• Title/Summary/Keyword: Video Identification

Search Result 174, Processing Time 0.023 seconds

The study for image recognition of unpaved road direction for endurance test vehicles using artificial neural network (내구시험의 무인 주행화를 위한 비포장 주행 환경 자동 인식에 관한 연구)

  • Lee, Sang Ho;Lee, Jeong Hwan;Goo, Sang Hwa
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.1 no.2
    • /
    • pp.26-33
    • /
    • 2005
  • In this paper, an algorithm is presented to recognize road based on unpaved test courses image. The road images obtained by a video camera undergoes a pre-processing that includes filtering, gray level slicing, masking and identification of unpaved test courses. After this pre-processing, a part of image is grouped into 27 sub-windows and fed into a three-layer feed-forward neural network. The neural network is trained to indicate the road direction. The proposed algorithm has been tested with the images different from the training images, and demonstrated its efficacy for recognizing unpaved road. Based on the test results, it can be said that the algorithm successfully combines the traditional image processing and the neural network principles towards a simpler and more efficient driver warning or assistance system.

  • PDF

Streaming RFID: Robust Stream Transmission over Passive RFID

  • Hwang, Seok-Joong;Han, Young-Sun;Kim, Seon-Wook;Kim, Jong-Ok
    • ETRI Journal
    • /
    • v.33 no.3
    • /
    • pp.382-392
    • /
    • 2011
  • This paper proposes the streaming radio frequency identification (RFID) protocol to support robust data streaming in a passive communication, which is extended from the ISO18000-6 Type C RFID standard. By observing and modeling the unique bit error behavior through detailed analysis in this paper, we found that performance is significantly limited by inaccurate and unstable link frequencies as well as low SNR which are inevitable for passive devices. Based on the analysis, we propose a simple and efficient protocol to adaptively insert extra error control sequences in a packet for tolerating tough link condition while maximizing the throughput and preserving the minimal implementation cost. To evaluate effectiveness of our proposal in real-time streaming applications, we experimented on real-time H.264 video streaming and prototyped the system on FPGA. To our best knowledge, our paper is the first work to take analytical approach for maximizing the throughput and demonstrate the possibility of the realtime multimedia streaming transmission in the passive RFID system.

Analysis of the Problems related to the Cumulative Trauma Disorders at Manufacturing Workplace and Development of a Risk Factor Checklist (제조업에서 발생하는 누적외상성질환 관련 문제점 분석 및 위험요인 점검표의 개발)

  • Park, Hee-Sok;Lee, Yun-Geun;Yim, Sang-Hyuk
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.24 no.4
    • /
    • pp.503-517
    • /
    • 1998
  • Cumulative trauma disorders(CTDs) of the upper extremities among the workers at manufacturing workplace have become a serious problem in Korea. However, most of the studies on the CTDs carried out in this country have focused on the Video Display Terminal(VDT) operators. In fact, high rates of the CTDs have been reported for telecommunication employees, and the CTDs associated with VDT use in telecommunication industries pose great health and social problems in Korea today. On the other hand, there are few studies on the CTDs among the manufacturing workers, and the severity of the problem was much under-reported. This study reports and discusses the results of the literature review on the cross-sectional studies of the CTDs, along with the analysis of the problems associated with identification, medical examinations, and ergonomic evaluation of the disorders. Also a checklist was developed for the use of quick screening tool for risk factor analysis. Consistency of the checklist was validated with the field studies of several manufacturing workplace. Current issues and suggestions for future ergonomic studies are also addressed.

  • PDF

The Design of Remote Monitoring and Warning System for Dangerous Chemicals Based on CPS

  • Kan, Zhe;Wang, Xiaolei
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.632-644
    • /
    • 2019
  • The remote monitoring and warning system for dangerous chemicals is designed with the concept of the Cyber-Physical System (CPS) in this paper. The real-time perception, dynamic control, and information service of major hazards chemicals are realized in this CPS system. The CPS system architecture, the physical layer and the applacation layer, are designed in this paper. The terminal node is mainly composed of the field collectors which complete the data acquisition of sensors and video in the physical layers, and the use of application layer makes CPS system safer and more reliable to monitor the hazardous chemicals. The cloud application layer completes the risk identification and the prediction of the major hazard sources. The early intelligent warning of the major dangerous chemicals is realized and the security risk images are given in the cloud application layer. With the CPS technology, the remote network of hazardous chemicals has been completed, and a major hazard monitoring and accident warning online system is formed. Through the experiment of the terminal node, it can be proved that the terminal node can complete the mass data collection and classify. With this experiment it can be obtained the CPS system is safe and effective. In order to verify feasible, the multi-risk warning based on CPS is simulated, and results show that the system solves the problem of hazardous chemicals enterprises safety management.

Design of an efficient learning-based face detection system (학습기반 효율적인 얼굴 검출 시스템 설계)

  • Kim Hyunsik;Kim Wantae;Park Byungjoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.213-220
    • /
    • 2023
  • Face recognition is a very important process in video monitoring and is a type of biometric technology. It is mainly used for identification and security purposes, such as ID cards, licenses, and passports. The recognition process has many variables and is complex, so development has been slow. In this paper, we proposed a face recognition method using CNN, which has been re-examined due to the recent development of computers and algorithms, and compared with the feature comparison method, which is an existing face recognition algorithm, to verify performance. The proposed face search method is divided into a face region extraction step and a learning step. For learning, face images were standardized to 50×50 pixels, and learning was conducted while minimizing unnecessary nodes. In this paper, convolution and polling-based techniques, which are one of the deep learning technologies, were used for learning, and 1,000 face images were randomly selected from among 7,000 images of Caltech, and as a result of inspection, the final recognition rate was 98%.

A Study on Speechreading about the Korean 8 Vowels (감성인식을 위한 이텐의 색채 조화 식별)

  • Shin, Seong-Yoon;Choi, Byung-Seok;Rhee, Yang-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.93-99
    • /
    • 2009
  • The color harmony in video was no way to know for giving pleasure. By identifying these color harmony, it gives order, clarity, similarity, contrast, etc. Therefore, to identify the color balance is very important. Color Harmony identify the color is whether the harmony by color harmony theory of Munsell, Ostwald, Firren, Moon & Spenser, Itten, Chevreul, and Judd etc. One of these methods, we identify color harmonies of 2 colors, 3 colors, 4 colors, 5 colors and 6 colors using Itten's color balance. Identification is using by Canny edge extraction, labeling and clustering, and color extraction and harmony etc. By identifying this color harmonies, we have laid the foundation of emotional database construction and emotional recognition.

Feasibility of Applying Mixed-Reality to Enhancing Safety Risk Communication in Construction Workplaces

  • Olorunfemi, Abiodun;Dai, Fei;Peng, Weibing
    • International conference on construction engineering and project management
    • /
    • 2017.10a
    • /
    • pp.225-234
    • /
    • 2017
  • Mixed-reality technologies have proven to be valuable in many architecture, engineering and construction / facilities management (AEC/FM) applications. However, its potential of being adapted to facilitate hazard identification and risk communication in construction workplaces has yet to be fully explored. This paper makes an attempt to evaluate the feasibility of applying mixed-reality to enhancing safety risk communication in construction workplaces. Experiments have been designed in which Microsoft HoloLens® together with a developed application will be used to intervene in the practice of jobsite risk communication. A cross-sectional survey will then be followed to examine the effectiveness and acceptability of this technology through analysis on data collected from participants in the construction industry. The preliminary results show that this emerging HoloLens® technology, compared to the traditional communication methods (i.e., phone calls, walking up people and talk, and video conferencing), facilitates accurate, prompt safety communication on construction sites. Such findings signify the potential of applying mixed-reality to safety performance enhancement in the construction industry.

  • PDF

Motion-Based User Authentication for Enhanced Metaverse Security (메타버스 보안 강화를 위한 동작 기반 사용자 인증)

  • Seonggyu Park;Gwonsang Ryu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.493-503
    • /
    • 2024
  • This paper addresses the issue of continuous user authentication within the metaverse environment. Recently, the metaverse plays a vital role in personal interaction, entertainment, education, and business, bringing forth significant security concerns. Particularly, vulnerabilities related to user identity verification have emerged as a major issue. This research proposes a novel method to verify identities by analyzing users' character movements in the metaverse through a pose estimation model. This method uses only video data for authentication, allowing flexibility in limited environments, and investigates how character movements contribute to user identification through various experiments. Furthermore, it explores the potential for extending this approach to other digital platforms. This research is expected to significantly contribute to enhancing security and innovating user identity verification methods in the metaverse environment.

A Case Study of Automation Management System of Damaged Container in the Port Gate (항만 게이트의 데미지 컨테이너 관리 자동화 시스템 구축 사례연구)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.41 no.3
    • /
    • pp.119-126
    • /
    • 2017
  • As container vessels get larger, container terminals are also likely to grow. The problem that arises is that the growing volume should be handled in the same amount of time as before. Container terminals are introducing an automation system in order to overcome the limitations of existing manual methods and to continuously reduce operating expenses. Because, Manual handling of carrying containers gate in and out of terminals causes inaccurate data, which results in confusion. An alternative is for containers to be labeled with barcodes that can be scanned into a system with a scanner, but this takes quite a long time and is inconvenient. A RFID system, also known as a gate automation system, can solve these problems by reducing the time of gate management with a technology that detects number identification plates, helping operators more efficiently perform gate management work. Having said that, with this system, when container damage is detected, gate operators make and keep documents manually. These documents, which are insufficient evidence in proving container damage, result in customer claims. In addition, it is difficult for gate operators and other workers to manage containers, exposing them to danger and accidents. This study suggests that if an automation system is introduced at gates, containers can be managed by a video storage system in order to better document damage The video system maintains information on container damage, allowing operators the ability to search for videos they need upon customer request, also allowing them to be better prepared for customer claims. In addition, this system reduces necessary personnel and risk of accidents near gates by integrating a wide range of work.

MPEG-21 Terminal (MPEG-21 터미널)

  • 손유미;박성준;김문철;김종남;박근수
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.410-426
    • /
    • 2003
  • MPEG-21 defines a digital item as an atomic unit lot creation, delivery and consumption in order to provide an integrated multimedia framework in networked environments. It is expected that MPEG-21 standardization makes it Possible for users to universally access user's preferred contents in their own way they want. In order to achieve this goal, MPEG-21 has standardized the specifications for the Digital Item Declaration (DID). Digital Identification (DII), Rights Expression Language (REL), Right Data Dictionary (RDD) and Digital Item Adaptation (DIA), and is standardizing the specifications for the Digital Item Processing (DIP), Persistent Association Technology (PAT) and Intellectual Property Management and Protection (IPMP) tot transparent and secured usage of multimedia. In this paper, we design an MPEG-21 terminal architecture based one the MPEG-21 standard with DID, DIA and DIP, and implement with the MPEG-21 terminal. We make a video summarization service scenario in order to validate ow proposed MPEG-21 terminal for the feasibility to of DID, DIA and DIP. Then we present a series of experimental results that digital items are processed as a specific form after adaptation fit for the characteristics of MPEG-21 terminal and are consumed with interoperability based on a PC and a PDA platform. It is believed that this paper has n important significance in the sense that we, for the first time, implement an MPEG-21 terminal which allows for a video summarization service application in an interoperable way for digital item adaptation and processing nth experimental results.