• Title/Summary/Keyword: 탐지 전 추적

Search Result 38, Processing Time 0.023 seconds

Experimental Verification of Nondestructive Damage Detection in a Truss Structure (트러스 구조물 내 손상부위 추적에 관한 실험적 검증)

  • Park, Soo-Yong;Choi, Sang-Hyun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.7 no.3
    • /
    • pp.147-156
    • /
    • 2003
  • In this paper, a damage detection method using mode shapes of truss structures is presented. The theory is formulated based on the changes in the modal strain energy in a truss type structures due to damage. To examine the feasibility, the theory is applied to an experimental data of a 1:6 scale model of a typical hexagonal truss structure. The experiment consists of 17 damage scenarios subjected to three different types of damage. The damage evaluation results show that the proposed method detects successfully damage in truss elements and also show that the performance of proposed method can be significantly impacted by the noise in the measurement data for small damage.

Moving Object Detection and Tracking Techniques for Error Reduction (오인식률 감소를 위한 이동 물체 검출 및 추적 기법)

  • Hwang, Seung-Jun;Ko, Ha-Yoon;Baek, Joong-Hwan
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.1
    • /
    • pp.20-26
    • /
    • 2018
  • In this paper, we propose a moving object detection and tracking algorithm based on multi-frame feature point tracking information to reduce false positives. However, there are problems of detection error and tracking speed in existing studies. In order to compensate for this, we first calculate the corner feature points and the optical flow of multiple frames for camera movement compensation and object tracking. Next, the tracking error of the optical flow is reduced by the multi-frame forward-backward tracking, and the traced feature points are divided into the background and the moving object candidate based on homography and RANSAC algorithm for camera movement compensation. Among the transformed corner feature points, the outlier points removed by the RANSAC are clustered and the outlier cluster of a certain size is classified as the moving object candidate. Objects classified as moving object candidates are tracked according to label tracking based data association analysis. In this paper, we prove that the proposed algorithm improves both precision and recall compared with existing algorithms by using quadrotor image - based detection and tracking performance experiments.

ECCM Design of Tracking Radar (추적 레이다의 대전자전 설계)

  • Hong-Rak Kim;Man-Hee Lee;Sung-Ho Park;Youn-Jin Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.51-57
    • /
    • 2024
  • The tracking radar system is a pulsed tracking system that searches, detects, and tracks targets in real time for ships operating in the ocean. Ships defend themselves through soft kill operations to confuse or deceive the tracking radar. Soft Kill operations include passive chaff and active noise jamming. This paper understands the basic concepts of electronic warfare and explains various deception systems in operation on ships. In addition, each deception The radar system design to respond to the system is explained.

Fish's Activity Analysis through Frequency Analysis of Angle Information (움직임 각도의 주파수 분석을 통한 활동성 분석)

  • Kim, Cheol-Ki
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.10-15
    • /
    • 2007
  • This paper proposes the method that detects abnormal trajectory of fish with tracking data. And it is obtained by automatic tracking system based on conventional computer vision. Also, we analyze the trajectory using subband frequency features through DWT(Discrete Wavelet Transform). Through experimental results, we confirm that our results have some statistical means. The proposed method demonstrates that DWT is useful method for detecting presence of toxicoid features in environment as for an alternative of bio-monitoring tool.

A Study on the Improvement of Naval Surveillance Radar to Solve the Target Display Problem (함정용 탐색레이더의 표적 전시상태 개선에 관한 연구)

  • Sim, Min-Seop;Lee, Ji-Hyeog;Jeong, Hyeon-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.541-546
    • /
    • 2020
  • The surveillance radar for naval ships is an essential equipment of a battle system that executes the detection and tracking of targets, and the shooting support function; it calculates the three-dimensional track of the target range, azimuth, and altitude to carry out its duty. The surveillance radar consists of an antenna, a transceiver, a processing unit, and an air dryer section. The radar radiates the transmission signal on the antenna section, receives the reflected signal from the target, and amplifies the signals on the transceiver section. The signal received from the antenna is used to provide the operator with target information in various ways. This study identified the display problems when the information about the target is displayed through the radar. The causes of the problems were analyzed and improved. The tracking disappearance phenomenon caused by the altered-course of the ship was improved on the TWS tracking algorithm. The validity of the improved TWS tracking algorithm was confirmed by the normal condition of the target status on the B-scope.

Automatic Intrusion Response System based on a Self-Extension Monitoring (자기확장 모니터링 기반의 침입자동대응 시스템)

  • Jang, Hee-Jin;Kim, Sang-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.489-497
    • /
    • 2001
  • In the coming age of information warfare, information security patterns take on a more offensive than defensive stance. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. Information security products need to support an automatic response facility without human intervention in order to minimize damage to the attacked system and cope with the intrusion immediately. This paper presents an automatic intrusion response model which is developed on a Self-Extension Monitoring. It also proposes an ARTEMIS(Advanced Realtime Emergency Management and Intruder Identification System), which is designed and implemented based on the suggested model. The Self-Extension Monitoring using self-protection and replication minimizes spatial limitations on collection of monitoring information and intruder tracing. It enhances the accuracy of intrusion detection and tracing.

  • PDF

Analysis and Recognition of Behavioral Response of Selected Insects in Toxic Chemicals for Water Quality Monitoring (수질 모니터링을 위한 유해 물질 유입에 따른 생물체의 행동 반응 분석 및 인식)

  • Kim, Cheol-Ki;Cha, Eui-Young
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.663-672
    • /
    • 2002
  • In this paper, Using an automatic tracking system, behavior of an aquatic insect, Chironomus sp. (Chironomidae), was observed in semi-natural conditions in response to sub-lethal treament of a carbamate insecticide, carbofuran. The fourth instar larvae were placed in an observation cage $(6cm\times{7cm}\times{2.5cm)}$ at temperature of $18^\circ{C}$ and the light condition of 10 time (light) : 14 time (dark). The tracking system was devised to detect the instant, partial movement of the insect body. Individual movement was traced after the treatment of carbofuran (0.1ppm) for four days 2days : before treatment, 2 days : after treatment). Along with the other irregular behaviors, "ventilation activity", appearing as a shape of "compressed zig-zag", was more frequently observed after the treatment of the insecticide. The activity of the test individuals was also generally depressed after the chemical treatment. In order to detect behavioral changes of the treated specimens, wavelet analysis was implemented to characterize different movement patterns. The extracted parameters based on Discrete Wavelet Transforms (DWT) were subsequently provided to artificial neural networks to be trained to represent different patterns of the movement tracks before and after treatments of the insecticide. This combined model of wavelets and artificial neural networks was able to point out the occurrence of characteristic movement patterns, and could be an alternative tool for automatically detecting presences of toxic chemicals for water quality monitoring. quality monitoring.

Track-Before-Detect Algorithm for Multiple Target Detection (다수 표적 탐지를 위한 Track-Before-Detect 알고리듬 연구)

  • Won, Dae-Yeon;Shim, Sang-Wook;Kim, Keum-Seong;Tahk, Min-Jea;Seong, Kie-Jeong;Kim, Eung-Tai
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.9
    • /
    • pp.848-857
    • /
    • 2011
  • Vision-based collision avoidance system for air traffic management requires a excellent multiple target detection algorithm under low signal-to-noise ratio (SNR) levels. The track-before-detect (TBD) approaches have significant applications such as detection of small and dim targets from an image sequence. In this paper, two detection algorithms with the TBD approaches are proposed to satisfy the multiple target detection requirements. The first algorithm, based on a dynamic programming approach, is designed to classify multiple targets by using a k-means clustering algorithm. In the second approach, a hidden Markov model (HMM) is slightly modified for detecting multiple targets sequentially. Both of the proposed approaches are used in numerical simulations with variations in target appearance properties to provide satisfactory performance as multiple target detection methods.

Design of K-Band Radar Transceiver for Tracking High Speed Targets (고속 표적 추적을 위한 K-대역 레이다 송수신기 설계)

  • Sun, Sun-Gu;Lee, Jung-Soo;Cho, Byung-Lae;Lee, Jong-Min
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.11
    • /
    • pp.1304-1310
    • /
    • 2010
  • This study is to design FMCW radar transceiver of K-band which is used to detect and track approaching high speed targets with low altitude. The transmitter needs high output power due to small RCS targets and wide beamwidth of transmit antenna. Multi-channel receivers are required to detect and track targets by interferometer method. Transmitter consists of high power amplifier, waveguide switch, and frequency up-converter. Receiver is composed of five channel receivers, up and down converters, X-band local oscillator and waveform generator. Before manufacturing it, the proposed architecture of transceiver is proved by modeling and simulation using several parameters. Then, it is manufactured by using industrial RF components. The performance parameters are measured through experiment. In the experiment, transmitting power and receiver gain were measured with 39.64 dBm and 29.1 dB, respectively. All other parameters in the specification were satisfied as well.

Tracking Application Behaviors Using User Interactions on Android Smartphones (안드로이드 스마트폰에서 사용자 상호작용을 이용한 앱 행위 추적 기법)

  • Ahn, Woo Hyun;Joun, Young Nam
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.61-71
    • /
    • 2014
  • In recent years, malwares in Android smartphones are becoming increased explosively. Since a great deal of appsare deployed day after day, detecting the malwares requires commercial anti-virus companies to spend much time and resources. Such a situation causes malwares to be detected after they have become already spread. We propose a scheme called TAU that dynamically tracks application behaviors to specify apps with potential security risks. TAU keeps track of how a user's interactions to smartphones incurs the app installation, the route of app spread, and the behavior of app execution. This tracking specifies apps that have the possibility of attacking the smartphones using the drive-by download and update attack schemes. Moreover, the tracked behaviors are used to decide whether apps are repackaged or not. Therefore, TAU allows anti-virus companies to detect malwares efficiently and rapidly by guiding to preferentially analyze apps with potential security risks.