Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Kakiuchi, Hirotoa; * | Kawamura, Takaob | Shimizu, Tadaakib | Sugahara, Kazunorib
Affiliations: [a] Engineering Department, Melco Power Systems Co., Ltd. Hyogo-ku, Kobe, Japan | [b] Graduate School of Engineering, Tottori University, Tottori-city, Tottori, Japan
Correspondence: [*] Corresponding author: Hiroto Kakiuchi, Engineering Department, Melco Power Systems Co., Ltd. 1-1-2, Wadasaki-cho, Hyogo-ku, Kobe, Japan. Tel.: +81 78 682 6942; Fax: +81 78 682 6981; E-mail: [email protected].
Abstract: We have been proposing the automatic human tracking system to overcome limitations of existing video surveillance systems. This paper proposes two bypass methods to keep tracking a targeted person by the system constructed by using mobile agent technologies even if unexpected problems are occurred. The proposed methods are called as “Recalculation Bypass Method” and “Additional Calculation Bypass Method”. These bypass methods utilize the algorithm which is elaborated in the paper, “An Algorithm to Determine Neighbor Nodes” [7]. The mobile agents are operating in automatic human tracking system and the bypass methods are utilized by the mobile agents. It is a very important ability for the mobile agent not to lose tracking in automatic human tracking systems. The bypass methods contribute to the realization of robust system and resolve two classifications of problem to ensure the tracking ability of mobile agents. The two classifications of problem are logical and physical problems. In the case of logical problems, they occur inside the system and they are called as “broken server”. While in the case of physical problems, they occur outside the system and they are called as “pathway being modified”. This system is able to track the targeted person continuously by utilizing the methods even if unexpected problems are occurred. We confirmed the effectiveness of the proposed bypass methods by the experiments that used more than one broken servers and pathway being modified.
DOI: 10.3233/ICA-2010-0328
Journal: Integrated Computer-Aided Engineering, vol. 17, no. 1, pp. 41-58, 2010
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]