• Title/Summary/Keyword: Moving Obstacle

Search Result 195, Processing Time 0.021 seconds

A Study on the automatic vehicle monitoring system based on computer vision technology (컴퓨터 비전 기술을 기반으로 한 자동 차량 감시 시스템 연구)

  • Cheong, Ha-Young;Choi, Chong-Hwan;Choi, Young-Gyu;Kim, Hyon-Yul;Kim, Tae-Woo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.2
    • /
    • pp.133-140
    • /
    • 2017
  • In this paper, we has proposed an automatic vehicle monitoring system based on computer vision technology. The real-time display system has displayed a system that can be performed in automatic monitoring and control while meeting the essential requirements of ITS. Another advantage has that for a powerful vehicle tracking, the main obstacle handing system, which has the shadow tracking of moving objects. In order to obtain all kinds of information from the tracked vehicle image, the vehicle must be clearly displayed on the surveillance screen. Over time, it's necessary to precisely control the vehicle, and a three-dimensional model-based approach has been also necessary. In general, each type of vehicle has represented by the skeleton of the object or wire frame model, and the trajectory of the vehicle can be measured with high precision in a 3D-based manner even if the system has not running in real time. In this paper, we has applied on segmentation method to vehicle, background, and shadow. The validity of the low level vehicle control tracker was also detected through speed tracking of the speeding car. In conclusion, we intended to improve the improved tracking method in the tracking control system and to develop the highway monitoring and control system.

Detecting and Avoiding Dangerous Area for UAVs Using Public Big Data (공공 빅데이터를 이용한 UAV 위험구역검출 및 회피방법)

  • Park, Kyung Seok;Kim, Min Jun;Kim, Sung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.243-250
    • /
    • 2019
  • Because of a moving UAV has a lot of potential/kinetic energy, if the UAV falls to the ground, it may have a lot of impact. Because this can lead to human casualities, in this paper, the population density area on the UAV flight path is defined as a dangerous area. The conventional UAV path flight was a passive form in which a UAV moved in accordance with a path preset by a user before the flight. Some UAVs include safety features such as a obstacle avoidance system during flight. Still, it is difficult to respond to changes in the real-time flight environment. Using public Big Data for UAV path flight can improve response to real-time flight environment changes by enabling detection of dangerous areas and avoidance of the areas. Therefore, in this paper, we propose a method to detect and avoid dangerous areas for UAVs by utilizing the Big Data collected in real-time. If the routh is designated according to the destination by the proposed method, the dangerous area is determined in real-time and the flight is made to the optimal bypass path. In further research, we will study ways to increase the quality satisfaction of the images acquired by flying under the avoidance flight plan.

Development of Simplified Immersed Boundary Method for Analysis of Movable Structures (가동물체형 구조물 해석을 위한 Simplified Immersed Boundary법의 개발)

  • Lee, Kwang-Ho;Kim, Do-Sam
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.33 no.3
    • /
    • pp.93-100
    • /
    • 2021
  • Since the IB (Immersed Boundary) method, which can perform coupling analysis with objects and fluids having an impermeable boundary of arbitrary shape on a fixed grid system, has been developed, the IB method in various CFD models is increasing. The representative IB methods are the directing-forcing method and the ghost cell method. The directing-forcing type method numerically satisfies the boundary condition from the fluid force calculated at the boundary surface of the structure, and the ghost-cell type method is a computational method that satisfies the boundary condition through interpolation by placing a virtual cell inside the obstacle. These IB methods have a disadvantage in that the computational algorithm is complex. In this study, the simplified immersed boundary (SIB) method enables the analysis of temporary structures on a fixed grid system and is easy to expand to three proposed dimensions. The SIB method proposed in this study is based on a one-field model for immiscible two-phase fluid that assumes that the density function of each phase moves with the center of local mass. In addition, the volume-weighted average method using the density function of the solid was applied to handle moving solid structures, and the CIP method was applied to the advection calculation to prevent numerical diffusion. To examine the analysis performance of the proposed SIB method, a numerical simulation was performed on an object falling to the free water surface. The numerical analysis result reproduced the object falling to the free water surface well.

An East-Asiatic Idea of Community Space for the Realization of One's Own Self-Desire (동아시아 사유로 본 공동체와 자기실현 공간)

  • Rhee, Myung-Su
    • The Journal of Korean Philosophical History
    • /
    • no.52
    • /
    • pp.341-364
    • /
    • 2017
  • This thesis is to reflect prevalently stereo-typed community ideas and find alternative ones that have interconnected, relational, and autonomous acting system for our lives. Probably community is the collective space in which 'I' as the subject in the world meet others and achieve the desirable objects each other. By the way the community spaces could be nation state, societies, and people of nation or ones that deal local problems, environments, and ecology and clubs ect, which are variable according to our concerns. In a sense community pay attention to not societies such as nations or people but lives of individuals, preparing for the territories where men feel convenient in their bodies and mentalities without artificial manipulation. In such a community the participant's vital energy can be stretched actively and relationally, and even if the leader be, there is the politics of doing nothingness not to be the obstacle in the way mens' will goes. In those communities they can live their lives at their nature and realize their dreams without barriers to their way. If we find these ideas of communities which are alternative for our period, we should gaze at Asiatic ones that may be scattered in classics of Confucianism, Daoim and ect. With these concepts and concerns, this paper was drawn up.

Analysis of Infiltration Route using Optimal Path Finding Methods and Geospatial Information (지형공간정보 및 최적탐색기법을 이용한 최적침투경로 분석)

  • Bang, Soo Nam;Heo, Joon;Sohn, Hong Gyoo;Lee, Yong Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1D
    • /
    • pp.195-202
    • /
    • 2006
  • The infiltration route analysis is a military application using geospatial information technology. The result of the analysis would present vulnerable routes for potential enemy infiltration. In order to find the susceptible routes, optimal path search algorithms (Dijkstra's and $A^*$) were used to minimize the cost function, summation of detection probability. The cost function was produced by capability of TOD (Thermal Observation Device), results of viewshed analysis using DEM (Digital Elevation Model) and two related geospatial information coverages (obstacle and vegetation) extracted from VITD (Vector product Interim Terrain Data). With respect to 50m by 50m cells, the individual cost was computed and recorded, and then the optimal infiltration routes was found while minimizing summation of the costs on the routes. The proposed algorithm was experimented in Daejeon region in South Korea. The test results show that Dijkstra's and $A^*$ algorithms do not present significant differences, but A* algorithm shows a better efficiency. This application can be used for both infiltration and surveillance. Using simulation of moving TOD, the most vulnerable routes can be detected for infiltration purpose. On the other hands, it can be inversely used for selection of the best locations of TOD. This is an example of powerful geospatial solution for military application.