• Title/Summary/Keyword: 위치기반증명

Search Result 144, Processing Time 0.021 seconds

Tracking Algorithm For Golf Swing Using the Information of Pixels and Movements (화소 및 이동 정보를 이용한 골프 스윙 궤도 추적 알고리즘)

  • Lee, Hong, Ro;Hwang, Chi-Jung
    • The KIPS Transactions:PartB
    • /
    • v.12B no.5 s.101
    • /
    • pp.561-566
    • /
    • 2005
  • This paper presents a visual tracking algorithm for the golf swing motion analysis by using the information of the pixels of video frames and movement of the golf club to solve the problem fixed center point in model based tracking method. The model based tracking method use the polynomial function for trajectory displaying of upswing and downswing. Therefore it is under the hypothesis of the no movement of the center of gravity so this method is not for the amateurs. we proposed method using the information of pixel and movement, we first detected the motion by using the information of pixel in the frames in golf swing motion. Then we extracted the club head and hand by a properties of club shaft that consist of the parallel line and the moved location of club in up-swing and down-swing. In addition, we can extract the center point of user by tracking center point of the line between center of head and both foots. And we made an experiment with data that movement of center point is big. Finally, we can track the real trajectory of club head, hand and center point by using proposed tracking algorithm.

A Study about Learning Graph Representation on Farmhouse Apple Quality Images with Graph Transformer (그래프 트랜스포머 기반 농가 사과 품질 이미지의 그래프 표현 학습 연구)

  • Ji Hun Bae;Ju Hwan Lee;Gwang Hyun Yu;Gyeong Ju Kwon;Jin Young Kim
    • Smart Media Journal
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2023
  • Recently, a convolutional neural network (CNN) based system is being developed to overcome the limitations of human resources in the apple quality classification of farmhouse. However, since convolutional neural networks receive only images of the same size, preprocessing such as sampling may be required, and in the case of oversampling, information loss of the original image such as image quality degradation and blurring occurs. In this paper, in order to minimize the above problem, to generate a image patch based graph of an original image and propose a random walk-based positional encoding method to apply the graph transformer model. The above method continuously learns the position embedding information of patches which don't have a positional information based on the random walk algorithm, and finds the optimal graph structure by aggregating useful node information through the self-attention technique of graph transformer model. Therefore, it is robust and shows good performance even in a new graph structure of random node order and an arbitrary graph structure according to the location of an object in an image. As a result, when experimented with 5 apple quality datasets, the learning accuracy was higher than other GNN models by a minimum of 1.3% to a maximum of 4.7%, and the number of parameters was 3.59M, which was about 15% less than the 23.52M of the ResNet18 model. Therefore, it shows fast reasoning speed according to the reduction of the amount of computation and proves the effect.

Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services (위치기반서비스에서 개인의 궤적 정보를 보호하기 위한 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-hye;Song, Doo-hee;Cai, Tian-yuan;Park, Kwang-jin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.31-38
    • /
    • 2017
  • Recently with the rapid development of LBS (Location-based Services) technology, approaches of protecting user's location have gained tremendous attentions. For using LBS, users need to forward their real locations to LBS server. However, if the user sends his/her real location to LBS server, the server will have the all the information about user in LBS. Moreover, if the user opens it to LBS server for a long time, the trajectory of user may be released. In this paper, we propose GTC (Grid-based Trajectory Cloaking) method to address the privacy issue. Different from existing approaches, firstly the GTC method sets the predicting trajectory and divides the map into $2^n*2^n$ grid. After that we will generate cloaking regions according to user's desired privacy level. Finally the user sends them to LBS server randomly. The GTC method can make the cost of process less than sequential trajectory k-anonymity. Because of confusing the departure and destination, LBS server could not know the user's trajectory any more. Thus, we significantly improve the privacy level. evaluation results further verify the effectiveness and efficiency of our GTC method.

A Hierarchical Bitmap-based Spatial Index use k-Nearest Neighbor Query Processing on the Wireless Broadcast Environment (무선방송환경에서 계층적 비트맵 기반 공간 색인을 이용한 k-최근접 질의처리)

  • Song, Doo-Hee;Park, Kwang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.203-209
    • /
    • 2012
  • Recently, k-nearest neighbors query methods based on wireless broadcasting environment are actively studied. The advantage of wireless broadcasting environment is the scalability that enables collective query processing for unspecified users connected to the server. However, in case existing k-NN query is applied in wireless broadcasting environment, there can be a disadvantage that backtracking may occur and consequently the query processing time is increasing. In this paper proposes a hierarchical bitmap-based spatial index in order to efficiently process the k-NN queries in wireless broadcasting environment. HBI reduces the bitmap size using such bitmap information and tree structure. As a result, reducing the broadcast cycle can reduce the client's tuning time and query processing time. In addition, since the locations of all the objects can be detected using bitmap information, it is possible to tune to necessary data selectively. For this paper, a test was conducted implementing HBI to k-NN query and the proposed technique was proved to be excellent by a performance evaluation.

Indoor Localization for Mobile Robot using Extended Kalman Filter (확장 칼만 필터를 이용한 로봇의 실내위치측정)

  • Kim, Jung-Min;Kim, Youn-Tae;Kim, Sung-Shin
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.706-711
    • /
    • 2008
  • This paper is presented an accurate localization scheme for mobile robots based on the fusion of ultrasonic satellite (U-SAT) with inertial navigation system (INS), i.e., sensor fusion. Our aim is to achieve enough accuracy less than 100 mm. The INS consist of a yaw gyro, two wheel-encoders. And the U-SAT consist of four transmitters, a receiver. Besides the localization method in this paper fuse these in an extended Kalman filter. The performance of the localization is verified by simulation and two actual data(straight, curve) gathered from about 0.5 m/s of driving actual driving data. localization methods used are general sensor fusion and sensor fusion through Kalman filter using data from INS. Through the simulation and actual data studies, the experiment show the effectiveness of the proposed method for autonomous mobile robots.

Efficient Dummy Generation for Protecting Location Privacy (개인의 위치를 보호하기 위한 효율적인 더미 생성)

  • Cai, Tian-Yuan;Song, Doo-Hee;Youn, Ji-Hye;Lee, Won-Gyu;Kim, Yong-Kab;Park, Kwang-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.526-533
    • /
    • 2016
  • The researches protecting user's location in location-based services(LBS) have received much attention. Especially k-anonymity is the most popular privacy preservation method. k-anonymization means that it selects k-1 other dummies or clients to make the cloaking region. This reduced the probability of the query issuer's location being exposed to untrusted parties to 1/k. But query's location may expose to adversary when k-1 dummies are concentrated in query's location or there is dummy in where query can not exist. Therefore, we proposed the dummy system model and algorithm taking the real environment into account to protect user's location privacy. And we proved the efficiency of our method in terms of experiment result.

The Development of Tool Position Tracking system Based on UWB for Automotive Assembly Process (자동차 조립공정 작업의 실시간 모니터링을 위한 UWB 기반 공구위치 추적 시스템 개발)

  • Jeong, Seung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.657-661
    • /
    • 2019
  • The automobile industry is representative industry of complex characteristics, which employing 10 million people, the largest manufacturing industry over $1 trillion in sales and assembling with 20,000 parts to make complete automobile and automobile assembly processes have a lower automation rate than other processes, which is labor intensive processes of assembling to painted body with 3,000 components such as seats, built-in, instrument panel, glass, engine, transmission units. However, the current assembly process does not have real-time monitoring. If a tool position tracking system is adapted to assembly process for directing consistent work order and checking for missing work, the productivity and quality improvement of the assembly process can be achieved by preemptively preventing possible defects in the assembly process. So, this paper aims to develop a Tool Position tracking system using UWB(Ultra Wide Band) with trilateration and proves their effectiveness for real-time monitoring of automotive assembly process.

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code (개선된 해시함수와 CRC 코드 기반의 RFID 상호인증 프로토콜)

  • Oh, Se-Jin;Yun, Tae-Jin;Lee, Chang-Hee;Lee, Jae-Kang;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.132-139
    • /
    • 2012
  • In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag's hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.

Impact and Damage Detection Method Utilizing L-Shaped Piezoelectric Sensor Array (L-형상 압전체 센서 배열을 이용한 충격 및 손상 탐지 기법 개발)

  • Jung, Hwee-Kwon;Lee, Myung-Jun;Park, Gyuhae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.34 no.5
    • /
    • pp.369-376
    • /
    • 2014
  • This paper presents a method that integrates passive and active-sensing techniques for the structural health monitoring of plate-like structures. Three piezoelectric transducers are deployed in a L-shape to detect and locate an impact event by measuring and processing the acoustic emission data. The same sensor arrays are used to estimate the subsequent structural damage using guided waves. Because this method does not require a prior knowledge of the structural parameters, such as the wave velocity profile in various directions, accurate results could be achieved even on anisotropic or curved plates. A series of experiments was performed on plates, including a spar-wing structure, to demonstrate the capability of the proposed method. The performance was also compared to that of traditional approaches and the superior capability of the proposed method was experimentally demonstrated.

Estimating Human Size in 2D Image for Improvement of Detection Speed in Indoor Environments (실내 환경에서 검출 속도 개선을 위한 2D 영상에서의 사람 크기 예측)

  • Gil, Jong In;Kim, Manbae
    • Journal of Broadcast Engineering
    • /
    • v.21 no.2
    • /
    • pp.252-260
    • /
    • 2016
  • The performance of human detection system is affected by camera location and view angle. In 2D image acquired from such camera settings, humans are displayed in different sizes. Detecting all the humans with diverse sizes poses a difficulty in realizing a real-time system. However, if the size of a human in an image can be predicted, the processing time of human detection would be greatly reduced. In this paper, we propose a method that estimates human size by constructing an indoor scene in 3D space. Since the human has constant size everywhere in 3D space, it is possible to estimate accurate human size in 2D image by projecting 3D human into the image space. Experimental results validate that a human size can be predicted from the proposed method and that machine-learning based detection methods can yield the reduction of the processing time.