• Title/Summary/Keyword: 침입자 추적

Search Result 101, Processing Time 0.028 seconds

An Efficient Shadow Removal Technique adapted to Environmental Changes (환경변화에 적응하는 효율적인 그림자 제거 기법)

  • Ryu, Nam-Hoon;Ban, Kyeong-Jin;Oh, Kyeong-Sug;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.204-210
    • /
    • 2009
  • There has been a lot of research into a background separation method, which is a preprocess of a technique of automatically perceiving an invader, and the removal of shadows around a moving object in the video monitoring field. When a moving object is not clearly separated from its shadow, it is difficult to analyze the shape accurately, and it is also hard to trace its position. This study suggests how to utilize a brightness value for removing a shadow. It came from the fact that there appears to be no change of color in the shadow area relative to the background area, and there only occurs a difference in brightness. In addition, this method uses the renewal of a critical value used for the removal of shadow in the previous frame, in the next frame.

  • PDF

Implementation of Autonomous Intrusion Analysis Agent(AIAA) and Tool for using Intruder Retrace (인터넷 해킹피해 시스템자동분석에이젼트(AIAA) 및 침입자 역추적 지원도구 구현)

  • Im, Chae-Ho;Won, Yu-Heon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3410-3419
    • /
    • 1999
  • Autonomous Intrusion Analysis Agent(AIAA) is Incident Response Team staff's tool that scans, analyses, reports and alerts the traces of intrusion based on system logs and intruder's backdoors inside compromised system by IR staff after security incident is reported to the IR team. AIAA is intelligent to recognize to check out who is intruder from all the user accounts and to report the suspected candidates to the master control system in IR team. IR staff who controls AIAA with master system can pick up an intruder from the candidates reported by AIAA agent and review all related summary reports and details including source host's mane, finger information, all illegal behavior and so on. AIAA is moved to compromised system by the staff to investigate the signature of intrusion along the trace of victim hosts and it is also operated in secret mode to detect the further intrusion. AIAA is alive in all victim systems until the incident is closed and IR staff can control AIAA operation and dialogue with AIAA agent in Web interface.

  • PDF

Real-time Abnormal Behavior Analysis System Based on Pedestrian Detection and Tracking (보행자의 검출 및 추적을 기반으로 한 실시간 이상행위 분석 시스템)

  • Kim, Dohun;Park, Sanghyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.25-27
    • /
    • 2021
  • With the recent development of deep learning technology, computer vision-based AI technologies have been studied to analyze the abnormal behavior of objects in image information acquired through CCTV cameras. There are many cases where surveillance cameras are installed in dangerous areas or security areas for crime prevention and surveillance. For this reason, companies are conducting studies to determine major situations such as intrusion, roaming, falls, and assault in the surveillance camera environment. In this paper, we propose a real-time abnormal behavior analysis algorithm using object detection and tracking method.

  • PDF

Intelligent CCTV for Port Safety, "Smart Eye" (항만 안전을 위한 지능형 CCTV, "Smart Eye")

  • Baek, Seung-Ho;Ji, Yeong-Il;Choi, Han-Saem
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.1056-1058
    • /
    • 2022
  • 본 연구는 항만에서 안전 수칙을 위반하여 발생하는 사고 및 이상행동을 실시간 탐지를 수행한 후 위험 상황을 관리자가 신속하고 정확하게 대처할 수 있도록 지원하는 지능형 CCTV, Smart Eye를 제안한다. Smart Eye는 컴퓨터 비전(Computer Vision) 기반의 다양한 객체 탐지(Object Detection) 모델과 행동 인식(Action Recognition) 모델을 통해 낙하 및 전도사고, 안전 수칙 미준수 인원, 폭력적인 행동을 보이는 인원을 복합적으로 판단하며, 객체 추적(Object Tracking), 관심 영역(Region of Interest), 객체 간의 거리 측정 알고리즘을 구현하여, 제한구역 접근, 침입, 배회, 안전 보호구 미착용 인원 그리고 화재 및 충돌사고 위험도를 측정한다. 해당 연구를 통한 자동화된 24시간 감시체계는 실시간 영상 데이터 분석 및 판단 처리 과정을 거친 후 각 장소에서 수집된 데이터를 관리자에게 신속히 전달하고 항만 내 통합관제센터에 접목함으로써 효율적인 관리 및 운영할 수 있게 하는 '지능형 인프라'를 구축할 수 있다. 이러한 체계는 곧 스마트 항만 시스템 도입에 이바지할 수 있을 것으로 기대된다.

Cluster-based Continuous Object Prediction Algorithm for Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율성을 위한 클러스터 기반의 연속 객체 예측 기법)

  • Lee, Wan-Seop;Hong, Hyung-Seop;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8C
    • /
    • pp.489-496
    • /
    • 2011
  • Energy efficiency in wireless sensor networks is a principal issue to prolong applications to track the movement of the large-scale phenomena. It is a selective wakeup approach that is an effective way to save energy in the networks. However, most previous studies with the selective wakeup scheme are concentrated on individual objects such as intruders and tanks, and thus cannot be applied for tracking continuous objects such as wild fire and poison gas. This is because the continuous object is pretty flexible and volatile due to its sensitiveness to surrounding circumferences so that movable area cannot be estimated by the just spatiotemporal mechanism. Therefore, we propose a cluster-based algorithm for applying the efficient and more accurate technique to the continuous object tracking in enough dense sensor networks. Proposed algorithm wakes up the sensors in unit cluster where target objects may be diffused or shrunken. Moreover, our scheme is asynchronous because it does not need to calculate the next area at the same time.

Genetic Algorithm Based Routing Method for Efficient Data Transmission for Reliable Data Transmission in Sensor Networks (센서 네트워크에서 데이터 전송 보장을 위한 유전자 알고리즘 기반의 라우팅 방법)

  • Kim, Jin-Myoung;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.49-56
    • /
    • 2007
  • There are many application areas of wireless sensor networks, such as combat field surveillance, terrorist tracking and highway traffic monitoring. These applications collect sensed data from sensor nodes to monitor events in the territory of interest. One of the important issues in these applications is the existence of the radio-jamming zone between source nodes and the base station. Depending on the routing protocol the transmission of the sensed data may not be delivered to the base station. To solve this problem we propose a genetic algorithm based routing method for reliable transmission while considering the balanced energy depletion of the sensor nodes. The genetic algorithm finds an efficient routing path by considering the radio-jamming zone, energy consumption needed fur data transmission and average remaining energy level. The fitness function employed in genetic algorithm is implemented by applying the fuzzy logic. In simulation, our proposed method is compared with LEACH and Hierarchical PEGASIS. The simulation results show that the proposed method is efficient in both the energy consumption and success ratio of delivery.

  • PDF

Realtime Theft Detection of Registered and Unregistered Objects in Surveillance Video (감시 비디오에서 등록 및 미등록 물체의 실시간 도난 탐지)

  • Park, Hyeseung;Park, Seungchul;Joo, Youngbok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1262-1270
    • /
    • 2020
  • Recently, the smart video surveillance research, which has been receiving increasing attention, has mainly focused on the intruder detection and tracking, and abandoned object detection. On the other hand, research on real-time detection of stolen objects is relatively insufficient compared to its importance. Considering various smart surveillance video application environments, this paper presents two different types of stolen object detection algorithms. We first propose an algorithm that detects theft of statically and dynamically registered surveillance objects using a dual background subtraction model. In addition, we propose another algorithm that detects theft of general surveillance objects by applying the dual background subtraction model and Mask R-CNN-based object segmentation technology. The former algorithm can provide economical theft detection service for pre-registered surveillance objects in low computational power environments, and the latter algorithm can be applied to the theft detection of a wider range of general surveillance objects in environments capable of providing sufficient computational power.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Development of A Device Constantly Stimulating Tuning Fork and Variability of Its Vibration Perception Time (음차를 일정하게 자극하는 장치의 개발 및 이 장치로 측정한 진동 감지 시간의 변이)

  • Lee, Jong-Young;Hong, Dae-Yong;Yoon, Hyeong-Ryeol
    • Journal of Preventive Medicine and Public Health
    • /
    • v.24 no.1 s.33
    • /
    • pp.93-97
    • /
    • 1991
  • The time honoured tuning fork at present widely available for examining vibration sensation is brought about the problem of great interobserver variation. To resolve t his problem, author developed a divice using electric magnet that stimulates constantly tuning fork. The perception time of vibration from tunung fork by this device was tested on the index finger of dominant hand of twenty eight subjects. It was 12.44 seconds on average and ranged from 9.47 to 17.25. Coefficient of variation of it was 16.89 percent. Correlation coefficient between test and retest after 30 minutes was 0.957(p<0.01). This device is portable. Test procedure in non-invasive, non-aversive and simple, can be performed within one minute, and does not require the skilled technician. It is felt that this device testing vibration perception time is suitable as screening tool for early detection of occupational peripheral neuropathy.

  • PDF

The Study of Water Availability Increments by Estuary Lake in YoungSan River (영산강하구둑에 의한 수리권 가용수량 증가에 관한 고찰 고찰)

  • Park, Hee-Seong;Choi, Hyun-Gun;Kim, Chang-Shik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.2079-2083
    • /
    • 2007
  • 하구둑은 해수의 역류에 의한 염수침입을 방지하고 유역에 필요한 담수를 확보하기위하여 건설되며, 하구둑에 의하여 하천의 하구에 담수호가 생성된다. 하구담수호에 의해 기존에 염해로 취수할 수 없었던 하천구간에서의 취수가 가능하게 되며, 하구담수호를 일정한 수위로 관리함으로써 상당량의 농업용수를 확보할 수 있다. 이와 관련하여 하구담수호에 의하여 확보되는 수자원량에 대해 설계 당시의 분석 자료들이 있기는 하지만, 대부분 연 총량의 형태로 나타나 있으며, 수리권과 관련하여 하구둑에 의하여 추가적으로 확보되는 수리권 가용수량이 얼마인지에 대한 분석은 거의 없다. 그것은 하구둑의 방류량이 댐의 방류량과는 달라서 조석의 영향을 매우 크게 받기 때문에 단순한 물수지 분석으로 이를 모의하기 힘들기 때문이다. 게다가 1일 2회의 조석이 발생하므로 1일단위의 물수지 분석은 어려운 현실이다. 그럼에도 불구하고 하구둑에서 많은 양의 농업용수 취수가 이루어지고 있다. 과연 얼마정도의 양이 수리권으로서의 역할을 할 수 있는지 모르고 임의적인 허가가 계속 부여될 경우, 갈수 시 용수공급의 안정성을 확보할 수 없게 될 것이다. 따라서 안정적인 용수의 공급을 위한 적절한 수리권 가용수량에 대한 추정 필요하다. 이에 본 연구에서는 영산강하구둑의 실시간 운영을 위하여 고 등(2004)이 개발한 "영산강하구 둑 물관리 프로그램"의 기본적인 조위의 예측과 배수갑문의 방류량 산정기법 등과 수자원장기종 합계획(2006) 수립 시에 사용된 장기간의 일자연유량을 이용하여 하구둑의 수리권 가용수량 추정 모형을 개발하고, 이를 영산강 하구둑에 의해 생성된 영산호에 적용함으로써 영산호에 의해 증가되는 수리권 가용수량에 대해 고찰하여 보았다., 그리고 T-P $77.7{\sim}96.6%$(평균 94.3%)로 산정되었다. 이러한 결과는 대청호로 유입하는 유기물과 영양염류 연간 부하량의 80% 이상이 강우-유출과 함께 유입하는 것을 의미하며, 저수지 수질관리를 위해서는 유역차원의 비점오염원 관리가 시급함을 시사한다.하기 위해, 수렴흐름 추적자시험에 의한 종분산지수와 시험대수층의 평균선형유속을 이용하여 종분산계수를 구하였다. 현장에서 수행된 양수시험에 의한 평균선형유속 22.44 m/day와 평균 종분산지수 0.4155 m를 적용하여 산정된 종분산계수는 $9.32\;m^2/day$이었다. 따라서, 시험부지 내 충적층에서 일정한 양수율$(2,500\;m^3/day)$로 지하수를 개발할 시에 양수정 주변지역으로 유입되는 염소이온의 확산면적은 1일 $9.32\;m^2$ 정도일 것으로 나타났다.적인 $OH{\cdot}$ 의 생성은 ascorbate가 조직손상에 관여할 가능성을 시사하였다.었다. 정확한 예측치를 얻기 위하여 불균질 조직이 조사야에 포함되는 경우 보정이 요구되며, 골반의 경우 골 조직의 보정이 중요한 요인임을 알 수 있었다. 이를 위하여 불균질 조직에 대한 정확한 정보가 요구되며, 이는 CT 영상을 이용하는 것이 크게 도움이 되리라 생각된다.전시 슬러지층과 상등액의 온도차를 측정하여 대사열량의 발생량을 측정하고 슬러지의 활성을 측정할 수 있는 방법을 개발하였다.enin과 Rhaponticin의 작용(作用)에 의(依)한 것이며, 이는 한의학(韓醫學) 방제(方劑) 원리(原理)인 군신좌사(君臣佐使) 이론(理論)에서 군약(君藥)이 주증(主症)에 주(

  • PDF