Journal of the Institute of Electronics Engineers of Korea SC
/
v.49
no.3
/
pp.53-61
/
2012
This paper proposes a real-time distance measurement system of high temperature and high speed target using infrared stereo camera. We construct an infrared stereo camera system that measure the difference between target and background temperatures for automatic target measurement. First, the proposed method detects target region based on target motion and intensity variation of local region using difference between target and background temperatures. Second, stereo matching by left and right target information is used to estimate disparity about real-time distance of target. In the proposed method using infrared stereo camera system, we compare distances in three dimension trajectory measuring instrument and in infrared stereo camera measurement. In this experiment from three video data, the result shows an average 9.68% distance error rate. The proposed method is suitable for distance and position measurement of varied targets using infrared stereo system.
In this paper, we propose a novel algorithm that generates multi-view images by using various image features obtained from the given stereoscopic images. In the proposed algorithm, we first create an intensity gradient saliency map from the given stereo images. And then we calculate a block-based optical flow that represents the relative movement(disparity) of each block with certain size between left and right images. And we also obtain the disparities of feature points that are extracted by SIFT(scale-invariant We then create a disparity saliency map by combining these extracted disparity features. Disparity saliency map is refined through the occlusion detection and removal of false disparities. Thirdly, we extract straight line segments in order to minimize the distortion of straight lines during the image warping. Finally, we generate multi-view images by grid mesh-based image warping algorithm. Extracted image features are used as constraints during grid mesh-based image warping. The experimental results show that the proposed algorithm performs better than the conventional DIBR algorithm in terms of visual quality.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.12
no.4
/
pp.11-21
/
2013
The conventional real-time signal control strategy for oversaturated situation generally requires a number of detectors at the intersection in order to identify the queue length at each approach. Also, existing strategy for the spillback has limited effect due to the temporal spillback control which only reduce the green split at the approach. In this study, a signal control system utilizing the imagery information from ITS roadside equipment is developed for operation of oversaturated intersections. The strategy calculates the saturation ratio based on the queue length extracted from ITS RSE, and designs the signal control variables according to the saturation ratio. The signal control strategy is divided into two phases: oversaturated and supersaturated. In oversaturated conditions, timing plan for main approach is optimized by the queue length. In oversaturated conditions where spillback might occur, the signal timing is designed in order to avoid the spillback. To increase field adaptability, the strategy is designed to adjust the split length, all-red-time, and clearance time, and keep the major signal control variables intact. The result of the simulation shows that in oversaturated conditions, the improvement is similar to the real-time signal control system. In case of, oversaturated conditions, however, the effect of the strategy is superior to that of a real-time system.
The Journal of Korea Institute of Information, Electronics, and Communication Technology
/
v.11
no.4
/
pp.452-459
/
2018
Conventional fire fighting robots are controlled by a remote control to monitor the fire scene or to suppress the fire. However, this method has a problem that it takes a long time to prepare robot and input it to fire place in the golden time after the fire, so that it can not sufficiently serve as a fire fighting robot. Using the autonomous driving fire monitoring robot, when a fire signal is generated, in conjunction with a fire receiver a moving robot takes a video of the fire scene and delivers the image to the fire department, so that the fire fighter can decide if it is real fire or not. Thereby it is possible to prevent a sudden spread of an accident by providing a quick judgment opportunity and at the same time suppressing the fire early. In this paper, we propose an architecture of the autonomous mobile fire monitoring robot and the communication protocol required for the robot to work with the fire receiver. A communication protocol is designed to control multiple fire monitoring robots in real time, and a communication with a fire receiver is designed as a hierarchical network to serve as an interface of an Ethernet network using wireless Wi-Fi. The fire monitoring robot and the wireless communication of the fire receiving period are implemented and the effectiveness of the operation is confirmed through the field test.
Journal of the Korea Academia-Industrial cooperation Society
/
v.20
no.12
/
pp.546-554
/
2019
Typically, closed-circuit television (CCTV) monitoring is mainly used for post-processes (i.e. to provide evidence after an incident has occurred), but by using a streaming video feed, machine-based learning, and advanced image recognition techniques, current technology can be extended to respond to crimes or reports of missing persons in real time. The multi-CCTV cooperation technique developed in this study is a program model that delivers similarity information about a suspect (or moving object) extracted via CCTV at one location and sent to a monitoring agent to track the selected suspect or object when he, she, or it moves out of range to another CCTV camera. To improve the operating efficiency of local government CCTV control centers, we describe here the partial automation of a CCTV control system that currently relies upon monitoring by human agents. We envisage an integrated crime prevention service, which incorporates the cooperative CCTV network suggested in this study and that can easily be experienced by citizens in ways such as determining a precise individual location in real time and providing a crime prevention service linked to smartphones and/or crime prevention/safety information.
Despite being one of the most important national facilities, the National Assembly building of the Republic of Korea has become increasingly vulnerable to potential terrorist attacks, and the instances of demonstrations occurring around and banned items taken into the building are continuing to rise. In addition, promoting the idea of "open assembly" has led to increased visitors and weakened access control. Furthermore, while there is a significant symbolic value attached to attacking the National Assembly building, the level of security management is relatively very low, making it a suitable target for terrorism. In order to address such vulnerability, an appropriate access control system should be in place from the areas surrounding the building. However, the National Assembly Security Service which oversees security around the building is scheduled to disband in June 2020 following the abolition of the conscripted police force in 2023. Therefore, there needs to be an alternative option to bolster the security system outside the facility. In this research, the perceptions of 114 government officials in charge of security at the National Assembly Secretariat toward the protection and security system of the areas surrounding the National Assembly building were examined. Results showed that the respondents believed it was highly likely that risky situations could occur outside the building, and the use of advanced technologies such as intelligent video surveillance, intrusion detection system, and drones was viewed favorably. Moreover, a mid- to long-term plan of establishing a unified three-layer protection system and designating a department in charge of the security outside the building were perceived positively. Lastly, the participants supported the idea of employing private police to replace the National Assembly Security Service for the short term and introducing parliamentary police for the mid- to long-term.
The Journal of the Institute of Internet, Broadcasting and Communication
/
v.18
no.4
/
pp.19-26
/
2018
In recent years, the substantial increase in the population's average age leads to an exceeded number of older persons comparing with the number of any other age group. As a result, both industry and academia are focused on the development of several solutions aimed to guarantee a healthy and safe lifestyle to the elderly. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can also provide more safety for the elderly, offering emergency response mechanisms, fall detection solutions, and video surveillance systems. Unfortunately, due to the sensitive nature of AAL data, AAL systems should satisfy security requirements such as integrity, confidentiality, availability, anonymity, and others. In this paper, we propose an adaptive authentication protocol for the AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.
The Journal of Korean Institute of Communications and Information Sciences
/
v.33
no.2C
/
pp.192-199
/
2008
In ultra-wideband (UWB) systems, conventionally, the synchronization is to align time phases of a locally generated template and any of multipath components to within an allowable range. However, the synchronization with a low-power multipath component could incur significant performance degradation in receiver operation (e.g., detection) after the synchronization. On the other hand, the synchronization with a high-power multipath component can improve the performance in receiver operation after the synchronization. Generally, the first one among multipath components has the largest power. Thus, the synchronization with the first path component can make better performance than that with low-power component in receiver operation after the synchronization, Based on which, we first propose an optimal decision rule based on a maximum likelihood (ML) approach, and then, develope a simpler suboptimal decision rule for selecting the first path component. Simulation results show that the system has good demodulation performance, which uses new synchronization definition and the proposed decision rules have better performance than that of the conventional decision rule in UWB multipath channels. Between macroblocks in the previous and the current frame. On video samples with high motion and scene change cases, experimental results show that (1) the proposed algorithm adapts the encoded bitstream to limited channel capacity, while existing algorithms abruptly excess the limit bit rate; (2) the proposed algorithm improves picture quality with $0.4{\sim}0.9$dB in average.
Fluorescence in situ hybridization (FISH) techniques allow the enumeration of chromosome abnormalities and from a great potential for many clinical applications. In order to produce quantitative and reproducible results, expensive tools such as a cooled CCD camera and a computer software are required. We have developed a Chromosome Image Processing System (Chips) using FISH that allows the detection and mapping of the genetic aberrations. The aim of our study, therefore, is to evaluate the capabilities of our original system using a black-and-white video camera. As a model system, three repetitive DNA probes (D18Z1, DXZ1, and DYZ3) were hybridized to variety different clinical samples such as human metaphase spreads and interphase nuclei obtained from uncultured peripheral blood lymphocytes, uncultured amniocytes, and germ cells. The visualization of the FISH signals was performed using our system for image acquisition and pseudocoloring. FISH images were obtained by combining images from each of probes and DAPI counterstain captured separately. Using our original system, the aberrations of single or multiple chromosomes in a single hybridization experiment using chromosomes and interphase nuclei from a variety of cell types, including lymphocytes, amniocytes, sperm, and biopsied blastomeres, were enabled to evaluate. There were no differences in the image quality in accordance with FISH method, fluorochrome types, or different clinical samples. Always bright signals were detected using our system. Our system also yielded constant results. Our Chips would permit a level of performance of FISH analysis on metaphase chromosomes and interphase nuclei with unparalleled capabilities. Thus, it would be useful for clinical purposes.
During maintenance or construction works in or at the tracks of railways, high risks for passengers and railway staff, especially for the workers on the construction site exist. The high risks result out of the movement of rail vehicles, like trains or construction vehicles, which must be faced by using any available technical and operational technologies for securing them against the environment. Therefore, it is necessary to evaluate the level of protection continuously and to identify new and innovative methods and technologies for the protection of the gang (construction worker, machines and material). Especially on construction sites at line sections with two or more parallel tracks but also with single tracks, there are still a lot of incidents and accidents mostly with seriously injured persons or fatalities. These were mainly gang members that breach the railway-loading gage. By using proper warning or protection systems, the avoidance of such accidents must be achieved. The latest developments. in gang protection systems concern on the one hand fixed barriers in the middle between the construction site and the operated track and on the other hand construction vehicles equipped with automatic warning systems. The disadvantage of such protection methods is that the gang can be warned against an approaching train but a monitoring of the gang members cannot be performed. Only one part of a potential dangerous situation will be detected. If the gang members will overhear the acoustic warning signal of the security staff and the workers will not leave the danger zone in the track, the driver of the approaching train had no chance to react to the dangerous situation. An accident is often inevitable. While the detection of acoustic warning signals by the gang members working on a construction site is very difficult, the acoustical planning of an automatic warning system has to be designed for an acoustic short range level of one meter besides the construction vehicle. The decision about the use of today's technical warning system (fixed systems, automatic warning systems, etc.) must be geared to the technical feasibility and the level of safety which is needed. Criteria for decision guidance to block a track should be developed by danger estimation and economical variables. To realize the actual jurisdiction and to minimize the hazards of railway operations by the use of construction vehicles near the tracks further developments are needed. This means, that the warning systems have to be enhanced to systems for protection, which monitor the realization of the warning signal as a precondition for giving a movement authority to a train. This method can protect against accidents caused by predictable wrongdoing. The actual state of the art technique of using a collective warning combined with additional security staff is no longer acceptable. Therefore, the Institute of Transportation System of the German Aerospace Center in Braunschweig (Germany) will develop a gang warning and protection system based upon imaging methods, with optical sensors such as video in visible and invisible ranges, radar, laser, and other. The advantage of such a system based on the possibility to monitor both the gang itself and the railway-loading gauge either of the parallel track or of the same track still in use. By monitoring both situations, the system will be able to generate a warning message for the approaching train, that there are obstacles in the track, so that the train can be stopped to prevent an accident. And also the gang workers will be warned, while they breach their area.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.