• Title/Summary/Keyword: home surveillance

Search Result 64, Processing Time 0.028 seconds

Analysis of Clinical Nursing Activities Using Home Hospice Nursing Intervention Standards (가정호스피스 간호중재 표준서에 의한 임상간호활동 분석)

  • Yong, Jin-Sun
    • Korean Journal of Adult Nursing
    • /
    • v.20 no.6
    • /
    • pp.960-972
    • /
    • 2008
  • Purpose: The purpose of this study was to validate the nursing intervention standards of home care to home care setting for a guide in giving quality care to home hospice patients. Methods: The developed nursing standards were applied to 79 home hospice patients at K hospital, C university. Data were collected through the developed nursing intervention standards of home care with 19 selected nursing interventions and 418 associated nursing activities from January to June in 2006. Results: The performance frequency was 509 times for total nursing interventions and 7,815 times for total associated nursing activities. The most frequently used nursing activity was 722 times(9.24%) on teaching prescribed medication, followed by surveillance(718 times, 9.18%), and vital signs & neurologic monitoring nursing intervention(701 times, 8.97%). The highest mean nursing activity performance rate showed on Intravenous therapy(82%), followed by dying care(81%), and vital signs & neurologic monitoring (80%). Among 418 nursing activities, there were three classifications: 168 as core activities, 165 as major, and 85 as accessory activities. Conclusion: The final validated nursing intervention standards can guide home care nurses to perform quality care and contribute to computerized nursing services and request of nursing fees.

  • PDF

Skin Color Based Hand and Finger Detection for Gesture Recognition in CCTV Surveillance (CCTV 관제에서 동작 인식을 위한 색상 기반 손과 손가락 탐지)

  • Kang, Sung-Kwan;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.10
    • /
    • pp.1-10
    • /
    • 2011
  • In this paper, we proposed the skin color based hand and finger detection technology for the gesture recognition in CCTV surveillance. The aim of this paper is to present the methodology for hand detection and propose the finger detection method. The detected hand and finger can be used to implement the non-contact mouse. This technology can be used to control the home devices such as home-theater and television. Skin color is used to segment the hand region from background and contour is extracted from the segmented hand. Analysis of contour gives us the location of finger tip in the hand. After detecting the location of the fingertip, this system tracks the fingertip by using only R channel alone, and in recognition of hand motions to apply differential image, such as the removal of useless image shows a robust side. We explain about experiment which relates in fingertip tracking and finger gestures recognition, and experiment result shows the accuracy above 96%.

A Study on u-CCTV Fire Prevention System Development of System and Fire Judgement (u-CCTV 화재 감시 시스템 개발을 위한 시스템 및 화재 판별 기술 연구)

  • Kim, Young-Hyuk;Lim, Il-Kwon;Li, Qigui;Park, So-A;Kim, Myung-Jin;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.463-466
    • /
    • 2010
  • In this paper, CCTV based fire surveillance system should aim to development. Advantages and Disadvantages analyzed of Existing sensor-based fire surveillance system and video-based fire surveillance system. To national support U-City, U-Home, U-Campus, etc, spread the ubiquitous environment appropriate to fire surveillance system model and a fire judgement technology. For this study, Microsoft LifeCam VX-1000 using through the capturing images and analyzed for apple and tomato, Finally we used H.264. The client uses the Linux OS with ARM9 S3C2440 board was manufactured, the client's role is passed to the server to processed capturing image. Client and the server is basically a 1:1 video communications. So to multiple receive to video multicast support will be a specification. Is fire surveillance system designed for multiple video communication. Video data from the RGB format to YUV format and transfer and fire detection for Y value. Y value is know movement data. The red color of the fire is determined to detect and calculate the value of Y at the fire continues to detect the movement of flame.

  • PDF

Students injuries and Injury Surveillance System in Cheonan (손상감시체계를 통한 천안지역 초․중․고교생의 손상실태 분석)

  • Kang, Chang-Hyun;Kang, Hyun-A;Park, Jee-Hyun
    • Journal of the Korean Society of School Health
    • /
    • v.22 no.2
    • /
    • pp.157-167
    • /
    • 2009
  • Purpose : The purpose of this study is to explore the students injuries by analyzing the data which has been inputted by the emergency center of the cooperated hospitals and the 119 rescue party through the injury surveillance system in Cheonan city. Method : Students were divided into the elementary, middle, high school students with the 776 cases of children and teenagers(7-19years old) of injury surveillance system in Cheonan area from january to june in 2009. Frequency analysis and $x^2$-test was done to recognize the features of students injuries among the groups. The program to be used for the statistical analysis is SPSS 17.0. Result : Out of the injury incidence rate, the elementary school students(52.1%) are first, the high school students (24.9%) are second, the middle school students appear to be 23.1%. Male is about two times higher than female by 66.6% in the injury incidence. In terms of the injury mechanism, the injury(22.2%) by hit is the first, the traffic accident(21.5%) is the second, the slippery(16.8%) is followed. The injuries were occurred most largely at 16:00-20:00(33.4%), and the 33.6% of injury by daily leisure activity occurs at 16:00-20:00 chiefly. Conclusion : Analysis using the data of the injury surveillance system has some advantages compared to the previous research such as reliability and specification. To prevent the students injuries, not the individual problem but the social dimension should be acknowledged so that we can secure and promote the safety from the risk. Therefore, we must organize the role assignment and the cooperative network in the school, home and community.

Design and Application of a LonRF Device based Sensor Network for an Ubiquitous Home Network (유비쿼터스 홈네트워크를 위한 LonRF 디바이스 기반의 센서 네트워크 설계 및 응용)

  • Ro Kwang-Hyun;Lee Byung-Bog;Park Ae-Soon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.3
    • /
    • pp.87-94
    • /
    • 2006
  • For realizing an ubiquitous home network(uHome-net), various sensors should be able to be connected to an integrated wire/wireless sensor network. This paper describes an application case of applying LonWorks technology being widely used in control network to wire/wireless sensor network in uHome-net and the design and application of LonRF device that consists of a neuron chip including LonTalk protocol, a 433.92MHz RF transceiver, a sensor, and application programs. As an application example of the LonRF device, the LonRF smart badge that can measure the 3D location of objects in indoor environment and interwork with the uHome-net was developed. LonRF device based home network services were realized on the uHome-net testbed such as indoor positioning service, remote surveillance service and remote metering service were realized. This research shows that LonWorks technology based sensor network could be applicable to the control network in an ubiquitous home network and the LonRF device can be used as a wireless node in various sensor networks.

  • PDF

Implementation of network-based video surveillance system (영상을 이용한 네트워크 기반 감시 시스템 구현)

  • Lee, Ji-Hoon;Kim, Sun-Hyeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.510-512
    • /
    • 2015
  • Recently, people fear is growing because of the various crimes that may occur when you go out. The growing is interest in security systems for the protection of an individual's property. In this paper, to establish a single central server based on the home network when intruders access to city, such as image processing values obtained through the IP camera and distance values disciplined use an ultrasonic sensor the user for an attacker city that will connect to the server the surveillance system provides the information that is received and implemented.

  • PDF

Danger Alert Surveillance Camera Service using AI Image Recognition technology (인공지능 이미지 인식 기술을 활용한 위험 알림 CCTV 서비스)

  • Lee, Ha-Rin;Kim, Yoo-Jin;Lee, Min-Ah;Moon, Jae-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.814-817
    • /
    • 2020
  • The number of single-person households is increasing every year, and there are also high concerns about the crime and safety of single-person households. In particular, crimes targeting women are increasing. Although home surveillance camera applications, which are mostly used by single-person households, only provide intrusion detection functions, this service utilizes AI image recognition technologies such as face recognition and object detection to provide theft, violence, stranger and intrusion detection. Users can receive security-related notifications, relieve their anxiety, and prevent crimes through this service.

Outcome of the Gynecologic Oncology Patients Surveillance Network Program

  • Suprasert, Prapaporn;Suwansirikul, Songkiat;Charoenkwan, Kittipat;Cheewakriangkrai, Chalong;Suwansirikul, Songkiat
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.12
    • /
    • pp.4901-4903
    • /
    • 2015
  • The gynecologic oncology patients surveillance network program was conducted with the collaboration of 5 provincial hospitals located in the north of Thailand (Chiang Rai, Lamphun Nan, Phayao and Phrae). The aim was to identify ways of reducing the burden and the cost to the gynecologic cancer patients who needed to travel to the tertiary care hospital for follow up. The clinical data of each patient was transferred to the provincial hospital by the internet via the website www.gogcmu.or.th. All the general gynecologists who participated in this project attended the training course set up for the program. From January 2011 to February 2014, 854 patients who were willing to have their next follow-up at the network hospitals close to their home were enrolled this project. Almost of them were residents in Chiang Rai province and the most common disease was cervical cancer. After the project had been running for 1 year, 604 of the enrolled patients and 21 health-care personnel who had participated in this project were interviewed to assess its success. Some 85.3% of the patients and 100% of the health-care personnel were satisfied with this project. However, 60 patients had withdrawn, the most common reason being the lack of confidence in the follow up at the local provincial hospital. In conclusion, it is possible to initiate a gynecologic oncology patients' surveillance network program and the initiation could reduce the problems associated with and the cost the patients incurred as they journeyed to the tertiary care hospital.

Status of Illegal Hazardous Information for Chemical on Internet - Monitoring Cases of Chemical Cyber Surveillance - (인터넷 상 화학물질 불법 유해정보 현황 고찰 - 화학물질 사이버감시단 신고 사례를 중심으로 -)

  • Hwang, Man Sik;Im, Ji Young;Jeon, Da Young;Song, Ki Bong;Lee, Sang Mok;Ryu, Ji Sung;Lee, Ji Ho
    • Korean Journal of Hazardous Materials
    • /
    • v.6 no.2
    • /
    • pp.13-22
    • /
    • 2018
  • Recently, social crimes using chemicals at home and abroad are increasing. These chemicals are readily available in the internet. Therefore, the NICS(national institute of chemical safety) runs a 'Chemical Cyber Surveillance' to help the public take control of the internet and create a healthy cyberspace through voluntary participation of the public. The study analyzed more than 1,000 sites suspected illegal hazardous information or blocked among cyber surveillance 3,500 case reports in the past yeas. And, the number of illegal hazardous information reported in the past three years is analyzed by type and substance. They want to examine the characteristics of hazardous chemical information on the internet and use it as a basic data to establish illegal information management measures that spread over cyberspace.

Moving Object Edge Extraction from Sequence Image Based on the Structured Edge Matching (구조화된 에지정합을 통한 영상 열에서의 이동물체 에지검출)

  • 안기옥;채옥삼
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.425-428
    • /
    • 2003
  • Recently, the IDS(Intrusion Detection System) using a video camera is an important part of the home security systems which start gaining popularity. However, the video intruder detection has not been widely used in the home surveillance systems due to its unreliable performance in the environment with abrupt illumination change. In this paper, we propose an effective moving edge extraction algorithm from a sequence image. The proposed algorithm extracts edge segments from current image and eliminates the background edge segments by matching them with reference edge list, which is updated at every frame, to find the moving edge segments. The test results show that it can detect the contour of moving object in the noisy environment with abrupt illumination change.

  • PDF