• Title/Summary/Keyword: People count

Search Result 104, Processing Time 0.027 seconds

An Analysis of Wi-Fi Probe Request for Crowd Counting through MAC-Address classification (MAC-Address 분류를 통한 Wi-Fi Probe Request 기반 유동인구 분석 방법)

  • Oppokhonov, Shokirkhon;Lee, Jae-Hyun;Moon, Jun-young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.4
    • /
    • pp.612-623
    • /
    • 2022
  • Estimation of the presence of people in real time is extremely useful for businesses in providing better services. Many companies and researchers have attempted various researches in order to count the number of floating population in a specific space. Recently, as part of smart cities and digital twins, commercialization of measuring floating populations using Wi-Fi signals has become active in the public and private sectors. In this paper we present a method of estimating the floating population based on MAC-address values collected from smartphones. By distinguishing Real MAC-address and Random MAC-address values, we compare the estimated number of smartphone devices and the actual number of people caught on CCTV screens to evaluate the accuracy of the proposed method. And it appeared to have a similar correlation between the two datas. As a result, we present a method of estimating the floating population based on analyzing Wi-Fi Probe Requests.

Why abandon Randomized MAC-Address : An Analysis of Wi-Fi Probe Request for Crowd Counting (Why abandon Randomized MAC-Address : Wi-Fi Probe Request 기반 유동인구 분석 방법)

  • Oppokhonov, Shokirkhon;Lee, Jae-Hyun;Moon, Jun-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.24-34
    • /
    • 2021
  • Estimation of the presence of people in real time is extremely useful for businesses in providing better services. Many companies and researchers have attempted various researches in order to count the number of floating population in specific space. Recently, as part of smart cities and digital twins, commercialization of measuring floating populations using Wi-Fi signals has become active in the public and private sectors. This paper explains the floating population measuring system from the perspective of general consumers(non-experts) who uses current population data. Specifically, it presents a method of estimating the floating population based on MAC-address values collected from smartphones. By distinguishing Real MAC-address and Random MAC-address values, we compare the estimated number of smartphone devices and the actual number of people caught on CCTV screens to evaluate the accuracy of the proposed method. And it appeared to have a similar correlation between the two datas. As a result, we present a method of estimating the floating population based on analyzing Wi-Fi Probe Requests

  • PDF

Regional Traffic Accident Model of Elderly Drivers based on Urban Decline Index (도시쇠퇴 지표를 적용한 지역별 고령운전자 교통사고 영향 분석)

  • Park, Na Young;Park, Byung Ho
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.6
    • /
    • pp.137-142
    • /
    • 2017
  • This study deals with the relation between traffic accident and urban decline. The purpose of this study is to develop the regional accident models of elderly drivers. In order to develop the count data models, 2009-2015 traffic accident data from TAAS(traffic accident analysis system) and urban decline data from urban regeneration information system are collected. The main results are as follows. First, the null hypothesis that there is no difference in the accident number between elderly and non-elderly drivers is rejected. Second, 8 accident models which are all statistically significant have been developed. Finally, common variables between elderly and non-elderly are ratio of elderly people, elderly person living alone/1,000 persons and wholesale/retail employments/1,000 persons. This study could be expected to give many implications to making regional accident reduction policy.

Do ancient people have 9 breaths per minute respiratory rate? (고인들은 1분에 9회 빈도의 호흡을 하였는가? : "일만삼천오백식(一萬三千五白息)"에 대한 고찰)

  • Kim, Kiwang
    • The Journal of the Society of Korean Medicine Diagnostics
    • /
    • v.21 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • Objectives Some major Chinese medical classics like Huangdineijing (黃帝內經) and Nanjing (難經) assert that a normal person breaths 13,500 times every day. It's just half of real breathing cycles of human. So I tried to find a reasonable explanation to solve this conflict between truth and literal description. Materials and methods To find breath count descriptions in Chinese ancient books, I used Kanseki Repository (http://kanripo.org/). To find precedent research on this topic, I used China National Knowledge Infrastructure (http://cnki.net). Results 33 books refers to human breath cycles for a day, and most of them introduce 13,500 as human breathing frequency of one day. Some recent papers on Laoguanshan (老官山) Western Han dynasty manuscripts show new clues on this topic. Conclusion I assume that 13,500 cycles, the incorrect human breathing frequency of a day, might be originated from adjusting the meaning and usage of the word "Xi (息)".

A Design of Large Area Viewing LED Panel Control System (광시각용 LED 전광판제어 시스템 설계)

  • Lee, Su-Beom;Nam, Sang-Gil;Jo, Gyeong-Yeon;Kim, Jong-Jin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1351-1361
    • /
    • 1999
  • The wide spread of multimedia system demands a large area viewing display device which can inform a message to many people in open area. This paper is about the design of a large area viewing LED panel control system. The control system runs on 16 bit microprocessor MC68EC000 and has following functions: 16 line clock and time, 2 channel priority interrupt, 2 channel direct memory access, 2 channel 12 bit clock and timer, 2 channel infrared remocon receiver, 2 channel RS-232C with 16 byte FIFO, IBM PC/AT compatible keyboard interface, ISA bus, battery backuped real time clock, battery backuped 256 byte SRAM and watch dog timer. The core circuits are implemented to ASIC, considering lower cost, higher reliability, higher performance, smaller dimension, and lower power consumption. This is verified by simulation and fabricated in 0.6 um CMOS SOG processes. The total gate count is 39,083 and the clock frequency is 48 MGz. The fabricated ASIC is mounted on test board.

  • PDF

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

Development of Gait Recognition System (보행인식 시스템 개발)

  • Han, Y.H.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.8 no.2
    • /
    • pp.133-138
    • /
    • 2014
  • In this paper, a simple but efficient gait recognition method using spatial-temporal silhouette analysis is proposed. For each image sequence, a background subtraction algorithm and a PBAS(pixel based adaptive segmenter) procedure are first used to segment the moving silhouettes of a walking figure. Then, to identify people, the step count and stride length of walking figure is obtained in silhouette images. Experimental results on a CASIA dataset including 124 subjects demonstrate the validity of the proposed method. Also, the proposed system are believed to have a sufficient feasibility for the application to gait recognition.

  • PDF

A study on the Purchasing and Wearing Conditions of Accessary in University Students (대학생의 액세서리 구매 및 착용실태에 관한 연구)

  • Lee, Jin Hee;Do, Wol Hee;Kim, Nam Soon
    • Korean Journal of Human Ecology
    • /
    • v.24 no.1
    • /
    • pp.69-77
    • /
    • 2015
  • The study will furnish university students-oriented accessary market with preliminary data by virtue of university students' wearing accessary conditions. It conducted by 151 university students in Jeon-Nam and Jeon-Buk during october through november, 2014. The questionnaire is composed of 17 questions and used 151 out of 152 copies as the final data, except for one insufficient reply. The analysis method carried out a technological statistics such as frequency count, percentage, average and t-test for every questions, used by SPSS 20.0. The investigation result is as follows; The overall numbers of answerers were 151 people, 36 male and 115 female, and showed that they purchase accessaries of less than 20,000won in a jewelry shop. According to the 86.1% of university students' answers, the most well known brand is OST and then Metrocity(76.2%), Swarovski(68.9%) came after. The most visit count is to a jewelry shop, once or twice in a month, on-line shopping malls and department stores came after. Rings and bracelets are purchased once or twice in a month, and earrings are mainly put on. When purchasing accessaries, quality and scarcity design are the most significant conditions, getting the information through internet and fashion magazines. The ground of purchasing accessaries is for self-contentment and for coordinating with their fashion, and also the difficult maintenance as well as untangled wool are defined as uneasiness of using accessaries. Furthermore, the original goods are preferred for rings and necklaces, unlike earrings and bracelets.

Toxicity Evaluation of Effluent Gases from a Residental Fire by Rats (연립 주택 화재시 유독가스 방출 특성과 Rats를 이용한 독성평가)

  • Kim, Hong;Kang, Young-Goo;Kim, Dong-Hyun;Jung, Ki-Chang;Lee, Chang-Seop;Kim, Woon-Hyung
    • Fire Science and Engineering
    • /
    • v.16 no.3
    • /
    • pp.12-15
    • /
    • 2002
  • It has long been recognized that exposure to fire-induced toxic gases is a fatal hazard confront-ing people in fires. In this study, an indoor fire experiment was conducted in an unoccupied residential building located in An-san city, Kyoung-gi province, and the composition of effluent gases, which include CO, $CO_2$, $O_2$, $SO_2$, NO and $NO_2$, were measured by a gas analyzer. A group of lab rats were exposed to the toxic gases released from fire, and the blood samples of the rats were gathered every 2 minutes. A toxicity evaluation was conducted by analyzing the concentrations of Glucose, AST(GOT), ALT(GPT), CBC Count and CO(carboxy)-Hb in the blood samples. Shown from the analysis is the does-response relationship between the CO concentration that rats were exposed to and the CO-Hb concentration in rat blood.

Development of Privacy Impact Assessment Tool (개인정보 영향평가 툴 개발)

  • Heo, Jin-Man;Woo, Chang-Woo;Park, Jung-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.2
    • /
    • pp.75-81
    • /
    • 2012
  • As the number of web users is increasing, the leakage of personal information is increasing. If some personal information is leaked, the victim can suffer from material damage or mental damage at the same time. Most of the leakages are result from the people who works for the personal information by accident or design. Hence, the Ministry of Public Administration and Security proposeed the measuring index and enumerates the details. The index is used in a system to check protection of a personal information. However, because this system is used to evaluate after the leakage, it cannot be used to construct some security system or programming a security system. To solve this problem, it needs to express the diversity of items and be able to count what assessors want to count. Thus, a summary sheet which displays the result of the tool will be presented in a radial form graph. Details will be presented as a bar graph. Therefore, it will be proposed that the tool can grasp the weak point and propose the direction of security.

  • PDF