• Title/Summary/Keyword: Issue Detection

Search Result 583, Processing Time 0.038 seconds

Using Mean Shift Algorithm Enhance Edge Detection Effect (에지 추출 향상을 위한 Mean Shift 알고리즘의 이용)

  • Lei, Wang;Shin, Seong-Yoon;Rhee, Yang-Won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.211-214
    • /
    • 2009
  • Edge detection always influenced by noise belong to the original image, therefore need use some methods to sort this issue, mean shift algorithm has the smooth function which suit for the edge detection purpose, so adopted to fade out the unimportant information, and the sensitive noise portions. After this section, use the Canny algorithm to pick up the contour of the objects we focus on, meanwhile select the Soble operator that has the orientation attribute to support the method work well. In final, take experiment and get the perfect result we wanted, make sure this method make sense and better than the sole Edge detection algorithm,

  • PDF

Moving object detection for biped walking robot flatfrom (이족로봇 플랫폼을 위한 동체탐지)

  • Kang, Tae-Koo;Hwang, Sang-Hyun;Kim, Dong-Won;Park, Gui-Tae
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.570-572
    • /
    • 2006
  • This paper discusses the method of moving object detection for biped robot walking. Most researches on vision based object detection have mostly focused on fixed camera based algorithm itself. However, developing vision systems for biped walking robot is an important and urgent issue since hired walking robots are ultimately developed not only for researches but to be utilized in real life. In the research, method for moving object detection has been developed for task assignment and execution of biped robot as well as for human robot interaction (HRI) system. But these methods are not suitable to biped walking robot. So, we suggest the advanced method which is suitable to biped walking robot platform. For carrying out certain tasks, an object detecting system using modified optical flow algorithm by wireless vision camera is implemented in a biped walking robot.

  • PDF

A Study on the Sensor Placement for Structural Damage Detection (구조물의 손상탐지를 위한 센서위치 연구)

  • Choi, Young-Jae;Lee, U-Sik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.6
    • /
    • pp.938-945
    • /
    • 2003
  • In the present study, the inverse perturbation method is applied to the structural damage detection in conjunction with a system condensation technique. The system condensation technique is adopted to r esolve the problem due to the incomplete measurement of the degrees-of-freedom (DOFs) in a natural mode. However, the numerical difficulty may arise in the system condensation when the DOFs to be measured are not properly selected. Thus, the issue of sensor placement for structural damage detection, in the framework of the condensation technique-based inverse perturbation method, is considered in this study. Also, a methodology to measure the number of sensors required to obtain reliable damage detection is proposed and then verified through some illustrative example problem.

Vehicle Shadow Detection in Thermal Videos (열 영상에서의 차량 그림자 제거 기법)

  • Kim, Ji-Man;Choi, Eun-Ji;Lim, Jeong-Eun;Noh, Seung-In;Kim, Dai-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.369-371
    • /
    • 2012
  • Shadow detection and elimination is a critical issue in vision-based system to improve the detection performance of moving objects. However, traditional algorithms are useless at night time because they used the chromaticity and brightness information from the color image sequence. To obtain the high detection performance, we can use the thermal camera and there are shadows by the heat not the light. We proposed a novel algorithm to detect and eliminate the shadows using the thermal intensity and the locality property. By combining two results of the intensity-based and locality-based, we can detect the shadows by the heat and improve the detection performance of moving object.

Multiple-Background Model-Based Object Detection for Fixed-Embedded Surveillance System (고정형 임베디드 감시 카메라 시스템을 위한 다중 배경모델기반 객체검출)

  • Park, Su-In;Kim, Min Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.11
    • /
    • pp.989-995
    • /
    • 2015
  • Due to the recent increase of the importance and demand of security services, the importance of a surveillance monitor system that makes an automatic security system possible is increasing. As the market for surveillance monitor systems is growing, price competitiveness is becoming important. As a result of this trend, surveillance monitor systems based on an embedded system are widely used. In this paper, an object detection algorithm based on an embedded system for a surveillance monitor system is introduced. To apply the object detection algorithm to the embedded system, the most important issue is the efficient use of resources, such as memory and processors. Therefore, designing an appropriate algorithm considering the limit of resources is required. The proposed algorithm uses two background models; therefore, the embedded system is designed to have two independent processors. One processor checks the sub-background models for if there are any changes with high update frequency, and another processor makes the main background model, which is used for object detection. In this way, a background model will be made with images that have no objects to detect and improve the object detection performance. The object detection algorithm utilizes one-dimensional histogram distribution, which makes the detection faster. The proposed object detection algorithm works fast and accurately even in a low-priced embedded system.

Bandwidth Selection for Local Smoothing Jump Detector

  • Park, Dong-Ryeon
    • Communications for Statistical Applications and Methods
    • /
    • v.16 no.6
    • /
    • pp.1047-1054
    • /
    • 2009
  • Local smoothing jump detection procedure is a popular method for detecting jump locations and the performance of the jump detector heavily depends on the choice of the bandwidth. However, little work has been done on this issue. In this paper, we propose the bootstrap bandwidth selection method which can be used for any kernel-based or local polynomial-based jump detector. The proposed bandwidth selection method is fully data-adaptive and its performance is evaluated through a simulation study and a real data example.

A Study on Optimal Traffic Detection Systems by Introduction of Section Detection System (구간검지체계 도입을 통한 교통검지체계 설치기준 연구)

  • Kim, Nak-Joo;Lee, Seung-Jun;Oh, Sei-Chang;Son, Young-Tae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.3
    • /
    • pp.47-63
    • /
    • 2011
  • A traffic detection system can be deemed as a traffic data and information collection system to serve traffic policies, traffic management, and user services. The system plays a crucial role in verifying whether or not the current traffic system has issues or problems by checking out traffic data. In addition, the system does so in finding out a point or a section where an issue or a problem has occurred, if any, and in examining the causes of the issue or problem, the extent of its impact that has occurred and spread, and a method for resolving it. However, the existing point detection system of Korea has too many flaws. In order to fix the flaws, in this paper, the theoretical characteristics of the section detection system were researched in relation to the calculation of travel time. In addition, the travel time of probe cars was obtained by field survey, and it was compared to that of spot and section detection data. Then, simulation was performed to determine the optimal section detection interval. In conclusion, introduction of optimal section detection system was examined in order to achieve the advanced road management including traffic policy, traffic management, and user services.

Statistics based localized damage detection using vibration response

  • Dorvash, Siavash;Pakzad, Shamim N.;LaCrosse, Elizabeth L.
    • Smart Structures and Systems
    • /
    • v.14 no.2
    • /
    • pp.85-104
    • /
    • 2014
  • Damage detection is a challenging, complex, and at the same time very important research topic in civil engineering. Identifying the location and severity of damage in a structure, as well as the global effects of local damage on the performance of the structure are fundamental elements of damage detection algorithms. Local damage detection is essential for structural health monitoring since local damages can propagate and become detrimental to the functionality of the entire structure. Existing studies present several methods which utilize sensor data, and track global changes in the structure. The challenging issue for these methods is to be sensitive enough in identifYing local damage. Autoregressive models with exogenous terms (ARX) are a popular class of modeling approaches which are the basis for a large group of local damage detection algorithms. This study presents an algorithm, called Influence-based Damage Detection Algorithm (IDDA), which is developed for identification of local damage based on regression of the vibration responses. The formulation of the algorithm and the post-processing statistical framework is presented and its performance is validated through implementation on an experimental beam-column connection which is instrumented by dense-clustered wired and wireless sensor networks. While implementing the algorithm, two different sensor networks with different sensing qualities are utilized and the results are compared. Based on the comparison of the results, the effect of sensor noise on the performance of the proposed algorithm is observed and discussed in this paper.

Fast and Robust Face Detection based on CNN in Wild Environment (CNN 기반의 와일드 환경에 강인한 고속 얼굴 검출 방법)

  • Song, Junam;Kim, Hyung-Il;Ro, Yong Man
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1310-1319
    • /
    • 2016
  • Face detection is the first step in a wide range of face applications. However, detecting faces in the wild is still a challenging task due to the wide range of variations in pose, scale, and occlusions. Recently, many deep learning methods have been proposed for face detection. However, further improvements are required in the wild. Another important issue to be considered in the face detection is the computational complexity. Current state-of-the-art deep learning methods require a large number of patches to deal with varying scales and the arbitrary image sizes, which result in an increased computational complexity. To reduce the complexity while achieving better detection accuracy, we propose a fully convolutional network-based face detection that can take arbitrarily-sized input and produce feature maps (heat maps) corresponding to the input image size. To deal with the various face scales, a multi-scale network architecture that utilizes the facial components when learning the feature maps is proposed. On top of it, we design multi-task learning technique to improve detection performance. Extensive experiments have been conducted on the FDDB dataset. The experimental results show that the proposed method outperforms state-of-the-art methods with the accuracy of 82.33% at 517 false alarms, while improving computational efficiency significantly.

Anomaly Intrusion Detection using Neuro-Fuzzy (Neuro-Fuzzy를 애용한 이상 침입 탐지)

  • 김도윤;서재현
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.37-43
    • /
    • 2004
  • Expasion of computer network and rapid growth of Internet have made computer security very important. As one of the ways to deal with security risk, much research has been made on Intrusion Detection System(IDS). The paper, also, addresses the issue of intrusion detection, but especially with Neuro-Fuzzy model. By applying the fuzzy logic which is known to deal with uncertainty to Anomaly Intrusion, it not only overcomes the difficulty of Misuse Intrusion, but also ultimately aims to detect the intrusions yet to be known.

  • PDF