• Title/Summary/Keyword: network surveillance

Search Result 391, Processing Time 0.025 seconds

Design and Implementation for Efficient Multi Version ADS-B Target Report Message Processing (효율적인 다중 버전 ADS-B 타깃 리포트 메시지 처리를 위한 모듈 설계 및 구현)

  • Kim, Kanghee;Jang, Eunmee;Song, Inseong;Cho, Taehwan;Choi, Sangbang
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.265-277
    • /
    • 2015
  • Automatic dependent surveillance-broadcast (ADS-B) is the core technology of communication, navigation and surveillance/air traffic management (CNS/ATM), automatically broadcasts its own position information using GNSS and has an advantage of lower geological constraints and faster update speed compared with legacy radar systems. EUROCONTROL defined all purpose structured eurocontrol surveillance information exchange (ASTERIX) CAT.021. ASTERIX CAT.021 is modified several times, but it has compatibility issues with previous version of it. In this paper, we have designed an efficient message processing module regardless of the version of ASTERIX CAT.021. This implemented module generates patterns to collect messages received from the network, after that, received messages are processed in the routine that is defined in accordance with the patterns.

Sensor Deployment Simulator for Designing Sensor Fields (센서 필드 설계를 위한 배치 시뮬레이터)

  • Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.354-365
    • /
    • 2013
  • Node deployment is one of the important problems in achieving good quality of service in wireless sensor network. The purpose of this paper is to develop an interactive system that supports user's decision makings in designing sensor fields. The system provides grid-based initial deployment algorithm supporting three types of node deployment pattern, area-fill, path-cover, and barrier-cover deployment pattern. After initial deployment, an iterative refinement algorithm can be applied, which takes care of the irregularity of the deployment area and the heterogeneity of sensors. The proposed system helps users to effectively deploy nodes in the sensor field, analyse the detection performance of the deployment, and perform network simulations. The developed system can be utilized as a part of the development environment of the surveillance sensor network system.

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance

  • Lee, Hoo-Rock;Chung, Kyung-Yul;Jhang, Kyoung-Son
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.237-246
    • /
    • 2013
  • Maintenance Access Hatches are used to ensure urban safety and aesthetics while facilitating the management of power lines, telecommunication lines, and gas pipes. Such facilities necessitate affordable and effective surveillance. In this paper, we propose a FiCHS (Fixed Cluster head centralized Hierarchical Static clustering) routing protocol that is suitable for underground maintenance hatches using WSN (Wireless Sensor Network) technology. FiCHS is compared with three other protocols, LEACH, LEACH-C, and a simplified LEACH, based on an ns-2 simulation. FiCHS was observed to exhibit the highest levels of power and data transfer efficiency.

Design and Implementation of Real-Time Surveillance System using TCP/IP Socket (TCP/IP 소켓을 이용한 실시간 감시 시스템 설계 및 구현)

  • Lee, Jong-Sea;Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.68-73
    • /
    • 2008
  • Recently, remote observation and control technology has grown gradually. According to use home network system and expand super-highway information network, digital video technology observation system gradually has increased. In order that the user conveniently use better than to use web browser observation system, it uses existing digital observation system, personal digital assistant and control module in the place of internet.

  • PDF

Implementation of network-based video surveillance system (영상을 이용한 네트워크 기반 감시 시스템 구현)

  • Lee, Ji-Hoon;Kim, Sun-Hyeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.510-512
    • /
    • 2015
  • Recently, people fear is growing because of the various crimes that may occur when you go out. The growing is interest in security systems for the protection of an individual's property. In this paper, to establish a single central server based on the home network when intruders access to city, such as image processing values obtained through the IP camera and distance values disciplined use an ultrasonic sensor the user for an attacker city that will connect to the server the surveillance system provides the information that is received and implemented.

  • PDF

How Can Self Love Lead to Spying on Ex-Partners on Facebook? -The Effects of Ego Factors on Facebook Surveillance -

  • Furbee, Brittany;Ahn, Hongmin
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.187-193
    • /
    • 2019
  • In this study, we attempted to identify the personality traits that influence one's likelihood to stalk an ex-partner on Facebook. Specifically, we focused on self-concept-related traits, given that the motivations for using social network sites (SNS) are highly associated with the concept of self. These include self-esteem, narcissism, and self-efficacy. To assess these factors, we controlled for extraneous variables while assessing the predictive power of personality traits, such as Facebook usage, length of the relationship, and time since the break-up. The results of a self-administered, web-based survey (N=207) showed that self-esteem, narcissism, and self-efficacy are all traits that can predict the stalking of an ex-partner on Facebook. More specifically, we showed a negative association between self-esteem and one's likelihood to stalk an ex-partner on Facebook, while it showed positive relationships between Facebook stalking and both narcissism and self-efficacy.

Design Strategy of Low-Power Node by Analyzing the Hardware Modules in Surveillance and Reconnaissance Sensor Networks (감시정찰 센서네트워크에서 하드웨어 모듈의 소모전력 분석을 통한 저전력 노드 설계 전략)

  • Kim, Yong-Hyun;Yeo, Myung-Ho;Chung, Kwangsue
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.6
    • /
    • pp.761-769
    • /
    • 2012
  • In this paper, we propose a low-power design strategy to minimize energy-consumption for surveillance and reconnaissance sensor networks. The sensor network consists of many different nodes with various operations such as target detection, packet relay, video monitoring, changing protocols, and etc. Each sensor node consists of sensing, computing, communication, and power components. These components are integrated on a single or multiple boards. Therefore, the power consumption of each component can be different on various operation types. First, we identified the list of components and measured power consumption for them from the first prototype nodes. Next, we focus on which components are the main sources of energy consumption. We propose many energy-efficient approaches to reduce energy consumption for each operation type.

Angles-Only Initial Orbit Determination of Low Earth Orbit (LEO) Satellites Using Real Observational Data

  • Hwang, Hyewon;Park, Sang-Young;Lee, Eunji
    • Journal of Astronomy and Space Sciences
    • /
    • v.36 no.3
    • /
    • pp.187-197
    • /
    • 2019
  • The Optical Wide-field patroL-Network (OWL-Net) is a Korean optical space surveillance system used to track and monitor objects in space. In this study, the characteristics of four Initial Orbit Determination (IOD) methods were analyzed using artificial observational data from Low Earth Orbit satellites, and an appropriate IOD method was selected for use as the initial value of Precise Orbit Determination using OWL-Net data. Various simulations were performed according to the properties of observational data, such as noise level and observational time interval, to confirm the characteristics of the IOD methods. The IOD results produced via the OWL-Net observational data were then compared with Two Line Elements data to verify the accuracy of each IOD method. This paper, thus, suggests the best method for IOD, according to the properties of angles-only data, for use even when the ephemeris of a satellite is unknown.

Intelligent Activity Recognition based on Improved Convolutional Neural Network

  • Park, Jin-Ho;Lee, Eung-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.6
    • /
    • pp.807-818
    • /
    • 2022
  • In order to further improve the accuracy and time efficiency of behavior recognition in intelligent monitoring scenarios, a human behavior recognition algorithm based on YOLO combined with LSTM and CNN is proposed. Using the real-time nature of YOLO target detection, firstly, the specific behavior in the surveillance video is detected in real time, and the depth feature extraction is performed after obtaining the target size, location and other information; Then, remove noise data from irrelevant areas in the image; Finally, combined with LSTM modeling and processing time series, the final behavior discrimination is made for the behavior action sequence in the surveillance video. Experiments in the MSR and KTH datasets show that the average recognition rate of each behavior reaches 98.42% and 96.6%, and the average recognition speed reaches 210ms and 220ms. The method in this paper has a good effect on the intelligence behavior recognition.

The coordinated regulation of mitochondrial structure and function by Drp1 for mitochondrial quality surveillance

  • Cho, Hyo Min;Sun, Woong
    • BMB Reports
    • /
    • v.52 no.2
    • /
    • pp.109-110
    • /
    • 2019
  • Mitochondrial morphology is known to be continuously changing via fusion and fission, but it is unclear what the biological importance of this energy-consuming process is and how it develops. Several data have suggested that mitochondrial fission executed by Drp1 is necessary to select out a damaged spot from the interconnected mitochondrial network, but the precise mechanism for the recognition and isolation of a damaged sub-mitochondrial region during mitochondrial fission is yet unclear. Recently, Cho et al. found that the mitochondrial membrane potential (MMP) is transiently reduced by the physical interaction of Drp1 and mitochondrial Zinc transporter, Zip1, at the fission site prior to the typical mitochondrial division, and we found that this event is essential for a mitochondrial quality surveillance. In this review, Cho et al. discuss the role of a mitochondrial fission in the mitochondrial quality surveillance system.