• Title/Summary/Keyword: automatic identification

Search Result 649, Processing Time 0.021 seconds

Study of Korean Symptom Expression in 119 Emergency Calls (119 구급 신고 전화의 한국어 증상 표현 연구)

  • Jang, Yoonhee;Kang, Kyunghee;Jang, Kyungho;Kim, Kyeonghae
    • Fire Science and Engineering
    • /
    • v.30 no.4
    • /
    • pp.135-140
    • /
    • 2016
  • To help emergency medical dispatchers receive rapid and accurate identification and corrective action status determination of an emergency call, and to support the automatic processing of a voice recognition system to the Korean emergency medical dispatch system, emergency call records were analyzed. Furthermore, a list of Korean symptoms expression were produced and the characteristics of the symptoms that appear on the actual wording of the telephone records were identified. This language list and its characteristics will be useful for training emergency medical dispatchers.

Fish-eye camera calibration and artificial landmarks detection for the self-charging of a mobile robot (이동로봇의 자동충전을 위한 어안렌즈 카메라의 보정 및 인공표지의 검출)

  • Kwon, Oh-Sang
    • Journal of Sensor Science and Technology
    • /
    • v.14 no.4
    • /
    • pp.278-285
    • /
    • 2005
  • This paper describes techniques of camera calibration and artificial landmarks detection for the automatic charging of a mobile robot, equipped with a fish-eye camera in the direction of its operation for movement or surveillance purposes. For its identification from the surrounding environments, three landmarks employed with infrared LEDs, were installed at the charging station. When the robot reaches a certain point, a signal is sent to the LEDs for activation, which allows the robot to easily detect the landmarks using its vision camera. To eliminate the effects of the outside light interference during the process, a difference image was generated by comparing the two images taken when the LEDs are on and off respectively. A fish-eye lens was used for the vision camera of the robot but the wide-angle lens resulted in a significant image distortion. The radial lens distortion was corrected after linear perspective projection transformation based on the pin-hole model. In the experiment, the designed system showed sensing accuracy of ${\pm}10$ mm in position and ${\pm}1^{\circ}$ in orientation at the distance of 550 mm.

Utilization of Planned Routes and Dead Reckoning Positions to Improve Situation Awareness at Sea

  • Kim, Joo-Sung;Jeong, Jung Sik;Park, Gyei-Kark
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.288-294
    • /
    • 2014
  • Understanding a ship's present position has been one of the most important tasks during a ship's voyage, in both ancient and modern times. Particularly, a ship's dead reckoning (DR) has been used for predicting traffic situations and collision avoidance actions. However, the current system that uses the traditional method of calculating DR employs the received position and speed data only. Therefore, it is not applicable for predicting navigation within the harbor limits, owing to the frequent changes in the ship's course and speed in this region. In this study, planned routes were applied for improving the reliability of the proposed system and predicting the traffic patterns in advance. The proposed method of determining the dead reckoning position (DRP) uses not only the ships' received data but also the navigational patterns and tracking data in harbor limits. The Mercator sailing formulas were used for calculating the ships' DRPs and planned routes. The data on the traffic patterns were collected from the automatic identification system and analyzed using MATLAB. Two randomly chosen ships were analyzed for simulating their tracks and comparing the DR method during the timeframes of the ships' movement. The proposed method of calculating DR, combined with the information on planned routes and DRPs, is expected to contribute towards improving the decision-making abilities of operators.

Automatic Identification of Fiducial Marks Existing on Aerial Photographs (항공사진에 포함된 사진 지표의 자동 인식)

  • Cho, Seong-Ik;Bang, Ki-In;Kim, Kyung-Ok
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.10 no.3 s.21
    • /
    • pp.79-87
    • /
    • 2002
  • This paper proposes an approach of automatically identifying the center of fiducial marks using radiometric and geometric characteristics of those marks existing on aerial photographs. Candidate region surrounding a mark, based on radiometric strategy, is determined by producing a bi-level image and by applying morphological operations. Based on geometric strategy, the central location of a mark is determined by applying ${\bigtriangledown}^G$ filtering and symmetry-enhancement filtering, and by finding peak location of symmetry. Evaluation with respect to 66 cases of sub-images containing a fiducial mark showed that the central location of the mark is determined up to around one pixel difference whit it is compared to a manual inspection.

  • PDF

Automatic Video Genre Identification Method in MPEG compressed domain

  • Kim, Tae-Hee;Lee, Woong-Hee;Jeong, Dong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1527-1530
    • /
    • 2002
  • Video summary is one of the tools which can provide the fast and effective browsing fur a lengthy video. Video summary consists of many key-frames that could be defined differently depending on the video genre it belongs to. Consequently, the video summary constructed by the uniform manner might lead into inadequate result. Therefore, identifying the video genre is the important first step in generating the meaningful video summary. We propose a new method that can classify the genre of the video data in MPEG compressed bit-stream domain. Since the proposed method operates directly on the com- pressed bit-stream without decoding the frame, it has merits such as simple calculation and short processing time. In the proposed method, only the visual information is utilized through the spatial-temporal analysis to classify the video genre. Experiments are done for 6 genres of video: Cartoon, Commercial, Music Video, News, Sports, and Talk Show. Experimental result shows more than 90% of accuracy in genre classification for the well-structured video data such as Talk Show and Sports.

  • PDF

A Study on the Relation of BMI to Lipid Metabolism and Health Promoting Behavior in Middle-Aged Women (중년여성의 비만도와 지질대사 및 건강증진행위와의 관계 연구)

  • Lee, Kun-Ja;Chang, Chun-Ja;Yoo, Jae-Hee
    • Research in Community and Public Health Nursing
    • /
    • v.16 no.4
    • /
    • pp.488-497
    • /
    • 2005
  • Purpose: This study examined the relation of BMI to lipid metabolism and health promoting behavior in middle-aged women. Methods: The subjects were 113 women between 40 to 60 years of age. The data was collected from April 2003 to July 2004. BMI was measured using body composition analyzer and lipid metabolism were measured using automatic biochemical analyzer. Health promoting behavior was collected using a structured questionnaire. The SPSSWIN(10.0 version) program was used to analyze the data and get the descriptive statistics and Pearson's correlation coefficients. Results: BMI was negatively correlated with HDL-c and positively correlated with triglyceride, but there was no significance between BMI and total cholesterol. There was no significance of correlation between BMI and total health-promoting behavior. Conclusion: This study showed that BMI is meaningful in the identification of the high risk women to prevent HDL-c & triglyceride metabolism disturbance, but additional research is needed to study the correlation between BMI and health promoting behaviors in middle-aged women.

  • PDF

A Study on Near-miss Incidents from Maritime Traffic Flow by Clustering Vessel Positions (선박위치 클러스터링을 활용한 해상교통 근접사고 산출에 관한 연구)

  • Kim, Kwang-Il;Jeong, Jung Sik;Park, Gyei-Kark
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.6
    • /
    • pp.603-608
    • /
    • 2014
  • In the maritime traffic environment, the near-miss between vessels is the situation approaching on collision course but collision accident is not occurred. In this study, in order to calculate the near-miss between navigating vessels, the discriminating equation using ship bumper theory and vessel position clustering methods are proposed. Applying proposed module to the vessel trajectories of the WANDO waterway, we assessment navigational risk factors of vessel type, navigational speed, meeting situation.

Design and experiment of the protocol using ASM2.0 : focusing on marine officers' mandatory reporting items (차세대 해상디지털통신기술 ASM2.0을 이용한 프로토콜 설계 및 실험 : 항해사의 의무보고 사항을 중심으로)

  • Kim, Kilyong;Kim, Do-yeon;Lee, Seojeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.43-44
    • /
    • 2015
  • AIS-ASM is a one of the study to provide a variety of maritime safety information as well as ship's position and navigational information that is their own function since 2004. This study aims to reduce the marine officer's workload through automating marine officer's mandatory reporting items using the one of the next maritime digital communication technology (ASM2.0). For this purpose, we designed and experimented of the ASM2.0 protocol through analyzing a domestic regulation about passenger flight and AIS-ASM message.

  • PDF

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

A Study on the Current State and Improvement of the AIS (AIS 시스템의 현황과 개선 방안에 관한 연구)

  • Park Gyei-Kark;Jung Jae-Yong;Lee Ju-Whan;Seo Ki-Yeol
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.05a
    • /
    • pp.209-213
    • /
    • 2005
  • The current AIS network and. system are run on a full scale with 22 ground stations and. 11 operational systems, completing a nation-wide, integrated network However, currently it needs to manage sea traffic by linking AIS to VIS which 1vs a limited service area due to restricted radar detection zones in harbors or coastal areas. Accordingly this study analyzes the current status of the AIS system and. proposes technological and. operational improvement plan of the current AIS system through investigating the actual conditions of the AIS system and. its operations.

  • PDF