• Title/Summary/Keyword: Streaming Video

Search Result 746, Processing Time 0.024 seconds

Crowd Behavior Detection using Convolutional Neural Network (컨볼루션 뉴럴 네트워크를 이용한 군중 행동 감지)

  • Ullah, Waseem;Ullah, Fath U Min;Baik, Sung Wook;Lee, Mi Young
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.6
    • /
    • pp.7-14
    • /
    • 2019
  • The automatic monitoring and detection of crowd behavior in the surveillance videos has obtained significant attention in the field of computer vision due to its vast applications such as security, safety and protection of assets etc. Also, the field of crowd analysis is growing upwards in the research community. For this purpose, it is very necessary to detect and analyze the crowd behavior. In this paper, we proposed a deep learning-based method which detects abnormal activities in surveillance cameras installed in a smart city. A fine-tuned VGG-16 model is trained on publicly available benchmark crowd dataset and is tested on real-time streaming. The CCTV camera captures the video stream, when abnormal activity is detected, an alert is generated and is sent to the nearest police station to take immediate action before further loss. We experimentally have proven that the proposed method outperforms over the existing state-of-the-art techniques.

A Study of Integrated Digital Signage Management System Implementation (Digital Signage 통합관리시스템 구축에 관한 연구)

  • Kang, Hee-Yong;Lee, Jina;Shin, Yong-Tae;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.82-85
    • /
    • 2014
  • With high speed communication network and supplement of high quality multimedia devices, large demand of multimedia service stimulates digital signing industry to step forward to new opportunities. But in order to provide competitive quality services, Integrated management system is required. Digital signs use technologies such as LCD, LED and Projection to display content such as digital images, video, streaming media, and information. Digital signs rely on a variety of hardware to deliver the contents. The components of a typical digital sign installation include one or more display screens, one or more media players, and a content management server for each player. To improve the existing high cost and less efficient management system, this paper suggest cost effective Integrated Digital Signage Management System with the results of analysis of existing system. Also this paper presents an actual implementation on entertainment company to evaluate the suitability, to prove the result of superior performance of proposed system.

  • PDF

Game-Based Content Caching and Data Sponsor Scheme for the Content Network (콘텐츠 네트워크 환경에서 게임이론을 이용한 콘텐츠 캐싱 및 데이터 스폰서 기법)

  • Won, JoongSeop;Kim, SungWook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.7
    • /
    • pp.167-176
    • /
    • 2019
  • Recently, as the types of services that can be enjoyed in mobile telecommunication networks such as social networks and video streaming are increasing, mobile users(MUs) can access mobile contents easily by consuming mobile data. However, under a mobile telecommunication environment, MUs have to pay a high data fee to a network service provider(SP) in order to enjoy contents. The 'data sponsor' technique, introduced as a way to solve this problem, has attracted attention as a breakthrough method for enhancing contents accessibility of MUs. In this paper, we propose an algorithm that determines the optimal discount rate through the Stackelberg game in the data sponsor environment. We also propose an algorithm to design edge caching, which caches highly popular content for MUs on edge server, through many-to-many matching game. Simulation results clearly indicate that the profit for CP's content consumption is improved by about 6~11%, and the profit of CP according to the ratio of edge caching is improved by about 12% than the other existing schemes under data sponsor environment.

Implementation of portable WiFi extender using Raspberry Pi (라즈베리파이를 이용한 이동형 와이파이 확장기 구현)

  • Jung, Bokrae
    • Journal of Industrial Convergence
    • /
    • v.20 no.1
    • /
    • pp.63-68
    • /
    • 2022
  • In schools and corporate buildings, public WiFi Access Points are installed on the ceilings of hallways. In the case of an architectural structure in which a WiFi signal enters through a steel door made of a material with high signal attenuation, Internet connection is frequently cut off or fails when the door is closed. To solve this problem, our research implements an economical and portable WiFi extender using a Raspberry Pi and an auxiliary battery. Commercially available WiFi extenders have limitations in the location where the power plug is located, and WiFi extension using the WiFi hotspot function of an Android smartphone is possible only in some high-end models. However, because the proposed device can be installed at the position where the Wi-Fi reception signal is the best inside the door, the WiFi range can be extended while minimizing the possibility of damage to the original signal. Experimental results show that it is possible to eliminate the shadows of radio waves and to provide Internet services in the office when the door is closed, to the extent that web browsing and real-time video streaming for 720p are possible.

Interactive Visual Analytic Approach for Anomaly Detection in BGP Network Data (BGP 네트워크 데이터 내의 이상징후 감지를 위한 인터랙티브 시각화 분석 기법)

  • Choi, So-mi;Kim, Son-yong;Lee, Jae-yeon;Kauh, Jang-hyuk;Kwon, Koo-hyung;Choo, Jae-gul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.135-143
    • /
    • 2022
  • As the world has implemented social distancing and telecommuting due to the spread of COVID-19, real-time streaming sessions based on routing protocols have increased dependence on the Internet due to the activation of video and voice-related content services and cloud computing. BGP is the most widely used routing protocol, and although many studies continue to improve security, there is a lack of visual analysis to determine the real-time nature of analysis and the mis-detection of algorithms. In this paper, we analyze BGP data, which are powdered as normal and abnormal, on a real-world basis, using an anomaly detection algorithm that combines statistical and post-processing statistical techniques with Rule-based techniques. In addition, we present an interactive spatio-temporal analysis plan as an intuitive visualization plan and analysis result of the algorithm with a map and Sankey Chart-based visualization technique.

Development of non-face-to-face Remote Learning Program - focusing on University Software Practice (비대면 원격수업 프로그램 개발 - 대학 소프트웨어 실습 중심으로)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.19 no.6
    • /
    • pp.59-66
    • /
    • 2021
  • Globally, the prolonged pandemic of COVID-19 (COVID-19) has had a great impact on all industries. In particular, in the field of education, online classes (non-face-to-face) had some negative perceptions of online classes, such as lack of preparation for learning and student dissatisfaction with the class. According to the current situation survey in 2020, non-face-to-face classes accounted for about 56% of the class, and streaming real-time classes and video content-based classes accounted for most of the class. This study empirically analyzes the problems to be solved by online classes through the 2020-2021 survey (software application practical class university students), and explains the detailed program and development plan (implementation result). This study intends to contribute to the development of online learning development of each educational institution after the end of the corona crisis.

A Study on the Utilization of Metaverse Space in Local Governments from the Perspective of Public Design (공공디자인의 관점에서 본 지자체의 메타버스 공간 활용에 관한 연구)

  • Choi, Jae-won;Yeo, Joon-ki
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.705-712
    • /
    • 2022
  • The pandemic over the past three years has brought drastic changes in our lives, and those changes are now becoming a natural part of our daily lives. Daily life and economic activities based on online, such as video conferencing, remote classes, telecommuting, and online streaming services, have become daily routines after Corona. And the result of rapid development of communication and graphic technology is the metaverse. Therefore, the purpose of this study is to study the possibility from the perspective of public design for the correct use of the metaverse space of local governments. To this end, in this study, big data analysis was performed on 'local government', 'public design', and 'metaverse'. As a result of this study, we should actively use metaverse with high topic and potential as a space for local governments' promotion or discussion as a means to restore the reliability of local governments and overcome negative perceptions. In addition, it is necessary to actively reflect public design in order to increase the public reliability of local governments' metaverse.

Development of Offshore Construction ROV System applying Pneumatic Gripper (공압 gripper를 적용한 해양 건설 ROV 시스템 개발)

  • Park, Jihyun;Hwang, Yoseop
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1697-1705
    • /
    • 2022
  • The safety of marine construction workers and marine pollution problems are occurring due to large-scale offshore construction. In particular, underwater construction work in the sea has a higher risk than other work, so it is necessary to apply an unmanned alternative system that considers the safety of the workers. In this paper, the ROV system for offshore construction has been developed for underwater unmanned work. A monitoring system was developed for position control through the control of underwater propellants, pneumatic gripper, and monitoring of underwater work. As a result of the performance evaluation, the underwater movement speed of the ROV was evaluated to be 0.89 m/s, and it was confirmed that the maximum load of the pneumatic gripper was 80 kg. In addition, the network bandwidth required for underwater ROV control and underwater video streaming was evaluated to be more than 300Mbps, wired communication at 92.7 ~ 95.0Mbit/s at 205m, and wireless communication at 78.3 ~ 84.8Mbit/s.

Suggestions for E-Learning Based on Four Years of Cyber University Experience

  • LEE, Okhwa
    • Educational Technology International
    • /
    • v.6 no.1
    • /
    • pp.41-63
    • /
    • 2005
  • E-Learning is widely introduced with cyber universities in Korea from 2001 whencyber universities were first authorized by the Ministry of Education and Human Resource Development. E-learning amplified by cyber university gave a big impact in the campus based university which became the cause for the educational paradigm shift. The changes of status of cyber university shows important trend in college education which was analyzed by enrollment rate, types of cyber university, demography, and study areas. The enrollment rate of cyber universities is ever since 2001 and variety of study areas gives popularity to students. The demography of students is as expected older than traditional students. Female students at the cyber university outnumbered that at campus based university in Korea. For analyzing the trend of e-learning in Korea, there were studies twice in 2001 May-June from 213 faculty members and staff, 630 students and in 2004 May-June with 401 students. Most of e-learning students tent to spend less time yet, students feel more burden with e-learning. Professors tend to load more materials for the e-learning in 2001but in 2004 study, the difference no longer exists. Professors and students feel the academic achievement through e-learning is not as good as from the traditional classes. Difficulties for e-learning in 2001 were the lack of administrative information but in 2004, boring contents and lack of instructional strategies for e-learning. Technical problems still do exist but less serious. Suggestions for e-learning are blended learning, online students prefer video streaming with their own lecturer, new definition of instructor is needed, professional development for content development and online instruction is needed, success story of online learning should be encouraged, guidance for online students needed. The cyber university experiencegave a positive impact on the traditional universities such as rethinking the roles of universities, the quality control of classes, professional development, student oriented educational service of e-learning pedagogy.

A Study on the Image/Video Data Processing Methods for Edge Computing-Based Object Detection Service (에지 컴퓨팅 기반 객체탐지 서비스를 위한 이미지/동영상 데이터 처리 기법에 관한 연구)

  • Jang Shin Won;Yong-Geun Hong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.11
    • /
    • pp.319-328
    • /
    • 2023
  • Unlike cloud computing, edge computing technology analyzes and judges data close to devices and users, providing advantages such as real-time service, sensitive data protection, and reduced network traffic. EdgeX Foundry, a representative open source of edge computing platforms, is an open source-based edge middleware platform that provides services between various devices and IT systems in the real world. EdgeX Foundry provides a service for handling camera devices, along with a service for handling existing sensed data, which only supports simple streaming and camera device management and does not store or process image data obtained from the device inside EdgeX. This paper presents a technique that can store and process image data inside EdgeX by applying some of the services provided by EdgeX Foundry. Based on the proposed technique, a service pipeline for object detection services used core in the field of autonomous driving was created for experiments and performance evaluation, and then compared and analyzed with existing methods.