Review Article |
A Study on Edge Board for Blur Image Judgment and Cluster Image Behavior Analysis: AI-Based Image Processing System Research
Author(s) : Hee-Chul Kim
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 10, Issue 2
Publisher : FOREX Publication
Published : 10 June 2022
e-ISSN : 2347-470X
Page(s) : 218-224
Abstract
The purpose of this study is to solve the problem that the control center cannot cope with the situation properly due to the difficulty of analyzing the behavior in the case of cluster images or the occurrence of unclear images due to weather conditions and fine dust. Edge board development is necessary for cases in which the image sharpness check and overlap image check are inaccurate. In addition, evaluation techniques such as PSNR (; Peak Signal-to-Noise Ratio) and SSIM (; Structural Similarity Index) are used for the corresponding images to evaluate the degree of image improvement of the model with a validation dataset for each fixed image. After evaluating the model's inference speed in terms of FPS (; Frame Per Second), verification is performed for each stored model for each training, and the improvement rate of the image is calculated to evaluate which model is the most optimal for each weather condition. Development of modular edge board for CCTV (; Closed Circuit Television) linked event processing and ICPoIP (; Image Check Processing over IP) system for hybrid-based image classification, video improvement solution and superimposed image shape analysis by linking with the video control system Develop solutions for image processing systems to advance the performance of the image processing system.
Keywords: Edge board
, Image processing
, Superposition
, Video monitoring system
, Enhancement
, Convolutional Neural Networks
Hee-Chul Kim, Professor, Department of Computer Engineering, Gwangju University, South Korea; Email: jaziri@daum.net
[1] J. Saidov, B. Kim, J. Lee and G. Lee, “Hardware Interlocking Security System with Secure Key Update Mechanisms In IoT Environments,”J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 671-678.[Cross Ref]
[2] H. A. Rowley, S. Baluja & T. Kanade. (1996). Neural network-based face detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(1), 23-38. DOI: 10.1109/34/65564 [Cross Ref]
[3] Y. Min, “Cognitive ability measurement technology latest technology trend," Korea Institute of Science and Technology Information, 2016[Cross Ref]
[4] D.B, Parker, "The Strategic values of Information Security in Business," Computer & Security, Information Security, vol. 16, 1997, pp. 572-582.[Cross Ref]
[5] D. Dodson, M. Souppaya & K. Scarfone. (2019). Mitigating the risk of software vulnerabilities by adopting a Secure Software Development Framework (SSDF). NIST Cybe rsecurity White Paper.[Cross Ref]
[6] J. H. Bang & J. D. Ji. (2017). Certification trends and improvement direction of dom estic testing for software assurance. Review of Korea Institute of Information Security and Cryptology, 26(1), 42-4[Cross Ref]
[7] I. Cho and S. Yeom, “Long Distance Face Detection with Region of Interest Extraction,” J. of Korea Institute of Intelligent Systems, vol. 28, no.3, 2018, pp. 281-286.[Cross Ref]
[8] Y. Lee, “A Semantic Dignosis and Tracking System to prevent the Spread of COVID-19 in Korea, 2020” Korea Institute of Electronic Communication Sciences, vol.15, no3, 2020, pp-611-616.[Cross Ref]
[9] M. Bor, J. Edward, and U. Roedig, “LoRa for the Internet of Things,” In Proc. International Conference on Embedded Wireless Systems and Networks, Graz, Austria, Feb. 2016. pp. 361-366.[Cross Ref]
[10] K. Nam, “A Study on the Office Management Service Platform based on M2M/IoT,” J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 12, Dec. 2014, pp. 1405-1413.[Cross Ref]
[11] J. Jang, C. Choi, and D. Kim, “Design of Smart Tourism in Big Data,” J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 637-644.[Cross Ref]
[12] H. Lee and J. Oh, “Design and Implementation of a Small Server Room Environment Monitoring System by Using the Arduino,” J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, Apr. 2017, pp. 386-387.[Cross Ref]
[13] Grand View Research. (2020). Cyber Security Market Size, Share & Trends Analysis Report By Component, By Security Type, By Solution, By Service, By Deployment, By Organization, By Application, By Region, And Segment Forecasts, 2020 – 2027.[Cross Ref]
[14] S. M. Lee & S. H. Yun. (2018). A study on delay factors in apartment housing project through case study. International Next-gene ration Convergence Technology Association, 2(1), 6-14.[Cross Ref]
[15] J. I. Heo. (2020). Advanced design of smart air purifier for single-person households. Master's thesis, Graduate School, Hongik University.[Cross Ref]
[16] Y. H. Kim & S. S. Lee. (2019). Physical properties of adsorption matrix for improving indoor air quality using cork. Journal of the Architectural Institute of Korea, 39(2), 676-677.[Cross Ref]
Hee-Chul Kim (2022), A Study on Edge Board for Blur Image Judgment and Cluster Image Behavior Analysis: AI-Based Image Processing System Research. IJEER 10(2), 218-224. DOI: 10.37391/IJEER.100229.