• Title/Summary/Keyword: Information flow objects

Search Result 106, Processing Time 0.02 seconds

Vehicle Tracking using Sequential Monte Carlo Filter (순차적인 몬테카를로 필터를 사용한 차량 추적)

  • Lee, Won-Ju;Yun, Chang-Yong;Kim, Eun-Tae;Park, Min-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.434-436
    • /
    • 2006
  • In a visual driver-assistance system, separating moving objects from fixed objects are an important problem to maintain multiple hypothesis for the state. Color and edge-based tracker can often be "distracted" causing them to track the wrong object. Many researchers have dealt with this problem by using multiple features, as it is unlikely that all will be distracted at the same time. In this paper, we improve the accuracy and robustness of real-time tracking by combining a color histogram feature with a brightness of Optical Flow-based feature under a Sequential Monte Carlo framework. And it is also excepted from Tracking as time goes on, reducing density by Adaptive Particles Number in case of the fixed object. This new framework makes two main contributions. The one is about the prediction framework which separating moving objects from fixed objects and the other is about measurement framework to get a information from the visual data under a partial occlusion.

  • PDF

Design for Container Terminal Simulator Using an Object-oriented Approach (객체지향접근법을 사용한 컨테이너 터미널 시뮬레이터의 설계)

  • Yun, Won-Young;Choi, Yong-Suk;Lee, Myung-Gil;Song, Jin-young
    • IE interfaces
    • /
    • v.13 no.4
    • /
    • pp.608-618
    • /
    • 2000
  • This paper proposes a design procedure to develop the object-oriented simulator of port container terminal. The design methodology uses an object-oriented approach to support an object-oriented simulation and the design procedure consists of object scheme and event scheme. The object-scheme is a procedure to determine the structure of material flow objects and information flow objects and a relation diagram between objects that have attributes and methods. The event scheme is a procedure to define methods and to connect messages of objects. We assume that the container terminal system consists of gate, container yard, and berth and the equipment used in the container terminal are container cranes, transfer cranes, yard tractors, and trailers.

  • PDF

Recognizing multiple moving objects by foveated vision

  • Kiuchi, Yasuhiko;Kuniyoshi, Yasuo;Mishima, Taketoshi;Mizoguchi, Hiroshi;Shigehara, Takaomi
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.881-884
    • /
    • 2000
  • Foveated vision has the big advantage of exhibiting a wide field of view, along with a high resolution fovea. However, in the case of using optical flow, foveated vision kas one demerit. The demerit is a concentrate of optical flow. For foveated vision, an object moves almost only around the center of the field. In this paper, we suggest how to segment motion of some objects, and how to discriminate a hand and another object. In the future, the method we suggested may be useful for recognizing human actions by foveated vision.

  • PDF

Obstacle Detection and Recognition System for Autonomous Driving Vehicle (자율주행차를 위한 장애물 탐지 및 인식 시스템)

  • Han, Ju-Chan;Koo, Bon-Cheol;Cheoi, Kyung-Joo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.229-235
    • /
    • 2017
  • In recent years, research has been actively carried out to recognize and recognize objects based on a large amount of data. In this paper, we propose a system that extracts objects that are thought to be obstacles in road driving images and recognizes them by car, man, and motorcycle. The objects were extracted using Optical Flow in consideration of the direction and size of the moving objects. The extracted objects were recognized using Alexnet, one of CNN (Convolutional Neural Network) recognition models. For the experiment, various images on the road were collected and experimented with black box. The result of the experiment showed that the object extraction accuracy was 92% and the object recognition accuracy was 96%.

Application of Distributed Objects for CAPP (공정계획을 위한 분산객체의 응용)

  • 김준국;이홍희
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.2
    • /
    • pp.155-168
    • /
    • 2002
  • As the market and the organizations of an enterprise expand globally, the rapid and accurate communication gets more important for product manufacturing. The manufacturing information flow among the designers, the process planners and the shop floors is characterized and modelled. Its methods are constructed using distributed objects. Their introduction to the network-based CAPP system offers speed and safety for the system and makes the reconstruction and distribution of the application programs easy. The manufacturing processes are generated based on the feature information of a designed part, then the manufacturing resources are selected using the process planning logic which is implemented by distributed objects. The databases and distributed objects are integrated under the recent internet environments. The developed system makes it possible to manipulate and to transfer the process planning and manufacturing data everywhere in the world.

Research on Application of Service Design Methodology in IOT Environment

  • Kim, Byung-Taek;Cho, Yun-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.53-60
    • /
    • 2017
  • The purpose of this study is to provide empirical and quantitative analysis on user's perceived privacy, security, and user satisfaction when providing visualization information about objects and service provider behaviors that users can not perceive in internet service process. Through previous research, we have examined the importance of privacy and security factors as a key factor to be considered for the characteristics of the Internet of things and the Internet of things. In addition, service blueprint, which is one of the service design methodologies to examine the flow of service usage in providing Internet service of things, was examined. In the flow of things internet service utilization, it is found that the things that are out of the user's cognitive area and the behavior of the service provider take up a large part. Therefore, the hypothesis that the trust of the Internet service security and the satisfaction of the user experience can be improved by providing the security visualization information about the behavior of the object and the invisible service provider in the non-contact aspect of the user and the object. In order to verify the hypothesis, we conducted experiments and questionnaires on the use of virtual objects' internet environment and conducted statistical analysis based on them. As a result, it was analyzed that visual information feedback on non - contact and invisible objects and service provider's behaviors had a positive effect on user's perceived privacy, security, and satisfaction. In addition, we conclude that it can be used as a service design evaluation tool to eliminate psychological anxiety about security and to improve satisfaction in internet service design. We hope that this research will be a great help for the research on application method of service design method in Internet environment of objects.

Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.7
    • /
    • pp.1-8
    • /
    • 2016
  • Nowadays, distributed denial of service (DDoS) attacks on web sites reward attackers financially or politically because our daily lifes tightly depends on web services such as on-line banking, e-mail, and e-commerce. One of DDoS attacks to web servers is called HTTP-GET flood attack which is becoming more serious. Most existing techniques are running on the application layer because these attack packets use legitimate network protocols and HTTP payloads; that is, network-level intrusion detection systems cannot distinguish legitimate HTTP-GET requests and malicious requests. In this paper, we propose a practical detection technique against HTTP-GET flood attacks, based on the access behavior of inline objects in a webpage using NetFlow data. In particular, our proposed scheme is working on the network layer without any application-specific deep packet inspections. We implement the proposed detection technique and evaluate the ability of attack detection on a simple test environment using NetBot attacker. Moreover, we also show that our approach must be applicable to real field by showing the test profile captured on a well-known e-commerce site. The results show that our technique can detect the HTTP-GET flood attack effectively.

Multiple Vehicles Tracking via sequential posterior estimation (순차적인 사후 추정에 의한 다중 차량 추적)

  • Lee, Won-Ju;Yoon, Chang-Young;Lee, Hee-Jin;Kim, Eun-Tai;Park, Mignon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.1
    • /
    • pp.40-49
    • /
    • 2007
  • In a visual driver-assistance system, separating moving objects from fixed objects are an important problem to maintain multiple hypothesis for the state. Color and edge-based tracker can often be 'distracted' causing them to track the wrong object. Many researchers have dealt with this problem by using multiple features, as it is unlikely that all will be distracted at the same time. In this paper, we improve the accuracy and robustness of real-time tracking by combining a color histogram feature with a brightness of Optical Flow-based feature under a Sequential Monte Carlo framework. And it is also excepted from Tracking as time goes on, reducing density by Adaptive Particles Number in case of the fixed object. This new framework makes two main contributions. The one is about the prediction framework which separating moving objects from fixed objects and the other is about measurement framework to get a information from the visual data under a partial occlusion.

Painterly Stroke Generation using Object Motion Analysis (객체의 움직임 해석을 이용한 회화적 스트로크 생성 방법)

  • Lee, Ho-Chang;Seo, Sang-Hyun;Ryoo, Seung-Tack;Yoon, Kyung-Hyun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.4
    • /
    • pp.239-245
    • /
    • 2010
  • Previous painterly rendering techniques normally use image gradients for stroke generation. Although image gradients are useful for expressing object shapes, it is difficult to express the flow or movements of objects of objects. In real painting, the use of brush strokes corresponding to the actual movement of objects allows viewers to recognize objects’ motion better and express the liveliness of the objects much more. In this paper, we propose a novel painterly stroke generation algorithm to express dynamic objects based on their motion information. We first extract motion information (magnitude, direction) of a scene from a set of image sequences from the same view. Then the motion directions are used for determining stroke orientations in the regions with significant motions. Where little motion is observed, image gradients are used for determining stroke orientations. Our algorithm is useful for realistically and dynamically representing moving objects.

Visual Tracking Using Snake Algorithm Based on Optical Flow Information

  • Kim, Won;Lee, Ju-Jang
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1999.10a
    • /
    • pp.13-16
    • /
    • 1999
  • An active contour model, Snake, was developed as a useful segmenting and tracking tool lot rigid or non-rigid (i.e. deformable) objects by Kass in 1987 In this research, Snake is newly designed to cover this large moving case. Image flow energy is proposed to give Snake the motion information of the target object. By this image flow energy Snake's nodes can move uniformly along the direction of the target motion in spite of the existences of local minima. Furthermore, when the motion is too large to apply image flow energy to tracking, a jump mode is proposed for solving the problem. The vector used to make Snake's nodes jump to the new location can be obtained by processing the image flow. The effectiveness of the proposed Snake is confirmed by some simulations.

  • PDF