• Title/Summary/Keyword: Hand Tracking technology

Search Result 87, Processing Time 0.022 seconds

A Study on Key Arrangement of Virtual Keyboard based on Eyeball Input system (안구 입력 시스템 기반의 화상키보드 키 배열 연구)

  • Sa Ya Lee;Jin Gyeong Hong;Joong Sup Lee
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.94-103
    • /
    • 2024
  • The eyeball input system is a text input system designed based on 'eye tracking technology' and 'virtual keyboard character-input technology'. The current virtual keyboard structure used is a rectangular QWERTY array optimized for a multi-input method that simultaneously utilizes all 10 fingers on both hands. However, since 'eye-tracking technology' is a single-input method that relies solely on eye movement, requiring only one focal point for input, problems arise when used in conjunction with a rectangular virtual keyboard structure designed for multi-input method. To solve this problem, first of all, previous studies on the shape, type, and movement of muscles connected to the eyeball were investigated. Through the investigation, it was identified that the principle of eye movement occurs in a circle rather than in a straight line. This study, therefore, proposes a new key arrangement wherein the keys are arranged in a circular structure suitable for rotational motion rather than the key arrangement of the current virtual keyboard which is arranged in a rectangular structure and optimized for both-hand input. In addition, compared to the existing rectangular key arrangement, a performance verification experiment was conducted on the circular key arrangement, and through the experiment, it was confirmed that the circular arrangement would be a good replacement for the rectangular arrangement for the virtual keyboard.

Robust Hand Tracking and Recognition System Using Multiple Feature Data Fusion (다중 특징을 이용한 견고한 손추척 및 인식 시스템)

  • Chun, Sung-Yong;Park, Shin-Won;Jang, Ho-Jin;Lee, Chan-Su;Sohn, Myoung-Gyu;Lee, Sang-Heon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06c
    • /
    • pp.490-495
    • /
    • 2010
  • 본 연구에서는 효과적인 손 제스처 인식을 위하여 다중 특징을 이용한 견고한 손 추적 방법을 제시한다. 기존의 많은 손추적 장치들이 칼라 정보나 모션 정보와 같은 단일한 정보를 바탕으로 손을 검출하고, 이를 바탕으로 손의 추적하는 방법들을 제시하고 있다. 이러한 방법들의 경우에는 손 추적 중에 환경이나 상황이 변하게 되면, 손추적의 정확도가 현저하게 떨어지게 된다. 본 연구에서는 이러한 문제점들을 보완하기 위하여, Adaboost를 이용한 손 검출, 역투영을 기반으로 손 색상을 이용한 추적, KLT를 바탕으로 한 모션 추적을 이용한 검출을 동시에 수행하며, 각 센서의 추적 결과에 대한 칼만 필터 적용뿐 아니라, 각 센서 정보를 통합하여 견고한 결과를 얻기 위한 방법을 제시한다. 이를 바탕으로 손제스처 인식 시스템을 개발하였으며, 개발된 제스처 인식을 바탕으로 비디오 플레이를 제어하는 시스템을 구현하였다.

  • PDF

Design and Implementation of e-Call for Public Bus (대중버스용 긴급구난체계(e-Call) 설계 및 구현)

  • Heo, SeongSu;Park, YooHyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.4
    • /
    • pp.21-28
    • /
    • 2019
  • As ICT technology develops, researches on the construction of communication system for the rapid processing using ICT technology in case of traffic accidents are actively under way. e-Call (Emergency call) is a vehicle ICT-based emergency rescue system that recognizes and reports traffic accidents. On the other hand, the existing bus information system collects the positioning data through the position tracking system mounted on the bus and transmits it to the center, and then provides various services based on the bus information of the collected buses. In this paper, we designed and implemented an emergency rescue system that using the existing bus information system in order to deal with accidents, failures, and emergency situations on public buses quickly.

Real-time Human Pose Estimation using RGB-D images and Deep Learning

  • Rim, Beanbonyka;Sung, Nak-Jun;Ma, Jun;Choi, Yoo-Joo;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.113-121
    • /
    • 2020
  • Human Pose Estimation (HPE) which localizes the human body joints becomes a high potential for high-level applications in the field of computer vision. The main challenges of HPE in real-time are occlusion, illumination change and diversity of pose appearance. The single RGB image is fed into HPE framework in order to reduce the computation cost by using depth-independent device such as a common camera, webcam, or phone cam. However, HPE based on the single RGB is not able to solve the above challenges due to inherent characteristics of color or texture. On the other hand, depth information which is fed into HPE framework and detects the human body parts in 3D coordinates can be usefully used to solve the above challenges. However, the depth information-based HPE requires the depth-dependent device which has space constraint and is cost consuming. Especially, the result of depth information-based HPE is less reliable due to the requirement of pose initialization and less stabilization of frame tracking. Therefore, this paper proposes a new method of HPE which is robust in estimating self-occlusion. There are many human parts which can be occluded by other body parts. However, this paper focuses only on head self-occlusion. The new method is a combination of the RGB image-based HPE framework and the depth information-based HPE framework. We evaluated the performance of the proposed method by COCO Object Keypoint Similarity library. By taking an advantage of RGB image-based HPE method and depth information-based HPE method, our HPE method based on RGB-D achieved the mAP of 0.903 and mAR of 0.938. It proved that our method outperforms the RGB-based HPE and the depth-based HPE.

Big data, how to balance privacy and social values (빅데이터, 프라이버시와 사회적 가치의 조화방안)

  • Hwang, Joo-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.143-153
    • /
    • 2013
  • Big data is expected to bring forth enormous public good as well as economic opportunity. However there is ongoing concern about privacy not only from public authorities but also from private enterprises. Big data is suspected to aggravate the existing privacy battle ground by introducing new types of privacy risks such as privacy risk of behavioral pattern. On the other hand, big data is asserted to become a new way to by-pass tradition behavioral tracking such as cookies, DPIs, finger printing${\cdots}$ and etc. For it is not based on a targeted person. This paper is to find out if big data could contribute to catching out behavioral patterns of consumers without threatening or damaging their privacy. The difference between traditional behavioral tracking and big data analysis from the perspective of privacy will be discerned.

Implementation and Characteristic Analysis of DC/DC Voltage Regulator for Operation Efficiency Improvement in PV system (태양광발전의 운용효율 향상을 위한 DC/DC 전압 레귤레이터의 구현 및 특성분석)

  • Kim, Chanhyeok;Choi, Sungsik;Kang, Minkwan;Jung, Youngmun;Rho, Daeseok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.201-208
    • /
    • 2017
  • Recently, the installation of photovoltaic(PV) systems has been increasing due to the worldwide interest in eco-friendly and abundant solar energy. On the other hand, a PV system has approximately 25% power loss while the energy generated from solar cells is transformed to the power coupling point through a power conversion system (DC/AC). If the output voltage of a string in the PV system is lower than the operating range of the inverter when a part of module in the string has a shadow due to weather conditions, the string is not synchronized and the whole efficiency of output power in a PV system may be reduced significantly. Therefore, to overcome this problem, this paper proposes a novel control method to compensate for the lower voltage by introducing a DC/DC voltage regulator for each string in a PV system, which adopts a concept for MPPT (Maximum Power Point Tracking) control function using the P&O algorithm and adopts constant voltage control method used in an existing inverter. This paper also implements a 2kW DC/DC voltage regulator based on the proposed algorithm and performs a variety of scenario-based experiments. From the simulation result, it was confirmed that the operation efficiency in the proposed method is improved compared to the existing method.

Stability Analysis for the Deployment of Unmanned Surface Vehicles

  • Dharne, Avinash G.;Lee, Jaeyong
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.2
    • /
    • pp.159-165
    • /
    • 2015
  • Motion control schemes are generally classified into three categories (point stabilization, trajectory tracking, and path following). This paper deals with the problem which is associated with the initial deployment of a group of Unmanned Surface Vehicle (USVs) and corresponding point stabilization. To keep the formation of a group of USVs, it is necessary to set the relationship between each vehicle. A forcing functions such as potential fields are designed to keep the formation and a graph Laplacian is used to represent the connectivity between vehicle. In case of fixed topology of the graph representing the communication between the vehicles, the graph Laplacian is assumed constant. However the graph topologies are allowed to change as the vehicles move, and the system dynamics become discontinuous in nature because the graph Laplacian changes as time passes. To check the stability in the stage of deployment, the system is modeled with Kronecker algebra notation. Filippov's calculus of differential equations with discontinuous right hand sides is then used to formally characterize the behavior of USVs. The stability of the system is analyzed with Lyapunov's stability theory and LaSalle's invariance principle, and the validity is shown by checking the variation of state norm.

A Fast and Exact Verification of Inter-Domain Data Transfer based on PKI

  • Jung, Im-Y.;Eom, Hyeon-Sang;Yeom, Heon-Y.
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.3
    • /
    • pp.61-72
    • /
    • 2011
  • Trust for the data created, processed and transferred on e-Science environments can be estimated with provenance. The information to form provenance, which says how the data was created and reached its current state, increases as data evolves. It is a heavy burden to trace and verify the massive provenance in order to trust data. On the other hand, it is another issue how to trust the verification of data with provenance. This paper proposes a fast and exact verification of inter-domain data transfer and data origin for e-Science environment based on PKI. The verification, which is called two-way verification, cuts down the tracking overhead of the data along the causality presented on Open Provenance Model with the domain specialty of e-Science environment supported by Grid Security Infrastructure (GSI). The proposed scheme is easy-applicable without an extra infrastructure, scalable irrespective of the number of provenance records, transparent and secure with cryptography as well as low-overhead.

α-Synuclein Disrupts Vesicle Fusion by Two Mutant-Specific Mechanisms

  • Yoo, Gyeongji;An, Hyeong Jeon;Yeou, Sanghun;Lee, Nam Ki
    • Molecules and Cells
    • /
    • v.45 no.11
    • /
    • pp.806-819
    • /
    • 2022
  • Synaptic accumulation of α-synuclein (α-Syn) oligomers and their interactions with VAMP2 have been reported to be the basis of synaptic dysfunction in Parkinson's disease (PD). α-Syn mutants associated with familial PD have also been known to be capable of interacting with VAMP2, but the exact mechanisms resulting from those interactions to eventual synaptic dysfunction are still unclear. Here, we investigate the effect of α-Syn mutant oligomers comprising A30P, E46K, and A53T on VAMP2-embedded vesicles. Specifically, A30P and A53T oligomers cluster vesicles in the presence of VAMP2, which is a shared mechanism with wild type α-Syn oligomers induced by dopamine. On the other hand, E46K oligomers reduce the membrane mobility of the planar bilayers, as revealed by single-particle tracking, and permeabilize the membranes in the presence of VAMP2. In the absence of VAMP2 interactions, E46K oligomers enlarge vesicles by fusing with one another. Our results clearly demonstrate that α-Syn mutant oligomers have aberrant effects on VAMP2-embedded vesicles and the disruption types are distinct depending on the mutant types. This work may provide one of the possible clues to explain the α-Syn mutant-type dependent pathological heterogeneity of familial PD.

Study on Hand Gestures Recognition Algorithm of Millimeter Wave (밀리미터파의 손동작 인식 알고리즘에 관한 연구)

  • Nam, Myung Woo;Hong, Soon Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.685-691
    • /
    • 2020
  • In this study, an algorithm that recognizes numbers from 0 to 9 was developed using the data obtained after tracking hand movements using the echo signal of a millimeter-wave radar sensor at 77 GHz. The echo signals obtained from the radar sensor by detecting the motion of a hand gesture revealed a cluster of irregular dots due to the difference in scattering cross-sectional area. A valid center point was obtained from them by applying a K-Means algorithm using 3D coordinate values. In addition, the obtained center points were connected to produce a numeric image. The recognition rate was compared by inputting the obtained image and an image similar to human handwriting by applying the smoothing technique to a CNN (Convolutional Neural Network) model trained with MNIST (Modified National Institute of Standards and Technology database). The experiment was conducted in two ways. First, in the recognition experiments using images with and without smoothing, average recognition rates of 77.0% and 81.0% were obtained, respectively. In the experiment of the CNN model with augmentation of learning data, a recognition rate of 97.5% and 99.0% on average was obtained in the recognition experiment using the image with and without smoothing technique, respectively. This study can be applied to various non-contact recognition technologies using radar sensors.