• Title/Summary/Keyword: 동작 추적

Search Result 479, Processing Time 0.029 seconds

Vision and Depth Information based Real-time Hand Interface Method Using Finger Joint Estimation (손가락 마디 추정을 이용한 비전 및 깊이 정보 기반 손 인터페이스 방법)

  • Park, Kiseo;Lee, Daeho;Park, Youngtae
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.157-163
    • /
    • 2013
  • In this paper, we propose a vision and depth information based real-time hand gesture interface method using finger joint estimation. For this, the areas of left and right hands are segmented after mapping of the visual image and depth information image, and labeling and boundary noise removal is performed. Then, the centroid point and rotation angle of each hand area are calculated. Afterwards, a circle is expanded at following pattern from a centroid point of the hand to detect joint points and end points of the finger by obtaining the midway points of the hand boundary crossing and the hand model is recognized. Experimental results that our method enabled fingertip distinction and recognized various hand gestures fast and accurately. As a result of the experiment on various hand poses with the hidden fingers using both hands, the accuracy showed over 90% and the performance indicated over 25 fps. The proposed method can be used as a without contacts input interface in HCI control, education, and game applications.

Verification of Automatic PAR Control System using DEVS Formalism (DEVS 형식론을 이용한 공항 PAR 관제 시스템 자동화 방안 검증)

  • Sung, Chang-ho;Koo, Jung;Kim, Tag-Gon;Kim, Ki-Hyung
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2012
  • This paper proposes automatic precision approach radar (PAR) control system using digital signal to increase the safety of aircraft, and discrete event systems specification (DEVS) methodology is utilized to verify the proposed system. Traditionally, a landing aircraft is controlled by the human voice of a final approach controller. However, the voice information can be missed during transmission, and pilots may also act improperly because of incorrectness of auditory signals. The proposed system enables the stable operation of the aircraft, regardless of the pilot's capability. Communicating DEVS (C-DEVS) is used to analyze and verify the behavior of the proposed system. A composed C-DEVS atomic model has overall composed discrete state sets of models, and the state sequence acquired through full state search is utilized to verify the safeness and the liveness of a system behavior. The C-DEVS model of the proposed system shows the same behavior with the traditional PAR control system.

The Design of IoT Device System for Disaster Prevention using Sound Source Detection and Location Estimation Algorithm (음원탐지 및 위치 추정 알고리즘을 이용한 방재용 IoT 디바이스 시스템 설계)

  • Ghil, Min-Sik;Kwak, Dong-Kurl
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.53-59
    • /
    • 2020
  • This paper relates to an IoT device system that detects sound source and estimates the sound source location. More specifically, it is a system using a sound source direction detection device that can accurately detect the direction of a sound source by analyzing the difference of arrival time of a sound source signal collected from microphone sensors, and track the generation direction of a sound source using an IoT sensor. As a result of a performance test by generating a sound source, it was confirmed that it operates very accurately within 140dB of the acoustic detection area, within 1 second of response time, and within 1° of directional angle resolution. In the future, based on this design plan, we plan to commercialize it by improving the reliability by reflecting the artificial intelligence algorithm through big data analysis.

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

Development of Health Care System for Elderly People with Dementia Based on Leap Motion Sensor (립 모션(leap motion) 센서를 이용한 노령 환자 치매 케어 시스템 개발)

  • Shin, Ji-Woo;Kim, Ji-Soo;Hong, Gwang-Soo;Kim, Byung-Gyu
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.319-325
    • /
    • 2018
  • The general public's interest in dementia has increased recently as dementia has become a social issue due to its rapid aging. Several dementia prevention and rehabilitation programs are being carried out at the dementia rehabilitation center and at the old welfare center depending on the number of dementia patients. In this paper, a 3 dimensional finger and motion search of the leap motion is utilized and combined with dementia preventive and cognitive rehabilitation programs at various facilities. We suggest technologies that can provide both fun and effective treatment and rehabilitation content for rehabilitation therapists. A variety of cognitive enhancement content is designed using finger tracking and configured to be recorded in the database for rehabilitation programmes to increase the effectiveness of management.

A SPEC-T Viterbi decoder implementation with reduced-comparison operation (비교 연산을 개선한 SPEC-T 비터비 복호기의 구현)

  • Bang, Seung-Hwa;Rim, Chong-Suck
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.81-89
    • /
    • 2007
  • The Viterbi decoder, which employs the maximum likelihood decoding method, is a critical component in forward error correction for digital communication system. However, lowering power consumption on the Viterbi decoder is a difficult task since the number of paths calculated equals the number of distinctive states of the decoder and the Viterbi decoder utilizes trace-back method. In this paper, we propose a method which minimizes the number of operations performed on the comparator, deployed in the SPEC-T Viterbi decoder implementation. The proposed comparator was applied to the ACSU(Add-Compare-Select Unit) and MPMSU(Minimum Path Metric Search Unit) modules on the decoder. The proposed ACS scheme and MPMS scheme shows reduced power consumption by 10.7% and 11.5% each, compared to the conventional schemes. When compared to the SPEC-T schemes, the proposed ACS and MPMS schemes show 6% and 1.5% less power consumption. In both of the above experiments, the threshold value of 26 was applied.

Two-Stage Neural Networks for Sign Language Pattern Recognition (수화 패턴 인식을 위한 2단계 신경망 모델)

  • Kim, Ho-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.3
    • /
    • pp.319-327
    • /
    • 2012
  • In this paper, we present a sign language recognition model which does not use any wearable devices for object tracking. The system design issues and implementation issues such as data representation, feature extraction and pattern classification methods are discussed. The proposed data representation method for sign language patterns is robust for spatio-temporal variances of feature points. We present a feature extraction technique which can improve the computation speed by reducing the amount of feature data. A neural network model which is capable of incremental learning is described and the behaviors and learning algorithm of the model are introduced. We have defined a measure which reflects the relevance between the feature values and the pattern classes. The measure makes it possible to select more effective features without any degradation of performance. Through the experiments using six types of sign language patterns, the proposed model is evaluated empirically.

Design and Implementation of Low-power RTLS Tag using Adaptive Blink (적응형 블링크를 이용한 저전력 RTLS 태그의 설계 및 구현)

  • Jung, Yeon-Su;Kim, Sae-Na;Baek, Yun-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.580-585
    • /
    • 2009
  • Real Time Locating Systems (RTLS) are used to track and identify the location of objects in real time using simple, inexpensive tags attached to or embedded in objects and readers that receive the wireless signals from these tags to determine their locations. A tag is powered an internal source such as a battery. The blink frequency of a tag affects the energy efficiency and the locating accuracy of RTLS. The mobility of a tag also affects the locating accuracy. In this paper, we introduce a RTLS tag design which improves the locating accuracy and the power efficiency. We propose an adaptive transmission-rate control algorithm using a motion sensor. By analyzing the signal pattern of the motion sensor, we can build a model to estimate the speed of the motion. Using this model, our algorithm can achieve better locating accuracy and lower power consumption than those of the conventional method. In our experiments, the number of transmission reduced as 40%, keeping similar locating accuracy.

A Development of Marine Observation Buoy Monitoring System Using Trail Camera and AtoN AIS (트레일 카메라 및 AIS를 이용한 해양관측부이용 감시시스템의 개발)

  • Gang, Yong-Soo;Wong, Chii-Lok;Hwang, Hun-Gyu;Kang, Seok-Sun;Kim, Hyen-Woo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.05a
    • /
    • pp.306-307
    • /
    • 2018
  • 본 논문에서는 해양관측부이 보호 및 해상 관측 등을 위해 사용되고 있는 국내외 영상감시 시스템 및 기술 현황을 살펴보고, 차세대 해상용 통신 네트워크 및 인공위성을 통한 해양 공공시설의 안전감시 시스템이 가져야 할 요구사항과 이에 대한 국내외 기술개발 현황을 살펴본다. 또한, 선박 인식 및 추적, 나아가 충돌 예측 등을 수행하여, 해상사고를 예방할 수 있는 해양관측부이용 감시시스템의 개발에 관한 내용을 다룬다. 이를 위해 개발하는 시스템은 해양관측부이에 장착되어 저전력으로 동작하며, 해수에 강한 트레일 감시카메라를 개발하여 적용한다. 추가적으로 AIS정보를 활용한 충돌 예방 경고 모듈이 탑재되고, LTE-M 등과 같은 차세대 해상이동통신 및 위성망 M2M 네트워크를 응용한 통신 모듈을 기반으로 육상 알람 기능을 제공한다. 이를 통해 시스템의 신뢰성을 확보하고, 대형 선박과의 해상사고(선박추돌사고 및 기름유출 등)와 소형선박에 의한 시설물 훼손(Vandalism)의 발생 가능성을 인지할 수 있는 종합적인 데이터를 수집하여 사고의 예방 및 재난 상황 등을 예측함으로써 중요시설의 안전 및 해양환경 보호에 기여하고자 한다.

  • PDF

A Qualitative Formal Method for Requirements Specification and Safety Analysis of Hybrid Real-Time Systems (복합 실시간 계통의 요구사항 명세와 안전성 분석을 위한 정성적 정형기법)

  • Lee, Jang-Soo;Cha, Sung-Deok
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.2
    • /
    • pp.120-133
    • /
    • 2000
  • Major obstruction of using formal methods for hybrid real-time systems in industry is the difficulty that engineers have in understanding and applying the quantitative methods in an abstract requirements phase. While formal methods technology in safety-critical systems can help increase confidence of software, difficulty and complexity in using them can cause another hazard. In order to overcome this obstruction, we propose a framework for qualitative requirements engineering of the hybrid real-time systems. It consists of a qualitative method for requirements specification, called QFM (Qualitative Formal Method), and a safety analysis method for the requirements based on a causality information, called CRSA (Causal Requirements Safety Analysis). QFM emphasizes the idea of a causal and qualitative reasoning in formal methods to reduce the cognitive burden of designers when specifying and validating the software requirements of hybrid safety systems. CRSA can evaluate the logical contribution of the software elements to the physical hazard of systems by utilizing the causality information that is kept during specification by QFM. Using the Shutdown System 2 of Wolsong nuclear power plants as a realistic example, we demonstrate the effectiveness of our approach.

  • PDF