• Title/Summary/Keyword: Surveillance Systems

Search Result 731, Processing Time 0.035 seconds

Design and Strength Analysis of a Mast and Mounting Part of Dummy Gun for Multi-Mission Unmanned Surface Vehicle (복합임무 무인수상정의 마스트 및 특수임무장비 장착부 설계 및 강도해석)

  • Son, Juwon;Kim, Donghee;Choi, Byungwoong;Lee, Youngjin
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.11
    • /
    • pp.51-59
    • /
    • 2018
  • The Multi-Mission Unmanned Surface Vehicle(MMUSV), which is manufactured using glass Fiber Reinforced Plastic(FRP) material, is designed to perform a surveillance and reconnaissance on the sea. Various navigation sensors, such as RADAR, RIDAR, camera, are mounted on a mast to perform an autonomous navigation. And a dummy gun is mounted on the deck of the MMUSV for a target tracking and disposal. It is necessary to analyze a strength for structures mounted on the deck because the MMUSV performs missions under a severe sea state. In this paper, a strength analysis of the mast structure is performed on static loads and lateral external loads to verify an adequacy of the designed mast through a series of simulations. Based on the results of captive model tests, a strength analysis for a heave motion of the mast structure is conducted using a simulation tool. Also a simulation and fatigue test for a mounting part between the MMUSV and the dummy gun are performed using a specimen. The simulation and test results are represented that a structure of the mast and mounting part of the dummy gun are appropriately designed.he impact amount are performed through simulation and experiments.

A Method for Determining Face Recognition Suitability of Face Image (얼굴영상의 얼굴인식 적합성 판정 방법)

  • Lee, Seung Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.295-302
    • /
    • 2018
  • Face recognition (FR) has been widely used in various applications, such as smart surveillance systems, immigration control in airports, user authentication in smart devices, and so on. FR in well-controlled conditions has been extensively studied and is relatively mature. However, in unconstrained conditions, FR performance could degrade due to undesired characteristics of the input face image (such as irregular facial pose variations). To overcome this problem, this paper proposes a new method for determining if an input image is suitable for FR. In the proposed method, for an input face image, reconstruction error is computed by using a predefined set of reference face images. Then, suitability can be determined by comparing the reconstruction error with a threshold value. In order to reduce the effect of illumination changes on the determination of suitability, a preprocessing algorithm is applied to the input and reference face images before the reconstruction. Experimental results show that the proposed method is able to accurately discriminate non-frontal and/or incorrectly aligned face images from correctly aligned frontal face images. In addition, only 3 ms is required to process a face image of $64{\times}64$ pixels, which further demonstrates the efficiency of the proposed method.

A Study on the Improvement of Disaster and Safety Management for Local Cultural Heritages (지방문화재 재난안전관리 개선방안에 관한 연구)

  • Kim, Twe-Hwan;Kim, Jung-Gon;Been, Ju-Hee
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.3
    • /
    • pp.358-366
    • /
    • 2019
  • Purpose: This paper aims to clarify the problems and to examine the improvement methods by investigating the management condition of local-designated cultural property of which management is relatively poor in comparison with state-designated cultural heritage. Method: In order to grasp the management situation of the local-designated cultural heritage, a research on cultural heritage management situation and problems will be carried out with 35 cultual heritages in Goryeong-gun. Also, the improvement methods about the property type vulnerability on the basis of interview with cultual property managers, fire-fighting officers and civil servants, etc. Results: Local cultural heritages were investigated to be very vulnerable to the fire of wooden buildings, the theft of movable cultural heritages, and the effects of wind and water damage. It is because cultural heritages are scattered over wide areas fundamentally. As the result, it has difficulty in the patrols of police officers and fire fighters, and in the situation that it lacks disaster monitoring and CCTV for countermeasures to replace them, electronic security including fire hydrant, sensors, etc and fire extinguishing facilities and so on. It is difficult for local governments managing local-designated cultural heritages to enhance their management systems directly due to their lack of budget and manpower. Conclusion: In order to strengthen disaster and safety management system for the cultural heritages designated by local governments, they have to clarify disaster countermeasure task of fire fighting, police, and cultural heritage managers prepare their manuals, and systematize them through disaster drill mainly in local autonomous governments. Also, so as to establish a surveillance system every day, they have to enhance the community for local cultural heritage manage consisting of local volunteer fire departments, local voluntary disaster prevention organizations, volunteers, etc.

A Study on Time Synchronization Method for Analyzing the Network Performance of Remote Control System (원격운용 시스템의 네트워크 성능분석을 위한 시간동기화 방안에 관한 연구)

  • Yang, DongWon;Kim, Namgon;Kim, Dojong
    • Journal of IKEEE
    • /
    • v.26 no.2
    • /
    • pp.141-149
    • /
    • 2022
  • With the development of artificial intelligence and unmanned technologies, the remote surveillance/autonomous driving systems have been actively researched. For an effective performance analysis of the developed remote control system, it is important to record the data of it in real time. In addition, in order to analyze the performance between the control system and the remote system, the recorded data from them should be synchronized with time. In this paper we proposed a novel time synchronization method for the remote control system. The proposed remote control system satisfies the time difference of the recorded data within 1 ms, and we can reduce the time difference by using a CPU shielding and affinity setting. The performance of the proposed method was proved through various network data storage experiments. And the experiments confirmed that the proposed method can be applied to recording devices of unmanned ground vehicles and control vehicles. The proposed method will be used as a method for analyzing network data of UGV-R (Unmanned Ground Vehicle - Reconnaissance).

Developing an Occupants Count Methodology in Buildings Using Virtual Lines of Interest in a Multi-Camera Network (다중 카메라 네트워크 가상의 관심선(Line of Interest)을 활용한 건물 내 재실자 인원 계수 방법론 개발)

  • Chun, Hwikyung;Park, Chanhyuk;Chi, Seokho;Roh, Myungil;Susilawati, Connie
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.5
    • /
    • pp.667-674
    • /
    • 2023
  • In the event of a disaster occurring within a building, the prompt and efficient evacuation and rescue of occupants within the building becomes the foremost priority to minimize casualties. For the purpose of such rescue operations, it is essential to ascertain the distribution of individuals within the building. Nevertheless, there is a primary dependence on accounts provided by pertinent individuals like building proprietors or security staff, alongside fundamental data encompassing floor dimensions and maximum capacity. Consequently, accurate determination of the number of occupants within the building holds paramount significance in reducing uncertainties at the site and facilitating effective rescue activities during the golden hour. This research introduces a methodology employing computer vision algorithms to count the number of occupants within distinct building locations based on images captured by installed multiple CCTV cameras. The counting methodology consists of three stages: (1) establishing virtual Lines of Interest (LOI) for each camera to construct a multi-camera network environment, (2) detecting and tracking people within the monitoring area using deep learning, and (3) aggregating counts across the multi-camera network. The proposed methodology was validated through experiments conducted in a five-story building with the average accurary of 89.9% and the average MAE of 0.178 and RMSE of 0.339, and the advantages of using multiple cameras for occupant counting were explained. This paper showed the potential of the proposed methodology for more effective and timely disaster management through common surveillance systems by providing prompt occupancy information.

Characteristic Analysis of Wireless Channels to Construct Wireless Network Environment in Underground Utility Tunnels (지하공동구 내 무선 네트워크 환경구축을 위한 무선채널 특성 분석)

  • Byung-Jin Lee;Woo-Sug Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.27-34
    • /
    • 2024
  • The direct and indirect damages caused by fires in underground utility tunnels have a great impact on society as a whole, so efforts are needed to prevent and manage them in advance. To this end, research is ongoing to prevent disasters such as fire flooding by applying digital twin technology to underground utility tunnels. A network is required to transmit the sensed signals from each sensor to the platform. In essence, it is necessary to analyze the application of wireless networks in the underground utility tunnel environments because the tunnel lacks the reception range of external wireless communication systems. Within the underground utility tunnels, electromagnetic interference caused by transmission and distribution cables, and diffuse reflection of signals from internal structures, obstacles, and metallic pipes such as water pipes can cause distortion or size reduction of wireless signals. To ensure real-time connectivity for remote surveillance and monitoring tasks through sensing, it is necessary to measure and analyze the wireless coverage in underground utility tunnels. Therefore, in order to build a wireless network environment in the underground utility tunnels. this study minimized the shaded area and measured the actual cavity environment so that there is no problem in connecting to the wireless environment inside the underground utility tunnels. We analyzed the data transmission rate, signal strength, and signal-to-noise ratio for each section of the terrain of the underground utility tunnels. The obtained results provide an appropriate wireless planning approach for installing wireless networks in underground utility tunnels.

2013 Records Regime Issues and Prospects for Public Records Management in Korea (한국 공공기록관리의 쟁점과 전망 2013년 기록관리체제를 위하여)

  • Ahn, Byung-Woo;Lee, Sang-min;Sim, Seong-Bo;Nam, Kyeong-Ho;Kim, Jin-Sung;O, Dong-Seok;Jeong, Tae-Young
    • The Korean Journal of Archival Studies
    • /
    • no.34
    • /
    • pp.3-28
    • /
    • 2012
  • The year of 2013 is the first year that the new president takes the power and administrates the national affairs. In Korea, when the new president comes, the new administration brings big changes in the politics, economy, and society. The government management style has been changed according to the orientation and styles of the new president. Public records management is a critical and effective business tool to establish and carry out the government policies as well as an essential tool for democracy. Modern democracy is based on good governance. Creation and free use of full and accurate public records makes the good communication between the government and the public possible, and people's participation in the policy-making and surveillance of government activities for public good can work. During the present administration, communication between the president and the people was cutoff and people's participation in the national affairs have been further limited. Furthermore, in the present administration, the public records management was not regarded important, Whatever new administration comes, the year of 2013 is the time for the new administration to realize again the importance of the public records management and put it back to the normal track. Here are the major issues in the public records management to be concerned and resolved; (1) to ensure technological and institutional management of the electronic records in the government and safe transfer of the massive electronic records, (2) to establish an independent national records management and archives authority to be based on good governance, (3) to innovate the public records management in the public agencies including their agency records offices (RMO) and records management systems (RMS) (4) to establish local government archives and document local government policies and activities (5) supporting and promotion for documentation of the total society as a public service (6) expanding employment of professional records managers and archivists in the central and local governments, and standardization of professional competency and certification. In this paper, I will introduce the major issues in the public records management and suggest the policies and solutions that the Korean records professionals considered and discussed. This analysis and suggestions are the outcome of our professional considerations and discussions.

The research for the yachting development of Korean Marina operation plans (요트 발전을 위한 한국형 마리나 운영방안에 관한 연구)

  • Jeong Jong-Seok;Hugh Ihl
    • Journal of Navigation and Port Research
    • /
    • v.28 no.10 s.96
    • /
    • pp.899-908
    • /
    • 2004
  • The rise of income and introduction of 5 day a week working system give korean people opportunities to enjoy their leisure time. And many korean people have much interest in oceanic sports such as yachting and also oceanic leisure equipments. With the popularization and development of the equipments, the scope of oceanic activities has been expanding in Korea just as in the advanced oceanic countries. However, The current conditions for the sports in Korea are not advanced and even worse than underdeveloped countries. In order to develop the underdeveloped resources of Korean marina, we need to customize the marina models of advanced nations to serve the specific needs and circumstances of Korea As such we have carried out a comparative analysis of how Austrailia, Newzealand, Singapore, japan and Malaysia operate their marina, reaching the following conclusions. Firstly, in marina operations, in order to protect personal property rights and to preserve the environment, we must operate membership and non-membership, profit and non-profit schemes separately, yet without regulating the dress code entering or leaving the club house. Secondly, in order to accumulate greater value added, new sporting events should be hosted each year. There is also the need for an active use of volunteers, the generation of greater interest in yacht tourism, and the simplification of CIQ procedures for foreign yachts as well as the provision of language services. Thirdly, a permanent yacht school should be established, and classes should be taught by qualified instructors. Beginners, intermediary, and advanced learner classes should be managed separately with special emphasis on the dinghy yacht program for children. Fourthly, arrival and departure at the moorings must be regulated autonomically, and there must be systematic measures for the marina to be able, in part, to compensate for loss and damages to equipment, security and surveillance after usage fees have been paid for. Fifthly, marine safety personnel must be formed in accordance with Korea's current circumstances from civilian organizations in order to be used actively in benchmarking, rescue operations, and oceanic searches at times of disaster at sea.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Distribution of Foodborne Pathogens from Garlic Chives and Its Production Environments in the Southern Part of Korea (남부지방 부추와 재배환경의 식품매개병원균의 분포)

  • Jung, Jieun;Oh, Kwang Kyo;Seo, Seung-Mi;Yang, SuIn;Jung, Kyu-Seok;Roh, Eunjung;Ryu, Jae-Gee
    • Journal of Food Hygiene and Safety
    • /
    • v.35 no.5
    • /
    • pp.477-488
    • /
    • 2020
  • Recently, foodborne illness outbreaks linked to fresh produce are being increasingly reported in the United States, the EU, and Korea as well. Some of this increase may be due to improved surveillance, increase in consumption, change in consumers' habits, and complex distribution systems. Garlic chive is a green, fresh-cut vegetable consumed year-round as a nutrition-rich herb in Korea. It is also prone to contamination with foodborne pathogens during pre-harvest, as amendment with high amounts of livestock manure or compost to soil is required in its cultivation. Our aim in this study was to evaluate microbial contamination of garlic chives, garlic chives cultivation soil, compost, and irrigation water in the southern part of Korea. Samples were collected in A, B, and C regions in 2019 and 2020, and 69, 72, 27, and 40 of garlic chives, soil, compost, and irrigated water, respectively, were analyzed for the presence of sanitary indicator bacteria (total aerobic bacteria, coliforms and Escherichia coli), Bacillus cereus, Staphylococcus aureus, pathogenic E. coli, E. coli O157:H7, Listeria monocytogenes, and Salmonella spp. In A, B, and C regions, levels of total aerobic bacteria, coliform, B. cereus, and S. aureus on all samples were between 1.14 and 8.83 log CFU/g, 0.43 and 5.01 log CFU/g, 0.41 and 5.55 log CFU/g, and 1.81 and 6.27 log CFU/g, respectively. B. cereus isolated from garlic chives and environmental samples showed β-hemolysis activity. Incidence of S. aureus in garlic chive and its production environments in 2020 was different from 2019. In this study, B. cereus and S. aureus were the only pathogenic microorganisms detected in all samples. As a result, this work suggests that continuous monitoring in the production and pre-harvest environment is required to improve hthe hygiene and safety of garlic chive.