• Title/Summary/Keyword: Environment surveillance network

Search Result 89, Processing Time 0.026 seconds

YOLOv5 based Anomaly Detection for Subway Safety Management Using Dilated Convolution

  • Nusrat Jahan Tahira;Ju-Ryong Park;Seung-Jin Lim;Jang-Sik Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.2_1
    • /
    • pp.217-223
    • /
    • 2023
  • With the rapid advancement of technologies, need for different research fields where this technology can be used is also increasing. One of the most researched topic in computer vision is object detection, which has widely been implemented in various fields which include healthcare, video surveillance and education. The main goal of object detection is to identify and categorize all the objects in a target environment. Specifically, methods of object detection consist of a variety of significant techniq ues, such as image processing and patterns recognition. Anomaly detection is a part of object detection, anomalies can be found various scenarios for example crowded places such as subway stations. An abnormal event can be assumed as a variation from the conventional scene. Since the abnormal event does not occur frequently, the distribution of normal and abnormal events is thoroughly imbalanced. In terms of public safety, abnormal events should be avoided and therefore immediate action need to be taken. When abnormal events occur in certain places, real time detection is required to prevent and protect the safety of the people. To solve the above problems, we propose a modified YOLOv5 object detection algorithm by implementing dilated convolutional layers which achieved 97% mAP50 compared to other five different models of YOLOv5. In addition to this, we also created a simple mobile application to avail the abnormal event detection on mobile phones.

Design of detection method for smoking based on Deep Neural Network (딥뉴럴네트워크 기반의 흡연 탐지기법 설계)

  • Lee, Sanghyun;Yoon, Hyunsoo;Kwon, Hyun
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.191-200
    • /
    • 2021
  • Artificial intelligence technology is developing in an environment where a lot of data is produced due to the development of computing technology, a cloud environment that can store data, and the spread of personal mobile phones. Among these artificial intelligence technologies, the deep neural network provides excellent performance in image recognition and image classification. There have been many studies on image detection for forest fires and fire prevention using such a deep neural network, but studies on detection of cigarette smoking were insufficient. Meanwhile, military units are establishing surveillance systems for various facilities through CCTV, and it is necessary to detect smoking near ammunition stores or non-smoking areas to prevent fires and explosions. In this paper, by reflecting experimentally optimized numerical values such as activation function and learning rate, we did the detection of smoking pictures and non-smoking pictures in two cases. As experimental data, data was constructed by crawling using pictures of smoking and non-smoking published on the Internet, and a machine learning library was used. As a result of the experiment, when the learning rate is 0.004 and the optimization algorithm Adam is used, it can be seen that the accuracy of 93% and F1-score of 94% are obtained.

A New Moving Mobile Base Station (MMBS) Scheme for Low Power RMIMS Wireless System (PARTI: MMBS general issues, clystering and signalling Procedures) (저전력 RMIMS 무선 터미널을 위한 새로운 움직이는 이동 기지국 시스템 구조 (1부 : MMBS 일반사항, 클러스터링 및 신호절차))

  • 박수열;고윤호;유상조;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2298-2319
    • /
    • 1999
  • In this paper, we propose a new moving mobile base station (MMBS) scheme for very low power and micro-size RMIMS (radio-interfaced micro information monitoring system) terminals. RMIMS terminals can be used in various application service areas such as pollution monitoring, environment surveillance, traffic monitoring, emergency monitoring (e.g., building, bridge, railroad breakdown), security monitoring (e.g., theft, alarm) and military application. For these applications based on wireless transmission technologies, sensor type RMIMS terminals must satisfy low cost and low power design (e.g., solar power, life limited battery) requirement. In RMIMS terminal design, this low power requirement limits transmission range of uplink or reverse link and means small cell size. Also these applications using RMIMS terminals may have a little bit non real-time traffic characteristic and low scattering density in service area.

  • PDF

Implementation of Home Monitoring System Using a Vacuum Robot with Wireless Router (유무선공유기와 청소로봇을 이용한 홈 모니터링 시스템의 구현)

  • Jeon, Byung-Chan;Choi, Gyoo-Seok;Kang, Jeong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.73-80
    • /
    • 2008
  • The recent trend in home network system includes intelligent home environments that remote monitoring and control service is achieved without restrictions by device types, time, and place. Also the use of a vacuum robot in homes is gradually generalized on account of the convenience of the use. In this paper, we proposed and realized new home-monitoring system with the employment of an self-movement robot as one trial for realizing an intelligent home under home network environment. The proposed system can freely monitor every where in home, because the system effectively overcame the surveillance limitations of the existing monitoring system by attaching a Wireless Router and WebCam to a commercial vacuum robot. The outdoor users of this system can readily monitor any place which they want to supervise by controlling a vacuum robot with mobile telecommunication devices such as PDA. The wireless router installed with Linux operation system "OpenWrt" made it possible for the system users to transmit images and to control a vacuum robot with RS-232 communication.

  • PDF

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

Object Recognition Using Convolutional Neural Network in military CCTV (합성곱 신경망을 활용한 군사용 CCTV 객체 인식)

  • Ahn, Jin Woo;Kim, Dohyung;Kim, Jaeoh
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.2
    • /
    • pp.11-20
    • /
    • 2022
  • There is a critical need for AI assistance in guard operations of Army base perimeters, which is exacerbated by changes in the national defense and security environment such as force reduction. In addition, the possibility for human error inherent to perimeter guard operations attests to the need for an innovative revamp of current systems. The purpose of this study is to propose a real-time object detection AI tailored to military CCTV surveillance with three unique characteristics. First, training data suitable for situations in which relatively small objects must be recognized is used due to the characteristics of military CCTV. Second, we utilize a data augmentation algorithm suited for military context applied in the data preparation step. Third, a noise reduction algorithm is applied to account for military-specific situations, such as camouflaged targets and unfavorable weather conditions. The proposed system has been field-tested in a real-world setting, and its performance has been verified.

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.

A Security Architecture of the inter-VTS System for shore side collaboration of e-Navigation (안전한 e-Navigation을 위한 해상교통관제 시스템의 정보교환 보안구조 설계)

  • Lee, Byung-Gil;Han, Jong-Wook;Cho, Hyun-Suk;Park, Nam-Je
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.1-7
    • /
    • 2012
  • A concept of the "e-Navigation" was introduced in 2005 and implementation strategies are under way by IMO/IALA in the maritime safety area. Specially VTS is an important maritime traffic monitoring and aids to navigation system which is aims to improve safety, navigation efficiency and protect the marine environment. The demand of the inter-VTS networking has been increased and standardization is underway for realization of shore side collaboration for maritime safety in IALA. But there may be security problems in the inter-VTS networks if they have not proper security mechanism. The hacking of realtime ship position and sensitive maritime surveillance information caused a critical accident of vessel, human life and environment by terrorist. This paper aims to design of a secure inter-VTS network structure and related security protocol for secure sharing of sensitive maritime data.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

An Overview of Operations and Applications of HF Ocean Radar Networks in the Korean Coast (한국연안 고주파 해양레이더망 운영과 활용 개관)

  • Kim, Ho-Kyun;Kim, Jung-Hoon;Son, Young-Tae;Lee, Sang-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.351-375
    • /
    • 2018
  • This paper aims to i) introduce the characteristics of HF ocean radar and the major results and information produced by the radar networks in the Korean coasts to the readers, ii) make an up-to-date inventory of the existing radar systems, and iii) share the information related to the radar operating skill and the ocean current data application. The number of ocean radars has been showing a significant growth over the past 20 years, currently deploying more than 44 radars in the Korean coasts. Most of radars are in operation at the present time for the purposes related to the marine safety, tidal current forecast and understanding of ocean current dynamics, mainly depending on the mission of each organization operating radar network. We hope this overview paper may help expand the applicability of the ocean radar to fisheries, leisure activity on the sea, ocean resource management, oil spill response, coastal environment restoration, search and rescue, and vessel detection etc., beyond the level of understanding of tidal and ocean current dynamics. Additionally we hope this paper contributes further to the surveillance activity on our ocean territory by founding a national ocean radar network frame and to the domestic development of ocean radar system including signal processing technology.