• Title/Summary/Keyword: Object Trace

Search Result 125, Processing Time 0.03 seconds

Automatic Detecting of Joint of Human Body and Mapping of Human Body using Humanoid Modeling (인체 모델링을 이용한 인체의 조인트 자동 검출 및 인체 매핑)

  • Kwak, Nae-Joung;Song, Teuk-Seob
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.851-859
    • /
    • 2011
  • In this paper, we propose the method that automatically extracts the silhouette and the joints of consecutive input image, and track joints to trace object for interaction between human and computer. Also the proposed method presents the action of human being to map human body using joints. To implement the algorithm, we model human body using 14 joints to refer to body size. The proposed method converts RGB color image acquired through a single camera to hue, saturation, value images and extracts body's silhouette using the difference between the background and input. Then we automatically extracts joints using the corner points of the extracted silhouette and the data of body's model. The motion of object is tracted by applying block-matching method to areas around joints among all image and the human's motion is mapped using positions of joints. The proposed method is applied to the test videos and the result shows that the proposed method automatically extracts joints and effectively maps human body by the detected joints. Also the human's action is aptly expressed to reflect locations of the joints

Image Separation of Talker from a Background by Differential Image and Contours Information (차영상 및 윤곽선에 의한 배경에서 화자분리)

  • Park Jong-Il;Park Young-Bum;Yoo Hyun-Joong
    • The KIPS Transactions:PartB
    • /
    • v.12B no.6 s.102
    • /
    • pp.671-678
    • /
    • 2005
  • In this paper, we suggest an algorithm that allows us to extract the important obbject from motion pictures and then replace the background with arbitrary images. The suggested technique can be used not only for protecting privacy and reducing the size of data to be transferred by removing the background of each frame, but also for replacing the background with user-selected image in video communication systems including mobile phones. Because of the relatively large size of image data, digital image processing usually takes much of the resources like memory and CPU. This can cause trouble especially for mobile video phones which typically have restricted resources. In our experiments, we could reduce the requirements of time and memory for processing the images by restricting the search area to the vicinity of major object's contour found in the previous frame based on the fact that the movement of major object is not wide or rapid in general. Specifically, we detected edges and used the edge image of the initial frame to locate candidate-object areas. Then, on the located areas, we computed the difference image between adjacent frames and used it to determine and trace the major object that might be moving. And then we computed the contour of the major object and used it to separate major object from the background. We could successfully separate major object from the background and replate the background with arbitrary images.

An Efficient Shadow Removal Technique adapted to Environmental Changes (환경변화에 적응하는 효율적인 그림자 제거 기법)

  • Ryu, Nam-Hoon;Ban, Kyeong-Jin;Oh, Kyeong-Sug;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.204-210
    • /
    • 2009
  • There has been a lot of research into a background separation method, which is a preprocess of a technique of automatically perceiving an invader, and the removal of shadows around a moving object in the video monitoring field. When a moving object is not clearly separated from its shadow, it is difficult to analyze the shape accurately, and it is also hard to trace its position. This study suggests how to utilize a brightness value for removing a shadow. It came from the fact that there appears to be no change of color in the shadow area relative to the background area, and there only occurs a difference in brightness. In addition, this method uses the renewal of a critical value used for the removal of shadow in the previous frame, in the next frame.

  • PDF

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF

Photometric Observation of the Asteroid-Comet Transition Object 4015 Wilson-Harrington

  • Kim, Myung-Jin;Choi, Young-Jun;Byun, Yong-Ik
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.1
    • /
    • pp.87.2-87.2
    • /
    • 2010
  • Near-Earth asteroid-comet transition object 4015 Wilson-Harrington is a possible target of the joint European Space Agency (ESA) and Japanese Aerospace Exploration Agency (JAXA) Marco Polo sample return mission. 4015 W-H was discovered showing cometary activity by Albert G. Wilson and Robert G. Harrington at Palomar Observatory in 1949. After recovered in 1979, 4015 W-H has been observed at every apparition, it always was seen as a point source. We made time series observations for 4015 W-H using the 1.8m telescope with 2K CCD at Bohyunsan Observatory, on the nights of 2009 November 17-19. The geocentric distance of 4015 H-W was about 0.38 AU at that time. No trace of cometary activity is seen from our images. From the light curve analysis, we find a double-peaked rotational period of 2.2 hours with amplitude of 0.4 magnitude. Our result is much shorter than previous measurements of 3.6 hours (Harris & Young 1983) and 6.1 hours (Osip et al 1995). We will discuss possible origin of the period variations.

  • PDF

Specifcation and Farmalization of Transition Event Sequence (천이 사건 순서의 표현과 정형화)

  • Kim, Jung-Sool;Kang, Byung-Wook
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1204-1215
    • /
    • 1998
  • In this paper, we propose a scenario representing method, a specification language, and a verification technique for OARTS(Object based Approach for Real-Time Systems). As well as the general modeling method(event trace diagram), this study includes a specification language and a verification technique because there was no study about methodological level technique for scenario development as yet. Centering around the synchronization problem of transition of external modules which are the communication interfaces based on the objects, we lay stress on the representation of sequence of external events and internal action transitions. From the results of practical experiences, it has been ascertained that the proposed method reflect well the requirements in the analysis step, and its validity of the representation has been identified by a conceptual verifier. We support that it can serve as an analyzing tool for representing a general real-time scenarios also.

  • PDF

A Study on the Introduction from a Post-Structural stand-point, to understand Computer Games (컴퓨터 게임의 이해를 위한 후기 구조주의적 입문)

  • Chang, Woo-Rin
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.89-96
    • /
    • 2004
  • The public has only a superficial understanding of the computer games, in spite of it's psychological effects and social results. Therefore, in this study, one finds out the serious approach which leads the computer games to recognize its future in terms of new media. Stand-point from Freud to french post-structuralist, it helps the introduction to understand the computer games as a kind of contents in which we are able to observe psychological process. As a result, there are studies about the structure of the dream, the desire, and the language which allow to mention 'parmakon' ; 'difference' between self and object, it provokes the psychological dynamism and so on, the playing the game remains a real trace and change, at the level not only of our psyche but also of our body.

  • PDF

Algorithm of Generating Adaptive Background Modeling for crackdown on Illegal Parking (불법 주정차 무인 자동 단속을 위한 환경 변화에 강건한 적응적 배경영상 모델링 알고리즘)

  • Joo, Sung-Il;Jun, Young-Min;Choi, Hyung-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.117-125
    • /
    • 2008
  • The Object tracking by real-time image analysis is one of the major concerns in computer vision and its application fields. The Object detection process of real-time images must be preceded before the object tracking process. To achieve the stable object detection performance in the exterior environment, adaptive background model generation methods are needed. The adaptive background model can accept the nature's phenomena changes and adapt the system to the changes such as light or shadow movements that are caused by changes of meridian altitudes of the sun. In this paper, we propose a robust background model generation method effective in an illegal parking auto-detection application area. We also provide a evaluation method that judges whether a moving vehicle stops or not. As the first step, an initial background model is generated. Then the differences between the initial model and the input image frame is used to trace the movement of object. The moving vehicle can be easily recognized from the object tracking process. After that, the model is updated by the background information except the moving object. These steps are repeated. The experiment results show that our background model is effective and adaptable in the variable exterior environment. The results also show our model can detect objects moving slowly. This paper includes the performance evaluation results of the proposed method on the real roads.

  • PDF

Design of Pedestrian Detection and Tracking System Using HOG-PCA and Object Tracking Algorithm (HOG-PCA와 객체 추적 알고리즘을 이용한 보행자 검출 및 추적 시스템 설계)

  • Jeon, Pil-Han;Park, Chan-Jun;Kim, Jin-Yul;Oh, Sung-Kwun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.4
    • /
    • pp.682-691
    • /
    • 2017
  • In this paper, we propose the fusion design methodology of both pedestrian detection and object tracking system realized with the aid of HOG-PCA based RBFNN pattern classifier. The proposed system includes detection and tracking parts. In the detection part, HOG features are extracted from input images for pedestrian detection. Dimension reduction is also dealt with in order to improve detection performance as well as processing speed by using PCA which is known as a typical dimension reduction method. The reduced features can be used as the input of the FCM-based RBFNNs pattern classifier to carry out the pedestrian detection. FCM-based RBFNNs pattern classifier consists of condition, conclusion, and inference parts. FCM clustering algorithm is used as the activation function of hidden layer. In the conclusion part of network, polynomial functions such as constant, linear, quadratic and modified quadratic are regarded as connection weights and their coefficients of polynomial function are estimated by LSE-based learning. In the tracking part, object tracking algorithms such as mean shift(MS) and cam shift(CS) leads to trace one of the pedestrian candidates nominated in the detection part. Finally, INRIA person database is used in order to evaluate the performance of the pedestrian detection of the proposed system while MIT pedestrian video as well as indoor and outdoor videos obtained from IC&CI laboratory in Suwon University are exploited to evaluate the performance of tracking.

Variability Analysis of HBC722 using Lomb-Scargle Periodogram

  • Baek, Giseon;Pak, Soojong;Green, Joel D.;Jeon, Yiseul;Choi, Changsu;Lee, Jeong-Eun;Im, Myungshin;Meschiari, Stefano
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.38 no.1
    • /
    • pp.52.1-52.1
    • /
    • 2013
  • We present preliminary results of the photometric variability analysis in SDSS r, i and z bands for a newly confirmed FU Orionis-type object, HBC 722. We observed HBC 722 from 2011 April to 2012 November, with Camera for Quasars in Early uNiverse (CQUEAN) attached to the 2.1m Otto Struve telescope at McDonald Observatory, USA. The rapid cadence monitoring observations (minute timescale) were conducted in chosen photometric nights during observation campaigns to get adequate number of samples for short term period analysis. As this object is in active state, temperature at the inner disk/stellar surface can be characterized by the colors between r, i and z bands. Also, It is theorized that a sudden cataclysmic accretion associated with FU Orionis-type outburst can give rise to detectable "hot spots" on the central star and rotational asymmetries in the disk instability region. Thus the periodic variabilities of three bands would trace the stellar rotation or Keplerian rotation at the instability region of the inner accretion disk. Additionally, the range of instabilities could be estimated on the assumption of a temperature distribution for the HBC 722 disk. This analysis can provide a clue for understanding enhanced disk accretion of Class II young stellar object.

  • PDF