• Title/Summary/Keyword: CCTV 감시

Search Result 272, Processing Time 0.026 seconds

Preliminary design for satellite image situation board linkage and display system (위성영상 상황판연계·표출시스템 예비설계)

  • Sang Min Lee;Eun Jeong Kim;Mi Rae Kim
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.458-458
    • /
    • 2023
  • 본 연구에서는 위성영상 활용 지능형 재난관측·감시 기술 개발을 목적으로 위성영상과 멀티소스(CCTV, 항공영상, 공공DB 등)와의 연계·융합을 통해 재난상황관리의 정확도 향상과 위성영상 활용성 제고 방안을 제시하고자 하였다. 위성영상 수집·배포시스템으로부터 전달되는 위성영상과 멀티소스의 연계 융합을 통한 재난상황정보의 표출을 목적으로 상황판연계 표출시스템 가동 절차와 위성영상 수집을 통한 위험탐지 알고리즘과의 연계를 위해 재난상황업무 기반 시스템 가동절차를 수립하고, 위기관리표준 매뉴얼 상 상황업무절차를 적용해 예비설계를 진행하였다. 상황실 실무자 설문을 통해 작성된 시스템 요구사항과 규격서를 기반으로 상황업무절차를 적용해 먼저업무시스템 설계를 진행하였다. 평시에는 GIS통합상황판에서 관리됨을 전제로 위성영상 수집에 대한국가적 예산 투입 측면을 고려해 중대본 설치가 필요한 대형재난 발생상황을 가정하여 상황판연계·표출시스템의 가동되도록 설계하였다. 또한, 위성영상 분석을 통한 피해위험도와 재난이력통계 등 멀티소스와 중첩한 결과를 실시간으로 표출함에 따라 상황실근무자는 재난확산 여부를 판단하고, NDMS를 통해 재난상황을 전파할 수 있도록 설계하였다. 상황판연계 표출시스템의 원활한 데이터 입/출력을 위해 재난유형 및 분석단계별 클래스 정의, 유스케이스 ID(요구기능)와 1:1 또는 1:n매칭을 수행하여 재난유형 및 분석단계별 클래스를 정의하였다. 정의된 클래스는 유스케이스인 요구기능과 매칭을 수행하였고, 시스템 가동절차 중 피해위험도분석, 재난이력통계, 중첩결과표출, NDMS 상황전파에 대한 상황업무절차를 기반으로 산불·홍수·산사태·대설·태풍 총 5종의재난별 시퀀스를 설계하였다. 마지막으로 화면정의서와 UI/UX설계서를 기반으로 Figma를 통해 시스템구동화면을 사전에 모의하였다. 향후, 진행되는 연구에서는 위성영상과 멀티소스를 연계한 화면을 실체화하여 더욱 정확한 재난상황관리가 가능하도록 NDMS 연계 상황판 표출 시스템을 개발하고자 한다.

  • PDF

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.

Monitoring the Reoccurrence of Fire Blight and the Eradication Efficiency of Erwinia amylovora in Burial Sites of Infected Host Plants Using Sentinel Plants (미끼식물을 이용한 화상병 감염 기주 매몰지 내 화상병균 제거 효율 검증 및 병 재발 모니터링)

  • In Woong, Park;Yu-Rim, Song;Nguyen Trung, Vu;Eom-Ji, Oh;In Sun, Hwang;Hyeonheui, Ham;Seong Hwan, Kim;Duck Hwan, Park;Chang-Sik, Oh
    • Research in Plant Disease
    • /
    • v.28 no.4
    • /
    • pp.221-230
    • /
    • 2022
  • The fire blight caused by Erwinia amylovora (Ea) was first reported in 2015 in Korea, and the disease has rapidly spread to 22 regions until 2021. In Korea, all host plants in the apple and pear orchards where fire blight occurred should be eliminated and buried by the Plant Protection Act. To prevent the spread of the disease, all burial sites were prohibited from planting the new host plants for the next three years. To confirm the eradication efficiency of Ea and the reoccurrence of fire blight, the surveillance facilities were established on three burial sites from 2019 to 2020 in Anseong-si, Gyeonggi-do, and Chungju-si, Chungcheongbuk-do. As host plants, five apple trees of fire blight-susceptible cultivar 'Fuji', were planted in each facility. All facilities were enclosed with fences and nets and equipped with two CCTVs, motion sensors, and several other sensors for recording weather conditions to monitor the environment of the sentinel plants in real-time. The sentinel plants were checked for the reoccurrence of fire blight routinely. Suspicious plant parts were collected and analyzed for Ea detection by loop-mediated isothermal amplification polymerase chain reaction and conventional polymerase chain reaction. Until November 2022, Ea has not been detected in all sentinel plants. These results might support that the burial control of infected plants in soil works efficiently to remove Ea and support the possibility to shorten the prohibition period of host plant establishment in the burial sites.

Restoration of endangered orchid species, Dendrobium moniliforme (L.) Sw. (Orchidaceae) in Korea (멸종위기 난과 식물 석곡의 복원)

  • Kim, Young-kee;Kang, Kyung-Won;Kim, Ki-Joong
    • Korean Journal of Plant Taxonomy
    • /
    • v.46 no.2
    • /
    • pp.256-266
    • /
    • 2016
  • A total of 13,000 individuals of Dendrobium moniliforme (L.) Sw. artificially propagated in laboratories and greenhouses were restored in their natural habitat of Bogildo Island, Wandogun, in the southern part of Korea in June of 2013. The growing conditions of the individuals were monitored for two years. The parental individuals for the restoration were obtained from a wild population in southern Korea, from which seeds were produced via artificial crossings. These seeds were germinated and cultivated in growing media and two-year-old plants were then grown in greenhouse beds. The genetic diversity among the propagated individuals was confirmed by examining DNA sequences of five regions of the chloroplast genome and the nuclear ITS region. The diversity values were as high as the average values of natural populations. All propagated individuals were transplanted into two different sites on Bogildo by research teams with local residents and national park rangers. After restoration, we counted and measured the surviving individuals, vegetative propagated stems, and growth rates in June of both 2014 and 2015. There was no human interference, and 97% of the individuals survived. The number of propagules increased by 227% in two years. In contrast, the average length of the stems decreased during the period. In addition, different survival and propagation rates were recorded depending on the host plants and the restored sites. The shaded sides of rock cliffs and the bark of Quercus salicina showed the best propagation rates, followed by the bark of Camellia japonica. A few individuals of D. moniliforme successfully flowered, pollinated, and fruited after restoration. Overall, our monitoring data over two years indicate that the restored individuals were well adapted and vigorously propagated at the restored sites. In order to prevent human disturbance of the restored sites, a CCTV monitoring system powered by a solar panel was installed after the restoration. In addition, a human surveillance system is operated by national park rangers with local residents.

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

A Study on Face Awareness with Free size using Multi-layer Neural Network (다층신경망을 이용한 임의의 크기를 가진 얼굴인식에 관한 연구)

  • Song, Hong-Bok;Seol, Ji-Hwan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.2
    • /
    • pp.149-162
    • /
    • 2005
  • This paper suggest a way to detect a specific wanted figure in public places such as subway stations and banks by comparing color face images extracted from the real time CCTV with the face images of designated specific figures. Assuming that the characteristic of the surveillance camera allows the face information in screens to change arbitrarily and to contain information on numerous faces, the accurate detection of the face area was focused. To solve this problem, the normalization work using subsampling with $20{\times}20$ pixels on arbitrary face images, which is based on the Perceptron Neural Network model suggested by R. Rosenblatt, created the effect of recogning the whole face. The optimal linear filter and the histogram shaper technique were employed to minimize the outside interference such as lightings and light. The addition operation of the egg-shaped masks was added to the pre-treatment process to minimize unnecessary work. The images finished with the pre-treatment process were divided into three reception fields and the information on the specific location of eyes, nose, and mouths was determined through the neural network. Furthermore, the precision of results was improved by constructing the three single-set network system with different initial values in a row.

Experimental study for Selective Withdrawal on Stratified Water Tank by using PIV (PIV를 활용한 성층수조에서 선택취수방안에 대한 실험적 연구)

  • Son, Byung-Ju;Park, Jae-Hyeon;Kim, Young-Do
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.556-559
    • /
    • 2007
  • 고탁수 장기화 문제를 해결하기 위한 방법으로는 고탁수층을 선택취수하여 우선 배제함으로써 하류하천의 고탁수 발생일수를 최소화하는 방법이 있는데, 이와 같은 선택적 취수기법은 저수지 운영에 있어서 고탁수층을 우선 배제한 후 홍수기 이후에 저수지내로 유입되는 청수를 담수하여 호소 내 탁도 저감 효과를 얻을 수 있다. 본 연구에서는 선택취수 시 성층수괴의 동수역학적 변화를 분석하기 위하여 국내에서 처음으로 Two-tank 기법을 이용하여 성층구조를 구현해 내었는데, 소금물의 밀도변화를 이용하여 수심 1m의 성층수조를 만들었고, 밀도경사가 상이한 성층구조에서 취수조건을 변화시키면서 비교란 유속계인 PIV 시스템을 이용해 유속의 흐름을 Vector와 Contour로 분석하였다. 선택취수에 대한 흐름의 동수역학적 분석결과 취수유량보다는 밀도성층경사 변화에 더 민감한 반응을 보였다. 취수유량을 줄이거나 밀도성층경사를 급하게 했을 때에는 선택취수 영역(withdrawal zone)의 수직방향 폭은 줄어드는 반면, X축으로의 영향범위는 증가함을 나타냈다. 취수유량을 증가시키거나 성층밀도경사를 완만히 했을 땐 선택취수 영역(withdrawal zone)의 수직방향 폭은 증가하였고 X축으로의 영향범위는 축소됨을 나타내었다. 이 결과는 Richardson 수로도 판단되어지는데, Richardson 수가 증가하면 유속에 비해 상대적으로 밀도성층경사가 크다는 것인데 이럴 경우 선택취수 영역(withdrawal zone)의 수직방향 폭 최대가 되고 선택취수 영역(withdrawal zone)의 수직방향 폭은 최소가 된다. 선택취수 영역(withdrawal zone)의 수직방향 폭이 최소가 되면 취수구 직경 D의 1.8배의 값을 가지고 Richradson 수가 최소가 되더라도 취수구 직경 D의 3.3배를 벗어나지 않는다는 결과를 도출할 수 있었다.링 목적으로 사용될 수 있다. 본 연구에서 개발한 영상수위계는 한강홍수통제소 관할의 전류, 청담대교 등 4개소 낙동강 홍수통제소 2개소, 지자체 등에 적용되었으며, 적용 결과 비교적 안정적이면서 정확하게 수위를 측정하는 것으로 나타났다. 한편 기존 CCD 카메라 이외에 CCTV를 이용한 영상수위계를 개발하여 영상의 화질 개선뿐 아니라 하천화상 감시 기능을 강화하였다.소류의 섭취율은 높았다. 집단간의 상관도를 보면 교육별로 김치, 장아찌, 콩이 각각 p>0.5 수준에서 유의한 차가 없었고, 나머지는 유의한 차가 있었다. 연령별로는 멸치가 유의한 차가 없었고(p>0.5), 수입별로는 콩이 유의한 차가 없었다(p>0.5). 4. 영양지식(營養知識) 검토 가정생활(家庭生活)에 필요(必要)한 일반적(一般的)인 영양지식(營養知識)은 대체적으로 낮은 편이었다. 어린이 영양, 편식의 해로움, 비만증의 해로움, 임신부 그리고 수유부 영양에 대하여는 일반적으로 알고 있다고 하였으며, 그다음으로 이유기 영양, 어린이 발육에 필요한 식품, 식품과 영양소와의 관계, 우유의 성분, 노인영양에 대하여 잘 알고 있는 비율이 낮았으며, 인체의 영양소, 식단작성여부, 간식의 이론, 식품감별법에 대하여는 가장 낮은 비율을 나타냈다. 각 영양지식은 교육정도가 높을수록 영양지식이 높았고, 교육별 집단간의 유의한 차가 나타났다. (0.001

  • PDF

A Development of Realtime Urban Flood Forecasting Service (도시하천의 실시간 홍수예측서비스 개발)

  • Kim, Hyung-Woo;Lee, Jong-Kook;Ha, Sang-Min
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.532-536
    • /
    • 2007
  • 급속한 도시화 및 지구온난화로 인한 집중호우로 홍수피해가 해마다 증가하고 있다. 홍수피해를 최소화하기 위하여 4대강 중심의 홍수예경보시스템이 구축되는 등 다양한 제도적 장치가 마련되고 있으나 중소하천이 분포되어 있는 도시유역에서의 홍수예측기능은 부족한 실정이다. 본 연구에서는 중소 도시하천에 적용 가능한 실시간 도시홍수예측서비스 시스템(Realtime Urban Flood Forecasting Service, U-FFS)을 개발하였다. 경기도 성남에 위치한 탄천을 대상유역으로 선정하고 실시간 강우 및 수위관측소를 설치하여 수문데이타를 수집하였으며 이를 바탕으로 수위예측모형을 구축하였다. 모형구축에는 이미 국내외 학계에서 그 정확도가 입증된 바 있는 Data-driven 모델의 일종인 ANFIS(Adaptive Neuro-Fuzzy Inference System)를 이용하였다. 개발된 수위예측모형은 지정된 시간에 자동으로 작동 가능한 실행파일로 프로그래밍되어 최종적으로 홍수예측 웹서비스와 연동된다. U-FFS는 집중호우 발생 시 최종 유출구의 30분, 1시간, 2시간 후의 수위 예측값을 웹 상을 통해 제공함으로써 언제 어디서나 홍수예측 정보를 누구나 손쉽게 획득할 수 있는 장점이 있다. 시범운영 결과, 30분 및 1시간 후의 수위 예측은 정확도가 매우 뛰어났으며 2시간 후의 수위 예측의 정확성은 다소 떨어지는 것으로 확인되었으나 전반적인 홍수예측 판단에는 무리가 없을 것으로 예상된다. 본 시스템의 홍수예측모형은 생성 및 수정이 간편하여 그 활용성이 매우 높을 것으로 기대된다. 특히 안전함을 지향하는 각종 U-City나 홍수피해가 빈번한 도시유역에 적용하면 기존 시스템과 차별화된 실시간 홍수예측 서비스가 가능해져 홍수피해를 최소화할 수 있을 것이다. 취수구 직경 D의 3.3배를 벗어나지 않는다는 결과를 도출할 수 있었다.링 목적으로 사용될 수 있다. 본 연구에서 개발한 영상수위계는 한강홍수통제소 관할의 전류, 청담대교 등 4개소 낙동강 홍수통제소 2개소, 지자체 등에 적용되었으며, 적용 결과 비교적 안정적이면서 정확하게 수위를 측정하는 것으로 나타났다. 한편 기존 CCD 카메라 이외에 CCTV를 이용한 영상수위계를 개발하여 영상의 화질 개선뿐 아니라 하천화상 감시 기능을 강화하였다.소류의 섭취율은 높았다. 집단간의 상관도를 보면 교육별로 김치, 장아찌, 콩이 각각 p>0.5 수준에서 유의한 차가 없었고, 나머지는 유의한 차가 있었다. 연령별로는 멸치가 유의한 차가 없었고(p>0.5), 수입별로는 콩이 유의한 차가 없었다(p>0.5). 4. 영양지식(營養知識) 검토 가정생활(家庭生活)에 필요(必要)한 일반적(一般的)인 영양지식(營養知識)은 대체적으로 낮은 편이었다. 어린이 영양, 편식의 해로움, 비만증의 해로움, 임신부 그리고 수유부 영양에 대하여는 일반적으로 알고 있다고 하였으며, 그다음으로 이유기 영양, 어린이 발육에 필요한 식품, 식품과 영양소와의 관계, 우유의 성분, 노인영양에 대하여 잘 알고 있는 비율이 낮았으며, 인체의 영양소, 식단작성여부, 간식의 이론, 식품감별법에 대하여는 가장 낮은 비율을 나타냈다. 각 영양지식은 교육정도가 높을수록 영양지식이 높았고, 교육별 집단간의 유의한 차가 나타났다. (0.001

  • PDF

A Study of a Virtual Reality Interface of Person Search in Multimedia Database for the US Defense Industry (미국 방위산업체 상황실의 인물검색 활동을 돕는 가상현실 공간 인터페이스 환경에 관한 연구)

  • Kim, Na-Young;Lee, Chong-Ho
    • Journal of Korea Game Society
    • /
    • v.11 no.5
    • /
    • pp.67-78
    • /
    • 2011
  • This paper introduces an efficient and satisfactory search interface that enables users to browse and find the video data they want from a massively huge video database widely used in various multimedia environment. The target user group is information analysts at US defense industry or governmental intelligence agencies whose job is to identify a certain person from a lot of video footage taken from CCTV(Closed-circuit Television) cameras. For the first user test, we suggested the CAVE-like virtual reality interface to be the most optimal for the tasks we designed for, so we compared this interface with desktop interface. The softwares and database developed and optimized for each task were used in this user test. For the second user test, we researched on what input devices would be most optimal for enhancing efficiency of search task in the CAVE-like virtual reality system. Especially we focused our effort on measuring the effectiveness and user satisfaction of three different types of devices that embody gestural interface input system that encourages users' ergonomic control of the interface. We also measured the time consumed for performing each task to find out the most efficient input device among the ones tested.

Development of a deep-learning based automatic tracking of moving vehicles and incident detection processes on tunnels (딥러닝 기반 터널 내 이동체 자동 추적 및 유고상황 자동 감지 프로세스 개발)

  • Lee, Kyu Beom;Shin, Hyu Soung;Kim, Dong Gyu
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.20 no.6
    • /
    • pp.1161-1175
    • /
    • 2018
  • An unexpected event could be easily followed by a large secondary accident due to the limitation in sight of drivers in road tunnels. Therefore, a series of automated incident detection systems have been under operation, which, however, appear in very low detection rates due to very low image qualities on CCTVs in tunnels. In order to overcome that limit, deep learning based tunnel incident detection system was developed, which already showed high detection rates in November of 2017. However, since the object detection process could deal with only still images, moving direction and speed of moving vehicles could not be identified. Furthermore it was hard to detect stopping and reverse the status of moving vehicles. Therefore, apart from the object detection, an object tracking method has been introduced and combined with the detection algorithm to track the moving vehicles. Also, stopping-reverse discrimination algorithm was proposed, thereby implementing into the combined incident detection processes. Each performance on detection of stopping, reverse driving and fire incident state were evaluated with showing 100% detection rate. But the detection for 'person' object appears relatively low success rate to 78.5%. Nevertheless, it is believed that the enlarged richness of image big-data could dramatically enhance the detection capacity of the automatic incident detection system.