• Title/Summary/Keyword: Behavior detection

Search Result 935, Processing Time 0.027 seconds

A Potts Automata algorithm for Noise Removal and Edge Detection (Potts Automata를 이용한 영상의 잡음 제거 및 에지 주줄)

  • 이석기;김석태;조성진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.3C
    • /
    • pp.327-335
    • /
    • 2003
  • Cellular Automata is discrete dynamical systems which natural phenomena may be specified completely in terms of local relation. In this Paper we Propose noise removal and edge detection algorithm using a Potts Automata which is based on Cellular Automata. The proposed method is aimed to locally increase or decrease the differences in gray level values between pixel of the image without loss of the main characteristics of the image. The dynamical behavior of these automata is determined by Lyapunov operators for sequential and parallel update. We have found that proposed automata rules Present very fast convergence to fixed points, stability in front of random noisy images. Based on the experimental results we discuses the advantage and efficiency.

Experimental study on acoustic emission characteristics of reinforced concrete components

  • Gu, Aijun;Luo, Ying;Xu, Baiqiang
    • Smart Structures and Systems
    • /
    • v.16 no.1
    • /
    • pp.67-79
    • /
    • 2015
  • Acoustic emission analysis is an effective technique for monitoring the evolution of damage in a structure. An experimental analysis on a set of reinforced concrete beams under flexural loading was carried out. A mixed AE analysis method which used both parameter-based and signal-based techniques was presented to characterize and identify different failure mechanisms of damage, where the signal-based analysis was performed by using the Hilbert-Huang transform. The maximum instantaneous energy of typical damage events and the corresponding frequency characteristics were established, which provided a quantitative assessment of reinforced concrete beam using AE technique. In the bending tests, a "pitch-catch" system was mounted on a steel bar to assess bonding state of the steel bar in concrete. To better understand the AE behavior of bond-slip damage between steel bar and concrete, a special bond-slip test called pullout test was also performed. The results provided the basis of quantitative AE to identify both failure mechanisms and level of damages of civil engineering structures.

Proposal of Process Hollowing Attack Detection Using Process Virtual Memory Data Similarity (프로세스 가상 메모리 데이터 유사성을 이용한 프로세스 할로윙 공격 탐지)

  • Lim, Su Min;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.431-438
    • /
    • 2019
  • Fileless malware uses memory injection attacks to hide traces of payloads to perform malicious works. During the memory injection attack, an attack named "process hollowing" is a method of creating paused benign process like system processes. And then injecting a malicious payload into the benign process allows malicious behavior by pretending to be a normal process. In this paper, we propose a method to detect the memory injection regardless of whether or not the malicious action is actually performed when a process hollowing attack occurs. The replication process having same execution condition as the process of suspending the memory injection is executed, the data set belonging to each process virtual memory area is compared using the fuzzy hash, and the similarity is calculated.

Deep Learning(CNN) based Worker Detection on Infrared Radiation Image Analysis (딥러닝(CNN)기반 저해상도 IR이미지 분석을 통한 작업자 인식)

  • Oh, Wonsik;Lee, Ugwiyeon;Oh, Jeongseok
    • Journal of the Korean Institute of Gas
    • /
    • v.22 no.6
    • /
    • pp.8-15
    • /
    • 2018
  • worker-centered safety management for hazardous areas in the plant is required. The causes of gas accidents in the past five years are closely related to the behavior of the operator, such as careless handling of the user, careless handling of the suppliers, and intentional, as well as equipment failure and accident of thought. In order to prevent such accidents, real-time monitoring of hazardous areas in the plant is required. However, when installing a camera in a work space for real-time monitoring, problems such as human rights abuse occur. In order to prevent this, an infrared camera with low resolution with low exposure of the operator is used. In real-time monitoring, image analysis is performed using CNN algorithm, not human, to prevent human rights violation.

Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things

  • Wu, Jun;Wang, Cong;Yu, Yue;Song, Tiecheng;Hu, Jing
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.976-986
    • /
    • 2020
  • Internet of Things (IoT) is considered the future network to support wireless communications. To realize an IoT network, sufficient spectrum should be allocated for the rapidly increasing IoT devices. Through cognitive radio, unlicensed IoT devices exploit cooperative spectrum sensing (CSS) to opportunistically access a licensed spectrum without causing harmful interference to licensed primary users (PUs), thereby effectively improving the spectrum utilization. However, an open access cognitive IoT allows abnormal IoT devices to undermine the CSS process. Herein, we first establish a hard-combining attack model according to the malicious behavior of falsifying sensing data. Subsequently, we propose a weighted sequential hypothesis test (WSHT) to increase the PU detection accuracy and decrease the sampling number, which comprises the data transmission status-trust evaluation mechanism, sensing data availability, and sequential hypothesis test. Finally, simulation results show that when various attacks are encountered, the requirements of the WSHT are less than those of the conventional WSHT for a better detection performance.

Sipping Test Technology for Leak Detection of Fission Products from Spent Nuclear Fuel (사용후핵연료 핵분열생성물 누출탐상 Sipping 검사기술)

  • Shin, Jung Cheol;Yang, Jong Dae;Sung, Un Hak;Ryu, Sung Woo;Park, Young Woo
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.16 no.2
    • /
    • pp.18-24
    • /
    • 2020
  • When a damage occurs in the nuclear fuel burning in the reactor, fission products that should be in the nuclear fuel rod are released into the reactor coolant. In this case, sipping test, a series of non-destructive inspection methods, are used to find leakage in nuclear fuel assemblies during the power plant overhaul period. In addition, the sipping test is also used to check the integrity of the spent fuel for moving to an intermediate dry storage, which is carried out as the first step of nuclear decommissioning, . In this paper, the principle and characteristics of the sipping test are described. The structure of the sipping inspection equipment is largely divided into a suction device that collects fissile material emitted from a damaged assembly and an analysis device that analyzes their nuclides. In order to make good use of the sipping technology, the radioactive level behavior of the primary system coolant and major damage mechanisms in the event of nuclear fuel damage are also introduced. This will be a reference for selecting an appropriate sipping method when dismantling a nuclear power plant in the future.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

Z-score Based Abnormal Detection for Stable Operation of the Series/Parallel-cell Configured Battery Pack (직병렬조합 배터리팩의 안전운용을 위한 Z-score 기반 이상 동작 검출 방법)

  • Kang, Deokhun;Lee, Pyeong-Yeon;Kim, Deokhan;Kim, Seung-Keun;Kim, Jonghoon
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.26 no.6
    • /
    • pp.390-396
    • /
    • 2021
  • Lithium-ion batteries have been designed and used as battery packs with series and parallel combinations that are suitable for use. However, due to its internal electrochemical properties, producing the battery's condition at the same value is impossible for individual cells. In addition, the management of characteristic deviations between individual cells is essential for the safe and efficient use of batteries as aging progresses with the use of batteries. In this work, we propose a method to manage deviation properties and detect abnormal behavior in the configuration of a combined battery pack of these multiple battery cells. The proposed method can separate and detect probabilistic low-frequency information according to statistical information based on Z-score. The verification of the proposed algorithm was validated using experimental results from 10S3P battery packs, and the implemented algorithm based on Z-score was validated as a way to effectively manage multiple individual cell information.

Detection of Unbalanced Voltage Cells in Series-connected Lithium-ion Batteries Using Single-frequency Electrochemical Impedance Spectroscopy

  • Togasaki, Norihiro;Yokoshima, Tokihiko;Oguma, Yasumasa;Osaka, Tetsuya
    • Journal of Electrochemical Science and Technology
    • /
    • v.12 no.4
    • /
    • pp.415-423
    • /
    • 2021
  • For a battery module where single cells are connected in series, the single cells should each have a similar state of charge (SOC) to prevent them from being exposed to an overcharge or over-discharge during charge-discharge cycling. To detect the existence of unbalanced SOC cells in a battery module, we propose a simple measurement method using a single-frequency response of electrochemical impedance spectroscopy (EIS). For a commercially available graphite/nickel-cobalt-aluminum-oxide lithium-ion cell, the cell impedance increases significantly below SOC20%, while the impedance in the medium SOC region (SOC20%-SOC80%) remains low with only minor changes. This impedance behavior is mostly due to the elementary processes of cathode reactions in the cell. Among the impedance values (Z, Z', Z"), the imaginary component of Z" regarding cathode reactions changes heavily as a function of SOC, in particular, when the EIS measurement is performed around 0.1 Hz. Thanks to the significant difference in the time constant of cathode reactions between ≤SOC10% and ≥SOC20%, a single-frequency EIS measurement enlarges the difference in impedance between balanced and unbalanced cells in the module and facilitates an ~80% improvement in the detection signal compared to results with conventional EIS measurements.

The Analysis of the Activity Patterns of Dog with Wearable Sensors Using Machine Learning

  • Hussain, Ali;Ali, Sikandar;Kim, Hee-Cheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.141-143
    • /
    • 2021
  • The Activity patterns of animal species are difficult to access and the behavior of freely moving individuals can not be assessed by direct observation. As it has become large challenge to understand the activity pattern of animals such as dogs, and cats etc. One approach for monitoring these behaviors is the continuous collection of data by human observers. Therefore, in this study we assess the activity patterns of dog using the wearable sensors data such as accelerometer and gyroscope. A wearable, sensor -based system is suitable for such ends, and it will be able to monitor the dogs in real-time. The basic purpose of this study was to develop a system that can detect the activities based on the accelerometer and gyroscope signals. Therefore, we purpose a method which is based on the data collected from 10 dogs, including different nine breeds of different sizes and ages, and both genders. We applied six different state-of-the-art classifiers such as Random forests (RF), Support vector machine (SVM), Gradient boosting machine (GBM), XGBoost, k-nearest neighbors (KNN), and Decision tree classifier, respectively. The Random Forest showed a good classification result. We achieved an accuracy 86.73% while the detecting the activity.

  • PDF