• Title/Summary/Keyword: 서버

Search Result 9,427, Processing Time 0.034 seconds

Location Tracking and Visualization of Dynamic Objects using CCTV Images (CCTV 영상을 활용한 동적 객체의 위치 추적 및 시각화 방안)

  • Park, Sang-Jin;Cho, Kuk;Im, Junhyuck;Kim, Minchan
    • Journal of Cadastre & Land InformatiX
    • /
    • v.51 no.1
    • /
    • pp.53-65
    • /
    • 2021
  • C-ITS(Cooperative Intelligent Transport System) that pursues traffic safety and convenience uses various sensors to generate traffic information. Therefore, it is necessary to improve the sensor-related technology to increase the efficiency and reliability of the traffic information. Recently, the role of CCTV in collecting video information has become more important due to advances in AI(Artificial Intelligence) technology. In this study, we propose to identify and track dynamic objects(vehicles, people, etc.) in CCTV images, and to analyze and provide information about them in various environments. To this end, we conducted identification and tracking of dynamic objects using the Yolov4 and Deepsort algorithms, establishment of real-time multi-user support servers based on Kafka, defining transformation matrices between images and spatial coordinate systems, and map-based dynamic object visualization. In addition, a positional consistency evaluation was performed to confirm its usefulness. Through the proposed scheme, we confirmed that CCTVs can serve as important sensors to provide relevant information by analyzing road conditions in real time in terms of road infrastructure beyond a simple monitoring role.

A Study of IndoorGML Automatic Generation using IFC - Focus on Primal Space - (IFC를 이용한 IndoorGML 데이터 자동 생성에 관한 연구 - Primal Space를 중심으로 -)

  • Nam, Sang Kwan;Jang, Hanme;Kang, Hye Young;Choi, Hyun Sang;Lee, Ji Yeong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.6
    • /
    • pp.623-633
    • /
    • 2020
  • As the time spent in indoor space has increased, the demand for services targeting indoor spaces also continues to increase. To provide indoor spatial information services, the construction of indoor spatial information should be done first. In the study, a method of generation IndoorGML, which is the international standard data format for Indoor space, from existing BIM data. The characteristics of IFC objects were investigated, and objects that need to be converted to IndoorGML were selected and classified into objects that restrict the expression of Indoor space and internal passages. Using the proposed method, a part of data set provided by the BIMserver github and the IFC model of the 21st Century Building in University of Seoul were used to perform experiments to generate PrimalSpaceFeatures of IndoorGML. As a result of the experiments, the geometric information of IFC objects was represented completely as IndoorGML, and it was shown that NavigableBoundary, one of major features of PrimalSpaceFeatures in IndoorGML, was accurately generated. In the future, the proposed method will improve to generate various types of objects such as IfcStair, and additional method for automatically generating MultiLayeredGraph of IndoorGML using PrimalSpaceFeatures should be developed to be sure of completeness of IndoorGML.

Implementation of Prosumer Management System for Small MicroGrid (소규모 마이크로그리드에서 프로슈머관리시스템의 구현)

  • Lim, Su-Youn;Lee, Tae-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.590-596
    • /
    • 2020
  • In the island areas where system connection with the commercial power grid is difficult, it is quite important to find a method to efficiently manage energy produced with independent microgrids. In this paper, a prosumer management system for P2P power transaction was realized through the testing the power meter and the response rate of the collected data for the power produced in the small-scale microgrids in which hybrid models of solar power and wind power were implemented. The power network of the microgrid prosumer was composed of mesh structure and the P2P power transaction was tested through the power meter and DC power transmitter in the off-grid sites which were independently constructed in three places. The measurement values of the power meter showed significant results of voltage (average): 380V + 0.9V, current (average): + 0.01A, power: 1000W (-1W) with an error range within ±1%. Stabilization of the server was also confirmed with the response rate of 0.32 sec. for the main screen, 2.61 sec. for the cumulative power generation, and 0.11 sec for the power transaction through the transmission of 50 data in real time. Therefore, the proposed system was validated as a P2P power transaction system that can be used as an independent network without transmitted by Korea Electric Power Corporation (KEPCO).

Efficient AIOT Information Link Processing in Cloud Edge Environment Using Blockchain-Based Time Series Information (블록체인 기반의 시계열 정보를 이용한 클라우드 엣지 환경의 효율적인 AIoT 정보 연계 처리 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.9-15
    • /
    • 2021
  • With the recent development of 5G and artificial intelligence technologies, it is interested in AIOT technology to collect, process, and analyze information in cloud edge environments. AIIoT technology is being applied to various smart environments, but research is needed to perform fast response processing through accurate analysis of collected information. In this paper, we propose a technique to minimize bandwidth and processing time by blocking the connection processing between AIOT information through fast processing and accurate analysis/forecasting of information collected in the smart environment. The proposed technique generates seeds for data indexes on AIOT devices by multipointing information collected by blockchain, and blocks them along with collection information to deliver them to the data center. At this time, we deploy Deep Neural Network (DNN) models between cloud and AIOT devices to reduce network overhead. Furthermore, server/data centers have improved the accuracy of inaccurate AIIoT information through the analysis and predicted results delivered to minimize latency. Furthermore, the proposed technique minimizes data latency by allowing it to be partitioned into a layered multilayer network because it groups it into blockchain by applying weights to AIOT information.

A Study on the Information Management of Construction Workers Using Smartmaker of Site Safety Management Supervisor (현장 안전관리 감독자의 smartmaker 를 활용한 건설현장 근로자 정보 관리의 관한 연구)

  • Kim, Sung-hyun;Lee, Ji-yeob;Son, Kiyoung
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.3 no.1
    • /
    • pp.32-40
    • /
    • 2020
  • In this study, an application was developed to reduce the work between labor and safety managers and to hire better workers when hiring workers. With the expected increase in foreign workers in the future, the number of illegal workers will also increase. As a result, accident and on-site management are becoming more difficult due to insufficient information collection of workers. Therefore, it was possible to secure on-site safety through an application that could collect accurate information and reduce the time of information exchange between safety managers and labor managers. In addition, the application was designed to help the safety manager identify the faithful workers more quickly when re-employment of the day laborers if many day laborers were assessed and filled out as they were. This anticipates the expected effect of shortening the construction period. The current application collected necessary information through an interview with the site manager. If the company collects more information needed in the field and has big data than it has collected necessary information so far, it will be highly competitive in the market as it can improve the completeness of applications by establishing opinions and reflecting information accordingly.

A Development of Welding Information Management and Defect Inspection Platform based on Artificial Intelligent for Shipbuilding and Maritime Industry (인공지능 기반 조선해양 용접 품질 정보 관리 및 결함 검사 플랫폼 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Woo, Yun-Tae;Yoon, Young-Wook;Shin, Sung-chul;Oh, Sang-jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.193-201
    • /
    • 2021
  • The welding has a high proportion of the production and drying of ships or offshore plants. Non-destructive testing is carried out to verify the quality of welds in Korea, radiography test (RT) is mainly used. Currently, most shipyards adopt analog-type techniques to print the films through the shoot of welding parts. Therefore, the time required from radiography test to pass or fail judgment is long and complex, and is being manually carried out by qualified inspectors. To improve this problem, this paper covers a platform for scanning and digitalizing RT films occurring in shipyards with high resolution, accumulating them in management servers, and applying artificial intelligence (AI) technology to detect welding defects. To do this, we describe the process of designing and developing RT film scanning equipment, welding inspection information integrated management platform, fault reading algorithms, visualization software, and testing and verification of each developed element in conjunction.

Design of an Visitor Identification system for the Front Door of an Apartment using Deep learning (딥러닝 기반 이용한 공동주택현관문의 출입자 식별 시스템 설계)

  • Lee, Min-Hye;Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.45-51
    • /
    • 2022
  • Fear of contact exists due to the prevention of the spread of infectious diseases such as COVID-19. When using the common entrance door of an apartment, access is possible only if the resident enters a password or obtains the resident's permission. There is the inconvenience of having to manually enter the number and password for the common entrance door to enter. Also, contactless entry is required due to COVID-19. Due to the development of ICT, users can be easily identified through the development of face recognition and voice recognition technology. The proposed method detects a visitor's face through a CCTV or camera attached to the common entrance door, recognizes the face, and identifies it as a registered resident. Then, based on the registered information of the resident, it is possible to operate without contact by interworking with the elevator on the server. In particular, if face recognition fails with a hat or mask, the visitor is identified by voice or additional authentication of the visitor is performed based on the voice message. It is possible to block the spread of contagiousness without leaving any contactless function and fingerprint information when entering and exiting the front door of an apartment house, and without the inconvenience of access.

Analysis of Feature Map Compression Efficiency and Machine Task Performance According to Feature Frame Configuration Method (피처 프레임 구성 방안에 따른 피처 맵 압축 효율 및 머신 태스크 성능 분석)

  • Rhee, Seongbae;Lee, Minseok;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.318-331
    • /
    • 2022
  • With the recent development of hardware computing devices and software based frameworks, machine tasks using deep learning networks are expected to be utilized in various industrial fields and personal IoT devices. However, in order to overcome the limitations of high cost device for utilizing the deep learning network and that the user may not receive the results requested when only the machine task results are transmitted from the server, Collaborative Intelligence (CI) proposed the transmission of feature maps as a solution. In this paper, an efficient compression method for feature maps with vast data sizes to support the CI paradigm was analyzed and presented through experiments. This method increases redundancy by applying feature map reordering to improve compression efficiency in traditional video codecs, and proposes a feature map method that improves compression efficiency and maintains the performance of machine tasks by simultaneously utilizing image compression format and video compression format. As a result of the experiment, the proposed method shows 14.29% gain in BD-rate of BPP and mAP compared to the feature compression anchor of MPEG-VCM.

Development of Multi-Camera based Mobile Mapping System for HD Map Production (정밀지도 구축을 위한 다중카메라기반 모바일매핑시스템 개발)

  • Hong, Ju Seok;Shin, Jin Soo;Shin, Dae Man
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.587-598
    • /
    • 2021
  • This study aims to develop a multi-camera based MMS (Mobile Mapping System) technology for building a HD (High Definition) map for autonomous driving and for quick update. To replace expensive lidar sensors and reduce long processing times, we intend to develop a low-cost and efficient MMS by applying multiple cameras and real-time data pre-processing. To this end, multi-camera storage technology development, multi-camera time synchronization technology development, and MMS prototype development were performed. We developed a storage module for real-time JPG compression of high-speed images acquired from multiple cameras, and developed an event signal and GNSS (Global Navigation Satellite System) time server-based synchronization method to record the exposure time multiple images taken in real time. And based on the requirements of each sector, MMS was designed and prototypes were produced. Finally, to verify the performance of the manufactured multi-camera-based MMS, data were acquired from an actual 1,000 km road and quantitative evaluation was performed. As a result of the evaluation, the time synchronization performance was less than 1/1000 second, and the position accuracy of the point cloud obtained through SFM (Structure from Motion) image processing was around 5 cm. Through the evaluation results, it was found that the multi-camera based MMS technology developed in this study showed the performance that satisfies the criteria for building a HD map.

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.