• Title/Summary/Keyword: IP camera

Search Result 124, Processing Time 0.027 seconds

Implementation of Attendance Management Sysem Utilizing RFID and Smart Phone (RFID와 스마트 폰을 이용한 출결관리 시스템 구현)

  • Yun, Nam Il;Ahn, Sung Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.151-157
    • /
    • 2012
  • This paper implements an effective attendance management and monitoring system utilizing the RFID(Radio Frequency IDentification) and Smart phone for student. In this paper, RFID system use 13.56MHz to control the attendance, and we can show that information of RFID and dynamic image through IP camera in Smart phone. We also make up the contents and database utilizing the labview program in computer. Especially, proposed technique can obtain dynamic image by server implementation at real time basis so that it is possible to use simultaneously several Smart phone. From the various and practical experiment, it is confirm that proposed system is useful for attendance management and remotely monitoring.

Omnidirectional Camera-based Image Rendering Synchronization System Using Head Mounted Display (헤드마운티드 디스플레이를 활용한 전방위 카메라 기반 영상 렌더링 동기화 시스템)

  • Lee, Seungjoon;Kang, Suk-Ju
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.6
    • /
    • pp.782-788
    • /
    • 2018
  • This paper proposes a novel method for the omnidirectional camera-based image rendering synchronization system using head mounted display. There are two main processes in the proposed system. The first one is rendering 360-degree images which are remotely photographed to head mounted display. This method is based on transmission control protocol/internet protocol(TCP/IP), and the sequential images are rapidly captured and transmitted to the server using TCP/IP protocol with the byte array data format. Then, the server collects the byte array data, and make them into images. Finally, the observer can see them while wearing head mounted display. The second process is displaying the specific region by detecting the user's head rotation. After extracting the user's head Euler angles from head mounted display's inertial measurement units sensor, the proposed system display the region based on these angles. In the experimental results, rendering the original image at the same resolution in a given network environment causes loss of frame rate, and rendering at the same frame rate results in loss of resolution. Therefore, it is necessary to select optimal parameters considering environmental requirements.

3-D Position Analysis of an Object using a Monocular USB port Camera through JAVA (한 대의 USB 카메라와 자바를 이용한 3차원 정보 추출)

  • Ji, Chang-Ho;Dong-Youp, Dong-Youp;Chang, Yu-Shin;Lee, M.H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2326-2328
    • /
    • 2001
  • This paper's purpose is to obtain 3-Dimension information by using a monocular camera. This system embodies to obtain the height of object by using trigonometry method between a reference point of circumstance and an object. It is possible to build up system regardless of operating system, and then set it up. An comfortable USB port camera is used everywhere without the capture board. The internet can be used by using the applet and JMF everywhere. We regard the camera as a fixed. And we have developed a Real-Time JPEG/RTP Network Camera system using UDP/IP on Ethernet.

  • PDF

Real-time Video Auto White Balance Algorithm Implementation for HD IP Network Camera based on DM36x (DM36x 기반 HD IP 네트워크 카메라를 위한 실시간 비디오 자동 백색 보정 알고리즘 구현)

  • Choi, Kwon-Seok;Chung, Sun-Tae;Kang, Ho-Seok
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.18-21
    • /
    • 2012
  • 자동 백색 보정은 디지털 비디오 프로세싱에서 매우 중요한 기능이며, IP 네트워크 카메라의 경우에도 필수적인 영상 전처리 과정이다. 본 논문은 TI 사의 비디오 프로세서인 DM36x을 이용하여 제작된 HD IP 네트워크 카메라에서의 실시간으로 동작할 수 있는 효과적인 비디오 자동 백색 보정 알고리즘을 구현한 결과를 기술한다. 구현한 자동 백색 보정 알고리즘은 매우 효과적인 것으로 알려진 그레이 컬러 포인트 기반 알고리즘을 DM36x의 AWB 엔진이 제공하는 기능을 이용하여 실시간으로 동작될 수 있도록 고쳐서 구현하였다.

  • PDF

The potential of non-movement behavior observation method for detection of sick broiler chickens

  • Hyunsoo Kim;Woo-Do Lee;Hyung-Kwan Jang;Min Kang;Hwan-Ku Kang
    • Journal of Animal Science and Technology
    • /
    • v.65 no.2
    • /
    • pp.441-458
    • /
    • 2023
  • The poultry industry, which produces excellent sources of protein, suffers enormous economic damage from diseases. To solve this problem, research is being conducted on the early detection of infection according to the behavioral characteristics of poultry. The purpose of this study was to evaluate the potential of a non-movement behavior observation method to detect sick chickens. Forty 1-day-old Ross 308 males were used in the experiments, and an isolator equipped with an Internet Protocol (IP) camera was fabricated for observation. The chickens were inoculated with Salmonella enterica serovar Gallinarum A18-GCVP-014, the causative agent of fowl typhoid (FT), at 14 days of age, which is a vulnerable period for FT infection. The chickens were continuously observed with an IP camera for 2 weeks after inoculation, chickens that did not move for more than 30 minutes were detected and marked according to the algorithm. FT infection was confirmed based on clinical symptoms, analysis of cardiac, spleen and liver lesion scores, pathogen re-isolation, and serological analysis. As a result, clinical symptoms were first observed four days after inoculation, and dead chickens were observed on day six. Eleven days after inoculation, the number of clinical symptoms gradually decreased, indicating a state of recovery. For lesion scores, dead chickens scored 3.57 and live chickens scored 2.38. Pathogens were re-isolated in 37 out of 40 chickens, and hemagglutination test was positive in seven out of 26 chickens. The IP camera applied with the algorithm detected about 83% of the chickens that died in advance through non-movement behavior observation. Therefore, observation of non-movement behavior is one of the ways to detect infected chickens in advance, and it appears to have potential for the development of remote broiler management system.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Web-based Servo Motor Controller Design with Real-time Micro Embedded Operating System

  • Kim, Ga-Gue;Lee, Hyung-Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1655-1658
    • /
    • 2004
  • In this paper, we design and implement remote servo motor control system with real-time micro embedded operating system. The system, where controller and camera image grabber are mounted, handles control commands transmitted from a remote PC web browser. A hard real-time servo motor driver running on the real-time micro embedded OS and then a digital control application which confirms precise sampling time intervals is constructed. Frame grabber images transmitted from camera are saved in a image data format to view on remote PC web browser.

  • PDF

Smart Phone Based Image Processing Methods for Motion Detection of a Moving Object via a Network Camera (네트워크 카메라의 움직이는 물체 감지를 위한 스마트폰 기반 영상처리 방법)

  • Kim, Young Jin;Kim, Dong Hwan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.1
    • /
    • pp.65-71
    • /
    • 2013
  • In this work, new smart phone based moving target detection is proposed. In order to implement the task, methods of real time image transmission from network camera, motion detecting algorithm and its effective implementation are also addressed. The network camera transfers image data by MJPEG format which contains various information such as data and IP address, and the smart phone separates the image data received through a WiFi module. Later, the image data is converted to a Bitmap image format, and with the help of the embedded OpenCV library on a smart phone and algorithm, it was found that the moving object was identified effectively in terms of real time monitoring and detection.

Remote Monitoring and Motor Control Based on Multi-Platform (다중플랫폼 기반 영상감시 및 원격지 모터제어시스템 구현)

  • Choi, Seung-Dal;Jang, Gun-Ho;Kim, Seok-Min;Nam, Boo-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.200-202
    • /
    • 2004
  • This paper deals with the real-time monitoring and control system using PC, PDA(Win CE embedded device) and PCS(based BREW platform). The camera attached to the server captures the moving target, and the captured frame of color image is encoded in JPEG for image compression at the server. The client(PC, PDA, PCS) receives the image data from the remote server and the received image is decoded from decompression. We use the TCP/IP protocol to send the image frames. The client can control the position of the camera by sending the control command to the server. Two DC servo motors for the camera are controlled in any directions, up-down and left-right, by the controller which is communicating with the server via the serial communication to get the control command. In this way, on the client we can monitor the moving images at the server and also control the position of the camera.

  • PDF

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.