• Title/Summary/Keyword: location detection

Search Result 1,591, Processing Time 0.027 seconds

Real-time Detection Technique of the Target in a Berth for Automatic Ship Berthing (선박 자동접안을 위한 정박지 목표물의 실시간 검출법)

  • Choi, Yong-Woon;;Kim, Young-Bok;Lee, Kwon-Soon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.5
    • /
    • pp.431-437
    • /
    • 2006
  • In this paper vector code correlation(VCC) method and an algorithm to promote the image-processing performance in building an effective measurement system using cameras are described far automatically berthing and controlling the ship equipped with side-thrusters. In order to realize automatic ship berthing, it is indispensable that the berthing assistant system on the ship should continuously trace a target in the berth to measure the distance to the target and the ship attitude, such that we can make the ship move to the specified location. The considered system is made up of 4 apparatuses compounded from a CCD camera, a camera direction controller, a popular PC with a built-in image processing board and a signal conversion unit connected to parallel port of the PC. The object of this paper is to reduce the image-processing time so that the berthing system is able to ensure the safety schedule against risks during approaching to the berth. It could be achieved by composing the vector code image to utilize the gradient of an approximated plane found with the brightness of pixels forming a certain region in an image and verifying the effectiveness on a commonly used PC. From experimental results, it is clear that the proposed method can be applied to the measurement system for automatic ship berthing and has the image-processing time of fourfold as compared with the typical template matching method.

Robust Finger Shape Recognition to Shape Angle by using Geometrical Features (각도 변화에 강인한 기하학적 특징 기반의 손가락 인식 기법)

  • Ahn, Ha-Eun;Yoo, Jisang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1686-1694
    • /
    • 2014
  • In this paper, a new scheme to recognize a finger shape in the depth image captured by Kinect is proposed. Rigid transformation of an input finger shape is pre-processed for its robustness against the shape angle of input fingers. After extracting contour map from hand region, observing the change of contour pixel location is performed to calculate rotational compensation angle. For the finger shape recognition, we first acquire three pixel points, the most left, right, and top located pixel points. In the proposed algorithm, we first acquire three pixel points, the most left, right, and top located pixel points for the finger shape recognition, also we use geometrical features of human fingers such as Euclidean distance, the angle of the finger and the pixel area of hand region between each pixel points to recognize the finger shape. Through experimental results, we show that the proposed algorithm performs better than old schemes.

Improved variable bits M-ary QT conflict resolution algorithm for discrete m-bits recognition in RFID system (RFID 시스템에서 불연속 m-bits 인식을 위한 개선된 가변비트 M-ary QT 충돌해소 알고리즘)

  • Kim, Kwan-woong;Kim, Byun-gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1887-1894
    • /
    • 2016
  • In the RFID system, the reader transmits a query message to tags in order to identify a unique ID of tags within its detection range. The procedures for arbitrating a collision is essential because the multiple tags can response simultaneously in the same to the query of the Reader. This procedure is known as conflict resolution algorithm and it is a key technology in the RFID system. In this paper, we proposed a variable bits M-ary QT algorithm based on Manchester coding techniques. The proposed algorithm use the location information of the collision bits in the reader and tags. The proposed algorithm can reduce the number of the query-response cycle because it is capable of recognizing discontinuous bits and a variable number of bits. From computer simulation, the proposed method give better performance than the conventional M-ary QT techniques in terms of response, recognition efficiency, communication overhead.

The intelligent solar power monitoring system based on Smart Phone (스마트폰 기반의 지능형 태양광 전력적산 모니터링 시스템에 관한 연구)

  • Kim, Gwan-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1949-1954
    • /
    • 2016
  • Smart grid technology can be called grid techniques to improve the efficiency of the electric power by exchanging bidirectional information of electric power with real-time between electric power suppliers and consumers. Recently, the solar power generation system is being applied actively. However the solar power system has several problems leading to reduce overall electricity generation, because the difficult of the diagnosis and the solar power system failure such as PV(PhotoVoltaics) and inverter. In order to build an efficient smart grid, a stable electric power energy requirements capture and management and early fault detection is essentially required in solar power generation system. In this paper, it is designed to monitor the operating status of the solar power monitoring system from a remote location through a RS-485 or TCP/IP communication module to monitoring the output of solar power energy and abnormal phenomenon, to developing the measurement module and to transfer measured data.

Optimal Machine Learning Model for Detecting Normal and Malicious Android Apps (안드로이드 정상 및 악성 앱 판별을 위한 최적합 머신러닝 기법)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.1-10
    • /
    • 2020
  • The mobile application based on the Android platform is simple to decompile, making it possible to create malicious applications similar to normal ones, and can easily distribute the created malicious apps through the Android third party app store. In this case, the Android malicious application in the smartphone causes several problems such as leakage of personal information in the device, transmission of premium SMS, and leakage of location information and call records. Therefore, it is necessary to select a optimal model that provides the best performance among the machine learning techniques that have published recently, and provide a technique to automatically identify malicious Android apps. Therefore, in this paper, after adopting the feature engineering to Android apps on official test set, a total of four performance evaluation experiments were conducted to select the machine learning model that provides the optimal performance for Android malicious app detection.

Adaptive Mitigation of Narrowband Interference in Impulse Radio UWB Systems Using Time-Hopping Sequence Design

  • Khedr, Mohamed E.;El-Helw, Amr;Afifi, Mohamed Hossam
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.622-633
    • /
    • 2015
  • The coexistence among different systems is a major problem in communications. Mutual interference between different systems should be analyzed and mitigated before their deployment. The paper focuses on two aspects that have an impact on the system performance. First, the coexistence analysis, i.e. evaluating the mutual interference. Second aspect is the coexistence techniques, i.e. appropriate system modifications that guarantee the simultaneous use of the spectrum by different technologies. In particular, the coexistence problem is analyzed between ultra-wide bandwidth (UWB) and narrow bandwidth (NB) systems emphasizing the role of spectrum sensing to identify and classify the NB interferers that mostly affect the performance of UWB system. A direct sequence (DS)-time hopping (TH) code design technique is used to mitigate the identified NB interference. Due to the severe effect of Narrowband Interference on UWB communications, we propose an UWB transceiver that utilizes spectrum-sensing techniques together with mitigation techniques. The proposed transceiver improves both the UWB and NB systems performance by adaptively reducing the mutual interference. Detection and avoidance method is used where spectrum is sensed every time duration to detect the NB interferer's frequency location and power avoiding it's effect by using the appropriate mitigation technique. Two scenarios are presented to identify, classify, and mitigate NB interferers.

Unspecified Event Detection System Based on Contextual Location Name on Twitter (트위터에서 문맥상 지역명을 기반으로 한 불특정 이벤트 탐지 시스템)

  • Oh, Pyeonghwa;Yim, Junyeob;Yoon, Jinyoung;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.9
    • /
    • pp.341-348
    • /
    • 2014
  • The advance in web accessibility with dissemination of smart phones gives rise to rapid increment of users on social network platforms. Many research projects are in progress to detect events using Twitter because it has a powerful influence on the dissemination of information with its open networks, and it is the representative service which generates more than 500 million Tweets a day in average; however, existing studies to detect events has been used TFIDF algorithm without any consideration of the various conditions of tweets. In addition, some of them detected predefined events. In this paper, we propose the RTFIDF VT algorithm which is a modified algorithm of TFIDF by reflecting features of Twitter. We also verified the optimal section of TF and DF for detecting events through the experiment. Finally, we suggest a system that extracts result-sets of places and related keywords at the given specific time using the RTFIDF VT algorithm and validated section of TF and DF.

Efficiency to Discovery Transgenic Loci in GM Rice Using Next Generation Sequencing Whole Genome Re-sequencing

  • Park, Doori;Kim, Dongin;Jang, Green;Lim, Jongsung;Shin, Yun-Ji;Kim, Jina;Seo, Mi-Seong;Park, Su-Hyun;Kim, Ju-Kon;Kwon, Tae-Ho;Choi, Ik-Young
    • Genomics & Informatics
    • /
    • v.13 no.3
    • /
    • pp.81-85
    • /
    • 2015
  • Molecular characterization technology in genetically modified organisms, in addition to how transgenic biotechnologies are developed now require full transparency to assess the risk to living modified and non-modified organisms. Next generation sequencing (NGS) methodology is suggested as an effective means in genome characterization and detection of transgenic insertion locations. In the present study, we applied NGS to insert transgenic loci, specifically the epidermal growth factor (EGF) in genetically modified rice cells. A total of 29.3 Gb (${\sim}72{\times}coverage$) was sequenced with a $2{\times}150bp$ paired end method by Illumina HiSeq2500, which was consecutively mapped to the rice genome and T-vector sequence. The compatible pairs of reads were successfully mapped to 10 loci on the rice chromosome and vector sequences were validated to the insertion location by polymerase chain reaction (PCR) amplification. The EGF transgenic site was confirmed only on chromosome 4 by PCR. Results of this study demonstrated the success of NGS data to characterize the rice genome. Bioinformatics analyses must be developed in association with NGS data to identify highly accurate transgenic sites.

MR Images and $^1H$ MR Spectroscopy of Enteric Duplication Cyst of the Pancreas in an Adult (췌장 중복낭의 자기공명영상 소견과 수소자기공명분광법: 증례 보고)

  • Park, Sung-Hee;Kim, Mi-Young;Suh, Chang-Hae;Lee, Keon-Young;Choi, Suk-Jin;Cho, Jae-Young
    • Investigative Magnetic Resonance Imaging
    • /
    • v.14 no.2
    • /
    • pp.139-144
    • /
    • 2010
  • Enteric duplications associated with the pancreas are especially uncommon, and the differential diagnosis of pancreatic duplication cysts is often difficult, and may be confused with various cystic lesions of the pancreas. We report a case of pancreatic duplication cyst; present the images and laboratory findings including cyst fluid tumor markers. MR and MRS findings enabled the detection of the location, contour, characteristics of cystic fluid and definition of tissue planes between the lesion and adjacent structures, providing useful information for an accurate surgical approach.

Clustering Algorithm for Efficient Energy Consumption in Wireless Sensor Networks (무선 센서 네트워크에서 효율적인 에너지 사용을 위한 클러스터링 알고리즘)

  • Na, Sung-Won;Choi, Seung-Kwon;Lee, Tae-Woo;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.6
    • /
    • pp.49-59
    • /
    • 2014
  • Recently, wireless sensor networks(WSNs) are widely used for intrusion detection and ecology, environment, atmosphere, industry, traffic, fire monitoring. In this paper, an energy efficient clustering algorithm is proposed. The proposed algorithm forms clusters uniformly by selecting cluster head that optimally located based on receiving power. Besides, proposed algorithm can induce uniform energy consumption regardless of location of nodes by multi-hop transmission and MST formation with limited maximum depth. Through the above, proposed algorithm elongates network life time, reduces energy consumption of nodes and induces fair energy consumption compared to conventional LEACH and HEED. The results of simulation show that the proposed clustering algorithm elongates network life time through fair energy consumption.