• Title/Summary/Keyword: Tracking network

Search Result 1,002, Processing Time 0.03 seconds

Developing an Occupants Count Methodology in Buildings Using Virtual Lines of Interest in a Multi-Camera Network (다중 카메라 네트워크 가상의 관심선(Line of Interest)을 활용한 건물 내 재실자 인원 계수 방법론 개발)

  • Chun, Hwikyung;Park, Chanhyuk;Chi, Seokho;Roh, Myungil;Susilawati, Connie
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.5
    • /
    • pp.667-674
    • /
    • 2023
  • In the event of a disaster occurring within a building, the prompt and efficient evacuation and rescue of occupants within the building becomes the foremost priority to minimize casualties. For the purpose of such rescue operations, it is essential to ascertain the distribution of individuals within the building. Nevertheless, there is a primary dependence on accounts provided by pertinent individuals like building proprietors or security staff, alongside fundamental data encompassing floor dimensions and maximum capacity. Consequently, accurate determination of the number of occupants within the building holds paramount significance in reducing uncertainties at the site and facilitating effective rescue activities during the golden hour. This research introduces a methodology employing computer vision algorithms to count the number of occupants within distinct building locations based on images captured by installed multiple CCTV cameras. The counting methodology consists of three stages: (1) establishing virtual Lines of Interest (LOI) for each camera to construct a multi-camera network environment, (2) detecting and tracking people within the monitoring area using deep learning, and (3) aggregating counts across the multi-camera network. The proposed methodology was validated through experiments conducted in a five-story building with the average accurary of 89.9% and the average MAE of 0.178 and RMSE of 0.339, and the advantages of using multiple cameras for occupant counting were explained. This paper showed the potential of the proposed methodology for more effective and timely disaster management through common surveillance systems by providing prompt occupancy information.

An Artificial Intelligence Approach to Waterbody Detection of the Agricultural Reservoirs in South Korea Using Sentinel-1 SAR Images (Sentinel-1 SAR 영상과 AI 기법을 이용한 국내 중소규모 농업저수지의 수표면적 산출)

  • Choi, Soyeon;Youn, Youjeong;Kang, Jonggu;Park, Ganghyun;Kim, Geunah;Lee, Seulchan;Choi, Minha;Jeong, Hagyu;Lee, Yangwon
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_3
    • /
    • pp.925-938
    • /
    • 2022
  • Agricultural reservoirs are an important water resource nationwide and vulnerable to abnormal climate effects such as drought caused by climate change. Therefore, it is required enhanced management for appropriate operation. Although water-level tracking is necessary through continuous monitoring, it is challenging to measure and observe on-site due to practical problems. This study presents an objective comparison between multiple AI models for water-body extraction using radar images that have the advantages of wide coverage, and frequent revisit time. The proposed methods in this study used Sentinel-1 Synthetic Aperture Radar (SAR) images, and unlike common methods of water extraction based on optical images, they are suitable for long-term monitoring because they are less affected by the weather conditions. We built four AI models such as Support Vector Machine (SVM), Random Forest (RF), Artificial Neural Network (ANN), and Automated Machine Learning (AutoML) using drone images, sentinel-1 SAR and DSM data. There are total of 22 reservoirs of less than 1 million tons for the study, including small and medium-sized reservoirs with an effective storage capacity of less than 300,000 tons. 45 images from 22 reservoirs were used for model training and verification, and the results show that the AutoML model was 0.01 to 0.03 better in the water Intersection over Union (IoU) than the other three models, with Accuracy=0.92 and mIoU=0.81 in a test. As the result, AutoML performed as well as the classical machine learning methods and it is expected that the applicability of the water-body extraction technique by AutoML to monitor reservoirs automatically.

Twitter Issue Tracking System by Topic Modeling Techniques (토픽 모델링을 이용한 트위터 이슈 트래킹 시스템)

  • Bae, Jung-Hwan;Han, Nam-Gi;Song, Min
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.109-122
    • /
    • 2014
  • People are nowadays creating a tremendous amount of data on Social Network Service (SNS). In particular, the incorporation of SNS into mobile devices has resulted in massive amounts of data generation, thereby greatly influencing society. This is an unmatched phenomenon in history, and now we live in the Age of Big Data. SNS Data is defined as a condition of Big Data where the amount of data (volume), data input and output speeds (velocity), and the variety of data types (variety) are satisfied. If someone intends to discover the trend of an issue in SNS Big Data, this information can be used as a new important source for the creation of new values because this information covers the whole of society. In this study, a Twitter Issue Tracking System (TITS) is designed and established to meet the needs of analyzing SNS Big Data. TITS extracts issues from Twitter texts and visualizes them on the web. The proposed system provides the following four functions: (1) Provide the topic keyword set that corresponds to daily ranking; (2) Visualize the daily time series graph of a topic for the duration of a month; (3) Provide the importance of a topic through a treemap based on the score system and frequency; (4) Visualize the daily time-series graph of keywords by searching the keyword; The present study analyzes the Big Data generated by SNS in real time. SNS Big Data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. In addition, such analysis requires the latest big data technology to process rapidly a large amount of real-time data, such as the Hadoop distributed system or NoSQL, which is an alternative to relational database. We built TITS based on Hadoop to optimize the processing of big data because Hadoop is designed to scale up from single node computing to thousands of machines. Furthermore, we use MongoDB, which is classified as a NoSQL database. In addition, MongoDB is an open source platform, document-oriented database that provides high performance, high availability, and automatic scaling. Unlike existing relational database, there are no schema or tables with MongoDB, and its most important goal is that of data accessibility and data processing performance. In the Age of Big Data, the visualization of Big Data is more attractive to the Big Data community because it helps analysts to examine such data easily and clearly. Therefore, TITS uses the d3.js library as a visualization tool. This library is designed for the purpose of creating Data Driven Documents that bind document object model (DOM) and any data; the interaction between data is easy and useful for managing real-time data stream with smooth animation. In addition, TITS uses a bootstrap made of pre-configured plug-in style sheets and JavaScript libraries to build a web system. The TITS Graphical User Interface (GUI) is designed using these libraries, and it is capable of detecting issues on Twitter in an easy and intuitive manner. The proposed work demonstrates the superiority of our issue detection techniques by matching detected issues with corresponding online news articles. The contributions of the present study are threefold. First, we suggest an alternative approach to real-time big data analysis, which has become an extremely important issue. Second, we apply a topic modeling technique that is used in various research areas, including Library and Information Science (LIS). Based on this, we can confirm the utility of storytelling and time series analysis. Third, we develop a web-based system, and make the system available for the real-time discovery of topics. The present study conducted experiments with nearly 150 million tweets in Korea during March 2013.

Social Network-based Hybrid Collaborative Filtering using Genetic Algorithms (유전자 알고리즘을 활용한 소셜네트워크 기반 하이브리드 협업필터링)

  • Noh, Heeryong;Choi, Seulbi;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.19-38
    • /
    • 2017
  • Collaborative filtering (CF) algorithm has been popularly used for implementing recommender systems. Until now, there have been many prior studies to improve the accuracy of CF. Among them, some recent studies adopt 'hybrid recommendation approach', which enhances the performance of conventional CF by using additional information. In this research, we propose a new hybrid recommender system which fuses CF and the results from the social network analysis on trust and distrust relationship networks among users to enhance prediction accuracy. The proposed algorithm of our study is based on memory-based CF. But, when calculating the similarity between users in CF, our proposed algorithm considers not only the correlation of the users' numeric rating patterns, but also the users' in-degree centrality values derived from trust and distrust relationship networks. In specific, it is designed to amplify the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the trust relationship network. Also, it attenuates the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the distrust relationship network. Our proposed algorithm considers four (4) types of user relationships - direct trust, indirect trust, direct distrust, and indirect distrust - in total. And, it uses four adjusting coefficients, which adjusts the level of amplification / attenuation for in-degree centrality values derived from direct / indirect trust and distrust relationship networks. To determine optimal adjusting coefficients, genetic algorithms (GA) has been adopted. Under this background, we named our proposed algorithm as SNACF-GA (Social Network Analysis - based CF using GA). To validate the performance of the SNACF-GA, we used a real-world data set which is called 'Extended Epinions dataset' provided by 'trustlet.org'. It is the data set contains user responses (rating scores and reviews) after purchasing specific items (e.g. car, movie, music, book) as well as trust / distrust relationship information indicating whom to trust or distrust between users. The experimental system was basically developed using Microsoft Visual Basic for Applications (VBA), but we also used UCINET 6 for calculating the in-degree centrality of trust / distrust relationship networks. In addition, we used Palisade Software's Evolver, which is a commercial software implements genetic algorithm. To examine the effectiveness of our proposed system more precisely, we adopted two comparison models. The first comparison model is conventional CF. It only uses users' explicit numeric ratings when calculating the similarities between users. That is, it does not consider trust / distrust relationship between users at all. The second comparison model is SNACF (Social Network Analysis - based CF). SNACF differs from the proposed algorithm SNACF-GA in that it considers only direct trust / distrust relationships. It also does not use GA optimization. The performances of the proposed algorithm and comparison models were evaluated by using average MAE (mean absolute error). Experimental result showed that the optimal adjusting coefficients for direct trust, indirect trust, direct distrust, indirect distrust were 0, 1.4287, 1.5, 0.4615 each. This implies that distrust relationships between users are more important than trust ones in recommender systems. From the perspective of recommendation accuracy, SNACF-GA (Avg. MAE = 0.111943), the proposed algorithm which reflects both direct and indirect trust / distrust relationships information, was found to greatly outperform a conventional CF (Avg. MAE = 0.112638). Also, the algorithm showed better recommendation accuracy than the SNACF (Avg. MAE = 0.112209). To confirm whether these differences are statistically significant or not, we applied paired samples t-test. The results from the paired samples t-test presented that the difference between SNACF-GA and conventional CF was statistical significant at the 1% significance level, and the difference between SNACF-GA and SNACF was statistical significant at the 5%. Our study found that the trust/distrust relationship can be important information for improving performance of recommendation algorithms. Especially, distrust relationship information was found to have a greater impact on the performance improvement of CF. This implies that we need to have more attention on distrust (negative) relationships rather than trust (positive) ones when tracking and managing social relationships between users.

Development of CCTV Cooperation Tracking System for Real-Time Crime Monitoring (실시간 범죄 모니터링을 위한 CCTV 협업 추적시스템 개발 연구)

  • Choi, Woo-Chul;Na, Joon-Yeop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.546-554
    • /
    • 2019
  • Typically, closed-circuit television (CCTV) monitoring is mainly used for post-processes (i.e. to provide evidence after an incident has occurred), but by using a streaming video feed, machine-based learning, and advanced image recognition techniques, current technology can be extended to respond to crimes or reports of missing persons in real time. The multi-CCTV cooperation technique developed in this study is a program model that delivers similarity information about a suspect (or moving object) extracted via CCTV at one location and sent to a monitoring agent to track the selected suspect or object when he, she, or it moves out of range to another CCTV camera. To improve the operating efficiency of local government CCTV control centers, we describe here the partial automation of a CCTV control system that currently relies upon monitoring by human agents. We envisage an integrated crime prevention service, which incorporates the cooperative CCTV network suggested in this study and that can easily be experienced by citizens in ways such as determining a precise individual location in real time and providing a crime prevention service linked to smartphones and/or crime prevention/safety information.

Development of Analysis Model for R&D Environment Change in Search of the Weak Signal (Weak Signal 탐색을 위한 연구개발 환경변화 분석모델 개발)

  • Hong, Sung-Wha;Kim, You-Eil;Bae, Kuk-Jin;Park, Young-Wook;Park, Jong-Kyu
    • Journal of Korea Technology Innovation Society
    • /
    • v.12 no.1
    • /
    • pp.189-211
    • /
    • 2009
  • The importance of searching the weak signal has been increasingly recognized to cope with rapidly changing circumstances as an environmental analysis technique. This study proposed the NEST process for the searching for the weak signal. The NEST (New & Emerging Signals of Trends) is a micro environmental analysis process based on both quantitative and qualitative method. For this, the weak signal Searching Board is developed and traditional methods as global monitoring, trend analysis, brainstorming and delphi method are implemented to NEST. The NEST process is consists of three stage modules; the global monitoring stage in search of seeds information related to the environmental change, the weak signal analysis stage using the weak signal Tracking Board, and the delphi valuation stage for objectifying the final result. The NEST provides the weak signal of the promising technology which can bring new paradigm and the Up-Coming Trends which can lead new trend in the future. These outputs can be used to select promising technology from firm level to national level. The NEST system can be effectively operated as well as in small group so that small and medium innovative firms can develop and execute their own NEST process individually.

  • PDF

Design and Implementation of a SQL based Moving Object Query Process System for Controling Transportation Vehicle (물류 차량 관제를 위한 SQL 기반 이동 객체 질의 처리 시스템의 설계 및 구현)

  • Jung, Young-Jin;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.699-708
    • /
    • 2005
  • It becomes easy and generalized to track the cellular phone users and vehicles according to the Progress of wireless telecommunication, the spread of network, and the miniaturization of terminal devices. It has been constantly studied to provide location based services to furnish suitable services depending on the positions of customers. Various vehicle tracking and management systems are developed to utilize and manage the vehicle locations to relieve the congestion of traffic and to smooth transportation. However the designed previous work can not evaluated in real world, because most of previous work is only designed not implemented and it is developed for simple model to handle a point, a line, a polygon object. Therefore, we design a moving object query language and implement a vehicle management system to search the positions and trajectories of vehicles and to analyze the cost of transportation effectively. The designed query language based on a SQL can be utilized to get the trajectories between two specific places, the departure time, the arrival time of vehicles, and the predicted uncertainty positions, etc. In addition, the proposed moving object query language for managing transportation vehicles is useful to analyze the cost of trajectories in a variety of moving object management system containing transportation.

Analysis and Recognition of Behavioral Response of Selected Insects in Toxic Chemicals for Water Quality Monitoring (수질 모니터링을 위한 유해 물질 유입에 따른 생물체의 행동 반응 분석 및 인식)

  • Kim, Cheol-Ki;Cha, Eui-Young
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.663-672
    • /
    • 2002
  • In this paper, Using an automatic tracking system, behavior of an aquatic insect, Chironomus sp. (Chironomidae), was observed in semi-natural conditions in response to sub-lethal treament of a carbamate insecticide, carbofuran. The fourth instar larvae were placed in an observation cage $(6cm\times{7cm}\times{2.5cm)}$ at temperature of $18^\circ{C}$ and the light condition of 10 time (light) : 14 time (dark). The tracking system was devised to detect the instant, partial movement of the insect body. Individual movement was traced after the treatment of carbofuran (0.1ppm) for four days 2days : before treatment, 2 days : after treatment). Along with the other irregular behaviors, "ventilation activity", appearing as a shape of "compressed zig-zag", was more frequently observed after the treatment of the insecticide. The activity of the test individuals was also generally depressed after the chemical treatment. In order to detect behavioral changes of the treated specimens, wavelet analysis was implemented to characterize different movement patterns. The extracted parameters based on Discrete Wavelet Transforms (DWT) were subsequently provided to artificial neural networks to be trained to represent different patterns of the movement tracks before and after treatments of the insecticide. This combined model of wavelets and artificial neural networks was able to point out the occurrence of characteristic movement patterns, and could be an alternative tool for automatically detecting presences of toxic chemicals for water quality monitoring. quality monitoring.

Location Trigger System for the Application of Context-Awareness based Location services

  • Lee, Yon-Sik;Jang, Min-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.149-157
    • /
    • 2019
  • Recent research has been actively carried out on systems that want to optimize resource utilization by analyzing the intended behavior and pattern of behavior of objects (users, consumers). A service system that applies information about an object's location or behavior must include a location trigger processing system for tracking an object's real-time location. In this paper, we analyze design problems for the implementation of a context-awareness based location trigger system, and present system models based on analysis details. For this purpose, this paper introduces the concept of location trigger for intelligent location tracking techniques about moving situations of objects, and suggests a mobile agent system with active rules that can perform monitoring and appropriate actions based on sensing information and location context information, and uses them to design and implement the location trigger system for context-awareness based location services. The proposed system is verified by implementing location trigger processing scenarios and trigger service and action service protocols. In addition, through experiments on mobile agents with active rules, it is suggested that the proposed system can optimize the role and function of the application system by using rules appropriate to the service characteristics and that it is scalable and effective for location-based service systems. This paper is a preliminary study for the establishment of an optimization system for utilizing resources (equipment, power, manpower, etc.) through the active characteristics of systems such as real-time remote autonomous control and exception handling over consumption patterns and behavior changes of power users. The proposed system can be used in system configurations that induce optimization of resource utilization through intelligent warning and action based on location of objects, and can be effectively applied to the development of various location service systems.

Study on the ICT Device Safety System Application Examples in Mines (광산에서의 ICT 장비 활용 및 안전시스템 운용 사례 연구)

  • Kim, Seung-Jun;Ko, Young-Hun;Kim, Jung-Gyu;Seo, Man-Keun;Kim, Jong-Gwan
    • Tunnel and Underground Space
    • /
    • v.32 no.3
    • /
    • pp.194-202
    • /
    • 2022
  • An increased number of cases have occurred in applying ICT technology in the resource development field due to factors such as safety, eco-friendliness, and low cost since the 2000s. In Korea, the 2nd mining master plan specified the significance of converging the full cycle of mining and ICT, while the 3rd mining master plan highlighted ICT and smart mining such as supporting the supply of an ICT mining device and introducing demonstrational smart mining. This study introduces the application of an ICT device and safety system operation in the Jangseong underground mine of Korea Cement Co., Ltd. Currently, Jangseong mine combines two different kinds of 3D equipment including the handheld 3D scanner and multi-station that provides both the measurement and 3D scanning to perform a 3D measurement of the mine. Taken from the 3D measurement of the mine, it is now possible to identify any hazardous areas and abnormalities in different directions and analyze the safety of the crown pillar between two stopes in different level. Besides, the real-time location tracking and communications system have established highly efficient rescue and evacuation plans to effectively deal with any accidents in the mine.