Object visual tracking methods analysis for usage in real time systems
Journal Title: Телекомунікаційні та інформаційні технології - Year 2017, Vol 103, Issue 2
Abstract
For several years the sparse coding model has been widely used for visual tracking. This model has good accuracy, but low speed. The focus on adaptation/development of visual tracking algorithms that can be applied in real-time systems will significantly expand the application area, it will allow the introduction of visual tracking in production, in recommendations systems that can immediately react to certain actions, autopilots, smart machines and other areas. In this paper several popular algorithms based on sparse coding were selected, and an experimental analysis of their speed and tracking quality was carried out. Also one of the algorithms, which showed the highest accuracy, was modified using of non-sparse coding. Experimental results showed that using of non-sparse coding slightly reduces the accuracy of tracking, however, it gives a significant improvement in speed. Based on this article, conclusions were drawn regarding the direction of future research, and model was selected that would be the basis for further improvement for real-time systems.
Authors and Affiliations
Andrii Babiichuk, Olena Syrota
THE QUANTITATIVE OPTIMIZATION OF INFORMATION SYSTEM RESOURCES FOR EFFECTIVE DECISION SUPPORT
The article is devoted to the optimization of information system resources by quantitative factor. This optimization is carried out in the local issue of calculating rational volumes of information. For this purpose, the...
INFORMATION TECHNOLOGY FOR AUTOMATION OF FUZZY CONTROL WITH NON-LINEAR CONSTRAINTS
Existing information technologies of fuzzy control are based on fuzzy logic that uses the membership function of one argument and considers the control problem without constraints, covering several control variables. Fuz...
A multicast routing model supporting shared explicit reservation of link resource.
A mathematical model for multicast routing supporting shared explicit reservation of link resource was presented, which is introduced by linear expressions that responsible for ensuring the connectivity of the calculated...
SIMULATION MODEL OF THE GENERATION AND IMPLEMENTATION OF THE MEANS OF «PENETRATION TESTING»
During simulation of the process generation of cyberattacks of various formats was performed using the specialized IxChariot 9 package and software developed during the research. The collection of incoming information ab...
CONTROL AND NAVIGATION OF WATER TRANSPORT RESOURCE USING A PASSIVE RADIO ENGINEERING COMPLEX
The questions of development of high-precision complexes of two- and three-dimensional mapping of objects, in particular, complexes of coastal water areas, in particular, complexes of coastal water areas, have been consi...