• Title/Summary/Keyword: Surveillance sensor

Search Result 254, Processing Time 0.033 seconds

Experimental Verification of Multi-Sensor Geolocation Algorithm using Sequential Kalman Filter (순차적 칼만 필터를 적용한 다중센서 위치추정 알고리즘 실험적 검증)

  • Lee, Seongheon;Kim, Youngjoo;Bang, Hyochoong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.1
    • /
    • pp.7-13
    • /
    • 2015
  • Unmanned air vehicles (UAVs) are getting popular not only as a private usage for the aerial photograph but military usage for the surveillance, reconnaissance and supply missions. For an UAV to successfully achieve these kind of missions, geolocation (localization) must be implied to track an interested target or fly by reference. In this research, we adopted multi-sensor fusion (MSF) algorithm to increase the accuracy of the geolocation and verified the algorithm using two multicopter UAVs. One UAV is equipped with an optical camera, and another UAV is equipped with an optical camera and a laser range finder. Throughout the experiment, we have obtained measurements about a fixed ground target and estimated the target position by a series of coordinate transformations and sequential Kalman filter. The result showed that the MSF has better performance in estimating target location than the case of using single sensor. Moreover, the experimental result implied that multi-sensor geolocation algorithm is able to have further improvements in localization accuracy and feasibility of other complicated applications such as moving target tracking and multiple target tracking.

Rolling Stock Passenger Compartment Fire Safety Surveillance System (철도차량 객실화재 안전감시 시스템)

  • Son Young-Jin;Lee Kang-won;Bang yeon-goon
    • Proceedings of the KSR Conference
    • /
    • 2005.05a
    • /
    • pp.58-63
    • /
    • 2005
  • It is an emergency which is in the process of existing using of passenger compartment equipment of the rolling stock to sprout and interphone wiring and by the fire sensor which perceives the smoke in the use passenger car ceiling the receiver which is to driver's cabin it leads and the fire occurrence alarm voice sprouts carried on shoulder but, by no. of the car indication ramp it divides the corresponding vehicle and from inside the passenger compartment of the rolling stock from fire occurrence hour driver's cabin corresponding passenger no. of the car. It is accurate and in order it will be able to perceive. It will be able to confront initially quickly with the technique which it composes. It is regarding the fire safety surveillance system it will be able to embody at the expense which is cheap in order to use existing wiring.

  • PDF

An Approach for Security Problems in Visual Surveillance Systems by Combining Multiple Sensors and Obstacle Detection

  • Teng, Zhu;Liu, Feng;Zhang, Baopeng;Kang, Dong-Joong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1284-1292
    • /
    • 2015
  • As visual surveillance systems become more and more common in human lives, approaches based on these systems to solve security problems in practice are boosted, especially in railway applications. In this paper, we first propose a robust snag detection algorithm and then present a railway security system by using a combination of multiple sensors and the vision based snag detection algorithm. The system aims safety at several repeatedly occurred situations including slope protection, inspection of the falling-object from bridges, and the detection of snags and foreign objects on the rail. Experiments demonstrate that the snag detection is relatively robust and the system could guarantee the security of the railway through these real-time protections and detections.

Implementation of network-based video surveillance system (영상을 이용한 네트워크 기반 감시 시스템 구현)

  • Lee, Ji-Hoon;Kim, Sun-Hyeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.510-512
    • /
    • 2015
  • Recently, people fear is growing because of the various crimes that may occur when you go out. The growing is interest in security systems for the protection of an individual's property. In this paper, to establish a single central server based on the home network when intruders access to city, such as image processing values obtained through the IP camera and distance values disciplined use an ultrasonic sensor the user for an attacker city that will connect to the server the surveillance system provides the information that is received and implemented.

  • PDF

EVALUATION OF FAST NEUTRON FLUENCE FOR KORI UNIT 3 PRESSURE VESSEL

  • Yoo, Choon-Sung;Kim, Byoung-Chul;Chang, Kee-Ok;Lee, Sam-Lai;Park, Jong-Ho
    • Nuclear Engineering and Technology
    • /
    • v.38 no.7
    • /
    • pp.665-674
    • /
    • 2006
  • Three-dimensional neutron flux and fluence of Kori Unit 3 were evaluated using the synthesis technique described in Regulatory Guide 1.190 for all reactor geometry. For this purpose DORT neutron transport calculations from Cycle 1 to Cycle 15 were performed using BUGLE-96 cross-section library. The calculated flux and fluence were validated by comparing the calculated reaction rates to the measurement data from the dosimetry sensor set of the $5^{th}$ surveillance capsule withdrawn at the end of cycle 15 of Kori Unit 3. And then the best estimation of the neutron exposures for the reactor vessel beltline region was performed using the least square evaluation. These results can be used in the assessment of the state of embrittlement of Kori Unit 3 pressure vessel.

Performance Analysis on Wireless Sensor Network using LDPC Codes over Node-to-node Interference

  • Choi, Sang-Min;Moon, Byung-Hyun
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.77-80
    • /
    • 2005
  • Wireless sensor networks(WSN) technology has various applications such as surveillance and information gathering in the uncontrollable area of human. One of major issues in WSN is the research for reducing the energy consumption and reliability of data. A system with forward error correction(FEC) can provide an objective reliability while using less transmission power than a system without FEC. In this paper, we propose to use LDPC codes of various code rate(0.53, 0.81, 0.91) for FEC for WSN. Also, we considered node-to-node interference in addition to AWGN channel. The proposed system has not only high reliable data transmission at low SNR, but also reduced transmission power usage.

  • PDF

Traffic Adaptive Wakeup Control Mechanism in Wireless Sensor Networks (무선 센서 네트워크에서 트래픽 적응적인 wakeup 제어 메커니즘)

  • Kim, Hye-Yun;Kim, Seong-Cheol;Jeon, Jun-Heon;Kim, Joon-Jae
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.681-686
    • /
    • 2014
  • In this paper, we propose a traffic adaptive mechanism that controls the receiver's wakeup periods based on the generated traffic amounts. The proposed control mechanism is designed for military, wild animal monitoring, and forest fire surveillance applications. In these environments, a low-rate data transmission is usually required between sensor nodes. However, continuous data is generated when events occur. Therefore, legacy mechanisms are ineffective for these applications. Our control mechanism showed a better performance in energy efficiency compared to the RI-MAC owing to the elimination of the sender node's idle listening.

ZigBee Security Using Attribute-Based Proxy Re-encryption

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.343-348
    • /
    • 2012
  • ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

Kernel Regression with Correlation Coefficient Weighted Distance (상관계수 가중법을 이용한 커널회귀 방법)

  • Shin, Ho-Cheol;Park, Moon-Ghu;Lee, Jae-Yong;You, Skin
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.588-590
    • /
    • 2006
  • Recently, many on-line approaches to instrument channel surveillance (drift monitoring and fault detection) have been reported worldwide. On-line monitoring (OLM) method evaluates instrument channel performance by assessing its consistency with other plant indications through parametric or non-parametric models. The heart of an OLM system is the model giving an estimate of the true process parameter value against individual measurements. This model gives process parameter estimate calculated as a function of other plant measurements which can be used to identify small sensor drifts that would require the sensor to be manually calibrated or replaced. This paper describes an improvement of auto-associative kernel regression by introducing a correlation coefficient weighting on kernel distances. The prediction performance of the developed method is compared with conventional auto-associative kernel regression.

  • PDF

Positioning of the Base Station at Wireless Sensor Network (무선 센서 네트워크에서 기지국의 위치선정)

  • Cho, Do-Hyeoun;Lee, Jong-Young;Lee, Sang-Hun;Choi, Jin-Tak
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1189-1190
    • /
    • 2008
  • Wireless sensor networks (WSN) have attracted much attention in recent years due to their potential use in many applications such as border protection and combat field surveillance. Given the criticality of such applications, maintaining a dependable operation of the network is a fundamental objective. However, the resource constrained nature of sensor nodes and the ad-hoc formation of the network, often coupled with an unattended deployment, pose non-conventional challenges and motivate the need for special techniques for dependable design and management of WSN. In this article, we highlight the potential of careful positioning of the base station (BS), which acts as a sink resources.

  • PDF