• Title/Summary/Keyword: intelligent surveillance system

Search Result 233, Processing Time 0.022 seconds

Queue Detection using Fuzzy-Based Neural Network Model (퍼지기반 신경망모형을 이용한 대기행렬 검지)

  • KIM, Daehyon
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.2
    • /
    • pp.63-70
    • /
    • 2003
  • Real-time information on vehicle queue at intersections is essential for optimal traffic signal control, which is substantial part of Intelligent Transport Systems (ITS). Computer vision is also potentially an important element in the foundation of integrated traffic surveillance and control systems. The objective of this research is to propose a method for detecting an exact queue lengths at signalized intersections using image processing techniques and a neural network model Fuzzy ARTMAP, which is a supervised and self-organizing system and claimed to be more powerful than many expert systems, genetic algorithms. and other neural network models like Backpropagation, is used for recognizing different patterns that come from complicated real scenes of a car park. The experiments have been done with the traffic scene images at intersections and the results show that the method proposed in the paper could be efficient for the noise, shadow, partial occlusion and perspective problems which are inevitable in the real world images.

Fusion algorithm for Integrated Face and Gait Identification (얼굴과 발걸음을 결합한 인식)

  • Nizami, Imran Fareed;An, Sung-Je;Hong, Sung-Jun;Lee, Hee-Sung;Kim, Eun-Tai;Park, Mig-Non
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.72-77
    • /
    • 2008
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion in considered at decision level. The proposed algorithm is tested on the NLPR database.

A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information (RGB-D 정보를 이용한 2차원 키포인트 탐지 기반 3차원 인간 자세 추정 방법)

  • Park, Seohee;Ji, Myunggeun;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.41-51
    • /
    • 2018
  • Recently, in the field of video surveillance, deep learning based learning method is applied to intelligent video surveillance system, and various events such as crime, fire, and abnormal phenomenon can be robustly detected. However, since occlusion occurs due to the loss of 3d information generated by projecting the 3d real-world in 2d image, it is need to consider the occlusion problem in order to accurately detect the object and to estimate the pose. Therefore, in this paper, we detect moving objects by solving the occlusion problem of object detection process by adding depth information to existing RGB information. Then, using the convolution neural network in the detected region, the positions of the 14 keypoints of the human joint region can be predicted. Finally, in order to solve the self-occlusion problem occurring in the pose estimation process, the method for 3d human pose estimation is described by extending the range of estimation to the 3d space using the predicted result of 2d keypoint and the deep neural network. In the future, the result of 2d and 3d pose estimation of this research can be used as easy data for future human behavior recognition and contribute to the development of industrial technology.

Loitering Behavior Detection Using Shadow Removal and Chromaticity Histogram Matching (그림자 제거와 색도 히스토그램 비교를 이용한 배회행위 검출)

  • Park, Eun-Soo;Lee, Hyung-Ho;Yun, Myoung-Kyu;Kim, Min-Gyu;Kwak, Jong-Hoon;Kim, Hak-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.171-181
    • /
    • 2011
  • Proposed in this paper is the intelligent video surveillance system to effectively detect multiple loitering objects even that disappear from the out of camera's field of view and later return to a target zone. After the background and foreground are segmented using Gaussian mixture model and shadows are removed, the objects returning to the target zone is recognized using the chromaticity histogram and the duration of loitering is preserved. For more accurate measurement of the loitering behavior, the camera calibration is also applied to map the image plane to the real-world ground. Hence, the loitering behavior can be detected by considering the time duration of the object's existence in the real-world space. The experiment was performed using loitering video and all of the loitering behaviors are accurately detected.

A study on automated speed enforcement system algorithm for using image processing (영상처리를 이용한 과속단속 알고리즘 연구)

  • Park, Geon-Yeong;Jeon, Min-ho;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.833-836
    • /
    • 2013
  • In this paper, we proposed an intelligent surveillance system which can be determined by the overspeed of vehicle which continuously collects by video imaging device. Imaging device to capture images continuously, and filtering errors that occur as a natural, long-distance moving objects by comparing the images collected before and after the images. To measure the size of things, it proves that able to measure speed of the vehicle, depending on the amount of growing pixels using the pixel processing.

  • PDF

An application of datamining approach to CQI using the discharge summary (퇴원요약 데이터베이스를 이용한 데이터마이닝 기법의 CQI 활동에의 황용 방안)

  • 선미옥;채영문;이해종;이선희;강성홍;호승희
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.11a
    • /
    • pp.289-299
    • /
    • 2000
  • This study provides an application of datamining approach to CQI(Continuous Quality Improvement) using the discharge summary. First, we found a process variation in hospital infection rate by SPC (Statistical Process Control) technique. Second, importance of factors influencing hospital infection was inferred through the decision tree analysis which is a classification method in data-mining approach. The most important factor was surgery followed by comorbidity and length of operation. Comorbidity was further divided into age and principal diagnosis and the length of operation was further divided into age and chief complaint. 24 rules of hospital infection were generated by the decision tree analysis. Of these, 9 rules with predictive prover greater than 50% were suggested as guidelines for hospital infection control. The optimum range of target group in hospital infection control were Identified through the information gain summary. Association rule, which is another kind of datamining method, was performed to analyze the relationship between principal diagnosis and comorbidity. The confidence score, which measures the decree of association, between urinary tract infection and causal bacillus was the highest, followed by the score between postoperative wound disruption find postoperative wound infection. This study demonstrated how datamining approach could be used to provide information to support prospective surveillance of hospital infection. The datamining technique can also be applied to various areas fur CQI using other hospital databases.

  • PDF

IOT Intelligent Watering Sensor For Indoor Plant

  • Hana, Mujlid;Haneen Daifallah, Alghamdi;Hind Abdulaziz, Alkharashi;Marah Awadh, Alkhaldi
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.171-177
    • /
    • 2022
  • The number of people who own indoor plants is growing today, but as a result of their busy lifestyles-such as work or travel-as well as a lack of enthusiasm in caring for their plants, their plants wither. The use of an irrigation control system with a surveillance camera can assist such folks in taking care of their plants. Such a device can assist in remotely watering plants at predetermined times and checking on the health of the plants. The proprietors would be able to live comfortably without feeling bad thanks to this change. Internet access is required for this technology in order to monitor the plants and control the watering through apps. A sensor is installed in the soil to monitor soil humidity and send data to the microcontroller for irrigation, allowing the owner to schedule irrigation as they see fit and keep an eye on their plants all day. With the use of a remote irrigation control system, the plants will grow properly and be irrigated with the proper amount of water, and the owners will be so glad and delighted to watch their plants. Knowing the time and quantity of water are vital parts of the plant growth.

A Study on the Implementation of Intelligent Navigational Risk Assessment System for High-risk Vessel using IoT Sensor Gateway (IoT 센서연계장치를 이용한 고위험선박의 지능형 운항위험 분석 시스템 개발에 대한 연구)

  • Kim, Do-Yeon;Kim, Kil-Yong;Park, Gyei-Kark;Jeong, Jung-Sik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.3
    • /
    • pp.239-245
    • /
    • 2016
  • In the midst of continuing international recession, the rate of maritime traffic and marine leisure markets are consistently growing. The Republic of Korea controls the marine traffic volume through vessel traffic centers and various other management facilities. Nevertheless, the continuous growth and complexity of marine traffic is resulting in repeated occurrences of marine accidents. Recovery is very difficult in cases of human injuries or deaths caused by marine accidents due to its nature, and the scale of marine accidents is also becoming greater with advanced ship building technologies. Passenger ships, oil tankers, and other such vessels used for specific purposes requires a more detailed navigational status surveillance and analysis, and numerous research has been conducted with an objective for monitoring such special purpose vessels. However, the data elements transmitted from the ocean to the shore station are limited to AIS and ARPA. We are implementing IoT ship sensor collection and a syncing system capable of transmitting various ship sensing data to the shore station, and also proposing a Safe Navigation Status Analysis System utilizing the collected data.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

A Study on Face Awareness with Free size using Multi-layer Neural Network (다층신경망을 이용한 임의의 크기를 가진 얼굴인식에 관한 연구)

  • Song, Hong-Bok;Seol, Ji-Hwan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.2
    • /
    • pp.149-162
    • /
    • 2005
  • This paper suggest a way to detect a specific wanted figure in public places such as subway stations and banks by comparing color face images extracted from the real time CCTV with the face images of designated specific figures. Assuming that the characteristic of the surveillance camera allows the face information in screens to change arbitrarily and to contain information on numerous faces, the accurate detection of the face area was focused. To solve this problem, the normalization work using subsampling with $20{\times}20$ pixels on arbitrary face images, which is based on the Perceptron Neural Network model suggested by R. Rosenblatt, created the effect of recogning the whole face. The optimal linear filter and the histogram shaper technique were employed to minimize the outside interference such as lightings and light. The addition operation of the egg-shaped masks was added to the pre-treatment process to minimize unnecessary work. The images finished with the pre-treatment process were divided into three reception fields and the information on the specific location of eyes, nose, and mouths was determined through the neural network. Furthermore, the precision of results was improved by constructing the three single-set network system with different initial values in a row.