• Title/Summary/Keyword: Surveillance systems

Search Result 744, Processing Time 0.027 seconds

Region-Based Reconstruction Method for Resolution Enhancement of Low-Resolution Facial Image (저해상도 얼굴 영상의 해상도 개선을 위한 영역 기반 복원 방법)

  • Park, Jeong-Seon
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.5
    • /
    • pp.476-486
    • /
    • 2007
  • This paper proposes a resolution enhancement method which can reconstruct high-resolution facial images from single-frame, low-resolution facial images. The proposed method is derived from example-based reconstruction methods and the morphable face model. In order to improve the performance of the example-based reconstruction, we propose the region-based reconstruction method which can maintain the characteristics of local facial regions. Also, in order to use the capability of the morphable face model to face resolution enhancement problems, we define the extended morphable face model in which an extended face is composed of a low-resolution face, its interpolated high-resolution face, and the high-resolution equivalent, and then an extended face is separated by an extended shape vector and an extended texture vector. The encouraging results show that the proposed methods can be used to improve the performance of face recognition systems, particularly to enhance the resolution of facial images captured from visual surveillance systems.

Methodology for Evaluating Real-time Rear-end Collision Risks based on Vehicle Trajectory Data Extracted from Video Image Tracking (영상기반 실시간 후미추돌 위험도 분석기법 개발)

  • O, Cheol;Jo, Jeong-Il;Kim, Jun-Hyeong;O, Ju-Taek
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.5
    • /
    • pp.173-182
    • /
    • 2007
  • An innovative feature of this study is to propose a methodology for evaluating safety performance in real time based on vehicle trajectory data extracted from video images. The essence of evaluating safety performance is to capture unsafe car-following events between individual vehicles traveling surveillance area. The proposed methodology applied two indices including real-time safety index (RSI) based on the concept of safe stopping distance and time-to-collision (TTC) to the evaluation of safety performance. It is believed that outcomes would be greatly utilized in developing a new generation of video images processing (VIP) based traffic detection systems capable of producing safety performance measurements. Relevant technical challenges for such detection systems are also discussed.

Security Improvement Plan for Nationwide Key Energy Facilities (국가주요에너지시설 보안향상방안)

  • Chung, Taehwang
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.2
    • /
    • pp.263-267
    • /
    • 2015
  • This study shows the result of the security assessment of the nationwide key energy facilities and suggests the ways of improving the security level. According to the study, most of the energy facilities are adequately equipped with physical security factors such as security personnel, security systems, fences, and guard posts, but lack of awareness is pervasive among those concerned, so the security operation is inefficient. In other words, inefficient deployment of security personnel, lack of the fundamental knowledge of the security systems, excessive dependence on surveillance cameras' functions such as Pan/Tilt/Zoom, misplaced cameras, low efficiency of monitoring, and irrelevant security plans. To solve these problems, above all, the authority concerned need to develop professional training programs to secure certified security mangers, and need to standardize security process to ensure consistency and to harness the standardization as a source of self assessment to improve security level.

Vulnerability Analysis on a VPN for a Remote Monitoring System

  • Kim Jung Soo;Kim Jong Soo;Park Il Jin;Min Kyung Sik;Choi Young Myung
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.346-356
    • /
    • 2004
  • 14 Pressurized Water Reactors (PWR) in Korea use a remote monitoring system (RMS), which have been used in Korea since 1998. A Memorandum of Understanding on Remote Monitoring, based on Enhanced Cooperation on PWRs, was signed at the 10th Safeguards Review Meeting in October 2001 between the International Atomic Energy Agency (IAEA) and Ministry Of Science and Technology (MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an Internet system for Remote Monitoring. According to the Internet-based Virtual Private Network (VPN) applied to Remote Monitoring, the Korea Atomic Energy Research Institute (KAERI) came to an agreement with the IAEA, using a Member State Support Program (MSSP). Phase I is a Lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of Phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated System (SDIS) Server, IAEA Server and TCNC (Technology Center for Nuclear Control) Server. In each system, Virtual Private Network (VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS Server and VPN; TCNC Server and VPN; and IAEA Server and VPN) via penetration testing.

Building Sensor P2P Network Design using Embedded System (임베디드 시스템을 이용한 빌딩 센서 P2P 네트워크 설계)

  • 이정기;이준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1086-1090
    • /
    • 2004
  • Architecture generation is the first step in the design of software systems. Most of the qualities that the final software system possesses are usually decided at the architecture development stage itself. Thus, if the final system should be usable, testable, secure, high performance, mobile and adaptable, then these qualities or non-functional requirements should be engineered into the architecture itself. In particular, adaptability is emerging as an important attribute required by almost all software systems. The machinery and tools in the remote site surveillance and connects intelligence information machinery and tools at Internet. We need the server which uses different embedded operating system to become private use. With the progress of information-oriented society, many device with advanced technologies invented by many companies. However, the current firmware technologies have many problems to meet such high level of new technologies. In this paper, we have successfully ported linux on an embedded system, which is based on intel Strong ARM SA-1110 processor, then written several network modules for internet-based network devices.

Realization of Unified Protocol of Multi-functional Controller for Transfer of Vehicle Information on the Roads (차량 검지정보 전송을 위한 다기능 제어기 통합 프로토콜 구현)

  • Ahn, Seung-Yong;Lim, Sung-Kyu;Lee, Seung-Yo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.12
    • /
    • pp.1857-1863
    • /
    • 2012
  • The VDS(Vehicle Detection System) collects and transfers information about traffic situations in real time, therefore it makes the traffic management effective. Recently, the VDSs have provided good stability and accuracy in regard to system reliability and functions but they also have showed problems such as raising costs and consuming times when a new system is installed and/or the environmental requirements for the system are set up. The reason of the problems is that up to now the collection of the data and information about the traffic situations has been achieved by the 1:1 information exchange between the traffic control surveillance center and the each traffic field, between equipments and centers, and among data processing equipments and also centers. The communication systems used in the VDS are generally composed of 1 : 1 connection of the lines because the communication protocols are different in the most of the cases mentioned above. Consequently, this makes the number of communication lines become larger and causes the cost for the whole traffic information systems to increase. In this paper, a development of a controller to unify the communication protocols for the VDS is peformed to solve the problems which were mentioned above. Specially, the controller developed in this paper was applied to a radar vehicle detector and tested to show its usefulness. In addition to that, the developed controller was also designed to include functions to transfer the information about weather conditions on the roads.

A Study on Robust Moving Target Detection for Background Environment (배경환경에 강인한 이동표적 탐지기법 연구)

  • Kang, Suk-Jong;Kim, Do-Jong;Bae, Hyeon-Deok
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.55-63
    • /
    • 2011
  • This paper describes new moving target detection technique combining two algorithms to detect targets and reject clutters in video frame images for surveillance system: One obtains the region of moving target using phase correlation method using $N{\times}M$ sub-block images in frequency domain. The other uses adaptive threshold using learning weight for extracting target candidates in subtracted image. The block region with moving target can be obtained using the characteristics that the highest value of phase correlation depends on the movement of largest image in block. This technique can be used in camera motion environment calculating and compensating camera movement using FFT phase correlation between input video frame images. The experimental results show that the proposed algorithm accurately detects target(s) with a low false alarm rate in variety environment using the receiver operating characteristics (ROC) curve.

Analytic Verification of Optimal Degaussing Technique using a Scaled Model Ship (축소 모델 함정을 이용한 소자 최적화 기법의 해석적 검증)

  • Cho, Dong-Jin
    • Journal of the Korean Magnetics Society
    • /
    • v.27 no.2
    • /
    • pp.63-69
    • /
    • 2017
  • Naval ships are particularly required to maintain acoustic and magnetic silence due to their operational characteristics. Among them, underwater magnetic field signals derived by ships are likely to be detected by threats such as surveillance systems and mine systems at close distance. In order to increase the survivability of the vessels, various techniques for reducing the magnetic field signal are being studied and it is necessary to consider not only the magnitude of the magnetic field signal but also the gradient of it. In this paper, we use the commercial electromagnetic finite element analysis tool to predict the induced magnetic field signal of ship's scaled model, and arrange the degaussing coil. And the optimum degaussing current of the coil was derived by applying the particle swarm optimization algorithm considering the gradient constraint. The validity of the optimal degaussing technique is verified analytically by comparing the magnetic field signals after the degaussing with or without gradient constraint.

Improvement of Construction Management Process for the Site Manager in Small Scale Building Construction Project (소규모 건설프로젝트에서 현장관리업무 개선방안)

  • Lee, Da-Un;Yun, Seok-Heon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.18 no.1
    • /
    • pp.81-87
    • /
    • 2018
  • Since February 2017, site managers in small architectural projects are required by the revised building act. In order to address issues for site managers and to improve project efficiency, system improving methods are surveyed and proposed in this study. The key inspection items in the existing surveillance guidance manual were investigated, and the checklist for site managers for a small to medium sized construction site was analyzed. This study also tries to propose using web-based site management systems for improvement of the utilization of checklists. It is expected that these on-site management systems, along with BIM technology, will be able to monitor the small size building construction project in real time and effectively monitor the various problems occurring on-site.

A Study on the Development of the Active Radar Reflector with Enhanced Function (개선된 기능을 갖는 능동 레이더 반사기 개발에 관한 연구)

  • 정종혁;강상욱;조영창;최병진;윤정오;오주환
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.3
    • /
    • pp.38-43
    • /
    • 2000
  • Active radar reflector may be less familiar, since their uses have been limited to military applications, especially the enhancement of the effective radar cross-sections of missile test range in the drone aircraft and missiles. Perhaps the most widely-Down applications of radar transponders are Identification Friend or Foe(IFF) and its civilian counterpart secondary surveilliance radar for Air Traffic Control(ATC), and most recently, as Search And Rescue Transponder(SART) in the Global Maritime Distress and Safety System(GMDSS). Since it happens frequently accidents on the sea, the problems of the contamination more seriously considered. The conventional navigation buoy and utilities are not sufficient to maintain the safety of the sea and thus new structured concept must be considered. Therefore, this paper propose and implement the active radar reflector with a enhanced function. The results are shown that the performance of the system is significantly improved comparing with the conventional utilities.

  • PDF