Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6778932
Zhimu Huang, R. Yamamoto, Y. Tanaka
Ad hoc networks are decentralized type of wireless networks. Moreover, ad hoc networks are characterized by random, multi-hop topologies that may change rapidly over time because of mobile nodes. However, since nodes in ad hoc networks operate on limited battery energy and it is impractical to recharge or replace the battery, an energy-efficient protocol is important in the design of ad hoc networks. By conventional routing protocols, a shortest path is always selected in ad hoc networks. Without considering the energy consumption, some nodes will exhaust very soon and ad hoc networks will become partitioned. Improving routing protocols to prolong the lifetime of ad hoc networks has been a hot research area in the past few years. However, most of protocols only focus on the constrained battery energy. In this paper, a new protocol is proposed. It is a multipath energy-efficient probability routing protocol based on AODV (MEP-AODV). In MEP-AODV, not only battery energy consumption but also multipath selection is considered. By the proposed protocol, when an intermediate node received a request packet (RREQ), it won't relay the RREQ immediately. It will relay the RREQ with a probability which is based on its remaining battery energy. After the RREQ arrived at the destination node, it won't trigger a reply packet (RREP) at once until the expiry of a delay timer. The destination will select multiple paths with sufficient battery energy from the collected paths after the timer expired. Then the destination node initiates the corresponding RREPs. The source node can send data packets via the selected multiple paths by a probability function which is based on the minimum node remaining battery energy of one path. This proposed protocol is implemented in QualNet to evaluate the performance. From the results, MEP-AODV shows the good energy efficiency in terms of the maximizing the lifetime of ad hoc networks.
{"title":"A multipath energy-efficient probability routing protocol in ad hoc networks","authors":"Zhimu Huang, R. Yamamoto, Y. Tanaka","doi":"10.1109/ICACT.2014.6778932","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778932","url":null,"abstract":"Ad hoc networks are decentralized type of wireless networks. Moreover, ad hoc networks are characterized by random, multi-hop topologies that may change rapidly over time because of mobile nodes. However, since nodes in ad hoc networks operate on limited battery energy and it is impractical to recharge or replace the battery, an energy-efficient protocol is important in the design of ad hoc networks. By conventional routing protocols, a shortest path is always selected in ad hoc networks. Without considering the energy consumption, some nodes will exhaust very soon and ad hoc networks will become partitioned. Improving routing protocols to prolong the lifetime of ad hoc networks has been a hot research area in the past few years. However, most of protocols only focus on the constrained battery energy. In this paper, a new protocol is proposed. It is a multipath energy-efficient probability routing protocol based on AODV (MEP-AODV). In MEP-AODV, not only battery energy consumption but also multipath selection is considered. By the proposed protocol, when an intermediate node received a request packet (RREQ), it won't relay the RREQ immediately. It will relay the RREQ with a probability which is based on its remaining battery energy. After the RREQ arrived at the destination node, it won't trigger a reply packet (RREP) at once until the expiry of a delay timer. The destination will select multiple paths with sufficient battery energy from the collected paths after the timer expired. Then the destination node initiates the corresponding RREPs. The source node can send data packets via the selected multiple paths by a probability function which is based on the minimum node remaining battery energy of one path. This proposed protocol is implemented in QualNet to evaluate the performance. From the results, MEP-AODV shows the good energy efficiency in terms of the maximizing the lifetime of ad hoc networks.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"9 1","pages":"244-250"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91076407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779031
Jeong-Woo Lee, Bumho Kim, Jungsoo Lee, K. Yoon
For the digital cinema system specification released by Digital Cinema Initiatives, it was decided to use 2K or 4K images encoded by the JPEG2000 standard. JPEG2000 provides high compression rates and error tolerance, but it is a burden for both encoding and decoding. To improve the decoding performance, a parallel computing architecture called CUDA has been receiving a lot of attention recently. In this paper, we attempt to realize a real-time JPEG2000 decoding scheme for digital cinema using multiple CPU cores and GPUs. We present CUDA algorithms that perform inverse quantization, inverse 2D discrete wavelet transform and inverse irreversible color transform on a CUDA device, which brings us significant performance gain on a general CPU without extra cost.
{"title":"GPU-based JPEG2000 decoding scheme for digital cinema","authors":"Jeong-Woo Lee, Bumho Kim, Jungsoo Lee, K. Yoon","doi":"10.1109/ICACT.2014.6779031","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779031","url":null,"abstract":"For the digital cinema system specification released by Digital Cinema Initiatives, it was decided to use 2K or 4K images encoded by the JPEG2000 standard. JPEG2000 provides high compression rates and error tolerance, but it is a burden for both encoding and decoding. To improve the decoding performance, a parallel computing architecture called CUDA has been receiving a lot of attention recently. In this paper, we attempt to realize a real-time JPEG2000 decoding scheme for digital cinema using multiple CPU cores and GPUs. We present CUDA algorithms that perform inverse quantization, inverse 2D discrete wavelet transform and inverse irreversible color transform on a CUDA device, which brings us significant performance gain on a general CPU without extra cost.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"1 1","pages":"601-604"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90203568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779114
Juyoung Park, Sung Hei Kim, Okjo Jeong
Wireless power transfer (WPT) is one of the promising technology of the near future with devices transferring electric energy from one device to another in wireless manner. Currently, many researchers and organizations focus on the wireless power transfer technologies itself concentrating on device to device(s) interaction. However, a standardized infrastructure with interaction of various applications and services is needed to deploy the wireless power transfer technology. Therefore, it is necessary to develop a WPT based service framework in order realize various types of commercial services such as electric car charging system on public highway and outdoor charging system for wearable/mobile devices. This paper describes some of the use cases that should be considered and define a service framework consisting of various players in providing service control and charging policy for WPT based application and services.
{"title":"Use case and service framework for WPT (Wireless power transfer)","authors":"Juyoung Park, Sung Hei Kim, Okjo Jeong","doi":"10.1109/ICACT.2014.6779114","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779114","url":null,"abstract":"Wireless power transfer (WPT) is one of the promising technology of the near future with devices transferring electric energy from one device to another in wireless manner. Currently, many researchers and organizations focus on the wireless power transfer technologies itself concentrating on device to device(s) interaction. However, a standardized infrastructure with interaction of various applications and services is needed to deploy the wireless power transfer technology. Therefore, it is necessary to develop a WPT based service framework in order realize various types of commercial services such as electric car charging system on public highway and outdoor charging system for wearable/mobile devices. This paper describes some of the use cases that should be considered and define a service framework consisting of various players in providing service control and charging policy for WPT based application and services.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"71 1","pages":"1027-1030"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89239247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6778936
Poyraz Baklan, K. Yamori, Y. Tanaka
Network congestion during large scale disasters seems inevitable. Sudden influx of traffic caused by users calling their loved ones, coupled with the possibility that many base stations and routers in the area are damaged by the disaster; leads to resource shortage which causes congestion, which in turn causes many users becoming disgruntled and their quality of experience dropping. If a study can be made on predicting user behaviour, based on usual user habits and way of acting immediately after a disaster, then the network provider can regulate traffic accordingly or take precautions in areas within disaster zones.
{"title":"Measure of user behaviour before and during disaster congestion","authors":"Poyraz Baklan, K. Yamori, Y. Tanaka","doi":"10.1109/ICACT.2014.6778936","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778936","url":null,"abstract":"Network congestion during large scale disasters seems inevitable. Sudden influx of traffic caused by users calling their loved ones, coupled with the possibility that many base stations and routers in the area are damaged by the disaster; leads to resource shortage which causes congestion, which in turn causes many users becoming disgruntled and their quality of experience dropping. If a study can be made on predicting user behaviour, based on usual user habits and way of acting immediately after a disaster, then the network provider can regulate traffic accordingly or take precautions in areas within disaster zones.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"12 1","pages":"135-140"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89554362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779047
Jeong-Woo Lee, Bumho Kim, K. Yoon
JPEG2000 is the international standard for image compression. The rich feature set and the state of the art image compression performance make JPEG2000 an attractive alternative for many applications. Especially JPEG2000 is used in the area for digital cinema and medical image. Although the JPEG2000 provides high compression rates and error tolerance, it is burden for both encoding and decoding. To improve the performance, a parallel computing architecture called CUDA has been receiving a lot of attention recently. In this paper, we attempt to realize a real-time JPEG2000 encoding scheme by using GPUs. We present CUDA algorithms that perform DCDM decomposition, multi-component transform, 2D discrete wavelet transform, and quantization completely on a CUDA device, which brings us significant performance gain on a general CPU without extra cost. In addition, we present CUDA algorithm for performing the color conversion from RGB to XYZ.
{"title":"CUDA-based JPEG2000 encoding scheme","authors":"Jeong-Woo Lee, Bumho Kim, K. Yoon","doi":"10.1109/ICACT.2014.6779047","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779047","url":null,"abstract":"JPEG2000 is the international standard for image compression. The rich feature set and the state of the art image compression performance make JPEG2000 an attractive alternative for many applications. Especially JPEG2000 is used in the area for digital cinema and medical image. Although the JPEG2000 provides high compression rates and error tolerance, it is burden for both encoding and decoding. To improve the performance, a parallel computing architecture called CUDA has been receiving a lot of attention recently. In this paper, we attempt to realize a real-time JPEG2000 encoding scheme by using GPUs. We present CUDA algorithms that perform DCDM decomposition, multi-component transform, 2D discrete wavelet transform, and quantization completely on a CUDA device, which brings us significant performance gain on a general CPU without extra cost. In addition, we present CUDA algorithm for performing the color conversion from RGB to XYZ.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"13 1","pages":"671-674"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83658933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779115
Xu Tan, Xi Luan, Yuxin Cheng, Aimin Liu, Jianjun Wu
Next-generation wireless networks will generate a heterogeneous network with micro base station (MBS) and femtocells where cell selection becomes crucial for balancing the utilization of the whole network. In this paper, we investigate cell selection problem in a two-tier femtocell network that contains a MBS and several femtocells with open/closed access methods and coverage areas. The selection process among groups of users in different service areas is formulated as a dynamic evolutionary game. In order to achieve an equilibrium, we present the Q-learning algorithm that can help distributed individual users adapt the situation and make cell selection decisions independently. With their own knowledge of the past, the users can learn to achieve the equilibrium without a centralized controller to gather other users information. Finally, simulation results present the convergence and effectiveness of the proposed algorithm.
{"title":"Cell selection in two-tier femtocell networks using Q-learning algorithm","authors":"Xu Tan, Xi Luan, Yuxin Cheng, Aimin Liu, Jianjun Wu","doi":"10.1109/ICACT.2014.6779115","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779115","url":null,"abstract":"Next-generation wireless networks will generate a heterogeneous network with micro base station (MBS) and femtocells where cell selection becomes crucial for balancing the utilization of the whole network. In this paper, we investigate cell selection problem in a two-tier femtocell network that contains a MBS and several femtocells with open/closed access methods and coverage areas. The selection process among groups of users in different service areas is formulated as a dynamic evolutionary game. In order to achieve an equilibrium, we present the Q-learning algorithm that can help distributed individual users adapt the situation and make cell selection decisions independently. With their own knowledge of the past, the users can learn to achieve the equilibrium without a centralized controller to gather other users information. Finally, simulation results present the convergence and effectiveness of the proposed algorithm.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"2 1","pages":"1031-1035"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87857901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6778964
Moon-Koo Kim, Jong Hyun Park, Jonghyun Paik
In Korea the ICT parts industry has firmly established its position as a major contributor to the national economy based on increased exports and an improved trade balance. However, the Korean ICT materials and parts industry has stagnated in recent years due to heavy dependence on just a few products such as semiconductors and displays, intensifying global competition, a growing dependence on international trade, the nation's small business-centered industrial structure, etc. As such, this paper intends to study the government's policy of fostering the Korean ICT parts industry, as well as the industry's current situation, external competitiveness, and current problems, in order to propose industrial promotion measures to help Korean ICT parts industry attain global competiveness.
{"title":"A study on the competitiveness strengthening plan of industry: A case from Korean ICT parts industry","authors":"Moon-Koo Kim, Jong Hyun Park, Jonghyun Paik","doi":"10.1109/ICACT.2014.6778964","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778964","url":null,"abstract":"In Korea the ICT parts industry has firmly established its position as a major contributor to the national economy based on increased exports and an improved trade balance. However, the Korean ICT materials and parts industry has stagnated in recent years due to heavy dependence on just a few products such as semiconductors and displays, intensifying global competition, a growing dependence on international trade, the nation's small business-centered industrial structure, etc. As such, this paper intends to study the government's policy of fostering the Korean ICT parts industry, as well as the industry's current situation, external competitiveness, and current problems, in order to propose industrial promotion measures to help Korean ICT parts industry attain global competiveness.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"92 1","pages":"289-281"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88163662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6778951
Changjun Lee, Ahreum Hong, Junseok Hwang
It is important that improving the value of contents felt by consumers and inducing settlement of healthy culture of consuming the charged contents in order to enhance the global competitiveness of contents industry. Korea has gotten into the smart-media era very rapidly, however, many consumers are still reluctant to purchase the charged contents. This research aims to analyse which factors have an effect on purchasing the charged contents in the view of consumers' device selection, innovativeness, and lifestyle. The results show that consumers who use smart-pad, who cognize the value of content high, and who has a role of opinion leader are likely to purchase charged contents. In addition, after considering the sample selection bias, factors to purchase charged content appears differently by types of contents; application, broadcast, news media, video, music, etc. This paper is able to provide some clues to promoting contents industry macroscopically for the policy makers.
{"title":"The determinants of purchasing the charged contents in the smart-media environment","authors":"Changjun Lee, Ahreum Hong, Junseok Hwang","doi":"10.1109/ICACT.2014.6778951","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778951","url":null,"abstract":"It is important that improving the value of contents felt by consumers and inducing settlement of healthy culture of consuming the charged contents in order to enhance the global competitiveness of contents industry. Korea has gotten into the smart-media era very rapidly, however, many consumers are still reluctant to purchase the charged contents. This research aims to analyse which factors have an effect on purchasing the charged contents in the view of consumers' device selection, innovativeness, and lifestyle. The results show that consumers who use smart-pad, who cognize the value of content high, and who has a role of opinion leader are likely to purchase charged contents. In addition, after considering the sample selection bias, factors to purchase charged content appears differently by types of contents; application, broadcast, news media, video, music, etc. This paper is able to provide some clues to promoting contents industry macroscopically for the policy makers.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"55 1","pages":"212-217"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86401212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates jammer selection in a two-way decode-and-forward (DF) relay network with imperfect channel state information (CSI). The proposed scheme enables an selection of one conventional relay and two jamming nodes to enhance communication security against eavesdropper. The conventional relay assists two sources to exchange their data via a DF protocol. The two jamming nodes are used to create interference signals to confuse the eavesdropper. Furthermore, the asymptotic performance of proposed scheme is analyzed in detail. Under the assumption that the relay can decode received signals perfectly and when the jamming power is higher than that of source nodes, we find that the proposed scheme has a high secrecy performance which is almost independent of the position of the eavesdropper.
{"title":"Jammer selection for secure two-way DF relay communications with imperfect CSI","authors":"Jiajia Wang, Jingchao Chen, Hexiang Duan, Hongbo Ba, Jianjun Wu","doi":"10.1109/ICACT.2014.6778969","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778969","url":null,"abstract":"This paper investigates jammer selection in a two-way decode-and-forward (DF) relay network with imperfect channel state information (CSI). The proposed scheme enables an selection of one conventional relay and two jamming nodes to enhance communication security against eavesdropper. The conventional relay assists two sources to exchange their data via a DF protocol. The two jamming nodes are used to create interference signals to confuse the eavesdropper. Furthermore, the asymptotic performance of proposed scheme is analyzed in detail. Under the assumption that the relay can decode received signals perfectly and when the jamming power is higher than that of source nodes, we find that the proposed scheme has a high secrecy performance which is almost independent of the position of the eavesdropper.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"12 1","pages":"300-303"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88538771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6778948
Yun Jip Kim, Y. Chung, Byung Gil Lee
In these days, there are many vessel traffics to trade with foreign nations and travel abroad. Near coast or in harbor, the more traffics of transportation, the more possibility of accidents tends to occur. Thus, to reduce ships collision, vessel traffic services (VTS) centers have installed lots of equipment to keep a close eye on ships sailing in sea port, such as night observation device, telescope, and CCTV. To improve efficiently existing tracking system and overcome flaw of noises in the process of pursuit in maritime environment, considering bad weather and waves, this paper presents vessel tracking system using an image input device. The tracking system uses a fusion of Bayesian classifier to distinguish some images at initial stage, Kalman filter algorithm for keeping tracking the watercraft when it cannot be detected from the obtained image because some noises or inappropriate parameters used in the library functions may prevent detection from successive pictures, and the adaptive tracking algorithm for not only whether Kalman filtering is used as adaptive way to reduce a computational time but also disregarding the noise interference. The experimental results are included to prove the validity of the proposed method.
{"title":"Vessel tracking vision system using a combination of Kaiman filter, Bayesian classification, and adaptive tracking algorithm","authors":"Yun Jip Kim, Y. Chung, Byung Gil Lee","doi":"10.1109/ICACT.2014.6778948","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778948","url":null,"abstract":"In these days, there are many vessel traffics to trade with foreign nations and travel abroad. Near coast or in harbor, the more traffics of transportation, the more possibility of accidents tends to occur. Thus, to reduce ships collision, vessel traffic services (VTS) centers have installed lots of equipment to keep a close eye on ships sailing in sea port, such as night observation device, telescope, and CCTV. To improve efficiently existing tracking system and overcome flaw of noises in the process of pursuit in maritime environment, considering bad weather and waves, this paper presents vessel tracking system using an image input device. The tracking system uses a fusion of Bayesian classifier to distinguish some images at initial stage, Kalman filter algorithm for keeping tracking the watercraft when it cannot be detected from the obtained image because some noises or inappropriate parameters used in the library functions may prevent detection from successive pictures, and the adaptive tracking algorithm for not only whether Kalman filtering is used as adaptive way to reduce a computational time but also disregarding the noise interference. The experimental results are included to prove the validity of the proposed method.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"11 1","pages":"196-201"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79540405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}