• Title/Summary/Keyword: 탐지 및 식별

Search Result 301, Processing Time 0.028 seconds

Construction of Corrected Image about Cloud Cover Area Using Multi-temporal Landsat Data (다시기 Landsat 자료를 이용한 구름지역 보정 영상 제작)

  • Han, Sang-Hyun;Park, Joon-Kyu
    • Proceedings of the KAIS Fall Conference
    • /
    • 2012.05b
    • /
    • pp.845-847
    • /
    • 2012
  • 본 논문에서는 다수의 Landsat 영상을 이용하여 구름지역을 보정한 영상을 제작하였다. 비슷한 시기에 취득된 다수의 영상에서 구름을 제거하고, 구름이 제거된 부분을 다른 영상의 온전한 화소값을 기준으로 복원함으로써 효과적으로 구름지역 보정 영상을 제작할 수 있었다. 제작된 영상은 구름 때문에 식별이 불가능한 지역을 크게 감소시켰으며, 주기적인 위성영상의 취득이 어려운 여건을 개선하는 한편, 대규모 지역의 변화탐지 및 영상분류 등 다양한 분야에 활용될 것이다.

  • PDF

야시장비의 기술현황 및 발전추세

  • Hong, Seok-Min;Song, In-Seop
    • Defense and Technology
    • /
    • no.10 s.236
    • /
    • pp.66-75
    • /
    • 1998
  • 전자광학장비중 야시장비는 다른 정보 장비들이 주로 탐지를 위주로 하는 것에 비해 물체의 실제 모양을 영상으로 관측하게 함으로써 가장 확실한 정보를 제공하여 신속한 대응 조치를 강구할 수 있도록 한다. 즉, 정확한 표적 식별과 적시성이 유지되어 정밀 타격이 가능하며 아울러 효과 분석까지 용이하여 추가 대책을 강구할 수 있다. 특히 최근의 야시장비는 레이저 또는 레이다 장비들과는 달리 전자파를 방출하지 않는 수동형 센서로 대부분 개발되므로 적에게 노출될 위험이 매우 적다

  • PDF

어체 크기의 자동식별을 위한 split beam 음향 변환기의 개발

  • 이대재;신형일;이경훈;이원섭;강희영
    • Proceedings of the Korean Society of Fisheries Technology Conference
    • /
    • 2001.05a
    • /
    • pp.63-64
    • /
    • 2001
  • 최근 세계 각국은 자국 이익에 우선하는 배타적 경제수역을 설정하고, EEZ경제수역에 대한 어업생물자원의 효율적 관리를 하기 위해 주요 어종별 TAC제도를 도입하고 있다. 이 제도의 시행과 관련하여 음향을 이용한 어업생물자원량의 정량적인 계측과 적정 크기 이상의 어체만을 선택하여 어획할 수 있는 어군탐지시스템의 개발 및 보급이 절실히 요구되고 있다. (중략)

  • PDF

악성코드 특징정보(Feature)의 종류 및 시스템 적용 사례 연구

  • Kim, Byeongjae;Han, Sangwon;Lee, JaeKwang
    • Review of KIISC
    • /
    • v.31 no.3
    • /
    • pp.81-87
    • /
    • 2021
  • 공격자는 공격을 성공적으로 수행하기 위해 악성코드를 주로 사용하며, 방어자는 공격자의 공격이 완성되는 최종 단계 이전에 악성코드를 탐지하여 무력화 할 수 있도록 노력하는 것이 매우 중요하다. 그래서 이를 선제적으로 식별하고 대응하기 위해 인공지능 분석, 연관분석, 프로파일링 등 다양한 분석 기법이 연구되어지고 있다. 이러한 분석 기법들은 사전에 악성코드의 특징을 파악하고 어떤 악성코드 특징정보를 분석할지 선택하는 것이 가장 중요하다. 본 연구에서는 악성코드 특징정보의 종류와 실제 시스템에 적용한 사례에 대해서 살펴보고자 한다.

A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)

  • Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1525-1540
    • /
    • 2015
  • Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.

Target Classification in Sparse Sampling Acoustic Sensor Networks using DTW-Cosine Algorithm (저비율 샘플링 음향 센서네트워크에서 DTW-Cosine 알고리즘을 이용한 목표물 식별기법)

  • Kim, Young-Soo;Kang, Jong-Gu;Kim, Dae-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.221-225
    • /
    • 2008
  • In this paper, to avoid the frequency analysis requiring a high sampling rate, time-warped similarity measure algorithms, which are able to classify objects even with a low-rate sampling rate as time- series methods, are presented and proposed the DTW-Cosine algorithm, as the best classifier among them in wireless sensor networks. Two problems, local time shifting and spatial signal variation, should be solved to apply the time-warped similarity measure algorithms to wireless sensor networks. We find that our proposed algorithm can overcome those problems very efficiently and outperforms the other algorithms by at least 10.3% accuracy.

Application and Performance Analysis of Machine Learning for GPS Jamming Detection (GPS 재밍탐지를 위한 기계학습 적용 및 성능 분석)

  • Jeong, Inhwan
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.47-55
    • /
    • 2019
  • As the damage caused by GPS jamming has been increased, researches for detecting and preventing GPS jamming is being actively studied. This paper deals with a GPS jamming detection method using multiple GPS receiving channels and three-types machine learning techniques. Proposed multiple GPS channels consist of commercial GPS receiver with no anti-jamming function, receiver with just anti-noise jamming function and receiver with anti-noise and anti-spoofing jamming function. This system enables user to identify the characteristics of the jamming signals by comparing the coordinates received at each receiver. In this paper, The five types of jamming signals with different signal characteristics were entered to the system and three kinds of machine learning methods(AB: Adaptive Boosting, SVM: Support Vector Machine, DT: Decision Tree) were applied to perform jamming detection test. The results showed that the DT technique has the best performance with a detection rate of 96.9% when the single machine learning technique was applied. And it is confirmed that DT technique is more effective for GPS jamming detection than the binary classifier techniques because it has low ambiguity and simple hardware. It was also confirmed that SVM could be used only if additional solutions to ambiguity problem are applied.

Leak Location Detection of Underground Water Pipes using Acoustic Emission and Acceleration Signals (음향방출 및 가속도 신호를 이용한 지하매설 상수도배관의 누수지점 탐지연구)

  • Lee, Young-Sup;Yoon, Dong-Jin;Jeong, Jung-Chae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.23 no.3
    • /
    • pp.227-236
    • /
    • 2003
  • Leaks in underground pipelines can cause social, environmental and economical problems. One of relevant countermeasures against leaks is to find and repair of leak points of the pipes. Leak noise is a good source to identify the location of leak points of the pipelines. Although there have been several methods to detect the leak location with leak noise, such as listening rods, hydrophones or ground microphones, they have not been so efficient tools. In this paper, acoustic emission (AE) sensors and accelermeters are used to detect leak locations which could provide all easier and move efficient method. Filtering, signal processing and algorithm of raw input data from sensors for the detection of leak location are described. A 120m-long pipeline system for experiment is installed and the results with the system show that the algorithm with the AE sensors and accelerometers offers accurate pinpointing of leaks. Theoretical analysis of sound wave propagation speed of water in underground pipes, which is critically important in leak locating, is also described.

Video Analysis System for Action and Emotion Detection by Object with Hierarchical Clustering based Re-ID (계층적 군집화 기반 Re-ID를 활용한 객체별 행동 및 표정 검출용 영상 분석 시스템)

  • Lee, Sang-Hyun;Yang, Seong-Hun;Oh, Seung-Jin;Kang, Jinbeom
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.89-106
    • /
    • 2022
  • Recently, the amount of video data collected from smartphones, CCTVs, black boxes, and high-definition cameras has increased rapidly. According to the increasing video data, the requirements for analysis and utilization are increasing. Due to the lack of skilled manpower to analyze videos in many industries, machine learning and artificial intelligence are actively used to assist manpower. In this situation, the demand for various computer vision technologies such as object detection and tracking, action detection, emotion detection, and Re-ID also increased rapidly. However, the object detection and tracking technology has many difficulties that degrade performance, such as re-appearance after the object's departure from the video recording location, and occlusion. Accordingly, action and emotion detection models based on object detection and tracking models also have difficulties in extracting data for each object. In addition, deep learning architectures consist of various models suffer from performance degradation due to bottlenects and lack of optimization. In this study, we propose an video analysis system consists of YOLOv5 based DeepSORT object tracking model, SlowFast based action recognition model, Torchreid based Re-ID model, and AWS Rekognition which is emotion recognition service. Proposed model uses single-linkage hierarchical clustering based Re-ID and some processing method which maximize hardware throughput. It has higher accuracy than the performance of the re-identification model using simple metrics, near real-time processing performance, and prevents tracking failure due to object departure and re-emergence, occlusion, etc. By continuously linking the action and facial emotion detection results of each object to the same object, it is possible to efficiently analyze videos. The re-identification model extracts a feature vector from the bounding box of object image detected by the object tracking model for each frame, and applies the single-linkage hierarchical clustering from the past frame using the extracted feature vectors to identify the same object that failed to track. Through the above process, it is possible to re-track the same object that has failed to tracking in the case of re-appearance or occlusion after leaving the video location. As a result, action and facial emotion detection results of the newly recognized object due to the tracking fails can be linked to those of the object that appeared in the past. On the other hand, as a way to improve processing performance, we introduce Bounding Box Queue by Object and Feature Queue method that can reduce RAM memory requirements while maximizing GPU memory throughput. Also we introduce the IoF(Intersection over Face) algorithm that allows facial emotion recognized through AWS Rekognition to be linked with object tracking information. The academic significance of this study is that the two-stage re-identification model can have real-time performance even in a high-cost environment that performs action and facial emotion detection according to processing techniques without reducing the accuracy by using simple metrics to achieve real-time performance. The practical implication of this study is that in various industrial fields that require action and facial emotion detection but have many difficulties due to the fails in object tracking can analyze videos effectively through proposed model. Proposed model which has high accuracy of retrace and processing performance can be used in various fields such as intelligent monitoring, observation services and behavioral or psychological analysis services where the integration of tracking information and extracted metadata creates greate industrial and business value. In the future, in order to measure the object tracking performance more precisely, there is a need to conduct an experiment using the MOT Challenge dataset, which is data used by many international conferences. We will investigate the problem that the IoF algorithm cannot solve to develop an additional complementary algorithm. In addition, we plan to conduct additional research to apply this model to various fields' dataset related to intelligent video analysis.

Evaluation of leakage detection performance according to leakage scenarios of water distribution systems based on deep neural networks (DNN기반 상수도시스템 누수시나리오에 따른 누수탐지성능 평가)

  • Kim, Ryul;Choi, Young Hwan
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.5
    • /
    • pp.347-356
    • /
    • 2023
  • In Water Distribution Systems (WDSs), can abnormal hydraulic and water quality conditions such as red-water phenomenon and leakage occur. To restore them, data is generated through various meters data to predict and detect. However, in the case of leakage if difficult to detect unless direct exploration is performed. Among them, unreported leakage, are not seen visually and account for the most considerable volumes of leakage, which leads to economic loss. Bur direct exploration is limited through on site conditions such as securing professional manpower. In this paper, leakage volumes and location were randomly generated for the WDS, which was assumed to be calibrated, and it was detected through a deep learning model. For abnormal data generation, the leakage was simulated using the emitter coefficient, and leakage detection was successfully performed through the generated abnormal data and normal data.