Research on Application of Pedestrian Throw Distance Formula in GA/T643-2006

2015 ◽  
Vol 744-746 ◽  
pp. 1990-1994
Author(s):  
Fu Ju Liu ◽  
Fu Li ◽  
Xiao Hu

Based on CIDAS's resources of accident video data recording vehicles and pedestrians, this paper focuses on utilizing video image based calculating methods to research on application of pedestrian throw distance formula in GA/T643-2006.Our study shows that the results calculated from the pedestrian throw distance formula are partly inaccurate compared with actual car speed in cases that pedestrians are thrown after first collision with cars, and barely accurate to reflect the actual car speed in cases that pedestrians are thrown after second collision with cars. Therefore, it requires further adjustments on parameters identification and application scope of the pedestrian throw distance formula.

2021 ◽  
Vol 55 (3) ◽  
pp. 25-32
Author(s):  
GERASKIN ALEKSEY S. ◽  
◽  
UKOLOV RODION V. ◽  

In the modern world, video files play a special role. The development of video compression algorithms and the growth of the Internet’s capabilities make it possible to transfer video files. Damage inevitably occurs when transferring video files. Accordingly, the question arises about restoring a damaged file and obtaining information from it. The article discusses the most commonly used video file extensions AVI, MP4. As a result of the study, it was revealed that the most common damage is in the headers, which leads to errors when opening files by players, data is damaged less often. Data corruption leads to the fact that a certain fragment of the video file is either played with errors, distortions, or is skipped. The article discusses the possibility of recovering damaged video file using the removal of undistorted data and proposes an algorithm for analyzing frames using a neural network. As part of the algorithm, a neural network is used to identify damaged frames in video data. The algorithm was implemented as a software product. For the first stage of checking the efficiency of the algorithm, deliberate distortions of one frame were made for each video file under study. As a result of experimental verification of the developed algorithm, it was revealed that it provides high accuracy in detecting distorted frame sequences.


Author(s):  
A A Morozov ◽  
O S Sushkova ◽  
I A Kershner ◽  
A F Polupanov

The terahertz video surveillance opens up new unique opportunities in the field of security in public places, as it allows to detect and thus to prevent usage of hidden weapons and other dangerous items. Although the first generation of terahertz video surveillance systems has already been created and is available on the security systems market, it has not yet found wide application. The main reason for this is in that the existing methods for analyzing terahertz images are not capable of providing hidden and fully-automatic recognition of weapons and other dangerous objects and can only be used under the control of a specially trained operator. As a result, the terahertz video surveillance appears to be more expensive and less efficient in comparison with the standard approach based on the organizing security perimeters and manual inspection of the visitors. In the paper, the problem of the development of a method of automatic analysis of the terahertz video images is considered. As a basis for this method, it is proposed to use the semantic fusion of video images obtained using different physical principles, the idea of which is in that the semantic content of one video image is used to control the processing and analysis of another video image. For example, the information about 3D coordinates of the body, arms, and legs of a person can be used for analysis and proper interpretation of color areas observed on a terahertz video image. Special means of the object-oriented logic programming are developed for the implementation of the semantic fusion of the video data, including special built-in classes of the Actor Prolog logic language for acquisition, processing, and analysis of video data in the visible, infrared, and terahertz ranges as well as 3D video data.


Author(s):  
Дмитро Сергійович Гаврилов ◽  
Сергій Степанович Бучік ◽  
Юрій Михайлович Бабенко ◽  
Сергій Сергійович Шульгін ◽  
Олександр Васильович Слободянюк

The subject of research in the article is the video processing processes based on the JPEG platform for data transmission in the information and telecommunication network. The aim is to build a method for processing a video image with the possibility of protecting it at the quantization stage with subsequent arithmetic coding. That will allow, while preserving the structural and statistical regularity, to ensure the necessary level of accessibility, reliability, and confidentiality when transmitting video data. Task: research of known methods of selective video image processing with the subsequent formalization of the video image processing procedure at the quantization stage and statistical coding of significant blocks based on the JPEG platform. The methods used are an algorithm based on the JPEG platform, methods for selecting significant informative blocks, arithmetic coding. The following results were obtained. A method for processing a video image with the possibility of its protection at the stage of quantization with subsequent arithmetic coding has been developed. This method will allow, while preserving the structural and statistical regularity, to fulfill the set requirements for an accessible, reliable, and confidential transmission of video data. Ensuring the required level of availability is associated with a 30% reduction in the video image volume compared to the original volume. Simultaneously, the provision of the required level of confidence is confirmed by an estimate of the peak signal-to-noise ratio for an authorized user, which is dB. Ensuring the required level of confidentiality is confirmed by an estimate of the peak signal-to-noise ratio in case of unauthorized access, which is equal to dB. Conclusions. The scientific novelty of the results obtained is as follows: for the first time, two methods of processing video images at the quantization stage have been proposed. The proposed technologies fulfill the assigned tasks to ensure the required level of confidentiality at a given level of confidence. Simultaneously, the method of using encryption tables has a higher level of cryptographic stability than the method of using the key matrix. It is due to a a more complex mathematical apparatus. Which, in turn, increases the time for processing the tributes. To fulfill the requirement of data availability, it is proposed to use arithmetic coding for info-normative blocks, which should be more efficient compared with the methods of code tables. So, the method of using the scoring tables has greater cryptographic stability, and the method of using the matrix-key has higher performance. Simultaneously, the use of arithmetic coding will satisfy the need for accessibility by reducing the initial volume.


2018 ◽  
Vol 14 (04) ◽  
pp. 70
Author(s):  
Dexin Zhu ◽  
Jianan Wu ◽  
Xiaohong Li ◽  
Rongkai Wei ◽  
Xiaohui Li ◽  
...  

Data transmission in the traditional video conference system is facing certain security risks currently, for which an experiment scheme for application of quantum key in the traditional video conference system is designed in this paper. As for this scheme, quantum gateway is seamlessly embedded into the traditional video conference system, based on which data transmitted through video conference system can be encrypted by the quantum key generated by such quantum gateway. Based on the reality of relatively low code generation rate of quantum key of quantum gateway, a new quantum key expansion algorithm is put forward and feasibility of such algorithm is verified by using NIST frequency test standard. Quantum keys with different error rates are used to conduct encryption and decryption of three 720p single-screen video images respectively, in addition to which Peak Signal to Noise Ratio (PSNR) of the original images and decrypted images are calculated. It can be proved through comparison between such values and theoretical calculated values that quantum key can ensure normal image quality of video. This experiment is of great significance for applying quantum key in real video conference systems and ensuring security of video data transmission.


1984 ◽  
Author(s):  
Larry Klementowski ◽  
Mase Sekine

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zhenggang Yan ◽  
Yue Yu ◽  
Mohammad Shabaz

The analysis of the video shot in basketball games and the edge detection of the video shot are the most active and rapid development topics in the field of multimedia research in the world. Video shots’ temporal segmentation is based on video image frame extraction. It is the precondition for video application. Studying the temporal segmentation of basketball game video shots has great practical significance and application prospects. In view of the fact that the current algorithm has long segmentation time for the video shot of basketball games, the deep learning model and temporal segmentation algorithm based on the histogram for the video shot of the basketball game are proposed. The video data is converted from the RGB space to the HSV space by the boundary detection of the video shot of the basketball game using deep learning and processing of the image frames, in which the histogram statistics are used to reduce the dimension of the video image, and the three-color components in the video are combined into a one-dimensional feature vector to obtain the quantization level of the video. The one-dimensional vector is used as the variable to perform histogram statistics and analysis on the video shot and to calculate the continuous frame difference, the accumulated frame difference, the window frame difference, the adaptive window’s mean, and the superaverage ratio of the basketball game video. The calculation results are combined with the set dynamic threshold to optimize the temporal segmentation of the video shot in the basketball game. It can be seen from the comparison results that the effectiveness of the proposed algorithm is verified by the test of the missed detection rate of the video shots. According to the test result of the split time, the optimization algorithm for temporal segmentation of the video shot in the basketball game is efficiently implemented.


2012 ◽  
Vol 1 (33) ◽  
pp. 12
Author(s):  
Min Roh ◽  
Hitoshi Tanaka ◽  
Mohammad Bagus Aditaywan ◽  
Akira Mano ◽  
Keiko Udo

Tsunami propagation into river is one of important real phenomenon. During this process, tsunami celerity and flow velocity are significant physical parameters to understand tsunami behaviors. However, the availability of observation was not sufficient in the 2011 off the Pacific Coast of Tohoku Tsunami, whereas several video data can be used to assess the physical parameters such as tsunami celerity and flow velocity. In this study, as a video image analysis method, Particle Image Velocimetry(PIV) and Particle Tracking Velocimetry(PTV) were used to estimate the tsunami flow velocity. Furthermore, the analysis result of video image data was verified by using the conservation equation. Tsunami physical parameter was successfully estimated by the comparison analysis.


Sign in / Sign up

Export Citation Format

Share Document