• Title/Summary/Keyword: network surveillance

Search Result 390, Processing Time 0.027 seconds

The Health and Occupation Research Network: An Evolving Surveillance System

  • Carder, Melanie;Hussey, Louise;Money, Annemarie;Gittins, Matthew;McNamee, Roseanne;Stocks, Susan Jill;Sen, Dil;Agius, Raymond M.
    • Safety and Health at Work
    • /
    • v.8 no.3
    • /
    • pp.231-236
    • /
    • 2017
  • Vital to the prevention of work-related ill-health (WRIH) is the availability of good quality data regarding WRIH burden and risks. Physician-based surveillance systems such as The Health and Occupation Research (THOR) network in the UK are often established in response to limitations of statutory, compensation-based systems for addressing certain epidemiological aspects of disease surveillance. However, to fulfil their purpose, THOR and others need to have methodologic rigor in capturing and ascertaining cases. This article describes how data collected by THOR and analogous systems can inform WRIH incidence, trends, and other determinants. An overview of the different strands of THOR research is provided, including methodologic advancements facilitated by increased data quantity/quality over time and the value of the research outputs for informing Government and other policy makers. In doing so, the utility of data collected by systems such as THOR to address a wide range of research questions, both in relation to WRIH and to wider issues of public and social health, is demonstrated.

Efficient Learning and Classification for Vehicle Type using Moving Cast Shadow Elimination in Vehicle Surveillance Video (차량 감시영상에서 그림자 제거를 통한 효율적인 차종의 학습 및 분류)

  • Shin, Wook-Sun;Lee, Chang-Hoon
    • The KIPS Transactions:PartB
    • /
    • v.15B no.1
    • /
    • pp.1-8
    • /
    • 2008
  • Generally, moving objects in surveillance video are extracted by background subtraction or frame difference method. However, moving cast shadows on object distort extracted figures which cause serious detection problems. Especially, analyzing vehicle information in video frames from a fixed surveillance camera on road, we obtain inaccurate results by shadow which vehicle causes. So, Shadow Elimination is essential to extract right objects from frames in surveillance video. And we use shadow removal algorithm for vehicle classification. In our paper, as we suppress moving cast shadow in object, we efficiently discriminate vehicle types. After we fit new object of shadow-removed object as three dimension object, we use extracted attributes for supervised learning to classify vehicle types. In experiment, we use 3 learning methods {IBL, C4.5, NN(Neural Network)} so that we evaluate the result of vehicle classification by shadow elimination.

Violence Recognition using Deep CNN for Smart Surveillance Applications (스마트 감시 애플리케이션을 위해 Deep CNN을 이용한 폭력인식)

  • Ullah, Fath U Min;Ullah, Amin;Muhammad, Khan;Lee, Mi Young;Baik, Sung Wook
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.5
    • /
    • pp.53-59
    • /
    • 2018
  • Due to the recent developments in computer vision technology, complex actions can be recognized with reasonable accuracy in smart cities. In contrast, violence recognition such as events related to fight and knife, has gained less attention. The capability of visual surveillance can be used for detecting fight in streets or in prison centers. In this paper, we proposed a deep learning-based violence recognition method for surveillance cameras. A convolutional neural network (CNN) model is trained and fine-tuned on available benchmark datasets of fights and knives for violence recognition. When an abnormal event is detected, an alarm can be sent to the nearest police station to take immediate action. Moreover, when the probabilities of fight and knife classes are predicted very low, this situation is considered as normal situation. The experimental results of the proposed method outperformed other state-of-the-art CNN models with high margin by achieving maximum 99.21% accuracy.

Evaluation of Application of Possibility of Visual Surveillance System for Cow Heat Detection

  • Park, Heesu;Roy, Pantu Kumar;Noh, Youngju;Park, Hyuk;Lee, Joongho;Shin, Sangtae;Cho, Jongki
    • Journal of Embryo Transfer
    • /
    • v.31 no.2
    • /
    • pp.137-143
    • /
    • 2016
  • This study was conducted to evaluate a visual surveillance system. The advancement of recording technology and network service make it easy to record and transfer the videos. Moreover, progressed recognition technology help to make a distinction each other. Cows show distinguishing behaviors during their estrus period. The mounting is one of the behaviors. The result was different depending on the breed of the cows and the size of the farm. In the case of Korean native cattle, the estrus detection rate was 71.15%, however, dairy cows, the estrus detection rate was 39.38%. At the farms having below 6 modules, the estrus detection rate was 87.41%. On the other hand, at the farms having over 6 modules, the estrus detection rate was 77.78%. With the proper progress, the visual surveillance system can be used to detect heat detection.

Development of an Intelligent Security Robot System for Home Surveillance (가정용 지능형 경비 로봇 시스템 개발)

  • Park, Jeong-Ho;Shin, Dong-Gwan;Woo, Chun-Kyu;Kim, Hyung-Chul;Kwon, Yong-Kwan;Choi, Byoung-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.8
    • /
    • pp.810-816
    • /
    • 2007
  • A security robot system named EGIS-SR is a mobile security robot through one of the new growth engine project in robotic industries. It allows home surveillance through an autonomous mobile platform using onboard cameras and wireless security sensors. EGIS-SR has many sensors to allow autonomous navigation, hierarchical control architecture to handle lots of situations in monitoring home surveillance and mighty networks to achieve unmanned security services. EGIS-SR is tightly coupled with a networked security environment, where the information of the robot is remotely connected with the remote cockpit and patrol man. It achieved an intelligent unmanned security service. The robot is a two-wheeled mobile robot and has casters and suspension to overcome a doorsill. The dynamic motion is verified through $ADAMS^{TM}$ simulation. For the main controller, PXA270 based hardware platform based on linux kernel 2.6 is developed. In the linux platform, data handling for various sensors and the localization algorithm are performed. Also, a local path planning algorithm for object avoidance with ultrasonic sensors and localization using $StarGazer^{TM}$ is developed. Finally, for the automatic charging, a docking algorithm with infrared ray system is implemented.

Application of AIS in AtoN Wireless Surveillance System

  • Liu, Chang;Liu, Ren-Jie;Shi, Xiao-Fei;Huang, Yao-Liang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2006.10a
    • /
    • pp.129-133
    • /
    • 2006
  • In China, the traditional method of artificial and periodical cruise is still adopted for the AtoN management, which has brought many disadvantages to the work of the AtoN management, such as non real-time, fallibility, and low efficiency However, with the rapid development of AIS technique, now AIS equipments have been widely installed on ships, and on the other hand China Maritime Safety Administration (abr. China MSA) is carrying out the scheme of AIS base station network in china, based on which the digital AtoN will develop in the future. According to what have been analyzed above, this paper puts forward a design of AtoN wireless surveillance system based on AIS. The system consists of AIS on AtoN, AIS base station and AtoN management center. It can provide such functions as the information gathering, managing of AtoN and the service of navigation assistance. This paper gives the whole design including the work theory, the hardware structure and the software scheme of the system, and finally gives the simulation software of the AtoN management center. The AtoN wireless surveillance system brought forward by this paper will be more efficient with less repair cost and less work of the supervisors. It will bring revolutionary progress in the navigation aids system in China.

  • PDF

Device Identification System for Corporate Internal Network Visibility in IoT Era (IoT 시대 기업 내부 네트워크의 가시성 확보를 위한 단말 식별 시스템 설계)

  • Lee, Dae-Hyo;Kim, Yong-Kwon;Lee, Dong-Bum;Kim, Hyeob
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.

China's Satellite Research and Development to Collect Electronic Signals for Marine Reconnaissance to Surrounding Nations (중국의 주변국 해양감시를 위한 전자신호 수집위성 연구개발)

  • Lee, Yongsik;Aom, Sangho;Lim, Jaesung
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.3
    • /
    • pp.54-62
    • /
    • 2017
  • China has invested for military satellite technology development to construct the space-based surveillance system from existing land-based and aerostat surveillance system since 1960s to react rapidly for deployment of marine force of United States and surrounding nations in west Pacific, south China sea and Indian ocean. China has also launched about 40 the Yaogan military intelligence satellites series for EO, SAR and ELINT fields since 2006 after the required technique with several technical experiment satellites launch and operational test. ELINT satellites transmit data from satellite to earth station in real time with construction space-based network around it. Those data are simultaneously delivered to Anti-Ship Ballistic Missile(ASBM) connected land-based C4ISR network for marine target attack. Therefore China has enhanced surveillance and attack capability to the surrounding marine nations with space-based network around it. In the future, It is considered that China will increase accurate location search, signal processing and analysis ability through a further study on its technology.

Intelligence Security and Surveillance System in Sensor Network Environment Using Integrated Heterogeneous Sensors (이 기종간 통합 센서를 이용한 센서네트워크 환경에서의 지능형 보안감시 시스템)

  • Oh, Suk-Jun;Moon, Seung-Jin;Choi, Sun-O
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.551-562
    • /
    • 2013
  • Current CCTV systems, which require continuous monitoring of the screens, have the limitation to detect and respond to the crime scenes in timely manner. Therefore, in recent years, the request for more intlligent surveillance system, with a ubiquitous sensor network, is increasing in order to behave more humanly fashions. Such systems require cllective data processing of the environments based on various sensors. In this article, we suggests a new paradigm based surveillance system which integrates PSD and dual PIR sensors. The proposed system evlves from a existing indoor intrusion detection system which can only identify the intrusion event to a better inteligent system with context awareness. We have conducted the various simulations in order to prove the effectiveness of the proposed system.