• Title/Summary/Keyword: Traffic surveillance

Search Result 189, Processing Time 0.026 seconds

T&E Process for Safety-Critical CNS/ATM Systems (안전필수항행시스템의 시험평가 프로세스)

  • Kang, Ja-Young;Kim, Mu-Geun;Kim, Young-Hoon;Lim, In-Kyu
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.50-57
    • /
    • 2017
  • Recently, safety-critical aviation system development programs promoted domestically have been terminated in the middle stage or they have not been put to practical use at the final stage. The program failure may be caused by various factors, but this study focused on imperfect test and evaluation(T&E) procedures. In general, T&E process of a safety-critical system must be distributed throughout the entire life-cycle of the system, have a continuity in phases, and can be implemented in a variety of ways depending on the maturity of the system development and acquisition strategy. This paper aims to present a new strategy by analyzing the domestic and overseas T&E processes to reduce the risk of domestic safety-critical CNS/ATM system development program and increase the success rate of program. First, we discuss the verification and validation techniques for safety-critical systems, analyze the T&E procedures of advanced institutes and the domestic situation, and then compare the domestic and overseas T&E processes to complement the imperfect testing procedure.

A Framework for Object Detection by Haze Removal (안개 제거에 의한 객체 검출 성능 향상 방법)

  • Kim, Sang-Kyoon;Choi, Kyoung-Ho;Park, Soon-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.168-176
    • /
    • 2014
  • Detecting moving objects from a video sequence is a fundamental and critical task in video surveillance, traffic monitoring and analysis, and human detection and tracking. It is very difficult to detect moving objects in a video sequence degraded by the environmental factor such as fog. In particular, the color of an object become similar to the neighbor and it reduces the saturation, thus making it very difficult to distinguish the object from the background. For such a reason, it is shown that the performance and reliability of object detection and tracking are poor in the foggy weather. In this paper, we propose a novel method to improve the performance of object detection, combining a haze removal algorithm and a local histogram-based object tracking method. For the quantitative evaluation of the proposed system, information retrieval measurements, recall and precision, are used to quantify how well the performance is improved before and after the haze removal. As a result, the visibility of the image is enhanced and the performance of objects detection is improved.

A Study on the Application of CPTED for Crime Prevention in deteriorated Apartment Housing (도심지 내 노후화된 공동주택의 범죄예방을 위한 CPTED 기법 적용방안에 관한 연구)

  • Seo, Won Duck
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.93-98
    • /
    • 2014
  • In a recent survey conducted among Seoul citizens, the demand for crime prevention in addition to settlement of environmental problem and traffic system improvement turned out to be the highest. In particular, the demand for prevention of crimes in residential areas was higher than any other items. The crime rates are especially high in deteriorated residential districts, which indicates the relation between crimes and physical environmental factors. In other words, proper measures for surroundings can prevent crimes. While there may be various ways to keep the residents from crimes safely, CPTED, a crime preventive method in a way of improving the physical surroundings is one of the most noteworthy solutions. The principles of CPTED involves the basic principles such as Natural Surveillance, access control, and securing of territoriality and additional principles of strengthening of Activity Support and Maintenance & Management. This study aims to present a method to lower and prevent crime occurrences by applying the principles of CPTED in deteriorated Apartment Housing in the middle of a city.

A Study on the Implementation Scenarios of GNSS Augmentation System for Korean Airspace (우리나라 전공역 위성항법 보강시스템 구현 방안 연구)

  • Bae, Joong-Won;Kim, Dong-Min;Jee, Gyu-In
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.567-573
    • /
    • 2008
  • According to the ICAO's Global Air Navigation Plan for CNS/ATM - Communications, Navigation, and Surveillance - systems, employing digital technologies, including satellite systems together with various levels of automation, are to be applied in support of a seamless global air traffic management system. For the future navigation, the focus of future implementation efforts can be placed entirely on an expected gradual migration toward GNSS-based navigation, Korea has been considered various options for airspace GNSS augmentation system: GBAS, SBAS and GRAS. This paper discusses current status and future trend of GNSS airspace navigation systems, and presents the results of possible augmentation options and scenarios to analyze system availabilities which could lead to the conclusion of the best program for Korea. The results showed that Korea could have sufficient availabilities from en-route to CAT-I approach with ABAS and GBAS. The study was in cooperated with MITRE, an American research company.

  • PDF

Collision Avoidance Maneuver of Unmanned Aerial Vehicles Applying TCAS-II (TCAS-II를 응용한 무인항공기의 충돌회피기동 연구)

  • Jo, Sin-Je;Kim, Jong-Seong;Jang, Dae-Su;Tak, Min-Je;Gu, Hwon-Jun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.4
    • /
    • pp.33-39
    • /
    • 2006
  • In this paper, the collision avoidance of Unmanned Aerial Vehicles(UAVs) by applying the Traffic alert and Collision Avoidance System II(TCAS-II) is introduced. The performances of two UAVs whose maximum vertical rates are different each other are compared and analysed by not only converting many TCAS-II commands into an autopilot input but also implementing a computer program based on the Minimum Operational Performance Standards for TCAS-II. As the alternative to a possible Near Mid-Air Collision for UAVs whose maximum vertical rates are low, we have proposed a modified algorithm considering the maximum vertical rate and altitude. The modified algorithm is available on the assumption that a wider surveillance range is provided by a ADS-B system.

Age-related Injury Profile in Childhood (소아환아의 연령별 손상특성)

  • Ahn, Kyung A;Kim, Eun Sook;Lim, Kyung Soo
    • Journal of Trauma and Injury
    • /
    • v.22 no.1
    • /
    • pp.87-96
    • /
    • 2009
  • Purpose: Injuries are the most important cause of morbidity and mortality in the childhood population worldwide. Thus, this study was down to investigate the type and the severity of injuries according to the age group in childhood. Methods: A survey of injury information and a chart review were done on 378 children (257 boys, 121 girls) who visited the Emergency Departments of Asan Medical Center from March 1, 2009, to March 31, 2009. To determine differences in injury mechanism, accident place, injury site, New Injury Severity Score (NISS) and Pediatric Trauma Score (PTS), we divided the 378 patients into 4 group: under 1 year, 1 to 4 years, 5 to 9 years, and 10 to 15 years. Results: The mean (${\pm}SD$) age of the study group was 5.1 (${\pm}4.4$) years. Two year olds formed the largest group of injured children, with 77 cases (20.4% of the total). The most common cause of injury in childhood was being hit by an object (26.2%). Falls were frequent in the under-1-year group (22.2%) and slip downs (30.1%) were more frequent in 1-to-4-year group. More than half (53.4%) of the injuries occurred in the home, and the most common places of home-related injuries were the living room (41.1%) and the bedroom (31.2%). The mean (${\pm}SD$) NISS was 1.5 (${\pm}1.8$), and traffic accidents had the highest NISS ($2.8{\pm}5.1$). Injuries occurred most frequently during the evening. The peak period was 4:00 PM to 8:00 PM (33.7%). Conclusion: Patterns of childhood injury by age group were considerably different, and less severe and nonhospitalized injuries were common. Thus, need to improve surveillance of a variety of injuries, promote intersectional collaboration, build institutional capacities and mobilize community support and policy as an investment in prevention.

X3D Based Web Visualization by Data Fusion of 3D Spatial Information and Video Sequence (3D 공간정보와 비디오 융합에 의한 X3D기반 웹 가시화)

  • Sohn, Hong-Gyoo;Kim, Seong-Sam;Yoo, Byoung-Hyun;Kim, Sang-Min
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.4
    • /
    • pp.95-103
    • /
    • 2009
  • Global interests for construction of 3 dimensional spatial information has risen due to development of measurement sensors and data processing technologies. In spite of criticism for the violation of personal privacy, CCTV cameras equipped in outdoor public space of urban area are used as a fundamental sensor for traffic management, crime prevention or hazard monitoring. For safety guarantee in urban environment and disaster prevention, a surveillance system integrating pre-constructed 3 dimensional spatial information with CCTV data or video sequence is needed for monitoring and observing emergent situation interactively in real time. In this study, we proposed applicability of the prototype system for web visualization based on X3D, an international standard of real time web visualization, by integrating 3 dimensional spatial information with video sequence.

  • PDF

Genetic Algorithm Based Routing Method for Efficient Data Transmission for Reliable Data Transmission in Sensor Networks (센서 네트워크에서 데이터 전송 보장을 위한 유전자 알고리즘 기반의 라우팅 방법)

  • Kim, Jin-Myoung;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.49-56
    • /
    • 2007
  • There are many application areas of wireless sensor networks, such as combat field surveillance, terrorist tracking and highway traffic monitoring. These applications collect sensed data from sensor nodes to monitor events in the territory of interest. One of the important issues in these applications is the existence of the radio-jamming zone between source nodes and the base station. Depending on the routing protocol the transmission of the sensed data may not be delivered to the base station. To solve this problem we propose a genetic algorithm based routing method for reliable transmission while considering the balanced energy depletion of the sensor nodes. The genetic algorithm finds an efficient routing path by considering the radio-jamming zone, energy consumption needed fur data transmission and average remaining energy level. The fitness function employed in genetic algorithm is implemented by applying the fuzzy logic. In simulation, our proposed method is compared with LEACH and Hierarchical PEGASIS. The simulation results show that the proposed method is efficient in both the energy consumption and success ratio of delivery.

  • PDF

The New Recreational Transportation on the Street: Personal Mobility, Is It Safe?

  • Kim, Young Woo;Park, Won Bin;Cho, Jin Seong;Hyun, Sung Youl;Lee, Geun
    • Journal of Trauma and Injury
    • /
    • v.31 no.3
    • /
    • pp.125-134
    • /
    • 2018
  • Purpose: The interest in the personal mobility started to grow and as the interest increases, there are growing concerns about the safety of it. The purpose of the study is to look at the types and dynamics of patients injured by the personal mobilities. Methods: This was a retrospective 2-year observational study, from January 2016 to December 2017, on the patients who visited the emergency center and the trauma center, with an injury related to driving the personal mobility. Cases of the personal mobility-related accident were collected based on electronic medical records and hospital emergency department-based injury in-depth surveillance data. Results: A total of 65 patients visited the emergency center and the trauma center, during this study period. Six patients of 50 adults admitted the alcohol consumption (12%) and two adult patients wore the helmet as the protection gear (3.1%). The number of the patients in 2017 rises three times more than the number of patients in 2016 (51 vs. 14). Injuries to the head and neck region (67.7%) was the most common, followed by the upper extremity (46.2%). Eleven patients (16.9%) were admitted to the hospital, of whom three were admitted to the intensive care unit due to intracranial hemorrhage. Nine patients underwent surgery. Conclusions: The use of the personal mobility will continue to grow and the accidents, caused by the vehicle, will increase along with it. The study showed the damage is worse than expected. Personal mobility currently has a limited safety laws and the riders are not yet fully aware of its danger. The improvement of the regulation of the personal mobility, safety education is needed.

Low-cost privacy protection integrated monitoring system using interest emphasis method (관심강조 방법을 활용한 저비용 사생활보호 통합관제시스템)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.234-239
    • /
    • 2021
  • Recently, as the installation of a large number of high-performance CCTVs for crime prevention and traffic control has increased rapidly, the problem of increasing system requirements for response to privacy infringement factors and analysis of high-definition image information transmitted from multiple cameras has been actively emerging. Accordingly, there is a need for a method for responding to privacy infringement and a method for efficiently processing surveillance images input from multiple cameras. In this paper, in order to reduce the processing cost of the input image and improve the processing speed, an integrated image is generated by grouping images input from a plurality of cameras. After analyzing the pre-generated integrated video, it detects a preset privacy event or an event that highlights interest. Depending on whether or not an event is detected, you will perform an editing operation corresponding to the event.