• Title/Summary/Keyword: Tracking Location

Search Result 910, Processing Time 0.025 seconds

Target Motion Analysis for a Passive Sonar System with Observability Enhancing (가관측성 향상을 통한 수동소나체계의 표적기동 분석)

  • 한태곤;송택렬
    • The Journal of the Acoustical Society of Korea
    • /
    • v.18 no.6
    • /
    • pp.9-16
    • /
    • 1999
  • As a part of target motion analysis(TMA) with highly noisy bearings-only measurements from a passive sonar system, a nonlinear batch estimator is proposed to provide the initial estimates to a sequential estimator called the modified gain extended Kalman filter(MGEKF). Based on the system observability analysis of passive target tracking, a practical and effective method is suggested to determine the observer maneuvers for improved TMA performance through system observability enhancing. Also suggested is a method to determine observer location for enhanced system observability at the initial phase of TMA from various engagement boundaries which represent the relationship between observer-target relative geometrical data and system observability. The proposed TMA methods are tested by a series of computer simulation runs.

  • PDF

Development of Real-Time Tracking System Through Information Sharing Between Cameras (카메라 간 정보 공유를 통한 실시간 차량 추적 시스템 개발)

  • Kim, Seon-Hyeong;Kim, Sang-Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.6
    • /
    • pp.137-142
    • /
    • 2020
  • As research on security systems using IoT (Internet of Things) devices increases, the need for research to track the location of specific objects is increasing. The goal is to detect the movement of objects in real-time and to predict the radius of movement in short time. Many studies have been done to clearly recognize and detect moving objects. However, it does not require the sharing of information between cameras that recognize objects. In this paper, using the device information of the camera and the video information taken from the camera, the movement radius of the object is predicted and information is shared about the camera within the radius to provide the movement path of the object.

Implementation of Path Finding Method using 3D Mapping for Autonomous Robotic (3차원 공간 맵핑을 통한 로봇의 경로 구현)

  • Son, Eun-Ho;Kim, Young-Chul;Chong, Kil-To
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.2
    • /
    • pp.168-177
    • /
    • 2008
  • Path finding is a key element in the navigation of a mobile robot. To find a path, robot should know their position exactly, since the position error exposes a robot to many dangerous conditions. It could make a robot move to a wrong direction so that it may have damage by collision by the surrounding obstacles. We propose a method obtaining an accurate robot position. The localization of a mobile robot in its working environment performs by using a vision system and Virtual Reality Modeling Language(VRML). The robot identifies landmarks located in the environment. An image processing and neural network pattern matching techniques have been applied to find location of the robot. After the self-positioning procedure, the 2-D scene of the vision is overlaid onto a VRML scene. This paper describes how to realize the self-positioning, and shows the overlay between the 2-D and VRML scenes. The suggested method defines a robot's path successfully. An experiment using the suggested algorithm apply to a mobile robot has been performed and the result shows a good path tracking.

A Study on the Indoor/Outdoor Positioning System Based on Multiple Sensors (다중 센서 기반의 실내외 측위 시스템에 관한 연구)

  • Hwang, Chi-Gon;Lee, Hae-Jun;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.643-644
    • /
    • 2018
  • Recently indoor and outdoor location tracking systems are operated in different ways. The indoor positioning method uses WiFi and BLE beacon positioning, and the outdoor positioning uses GPS and PDR. In this paper, it is a device to measure position by using it. It is used to check whether it is indoors or outdoors when measuring based on a smart phone, A automatic conversion method is needed. When using GPS in the room, it is difficult to distinguish the floor or space. We propose a method to solve this problem.

  • PDF

RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number (시프트 연산과 난수를 이용한 가변적 대칭키 기반의 RFID 상호인증 프로토콜)

  • Lee, Jae-Kang;Oh, Se-Jin;Chung, Kyung-Ho;Lee, Chang-Hee;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.377-384
    • /
    • 2012
  • RFID system is a technique to obtain information of tag using radio frequency. Specificity of RFID systems using radio frequency has many problems that is eavesdropping, location tracking, spoofing attack, replay attack, denial of service attack. So, RFID protocol should be used cryptographic methods and mutual authentication for security and privacy. In this paper, we explain the problem of past protocol and propose the nonfixed symmetric key-based RFID mutual authentication protocol using shift computation and random number. Proposed protocol is secure from various attacks. Because it use shift operation and non-fixed symmetric key.

Improvement of TDOA-Based Localization Method for Port Logistics Environment (항만 물류 환경을 위한 TDOA 기반 측위 기법의 개선)

  • Choi, Hoon;Ji, Dong-Hwan;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.99-106
    • /
    • 2009
  • The tracking information of objects or persons plays the important role for being advanced of the technology in the logistics management or processing. In this paper, we propose the TDOA-based localization method for port logistics environment for obtaining accurate location of a tag which is attached to some objects or persons. The proposed method consists of these modules for precision : An adaptive selection module of base reader, 2.5D locating method and position-restriction method using a map. This paper includes the performance evaluation of those methods. We could see the improved performance in the simulation. And we also implemented the system and achieved the accuracy of DRMS and CEP within 4 meters.

An Energy-Efficient Operating Scheme of Surveillance System by Predicting the Location of Targets (감시 대상의 위치 추정을 통한 감시 시스템의 에너지 효율적 운영 방법)

  • Lee, Kangwook;Lee, Soobin;Lee, Howon;Cho, Dong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.172-180
    • /
    • 2013
  • In this paper, we propose an energy-efficient camera operating scheme to save energy which can be used for mass surveillance cameras. This technique determines how many cameras should be turned on in the consideration of the velocity vector of monitoring targets, which is acquired by DSRC object tracking, the model of the specification of installed cameras, and the road model of installed sites. Also, we address other techniques used to save energy for the surveillance system as well. Throughout performance evaluation, we demonstrate the excellence of our proposed scheme compared with previous approaches.

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

A Study on the Seeker Technology in Guided Weapon System (유도무기체계 탐색기 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.103-109
    • /
    • 2008
  • In this paper, a study on the seeker technology in guided weapon system development. Seeker is guided weapons mounted on the device that is targeted for implementation homing guided looking for confirmation of the target after picking up, tracking, command, induce calculations necessary to induce the target's direction or control device to provide location information to perform a series of features. Therefore, the Seeker is guided weapons systems and important device that determines the performance of one guided control. Explorer is a tactical and strategy guided weapons from different goals and specifications of weapons systems development and encourage economic efficiency, Interoperability, designed to improve the reliability and hit requirements and the more numerous. Therefore, this research through the Explorer's attributes and weapons systems encourage the development direction of the technical details of the offer.

  • PDF

Bandwidth Reservation scheme Using Mobile Tracking (이동체 추적을 이용한 대역폭 예약 기법)

  • 정혜명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10A
    • /
    • pp.1512-1520
    • /
    • 2000
  • The wireless communication network is evolving toward IMT-2000 for providing various multimedia services. In order to accomplish this ultimate goal the effective schemes are required which can dynamically utilize the limited wireless resources based on different traffic characteristics of various services. This paper proposes a novel bandwidth allocation and call admission control scheme to transmit multimedia traffic based on the bandwidth reservation procedure using direction estimation in the IMT-2000 This scheme estimates the position of mobiles based on the mliticriteria decision making in which uncertain parameters such as RSS(Received Signal Strength), the distance between mobile and base station the moving direction and the previous location are participated in the decision process using aggregation function in fuzzy set theory. Its effectiveness is investigated by simulation.

  • PDF