• Title/Summary/Keyword: Security Objects

Search Result 372, Processing Time 0.025 seconds

The Influence of E-commerce Logistics Service Quality on Customer Engagement Behavior

  • Dongxu ZHANG;Zhuoqi TENG;Mufeng LI;Renhong WU
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.2
    • /
    • pp.1-11
    • /
    • 2023
  • Purpose: With the rapid development of e-commerce, logistics services, as an important part of e-commerce shopping, have gradually attracted people's attention. Customer engagement behavior is a new topic in marketing, and its connotation is still being explored. The purpose of this paper is to study the relationship between logistics service quality and customer engagement behavior. Research design, data and methodology: This study employed the method of online questionnaire survey, with Chinese e-commerce platform users as the survey objects, 248 valid survey sample data were collected, and the method of factor analysis and structural equation model analysis was used to verify the research hypothesis model constructed in this paper. Results: The four dimensions of e-commerce logistics service quality have different influences on customer satisfaction, and the influence of availability on customer satisfaction is not significant. Convenience, assurance, and security have a significant positive impact on customer satisfaction; Customer satisfaction has a significant positive impact on the three dimensions of customer engagement behavior: customer repeat purchase behavior, online word-of-mouth, and customer referrals. Conclusion: The results of this study will provide useful reference for the managers of e-commerce companies to improve customer engagement behavior by improving the logistics service quality.

Real-time Abnormal Behavior Analysis System Based on Pedestrian Detection and Tracking (보행자의 검출 및 추적을 기반으로 한 실시간 이상행위 분석 시스템)

  • Kim, Dohun;Park, Sanghyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.25-27
    • /
    • 2021
  • With the recent development of deep learning technology, computer vision-based AI technologies have been studied to analyze the abnormal behavior of objects in image information acquired through CCTV cameras. There are many cases where surveillance cameras are installed in dangerous areas or security areas for crime prevention and surveillance. For this reason, companies are conducting studies to determine major situations such as intrusion, roaming, falls, and assault in the surveillance camera environment. In this paper, we propose a real-time abnormal behavior analysis algorithm using object detection and tracking method.

  • PDF

Movement Detection Using Keyframes in Video Surveillance System

  • Kim, Kyutae;Jia, Qiong;Dong, Tianyu;Jang, Euee S.
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.06a
    • /
    • pp.1249-1252
    • /
    • 2022
  • In this paper, we propose a conceptual framework that identifies video frames in motion containing the movement of people and vehicles in traffic videos. The automatic selection of video frames in motion is an important topic in security and surveillance video because the number of videos to be monitored simultaneously is simply too large due to limited human resources. The conventional method to identify the areas in motion is to compute the differences over consecutive video frames, which has been costly because of its high computational complexity. In this paper, we reduced the overall complexity by examining only the keyframes (or I-frames). The basic assumption is that the time period between I-frames is rather shorter (e.g., 1/10 ~ 3 secs) than the usual length of objects in motion in video (i.e., pedestrian walking, automobile passing, etc.). The proposed method estimates the possibility of videos containing motion between I-frames by evaluating the difference of consecutive I-frames with the long-time statistics of the previously decoded I-frames of the same video. The experimental results showed that the proposed method showed more than 80% accuracy in short surveillance videos obtained from different locations while keeping the computational complexity as low as 20 % compared to the HM decoder.

  • PDF

EU's Space Code of Conduct: Right Step Forward (EU의 우주행동강령의 의미와 평가)

  • Park, Won-Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.211-241
    • /
    • 2012
  • The Draft International Code of Conduct for Outer Space Activities officially proposed by the European Union on the occasion of the 55th Session of the United Nations Peaceful Uses of the Outer Space last June 2012 in Vienna, Austria is to fill the lacunae of the relevant norms to be applied to the human activities in the outer space and thus has the merit our attention. The missing elements of the norms span from the prohibition of an arms race, safety and security of the space objects including the measures to reduce the space debris to the exchange of information of space activities among space-faring nations. The EU's initiatives, when implemented, cover or will eventually prepare for the forum to deal with such issues of interests of the international community. The EU's initiatives begun at the end of 2008 included the unofficial contacts with major space powers including in particular the USA of which position is believed to have been reflected in the Draft with the aim to have it adopted in 2013. Although the Code is made up of soft law rather than hard law for the subscribing countries, the USA seems to be afraid of the eventuality whereby its strategic advantages in the outer space will be affected by the prohibiting norms, possibly to be pursued by the Code from its current non-binding character, of placing weapons in the outer space. It is with this trepidation that the USA has been opposing to the adoption of the United Nations Assembly Resolutions on the prevention of an arms race in the outer space (PAROS) and in the same context to the setting-up of a working group on the arms race in the outer space in the frame of the Conference on Disarmament. China and Russia who together put forward a draft Treaty on Prevention of the Placement of Weapons in Outer Space and of the Threat or Use of Force against Outer Space Objects (PPWT) in 2008 would not feel comfortable either because the EU initiatives will steal the lime light. Consequently their reactions are understandably passive towards the Draft Code while the reaction of the USA to the PPWT was a clear cut "No". With the above background, the future of the EU Code is uncertain. Nevertheless, the purpose of the Code to reduce the space debris, to allow exchange of the information on the space activities, and to protect the space objects through safety and security, all to maximize the principle of the peaceful use and exploration of the outer space is the laudable efforts on the part of EU. When the detailed negotiations will be held, some problems including the cost to be incurred by setting up an office for the clerical works could be discussed for both efficient and economic mechanism. For example, the new clerical works envisaged in the Draft Code could be discharged by the current UN OOSA (Office for Outer Space Affairs) with minimal additional resources. The EU's initiatives are another meaningful contribution following one due to it in adopting the Kyoto Protocol of 1997 to the UNFCCC (UN Framework Convention on the Climate Change) and deserve the praise from the thoughtful international community.

  • PDF

A Case Study of 2-year-old Infants' Attachment Security to a Child Care Teacher and Peer Play Process (보육교사에 대한 만 2세 영아의 애착 안정성과 또래놀이 과정에 관한 사례연구)

  • Shin, Dong Ju;Kim, So Young
    • Korean Journal of Child Education & Care
    • /
    • v.18 no.4
    • /
    • pp.1-25
    • /
    • 2018
  • Purpose: The purpose of this study was to explore about 2-year-old infants' attachment security to a child care teacher and peer play process through a case study. For this purpose, the attachment security was assessed with attachment Q-set to 2-year-old five infants at a day care center in Seoul. Participants of this study are four infants included two infants attached securely to their child care teacher and two infants attached insecurely to their child care teacher. Methods: Participant observation was conducted from April 12 to July 19 in 2018 through 36 observations in free play activities. The Data collected from the transcriptions of video shoots and teachers' interviews, child care plans, and reflexive journal was analyzed and interpreted. Results: The main results of the research were as follows: The beginning of peer play, when infants invited their peers to play, secure attachment infants selected suitable play partners and asked for a specific play behaviors. However, insecure attachment infants invited unsuitable play partners and asked uncertainly play actions to peers. In addition, when infants entered in-progress play, secure attachment infants understood the context of play but insecure attachment infants did not understand the context of play. In the progress of peer play, secure attachment infants cooperated with peers, shared play objects, but insecure attachment infants did not cooperate complementally with peers and express only their opinions. As well, insecure attachment infants could not play harmoniously without child care teacher's interventions. In the end of the peer play, secure attachment infants finished in collaboration with peers but insecure attachment infants failed to finish with the peers and was turned into play with the child care teacher because of peer conflict. Conclusion/Implications: This study has implications for basic resources to think about the role of child care teachers by helping them understand about the relation 2-year-old infants' attachment security to them and peer play process.

Ecological Functions and Losses of Traditional Korean Village Groves

  • Lee, D.-W.;Park, C.-R.
    • The Korean Journal of Quaternary Research
    • /
    • v.18 no.2 s.23
    • /
    • pp.65-66
    • /
    • 2004
  • There have been groves, in many cases, along with hedgerows and remnant forests around a traditional Korean village. A village grove is very closely connected to the life of residents. Sometimes it was a holy place where important village festivals were held, and became a resting place for farmers, especially in sunny summer. As a matter of fact, it is noted that traditional Korean village groves had been fostered for many purpose as religion, Confucianism, scenery, sanitation, traffic guard, public security, agriculture, hunting, and military and public uses were included in Chosun Govemor General(1938). Village groves were usually located at the outlet of watershed inside which a village was built. In addition, village groves used to be established along part of mountain ranges, streams and streets. A unique type of village grove, called bibosoop was fostered especially where the outlet of watershed was largely opened. In other cases, it was placed where a part of mountain range was relatively low, or where village residents were likely to see ugly objects such as a huge cliff, stony upland with an unvegetated area and the like(Kim and Jang 1994). In a sense, a sheltebelt is a sort of bibosoop as it is a landscape element to complement places that are exposed to strong winds. However, it is comparable to other typical bibosoop that is situated at a topographically very specific zone of watershed. In this paper, we will address potential functions of Korean village groves from a perspective of modern landscape ecology and show current status of some remnants, based on preliminary surveys. A village grove functions as barrier or filter of objects such as water, nutrients, and other elements and habitat of wildlife (park et al. 2003, Lee 2004). The village grove slows down the flow of water and air, maintains soil moisture an hinders soil erosion, enabling cultivation of crops and bringing up creatures nearby. It contributes to enhancing biodiversity. Birds rest on shrubby and woody trees of the element. Presumably, other organisms may also inhabit the village groves and take advantage of it when those move from a forest patch to others. Emerging insects acclimate themselves in the shade of the green space before they fly to sunny air. Besides the village grove acts as a component of agroforestry system as leaf litter is shed from a grove to an asjacent agricultural area, and transformed into green manure(Lee 2004). By the way, many of the landscape elements were destroyed or declined in Koea during the past several decades. The losses have been parallel or linked to environmental degradation. Unfortunately, we have a little reliable data as for how many groves have disappeared in Korea until now. There has been no complete census on the village groves in Korea, and the viewpoints of survey were to a degree different depending on surveyors. So, it is difficult to analyze the temporal and spatial change of village groves. Currently, national inventory data of Korean village groves are available in three reports. We reviewed the locations of village groves and arranged those according to the present administrative units, DONG. With the limited data, we found that at least 484 of village groves were recorded in South Korea. Among all provinces, village groves were most in Gyeongsanbuk-Do Province and least in Chungcheongbuk-Do Province(Table 1). This is a preliminary report prepared while some quantitative data regarding functions and lossers of the village groves are being collected. More detailed data will be introduced in the near future.

  • PDF

Object Segmentation for Detection of Moths in the Pheromone Trap Images (페로몬 트랩 영상에서 해충 검출을 위한 객체 분할)

  • Kim, Tae-Woo;Cho, Tae-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.157-163
    • /
    • 2017
  • The object segmentation approach has the merit of reducing the processing cost required to detect moths of interest, because it applies a moth detection algorithm to the segmented objects after segmenting the objects individually in the moth image. In this paper, an object segmentation method for moth detection in pheromone trap images is proposed. Our method consists of preprocessing, thresholding, morphological filtering, and object labeling processes. Thresholding in the process is a critical step significantly influencing the performance of object segmentation. The proposed method can threshold very elaborately by reflecting the local properties of the moth images. We performed thresholding using global and local versions of Ostu's method and, used the proposed method for the moth images of Carposina sasakii acquired on a pheromone trap placed in an orchard. It was demonstrated that the proposed method could reflect the properties of light and background on the moth images. Also, we performed object segmentation and moth classification for Carposina sasakii images, where the latter process used an SVM classifier with training and classification steps. In the experiments, the proposed method performed the detection of Carposina sasakii for 10 moth images and achieved an average detection rate of 95% of them. Therefore, it was shown that the proposed technique is an effective monitoring method of Carposina sasakii in an orchard.

Integration Process of Federation Object Model for Interoperation of Federations (페더레이션 연동을 위한 객체 모델 통합 프로세스)

  • Kwon, Se Jung;Yu, Minwook;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • High Level Architecture(HLA) is a specification for interoperation among heterogeneous simulators which are executed in a distributed environment. HLA originally allows many federates to join in a federation using a single RTI(Run-Time Infrastructure). As the target systems become more complex, the need for the interoperation of federations, performed in a RTI-RTI interoperation environment, has been growing. It can be performed by the confederation interface with the agents, which subrogate the API calls and callbacks of each federation. The existing studies have assumed that the object models of each federation are based on same HLA standard and their object descriptions are equal. Because the existing federations are usually not under this assumption, this paper proposes the integration process of object models for the federation interoperation environment. To integrate the object models for the interoperation of federations, this process resolves the differences of HLA standards, provides conversion process between objects with different descriptions and excludes the security objects. We expect that this process enhances the reusability and effectiveness of interoperation of federations in various domains.

Design of FMCW Radar Signal Processor for Human and Objects Classification Based on Respiration Measurement (호흡 기반 사람과 사물 구분 가능한 FMCW 레이다 신호처리 프로세서의 설계)

  • Lee, Yungu;Yun, Hyeongseok;Kim, Suyeon;Heo, Seongwook;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.4
    • /
    • pp.305-312
    • /
    • 2021
  • Even though various types of sensors are being used for security applications, radar sensors are being suggested as an alternative due to the privacy issues. Among those radar sensors, PD radar has high-complexity receiver, but, FMCW radar requires fewer resources. However, FMCW has disadvantage from the use of 2D-FFT which increases the complexity, and it is difficult to distinguish people from objects those are stationary. In this paper, we present the design and the implementation results of the radar signal processor (RSP) that can distinguish between people and object by respiration measurement using phase estimation without 2D-FFT. The proposed RSP is designed with Verilog-HDL and is implemented on FPGA device. It was confirmed that the proposed RSP includes 6,425 LUT, 4,243 register, and 12,288 memory bits with 92.1% accuracy for target's breathing status.

Development of Passive Millimeter-wave Security Screening System (수동 밀리미터파 보안 검색 시스템 개발)

  • Yoon, Jin-Seob;Jung, Kyung Kwon;Chae, Yeon-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.7
    • /
    • pp.138-143
    • /
    • 2016
  • The designed and fabricated millimeter-wave security screening system receives radiation energy from an object and a human body. The imaging system consist of sixteen array antennas, sixteen four-stage LNAs, sixteen detectors, an infrared camera, a CCD camera, reflector, and a focusing lens. This system requires high sensitivity and wide bandwidth to detect the input thermal noise. The LNA module of the system has been measured to have 65.8 dB in average linear gain and 82 GHz~102 GHz in bandwidth to enhance the sensitivity for thermal noise, and to receive it over a wide bandwidth. The detector is used for direct current (DC) output translation of millimeter-wave signals with a zero bias Schottky diode. The lens and front-end of the millimeter-wave sensor are important in the system to detect the input thermal noise signal. The frequency range in the receiving sensitivity of the detectors was 350 to 400 mV/mW at 0 dBm (1 mW) input power. The developed W-band imaging system is effective for detecting and identifying concealed objects such as metal or plastic.