• Title/Summary/Keyword: CCTVs

Search Result 95, Processing Time 0.041 seconds

Behavior of Integrated Column and Foundation by Field Load Tests (기초와 기둥 통합구조물의 현장시험 및 거동)

  • Yoon, Yeo-Won;Kim, Keun-Soo;Min, Kwang-Hong;Lee, Young-Ho;Kim, Dae-Hak
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.1073-1076
    • /
    • 2010
  • Shallow foundations of various columns such as traffic signs, CCTVs, traffic lights, street lights, steel telephone poles and so on are made by cast-in-situ concrete method. However, typical cast-in-situ method has many problems because of the long duration of construction, occupation of sidewalks and low strength of the concrete after curing. In order to solve the problems, field load tests for the prefabricated DSF foundation made by combination of column and foundation was conducted to know load-deformation behavior by torsional tests.

  • PDF

A Study on the Policy Advice of Integrated CCTV Control Center

  • Chung, ChoongSik
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.46-55
    • /
    • 2017
  • In recent years, public area CCTV has also begun to become more popular in the Korea. 2011, Korea's Ministry of Public Administration and Security has recommended that other local governments set up an integrated CCTV control center in each of their districts. The ministry was planning to make it compulsory for local governments to install an integrated CCTV control center by 2015. More than 570,000 public cameras are managed by public agencies and local government offices. Currently, the integrated CCTV control center is playing a very positive role in fighting crimes in the district particularly through its liaison with the district police. The CCTVs were operated by a several different agencies and departments in the district, resulting in considerable redundancy in public service, inefficiency and delays in response to crimes, and other emergency situations. Therefore, Control Center should be operated lawfully and efficiently. CCTV Control Center will be managed by three ways: (1) IT Governance through cooperation with civil areas (2) by regulated with proper laws and (3) managed by proper guideline and personal training.

Security Problems and Measures for IP Cameras in the environment of IoT

  • Kang, Gil-uk;Han, Sang-Hoon;Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.107-113
    • /
    • 2019
  • Along with the development of IOT, the number of people using IOT devices has enormously increased and the IOT era has come. Especially, people using the IP cameras among Internet devices have been drastically increasing. It is because the IP cameras are well networked and comparatively cheap compared with CCTVs, and they can also be monitored and controlled in real time through PCs and smart phones for the purposes of general theft prevention and shop surveillance. However, due to the user's serious lack of security awareness and the fact that anyone can easily hack only with simple hacking tools and hacking sites information, security crimes that exploit those have been increasing as well. Therefore, this paper describes how easily the IP cameras can be hacked in the era of IOT, what kind of security incidents occurred, and also suggests possible government measures and new technical solutions to those problems.

Abrupt scene detection technique using histogram operation (히스토그램 연산을 이용한 급격한 장면의 검출 기법)

  • Shin, Seong-Yoon;Shin, Kwang-Seong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.425-426
    • /
    • 2022
  • Many CCTVs are installed around the area for the purpose of preventing crime. In this case, it is necessary to sound an alarm when a specific situation occurs because many people cannot be watching CCTV. It is necessary to analyze the video data to determine what kind of behavior it is. In this study, we propose a scene change detection technique through histogram operation, paying attention to the change of the histogram due to a sudden movement.

  • PDF

A Study on the Problems in the Use of CCTV by the Police and Some Proposals (경찰CCTV 운용상의 문제점과 개선방안)

  • Lee, Sang-Won;Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.215-242
    • /
    • 2005
  • As CCTV can be an effective tool to prevent or suppress crime at low cost, they have been widesoread in developed countries. In spite of their effectiveness, they infringe some constitutional rights such as the right to privacy, the right of likeness and the right to control over personal information. The police and ward offices install CCTV in public areas to prevent crimes without a legal basis or standard. When information obtained in such a way is used as investigation data for the police or as an evidence in a court, it can cause serious trouble. To solve this problem, legal restriction on the installation of CCTV as should be clearer. Since current laws on public agencies' protection of personal information are too general, they are not effective enough to protect personal information. Therefore, Personal Information Protection Organic Act should be enacted to make a legal basis for protecting comprehensive personal information. It should be obvious who installs CCTVs, who pay for the cost and how they are managed. Before installation, the police and ward offices should obtain residents' consent through a public hearing or voting (on the range and purpose of installation), or conduct an impact assessment. During installation, CCTVs should be limited to prevent or suppress crimes, keep public order and void dangers. In case of making a sign of installation, it must specify its rights. After installation(operation/management phase), they should abide by principles of information protection and try not to infringe constitutional right. In the cognitive aspect, the police should constitutional rights must be secured although it is important to carry out their missions. The police should serve citizens and change to the police of communities. Citizens should understand that constitutional right can be infringed if public order is not maintained. When citizens cooperate with the police, they fear of crimes will decrease.

  • PDF

Design of Splunk Platform based Big Data Analysis System for Objectionable Information Detection (Splunk 플랫폼을 활용한 유해 정보 탐지를 위한 빅데이터 분석 시스템 설계)

  • Lee, Hyeop-Geon;Kim, Young-Woon;Kim, Ki-Young;Choi, Jong-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.76-81
    • /
    • 2018
  • The Internet of Things (IoT), which is emerging as a future economic growth engine, has been actively introduced in areas close to our daily lives. However, there are still IoT security threats that need to be resolved. In particular, with the spread of smart homes and smart cities, an explosive amount of closed-circuit televisions (CCTVs) have been installed. The Internet protocol (IP) information and even port numbers assigned to CCTVs are open to the public via search engines of web portals or on social media platforms, such as Facebook and Twitter; even with simple tools these pieces of information can be easily hacked. For this reason, a big-data analytics system is needed, capable of supporting quick responses against data, that can potentially contain risk factors to security or illegal websites that may cause social problems, by assisting in analyzing data collected by search engines and social media platforms, frequently utilized by Internet users, as well as data on illegal websites.

Deep Learning Object Detection to Clearly Differentiate Between Pedestrians and Motorcycles in Tunnel Environment Using YOLOv3 and Kernelized Correlation Filters

  • Mun, Sungchul;Nguyen, Manh Dung;Kweon, Seokkyu;Bae, Young Hoon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.7
    • /
    • pp.1266-1275
    • /
    • 2019
  • With increasing criminal rates and number of CCTVs, much attention has been paid to intelligent surveillance system on the horizon. Object detection and tracking algorithms have been developed to reduce false alarms and accurately help security agents immediately response to undesirable changes in video clips such as crimes and accidents. Many studies have proposed a variety of algorithms to improve accuracy of detecting and tracking objects outside tunnels. The proposed methods might not work well in a tunnel because of low illuminance significantly susceptible to tail and warning lights of driving vehicles. The detection performance has rarely been tested against the tunnel environment. This study investigated a feasibility of object detection and tracking in an actual tunnel environment by utilizing YOLOv3 and Kernelized Correlation Filter. We tested 40 actual video clips to differentiate pedestrians and motorcycles to evaluate the performance of our algorithm. The experimental results showed significant difference in detection between pedestrians and motorcycles without false positive rates. Our findings are expected to provide a stepping stone of developing efficient detection algorithms suitable for tunnel environment and encouraging other researchers to glean reliable tracking data for smarter and safer City.

A Comparative Analysis on ECC(Elliptic Curve Cryptography) Operation Algorit hm for Data Protection in Video security System (영상보안시스템에서의 데이터 보호를 위한 ECC(Elliptic Curve Cryptography) 연산알고리즘 비교분석)

  • Kim, Jongmin;Choo, Hyunwook;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.37-45
    • /
    • 2019
  • Video security systems change from analog based systems to network based CCTVs. Therefore, such network based systems are always exposed not only to threats of eavesdropping and hacking, but to personal damage or public organizations' damage due to image information leakage. Therefore, in order to solve the problem, this study conducts a comparative analysis on proposes the optimal ECC(Elliptic Curve Cryptography) scalar multiplication algorithms for image information protection in data communication process and thereby proposes the optimal operation algorithm of video security system.

Design and Implementation of CCTV Remote Real-time Monitoring and Context Reporting System using Xcode (Xcode를 이용한 CCTV 원격 실시간 모니터링 및 상황 알림보고 시스템의 설계 및 구현)

  • Yang, Soo-Mi;Kim, Yu-Rim
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.83-89
    • /
    • 2015
  • In the wide area surveillance system including many CCTVs, application for remote realtime monitoring is designed and implemented. The applications using Xcode provide secure administrator interface from headquarters. Through the efficient and intuitive interface, it delivers real-time context reports and inference results. For the user convenience, it includes push alarm of events, SNS, Media streaming service for real-time monitoring uses Wirecast and Wowza media server. Wowza stream engine provides URL accommodating development specification. Mobile devices can receive real-time stream data. Performance evaluation in the processing is provided.

Time Series Image Stereo Matching Experiment Using the Overlap Method (중첩 방식을 이용한 시계열 영상의 스테레오 정합 실험)

  • Kim, Kang San;Pyeon, Mu Wook;Kim, Jong Hwa;Moon, Kwang Il
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.1
    • /
    • pp.123-128
    • /
    • 2015
  • In this study, experimented how to increase corresponding points which are obtained through stereo matching for dense 3D reconstruction. After extracting a snapshot image from the images acquired through stereo CCTVs, the matching points obtained using the SIFT matching and RANSAC procedure were gradually overlapped. In conclusion, it was confirmed that as images are overlapped, the number of matching points continues to grow.