• Title/Summary/Keyword: Surveillance systems

Search Result 744, Processing Time 0.028 seconds

Assessment of Inundation Rainfall Using Past Inundation Records and CCTV Images (CCTV영상과 과거침수기록을 활용한 침수 강우량 평가 - 강남역을 중심으로 -)

  • Kim, Min Seok;Lee, Mi Ran;Choi, Woo Jung;Lee, Jong Kook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.6_1
    • /
    • pp.567-574
    • /
    • 2012
  • For the past few years, the video surveillance market has shown a rapid growth due to the increasing demand for Closed Circuit Television(CCTV) by the public sector and the private security industry. While the overall utilization of CCTV in the public and private sectors is expanding, its usage in the field of disaster management is less than sufficient. Therefore, the authors of this study, in an effort to revisit the role of CCTV in disaster situations, have carried out a case analysis in the vicinity of the Gangnam Station which has been designated as a natural disaster-prone area. First, the CCTV images around the target location are collected and the time and depth of inundation are measured through field surveys and image analyses. Next, a rainfall analysis was conducted using the Automatic Weather Station(AWS) data and the past inundation records. Lastly, the authors provide an estimate of rainfall for the areas around the station and suggest viable warning systems and countermeasures. The results from this study are expected to make positive contributions towards a significant reduction of the damages caused by the floods around the Gangnam Station.

Study of the UCAS Susceptibility Parameters and Sensitivities by using Monte-Carlo Simulation (몬테카를로 모사법을 이용한 무인전투기의 위약도에 영향을 미치는 파라미터와 민감도에 대한 연구)

  • Choi, Kwang-Sik;Lee, Kyung-Tae
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.3
    • /
    • pp.242-253
    • /
    • 2011
  • The typical missions for the current stand-off UAVs are surveillance and reconnaissance. On the other hand, the primary mission for the future UCAS will be combat mission such as SEAD under the man-made ultimately hostile environment including SAM, antiaircraft artillery, threat radar, etc. Therefore, one of the most important challenges in UCAS design is improvement of survivability. The current studies for aircraft combat survivability are focused on the improvement of susceptibility and vulnerability of manned aircraft system. Although the survivability design methodology for UCAS might be very similar to the manned combat system but there are some differences in mission environment, system configuration, performance between manned and unmanned systems. So the parameters and their sensitivities which affect aircraft combat survivability are different in qualitatively and quantitatively. The susceptibility related parameters for F-16 C/D and X-45A as an example of manned and unmanned system are identified and the susceptibility parameter sensitivities are analyzed by using Monte-Carlo Simulation in this study.

Case Study on the Use of CCTV for Realtime Monitoring and Recommended Improvements (상시계측시스템 모니터링을 위한 CCTV 활용사례 및 개선방안 연구)

  • Bae, Sang-Woo;Lee, Jong-Hyun;Kim, Seung-Hyun;Koo, Ho-Bon
    • The Journal of Engineering Geology
    • /
    • v.22 no.4
    • /
    • pp.417-425
    • /
    • 2012
  • CCTV cameras are used for surveillance and purposes of security, and can also be applied for monitoring infrastructure and equipment. In the Cut Slope Management System managed by KICT (Korea Institute of Construction Technology), cut slopes are continuously monitored using a real-time system, with CCTV cameras installed at 119 sites to detect slope activity. Here we compare CCTV images with displacement at three sites and perform a quantitative analysis. Methods for improving CCTV camera management and systems are also discussed with regard to communication, obstacles, and nighttime management.

Reliable Smoke Detection using Static and Dynamic Textures of Smoke Images (연기 영상의 정적 및 동적 텍스처를 이용한 강인한 연기 검출)

  • Kim, Jae-Min
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.10-18
    • /
    • 2012
  • Automatic smoke detection systems using a surveillance camera requires a reliable smoke detection method. When an image sequence is captured from smoke spreading over in the air, not only has each smoke image frame a special texture, called static texture, but the difference between two smoke image frames also has a peculiar texture, called dynamic texture. Even though an object has a static texture similar to that of the smoke, its dynamic texture cannot be similar to that of the smoke if its movement differs from the diffraction action of the smoke. This paper presents a reliable smoke detection method using these two textures. The proposed method first detects change regions using accumulated frame difference, and then picks out smoke regions using Haralick features extracted from two textures.

The Use of Internet of Things and Innovation of the Private Security (사물인터넷의 활용과 민간시큐리티의 혁신)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.101-109
    • /
    • 2017
  • The Internet of things is a system that connects and communicates all sorts of things such as people, objects, and data. It's to create and share information by its own each other. It can be used to enhance the function of private security and has brought about innovative development of private security. The Internet of things is a system that allows devices connected to the Internet to communicate independently of people-objects, objects-objects connected to the Internet. That and can be used in many industries, especially in the private security sector, its value is high. The use of the Internet of things to private security sector can reinforce security zones with always-on surveillance systems, also be enhanced by its own preparedness and response to the situation. However, this study will discusse the application and development of private security in the Internet of things. The practical application of the virtual space is an immediate task and it is also an essential factor in securing security.

A Study on Recognition of New Car License Plates Using Morphological Characteristics and a Fuzzy ART Algorithm (형태학적 특징과 퍼지 ART 알고리즘을 이용한 신 차량 번호판 인식에 관한 연구)

  • Kim, Kwang-Baek;Woo, Young-Woon;Cho, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.273-278
    • /
    • 2008
  • Cars attaching new license plates are increasing after introducing the new format of car license plate in Korea. Therefore, a car new license plate recognition system is required for various fields using automatic recognition of car license plates, automatic parking management systems and arrest of criminal or missing vehicles. In this paper, we proposed an intelligent new car license plate recognition method for the various fields. The proposed method is as follows. First of all, an acquired color image from a surveillance camera is converted to a gray level image and binarized by block binarization method. Second, noises of the binarized image removed by morphological characteristics of cars and then license plate area is extracted. Third, individual characters are extracted from the extracted license plate area using Grassfire algorithm. lastly, the extracted characters are learned and recognized by a fuzzy ART algorithm for final car license plate recognition. In the experiment using 100 car images, we could see that the proposed method is efficient.

  • PDF

Improvement of indirect enzyme-linked immunosorbent assay for detection of Japanese encephalitis virus antibodies in swine sera

  • Yang, Dong-Kun;Kim, Ha-Hyun;Jo, Hyun-Ye;Lee, Seung Heon;Jang, Sang-Ho;Lee, Sang-Oh;Choi, Sung-Suk;Cho, In-Soo
    • Korean Journal of Veterinary Research
    • /
    • v.57 no.1
    • /
    • pp.31-36
    • /
    • 2017
  • Japanese encephalitis (JE) is an important zoonosis caused by the mosquito-transmitted JE virus (JEV), which is a causative agent of reproductive failure in pregnant sows. Detection of JEV antibodies in swine is performed by hemagglutination inhibition (HI), virus neutralization (VN), and the plaque reduction neutralization test (PRNT). The most stringent PRNT is the 90% endpoint PRNT ($PRNT_{90}$). These conventional assays are difficult to carry out in diagnostic laboratories with insufficient instruments or cell culture systems. An alternative assay that is easily conducted and time efficient is required. In this study, we improved the indirect enzyme-linked immunosorbent assay (I-ELISA) with clarified antigen for the detection of JEV antibodies. The I-ELISA results obtained from 175 swine serum samples were compared with HI, VN, and $PRNT_{90}$ results. The sensitivity of I-ELISA was 91.8%, 95.0%, and 94.7% compared with HI, VN, and $PRNT_{90}$ results, respectively. The specificity of I-ELISA was 92.2%, 94.7%, and 94.7% compared with HI, VN, and $PRNT_{90}$ results, respectively. Moreover, the I-ELISA results were significantly correlated with the HI (r = 0.93), VN (r = 0.95), and $PRNT_{90}$ (r = 0.92) results. These results suggest that the improved I-ELISA is useful for serosurveillance of JEV in swine.

Occurrence and Molecular Characterization of Noroviruses in Korean Surface Water Between 2007 and 2010

  • Lee, Gyu-Cheol;Kim, Min-Jeong;Kim, Jong Ik;Lee, Chan Hee
    • Journal of Microbiology and Biotechnology
    • /
    • v.24 no.4
    • /
    • pp.556-562
    • /
    • 2014
  • The occurrence of human norovirus (NoV) genogroup I (GI) and genogroup II (GII) strains was investigated in Korea. Between 2007 and 2010, 265 samples were collected from 89 Korean water source locations. NoV GI was detected in 4.5% and NoV GII in 1.5%. Samples collected in winter had the highest occurrence; 9.4% for NoV GI and 6.3% for NoV GII. NoV GI detection was highest in groundwater, with the next highest in river water and the lowest in lake water (5.9%, 5.4%, and 1.6%, respectively), and NoV GII was found only in river water. When three representative Korean basin systems (Han (H)-, Geum/Seom (G/S)-, and Nakdong (N)-river basins) were compared, both NoV genogroups were high in the G/S-, but absent in the H- river basin. The most prevalent genotypes within the GI and GII groups were GI.5 and GII.4, respectively. The NoVs found in surface water were identical to those found in patients and those found in groundwater. The NoVs appeared to be transmitted from the patient to the surface water, and then to the groundwater, suggesting a fecal-oral route of transmission. This is the first nationwide surveillance of NoV in major Korean water sources.

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

Analysis of Common Data Link Technology Trends for the Next Generation Korean Common Data Link Development (차세대 한국형 공용데이터링크 개발을 위한 국·내외 공용데이터링크 기술 동향 분석)

  • Kang, Wipil;Song, Juhyung;Lee, Kyunghoon;Lee, Dae-Hong;Jung, Sung-Jin;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.209-222
    • /
    • 2014
  • NCW is a new operational concept for modern warfare to improve the ability to conduct combat by connecting command and control system via network. To realize NCW integrating information sharing system between multiple platforms, CDL is considered as a key component for high-speed transmission of ISR data. Accordingly, further studies to enhance the performance of CDL are being performed around the world, and our government has also developed self-reliant CDL, MPI-CDL. However, the maximum data rate and networking performance of current CDL still fall short of the objective to enable multiple systems to share the large ISR data. Therefore, in this paper, we analyze the development flow and international technical trends of CDL, and present an approach for enhancing data rate and networking capacity of the next generation CDL.