• Title/Summary/Keyword: Tracking algorithm

Search Result 2,940, Processing Time 0.025 seconds

SIFT based Image Similarity Search using an Edge Image Pyramid and an Interesting Region Detection (윤곽선 이미지 피라미드와 관심영역 검출을 이용한 SIFT 기반 이미지 유사성 검색)

  • Yu, Seung-Hoon;Kim, Deok-Hwan;Lee, Seok-Lyong;Chung, Chin-Wan;Kim, Sang-Hee
    • Journal of KIISE:Databases
    • /
    • v.35 no.4
    • /
    • pp.345-355
    • /
    • 2008
  • SIFT is popularly used in computer vision application such as object recognition, motion tracking, and 3D reconstruction among various shape descriptors. However, it is not easy to apply SIFT into the image similarity search as it is since it uses many high dimensional keypoint vectors. In this paper, we present a SIFT based image similarity search method using an edge image pyramid and an interesting region detection. The proposed method extracts keypoints, which is invariant to contrast, scale, and rotation of image, by using the edge image pyramid and removes many unnecessary keypoints from the image by using the hough transform. The proposed hough transform can detect objects of ellipse type so that it can be used to find interesting regions. Experimental results demonstrate that the retrieval performance of the proposed method is about 20% better than that of traditional SIFT in average recall.

Quantitative Analysis of Single Bacterial Chemotaxis Using a Hydrodynamic Focusing Channel (유체역학적 집속 효과를 이용한 단일 박테리아 주화성의 정량적 분석)

  • Jeon, Ho-Jeong;Lee, Yong-Ku;Jin, Song-Wan;Koo, Sang-Mo;Lee, Chang-Soo;Yoo, Jung-Yul
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.31 no.3 s.258
    • /
    • pp.209-216
    • /
    • 2007
  • Bacterial chemotaxis is essential to the study of structure and function of bacteria. Although many studies have accumulated the knowledge about chemotaxis in the past, the motion of a single bacterium has not been studied much yet. In this study, we have developed a device microfabricated by soft lithography and consisting of microfluidic channels. The microfluidic assay generates a concentration gradient of chemoattractant linearly in the main channel by only diffusion of the chemicals. Bacteria are injected into the main channel in a single row by hydrodynamic focusing technique. We measured the velocity of bacteria in response to a given concentration gradient of chemoattractant using the microfludic assay, optical systems with CCD camera and simple PTV (Particle Tracking Velocimetry) algorithm. The advantage of this assay and experiment is to measure the velocity of a single bacterium and to quantify the degree of chemotaxis by statistically analyzing the velocity at the same time. Specifically, we measured and analyzed the motility of Escherichia coli strain RP437 in response to various concentration gradients of L-aspartate statistically and quantitatively by using this microfluidic assay. We obtained the probability density of the velocity while RP437 cells are swimming and tumbling in the presence of the linear concentration gradient of L-aspartate, and quantified the degree of chemotaxis by analyzing the probability density.

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

Feedforward EGR Control of a Passenger Car Diesel Engine Equipped with a DC Motor Type EGR Valve (DC 모터방식 EGR 밸브를 적용한 승용디젤엔진의 앞먹임 공기량 제어에 관한 연구)

  • Oh, Byoung-Gl;Lee, Min-Kwang;Park, Yeong-Seop;Lee, Kang-Yoon;SunWoo, Myoung-Ho;Nam, Ki-Hoon;Cho, Sung-Hwan
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.19 no.5
    • /
    • pp.14-21
    • /
    • 2011
  • In diesel engines, accurate EGR control is important due to its effect on nitrogen oxide and particulate matter emissions. Conventional EGR control system comprises a PI feedback controller for tracking target air mass flow and a feedforward controller for fast response. Physically, the EGR flow is affected by EGR valve lift and thermodynamic properties of the EGR path, such as pressures and temperatures. However, the conventional feedforward control output is indirectly derived from engine operating conditions, such as engine rotational speed and fuel injection quantity. Accordingly, the conventional feedforward control action counteracts the feedback controller in certain operating conditions. In order to improve this disadvantage, in this study, we proposed feedforward EGR control algorithm based on a physical model of the EGR system. The proposed EGR control strategy was validated with a 3.0 liter common rail direct injection diesel engine equipped with a DC motor type EGR valve.

The design and implementation of Object-based bioimage matching on a Mobile Device (모바일 장치기반의 바이오 객체 이미지 매칭 시스템 설계 및 구현)

  • Park, Chanil;Moon, Seung-jin
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.1-10
    • /
    • 2019
  • Object-based image matching algorithms have been widely used in the image processing and computer vision fields. A variety of applications based on image matching algorithms have been recently developed for object recognition, 3D modeling, video tracking, and biomedical informatics. One prominent example of image matching features is the Scale Invariant Feature Transform (SIFT) scheme. However many applications using the SIFT algorithm have implemented based on stand-alone basis, not client-server architecture. In this paper, We initially implemented based on client-server structure by using SIFT algorithms to identify and match objects in biomedical images to provide useful information to the user based on the recently released Mobile platform. The major methodological contribution of this work is leveraging the convenient user interface and ubiquitous Internet connection on Mobile device for interactive delineation, segmentation, representation, matching and retrieval of biomedical images. With these technologies, our paper showcased examples of performing reliable image matching from different views of an object in the applications of semantic image search for biomedical informatics.

Detection of Abnormal Behavior by Scene Analysis in Surveillance Video (감시 영상에서의 장면 분석을 통한 이상행위 검출)

  • Bae, Gun-Tae;Uh, Young-Jung;Kwak, Soo-Yeong;Byun, Hye-Ran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12C
    • /
    • pp.744-752
    • /
    • 2011
  • In intelligent surveillance system, various methods for detecting abnormal behavior were proposed recently. However, most researches are not robust enough to be utilized for actual reality which often has occlusions because of assumption the researches have that individual objects can be tracked. This paper presents a novel method to detect abnormal behavior by analysing major motion of the scene for complex environment in which object tracking cannot work. First, we generate Visual Word and Visual Document from motion information extracted from input video and process them through LDA(Latent Dirichlet Allocation) algorithm which is one of document analysis technique to obtain major motion information(location, magnitude, direction, distribution) of the scene. Using acquired information, we compare similarity between motion appeared in input video and analysed major motion in order to detect motions which does not match to major motions as abnormal behavior.

Development of Autonomous Algorithm Using an Online Feedback-Error Learning Based Neural Network for Nonholonomic Mobile Robots (온라인 피드백 에러 학습을 이용한 이동 로봇의 자율주행 알고리즘 개발)

  • Lee, Hyun-Dong;Myung, Byung-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.5
    • /
    • pp.602-608
    • /
    • 2011
  • In this study, a method of designing a neurointerface using neural network (NN) is proposed for controlling nonholonomic mobile robots. According to the concept of virtual master-slave robots, in particular, a partially stable inverse dynamic model of the master robot is acquired online through the NN by applying a feedback-error learning method, in which the feedback controller is assumed to be based on a PD compensator for such a nonholonomic robot. The NN for the online feedback-error learning can composed that the input layer consists of six units for the inputs $x_i$, i=1~6, the hidden layer consists of two hidden units for hidden outputs $o_j$, j=1~2, and the output layer consists of two units for the outputs ${\tau}_k$, k=1~2. A tracking control problem is demonstrated by some simulations for a nonholonomic mobile robot with two-independent driving wheels. The initial q value was set to [0, 5, ${\pi}$].

Modeling and Simulation of Target Existence Probability in Tactical Guidance Missile Seeker Image (영상탐색기 적용 전술유도무기 영상 내 표적존재확률 분석을 위한 M&S 설계 및 분석)

  • Seol, SangHwan
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.43-49
    • /
    • 2015
  • Maximum lock-on distance in tactical guidance missile using seeker image is estimated by seeker's FOV, resolution and performance of tracking algorithm. In case, a missile is launched beyond the maximum lock-on distance, the missile is guided by INS pure navigation until it enters the lock-on possible zone. However, the probability of a target's existence within seekers images decreases as flight time goes by. Therefore, it is crucial to determine the distance that satisfies a certain target existence probability (TEP) and the maximum lock-on distance in order for an operator to take over the navigation role between two distances. In this paper, simulation which can analyse TEP in tactical guided missile seeker image is designed.

Real-time Detection Technique of the Target in a Berth for Automatic Ship Berthing (선박 자동접안을 위한 정박지 목표물의 실시간 검출법)

  • Choi, Yong-Woon;;Kim, Young-Bok;Lee, Kwon-Soon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.5
    • /
    • pp.431-437
    • /
    • 2006
  • In this paper vector code correlation(VCC) method and an algorithm to promote the image-processing performance in building an effective measurement system using cameras are described far automatically berthing and controlling the ship equipped with side-thrusters. In order to realize automatic ship berthing, it is indispensable that the berthing assistant system on the ship should continuously trace a target in the berth to measure the distance to the target and the ship attitude, such that we can make the ship move to the specified location. The considered system is made up of 4 apparatuses compounded from a CCD camera, a camera direction controller, a popular PC with a built-in image processing board and a signal conversion unit connected to parallel port of the PC. The object of this paper is to reduce the image-processing time so that the berthing system is able to ensure the safety schedule against risks during approaching to the berth. It could be achieved by composing the vector code image to utilize the gradient of an approximated plane found with the brightness of pixels forming a certain region in an image and verifying the effectiveness on a commonly used PC. From experimental results, it is clear that the proposed method can be applied to the measurement system for automatic ship berthing and has the image-processing time of fourfold as compared with the typical template matching method.

Vehicle Crash Simulation using Trajectory Optimization (경로 최적화 알고리즘을 이용한 3차원 차량 충돌 시뮬레이션)

  • Seong, Jin-Wook;Ko, Seung-Wook;Kwon, Tae-Soo
    • Journal of the Korea Computer Graphics Society
    • /
    • v.21 no.5
    • /
    • pp.11-19
    • /
    • 2015
  • Our research introduces a novel system for creating 3D vehicle animation. Our system is for intuitively authoring vehicle accident scenes according to videos or based on user-drawn trajectories. Our system has been implemented by combining three existing ideas. The first part is for obtaining 3D trajectory of a vehicle from black-box videos. The second part is a tracking algorithm that controls a vehicle to follow a given trajectory with small errors. The last part optimizes the vehicle control parameters so that the error between the input trajectory and simulated vehicle trajectory is minimized. We also simulate the deformation of the car due to an impact to achieve believable results in real-time.