• 제목/요약/키워드: Detection Key

Search Result 1,206, Processing Time 0.037 seconds

Automotive Safety and Convenience Service Using Bluetooth and Smartwatch (블루투스와 스마트워치를 활용한 자동차 안전 및 편의 서비스)

  • Park, Han-Saem;Im, Noh-Gan;Cho, Ji-Yeon;Lee, Jong-Bae;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1188-1191
    • /
    • 2020
  • In this paper, automotive safety and convenience service is proposed based on bluetooth and smart watch. The proposed service performs accident detection, kidnapping detection, kid-left-alone-in-car detection, parking location recording, and smart key function. Conventional smartphone services often fails to precisely recognize accident and kidnapping situations since smartphone is located on the dashboard or in the bag. On the contrary, smartwatch recognizes accident and kidnapping situations more precisely since it is always worn on the wrist with hearbeat monitoring. The proposed service recognise various situations around drives and passengers using acceleration sensor, GPS sensor, heartbeat sensor and bluetooth link status. It also performs accident notice, sound recording, and other necessary actions. It also performs door opening, door closing, hazard light flickering, and other necessary actions using OBD-II connection to the vehicle.

Analysis of Anti-Islanding Schemes using Frequency Drift in Distributed Generation System (분산전원 시스템의 주파수 변동을 통한 단독운전 방지기법 분석)

  • Jo, Yeong-Min;Cho, Sang-Yoon;Song, Seung-Ho;Choy, Ick;Choi, Ju-Yeop;Lee, Young-Kwoun
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.20 no.3
    • /
    • pp.247-254
    • /
    • 2015
  • Unintentional islanding results in safety hazards, power quality degradation, and many other issues. Thus, islanding detection of grid-connected distributed generation system is a key function for standards compliance. Many anti-islanding schemes are currently being studied; however, existing anti-islanding schemes used in inverters have power quality degradation and non-detection zone issues. Therefore, this paper analyzes existing anti-islanding schemes by using frequency drift in accordance with both islanding detection performance and power quality. This paper also proposes a new anti-islanding scheme by using frequency drift. Both simulation and experimental results show that the proposed scheme has negligible power quality degradation and no non-detection zones compared with other existing schemes.

Defection Detection Analysis Based on Time-Dependent Data

  • Song, Hee-Seok;Kim, Jae-Kyeong;Chae, Kyung-Hee
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.11a
    • /
    • pp.445-453
    • /
    • 2002
  • Past and current customer behavior is the best predicator of future customer behavior. This paper introduces a procedure on personalized defection detection and prevention for an online game site. The basic idea for our defection detection and prevention is adopted from the observation that potential defectors have a tendency to take a couple of months or weeks to gradually change their behavior (i.e. trim-out their usage volume) before their eventual withdrawal. For this purpose, we suggest a SOM (Self-Organizing Map) based procedure to determine the possible states of customer behavior from past behavior data. Based on this representation of the state of behavior, potential defectors are detected by comparing their monitored trajectories of behavior states with frequent and confident trajectories of past defectors. The key feature of this study includes a defection prevention procedure which recommends the desirable behavior state for the ext period so as to lower the likelihood of defection. The defection prevention procedure can be used to design a marketing campaign on an individual basis because it provides desirable behavior patterns for the next period. The experiments demonstrate that our approach is effective for defection prevention and efficient for defection detection because it predicts potential defectors without deterioration of prediction accuracy compared to that of the MLP (Multi-Layer Perceptron) neural network.

  • PDF

Protective Effect of Coptidis Rhizoma on SNAP-Induced Cytotoxicity in Pancreatic RINm5F Cells (SNAP 유도성 RINm5F 세포 독성에 대한 황연 추출물의 방어효과)

  • 류도곤;권강범;양정예;김은경;김강산
    • The Journal of Korean Medicine
    • /
    • v.24 no.2
    • /
    • pp.159-165
    • /
    • 2003
  • Objectives : Coptidis rhizoma (CR) is an oriental medicine that has been used in many traditional prescriptions against diabetes mellitus in Korea for centuries. Our purpose was to determine the protective effect and its action mechanism of CR on the cytotoxicity of pancreatic -cell line (RINm5F cell). Methods : In this experiment, we used methods such as MTT assay for detection of cytotoxicity, DNA fragmentation assay for detection of apoptotic cell death, LDH activity assay for detection of necrotic cell death, and measurement of $DiOC_{6}$ (3) retention for detection of mitochondrial membrane potential (MMP). Background : Nitric oxide (NO) is believed to playa key role in the process of pancreatic -cell destruction leading to insulin-dependent diabetes mellitus (IDDM). Results : Exposure of RINm5F cells to chemical NO donor such as S-nitroso-N-acetylpenicillamine (SNAP) induced cytotoxic events such as DNA fragmentation and lactate dehydrogenase (LDH) release into medium. However, pretreatment of RINm5F cells with CR extract ($10~50{\mu\textrm{g}}/ml$) for 3 hours prevented SNAP-induced DNA fragmentation and LDH release into medium through the inhibition of MMP disruption. Conclusions : These results suggest that CR may be a candidate for a therapeutic or preventing agent against IDDM.

  • PDF

A Risk Classification Based Approach for Android Malware Detection

  • Ye, Yilin;Wu, Lifa;Hong, Zheng;Huang, Kangyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.959-981
    • /
    • 2017
  • Existing Android malware detection approaches mostly have concentrated on superficial features such as requested or used permissions, which can't reflect the essential differences between benign apps and malware. In this paper, we propose a quantitative calculation model of application risks based on the key observation that the essential differences between benign apps and malware actually lie in the way how permissions are used, or rather the way how their corresponding permission methods are used. Specifically, we employ a fine-grained analysis on Android application risks. We firstly classify application risks into five specific categories and then introduce comprehensive risk, which is computed based on the former five, to describe the overall risk of an application. Given that users' risk preference and risk-bearing ability are naturally fuzzy, we design and implement a fuzzy logic system to calculate the comprehensive risk. On the basis of the quantitative calculation model, we propose a risk classification based approach for Android malware detection. The experiments show that our approach can achieve high accuracy with a low false positive rate using the RandomForest algorithm.

Real-time steady state identification technology of a heat pump system to develop fault detection and diagnosis system (열펌프의 고장감지 및 진단시스템 구축을 위한 실시간 정상상태 진단기법 개발)

  • Kim, Min-Sung;Yoon, Seok-Ho;Kim, Min-Soo
    • Proceedings of the SAREK Conference
    • /
    • 2008.06a
    • /
    • pp.282-287
    • /
    • 2008
  • Identification of steady-state is the first step in developing a fault detection and diagnosis (FDD) system. In a complete FDD system, the steady-state detector will be included as a module in a self-learning algorithm which enables the working system's reference model to "tune" itself to its particular installation. In this study, a steady-state detector of a residential air conditioner based on moving windows was designed. Seven representing measurements were selected as key features for steady-state detection. The optimized moving window size and the feature thresholds was suggested through startup transient test and no-fault steady-state test. Performance of the steady-state detector was verified during indoor load change test. From the research, the general methodology to design a moving window steady-state detector was provided for vapor compression applications.

  • PDF

Implementation of an LFM-FSK Transceiver for Automotive Radar

  • Yoo, HyunGi;Park, MyoungYeol;Kim, YoungSu;Ahn, SangChul;Bien, Franklin
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.4
    • /
    • pp.258-264
    • /
    • 2015
  • The first 77 GHz transceiver that applies a heterodyne structure-based linear frequency modulation-frequency shift keying (LFM-FSK) front-end module (FEM) is presented. An LFM-FSK waveform generator is proposed for the transceiver design to avoid ghost target detection in a multi-target environment. This FEM consists of three parts: a frequency synthesizer, a 77 GHz up/down converter, and a baseband block. The purpose of the FEM is to make an appropriate beat frequency, which will be the key to solving problems in the digital signal processor (DSP). This paper mainly focuses on the most challenging tasks, including generating and conveying the correct transmission waveform in the 77 GHz frequency band to the DSP. A synthesizer test confirmed that the developed module for the signal generator of the LFM-FSK can produce an adequate transmission signal. Additionally, a loop back test confirmed that the output frequency of this module works well. This development will contribute to future progress in integrating a radar module for multi-target detection. By using the LFM-FSK waveform method, this radar transceiver is expected to provide multi-target detection, in contrast to the existing method.

Intrusion Detection Using Log Server and Support Vector Machines

  • Donghai Guan;Donggyu Yeo;Lee, Juwan;Dukwhan Oh
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.682-684
    • /
    • 2003
  • With the explosive rapid expansion of computer using during the past few years, security has become a crucial issue for modem computer systems. Today, there are many intrusion detection systems (IDS) on the Internet. A variety of intrusion detection techniques and tools exist in the computer security community such as enterprise security management system (ESM) and system integrity checking tools. However, there is a potential problem involved with intrusion detection systems that are installed locally on the machines to be monitored. If the system being monitored is compromised, it is quite likely that the intruder will after the system logs and the intrusion logs while the intrusion remains undetected. In this project KIT-I, we adopt remote logging server (RLS) mechanism, which is used to backup the log files to the server. Taking into account security, we make use of the function of SSL of Java and certificate authority (CA) based key management. Furthermore, Support Vector Machine (SVM) is applied in our project to detect the intrusion activities.

  • PDF

Performance of DF Protocol for Distributed Cooperative Spectrum Sensing in Cognitive Radio

  • Zou, Mingrui;Bae, Sang-Jun;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2A
    • /
    • pp.124-131
    • /
    • 2009
  • Cognitive radio has been proposed to mitigate the spectrum scarcity problem by allowing the secondary users to access the under-utilized frequency bands and opportunistically transmit. Spectrum sensing, as a key technology in cognitive radio, is required to reliably detect the presence of primary users to avoid the harmful interference. However, it would be very hard to reliably detect the presence of primary users due to the channel fading, shadowing. In this paper, we proposed a distributed cooperative spectrum sensing scheme based on conventional DF (decode-and-forward) cooperative diversity protocol. We fist consider the cooperation between two secondary users to illustrate that cooperation among secondary users can obviously increase the detection performance. We then compare the performance of DF based scheme with another conventional AF (amplify-and-forward) protocol based scheme. And it is found that the proposed scheme based on DF has a better detection performance than the one based on AF. After that, we extend the number of cooperative secondary users, and demonstrate that increasing the cooperation number can significantly improve the detection performance.

Robust Object Tracking System Based on Face Detection (얼굴검출에 기반한 강인한 객체 추적 시스템)

  • Kwak, Min Seok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.9-14
    • /
    • 2017
  • Embedded devices with the development of modern computer technology also began equipped with a variety of functions. In this study, to provide a method of tracking efficient face with a small instrument of resources, such as built-in equipment that uses an image sensor in recent years has been actively carried out. It uses a face detection method using the features of the MB-LBP in order to obtain an accurate face, specify the region (Region of Interest) around the face when the face detection for the face object tracking in the next video did. And in the video can not be detected faces, to track objects using the CAM-Shift key is a conventional object tracking method, which make it possible to retain the information without loss of object information. In this study, through the comparison with the previous studies, it was confirmed the precision and high-speed performance of the object tracking system.