• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.03 seconds

Classification of Unstructured Customer Complaint Text Data for Potential Vehicle Defect Detection (잠재적 차량 결함 탐지를 위한 비정형 고객불만 텍스트 데이터 분류)

  • Ju Hyun Jo;Chang Su Ok;Jae Il Park
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.2
    • /
    • pp.72-81
    • /
    • 2023
  • This research proposes a novel approach to tackle the challenge of categorizing unstructured customer complaints in the automotive industry. The goal is to identify potential vehicle defects based on the findings of our algorithm, which can assist automakers in mitigating significant losses and reputational damage caused by mass claims. To achieve this goal, our model uses the Word2Vec method to analyze large volumes of unstructured customer complaint data from the National Highway Traffic Safety Administration (NHTSA). By developing a score dictionary for eight pre-selected criteria, our algorithm can efficiently categorize complaints and detect potential vehicle defects. By calculating the score of each complaint, our algorithm can identify patterns and correlations that can indicate potential defects in the vehicle. One of the key benefits of this approach is its ability to handle a large volume of unstructured data, which can be challenging for traditional methods. By using machine learning techniques, we can extract meaningful insights from customer complaints, which can help automakers prioritize and address potential defects before they become widespread issues. In conclusion, this research provides a promising approach to categorize unstructured customer complaints in the automotive industry and identify potential vehicle defects. By leveraging the power of machine learning, we can help automakers improve the quality of their products and enhance customer satisfaction. Further studies can build upon this approach to explore other potential applications and expand its scope to other industries.

Real-time Moving Object Recognition and Tracking Using The Wavelet-based Neural Network and Invariant Moments (웨이블릿 기반의 신경망과 불변 모멘트를 이용한 실시간 이동물체 인식 및 추적 방법)

  • Kim, Jong-Bae
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.4
    • /
    • pp.10-21
    • /
    • 2008
  • The present paper propose a real-time moving object recognition and tracking method using the wavelet-based neural network and invariant moments. Candidate moving region detection phase which is the first step of the proposed method detects the candidate regions where a pixel value changes occur due to object movement based on the difference image analysis between continued two image frames. The object recognition phase which is second step of proposed method recognizes the vehicle regions from the detected candidate regions using wavelet neurual-network. From object tracking Phase which is third step the recognized vehicle regions tracks using matching methods of wavelet invariant moments bases to recognized object. To detect a moving object from image sequence the candidate regions detection phase uses an adaptive thresholding method between previous image and current image as result it was robust surroundings environmental change and moving object detections were possible. And by using wavelet features to recognize and tracking of vehicle, the proposed method decrease calculation time and not only it will be able to minimize the effect in compliance with noise of road image, vehicle recognition accuracy became improved. The result which it experiments from the image which it acquires from the general road image sequence and vehicle detection rate is 92.8%, the computing time per frame is 0.24 seconds. The proposed method can be efficiently apply to a real-time intelligence road traffic surveillance system.

Training a semantic segmentation model for cracks in the concrete lining of tunnel (터널 콘크리트 라이닝 균열 분석을 위한 의미론적 분할 모델 학습)

  • Ham, Sangwoo;Bae, Soohyeon;Kim, Hwiyoung;Lee, Impyeong;Lee, Gyu-Phil;Kim, Donggyou
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.23 no.6
    • /
    • pp.549-558
    • /
    • 2021
  • In order to keep infrastructures such as tunnels and underground facilities safe, cracks of concrete lining in tunnel should be detected by regular inspections. Since regular inspections are accomplished through manual efforts using maintenance lift vehicles, it brings about traffic jam, exposes works to dangerous circumstances, and deteriorates consistency of crack inspection data. This study aims to provide methodology to automatically extract cracks from tunnel concrete lining images generated by the existing tunnel image acquisition system. Specifically, we train a deep learning based semantic segmentation model with open dataset, and evaluate its performance with the dataset from the existing tunnel image acquisition system. In particular, we compare the model performance in case of using all of a public dataset, subset of the public dataset which are related to tunnel surfaces, and the tunnel-related subset with negative examples. As a result, the model trained using the tunnel-related subset with negative examples reached the best performance. In the future, we expect that this research can be used for planning efficient model training strategy for crack detection.

A preliminary study for development of an automatic incident detection system on CCTV in tunnels based on a machine learning algorithm (기계학습(machine learning) 기반 터널 영상유고 자동 감지 시스템 개발을 위한 사전검토 연구)

  • Shin, Hyu-Soung;Kim, Dong-Gyou;Yim, Min-Jin;Lee, Kyu-Beom;Oh, Young-Sup
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.1
    • /
    • pp.95-107
    • /
    • 2017
  • In this study, a preliminary study was undertaken for development of a tunnel incident automatic detection system based on a machine learning algorithm which is to detect a number of incidents taking place in tunnel in real time and also to be able to identify the type of incident. Two road sites where CCTVs are operating have been selected and a part of CCTV images are treated to produce sets of training data. The data sets are composed of position and time information of moving objects on CCTV screen which are extracted by initially detecting and tracking of incoming objects into CCTV screen by using a conventional image processing technique available in this study. And the data sets are matched with 6 categories of events such as lane change, stoping, etc which are also involved in the training data sets. The training data are learnt by a resilience neural network where two hidden layers are applied and 9 architectural models are set up for parametric studies, from which the architectural model, 300(first hidden layer)-150(second hidden layer) is found to be optimum in highest accuracy with respect to training data as well as testing data not used for training. From this study, it was shown that the highly variable and complex traffic and incident features could be well identified without any definition of feature regulation by using a concept of machine learning. In addition, detection capability and accuracy of the machine learning based system will be automatically enhanced as much as big data of CCTV images in tunnel becomes rich.

A Link Travel Time Estimation Algorithm Based on Point and Interval Detection Data over the National Highway Section (일반국도의 지점 및 구간검지기 자료의 융합을 통한 통행시간 추정 알고리즘 개발)

  • Kim, Sung-Hyun;Lim, Kang-Won;Lee, Young-Ihn
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.5 s.83
    • /
    • pp.135-146
    • /
    • 2005
  • Up to now studies on the fusion of travel time from various detectors have been conducted based on the variance raito of the intermittent data mainly collected by GPS or probe vehicles. The fusion model based on the variance ratio of intermittent data is not suitable for the license plate recognition AVIs which can deal with vast amount of data. This study was carried out to develop the fusion model based on travel time acquired from the license plate recognition AVIs and the point detectors. In order to fuse travel time acquired from the point detectors and the license plate recognition AVIs, the optimized fusion model and the proportional fusion model were developed in this study. As a result of verification, the optimized fusion model showed the superior estimation performance. The optimized fusion model is the dynamic fusion ratio estimation model on real time base, which calculates fusion weights based on real time historic data and applies them to the current time period. The results of this study are expected to be used effectively for National Highway Traffic Management System to provide traffic information in the future. However, there should be further studies on the Proper distance for the establishment of the AVIs and the license plate matching rate according to the lanes for AVIs to be established.

Single Image Dehazing Using Dark Channel Prior and Minimal Atmospheric Veil

  • Zhou, Xiao;Wang, Chengyou;Wang, Liping;Wang, Nan;Fu, Qiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.341-363
    • /
    • 2016
  • Haze or fog is a common natural phenomenon. In foggy weather, the captured pictures are difficult to be applied to computer vision system, such as road traffic detection, target tracking, etc. Therefore, the image dehazing technique has become a hotspot in the field of image processing. This paper presents an overview of the existing achievements on the image dehazing technique. The intent of this paper is not to review all the relevant works that have appeared in the literature, but rather to focus on two main works, that is, image dehazing scheme based on atmospheric veil and image dehazing scheme based on dark channel prior. After the overview and a comparative study, we propose an improved image dehazing method, which is based on two image dehazing schemes mentioned above. Our image dehazing method can obtain the fog-free images by proposing a more desirable atmospheric veil and estimating atmospheric light more accurately. In addition, we adjust the transmission of the sky regions and conduct tone mapping for the obtained images. Compared with other state of the art algorithms, experiment results show that images recovered by our algorithm are clearer and more natural, especially at distant scene and places where scene depth jumps abruptly.

Throughput Performance Evaluation According to The State Change of A Primary Ship in Maritime Cognitive Radio Networks (해상 인지 무선 네트워크에서 선순위 선박의 상태 변화를 고려한 수율 성능 평가)

  • Nam, Yujin;Lee, Seong Ro;So, Jaewoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1148-1156
    • /
    • 2015
  • The maritime cognitive radio networks (MCRNs) provide the high throughput with a low communication cost because the secondary ships opportunistically access to unused licensed bands of primary ships. In the ground cognitive radio networks, the busy and idle state of a primary user during a frame is not nearly changed because the state of the primary user are slowly changed. However, the state of the primary ship in the MCRNs may be frequently changed in the frame. Therefore, this paper evaluates the throughput of a primary ship and secondary ships in the MCRNs taking the state change of a primary ship into consideration when the fusion center uses the cooperative spectrum sensing. The simulation results show that trade-off between the throughput of a primary ship and that of secondary ships according to the system parameter such as the cooperative spectrum sensing scheme, the number of secondary ships, and the target detection probability.

A Detection Method of Interference from WiFi Network in IEEE 802.15.4 Network (IEEE 802.15.4 네트워크에서 WiFi 네트워크의 간섭 탐지 방법)

  • Song, Myong Lyol
    • Journal of Internet Computing and Services
    • /
    • v.14 no.4
    • /
    • pp.13-24
    • /
    • 2013
  • IEEE 802.15.4 network and WiFi network are installed to overlap each other and configured to use adjacent frequency bands in which case the communication service required by applications can not be guaranteed because of randomly increased frame transmission delay and frequent frame transmission failures at nodes in IEEE 802.15.4 network. In this paper, transmission delay model at IEEE 802.15.4 nodes and an experimental system to evaluate the interference from WiFi traffic are described, then elements for the evaluation of interference are measured with the analysis of their characteristics. A sequential method of using medium access layer and physical layer elements of IEEE 802.15.4 protocols is proposed to decide interference from WiFi network. With the proposed method, if an evaluation function having frame transmission failures and transmission delay as variables returns a value greater than a threshold, intensive measurements of wireless channel power are carried out subsequently and the final decision of interference is made by the calculated average channel power. Experimental results of the method show that the decision time is reduced with increased frequency of decision in comparison to an other similar method.

A Novel Equalization Method of Multiple Transceivers of Multiple Input Multiple Output Antenna for Beam-farming and the Estimation of Direction of Arrival (빔조향 및 전파도래각 추정을 위한 새로운 다중입력 다중출력 안테나 송수신부 구성방법)

  • 이성종;이종환;염경환;윤찬의
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.3
    • /
    • pp.288-300
    • /
    • 2002
  • In this paper, a novel method of equalization of RF transceivers is suggested for MIMO(Multiple Input Multiple Output) antenna actively studied for high speed data transmission in the recent IMT-2000 system. The core of suggestion is in equalizing the transfer characteristics of multiple transceivers using feedback and memory during the predefined calibration time. This makes it possible to weight the signals in the intermediate frequency, which is easier in the application of recently developed DoA(Direction of Arrival) algorithms. In addition, the time varying optimum cell formation according to traffic is feasible by antenna beam-forming based on the DoA information. The suggested method of equalizing multiple transceivers are successfully verified using envelope simulation. two outputs. This paper is concerned with the diagnosis of multiple crosstalk-faults in OSM. As the network size becomes larger in these days, the convent.nal diagnosis methods based on tests and simulation be.me inefficient, or even more impractical. We propose a simple and easily implementable alg?ithm for detection and isolation of the multiple crosstalk-faults in OSM. Specifically, we develop an algorithm for isolation of the source fault in switc.ng elements whenever the multiple crosstalk-faults are.etected in OSM. The proposed algorithm is illustrated by an example of 16$\times$16 OSM.

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.