• Title/Summary/Keyword: Safety of Crime

Search Result 284, Processing Time 0.029 seconds

Implementation of Image-based Virtual Fence for Surveillance Area Setup (감시영역 설정을 위한 영상 기반 가상펜스 구현)

  • Kim, Jae-jun;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2145-2152
    • /
    • 2015
  • The existing CCTV has limitation such as problem on usage of the off-line type of recorded image for specific investigation, and requirement on interactive operator intervention for real-time surveillance. Therefore, it is required to develop the intelligent CCTV equipped with various functionalities in order to overcome drawbacks mentioned above. In this paper, implementation methods of image-based virtual fence were proposed by using the spline curves with supplied control for setup of surveillance area. In addition, pre-alarm region within the predefined distance was established with tangent and normal lines extracted from control points. The image-based virtual fence can be used for remote detection of intrusion and provision of real-time intrusion alarm, and can be expected to use in safety-related application areas including security and crime prevention.

Simply Separation of Head and Face Region and Extraction of Facial Features for Image Security (영상보안을 위한 머리와 얼굴의 간단한 영역 분리 및 얼굴 특징 추출)

  • Jeon, Young-Cheol;Lee, Keon-Ik;Kim, Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.125-133
    • /
    • 2008
  • As society develops, the importance of safety for individuals and facilities in public places is getting higher. Not only the areas such as the existing parking lot, bank and factory which require security or crime prevention but also individual houses as well as general institutions have the trend to increase investment in guard and security. This study suggests face feature extract and the method to simply divide face region and head region that are import for face recognition by using color transform. First of all, it is to divide face region by using color transform of Y image of YIQ image and head image after dividing head region with K image among CMYK image about input image. Then, it is to extract features of face by using labeling after Log calculation to head image. The clearly divided head and face region can easily classify the shape of head and face and simply find features. When the algorism of the suggested method is utilized, it is expected that security related facilities that require importance can use it effectively to guard or recognize people.

  • PDF

A Study on the Established Requirements for Records through Precedent Analysis: Focusing on "Inter-Korean Summit Meeting Minutes Deletion" Cases (판례 분석을 통한 기록의 성립 요건 검토: '남북정상회담회의록 삭제' 판례를 중심으로)

  • Lee, Cheolhwan;Zoh, Youngsam
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.21 no.1
    • /
    • pp.41-56
    • /
    • 2021
  • This study aims to analyze the court ruling on "Inter-Korean Summit Meeting Minutes Deletion," identify how the established requirements, concept, and scope for the records prescribed in the Public Records Management Act are applied in actual cases, and summarize the future tasks. It analyzes the "approval theory" as the point of establishment for records by the ruling means and how the meaning of approval is determined, and examines the difference between the e-jiwon System and the On-Nara System to understand the meaning of ruling clearly. Moreover, it analyzes how the "Invalidity of Public Documents Crime" in Article 141 in the Criminal Act influences record management. Based on such comprehensive case analyses, the study proposes what tasks the administrative agencies such as the National Archives of Korea and the Ministry of the Interior and Safety should perform.

Planning and Establishment of Sejong City Smart City (세종시 스마트시티 구상 및 수립 방안)

  • Park, Jungsu;Jung, Hanmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.161-163
    • /
    • 2021
  • This urban centralization is expected to develop rapidly, with 75% of the population living in the city by 2035. Large cities are becoming unsustainable due to side effects such as environmental pollution, severe traffic jams, excessive energy depletion, and destruction of the natural ecosystem. In addition, the happiness index of citizens of large cities is also falling because of high crime rates and safety accidents, the work-life imbalance caused by inequality and polarization, and overly competitive education. To solve this problem, Smart City, an IT-based future city model, was born. The Korean government is also actively attempting to improve urban competitiveness and promote sustainable development through efficient construction and operation of smart cities as a national focus project. To support the effort, we review the basic directions and strategies of Sejong City's Smart City service infrastructure based on the comprehensive national land plan, Smart City plan, and Smart City strategy plan.

  • PDF

Comparative Analysis of TOA and TDOA method for position estimation of mobile station (이동국 위치 추정을 위한 TOA와 TDOA방법의 비교 분석)

  • 윤현성;호인석;이장호;변건식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.167-172
    • /
    • 2000
  • This paper is aimed at developing an location tracking for mobile station employing currently available mobile communication network of cellular phone and PCS(Personal Communication System). When the location tracking of mobile stations is in services, the services such as Emergency-119, crime investigation, effective urban traffic management or the safety protection of Alzheimer's patients, ran be available. This paper is to track the mobile station in communication network in NLOS environment. To achieve reduction of the standard noise, Kalman filter is used. In terms of the distance, positions are located by using TOA and TDOA methods in the environment that removes NLOS bias in the measured data. And then smoothing method is used. to achieve reduction of the position error values

  • PDF

An actual Analysis on the Determinants of the Private Security Agents Career Choices (민간경비원의 직업선택 동기 결정요인에 대한 실증분석)

  • Kim, Sang-Jin
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.3-12
    • /
    • 2012
  • This study is to investigate determinants of the private security agents' career choices. Random sampling of newly agents working at the private security firms in Gyeonggi-do and ChungChong-do was used. The period of under review was from May, 2010 to June, 2011 and the total number of interviews was 382. For this study using SPSSWIN 18.0, factor analysis(EFA/CFA), reliability analysis, discriminant analysis and descriptive statistics. The followings are conclusions. The first factor is' the value of job'. It consists of public security, contributions to our society and nation, protection public safety, spirit of sacrifice, crime prevention, and maintenance security. The second factor is 'ease of career choice'. Qualifying conditions are not particular and it is easy to get the job, as a result, this job is easy of access, they chose this job. The third factor is 'occupational stability'. They think this is a good job because the job is future-oriented so they chose this job. The fourth factor is' curiosity'. They became interested in this job, so they wanted to know about this job and then they chose this job.

Development of IR Thermal Camera Detector based on Smartphone Interlocking for Hidden Camera Crime Prevention (몰래카메라 범죄방지를 위한 스마트폰 연동 기반의 IR 열카메라 탐지기 개발)

  • Kang, Young-Gil;Cho, Pil-Gu;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • The performance of hidden camera cameras is improving day by day due to miniaturization and advanced technology integration according to the speed of technological development of smartphones. As this external networking computing environment is advanced and diversified, exposure to hidden cameras in addition to general safety cameras is also increasing. On the other hand, the technology for detecting and preventing hidden cameras is not keeping up with the development and speed of these hidden cameras. Therefore, in this study, the heat of the hidden camera was detected using infrared thermal detection technology based on general image and thermal image synthesis technology, and the reflectance of each wavelength according to the difference in ambient temperature was analyzed to reduce the false positive rate.

Increasing demand formaritime security measures to streamline the maritime security (해양경비수요 증대에 따른 해양경비 효율화 방안)

  • Seo, Jin-Seok
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.13-21
    • /
    • 2014
  • Three sides by the waters of the country in which the topography of the peninsula is a treasure trove of natural resources in the country to recognize the importance of the sea and maritime territorial and maritime policy for the protection of rights, such as to promote the country striving to strengthen haeyangryeok. However, marine activities is 200 sea miles exclusive economic zone of the stage (EEZ) and the continental shelf extends as the, EEZ waters of the overlapping jurisdiction, Books sovereignty, marine scientific research and development, including the continental shelf surrounding the deepening relationship between the neighboring countries and complex understanding including international cooperation and coexistence between countries to be competitive. This time the Coast Guard 's maritime sovereignty existing patron driven from the accident prevention safety management system, from our sea, has been kept firmly. However, due to the new issue of disaster lies in the fate of marine police became dismantled. This real time so that you can be reborn as a marine police force structure. Structure to change the way the rescue operation. Expenses, Shore, you will need to increase the professionalism of pollution.

Design of Management System for Registering Agricultural Machine Using Blockchain (블록체인을 활용한 농업기계 등록 관리 시스템의 설계)

  • Son, Yong-Bum;Kim, Young-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.18-27
    • /
    • 2019
  • Through the technology of the 4th industrial revolution, agricultural machinery is becoming increasingly intelligent, and the machine is replacing the role of farmer manpower as a whole. However, safety accidents caused by careless use of agricultural machines and theft accidents due to the difficulty of keeping them are increasing every year. Because agricultural machines do not manage the history of events and accidents unlike automobiles, they are often used for crime. There is also no way to cope with the issues if there happens issues on agricultural machines. In this paper, we propose the system based on block chain which can manage the history of the agricultural machinery by registering the chassis number at the same time when purchasing the agricultural machinery. Since this system contains the history of accident and repair information about the owner's agricultural machinery, it is possible to trace back even if a theft occurs. The proposed system also allows buyers to secure transactions by providing reliable data through inquiry of this system when trading in the secondary market in the future.

A model to secure storage space for CCTV video files using YOLO v3

  • Seong-Ik, Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.65-70
    • /
    • 2023
  • In this paper, we propose a CCTV storage space securing model using YOLO v3. CCTV is installed and operated in various parts of society for disasters, disasters and safety such as crime prevention, fire prevention, and monitoring, and the number of CCTV is increasing and the quality of the video quality is improving. Due to this, as the number and size of image files increase, it is difficult to cope with the existing storage space. In order to solve this problem, we propose a model that detects specific objects in CCTV images using YOLO v3 library and deletes unnecessary frames by saving only the corresponding frames, thereby securing storage space by reducing the size of the image file, and thereby Periodic images can be stored and managed. After applying the proposed model, it was confirmed that the average image file size was reduced by 94.9%, and it was confirmed that the storage period was increased by about 20 times compared to before the application of the proposed model.