Abstract:
In order to detect an unmanned aerial vehicle (UAV) in a monitoring area using a rotatable camera, an integrated sensor configures a first detection area in the monitoring area by rotating the camera after fixing the focal length of the camera to an initial value, and configures a second detection area in the monitoring area by rotating the camera after changing at least one of the focal length of the camera and a rotation path representing a distance from the origin of the monitoring area.
Abstract:
A method for transmitting, storing and managing data by compressing data packets to be transmitted and received over an advanced metering infrastructure (AMI) network with low-capacity memory and low-transfer rate. A number of transmission packets may be reduced using at least one of a bitmap interval algorithm that assigns a bitmap value to each interval, thereby reducing a number of request packets, a repeated-bitmap interval algorithm that represents sequential data values as bitmap values by toggling a bit value between 0 and 1 in each data value when a change occurs in the sequential data values, and a run-length encoding algorithm that compresses data by encoding run length of sequential identical data.
Abstract:
In a light-installed area where a plurality of lights are installed, a light managing system senses a moving object that enters the light-installed area and predicts an predicted stop position of the moving object based on record information on a channel of movement corresponding to identification information on the moving object. The light managing system calculates a predicted channel of movement of the moving object based on the predicted stop position, and selects lights to be driven based on the calculated predicted channel of movement. The light managing system turns on the selected lights.
Abstract:
A method and device for detecting an illegal unmanned aerial vehicle (UAV) using a radio wave wall are provided. The method includes generating a radio wave wall between a plurality of reconnaissance UAVs that include a first reconnaissance UAV and second reconnaissance UAVs, using one or more wireless signals transmitted and received between the plurality of reconnaissance UAVs, and determining whether an illegal UAV enters the radio wave wall based on radio signal strengths of wireless signals received from the second reconnaissance UAVs.
Abstract:
An intruder location-based dynamic virtual fence configuration and a multiple image sensor device operation method are provided. A method of detecting an intruder based on a virtual fence includes detecting an intruder invading a virtual fence set in a protection area by using a first image sensor device, and tracking the intruder through cooperation with second image sensor devices adjacent to the first image sensor device, based on information of the intruder.
Abstract:
Provided are a method and system for detecting a UAV using a plurality of image sensors. A method of detecting a UAV includes detecting, by each of a plurality of detection image sensors, a UAV in a UAV detection area, transmitting, when the UAV is detected, position information of the detection image sensor detecting the UAV and distance information of the UAV to a classification image sensor, acquiring, by the classification image sensor, a magnified image of the UAV by setting a parameter of a camera of the classification image sensor according to the position information and the distance information, and classifying a type of the UAV by analyzing the magnified image.
Abstract:
Provided is an artificial intelligence (AI)-based peer-to-peer (P2P) power trading method and apparatus that encourages a household with relatively great power consumption or a household with relatively small power consumption according to a power load pattern for each time period to participate in power trading by optimizing power consumption through AI-based P2P power trading in a cluster including a nanogrid.
Abstract:
In order to predict power consumption, previous measurements, which indicate the actual amount of power consumed in the past, and errors between previous estimates and the previous measurements, are used as first input data, and power consumption estimates for each prediction technique are simultaneously calculated by using the first input data in at least two prediction techniques. Next, the power consumption estimates calculated by each prediction technique and errors between the power consumption estimates and an actual measurement are used as second input data, and the final power consumption is predicted by making an additional power consumption prediction based on the second input data.
Abstract:
In a sensor network system including at least one sensor node and at least one actuator node, a group is formed based on attribute of each node. Sensing data is shared among the nodes in the group, and each node performs autonomous processing to process an event by comparing the sensing data with a preset event threshold value.