박사

사전 위험 회피를 위험 지능형 위험 요소 인식 = Intelligent Risk Identification for Precautionary Risk Avoidance

윤신숙 2018년
논문상세정보
' 사전 위험 회피를 위험 지능형 위험 요소 인식 = Intelligent Risk Identification for Precautionary Risk Avoidance' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 범죄 예방
  • 사물인터넷
  • 위험 인식
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
1,471 0

0.0%

' 사전 위험 회피를 위험 지능형 위험 요소 인식 = Intelligent Risk Identification for Precautionary Risk Avoidance' 의 참고문헌

  • Yoon, S. S., Ryu, C. K. and Suh, D. H. (2014). A Novel Way of BPA Calculation for Context Inference using Sensor Signals, International Journal of Smart Home, 8(1), 1-8.
  • Watkins, D. (1997). Clementine’s Neural Networks Technical Overview, ISL.
  • Wang, J. (2008). Integration of gps/ins/vision Sensors to Navigate Unmanned Aerial Vehicles, The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 37, Part B1, 963-970.
  • Venkat, I. and DeWilde, P. (2011). Robust Gait Recognition by Learning and Exploiting Sub-gait Characteristics, International Journal of Computer Vis.91(1), 7–23.
  • Vadivukkarasi, K., Kumar, R. and Mary, J. (2015). A Real Time RSSI Based Novel Algorithm to Improve Indoor Localization Accuracy for Target Tracking in Wireless Sensor Networks, ARPN journal of Engineering and Applied Sciences, 7015-7023.
  • Supreme Prosecutors' Office (2017). Crime Occurrence and Criminal Characteristics Trend for 10 years (2007~2016), Crime analysis statistics, 3-40.
  • Suh, D. H. and Ryu, C. K. (2013). A Novel Weighting Method for Context Inference, International Journal of Multimedia and Ubiquitous Engineering, 8(1), 91-100.
  • Suh, D. H. and Ryu, C. K. (2011). Multi-sensor Data Fusion Using Weighting Method based on Event Frequency, The Journal of The Korea Institute of Electronic Communication Sciences, 6(4), 581-587.
  • SafeMap, http://www.safemap.go.kr/main/smap.do
  • Ryu, U. J., Kim, E. T., An, K. H. and Chang, Y. S. (2013). Accuracy Improvement Methode of Step Count Detection Using Variable Amplitude Threshold, KIPS Transactions on Computer and Communication Systems, 2(6), 257-264.
  • Ryu, K. H. and Cho, Y. J. (2014). A Study on the Development of the CPTED(Crime Prevention Through Environmental Design) Manual.
  • Roncek, D. and Maier, P. (1991). Bars, Blocks, and Crimes Revisited: Linking the theory of routine activities to the empiricism of hot spots, Criminology, 29(4), 725-753.
  • Rahaman, M., Currie, G. and Muir, C. (2015). Measuring Station Design Quality for Personal Safety, Preliminary Results, 21, 1-15.
  • Philips, C. (1999). A Review of CCTV evaluations: Crime reduction effects and attitudes Towards its USA, Crime Prevention Studies, 10(1), 123-155.
  • Parkinso, B. W., and Spliker, J. J. Jr. (1996). Global Position System:Theory and Applications, Volume I, II, American Institute of Aeronautics and Astronautics Inc.
  • Park, J., Cho, S. and Cho, K. B. (1998). Moving Target Tracking Technique of MTI Radar Using Adaptive Kalman Filter, Journal of the KSAS, 26(2), 91-99.
  • Park, H. H. (2013). Developing a Model for Crime Prevention Hardware Performance Test and Certification System, Korean security science review, 36, 255-292.
  • Owusu, G., Wrigley-Asante, C., Oteng-Ababio, M. and Owusu, A. Y. (2015). Crime Prevention through Environmental Design (CPTED) and Built-environmental Manifestations in Accra and Kumasi, Ghana. Crime Prevention and Community Safety, 17(4), 249-269.
  • Oh, C. S. (1996). Neurocomputer, Naehe Publisher, 68-114.
  • Newman, O. (1972). Defensible Space, Crime prevention through urban design, Macmillian, New York.
  • National Police Agency Life Safety Bureau (2017). Desirable Direction of CPTED Policy, CPTED Development Policy Report.
  • Nam, Y. Y., Choi, Y. J. and Cho, W. D. (2010). Human Activity Recognition using an Image Sensor and a 3-axis Accelerometer Sensor, Journal of Korean Society for Internet Information, 11(1), 129-141.
  • Murray, M. P., Drought, A. B. and Kory, R. C. (1964). Walking Patterns of Normal Man, Journal of Bone and Joint Surgery, 46(A2), 335-360.
  • Murray, M. P. (1967). Gait as a Total Pattern of Movement, American Journal of Physical Medicine, 46(1), 290-332. 1967
  • Matovski, D. S., Nixon, M. S., Mahmoodi, S., and Carter, J. N. (2012). The Effect of Time on Gait Recognition Performance, IEEE Transaction Information Forensics and Security, 7(2), 543-552.
  • Lu, T., Guo, X., Zhao, L., Li, Y., Lin, P. and Fang, B. (2015). Security Model for Sensitive Information Systems and Its Applications in Sensor Networks, International Journal of Security and Its Applications, 9(5), 1-18.
  • Lee, J., Park, H. and Oh, S. (2008). A Study on the Crime Prevention through Environmental Design(CPTED) Strategy for the Application in Korea, A Preliminary Inquiry, Journal of The Korean Regional Development Association, 20(2), 213-232.
  • Kwapis, J. R., Weiss, G. M. and Moore, S. A. (2010). Activity Recognition using Cell Phone Accelerometers, ACM SIGKDD Explorations Newsletter, 12(2), 74-82.
  • Kim, Y. K., Kim, S. M., Lho, H. S. and Cho, W. D. (2011). Real-Time Step Count Detection Algorithm Using a Tri-Axial Accelerometer, Journal of Korean Society for Internet Information, 12(3)
  • Kim, S. M., Lee, D. and Chun, M. (2014). Infrared Gait Recognition using Wavelet Transform and Linear Discriminant Analysis, Journal of Korean Institute of Intelligent Systems, 24(6), 622-627.
  • Kim, N. J., Hong, J. H. and Lee, T. S. (2005). Processing of 3-Axial Accelerometer Sensor Data and Its Application, The Korean Contents Association Fall 2005, 3(1), 548-551.
  • Kang, Y. J., Lee, J., Bea, J. and Lee, C. H. (2015). Footstep Detection and Classification Algorithms based Seismic Sensor, Journal of The Institute of Electronics and Information Engineers, 52(1), 162-172.
  • Jeffery, C. R., (1971). Crime Prevention through Environmental Design, Sage Publications, Beverly Hills.
  • Jeffery, C. R. (1977). Crime Prevention through Environmental Design, Sage Publications, London, UK.
  • Jacobs, J. (1967). The Death and Life of Great American Cities, Vintage Books, New York, NY, USA.
  • Iranipoor, N., and Avashpour, B. (2015). Recognition Of Non-Self-Protected In Residential Areas Based On Addiction Problem, Cumhuriyet Science Journal, 36(4), 1527-1537.
  • Hyeon, D. H., and Yun, H. B. (2009). Robust Maneuvering Target Tracking Applying the Concept of Multiple Model Filter and the Fusion of Multi-Sensor, Artificial Intelligence, 15(1), 51-64.
  • Hu, M., Wang, Y., Zhang, Z. and Zhang, D. (2011). Multi-view Multi-stance Gait Identification, Proce. IEEE Int. Conf. Image Process, 541-544.
  • Han, Y. H. (2015). Step Count Detection Algorithm using Acceleration Sensor, Journal of rehabilitation welfare engineering & assistive technology,9(3), 245-250.
  • Guivant, J. (2000). High Accuracy Navigation using Laser Range Sensors in Outdoor Applications, International Conference on Robotics & Automation 2000, 4, 3817-3822.
  • Glasgow Caledonian University (2009). Secured by Design Impact Evaluation Key Findings.
  • Farrington, P., Coid, W., Harnett, M., Jolliffe, D., Soteriou, N., Turner, E. and West, J. (2006). Criminal Careers up to age 50 and Life Success up to age 48: new Findings from the Cambridge Study of Delinquent Development. 2nd edition, Home Office Research, Development and Statistics Directorate.
  • Faragher, R. (2012). Understanding the Basis of the Kalman Filter Via a Simple and Intuitive Derivation [Lecture Notes], IEEE Signal Processing Magazine, 29(5), 128-132.
  • Elzamly, A., Hussin, B., Abu Naser, S. S. and Doheir, M. (2015). Classification of Software Risks with Discriminant Analysis Techniques in Software planning Development Process, International Journal of Advanced Science and Technology, 81, 35-48.
  • Dernbach, S., Das, B., Krishnan, N. C., Thomas, B. L. and Cook, D. J. (2012). Simple and Complex Activity Recognition through Smart Phones, Proceeding of the 8th International Conference on Intelligent Environments, 214-221.
  • Dempster, A. P. (1967). Upper and Lower Probabilities Induced by a Multivalued Mapping, Annals of Mathematical Statistics, 38, 325-339.
  • Dempster, A. P. (1966). New Methods for Reasoning Towards Posterior Distributions Based on Sample Data, Annals of Mathematical Statistics, 37, 355-374.
  • Crowe, T. D. (2000). Crime Prevention through Environmental Design: Applications of Architectural Design and Space Management Concepts, Butterworth-Heinemann
  • Cozens, P. M., Saville, G. and Hiller, D. (2005). Crime Prevention through Environmental Design(CPTED): a review and modern bibliography, Property management, 23, 328-356.
  • Cozens, P. M. and Love, T. (2015). A Review and Current Status of Crime Prevention through Environmental Design (CPTED), Journal of Planning Literature.
  • Cornish, D. B. and Clarke, R. V. (2003). Theory for Practice in Situational Crime Prevention, Crime Prevention Studies, NY: Criminal Justice Press.
  • Clarke, R. V. (1989). Theoretical Background to Crime Prevention through Environmental Design (CPTED) and Situational Prevention In Designing Out Crime, The Conference Papers, 13-20.
  • Chung, S. W., and Yoo, J. H. (2012). Step Recognition Technology for Intelligent video Surveillance, Image security lab. ETRI. 2012.
  • Choi, J. H. and Yoon, Y. I. (2016). Crime prediction Model with Moving Behavior pattern, Journal of Satellite, Information and Communications, 11(1), 55-57.
  • Chen, Q. Whitbrook, A., Aickelin, U. and Roadknight, C. (2014). Data Classification using the Dempster-Shafer method, Journal of Experimental & Theoretical Artificial Intelligence, 26(4), 493-517.
  • Caros, J. (2005). Very Low Complexity Algorithm for Ambulatory Activity Classification, 3rd European Medical and Biological Conference EMBEC.
  • Brantingham, P. J. and Brantingham, P. L. (1981). Environmental criminology, Sage Publications, Thousand Oaks.
  • Bogler, P. L. (1987). Tracking a Maneuvering Target using Input Estimation, IEEE Transactions on Aerospace and Electronic Systems, AES–23(3), 298-310.
  • Bhanu, B. and Han, J. (2010). Human Recognition at a Distance in Video, Springer.
  • Bay, H. and Tuytelaars, T. (2006). SURF: Speeded Up Robust Feature, In Computer Vision of Lecture Notes in the Computer Science, Springer, 3951, 404-417.
  • Bar-Shalom, Y. and Li, X. R. (1995). Multitarget Multisensor Tracking:Principles and Techniques, YBS Publishing.
  • Atlas, R. I. (2013). 21st Century Security and CPTED, Designing for Critical Infrastructure Protection and Crime Prevention, CRC Press.
  • ACPO SBD (2016). Secured by Design Homes 2016.