• Title/Summary/Keyword: building violation detection

Search Result 3, Processing Time 0.019 seconds

TOWARDS A SPATIAL FRAMEWORK FOR SUPPORTING BUILDING CONSTRUCTION INSPECTION

  • Saud Aboshiqah;Bert Veenendaal;Robert Corner
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.558-565
    • /
    • 2013
  • The process and efficiency of monitoring building and construction violations is a concern of the construction industry. The detection of violations requires appropriate and sufficiently accurate spatial information to manage and support a comprehensive inspection process and monitor compliance. A building inspection workflow must extract appropriate spatial and measurement in-formation from a variety of sources, identify potential violations across a range of compliance criteria and determine the quality of resulting inspection reports. This paper presents a framework for supporting building inspections using spatial information and methods to detect construction violations and compliance. Current inspection processes involve issues around the identification of building violations, access to building regulations and existing spatial information, integration of a range of spatial and non-spatial information, and the quality of decisions within the inspection workflows. A survey of building inspectors was conducted and used together with the issues identified to establish the requirements for a spatial inspection framework. The results demonstrate how such a framework can support improved decision-making and reduced fieldwork effort in detecting and measuring the accuracy of building violations involving building placements, street offsets and footprint areas.

  • PDF

A Study on the Effective Countermeasures for Preventing Computer Security Incidents (기업의 침해사고 예방을 위한 관리 모델)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.107-115
    • /
    • 2012
  • The level of information protection is relatively low, in comparison with the informatisation in this country. The budget for information protection is also quite marginal at 5% of the entire information-related policy budget. The passive information protection practices by companies, which focus more on the aftermaths, lead to repeated expenses for risk management. The responses to the violation of information protection should be changed from the current aftermaths-oriented focus to prevention and early detection of possible violations. We should also realize that the response to a violation of protected information is not a responsibility of an individual but a joint responsibility of the nation and the industry. South Korea has been working towards to building a systematic foundation since 2004 when guidelines were announced regarding the information protection policy and the safety diagnosis. The current level of safety policies cannot provide a perfect protection against actual violation cases in administrative, technological and physical ways. This research evaluates the level of prevention that the current systematic protection policy offers, and discusses its limitation and possible ways for improvement. It also recommends a list effective measures for protection against information violation that companies can employ to maintain the actual target safety level.

Development of Mask-RCNN Based Axle Control Violation Detection Method for Enforcement on Overload Trucks (과적 화물차 단속을 위한 Mask-RCNN기반 축조작 검지 기술 개발)

  • Park, Hyun suk;Cho, Yong sung;Kim, Young Nam;Kim, Jin pyung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.5
    • /
    • pp.57-66
    • /
    • 2022
  • The Road Management Administration is cracking down on overloaded vehicles by installing low-speed or high-speed WIMs at toll gates and main lines on expressways. However, in recent years, the act of intelligently evading the overloaded-vehicle control system of the Road Management Administration by illegally manipulating the variable axle of an overloaded truck is increasing. In this manipulation, when entering the overloaded-vehicle checkpoint, all axles of the vehicle are lowered to pass normally, and when driving on the main road, the variable axle of the vehicle is illegally lifted with the axle load exceeding 10 tons alarmingly. Therefore, this study developed a technology to detect the state of the variable axle of a truck driving on the road using roadside camera images. In particular, this technology formed the basis for cracking down on overloaded vehicles by lifting the variable axle after entering the checkpoint and linking the vehicle with the account information of the checkpoint. Fundamentally, in this study, the tires of the vehicle were recognized using the Mask RCNN algorithm, the recognized tires were virtually arranged before and after the checkpoint, and the height difference of the vehicle was measured from the arrangement to determine whether the variable axle was lifted after the vehicle left the checkpoint.