• Title/Summary/Keyword: Senor data

Search Result 39, Processing Time 0.022 seconds

Performance Analysis of Cloud-Net with Cross-sensor Training Dataset for Satellite Image-based Cloud Detection

  • Kim, Mi-Jeong;Ko, Yun-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.1
    • /
    • pp.103-110
    • /
    • 2022
  • Since satellite images generally include clouds in the atmosphere, it is essential to detect or mask clouds before satellite image processing. Clouds were detected using physical characteristics of clouds in previous research. Cloud detection methods using deep learning techniques such as CNN or the modified U-Net in image segmentation field have been studied recently. Since image segmentation is the process of assigning a label to every pixel in an image, precise pixel-based dataset is required for cloud detection. Obtaining accurate training datasets is more important than a network configuration in image segmentation for cloud detection. Existing deep learning techniques used different training datasets. And test datasets were extracted from intra-dataset which were acquired by same sensor and procedure as training dataset. Different datasets make it difficult to determine which network shows a better overall performance. To verify the effectiveness of the cloud detection network such as Cloud-Net, two types of networks were trained using the cloud dataset from KOMPSAT-3 images provided by the AIHUB site and the L8-Cloud dataset from Landsat8 images which was publicly opened by a Cloud-Net author. Test data from intra-dataset of KOMPSAT-3 cloud dataset were used for validating the network. The simulation results show that the network trained with KOMPSAT-3 cloud dataset shows good performance on the network trained with L8-Cloud dataset. Because Landsat8 and KOMPSAT-3 satellite images have different GSDs, making it difficult to achieve good results from cross-sensor validation. The network could be superior for intra-dataset, but it could be inferior for cross-sensor data. It is necessary to study techniques that show good results in cross-senor validation dataset in the future.

Test Bed Design of Fire Detection System Based on Multi-Sensor Information for Reduction of False Alarms (화재감지 오보 감소를 위한 다중정보기반 시스템의 Test Bed 설계)

  • Lee, Kijun;Kim, Hyeong Gweon;Lee, Bong Woo;Kim, Tae-Ok;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.6
    • /
    • pp.107-114
    • /
    • 2012
  • Fire detection system is used for detection and alarm-generation of danger in case of fire. Most fire detection systems being used these days often malfunction from false positive and false negative errors. To improve detection reliability, an integrated fire detection algorithm using multi-senor information of heat, smoke and carbon monoxide detectors is suggested, then built and tested using the LabVIEW environment. Simulated using sensor measurement data offered by National Institute of Standards and Technology (NIST), possibility of reducing false positive and false negative errors is verified.

Energy Efficient Routing Protocol in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율적인 라우팅 프로토콜)

  • 손병락;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.2
    • /
    • pp.65-73
    • /
    • 2004
  • By the progress of communication and hardware technology, It is possible to organize wireless sensor nodes using the tiny sensor in recently. It is a critical aspect to minimize energy consumption for long-term lively sensor because wireless sensor nodes are associated with the available resources. The wireless sensor network is restricted in communication, exhaustion of power, and computation but it is very similar an Ad-Hoc network. Each sensor node products a few data and application layer of each sensor has slow transmitting feature. Unlike Ad-hoc, which is usually source or sink, base station of the each senor nodes works as sink and the other nodes except sink node works as source. Generally, wireless sensor network keep staying fixed state and observing circumstances continuously after setting up. It doesnt fit for the wireless sensor networks under functioning of existing ad-hoc networks because original Ad-Hoc network routing protocol couldnt operate for wireless sensor network features. This thesis propose the effective routing protocol way in the filed of the expanded routing protocol based on tree with considering on the characteristic of wireless sensor networks pattern.

  • PDF

Comparison of detection rates Area sensors and 3D spatial division multiple sensors for detecting obstacles in the screen door (스크린도어의 장애물 검지를 위한 Area센서와 다중공간분할 3D센서의 검지율 비교 분석)

  • Yoo, Bong-Seok;Lee, Hyun-Su;Jin, Ju-Hyun;Kim, Jong-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.6
    • /
    • pp.561-566
    • /
    • 2016
  • A subway platform is equipped with screen doors in oder to avoid accidents of passengers, where Area sensors are installed for detecting obstacles in the screen doors. However, there exist frequent operating errors in screen doors due to dusts, sunlight, snow, and bugs. It is required to develope a detection device which reduces errors and elaborates detection function. In this paper, we compared the detection rates of the Area sensor the 3D sensor using CCTV-based image data with installing sensors at the screen door in Munyang station Daegu, where 3D sensor is applied with the space division multiple detection algorithms. It is measured that the detection rate of 3D sensor and Area sensor is approximately 89.61% and 78.88%, respectively. The results confirmed that 3D senor has higher detection rate compared with Area sensor with the rate of 6.87~9.79%, and 3D sensor has benefit in the aspect of installation fee.

A study on the landslide detection method using wireless sensor network (WSN) and the establishment of threshold for issuing alarm (무선센서 네트워크를 이용한 산사태 감지방법 및 경로발령 관리 기준치 설정 연구)

  • Kim, Hyung-Woo;Kim, Goo-Soo;Chang, Sung-Bong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.262-267
    • /
    • 2008
  • Recently, landslides frequently occur on natural slope and/or man-made cut slope during periods of intense rainfall. With a rapidly increasing population on or near steep terrain, landslides have become one of the most significant natural hazards. Thus, it is necessary to protect people from landslides and to minimize the damage of houses, roads and other facilities. To accomplish this goal, many landslide monitoring systems have been developed throughout the world. In this paper, a simple landslide detection system that enables people to escape the endangered area is introduced. The system is focused on the debris flows which happen frequently during periods of intense rainfall. The system is based on the wireless sensor network (WSN) that is composed of wireless sensor nodes, gateway, and remote server system. Wireless sensor nodes and gateway are deployed by commercially available Microstrain G-Link products. Five wireless sensor nodes and one gateway are installed at the test slope for detecting ground movement. The acceleration and inclination data of test slope can be obtained, which provides a potential to detect landslide. In addition, thresholds to determine whether the test slope is stable or not are suggested by a series of numerical simulations, using geotechnical analysis software package. It is obtained that the alarm should be issued if the x-direction displacement of sensor node is greater than 20mili-meters and the inclination of sensor node is greater than 3 degrees. It is expected that the landslide detection method using wireless senor network can provide early warning where landslides are prone to occur.

  • PDF

A Wireless Sensor Network Architecture and Security Protocol for Monitoring the State of Bridge (교량감시를 위한 무선 센서 네트워크 구조 및 보안 프로토콜)

  • Lim Hwa-Jung;Jeon Jin-Soon;Lee Heon-Guil
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.465-476
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. In order to alleviate the inherent vulnerability in security of the wireless sensor nodes with the hardware constraints, the lightweight security protocol is needed and a variety of research is ongoing. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring man-made objects such as bridges. This paper, furthermore, explores a two-layer authentication, key distribution scheme which distributes the key and location of a sensor node in advance, and an effective security routing protocol which can take advantage of the Sleep and Awake state. This also results in the increased data transfer rate by increasing the number of alternative routing paths and the reduced energy consumption rate.

  • PDF

u-EMS : An Emergency Medical Service based on Ubiquitous Sensor Network using Bio-Sensors (u-EMS : 바이오 센서 네트워크 기반의 응급 구조 시스템)

  • Kim, Hong-Kyu;Moon, Seung-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.433-441
    • /
    • 2007
  • The bio-Sensors, which are sensing the vital signs of human bodies, are largely used by the medical equipment. Recently, the sensor network technology, which composes of the sensor interface for small-seize hardware, processor, the wireless communication module and battery in small sized hardware, has been extended to the area of bio-senor network systems due to the advances of the MEMS technology. In this paper we have suggested a design and implementation of a health care information system(called u-EMS) using a bio-sensor network technology that is a combination of the bio-sensor and the sensor network technology. In proposed system, we have used the following vital body sensors such as EKG sensor, the blood pressure sensor, the heart rate sensor, the pulse oximeter sensor and the glucose sensor. We have collected various vital sign data through the sensor network module and processed the data to implement a health care measurement system. Such measured data can be displayed by the wireless terminal(PDA, Cell phone) and the digital-frame display device. Finally, we have conducted a series of tests which considered both patient's vital sign and context-awared information in order to improve the effectiveness of the u-EMS.

Accuracy Evaluation of DEM Construction for River Region using ALS & MBES (ALS와 MBES를 이용한 하천지역 DEM 구축의 정확도 평가)

  • Kwon, O-Chul;Kwon, Jay-Hyoun;Lee, Ji-Sun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.4
    • /
    • pp.421-428
    • /
    • 2009
  • In Korea, the change of river flux due to seasons change is so considerable because of the mountainous terrain with the sharp slope and leaned rainfall. This unfavorable natural condition and the difficulties in precise grasping of the river status made the water resource management difficult so that the necessity of the precise river management has been continuously increased. In this study, a precise river-region DEM using the latest equipments of ALS and MBES is constructed. After acquiring DEM from each senor on the river region, a single DEM was generated by combining them. Also, the field inspection was carried out in the overlapped region of ALS and MBES in order to verify the quality of DEM. The verification of DEM was carried out by comparison between TINs obtained from the combined result of ALS and MBES and the surveying result from total station at more than 10 points in the selected two test areas. As a result, NO.1-area's RMSE of 0.322m and 0.113m are obtained for NO. 1 and NO. 2 areas, respectively. The result of this study shows the feasibility of DEM construction for river region using ALS and MBES as seen in the case of NO. 2 area. At the same time, it was appeared that a better method on the data fusion should be developed as seen in the result of NO. 1 area.

Protecting Fingerprint Data for Remote Applications (원격응용에 적합한 지문 정보 보호)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.63-71
    • /
    • 2006
  • In this paper, we propose a secure solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. To protect possible attacks launched at the untrusted client, our solution makes the fingerprint sensor validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation to check the result, performs the minutiae extraction with the received binary image from the client, and then sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely and in real-time with the aid of an untrusted client.