introduce a solution for information damage caused by problem of changing scale of target object located among other objects. Specifically, we suggest multi-stage sampling particle filter based advanced MSER for object tracking system. Through this method, the problem caused by changing scale of target can be avoided.

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

Work Environment Monitoring of Workers Using Wearable Sensor and Helmet (착용형 센서와 헬멧을 이용한 작업자의 작업환경 모니터링)

  • Gu, Ye-Jin;Kim, Jong-Jin;Chung, Wan-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.2
    • /
    • pp.91-98
    • /
    • 2019
  • Accidents of worker that occur in isolated places are difficult to rescue, unlike general construction accidents. There is a problem of communication limitation when an accident occurs in an isolated place. Also, it is difficult to search the accident place due to the absence of CCTV. In order to solve these problems, this paper proposes a device that combines IoT technology with a safety helmet, which must be worn in the workplace. The proposed device additionally designs and implements a real-time PPG(Photoplethysmography) sensor, body temperature sensor, accelerometer sensor and a camera sensor on the helmet. The proposed helmet system allows the user and the control center to monitor the state of the worker. In addition, when an abnormal biological signal or fall occurs to the worker, the image is transmitted to the control center. By using the proposed system, it is possible to check the status of the worker in real time, so that it has an advantage that it can cope with the accident quickly.

A Study for Smart Apartment for Supporting Intelligent Service based on Ubiquitous (유비쿼터스 기반의 지능형 서비스를 지원하는 스마트 아파트 연구)

  • Ahn, Byeong-Tae;Lee, Chong-Ha;Chung, Bhum-suk
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.247-261
    • /
    • 2013
  • Recently, the smart phone, a carrying along terminal connection technology such as Galaxytap/iPad etc. evolves, and supply is increasing rapidly, is included for smart phone because various sensor technologies are developed and service application that is acted in terminal with this is accompanied and grow. Continuously 4 generation to 3 Gs, Wibro Wireless network technology of communications a LTE technology from that is constructed, environment for Ubiquitous realization is being constructed fast. Therefore, in this paper it can inquire state of electronic, furniture devices through apartment complex web server and gear that control groove network at smart phone, and control, and confirms home state prevention of crimes state, and video inquiry of position that CCTV is placed in apartment complex was available. And it proposed integrated smart apartment with parking system and medical system using RFID system in ubiquitous environment.

  • PDF