• Title/Summary/Keyword: Object Division

Search Result 772, Processing Time 0.034 seconds

Moving Object Detection using Gaussian Pyramid based Subtraction Images in Road Video Sequences (가우시안 피라미드 기반 차영상을 이용한 도로영상에서의 이동물체검출)

  • Kim, Dong-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5856-5864
    • /
    • 2011
  • In this paper, we propose a moving object detection method in road video sequences acquired from a stationary camera. Our proposed method is based on the background subtraction method using Gaussian pyramids in both the background images and input video frames. It is more effective than pixel based subtraction approaches to reduce false detections which come from the mis-registration between current frames and the background image. And to determine a threshold value automatically in subtracted images, we calculate the threshold value using Otsu's method in each frame and then apply a scalar Kalman filtering to the threshold value. Experimental results show that the proposed method effectively detects moving objects in road video images.

Design and Implementation of Game Robot based-on Network (네트워크 기반 게임 로봇의 설계 및 구현)

  • Choi, Chan-Yung;Im, Kyoung-Mi;Cho, Seok-Bong;Lim, Jae-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2616-2622
    • /
    • 2010
  • This paper implements the algorithm for Janggi game robot based on network for the disabled people. The movement of target on janggi for them is designed using wireless robot and voice recognition. To remove obstacles, we implement the algorithm for moving object based on $A^{\ast}$ algorithm. We test the janggi game and certify effectiveness of moving object through the implementation of algorithm for them.

Security Improvement of File System Filter Driver in Windows Embedded OS

  • Seong, Yeon Sang;Cho, Chaeho;Jun, Young Pyo;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.834-850
    • /
    • 2021
  • IT security companies have been releasing file system filter driver security solutions based on the whitelist, which are being used by several enterprises in the relevant industries. However, in February 2019, a whitelist vulnerability was discovered in Microsoft Edge browser, which allows malicious code to be executed unknown to users. If a hacker had inserted a program that executed malicious code into the whitelist, it would have resulted in considerable damage. File system filter driver security solutions based on the whitelist are discretionary access control (DAC) models. Hence, the whitelist is vulnerable because it only considers the target subject to be accessed, without taking into account the access rights of the file target object. In this study, we propose an industrial device security system for Windows to address this vulnerability, which improves the security of the security policy by determining not only the access rights of the subject but also those of the object through the application of the mandatory access control (MAC) policy in the Windows industrial operating system. The access control method does not base the security policy on the whitelist; instead, by investigating the setting of the security policy not only for the subject but also the object, we propose a method that provides improved stability, compared to the conventional whitelist method.

Group Management Model of Information Appliances based on Real-Time Object (실시간 객체 기반 정보가전들의 그룹 관리 모델)

  • Jang, Jae-Ho;Lim, Jeong-Taek;Shin, Chang-Sun;Kim, Nam-Gyun;Joo, Su-Chong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1303-1306
    • /
    • 2004
  • 본 논문에서는 홈 네트워킹을 통해 서비스를 수행하는 정보가전들을 하나의 그룹으로 관리하여, 가정 내에 산재한 정보가전들의 관리의 효율성 및 기기들의 확장성과 분산 투명성을 제공할 수 있는 그룹 관리 모델을 제안한다. 정보가전들의 그룹핑이 필요한 이유는 정보가전 기기들의 복잡한 상호작용을 하나의 그룹으로 관리하고, 향후 그룹으로 구성될 수 있는 기기들의 정보를 관리하여 다양한 통신 환경에서 사용자의 요청에 적합한 정보가전들의 수행 환경을 제공할 수 있기 때문이다. 본 연구에서는 실시간 객체인 TMO(Time-triggered Message-triggered Object) 스키마를 기반으로 정보가전들을 구현하며, 이를 분산 객체그룹(Distributed Object Group)에 적용하여 분산 객체 관리 서비스와 실시간 서비스를 지원받도록 한다.마지막으로 이와 같은 그룹 서비스를 통해 가정 내 주거 환경을 유지하는 정보가전들의 수행성을 시뮬레이션하여, 본 그룹 모델이 지원하는 서비스를 통한 정보가전들의 동작과 상호작용의 정확성을 검증한다.

  • PDF

Adversarial Attacks for Deep Learning-Based Infrared Object Detection (딥러닝 기반 적외선 객체 검출을 위한 적대적 공격 기술 연구)

  • Kim, Hoseong;Hyun, Jaeguk;Yoo, Hyunjung;Kim, Chunho;Jeon, Hyunho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.6
    • /
    • pp.591-601
    • /
    • 2021
  • Recently, infrared object detection(IOD) has been extensively studied due to the rapid growth of deep neural networks(DNN). Adversarial attacks using imperceptible perturbation can dramatically deteriorate the performance of DNN. However, most adversarial attack works are focused on visible image recognition(VIR), and there are few methods for IOD. We propose deep learning-based adversarial attacks for IOD by expanding several state-of-the-art adversarial attacks for VIR. We effectively validate our claim through comprehensive experiments on two challenging IOD datasets, including FLIR and MSOD.

Real-time 3D multi-pedestrian detection and tracking using 3D LiDAR point cloud for mobile robot

  • Ki-In Na;Byungjae Park
    • ETRI Journal
    • /
    • v.45 no.5
    • /
    • pp.836-846
    • /
    • 2023
  • Mobile robots are used in modern life; however, object recognition is still insufficient to realize robot navigation in crowded environments. Mobile robots must rapidly and accurately recognize the movements and shapes of pedestrians to navigate safely in pedestrian-rich spaces. This study proposes real-time, accurate, three-dimensional (3D) multi-pedestrian detection and tracking using a 3D light detection and ranging (LiDAR) point cloud in crowded environments. The pedestrian detection quickly segments a sparse 3D point cloud into individual pedestrians using a lightweight convolutional autoencoder and connected-component algorithm. The multi-pedestrian tracking identifies the same pedestrians considering motion and appearance cues in continuing frames. In addition, it estimates pedestrians' dynamic movements with various patterns by adaptively mixing heterogeneous motion models. We evaluate the computational speed and accuracy of each module using the KITTI dataset. We demonstrate that our integrated system, which rapidly and accurately recognizes pedestrian movement and appearance using a sparse 3D LiDAR, is applicable for robot navigation in crowded spaces.

URC Service Composition System Using Template Object Model (템플릿 객체 모델을 이용한 URC서비스 컴포지션 시스템)

  • Kang Sang-Seung;Ha Young-Guk;Sohn Joo-Chan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.565-567
    • /
    • 2005
  • 지능적인 로봇 서비스를 위해 기존의 로봇 태스크 틴 행위 기반의 컴포지션 개념이 유비쿼터스 공간 상에 존재하는 모든 활용 가능한 서비스를 포함하는 개념으로 확대되어야 할 필요성이 있다. 본 논문은 시맨틱 웹 서비스 환경에서 URC 서비스를 표현하는 메타 정보를 기술한 서비스 템플릿 객체 모델을 기반으로 자동으로 웹 서비스를 선택하고 구성하여 적절한 로봇 서비스 플랜을 생성해주는 URC 서비스 컴포지션 시스템을 제안한다. 제안한 시스템은 기존의 웹 서비스들과 다른 컴포넌트들을 조합하고 연결하기 위해 필요한 액티비티들로 구성된 일련의 프로세스인 서비스 플랜을 생성해주며, 생성된 서비스 플랜을 기반으로 서비스 실행 엔진을 통해 해당 서비스를 호출하여 실제 로봇 서비스를 제공하게 된다.

  • PDF

Optimal Route Determination Technology based on Trajectory Querying Moving Object Database (과거 궤적정보를 이용한 경로 산출 방법)

  • Min, Kyoung-Wook;Kim, Ju-Wan;Park, Jong-Hyun
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.169-174
    • /
    • 2005
  • 위치기반서비스(LBS)에서는 사람, 차량과 같은 이동체의 위치 정보를 획득하며, 이동객체 DBMS의 개발로 이동체가 움직인 궤적 정보를 효율적으로 저장 관리할 수 있다. 이동객체 DBMS에 저장된 이동체가 실제 움직인 과거 궤적정보는 다양한 형태로 가공되어 활용이 가능하다. 본 논문에서는 이동체의 과거 궤적정보를 이용하여 경로 안내를 위한 경로 산출 방법에 대하여 제안한다. 기존의 경로 안내는 교통정보 수집 장치를 통해 획득한 교통 정보를 이용하여 경로를 산출하는 방식이 많이 사용되고 있어, 교통 정보가 없는 곳에서는 단순 초행길 안내 수준이다. 그러나, 본 논문에서 제안하는 방법은 고비용이 소요되는 교통정보수집장치가 없는 곳에 대해서도 과거 차량의 움직인 궤적정보를 이용하여 보다 효율적인 경로 안내를 할 수 있는 장점이 있다.

  • PDF

A Study of the 780 Music of DDC (DDC에 있어서의 음악분야 분류상의 제문제)

  • Hahn Kyung-Shin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.26
    • /
    • pp.75-112
    • /
    • 1994
  • The purpose of this study is to investigate the problems concerning 780 music division of DDC. The object is especially arrangement of 780 music in the 20th edition of DDC which is the complete revision. The result is summarized as follows : 1. Although music is an important subject in humanities, especially in arts, it was classified as one division (780) not class. 2. The arrangement of 780 music is severely west-oriented music theory, vocal music and instrumental music. 3. Classification number of 780 music becomes longer because of the limitation of decimal notation. 4. 780 music division of DDC neglects music theory and emphasizes music practicing, especially performance. 5. The assignment of classification number is unbalanced, especially between theory and practice, composition and performance, and among sub-sections of vocal and instrumental music. 6. Many important subject are omitted in DDC music schedule, for example, musicology and branches of musicology, composition and traditional instruments of many countries. 7. Employment of terminology is often improper and inconsistant.

  • PDF

PLATFORM FOR PRIVACY CONTROL IN LOCATION BASED SERVICES

  • An, Kyoung-Hwan;Min, Kyoung-Wook;Kim, Ju-Wan
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.659-662
    • /
    • 2005
  • Recently, the need for LBS (Location Based Services) is increasing with the rapid growth of the location measurement units, mobile devices, and communication technologies. Especially, wireless carriers are concentrating on LBS since it is regarded as so-called 'killer application' among wireless data services. Although LBS give us convenience and useful information, its use also raises privacy issues. There are quite possibilities that the people's locations are tracked by location measurement units while people do not recognize the existence of the units. To protect a person's location information, lawful and technical aspects should be considered. In this paper, we explain issues, regulations, standards, and platforms related to the protection of the location information. Finally, we suggest the architecture of a platform complying with the regulations and standards. It considers various issues not covered in other studies.

  • PDF