• Title/Summary/Keyword: 영상 식별

Search Result 668, Processing Time 0.025 seconds

A Study for Smart Apartment for Supporting Intelligent Service based on Ubiquitous (유비쿼터스 기반의 지능형 서비스를 지원하는 스마트 아파트 연구)

  • Ahn, Byeong-Tae;Lee, Chong-Ha;Chung, Bhum-suk
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.247-261
    • /
    • 2013
  • Recently, the smart phone, a carrying along terminal connection technology such as Galaxytap/iPad etc. evolves, and supply is increasing rapidly, is included for smart phone because various sensor technologies are developed and service application that is acted in terminal with this is accompanied and grow. Continuously 4 generation to 3 Gs, Wibro Wireless network technology of communications a LTE technology from that is constructed, environment for Ubiquitous realization is being constructed fast. Therefore, in this paper it can inquire state of electronic, furniture devices through apartment complex web server and gear that control groove network at smart phone, and control, and confirms home state prevention of crimes state, and video inquiry of position that CCTV is placed in apartment complex was available. And it proposed integrated smart apartment with parking system and medical system using RFID system in ubiquitous environment.

  • PDF

A Study on the Estimation of Center of Turning Circle of Anchoring Vessel using Automatic Identification System Data in VTS (VTS에서 AIS데이터를 활용한 정박선의 선회중심 추정에 관한 연구)

  • Kim, Kwang-Il;Jeong, Jung Sik;Park, Gyei-Kark
    • Journal of Navigation and Port Research
    • /
    • v.37 no.4
    • /
    • pp.337-343
    • /
    • 2013
  • To ensure the safety for vessels anchored in stormy weather, duty officer and VTS operator have to frequently check whether their anchors are dragging. To judge dragging of the anchored vessel, it is important for VTS operator to recognize the turning circle and its center of the anchored vessel. The judgement for the anchored vessel dragging can be made by using Radar and AIS. If it is available, CCTV or eye-sighting can be used to know the center of turing circle. However, the VTS system collects individual ship's dynamic information from AIS and ARPA radar and monitors of the anchored vessels, it is difficult for VTS operator not only to get the detailed status information of the vessels, but also to know the center of turning circle. In this study, we propose an efficient algorithm to estimate the center of turning circle of anchored vessel by using the ship's heading and position data, which were from AIS. To verify the effectiveness of the proposed algorithm, the experimental study was made for the anchored vessel under real environments.

A Development of Marine Observation Buoy Monitoring System Using Trail Camera and AtoN AIS (트레일 카메라 및 AIS를 이용한 해양관측부이용 감시시스템의 개발)

  • Gang, Yong-Soo;Wong, Chii-Lok;Hwang, Hun-Gyu;Kang, Seok-Sun;Kim, Hyen-Woo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.05a
    • /
    • pp.306-307
    • /
    • 2018
  • 본 논문에서는 해양관측부이 보호 및 해상 관측 등을 위해 사용되고 있는 국내외 영상감시 시스템 및 기술 현황을 살펴보고, 차세대 해상용 통신 네트워크 및 인공위성을 통한 해양 공공시설의 안전감시 시스템이 가져야 할 요구사항과 이에 대한 국내외 기술개발 현황을 살펴본다. 또한, 선박 인식 및 추적, 나아가 충돌 예측 등을 수행하여, 해상사고를 예방할 수 있는 해양관측부이용 감시시스템의 개발에 관한 내용을 다룬다. 이를 위해 개발하는 시스템은 해양관측부이에 장착되어 저전력으로 동작하며, 해수에 강한 트레일 감시카메라를 개발하여 적용한다. 추가적으로 AIS정보를 활용한 충돌 예방 경고 모듈이 탑재되고, LTE-M 등과 같은 차세대 해상이동통신 및 위성망 M2M 네트워크를 응용한 통신 모듈을 기반으로 육상 알람 기능을 제공한다. 이를 통해 시스템의 신뢰성을 확보하고, 대형 선박과의 해상사고(선박추돌사고 및 기름유출 등)와 소형선박에 의한 시설물 훼손(Vandalism)의 발생 가능성을 인지할 수 있는 종합적인 데이터를 수집하여 사고의 예방 및 재난 상황 등을 예측함으로써 중요시설의 안전 및 해양환경 보호에 기여하고자 한다.

  • PDF

Image Recognition by Fuzzy Logic and Genetic Algorithms (퍼지로직과 유전 알고리즘을 이용한 영상 인식)

  • Ryoo, Sang-Jin;Na, Chul-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.969-976
    • /
    • 2007
  • A fuzzy classifier which needs various analyses of features using genetic algorithms is proposed. The fuzzy classifier has a simple structure, which contains a classification part based on fuzzy logic theory and a rule generation part using genetic algorithms. The rule generation part determines optimal fuzzy membership functions and inclusion or exclusion of each feature in fuzzy classification rules. We analyzed recognition rate of a specific object, then added finer features repetitively, if necessary, to the object which has large misclassification rate. And we introduce repetitive analyses method for the minimum size of string and population, and for the improvement of recognition rates. This classifier is applied to two examples of the recognition of iris data and the recognition of Thyroid Gland cancer cells. The fuzzy classifier proposed in this paper has recognition rates of 98.67% for iris data and 98.25% for Thyroid Gland cancer cells.

Design of Omni-directional Reflector for Synthetic Aperture Radar (합성개구레이더용 전방향 반사기의 설계)

  • Chang, Geba;Oh, Yi-Sok;Yang, Chan-Su
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.6
    • /
    • pp.501-506
    • /
    • 2007
  • Basic research is conducted to identify a target using corner reflectors which are commonly used in calibration of synthetic aperture radar (SAR) systems. At first, an omni-directional reflector is fabricated by combining four 15-cm rectangular trihedral corner reflectors. Then, its radar cross section (RCS) characteristics are measured at C-band (5.3 GHz) for vv-, hh-, hv-, and vh- polarizations at a range of horizontal angle, $-90^{\circ}{\le}{\phi}{\le}90^{\circ}$. The measured RCS angular variation of the omni-directional reflector is much smaller for vv-polarization than other polarizations, and the difference between the maximum and minimum RCSs for vv-polarization is about 8 dB. Peak RCS values are shown at $0^{\circ}$ (normal to plates) and $45^{\circ}$ (direction of bore sight). It is shown that the measurements agree quite well with numerical simulation and theoretical computation results.

Numerical Simulation of Radar Backscattering from Oil Spills on Sea Surface for L-band SAR (기름이 유출된 바다 표면의 L-밴드 전파 산란에 대한 수치해석적 연구)

  • Park, Seong-Min;Yang, Chan-Su;Oh, Yi-Sok
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.1
    • /
    • pp.21-27
    • /
    • 2010
  • This paper presents a numerical simulation of the radar backscattering from oil spills on ocean surface. At first, a one-dimensionally rough sea surface is numerically generated for a given wind speed at HEBEI SPIRIT accident. Then, an oil-spilled sea surface is represented with a two-layered medium, which is generated by adding a thin low-dielectric oil layer on the randomly-rough highdielectric sea surface. The backscattering coefficients of various oil-spilled sea surfaces are obtained using the Method of Moments and Monte Carlo technique for various surface roughness, oil-layer thicknesses, frequencies, polarizations and incidence angles. The numerical method is verified with theoretical models for simple structures. The reduction of the backscattering coefficients due to the lowdielectric oil-layers on sea surfaces has been analyzed. These numerical results will help to detect any oil spills on sea surfaces, and consequently, to classify SAR images.

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

A Study of Sensibility Recognition and Color Psychology from The Children's Pictures (아동의 그림으로부터 감성인식 및 색채심리 파악에 관한 연구)

  • An, Eun-Mi;Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.41-48
    • /
    • 2012
  • In modern society, the necessity of Color and Psychology Therapy is increasing for psychologically calm children who are less taken care by their parents in busy daily life, and helping them adapt to the environment. Therefore, we need to understand sensitivity status of children with paintings that they draw. Currently, most of empirical studies on their sensitivities are based on psychological and engineering perspectives. This study was designed to provide a system to extract psychological status of children from their pictures by distinguishing harmony of colors using information of solid colors and arrangement of colors in the image space. For achieving this research purpose, first of all, sensitivity database was constructed based on the image space of colors. Then, using the K-Means algorithm, the image was clustered and a wide amount of color values were divided into groups. After that, children's sensitivities were extracted by matching groups of color values with database, and color psychological status of children was observed using the color distribution chart in their paintings.

A Method for the Classification of Water Pollutants using Machine Learning Model with Swimming Activities Videos of Caenorhabditis elegans (예쁜꼬마선충의 수영 행동 영상과 기계학습 모델을 이용한 수질 오염 물질 구분 방법)

  • Kang, Seung-Ho;Jeong, In-Seon;Lim, Hyeong-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.903-909
    • /
    • 2021
  • Caenorhabditis elegans whose DNA sequence was completely identified is a representative species used in various research fields such as gene functional analysis and animal behavioral research. In the mean time, many researches on the bio-monitoring system to determine whether water is contaminated or not by using the swimming activities of nematodes. In this paper, we show the possibility of using the swimming activities of C. elegans in the development of a machine learning based bio-monitoring system which identifies chemicals that cause water pollution. To characterize swimming activities of nematode, BLS entropy is computed for the nematode in a frame. And, BLS entropy profile, an assembly of entropies, are classified into several patterns using clustering algorithms. Finally these patterns are used to construct data sets. We recorded images of swimming behavior of nematodes in the arenas in which formaldehyde, benzene and toluene were added at a concentration of 0.1 ppm, respectively, and evaluate the performance of the developed HMM.

Shoulder-Surfing Resistant Password Input Method for Mobile Environment (모바일 환경에서 엿보기 공격에 강한 패스워드 입력방법)

  • Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.93-104
    • /
    • 2010
  • The advent of various mobile devices and mobile services has caused diversification of information stored in a mobile device, e.g., SMS, photos, movies, addresses, e-mails, digital certificates, and so on. Because mobile devices are lost or stolen easily, user authentication is critical to protect the information stored in mobile devices. However, the current user authentication methods using Personal Identification Numbers (PINs) and passwords are vulnerable to Shoulder Surfing Attacks (SSAs), which enables an attacker to obtain user's information. Although there are already several SSA-resistant authentication methods in the literature, most of these methods lack of usability. Moreover, they are not suitable for use in mobile devices. In this paper, we propose a user friendly password input method for mobile devices which is secure against SSA. We also perform user tests and compare the security and usability of the proposed method with those of the existing password input methods.