• Title/Summary/Keyword: Detection Key

Search Result 1,206, Processing Time 0.028 seconds

The Visual Inspection of Key Pad Parts Using a Fuzzy Binarization Algorithm

  • Kim, Young-Baek;Lee, Hong-Chang;Rhee, Sang-Yong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.3
    • /
    • pp.211-216
    • /
    • 2011
  • The detection of defective parts in a factory is usually performed by the human eye. Therefore, heavy manpower is in demand for minor enterprises. An image processing system is desired to solve this drawback. However, due to the variety of the products characteristics, an general algorithm is needed that can adapt to these characteristics. Therefore, in this paper, the key pad parts' characteristics which need to be dealt with are analyzed in order to embody the image processing algorithm that is suggested. The experimental results show the probability of detecting a defective part is 95% with a detection time of 0.203 seconds, on the average.

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

  • Sujihelen, L.;Jayakumar, C.;Senthilsingh, C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2447-2455
    • /
    • 2018
  • Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.

Wideband Lamb wave analysis based on continuous wavelet transform

  • Shi, Lihua;Wang, Xinwei;Li, Gang;Zhang, Lingyan
    • Smart Structures and Systems
    • /
    • v.1 no.3
    • /
    • pp.257-266
    • /
    • 2005
  • In Lamb wave detection of damages in smart structures, the excitation pulse is usually designed as a narrow band burst wave for the convenience of analysis and recognition. However, the wideband excitation can excite more modes in plate/shell structure and thus provides extra information for changes of the structure. This paper presents a method that can extract information in wideband Lamb wave signals. By transforming the detected signals into various sub-frequency band, the measured signal can be converted to its equivalences of narrow band excitations, therefore, the information in different frequency bands can be acquired from a single test and in the same time the complicity of wideband signal can be simplified. Some test results are provided to verify this method.

A New Chemosensing Ensemble for Colorimetric Detection of Oxalate in Water

  • Tang, Li-Jun;Liu, Ming-Hui
    • Bulletin of the Korean Chemical Society
    • /
    • v.31 no.11
    • /
    • pp.3159-3162
    • /
    • 2010
  • To realize highly selective recognition of oxalate in water, a new chemosensing ensemble that behaves highly selective colorimetric recognition of oxalate in water at pH 7.4 has been developed. The ensemble was constructed by a pyrrole containing mononuclear copper complex and chromeazurol S. The ensemble shows a highly selective recognition of oxalate through an obvious color change from blue to yellow upon the addition of oxalate, whereas, other dicarboxylates such as malonate, succinate, fumarate, maleate, glutarate, adipate, phthalate, isophthalate and terephthalate do not induce any noticeable color changes. The oxalate recognition process is not significantly affected by other coexisting dicarboxylate.

Development of Penicillium italicum-Specific Primers for Rapid Detection among Fungal Isolates in Citrus

  • Chen, Kai;Tian, Zhonghuan;Jiang, Fatang;Long, Chao-an
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.6
    • /
    • pp.984-988
    • /
    • 2019
  • Blue mold in citrus is caused by Penicillium italicum. In this study, the P. italicum-specific primers were developed for rapid detection based on the conserved genes RPB1 and RPB2 among Penicillium genomes. The two primer pairs RPB1-a and RPB1-b proved to be specific to detect P. italicum. The PCR assay among 39 fungal isolates and the colonial, pathogenic morphologies and molecular methods validated the specificity and reliability of these two primer pairs. This report provided a method and P. italicum-specific primers, which might greatly contribute to citrus postharvest industry.

Antiblurry Dejitter Image Stabilization Method of Fuzzy Video for Driving Recorders

  • Xiong, Jing-Ying;Dai, Ming;Zhao, Chun-Lei;Wang, Ruo-Qiu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3086-3103
    • /
    • 2017
  • Video images captured by vehicle cameras often contain blurry or dithering frames due to inadvertent motion from bumps in the road or by insufficient illumination during the morning or evening, which greatly reduces the perception of objects expression and recognition from the records. Therefore, a real-time electronic stabilization method to correct fuzzy video from driving recorders has been proposed. In the first stage of feature detection, a coarse-to-fine inspection policy and a scale nonlinear diffusion filter are proposed to provide more accurate keypoints. Second, a new antiblurry binary descriptor and a feature point selection strategy for unintentional estimation are proposed, which brought more discriminative power. In addition, a new evaluation criterion for affine region detectors is presented based on the percentage interval of repeatability. The experiments show that the proposed method exhibits improvement in detecting blurry corner points. Moreover, it improves the performance of the algorithm and guarantees high processing speed at the same time.

A Novel Non-contact Measurement Method for the Detection of Current Flowing Through Concealed Conductors

  • Yang, Fan;Liu, Kai;Zhu, Liwei;Hu, Jiayuan;Wang, Xiaoyu;Shen, Xiaoming;Luo, Hanwu;Ammad, Jadoon
    • Journal of Magnetics
    • /
    • v.22 no.1
    • /
    • pp.43-48
    • /
    • 2017
  • In order to detect the current flowing through concealed conductor, this paper proposes a new method based on derivative method. Firstly, this paper analyzes the main peak characteristic of the derivative function of magnetic field generated by a current-carrying conductor, and a relationship between the current flowing through the conductor and the main peak of the derivative function is obtained and applied to calculate the current. Then, the method is applied to detect the conductor current flowing through grounding grids of substations. Finally, the numerical experimental and field experiment verified the feasibility and accuracy of the method, and the computing results show that the method can effectively measure the conductor current of grounding grids with low error, and the error is within 5 %.

A Novel Technique for Detection of Repacked Android Application Using Constant Key Point Selection Based Hashing and Limited Binary Pattern Texture Feature Extraction

  • MA Rahim Khan;Manoj Kumar Jain
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.141-149
    • /
    • 2023
  • Repacked mobile apps constitute about 78% of all malware of Android, and it greatly affects the technical ecosystem of Android. Although many methods exist for repacked app detection, most of them suffer from performance issues. In this manuscript, a novel method using the Constant Key Point Selection and Limited Binary Pattern (CKPS: LBP) Feature extraction-based Hashing is proposed for the identification of repacked android applications through the visual similarity, which is a notable feature of repacked applications. The results from the experiment prove that the proposed method can effectively detect the apps that are similar visually even that are even under the double fold content manipulations. From the experimental analysis, it proved that the proposed CKPS: LBP method has a better efficiency of detecting 1354 similar applications from a repository of 95124 applications and also the computational time was 0.91 seconds within which a user could get the decision of whether the app repacked. The overall efficiency of the proposed algorithm is 41% greater than the average of other methods, and the time complexity is found to have been reduced by 31%. The collision probability of the Hashes was 41% better than the average value of the other state of the art methods.

UAV-based bridge crack discovery via deep learning and tensor voting

  • Xiong Peng;Bingxu Duan;Kun Zhou;Xingu Zhong;Qianxi Li;Chao Zhao
    • Smart Structures and Systems
    • /
    • v.33 no.2
    • /
    • pp.105-118
    • /
    • 2024
  • In order to realize tiny bridge crack discovery by UAV-based machine vision, a novel method combining deep learning and tensor voting is proposed. Firstly, the grid images of crack are detected and descripted based on SE-ResNet50 to generate feature points. Then, the probability significance map of crack image is calculated by tensor voting with feature points, which can define the direction and region of crack. Further, the crack detection anchor box is formed by non-maximum suppression from the probability significance map, which can improve the robustness of tiny crack detection. Finally, a case study is carried out to demonstrate the effectiveness of the proposed method in the Xiangjiang-River bridge inspection. Compared with the original tensor voting algorithm, the proposed method has higher accuracy in the situation of only 1-2 pixels width crack and the existence of edge blur, crack discontinuity, which is suitable for UAV-based bridge crack discovery.