• Title/Summary/Keyword: location tracking system

Search Result 575, Processing Time 0.024 seconds

Skin Color Based Hand and Finger Detection for Gesture Recognition in CCTV Surveillance (CCTV 관제에서 동작 인식을 위한 색상 기반 손과 손가락 탐지)

  • Kang, Sung-Kwan;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.10
    • /
    • pp.1-10
    • /
    • 2011
  • In this paper, we proposed the skin color based hand and finger detection technology for the gesture recognition in CCTV surveillance. The aim of this paper is to present the methodology for hand detection and propose the finger detection method. The detected hand and finger can be used to implement the non-contact mouse. This technology can be used to control the home devices such as home-theater and television. Skin color is used to segment the hand region from background and contour is extracted from the segmented hand. Analysis of contour gives us the location of finger tip in the hand. After detecting the location of the fingertip, this system tracks the fingertip by using only R channel alone, and in recognition of hand motions to apply differential image, such as the removal of useless image shows a robust side. We explain about experiment which relates in fingertip tracking and finger gestures recognition, and experiment result shows the accuracy above 96%.

Status-Based RFID Authentication Protocol (상태기반 RFID 인증 프로토콜)

  • Yoo Sung Ho;Kim KiHyun;Hwang Yong Ho;Lee Pil Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.57-68
    • /
    • 2004
  • Recently, Radio Frequency Identification (RFID) systems stands in the spotlight of industry as a common and useful tool in manufacturing, supply chain management (SCM) and stock management. In the near future, low-cost RFID Electronic Product Code; (EPC) or smart-labels may be a practical replacement for optical barcodes on consumer items. However, manufacturing cheap and small RFID tags, and developing secure RFID authentication Protocols are problems which need to be solved. In spite of advances in semiconductor technology, computation and storage ability of the tag are so limited that it is difficult and too expensive to apply existing crypto-systems to RFID tags. Thus it is necessary to create a new protocol which would require less storage space and lower computation costs and that is secure in the RFID system's environments. In this paper, we propose a RFID authentication protocol that is secure against location tracking and spoofing attacks. Our protocol can be used as a practical solution for privacy protection because it requires less computations in database than the previous RFID authentication protocol.

Development of Train Velocity and Location Tracking Algorithm for a Constant Warning Time System (철도건널목 정시간 제어를 위한 열차속도 및 위치추적방식 개발)

  • Oh, Ju-Taek;Kim, Tae-Kwon;Park, Dong-Joo;Shin, Seong-Hoon
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.4 s.82
    • /
    • pp.17-28
    • /
    • 2005
  • About 91.1% of Railway-Highway Crossings (RHC) in Korea use a Constant Distance Warning System(CDWS), while about 8.9% use a Constant Warning Time System(CWTS). The CDWS does not recognize speed differences of approaching trains and provides only waiting times to vehicles and pedestrians based on the highest speed of approaching trains. Under the CDWS, therefore, low speed trains provide unnecessary waiting times at crossings which often generates complains to vehicle drivers and pedestrians and may cause wrong decisions to pass the crossings. The objective of this research is to improve the safety of the RHC by developing accurate a CWTS. In this research a train speed and location detection system was developed with ultra sonic detectors. Locations of the detectors was decided based on the highest speed and the minimum warning time of Saemaul of 160 km/h. To validate the algorithms of the newly developed systems the lab tests were conducted. The results show that the train detection system provides accurate locations of trains and the maximum error between real speeds of trains and those of the system was 0.07m/s.

Design of Korean eye-typing interfaces based on multilevel input system (단계식 입력 체계를 이용한 시선 추적 기반의 한글 입력 인터페이스 설계)

  • Kim, Hojoong;Woo, Sung-kyung;Lee, Kunwoo
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.37-44
    • /
    • 2017
  • Eye-typing is one kind of human-computer interactive input system which is implemented by location data of gaze. It is widely used as an input system for paralytics because it does not require physical motions other than the eye movement. However, eye-typing interface based on Korean character has not been suggested yet. Thus, this research aims to implement the eye-typing interface optimized for Korean. To begin with, design objectives were established based on the features of eye-typing: significant noise and Midas touch problem. Multilevel input system was introduced to deal with noise, and an area free from input button was applied to solve Midas touch problem. Then, two types of eye-typing interfaces were suggested on phonological consideration of Korean where each syllable is generated from combination of several phonemes. Named as consonant-vowel integrated interface and separated interface, the two interfaces are designed to input Korean in phases through grouped phonemes. Finally, evaluation procedures composed of comparative experiments against the conventional Double-Korean keyboard interface, and analysis on flow of gaze were conducted. As a result, newly designed interfaces showed potential to be applied as practical tools for eye-typing.

A Conceptual Study of Positioning System for the Geostationary Satellite Autonomous Operation (정지궤도 위성의 자동운용을 위한 위치결정 시스템의 개념연구)

  • Lee, Sang-Cherl;Ju, Gwang-Hyeok;Kim, Bang-Yeop;Park, Bong-Kyu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.11
    • /
    • pp.41-47
    • /
    • 2005
  • Even more than 240 commercial geostationary communication satellites currently on orbit at the higher location than the GPS orbit altitude perform their own missions only by the support of the ground segment because of weak visibility from GPS. In addition, the orbit determination accuracy is very low without using two or more dedicated ground tracking antennas in intercontinental ground segment, since the satellite hardly moves with respect to the ground station. In this paper, we propose the GSPS(Geostationary Satellite Positioning System) in circular orbits of two sidereal days period higher than the geosynchronous orbit for orbit determination and autonomous satellite operation. The GSPS is conceived as a ranging system in that unknown positions of a geostationary satellite can be acquired from the known positions of the GSPS satellites. Each GSPS satellite transmits navigation data, clock data, correction data, and geostationary satellite command to control a geostationary satellite.

A Study of MES for the Product Tracking Based on RFID (제품추적을 위한 RFID기반 제조실행시스템에 대한 연구)

  • Kim, Bong-Seok;Lee, Hong-Chul
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.159-164
    • /
    • 2006
  • MES(Manufacturing Execution System) is a control system which supports basic activities(scheduling, working process and qualify management, etc) to execute working on the shop floor. As especially MES is a system to decrease the gap between production planning and operating, it executes functions that make decision between management and labor using real-time data. MES for real-time information processing requires certain conditions such as data modeling of RFID, which has recently attracted attentions, and monitoring of each product unit from manufacture to sales. However, in the middle of processing the unit with a RFID tag, transponders(readers) can't often read the tag due to reader's malfunctions, intentional damages, loss and the circumstantial effects; for that reason, users are unable to confirm the location of the product unit. In this case, users cannot avoid tracing the path of units with uncertain clues. In this paper, we suggest that the unique MES based on RFID and Bayesian Network can immediately track the product unit, and show how to evaluate it.

  • PDF

A Study on Implementation of Library Utilization Education System Based on SDG(Single Display Groupware) (SDG(Single Display Groupware) 기반 도서관 이용 교육 시스템 구현에 관한 연구)

  • Kim, Myung-Gwan;Noh, Jae-Hyoung;Yoo, Gwi-Hyeon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.4
    • /
    • pp.217-227
    • /
    • 2007
  • This study describes a system which makes children use a cooperation study for the education of a library use and applies SDG technology to this cooperation study SDG means a system which is able to do a cooperation work as a multi-inputting device in a computer display. Through the use library utilization education system based on SDG, learners study simultaneously and collaborately. On this thesis. We embodied the understanding of the decimal classification of Korea and the arrangement of a bookshelf and the study of the location tracking as a game style based on an existed study that a cooperation study used SDG is more superior that an individual study used a single device. Librarians through this system will be able to easily and interestingly instruct children for the use of a library.

Real-time Detection Technique of the Target in a Berth for Automatic Ship Berthing (선박 자동접안을 위한 정박지 목표물의 실시간 검출법)

  • Choi, Yong-Woon;;Kim, Young-Bok;Lee, Kwon-Soon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.5
    • /
    • pp.431-437
    • /
    • 2006
  • In this paper vector code correlation(VCC) method and an algorithm to promote the image-processing performance in building an effective measurement system using cameras are described far automatically berthing and controlling the ship equipped with side-thrusters. In order to realize automatic ship berthing, it is indispensable that the berthing assistant system on the ship should continuously trace a target in the berth to measure the distance to the target and the ship attitude, such that we can make the ship move to the specified location. The considered system is made up of 4 apparatuses compounded from a CCD camera, a camera direction controller, a popular PC with a built-in image processing board and a signal conversion unit connected to parallel port of the PC. The object of this paper is to reduce the image-processing time so that the berthing system is able to ensure the safety schedule against risks during approaching to the berth. It could be achieved by composing the vector code image to utilize the gradient of an approximated plane found with the brightness of pixels forming a certain region in an image and verifying the effectiveness on a commonly used PC. From experimental results, it is clear that the proposed method can be applied to the measurement system for automatic ship berthing and has the image-processing time of fourfold as compared with the typical template matching method.

Attack and Solution on 3K-RFID Authentication Protocol (3K-RFID 인증 프로토콜에 대한 공격과 해결책)

  • Yoon, Eun-Jun;Bu, Ki-Dong;Ha, Kyeoung-Ju;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6C
    • /
    • pp.578-587
    • /
    • 2009
  • In 2005, Ko-Kim-Kwon pointed out Henrici-Muller's hash based RFID authentication protocol is insecure to location tracking attack, spoofing attack and Denial of Service attack. Then, they proposed a new RFID authentication protocol(3K-RFID) that can withstand these security problems. However, this paper shows that 3K-RFID authentication protocol is still not only vulnerable to spoofing attack and Denial of Service attack but also does not provide forward secrecy, and then proposes an improved secure I3K-RFID authentication protocol in order to resolve such problems.

Elliptic Curve Signcryption Based Security Protocol for RFID

  • Singh, Anuj Kumar;Patro, B.D.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.344-365
    • /
    • 2020
  • Providing security has been always on priority in all areas of computing and communication, and for the systems that are low on computing power, implementing appropriate and efficient security mechanism has been a continuous challenge for the researchers. Radio Frequency Identification (RFID) system is such an environment, which requires the design and implementation of efficient security mechanism. Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed. But, due to high strength and requirement of less key size in elliptic curve cryptography, the focus of researchers has been on designing efficient security protocol for RFID based on elliptic curves. In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability, forward security, anonymity, and scalability. Moreover, the proposed protocol successfully provides resistance from replay attack, impersonation attack, location tracking attack, de-synchronization attack, denial of service attack, man-in-the-middle attack, cloning attack, and key-compromise attack. Results have revealed that the proposed protocol is efficient than the other related protocols as it takes less computational time and storage cost, especially for the tag, making it ideal to be used for RFID systems.