• Title/Summary/Keyword: and object location

Search Result 1,062, Processing Time 0.029 seconds

Implementation of Integrated Player System based on Free-Viewpoint Video Service according to User Selection (사용자 선택에 따른 자유 시점 비디오 서비스 기반의 통합 플레이어 시스템 구현)

  • Yang, Ji-hee;Song, Min-ki;Park, Gooman
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.265-274
    • /
    • 2020
  • Free-viewpoint video service is a technology that allows users to watch at any angle, location and distance through interaction. In this paper, the free-viewpoint video services are defined in four viewing modes: Inward view, outward view, 3D object view and first person view. And we developed and implemented a new integrated program that plays all the suggested views. In the contents of girl band performances and basketball games, multi-view cameras suitable for each viewing mode are installed to acquire media, and data stored on the server is streamed over the network, making it available for viewing. Users can freely choose four viewing modes, space location, angle and so on, and the media data such as images and sounds are provided to them by rendering appropriately for the selected the viewpoint. Our system is expected to be a scalable free-viewpoint video service player as well as provide users with immersion and presence by combining various viewing modes.

Study of the Form Generation Diagrams of Trompe l'oeil Fashion Design (트롱프뢰유 패션디자인의 형태 생성 다이어그램에 관한 연구)

  • Lee, Shin-Young
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.3
    • /
    • pp.17-32
    • /
    • 2013
  • This study examined the visual elements of the Trompe l'oeil design and the combination conditions of each element in order to deduce the form generation diagrams of Trompe l'oeil fashion design. The following is what the study found: First, Trompe l'oeil fashion design can be divided into two based on its subject: 'the combination of internal elements of dress' and 'the combination of external elements of dress'. Looking at the visual components of each type, depending on the subject, 'the combination of internal elements of dress' design was achieved by combining internal dress elements: including textile, detail, item, accessory, layering, etc.. In case of 'the combination of external elements of dress' design, the object of Trompe l'oeil was expanded in scope to environment, which includes the actions of a wearer. Second, as for Trompe l'oeil fashion design through the combination of external dress elements, the condition to combined visual components of the work in the process of creation was related to 'the popularity of object', 'the similarity of shapes and sizes', and 'the probability of location'. Third, deriving a form generation diagrams of Trompe l'oeil fashion design was very effective in delineating specific relationships and conditions, directions among elements combined in fashion design.

A Study on ISpace with Distributed Intelligent Network Devices for Multi-object Recognition (다중이동물체 인식을 위한 분산형 지능형네트워크 디바이스로 구현된 공간지능화)

  • Jin, Tae-Seok;Kim, Hyun-Deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.950-953
    • /
    • 2007
  • The Intelligent Space(ISpace) provides challenging research fields for surveillance, human-computer interfacing, networked camera conferencing, industrial monitoring or service and training applications. ISpace is the space where many intelligent devices, such as computers and sensors, are distributed. According to the cooperation of many intelligent devices, the environment, it is very important that the system knows the location information to offer the useful services. In order to achieve these goals, we present a method for representing, tracking and human following by fusing distributed multiple vision systems in ISpace, with application to pedestrian tracking in a crowd.

  • PDF

Development of Real-Time Tracking System Through Information Sharing Between Cameras (카메라 간 정보 공유를 통한 실시간 차량 추적 시스템 개발)

  • Kim, Seon-Hyeong;Kim, Sang-Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.6
    • /
    • pp.137-142
    • /
    • 2020
  • As research on security systems using IoT (Internet of Things) devices increases, the need for research to track the location of specific objects is increasing. The goal is to detect the movement of objects in real-time and to predict the radius of movement in short time. Many studies have been done to clearly recognize and detect moving objects. However, it does not require the sharing of information between cameras that recognize objects. In this paper, using the device information of the camera and the video information taken from the camera, the movement radius of the object is predicted and information is shared about the camera within the radius to provide the movement path of the object.

A Study of 2D Multimedia Content Generation using R* Tree Index (R* tree 인덱스를 이용한 2D 멀티미디어 컨텐츠 생성에 관한 연구)

  • Lee, Hyun-Chang;Han, Sung-Kook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.815-816
    • /
    • 2009
  • Owing to the development of computer technologies, to process data derived from various sensors is recently demanding. It is also increasing to demand the moving object based servies like the services of location based and mobile application services. That's why it is needed the processing of visualizing the services for education aspects. In this paper, we show the implemented results about $R^*$ tree algorithm to insert, delete and search a object in two dimension environment.

  • PDF

Banner Control Automation System Using YOLO and OpenCV (YOLO와 OpenCV기술을 활용한 현수막 단속 자동화 시스템 방안)

  • Dukwoen Kim;Jihoon Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.4
    • /
    • pp.48-52
    • /
    • 2023
  • From the past to the present, banners are consistently used as effective advertising means. In the case of Korea, there are frequent situations in which hidden advertisements are installed. As a result, such hidden advertisement materials may damage urban aesthetics and moreover, incur unnecessary manpower consumption and waste of money. The proposed method classifies the detected banners into good banner and bad banner. The classification results are based on whether the relevant banners are installed in compliance with legal guidelines. In the process, YOLO and Open Computer Vision library are used to determine from various perspectives whether banners in CCTV images comply with the guidelines. YOLO is used to detect the banner area in CCTV images, and OpenCV is used to detect the color values in the area for color comparison. If a banner is detected in the video, the proposed method calculates the location of the banner and the distance from the designated bulletin to determine whether it was installed within the designated location, and then compares whether the color used in the banner is complied with local government guidelines.

  • PDF

A Study on the Support location Optimizations of the Beams using the Genetic Algorithm and the Sensitivity Analysis. (민감도가 고려된 유전 알고리듬을 이용한 보 구조물의 지지점 최적화에 관한 연구)

  • 이재관;신효철
    • Journal of KSNVE
    • /
    • v.10 no.5
    • /
    • pp.783-791
    • /
    • 2000
  • This describes a study on the support location optimizations of the beams using the genetic algorithm and the sensitivity analysis. The genetic algorithm is a probabilistic method searching the optimum at several points simultaneously and requiring only the values of the object and constraint functions. It has therefore more chances to find the global solution and can be applied to the various problems. Nevertheless, it has such a shortcoming that it takes too many calculations, because it is ineffective in local search. While the traditional method using sensitivity analysis is of great advantage in searching the near optimum. thus the combination of the two techniques will make use of the individual advantages, that is, the superiority in global searching form the genetic algorithm and that in local searching form the sensitivity analysis. In this thesis, for the practical applications, the analysis is conducted by FEB ; and as the shapes of structures are taken as the design variation, it requires re-meshing for every analysis. So if it is not properly controlled, the result of the analysis is affected and the optimized solution amy not be the real one. the method is efficiently applied to the problems which the traditional methods are not working properly.

  • PDF

spatial coordinate analysis using IR-UWB Radar (IR-UWB Radar 를 이용한 공간좌표 분석)

  • Lim, Jae-jun;kim, Min;Byun, Gi-sig;Kim, Gwan-hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.733-734
    • /
    • 2017
  • Ultrasonic, infrared, and CCD cameras are typically used to obtain location information, but the error range is large depending on the surrounding environment. However, IR-UWB can be used for distance and location measurement both indoors and outdoors, Technology. It is possible to determine the existence and distance of an object by emitting a short signal width in units of 1 ns and using a reflected signal and a time delay. It is also possible to measure the exact position within the cm error irrespective of the environmental conditions. Since it processes a large number of reflection signals, we try to measure three-dimensional spatial coordinates by improving the noise by using the mean value of the signal, the band pass filter and the FFT.

  • PDF

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF

Research of Matching Performance Improvement for DEM generation from Multiple Images (다중 영상으로부터 DEM 생성을 위한 정합기법의 성능향상 연구)

  • Rhee, Soo-Ahm;Kim, Tae-Jung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.1
    • /
    • pp.101-109
    • /
    • 2011
  • This paper describes the attempts to improve the performance of an image matching method for multiple image. Typically, matching between two images is performed by using correlation between a reference and corresponding images. The proposed multiple image matching algorithm performs matching in an object space, chooses the image closest to the true vertical image as a reference image, calculates the correlation based on the chosen reference image. The algorithm also detects occluded regions automatically and keep them from matching. We could find that it is possible to create high quality DEM by this method, regardless of the location of image. From the performance improvement experiments through the occlusion detection, we could confirm the possibility of a more accurate representation of 3D information.