• Title/Summary/Keyword: violation detection

Search Result 57, Processing Time 0.028 seconds

A Study on the Detecting Method of Intercept Violation Vehicles Using an Image Detection Techniques (영상검지기법을 활용한 끼어들기 위반차량 검지 방법에 관한 연구)

  • Kim, Wan-Ki;Ryu, Boo-Hyung
    • Journal of the Korean Society of Safety
    • /
    • v.23 no.6
    • /
    • pp.164-170
    • /
    • 2008
  • This research was verified detection way of intercept vehicles and performance evaluation after system installation using image detector as detection way of ground installation. By image recognition algorithm was on the trace of moving orbit of violation vehicles for detection way of intercept vehicles. When moving orbit is located special site, utilized geometric image calibration and DC-notch filter. These are cognitive system of license plate by making signal. Then, Bright Evidence Detection and Dark Evidence Detection were applied to after mixing. It is applied to way of Backward tracking for detection way of intercept vehicles. After the field evaluation of developed system, it should be analyzed the more high than recognition rate of minimum standards 80%. It should rise in the estimation of the site applicability is highly from now.

Real-time Lane Violation Detection System using Feature Tracking (특징점 추적을 이용한 실시간 끼어들기 위반차량 검지 시스템)

  • Lee, Hee-Sin;Jeong, Sung-Hwan;Lee, Joon-Whoan
    • The KIPS Transactions:PartB
    • /
    • v.18B no.4
    • /
    • pp.201-212
    • /
    • 2011
  • In this paper, we suggest a system of detecting a vehicle with lane violation, which can detect the vehicle with lane violation, by using the feature point tracking. The whole algorism in the suggested system of detecting a vehicle with lane violation is composed of three stages such as feature extraction, register and tracking in feature for the tracking-targeted vehicle, and detecting a vehicle with lane violation. The feature is extracted from the morphological gradient image, which results in constructing robust detection system against shadows, weather conditions, head lights and illumination conditions without distinction day and night. The system shows excellent performance for the data captured at day time, night time, and rainy night time as much as 99.49% for positive recognition ratio and 0.51% for error ratio. Also the system is so fast as much as 91.34 frames per second in average that it may be possible for real-time processing.

Lane Violation Detection System Using Feature Tracking (특징점 추적을 이용한 끼어들기 위반차량 검지 시스템)

  • Lee, Hee-Sin;Lee, Joon-Whoan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.2
    • /
    • pp.36-44
    • /
    • 2009
  • In this paper, we suggest a system of detecting a vehicle with lane violation, which can detect the vehicle with lane violation, by using the feature point tracking. The whole algorithm in the suggested system of detecting a vehicle with lane violation is composed of three stages such as feature extraction, register and tracking in feature for the tracking-targeted vehicle, and detecting a vehicle with lane violation. In the stage of feature extraction, the feature is extracted from the inputted image by sing the feature-extraction algorithm available for the real-time processing. The extracted features are again selected the racking-targeted feature. The registered feature is tracked by using NCC(normalized cross correlation). Finally, whether or not lane violation is finally detected by using information on the tracked features. As a result of experimenting the suggested system by using the acquired image in the section with a ban on intervention, the excellent performance was shown with 99.09% for positive recognition ratio and 0.9% for error ratio. The fast processing speed could be obtained in 34.48 frames per second available for real-time processing.

  • PDF

YOLO-based Traffic Signal Detection for Identifying the Violation of Motorbike Riders (YOLO 기반의 교통 신호등 인식을 통한 오토바이 운전자의 신호 위반 여부 확인)

  • Wahyutama, Aria Bisma;Hwang, Mintae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.141-143
    • /
    • 2022
  • This paper presented a new technology to identify traffic violations of motorbike riders by detecting the traffic signal using You Only Look Once (YOLO) object detection. The hardware module that is mounted on the front of the motorbike consists of Raspberry Pi with a camera to run the YOLO object detection, a GPS module to acquire the motorcycle's coordinate, and a LoRa communication module to send the data to a cloud DB. The main goal of the software is to determine whether a motorbike has violated a traffic signal. This paper proposes a function to recognize the red traffic signal colour with its movement inside the camera angle and determine that the traffic signal violation happens if the traffic signal is moving to the right direction (the rider turns left) or moving to the top direction (the riders goes straight). Furthermore, if a motorbike rider is violated the signal, the rider's personal information (name, mobile phone number, etc), the snapshot of the violation situation, rider's location, and date/time will be sent to a cloud DB. The violation information will be delivered to the driver's smartphone as a push notification and the local police station to be used for issuing violation tickets, which is expected to prevent motorbike riders from violating traffic signals.

  • PDF

Violation Pattern Analysis for Good Manufacturing Practice for Medicine using t-SNE Based on Association Rule and Text Mining (우수 의약품 제조 기준 위반 패턴 인식을 위한 연관규칙과 텍스트 마이닝 기반 t-SNE분석)

  • Jun-O, Lee;So Young, Sohn
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.4
    • /
    • pp.717-734
    • /
    • 2022
  • Purpose: The purpose of this study is to effectively detect violations that occur simultaneously against Good Manufacturing Practice, which were concealed by drug manufacturers. Methods: In this study, we present an analysis framework for analyzing regulatory violation patterns using Association Rule Mining (ARM), Text Mining, and t-distributed Stochastic Neighbor Embedding (t-SNE) to increase the effectiveness of on-site inspection. Results: A number of simultaneous violation patterns was discovered by applying Association Rule Mining to FDA's inspection data collected from October 2008 to February 2022. Among them there were 'concurrent violation patterns' derived from similar regulatory ranges of two or more regulations. These patterns do not help to predict violations that simultaneously appear but belong to different regulations. Those unnecessary patterns were excluded by applying t-SNE based on text-mining. Conclusion: Our proposed approach enables the recognition of simultaneous violation patterns during the on-site inspection. It is expected to decrease the detection time by increasing the likelihood of finding intentionally concealed violations.

Bit Synchronization Using Violation Bit Detection in 13.56MHz RFID PJM Tag (바이올레이션 비트 검출을 통한 13.56MHz RFID PJM 태그의 비트 동기화 기법)

  • Youn, Jae-Hyuk;Yang, Hoon-Gee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.481-487
    • /
    • 2013
  • To successfully accomplish a bit synchronization, a synchronizer should exploit a preamble pattern. A MFM (modified frequency modulation) flag is uses as a preamble in a PJM (phase jitter modulation) mode RFID standard. In the recent work, a synchronizer for a PJM mode tag was proposed, which is composed of several correlators. In this paper, we present a new bit synchronizer in which a coarse synchronization is done as in the previous work while a fine synchronization is performed via exploiting a violation bit included in the MFM flag. We show that the proposed synchronizer can significantly reduce the overall hardware complexity at the expense of slight burden to a demodulator structure. Through simulation, we also show that its performance is comparable to that of the previous system despite its hardware simplicity.

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

Energy and Service Level Agreement Aware Resource Allocation Heuristics for Cloud Data Centers

  • Sutha, K.;Nawaz, G.M.Kadhar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5357-5381
    • /
    • 2018
  • Cloud computing offers a wide range of on-demand resources over the internet. Utility-based resource allocation in cloud data centers significantly increases the number of cloud users. Heavy usage of cloud data center encounters many problems such as sacrificing system performance, increasing operational cost and high-energy consumption. Therefore, the result of the system damages the environment extremely due to heavy carbon (CO2) emission. However, dynamic allocation of energy-efficient resources in cloud data centers overcomes these problems. In this paper, we have proposed Energy and Service Level Agreement (SLA) Aware Resource Allocation Heuristic Algorithms. These algorithms are essential for reducing power consumption and SLA violation without diminishing the performance and Quality-of-Service (QoS) in cloud data centers. Our proposed model is organized as follows: a) SLA violation detection model is used to prevent Virtual Machines (VMs) from overloaded and underloaded host usage; b) for reducing power consumption of VMs, we have introduced Enhanced minPower and maxUtilization (EMPMU) VM migration policy; and c) efficient utilization of cloud resources and VM placement are achieved using SLA-aware Modified Best Fit Decreasing (MBFD) algorithm. We have validated our test results using CloudSim toolkit 3.0.3. Finally, experimental results have shown better resource utilization, reduced energy consumption and SLA violation in heterogeneous dynamic cloud environment.

Tendency of Residual Pesticides in Commercial Agricultural Products in Gyeongsangbuk-Do Area (the year 2004~2008) (경상북도 내 유통 농산물 중의 잔류농약 동향 (2004~2008년))

  • Yang, S.T.;Son, J.C.;Jung, K.H.;Lee, C.I.;Kim, M.J.;Park, H.S.;Cha, Chun-Geun
    • Journal of Food Hygiene and Safety
    • /
    • v.24 no.4
    • /
    • pp.338-347
    • /
    • 2009
  • The content of residual pesticides in commercial agricultural products in Gyeongsangbuk-Do area was investigated for 5 years extending the year 2004 through 2008. The detection rates of residual pesticides in agricultural products by year were similar in range of 11.6~16.4%. But the violation rates showed lower values in the last years from 4.5% of the year 2004 to 0% of the year 2007. The highest residual concentration of each pesticide detected in commercial agricultural products was investigated by year. That is, in the year 2004 and 2005, chlorpyrifos, chlorothalonil, diazinon, endosulfan, ethoprophos, fenarimol and procymidone were detected over the tolerance in kale, parsley, celery, chard and lettuce, and in the year 2006, permethrin in the soybean and peanut. The detection rate and violation rate of pesticides were highly increased in the order of the endosulfan, chlorpyrifos, procymidone, chlorfenapyr, fenitrothion, imazalil, isoprothiolane, methidathion and permethrin. The detection rate and violation rate of pesticides were increased after August every year.

Design and Implementation of Traffic Signal Enforcement System Using Microwave Detection Technology (마이크로파 검지기술을 이용한 교통신호위반단속시스템 구현에 관한 연구)

  • 권근범;김란숙;노정자
    • Proceedings of the IEEK Conference
    • /
    • 2001.06e
    • /
    • pp.147-150
    • /
    • 2001
  • This paver has presented the architecture and function of the traffic signal enforcement system to detect and capture a image of the violating car in the street intersection. Also in the paper, the algorithm and method of detecting the violation car have been presented and the microwave detection method has been explained. And then this paper has showed the operation software interface for system and presented the experiment data carried out in the field.

  • PDF