• Title/Summary/Keyword: People Detection

Search Result 678, Processing Time 0.031 seconds

The study on microslip using a signal detection theory

  • Son, D.H.;Li, K.W.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.10 no.2
    • /
    • pp.51-55
    • /
    • 1991
  • Since slipping has been identified as a major hazard, it is important to understand the mechanism of a slip. Many researches, based on biomechanical studies, had been attempted to do that. Thowever, the correlation between the mechanism of a slip and psychophysical behaviors of people had rarely been verified. For example, the existence of small slips in a forward direction, which do not normally perceived by human subjects, has been established by several experimenters. However, the term "microslips are not perceived by the walkers[4]." has not been examined precisely by any experiments. The objective of this study is, using a Signal Detection Theory (SDT), to define a microslip and slip more quqntitatively with the biomechanical measurement of slip distance. The results showed that, the slip distance around the 3 centimeters, there was a obvious change in the accident detectability of the subject. The conclusion is that it is possible to identify the boundary of a microslip and slip around the 3 centermeters of slip distance.

  • PDF

Self-Recognition Algorithm of Artificial Immune System (인공면역계의 자기-인식 알고리즘)

  • 선상준;이동욱;심귀보;성원기
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.185-188
    • /
    • 2001
  • According as many people use a computer newly, damage of computer virus and hacking is rapidly increasing by the crucial users. To block hacking that is intrusion of a person's computer and the computer virus that destroys data, a study for intrusion-detection of system and virus detection using a biological immune system is in progress. In this paper, we make a model of positive selection and negative selection of self-recognition process that is ability of T-cytotoxic cell that plays an important part in biological immune system. So we embody a self-nonself distinction algorithm in computer. To prove the efficacy of self-recognition algorithm, we use simulations by a cell change and a string change of self file.

  • PDF

Supporting Intermediate-node Mobility in CCN Real-time Service according to Mobility Detection (CCN 실시간 서비스에서 이동성 탐지에 따른 중간노드의 이동성 지원)

  • Seong, Kukil;Kwon, Taewook
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.12
    • /
    • pp.1438-1446
    • /
    • 2019
  • Recently, the number of mobile users as well as high-speed Internet user has been increasing rapidly. Moreover, traffic is growing fast as services that provide real-time content such as Youtube and Netflix become popular. The problem of traffic control in real-time content services is important because many people use cell phones to receive real-time content. In this regard, the field of CCN is currently being studied. We studied the mobility of nodes among CCN research fields. Node mobility can be divided into three categories : consumer mobility, intermediate node, and provide mobility. In this paper, we propose Mobility Node Support(MD-INS) to support the intermediate-node mobility in CCN real-time services. Experimental results show that the proposed scheme shows better performance than CCN in terms of service disconnection time and packet loss.

Intelligent Automated Detection System of Tuberculosis Bacilli by Using Their Color Information (컬러 정보를 이용한 지능형 결핵균 검출 자동화 시스템)

  • Cho, Sung-Man;Kim, Gi-Bom;Lim, Choong-Hyuk;Joo, Won-Jong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.24 no.11
    • /
    • pp.126-133
    • /
    • 2007
  • Tuberculosis (TB) is a chronic or acute infectious disease which damages more people than any other infectious diseases according to WHO estimates. In this paper, a new automatic detection system of tuberculosis bacilli by using their color information is proposed. Through the deep investigation of color and intensity compositions of tuberculosis images, new pre-processing and segmentation algorithms are suggested. Specific features of bacilli are extracted from the processed images and number counting is done by using domain-specific knowledge rules.

Fuzzy Based Shadow Removal and Integrated Boundary Detection for Video Surveillance

  • Niranjil, Kumar A.;Sureshkumar, C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.2126-2133
    • /
    • 2014
  • We present a scalable object tracking framework, which is capable of removing shadows and tracking the people. The framework consists of background subtraction, fuzzy based shadow removal and boundary tracking algorithm. This work proposes a general-purpose method that combines statistical assumptions with the object-level knowledge of moving objects, apparent objects, and shadows acquired in the processing of the previous frames. Pixels belonging to moving objects and shadows are processed differently in order to supply an object-based selective update. Experimental results demonstrate that the proposed method is able to track the object boundaries under significant shadows with noise and background clutter.

A Mark Automatic Checking System to Inspect Character Strings on Chips (칩의 문자들을 검사하기 위한 마크 자동 검사 시스템)

  • Joo, Ki-See
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.11a
    • /
    • pp.191-196
    • /
    • 2005
  • The character strings on chips and components are so tiny and numerous that it is a very difficult work for people to perform. In paper, this we propose a mark automatic checking system, which will determine whether chip is wrong-mark or not by recognizing characters on chips. Lots of faulty detection conditions and template matching methods are used to inspect the faulty mark items. The faulty detection classifies conditions as five kinds-darkness, matching, area, broken and branch. A series of experimentation shan that the method proposed here am offer an effective way to determine wrong-mark on chips.

  • PDF

A Self-Recognition Algorithm based Biological Immune System

  • Sim, Kwee-Bo;Lee, Dong-Wook;Sun, Sang-Joon;Shim, Jae-Yoon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.115.1-115
    • /
    • 2001
  • According as many people use a computer newly, damage of computer virus and hacking is rapidly increasing by the crucial users. A computer virus is one of program on computer and has abilities of self reproduction and destruction like a virus of biology. And hacking is to rob a person´s data in a intruded computer and to delete data in a person´s computer from the outside. To block hacking that is intrusion of a person´s computer and the computer virus that destroys data, a study for intrusion-detection of system and virus detection using a biological immune system is in progress. In this paper, we make a mood of positive selection and negative selection of self-recognition process that is ability of ...

  • PDF

A Wrist-Type Fall Detector with Statistical Classifier for the Elderly Care

  • Park, Chan-Kyu;Kim, Jae-Hong;Sohn, Joo-Chan;Choi, Ho-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1751-1768
    • /
    • 2011
  • Falls are one of the most concerned accidents for elderly people and often result in serious physical and psychological consequences. Many researchers have studied fall detection techniques in various domain, however none released to a commercial product satisfying user requirements. We present a systematic modeling and evaluating procedure for best classification performance and then do experiments for comparing the performance of six procedures to get a statistical classifier based wrist-type fall detector to prevent dangerous consequences from falls. Even though the wrist may be the most difficult measurement location on the body to discern a fall event, the proposed feature deduction process and fall classification procedures shows positive results by using data sets of fall and general activity as two classes.

Design and Implementation of Identifying and Requesting Rescue System for Emergency Patient Using Smartphones (스마트폰을 이용한 응급환자 인식 및 구조요청 시스템설계 및 구현)

  • Hwang, Yong-Ha;Kim, Jin-Mo;NamgGung, Wu-Jin;Kim, yong-Seok
    • Journal of Industrial Technology
    • /
    • v.32 no.A
    • /
    • pp.15-20
    • /
    • 2012
  • For emergency patients as heart disease, fast treatment is very important. This paper describes a smart phone software to detect emergency circumstance and request rescue. Detection of emergency condition of heart disease patients is based on physical motion and biological heart signals as electrocardiogram. Most smart phones have three axis acceleration sensor. On emergency condition, patients remain stationary. Thus the software detect stationary condition by using acceleration sensor data. For more precise detection, it combines electrocardiogram of patients. To request rescue, it sends help messages to designated persons. In addition, it generates emergency sound to surrounding people and plays a video of emergency measure that any person on the place can help the patient temporarily.

  • PDF

Feasibility Research of the Active RFIDs for the Smart Occupancy Detection (지능형 재실 감지 서비스를 위한 능동형 RFID의 적용 타당성 연구)

  • Choi, Yeon-Suk;Park, Byoung-Tae
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.2
    • /
    • pp.147-155
    • /
    • 2011
  • For an effective energy management in intelligent buildings it is necessary to gather information about position/absence of people and the level of population. In this paper the smart occupancy detection system based on the active RFID is developed to satisfy such a demand. The performance of the developed system is tested and verified through various experiments. Furthermore the feasibility test of the active RFID tag is performed to verify whether it can be used as a location-based occupancy sensor. The developed core technology can be also applied to other fields such as security, healthcare, smart home, etc.