• Title/Summary/Keyword: Visual Security

Search Result 251, Processing Time 0.027 seconds

On Study for the KANBAN System OF Car Parts Manufacturers (자동차 부품사들의 간판방식 사례 연구)

  • Lee, Jong-Hyung;Lee, Youn-Heui
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.6 no.4
    • /
    • pp.413-420
    • /
    • 2003
  • We can take 'Profit security', in the field Process improvement activity and man-power upgrade in the learning of organization activity or upgrading ability of each peoples. After Tayler System(Scientific Management in1911) and Ford System(Conveyor system in 1913), Toyota System(Ohno's TPS; Toyota Production System around 1980) which was developed by Toyota in Japan in the third productive revolution. This thesis study on the focus of 2 successful examples(P and S companies in Seong-Seo industrial complex Tae-Gu city) which introduce Toyota system can apply to VM(Visual Management), 3jeong(Right Products Right Quantity, Right Box and Right Position)5S(Seiri, Seiton, Seisoh Seiketsu, Sitsuke), JIT(Just In Time), KAIZEN(Improvement), KANBAN System(Logistic) and output of Factory. For examples P company obtained a lot of results(productivity increase 19%, Quality up 46%-36ppm, storage decrease 25% per year), S company obtained a lot of results(productivity increase 20%, Quality up 40%, storage decrease 33% per year, 2600 improvements in 2002. In conclusion Korean KANBAN system (modified Toyota System) is similar to exchange of work as Korean traditional system in agriculture as like dure 'PUMASHI' SANGBU-SANJO) that's autonomous management systems. In conclusion Korea KANBAN system needs apply to not only all the manufacturing industry but also the various fields of industry.

  • PDF

Teleloperation of Field Mobile Manipulator with Wearable Haptic-based Multi-Modal User Interface and Its Application to Explosive Ordnance Disposal

  • Ryu Dongseok;Hwang Chang-Soon;Kang Sungchul;Kim Munsang;Song Jae-Bok
    • Journal of Mechanical Science and Technology
    • /
    • v.19 no.10
    • /
    • pp.1864-1874
    • /
    • 2005
  • This paper describes a wearable multi-modal user interface design and its implementation for a teleoperated field robot system. Recently some teleoperated field robots are employed for hazard environment applications (e.g. rescue, explosive ordnance disposal, security). To complete these missions in outdoor environment, the robot system must have appropriate functions, accuracy and reliability. However, the more functions it has, the more difficulties occur in operation of the functions. To cope up with this problem, an effective user interface should be developed. Furthermore, the user interface is needed to be wearable for portability and prompt action. This research starts at the question: how to teleoperate the complicated slave robot easily. The main challenge is to make a simple and intuitive user interface with a wearable shape and size. This research provides multi-modalities such as visual, auditory and haptic sense. It enables an operator to control every functions of a field robot more intuitively. As a result, an EOD (explosive ordnance disposal) demonstration is conducted to verify the validity of the proposed wearable multi-modal user interface.

Intrusion Detection Algorithm based on Motion Information in Video Sequence (비디오 시퀀스에서 움직임 정보를 이용한 침입탐지 알고리즘)

  • Kim, Alla;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.284-288
    • /
    • 2010
  • Video surveillance is widely used in establishing the societal security network. In this paper, intrusion detection based on visual information acquired by static camera is proposed. Proposed approach uses background model constructed by approximated median filter(AMF) to find a foreground candidate, and detected object is calculated by analyzing motion information. Motion detection is determined by the relative size of 2D object in RGB space, finally, the threshold value for detecting object is determined by heuristic method. Experimental results showed that the performance of intrusion detection is better one when the spatio-temporal candidate informations change abruptly.

A Study on the Information Exchange Technology Between IEDs Using SOAP in Network Based Substation Automation System (네트워크 기반 자동화 변전소에서 SOAP을 이용한 IED간 정보교환기술 연구)

  • Ko, Yun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.9
    • /
    • pp.376-383
    • /
    • 2006
  • In this paper, autonomous information exchange methodology is studied between IEDs using SOAP protocol based on XML and PtP communication to archive the safety and reliability of large-scale system operation. The SOAP protocol has the advantages in the independency Problem for operating systems, using language, platforms and the security problem because it is XML-based RPC protocol. Inference-based solution of the IED is designed as rule-based solution so that the IED internal status, the system status or the faulted zone can be inferred autonomously using the internal data as well as information data obtained from free information exchange among other IEDS, Also, it is designed so that the inference results and the operation information are transmitted to the above SCADA system, and determined autonomously whether the commands from the SCADA are executed or not. Finally, The inference-based solution of IED and information exchange system among IEDS is implemented using MS Visual C++ MFC, MS SOAP and MS XML. Availability and accuracy of the proposed methodology and the design is verified from diversity simulation reviews for typical distribution substation.

Design and Implementation of The Spam E-Mail filtering System (스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.413-417
    • /
    • 2002
  • E-mail was very particular way of communication in the past, but it becomes one of daily communication methods now. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or badthings, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

An Intelligence Embedding Quadruped Pet Robot with Sensor Fusion (센서 퓨전을 통한 인공지능 4족 보행 애완용 로봇)

  • Lee Lae-Kyoung;Park Soo-Min;Kim Hyung-Chul;Kwon Yong-Kwan;Kang Suk-Hee;Choi Byoung-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.4
    • /
    • pp.314-321
    • /
    • 2005
  • In this paper an intelligence embedding quadruped pet robot is described. It has 15 degrees of freedom and consists of various sensors such as CMOS image, voice recognition and sound localization, inclinometer, thermistor, real-time clock, tactile touch, PIR and IR to allows owners to interact with pet robot according to human's intention as well as the original features of pet animals. The architecture is flexible and adopts various embedded processors for handling sensors to provide modular structure. The pet robot is also used for additional purpose such like security, gaming visual tracking, and research platform. It is possible to generate various actions and behaviors and to download voice or music files to maintain a close relation of users. With cost-effective sensor, the pet robot is able to find its recharge station and recharge itself when its battery runs low. To facilitate programming of the robot, we support several development environments. Therefore, the developed system is a low-cost programmable entertainment robot platform.

Automatic Detection System for Dangerous Abandoned Objects Based on Vision Technology (비전 기술에 기반한 위험 유기물의 자동 검출 시스템)

  • Kim, Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.69-74
    • /
    • 2009
  • Abandoned objects should be treated as possibly dangerous things for public areas until they turn out to be safe because explosive material or chemical substance is intentionally contained in them for public terrors. For large public areas such as airports or train stations, there are limits in man-power for security staffs to check all the monitors for covering the entire area under surveillance. This is the basic motivation of developing the automatic detection system for dangerous abandoned objects based on vision technology. In this research, well-known DBE is applied to stably extract background images and the HOG algorithm is adapted to discriminate between human and stuff for object classification. To show the effectiveness of the proposed system, experiments are carried out in detecting intrusion for a forbidden area and alarming for abandoned objects in a room under surveillance.

  • PDF

Facilitating the Usage of Value Management Processes by Charactering Capital Facility Projects

  • Cha Hee Sung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.2 s.18
    • /
    • pp.144-152
    • /
    • 2004
  • Defining value as a measure of how well the project value objectives are met, Value Management Process (VMP) is considered to be any management effort or process that can proactively pursue one or more project objectives (i.e., security/safety, cost effectiveness, schedule optimization, and risk containment). The collection of 44 VMPs has been established based on a rigorous effort conducted by Construction Industry Institute (CII). Because varying circumstances on each project determine the level of suitability, it is crucial to identify which VMP should be implemented on a particular project. The current VMP selection process is primarily based on human intuition. The main objective of this paper is to provide a systematic method to facilitate the usage of VMPs on a particular project. This paper identified and quantified the selection principles (i.e., targeted value objectives, timing of initiation, project characteristics, and relative impact). The data collected from industry practitioners and VMP experts characterized each VMP in terms of the magnitude of benefit. An automated selection tool by Visual Basic Application (VBA) on MS Excel TM, was developed and proved its validity. As a pioneering study, this paper provides a comprehensive and structured knowledge on the subject of VMPs. From the industry's perspective, the automated selection tool, the premier of this study, contributes the facilitation of the VMP implementations in the construction industry thereby maximizing the potential benefits to a particular project.

Design of Rehabilitation Program Contents using Motion Detection Sensors (동작인식센서를 이용한 재활 프로그램 콘텐츠 설계)

  • Jang, Jae-Youl;Lee, Young-Sik;Kim, Do-Moon;Lee, Tae-Hee;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.903-910
    • /
    • 2018
  • The necessary rehabilitation training for patients with disability currently does not match the actual amount of training conducted, which requires interest in rehabilitation treatment, continued investment and infrastructure for rehabilitation contents, while the most common forms of rehabilitation treatment comprises of art, music, and play treatments. In this paper, we provide a game-style rehabilitation program including audio and visual elements through motion detection process on the patient and design a digital game rehabilitation program that allows different level of management for various categories of disabled people.

Copyright Protection of E-books by Data Hiding Based on Integer Factorization

  • Wu, Da-Chun;Hsieh, Ping-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3421-3443
    • /
    • 2021
  • A data hiding method based on integer factorization via e-books in the EPUB format with XHTML and CSS files for copyright protection is proposed. Firstly, a fixed number m of leading bits in a message are transformed into an integer which is then factorized to yield k results. One of the k factorizations is chosen according to the decimal value of a number n of the subsequent message bits with n being decided as the binary logarithm of k. Next, the chosen factorization, denoted as a × b, is utilized to create a combined use of the

    and elements in the XHTML files to embed the m + n message bits by including into the two elements a class selector named according to the value of a as well as a text segment with b characters. The class selector is created by the use of a CSS pseudo-element. The resulting web pages are of no visual difference from the original, achieving a steganographic effect. The security of the embedded message is also considered by randomizing the message bits before they are embedded. Good experimental results and comparisons with exiting methods show the feasibility of the proposed method for copyright protection of e-books.