• Title/Summary/Keyword: Intelligent Surveillance Systems

Search Result 156, Processing Time 0.028 seconds

Development of a Ubiquitous Vision System for Location-awareness of Multiple Targets by a Matching Technique for the Identity of a Target;a New Approach

  • Kim, Chi-Ho;You, Bum-Jae;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.68-73
    • /
    • 2005
  • Various techniques have been proposed for detection and tracking of targets in order to develop a real-world computer vision system, e.g., visual surveillance systems, intelligent transport systems (ITSs), and so forth. Especially, the idea of distributed vision system is required to realize these techniques in a wide-spread area. In this paper, we develop a ubiquitous vision system for location-awareness of multiple targets. Here, each vision sensor that the system is composed of can perform exact segmentation for a target by color and motion information, and visual tracking for multiple targets in real-time. We construct the ubiquitous vision system as the multiagent system by regarding each vision sensor as the agent (the vision agent). Therefore, we solve matching problem for the identity of a target as handover by protocol-based approach. We propose the identified contract net (ICN) protocol for the approach. The ICN protocol not only is independent of the number of vision agents but also doesn't need calibration between vision agents. Therefore, the ICN protocol raises speed, scalability, and modularity of the system. We adapt the ICN protocol in our ubiquitous vision system that we construct in order to make an experiment. Our ubiquitous vision system shows us reliable results and the ICN protocol is successfully operated through several experiments.

  • PDF

Robust Detection Technique for Abandoned Objects to Overcome Visual Occlusion (시각적 가려짐을 극복하는 강인한 유기물 탐지 기법)

  • Kim, Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.23-29
    • /
    • 2010
  • Nowadays it is required to design intelligent visual surveillance systems which automatically detect abandoned objects in public places to strengthen the social safety. Already recognized abandoned objects can be occluded partially or fully by surrounding people in public places after the first recognition. To improve an essential recognition performance index PAT, the system should overcome the occlusion problems. In this research, a design scheme is newly proposed to construct the robust detection system which is comprised of multiple stages considering the occlusion problem. To show the feasibilities of the proposed system, the evaluation was tried for the prepared image streams including 6 various situations and the experimental results show 96% and 75% in PAT performance for intrusion and abandoning events, respectively. Finally in spite of full occlusions by multiple persons, the proposed system shows the capability to continuously recognize the abandoned object after complex occlusions disappear.

An Algorithm of Identifying Roaming Pedestrians' Trajectories using LiDAR Sensor (LiDAR 센서를 활용한 배회 동선 검출 알고리즘 개발)

  • Jeong, Eunbi;You, So-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.1-15
    • /
    • 2017
  • Recently terrorism targets unspecified masses and causes massive destruction, which is so-called Super Terrorism. Many countries have tried hard to protect their citizens with various preparation and safety net. With inexpensive and advanced technologies of sensors, the surveillance systems have been paid attention, but few studies associated with the classification of the pedestrians' trajectories and the difference among themselves have attempted. Therefore, we collected individual trajectories at Samseoung Station using an analytical solution (system) of pedestrian trajectory by LiDAR sensor. Based on the collected trajectory data, a comprehensive framework of classifying the types of pedestrians' trajectories has been developed with data normalization and "trajectory association rule-based algorithm." As a result, trajectories with low similarity within the very same cluster is possibly detected.

Dynamic Modeling based Flight Control of Hexa-Rotor Helicopter System (헥사로터형 헬리콥터의 동역학 모델기반 비행제어)

  • Han, Jae-Gyun;Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.4
    • /
    • pp.398-404
    • /
    • 2015
  • In this paper, we describe the design and performance of a prototype multi-rotor unmaned aerial vehicle( UAV) platform featuring an inertial measurement unit(IMU) based autonomous-flying for use in bluetooth communication environments. Although there has been a fair amount of study of free-flying UAV with multi-rotors, the more recent trend has been to outfit hexarotor helicopter with gimbal to support various services. This paper introduces the hardware and software systems toward very compact and autonomous hexarotors, where they can perform search, rescue, and surveillance missions without external assistance systems like ground station computers, high-performance remote control devices or vision system. The proposed system comprises the construction of the test hexarotor platform, the implementation of an IMU, mathematical modeling and simulation in the helicopter. Furthermore, the hexarotor helicopter with implemented IMU is connected with a micro controller unit(MCU)(ARM-cortex) board. The micro-controller is able to command the rotational speed of the rotors and to get the measurements of the IMU as input signals. The control simulation and experiment on the real system are implemented in the test platform, evaluated and compared against each other.

On the QoS Support in Medium Access Control for Medical Sensor Networks (의료용 센서 네트워크에서 QoS 지원의 매체접속제어)

  • Ashrafuzzaman, Kazi;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.151-158
    • /
    • 2010
  • In line with the requirement of appropriate protocol support for such mission-critical wireless sensor network (WSN) applications as patient monitoring, we investigate the framework for designing medium access control (MAC) schemes. The data traffic in medical systems comes with inherent traffic heterogeneity as well as strict requirement of reliability according to the varied extents of devise-wise criticality in separate cases. This implies that the quality-of-Service (QoS) issues are very distinctly delicate requiring specialized consideration. Besides, there are features in such systems that can be exploited during the design of a MAC scheme. In a monitoring or routine surveillance application, there are degrees of regularity or predictability in traffic as coordinated from a node of central control. The coordinator thus takes on the role of marshaling the resources in a neighborhood of nodes deployed mostly for upstream traffic; in a collision-free scheme, it schedules the time slots for each superframe based on the QoS specifications. In this preliminary study, we identify the key artifacts of such a MAC scheme. We also present basic performance issues like the impact of superframe length on delay incurred, energy efficiency achieved in the network operation as obtained in a typical simulation setup based on this framework.

Queue Detection using Fuzzy-Based Neural Network Model (퍼지기반 신경망모형을 이용한 대기행렬 검지)

  • KIM, Daehyon
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.2
    • /
    • pp.63-70
    • /
    • 2003
  • Real-time information on vehicle queue at intersections is essential for optimal traffic signal control, which is substantial part of Intelligent Transport Systems (ITS). Computer vision is also potentially an important element in the foundation of integrated traffic surveillance and control systems. The objective of this research is to propose a method for detecting an exact queue lengths at signalized intersections using image processing techniques and a neural network model Fuzzy ARTMAP, which is a supervised and self-organizing system and claimed to be more powerful than many expert systems, genetic algorithms. and other neural network models like Backpropagation, is used for recognizing different patterns that come from complicated real scenes of a car park. The experiments have been done with the traffic scene images at intersections and the results show that the method proposed in the paper could be efficient for the noise, shadow, partial occlusion and perspective problems which are inevitable in the real world images.

Human Tracking Based On Context Awareness In Outdoor Environment

  • Binh, Nguyen Thanh;Khare, Ashish;Thanh, Nguyen Chi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3104-3120
    • /
    • 2017
  • The intelligent monitoring system has been successfully applied in many fields such as: monitoring of production lines, transportation, etc. Smart surveillance systems have been developed and proven effective in some specific areas such as monitoring of human activity, traffic, etc. Most of critical application monitoring systems involve object tracking as one of the key steps. However, task of tracking of moving object is not easy. In this paper, the authors propose a method to implement human object tracking in outdoor environment based on human features in shearlet domain. The proposed method uses shearlet transform which combines the human features with context-sensitiveness in order to improve the accuracy of human tracking. The proposed algorithm not only improves the edge accuracy, but also reduces wrong positions of the object between the frames. The authors validated the proposed method by calculating Euclidean distance and Mahalanobis distance values between centre of actual object and centre of tracked object, and it has been found that the proposed method gives better result than the other recent available methods.

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

Fusion algorithm for Integrated Face and Gait Identification (얼굴과 발걸음을 결합한 인식)

  • Nizami, Imran Fareed;An, Sung-Je;Hong, Sung-Jun;Lee, Hee-Sung;Kim, Eun-Tai;Park, Mig-Non
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.72-77
    • /
    • 2008
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion in considered at decision level. The proposed algorithm is tested on the NLPR database.

Reduction Effect of CO2 Emission on BIS Using Tier 3 Methodology - A Case Study on Daejun-Chungjoo Project - (Tier 3 방법론을 활용한 BIS 사업의 CO2 저감효과 분석 - 대전-청주 간 광역BIS 사업을 중심으로 -)

  • Chung, Younshik;Song, Taijin;Kim, Jeongwan
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.3D
    • /
    • pp.375-381
    • /
    • 2011
  • This study presents an analysis of $CO_2$ emission reduction effect on bus information system (BIS) which is operated to improve various services of bus transit such as rapid and on-time service. Although the Intergovernmental Panel on Climate Change (IPCC) released three methodological types of models for analyzing the amount of greenhouse gas reduction, this study used the Tier 3 method that is the most concrete one. A case study was performed to a 8.3 km section of Daejun-Chungjoo BIS system, and dataset required to the Tier 3 method was obtained from ITS-based surveillance systems. The study result showed that the reduction effect of $CO_2$ on BIS operation was yearly $39.45tCO_2/km$. Therefore, such effect can be potentially useful to a measurement of effectiveness (MOE) of BIS projects hereafter.