• Title/Summary/Keyword: GPS 인식

Search Result 300, Processing Time 0.032 seconds

Feasibility of Optical Character Recognition (OCR) for Non-native Turtle Detection (UAV 기반 외래거북 탐지를 위한 광학문자 인식(OCR)의 가능성 평가)

  • Lim, Tai-Yang;Kim, Ji-Yoon;Kim, Whee-Moon;Kang, Wan-Mo;Song, Won-Kyong
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.25 no.5
    • /
    • pp.29-41
    • /
    • 2022
  • Alien species cause problems in various ecosystems, reduce biodiversity, and destroy ecosystems. Due to these problems, the problem of a management plan is increasing, and it is difficult to accurately identify each individual and calculate the number of individuals, especially when researching alien turtle species such as GPS and PIT based on capture. this study intends to conduct an individual recognition study using a UAV. Recently, UAVs can take various sensor-based photos and easily obtain high-definition image data at low altitudes. Therefore, based on previous studies, this study investigated five variables to be considered in UAV flights and produced a test paper using them. OCR was used to monitor the displayed turtles using the manufactured test paper, and this confirmed the recognition rate. As a result, the use of yellow numbers showed the highest recognition rate. In addition, the minimum threat distance was confirmed to be 3 to 6m, and turtles with a shell size of 6 to 8cm were also identified during the flight. Therefore, we tried to propose an object recognition methodology for turtle display text using OCR, and it is expected to be used as a new turtle monitoring technique.

Performance Evaluation Using Neural Network Learning of Indoor Autonomous Vehicle Based on LiDAR (라이다 기반 실내 자율주행 차량에서 신경망 학습을 사용한 성능평가 )

  • Yonghun Kwon;Inbum Jung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.93-102
    • /
    • 2023
  • Data processing through the cloud causes many problems, such as latency and increased communication costs in the communication process. Therefore, many researchers study edge computing in the IoT, and autonomous driving is a representative application. In indoor self-driving, unlike outdoor, GPS and traffic information cannot be used, so the surrounding environment must be recognized using sensors. An efficient autonomous driving system is required because it is a mobile environment with resource constraints. This paper proposes a machine-learning method using neural networks for autonomous driving in an indoor environment. The neural network model predicts the most appropriate driving command for the current location based on the distance data measured by the LiDAR sensor. We designed six learning models to evaluate according to the number of input data of the proposed neural networks. In addition, we made an autonomous vehicle based on Raspberry Pi for driving and learning and an indoor driving track produced for collecting data and evaluation. Finally, we compared six neural network models in terms of accuracy, response time, and battery consumption, and the effect of the number of input data on performance was confirmed.

Availability of Mobile Art in Smartphone Environment of Augmented Reality Content Industrial Technology (증강현실 콘텐츠 산업기술의 스마트폰 환경 모바일 아트 활용 가능성)

  • Kim, Hee-Young;Shin, Chang-Ok
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.48-57
    • /
    • 2013
  • Smartphones provide users with environment for communication and sharing information and at the same time play an important role of mobile technology and mobile art development. Smartphone technology-related researches are being accelerated especially with the advent of mobile Augmented Reality(AR) age, but the studies on user participation that is essential for AR content industry were insufficient. In that regard, the assistance from mobile art area that has already developed these characteristics is essential. Thus, this article is to classify mobile art that has not been studied a lot domestically into feature phone usage and smartphone usage and to analyze each example case with the three most used methods. The usage of feature phones which use the sound and images of mobile devices can be divided into three: installation and performing methods, single channel video art method and five senses communication method. On the other hand, the usage of smartphones that use sensors, cameras, GPS and AR can be divided into location-based AR, marker-based AR and markerless AR. Also, as a result of examining mobile AR content utilization technology by industries, combined methods are utilized; tourism and game-related industries use location-based AR, education and medicine-related industries use marker-based AR, and shopping-related industries use markerless AR. The development of AR content industry is expected to be accelerated with mobile art that makes use of combined technology method and constant communication method through active participation of users. The future development direction of mobile AR industry is predicted to have minimized HMD, integration of hologram technology and artificial intelligence and make the most of big data and social network so that we could overcome the technological limitation of AR.

The Study on the Sexual Behavior of Unmarried Female Workers in the Small and Medium Scale Industries (중소규모 산업장 미혼 근로여성의 성행태에 관한 연구)

  • 한성현;박민향
    • Korea journal of population studies
    • /
    • v.19 no.2
    • /
    • pp.175-205
    • /
    • 1996
  • The purpose of this study was to find the distribution of the variables on the quality of life and the determinants of the sexual attitude and behavior of the unmarried female workers. This study was surveyed to the 306 unmarried women who worked in the small and medium scale industries in Kyungin area and analyzed the respondent's knowledge of sex, sexual behavior, health behavior, health status, satisfaction of working condition and recognition of working environment. The result of this study could be summarized as follows: The respondent's age are mostly early of twenties and their education level are high school and more. They recognize that their health condition is not so good but they hardly try to improve health condition. They think that their working condition are mostly unsatisfied and they also believe that they expose themselves to the toxic working environment. Although their knowledge of sex are low they have few chances for the education of sex and family planning. Their attitude of premarital sex are conservertive but the rate of approval of living together before marriage are high and the rate of premarital sex is around 15 percent. The premarital sex behavior are positively related with family size, living condition, knowledge of sex and working period but the sex experiences are negatively related with working period and knowledge of sex. As a result we suggest that the sex education and consultative program are necessary for improving the quality of life of the unmarried working women in small and medium scale industries.

  • PDF

A study on the developmental plan of Alarm Monitoring Service (기계경비의 발전적 대응방안에 관한 연구)

  • Chung, Tae-Hwang;So, Seung-Young
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.145-168
    • /
    • 2010
  • Since Alarm Monitoring Service was introduced in Korea in 1981, the market has been increasing and is expected to increase continually. Some factors such as the increase of social security need and the change of safety consciousness, increase of persons who live alone could be affected positively on Alarm Monitoring Service industry. As Alarm Monitoring Service come into wide use, the understanding of electronic security service is spread and consumer's demand is difficult, so consideration about new developmental plan is need to respond to the change actively. Electronic security system is consist of various kinds of element, so every element could do their role equally. Alarm Monitoring Service should satisfy consumer's various needs because it is not necessary commodity, also electronic security device could be easily operated and it's appearance has to have a good design. To solve the false alarm problem, detection sensor's improvement should be considered preferentially and development of new type of sensor that operate dissimilarly to replace former sensor is needed. On the other hand, to settle the matter that occurred by response time, security company could explain the limit on Alarm Monitoring System to consumer honestly and ask for an understanding. If consumer could be joined into security activity by security agent's explanation, better security service would be provided with mutual confidence. To save response time the consideration on the introduction of GIS(Global Information System) is needed rather than GPS(Global Positioning System). Although training program for security agents is important, several benefits for security agents should be considered together. The development of new business model is required for preparation against market stagnation and the development of new commodity to secure consumer for housing service rather than commercial facility service. for the purpose of those, new commodity related to home-network system and video surveillance system could be considered, also new added service with network between security company and consumer for a basis is to be considered.

  • PDF

Indoor Positioning Using RFID Technique (RFID 기술을 이용한 실내 위치 추적)

  • Yoon, Chang-sun;Kim, Tae-in;Kim, Hyeon-jin;Hong, Yeon-chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.207-214
    • /
    • 2016
  • RFID technology is a technology perceiving information with the device called reader and tag which is now used in public transportation such as Hi-pass. In this paper, we design a system which tracks indoor location using this technology. GPS, the most frequently used location-tracking system, has a defect that its accuracy decreases when the device is indoor. In suggested experiment, we simulate signals according to the moving of located objects, then compare with the result of the experiment. Based on the extracted data, we inform data which is for the purpose of tracking system based on analysis of the route and errors. Simulations for the tracking were performed with relocation of real objects. In the real experiment, we arrange the readers around the room and move the tagged object that we like to know the location, then analyze the data from the equipment. This paper suggests the analyzed data for the future indoor tag tracking applications. We expect that the RFID based location positioning data will be used for other indoor positioning research and development.

A Study on Movement Control of Drone using Reference Posture Mapping (기준 자세 맵핑을 이용한 드론의 동작 제어에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.6
    • /
    • pp.461-466
    • /
    • 2021
  • Drone can be controlled by the method such as Bluetooth communication for close distance and can be controlled through network communication for long distance. Especially, the coordinate is set using GPS and drone is controlled using network communication and video communication when the activity range is long distance. However, the drone should be controlled by receiving control authority accordingly in response about it appropriately when the drone leaves the control area after arriving at the destination if there is a problem with network communication and video communication. So, this study proposes a method to control a drone with a simple mutually promised simple gesture and the drone can be controlled in the proposed method even if the drone leaves from the control authority in above situation. The reference posture was established for mutually promised simple gesture algorithm and automatically handed over the control authority of drone to a person who takes the reference posture when the drone recognizes it to implement this. And all the movements of the drone could be controlled by starting the beginning of all commands from the reference posture (The hovering posture of the drone). Lastly, the control authority of the drone should be returned after achieving the purpose, and the algorithm was implemented to make the drone can perform next action of its own, and it was confirmed that the drone was operating normally by the mapped instruction.

A study on the development of surveillance system for multiple drones in school drone education sites (학내 드론 교육현장의 다중드론 감시시스템 개발에 관한 연구)

  • Jin-Taek Lim;Sung-goo Yoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.697-702
    • /
    • 2023
  • Recently, with the introduction of drones, a core technology of the 4th industrial revolution, various convergence education using drones is being conducted in school education sites. In particular, drone theory and practice education is being conducted in connection with free semester classes and career exploration. The drone convergence education program has higher learner satisfaction than simple demonstration and practice education, and the learning effect is high due to direct practical experience. However, since practical education is being conducted for a large number of learners, it is impossible to restrict and control the flight of a large number of drones in a limited place. In this paper, we propose a monitoring system that allows the instructor to monitor multiple drones in real time and learners to recognize collisions between drones in advance when multiple drones are operated, focusing on education operated in schools. The communication module used in the experiment was equipped with GPS in Murata LoRa, and the server and client were configured to enable monitoring based on the location data received in real time. The performance of the proposed system was evaluated in an open space, and it was confirmed that the communication signal was good up to a distance of about 120m. In other words, it was confirmed that 25 educational drones can be controlled within a range of 240m and the instructor can monitor them.

A Search of Regional Concept in the Post-Modern Era: In Case of Identity (포스트모던 시대에 적합한 지역 개념의 모색: 동일성(identity) 개념을 중심으로)

  • Leem, Byoung-Jo;Ryu, Je-Hun
    • Journal of the Korean Geographical Society
    • /
    • v.42 no.4
    • /
    • pp.582-600
    • /
    • 2007
  • In a long history of geography, a variety of regional concepts have been suggested to represent the particular situations in each period. Today, post-modem situations, characterized by the development of capitalism and globalization, demand a new variety of regional concepts. The regional characteristics, such as social relations, institutional systems, ideologies and symbolism, are now perceived basically on the level of subjectivity. Currently, it is the most urgent task to integrate many conflicting opinions among a variety of subjects into the one that would seek a voluntary consent from the majority of regional residents. In this paper, it is suggested that the concept of identity is the most efficient in examining and explaining the post-modem trend of a region: variability, subjectivity, mobility, changeability, Finally, it is suggested that a special attention should be paid to the role of institutions, that is institutionalization, in the construction of regional identity, to understand and interpret the cultural-historical aspect of a regional change.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF