• Title/Summary/Keyword: Real-time tracking

Search Result 1,536, Processing Time 0.025 seconds

A Study on Implementation of an Intelligent Video Surveillance System for Effective Education Method of Image Processing (효율적인 영상 처리 교육방법을 위한 지능형 영상 감시 시스템 구현에 관한 연구)

  • Park, Ho-Sik
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.1
    • /
    • pp.84-88
    • /
    • 2010
  • Recently, it is essential to have the system which can track down and identity the random object in the space in which security is a high priority. Due to the fact that we mentioned above, in this paper. We suggest the intelligent video surveillance system effective image-process-education in this paper. The experiment was conducted to check and track down the entering vehicle. And, Pan-Tilt-Zoom camera was used to obtain the enlarged image of the object while a vehicle was making stop in target area. As a result, the experiment has shown the data as following. When the object is in motion, success rate is 97.4%, while success rate is 91% when the object is motionless. By using the suggested system, effective image-process-education is should be achieved because the students who participate in the class can have simultaneous access to the system for real time image data and camera control.

  • PDF

A Tracking System of Moving Object using Active Blocks) (액티브 블록을 이용한 단일 이동 물체 추적 시스템)

  • 안인수;최태섭;김광훈;임승하;사공석진
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.21-29
    • /
    • 2000
  • In this paper, we propose a way to detect a moving object efficiently and to track it using the active blocks. Instead of all Pixels in 8*8 Pixel value, any special pixel is extracted and we detect a moving object by comparison and by analysis the difference image information from darkness value of the same area. In the acquisition of image data by software processing, we reduce the number of data which obtain by convert high resolution image to low resolution image, and we can track a moving object in real time. So it can track a moving object in simple system without all the pixel value of the image data or additional VxD(Virtual x Driver). This system can be useful to track of a moving object in fixed block on PC(Personal Computer) and low custom.

  • PDF

Moving Object Detection using Clausius Entropy and Adaptive Gaussian Mixture Model (클라우지우스 엔트로피와 적응적 가우시안 혼합 모델을 이용한 움직임 객체 검출)

  • Park, Jong-Hyun;Lee, Gee-Sang;Toan, Nguyen Dinh;Cho, Wan-Hyun;Park, Soon-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.22-29
    • /
    • 2010
  • A real-time detection and tracking of moving objects in video sequences is very important for smart surveillance systems. In this paper, we propose a novel algorithm for the detection of moving objects that is the entropy-based adaptive Gaussian mixture model (AGMM). First, the increment of entropy generally means the increment of complexity, and objects in unstable conditions cause higher entropy variations. Hence, if we apply these properties to the motion segmentation, pixels with large changes in entropy in moments have a higher chance in belonging to moving objects. Therefore, we apply the Clausius entropy theory to convert the pixel value in an image domain into the amount of energy change in an entropy domain. Second, we use an adaptive background subtraction method to detect moving objects. This models entropy variations from backgrounds as a mixture of Gaussians. Experiment results demonstrate that our method can detect motion object effectively and reliably.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

Object Recognition Face Detection With 3D Imaging Parameters A Research on Measurement Technology (3D영상 객체인식을 통한 얼굴검출 파라미터 측정기술에 대한 연구)

  • Choi, Byung-Kwan;Moon, Nam-Mee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.53-62
    • /
    • 2011
  • In this paper, high-tech IT Convergence, to the development of complex technology, special technology, video object recognition technology was considered only as a smart - phone technology with the development of personal portable terminal has been developed crossroads. Technology-based detection of 3D face recognition technology that recognizes objects detected through the intelligent video recognition technology has been evolving technologies based on image recognition, face detection technology with through the development speed is booming. In this paper, based on human face recognition technology to detect the object recognition image processing technology is applied through the face recognition technology applied to the IP camera is the party of the mouth, and allowed the ability to identify and apply the human face recognition, measurement techniques applied research is suggested. Study plan: 1) face model based face tracking technology was developed and applied 2) algorithm developed by PC-based measurement of human perception through the CPU load in the face value of their basic parameters can be tracked, and 3) bilateral distance and the angle of gaze can be tracked in real time, proved effective.

Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events

  • Ashok Kumar, P.M.;Vaidehi, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.169-189
    • /
    • 2015
  • Detection of anomalous events from video streams is a challenging problem in many video surveillance applications. One such application that has received significant attention from the computer vision community is traffic video surveillance. In this paper, a Lossy Count based Sequential Temporal Pattern mining approach (LC-STP) is proposed for detecting spatio-temporal abnormal events (such as a traffic violation at junction) from sequences of video streams. The proposed approach relies mainly on spatial abstractions of each object, mining frequent temporal patterns in a sequence of video frames to form a regular temporal pattern. In order to detect each object in every frame, the input video is first pre-processed by applying Gaussian Mixture Models. After the detection of foreground objects, the tracking is carried out using block motion estimation by the three-step search method. The primitive events of the object are represented by assigning spatial and temporal symbols corresponding to their location and time information. These primitive events are analyzed to form a temporal pattern in a sequence of video frames, representing temporal relation between various object's primitive events. This is repeated for each window of sequences, and the support for temporal sequence is obtained based on LC-STP to discover regular patterns of normal events. Events deviating from these patterns are identified as anomalies. Unlike the traditional frequent item set mining methods, the proposed method generates maximal frequent patterns without candidate generation. Furthermore, experimental results show that the proposed method performs well and can detect video anomalies in real traffic video data.

The Development of HILS and Test Equipment for Millimeter-Wave (Ka-Band) Seeker's Test and Evaluation (밀리미터파 탐색기 시험 평가를 위한 HILS 및 시험 장비 개발)

  • Song, Sung-Chan;Na, Young-Jin;Yoon, Tae-Hwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.1
    • /
    • pp.47-55
    • /
    • 2012
  • This paper describes the developed HILS and test equipment in order to test the performances of MMW(Millimeter-Wave) seeker which can detect and track a high speed of short-range ballistic missile and aircraft. This system is used to 141 horn antenna array, array switching, and gain and phase control algorithm to simulate various kind of targets and trajectory of high speed and maneuver moving target. In addition, it simulates not only velocity and range for these targets but also clutter and jamming environments. System configuration and implementation and the measurement results of major subsystems such as target motion simulator, simulation signal generator, high speed data aquisition unit, and central control unit are presented. These systems could verify the detection and tracking performance of MMW seeker through dynamic real-time test based on simulation flight scenario.

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

An Automated Technique for Detecting Axon Structure in Time-Lapse Neural Image Sequence (시간 경과 신경계 영상 시퀀스에서의 축삭돌기 추출 기법)

  • Kim, Nak Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.251-258
    • /
    • 2014
  • The purpose of the neural image analysis is to trace the velocities and the directions of moving mitochondria migrating through axons. This paper proposes an automated technique for detecting axon structure. Previously, the detection process has been carried out using a partially automated technique combined with some human intervention. In our algorithm, a consolidated image is built by taking the maximum intensity value on the all image frames at each pixel Axon detection is performed through vessel enhancement filtering followed by a peak detection procedure. In order to remove errors contained in ridge points, a filtering process is devised using a local reliability measure. Experiments have been performed using real neural image sequences and ground truth data extracted manually. It has been turned out that the proposed algorithm results in high detection rate and precision.

Improvement of Steady State Response Using PI+Double Integral Controller (비례적분+이중적분 제어기를 이용한 정상상태 응답 개선)

  • Jung, Gyu Hong
    • Journal of Drive and Control
    • /
    • v.13 no.3
    • /
    • pp.24-31
    • /
    • 2016
  • The performance characteristics of a dynamic control system are evaluated according to the transient and steady-state responses. The transient performance is the controllability of the output for the tracking of the reference or the ability to reduce or reject the effects of unwanted disturbances; alternatively, the steady-state performance is represented by the magnitude of the control error at the steady state. As the effects of the two performances on each other are reciprocal, a controller design that shows a zero steady-state error for the ramp input is uncommon because of the challenge regarding the achievement of an acceptable transient response. This paper proposes a PI+double-integral controller for the elimination of the steady-state error for the ramp input while a sound transient performance is maintained. The control-gain design procedure is described by the second-order response for the step input and the response of the error dynamics for the ramp input. The PI+double-integral controller is designed for the first-order transfer function that is derived from a system identification with the open-loop experiment data of the dc-motor. The simple structure of the proposed controller enables the adoption of a low-end microcontroller for the implementation of a real-time control. The experiment results show that the control performance is as effective as that of the simulation analysis for the operating point of linear system; furthermore, the PI+double-integral controller can be conveniently applied to the control system, which is desirable for the improvement of the steady-state error.