Fig. 1. water play safety system(Korea Coast Guard)
Fig. 2. climber safety system (National Disaster Management Research Institute)
Fig. 3. KISA intelligent certification process
Fig. 4. Common Object Detection Algorithm Flowchart
Fig. 5. HOG Algorithm
Fig. 6. Proposal Algorithm Flowchart
Fig. 7. YOLO v2 Network
Fig. 8. Clustering box dimensions on VOC and COCO
Fig. 9. Sutherland Hodgman Polygon Clipping
Fig. 10. Test Level-1 results (KISA Event)
Fig. 11. First event detection cumulative graph
Fig. 12. GT detection rate (all test algorithm)
Fig. 13. Test Level-2 results (GT)
Fig. 14. IoU Comparison by Test Algorithm 1, 2
Table 1. KISA Intelligent Authentication Evaluation Method and Criteria (Intrusion)
Table 2. Darknet 19
Table 3. Detection frameworks on PASCAL VOC 2007
Table 4. Test Dataset
Table 5. Test environment
Table 6. Test Video
Table 7. Test Level-1 (KISA Event)
Table 8. Test Level-2 (GT Event)
Table 9. Test Level-3 (IoU)
References
- Tetra port goes 'Access control', http://www.knn.co.kr/163726.
- Park Young Jin, Cho Myeong Heum, Lee Jun Woo, "Development of automatic water level detection alarm system using intelligent CCTV," Korean Society Of Hazard Mitigation Academic Publications, pp. 66-66, 2013.
- JungSub Oh, DoHyeon Kim, Yoon Kim, "Loitering and Intrusion Detection Algorithms using Neuron Network," Korean Institute of Information Scientists and Engineers Academic Publications, Vol 2017.12, pp. 2142-2144, 2017.
- J. Redmon and A. Farhadi, "YOLO9000: Better, Faster, Stronger," Computer Vision and Pattern Recognition, arXiv:1612.08242, Dec. 2016.
- C. Burges, "A tutorial on support vector machines for pattern recognition. Knowledge Discovery and Data Mining," Vol. 2, Issue 2, pp.121-167, 1998. https://doi.org/10.1023/A:1009715923555
- Rappaport. A, "An efficient algorithm for line and polygon clipping," The Visual Computer, Vol. 7, pp. 19-28, Jan. 1991. https://doi.org/10.1007/BF01994114
- Sehyuck Wi, Donghyun Kim, Jingchun Piao, Hyunchul Shin, "Night-time Pedestrain Detection Techniques by Using HoG," Korean Institute of Information Scientists and Engineers Academic Publications, Vol. 2014.6, pp. 1797-1799, 2014
- N. Dalaland B. Trigg, "Histograms of Oriented Gradients for Human Detection," IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol. 1, pp.886-893, 2005.
- YuJung Choi, Yoon Kim, "Object Detecting and Tracking Algorithm In The Environment of Complex Beach,"Korean Institute of Information Scientists and Engineers Academic Publications, Vol. 2016, No. 12, pp. 1123-1125, Dec. 2016.
- Korea Internet&Security Agency, "Intelligent CCTV Solution Performance Test and Certification Guide," pp. 30, Jan. 2018.
- Dasol Hong, Yoon Kim, "Efficient Swimmer Detection Algorithm using CNN-based SVM,"Journal of The Korea Society of Computer and Information, Vol. 22 No. 12, pp. 79-85, Dec. 2017. https://doi.org/10.9708/JKSCI.2017.22.12.079
- Jong-Hak Lee, Koo-Rack Park, Dong-Hyun Kim, Yun-Yeol Lee, "Intelligent Monitoring Systems for CCTV for Crime Prevention," The Korea Society of Computer and Information Academic Publications, Vol. 24(2), pp. 105-106, Jun. 2016.
- Seung-Hwan Bang, Hyun-Bo Cho, "Learning Method for Real-time Crime Prediction Model Utilizing CCTV," Journal of The Korea Society of Computer and Information, Vol. 21 No. 5, pp. 91-98, May. 2016. https://doi.org/10.9708/jksci.2016.21.5.091
- Korea Defense Industry Association, "Defense Technology,"Vol. 468, pp. 17-18, Feb. 2018.
- Taewoo Kim, Doyoung Kim, Hyungheon Kim, Pyunggang Kim, "The Design of Intelligent CCTV Video Analytics System utilizing Appearance and Disappearance Points of Objects for False Alarm Mitigation," The Korean Institute of Information Scientists and Engineers Academic Publications, Vol. 2015.06, pp. 769-771, Jun. 2015.