• Title/Summary/Keyword: Detection Key

Search Result 1,206, Processing Time 0.028 seconds

3D Range Measurement using Infrared Light and a Camera (적외선 조명 및 단일카메라를 이용한 입체거리 센서의 개발)

  • Kim, In-Cheol;Lee, Soo-Yong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.10
    • /
    • pp.1005-1013
    • /
    • 2008
  • This paper describes a new sensor system for 3D range measurement using the structured infrared light. Environment and obstacle sensing is the key issue for mobile robot localization and navigation. Laser scanners and infrared scanners cover $180^{\circ}$ and are accurate but too expensive. Those sensors use rotating light beams so that the range measurements are constrained on a plane. 3D measurements are much more useful in many ways for obstacle detection, map building and localization. Stereo vision is very common way of getting the depth information of 3D environment. However, it requires that the correspondence should be clearly identified and it also heavily depends on the light condition of the environment. Instead of using stereo camera, monocular camera and the projected infrared light are used in order to reduce the effects of the ambient light while getting 3D depth map. Modeling of the projected light pattern enabled precise estimation of the range. Identification of the cells from the pattern is the key issue in the proposed method. Several methods of correctly identifying the cells are discussed and verified with experiments.

Video Evaluation System Using Scene Change Detection and User Profile (장면전환검출과 사용자 프로파일을 이용한 비디오 학습 평가 시스템)

  • Shin, Seong-Yoon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.95-104
    • /
    • 2004
  • This paper proposes an efficient remote video evaluation system that is matched well with personalized characteristics of students using information filtering based on user profile. For making a question in forms of video, a key frame extraction method based on coordinate, size and color information is proposed. And Question-mating intervals are extracted using gray-level histogram difference and time window. Also, question-making method that combined category-based system with keyword-based system is used for efficient evaluation. Therefore, students can enhance their study achievement through both supplementing their inferior area and preserving their interest area.

Monitoring of wind turbine blades for flutter instability

  • Chen, Bei;Hua, Xu G.;Zhang, Zi L.;Basu, Biswajit;Nielsen, Soren R.K.
    • Structural Monitoring and Maintenance
    • /
    • v.4 no.2
    • /
    • pp.115-131
    • /
    • 2017
  • Classical flutter of wind turbine blades indicates a type of aeroelastic instability with fully attached boundary layer where a torsional blade mode couples to a flapwise bending mode, resulting in a mutual rapid growth of the amplitudes. In this paper the monitoring problem of onset of flutter is investigated from a detection point of view. The criterion is stated in terms of the exceeding of a defined envelope process of a specific maximum torsional vibration threshold. At a certain instant of time, a limited part of the previously measured torsional vibration signal at the tip of blade is decomposed through the Empirical Mode Decomposition (EMD) method, and the 1st Intrinsic Mode Function (IMF) is assumed to represent the response in the flutter mode. Next, an envelope time series of the indicated modal response is obtained in terms of a Hilbert transform. Finally, a flutter onset criterion is proposed, based on the indicated envelope process. The proposed online flutter monitoring method provided a practical and direct way to detect onset of flutter during operation. The algorithm has been illustrated by a 907-DOFs aeroelastic model for wind turbines, where the tower and the drive train is modelled by 7 DOFs, and each blade by means of 50 3-D Bernoulli-Euler beam elements.

A Study on Network Security Modeling using Single Sign-On (Single Sign-On을 적용한 네트워크 보안 모델링)

  • 서희석;김희완
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.49-56
    • /
    • 2004
  • With the growing usage of the networks, the users in the Internet uses some kinds of web server. They confused that each web server uses the different user ID and passwords. To solve these problems, SSO (Single Sign-On) solution is introduced. We presents the modeling methods which are efficiently constructed the network management models. We constructed the intrusion detection systems and firewalls using the SSO. This architecture is efficient to manage the network usage and control. SSO solution designed on the small scale Intranet. CA server in the 550 that depends on PKI (Public Key Infrastructure) is used to issue the certificates. SHTTP based on SSL (Secure Socket Layer) is used to protect the data between certificate server and the intranet users.

  • PDF

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

PCA-Based MPEG Video Retrieval in Compressed Domain (PCA에 기반한 압축영역에서의 MPEG Video 검색기법)

  • 이경화;강대성
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.1
    • /
    • pp.28-33
    • /
    • 2003
  • This paper proposes a database index and retrieval method using the PCA(Principal Component Analysis). We perform a scene change detection and key frame extraction from the DC Image constructed by DCT DC coefficients in the compressed video stream that is video compression standard such as MPEG. In the extracted key frame, we use the PCA, then we can make codebook that has a statistical data as a codeword, which is saved as a database index. We also provide retrieval image that are similar to user's query image in a video database. As a result of experiments, we confirmed that the proposed method clearly showed superior performance in video retrieval and reduced computation time and memory space.

Recognizing F5-like stego images from multi-class JPEG stego images

  • Lu, Jicang;Liu, Fenlin;Luo, Xiangyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4153-4169
    • /
    • 2014
  • To recognize F5-like (such as F5 and nsF5) steganographic algorithm from multi-class stego images, a recognition algorithm based on the identifiable statistical feature (IDSF) of F5-like steganography is proposed in this paper. First, this paper analyzes the special modification ways of F5-like steganography to image data, as well as the special changes of statistical properties of image data caused by the modifications. And then, by constructing appropriate feature extraction sources, the IDSF of F5-like steganography distinguished from others is extracted. Lastly, based on the extracted IDSFs and combined with the training of SVM (Support Vector Machine) classifier, a recognition algorithm is presented to recognize F5-like stego images from images set consisting of a large number of multi-class stego images. A series of experimental results based on the detection of five types of typical JPEG steganography (namely F5, nsF5, JSteg, Steghide and Outguess) indicate that, the proposed algorithm can distinguish F5-like stego images reliably from multi-class stego images generated by the steganography mentioned above. Furthermore, even if the types of some detected stego images are unknown, the proposed algorithm can still recognize F5-like stego images correctly with high accuracy.

The Early Detection of Recurrence of Malignant Peripheral Nerve Sheath Tumor by Frequent Magnetic Resonance Imaging

  • Lee, Chang-Sub;Huh, Ji-Soon;Chang, Jee-Won;Park, Ji-Kang
    • Journal of Korean Neurosurgical Society
    • /
    • v.47 no.1
    • /
    • pp.51-54
    • /
    • 2010
  • Surgery has a key role in the treatment of malignant peripheral nerve sheath tumors (MPNSTs), but the resectability of paraspinal MPNSTs is only 20%. Therefore, spinal MPNSTs show frequent recurrence and poor prognosis. Local recurrence is much more common than metastasis for MPNSTs, and surgery still has a key role in the treatment of local recurrence. Therefore, it is important that recurrence must be detected before resectability is lost. However, no evidence-based follow-up protocol has been established for MPNST. The authors performed gross total resection in a 34-year-old woman presented with thoracic MPNST. Adjuvant radiotherapy and chemotherapy were not administered since these adjuvant therapies generally do not improve survival in MPNST and may cause additional neurovascular damage. Instead, the authors monitored the primary site every 3 months using magnetic resonance imaging to detect local recurrence at the earliest opportunity. The tumor recurred locally on two occasions without overt symptoms at 21 and 24 months postoperatively. These recurrences were treated successfully by gross total removal.

Effect of octadecylamine concentration on adsorption on carbon steel surface

  • Liu, Canshuai;Lin, Genxian;Sun, Yun;Lu, Jundong;Fang, Jun;Yu, Chun;Chi, Lisheng;Sun, Ke
    • Nuclear Engineering and Technology
    • /
    • v.52 no.10
    • /
    • pp.2394-2401
    • /
    • 2020
  • Octadecylamine is an effective film-forming amine that protects carbon steel from corrosion. In the present study, the effect of octadecylamine concentration on adsorption on a carbon steel surface was investigated in anaerobic alkaline solution by using SEM/EDS, TEM and the Materials Studio simulation techniques. TEM morphology observation and EDS elemental detection determine the thicknesses of octadecylamine film on a carbon steel surface, which are confirmed by the in-situ electrochemical impedance spectroscopy measurement and resistance calculation. The Materials Studio simulation reveals the number of octadecylamine film layers at different concentrations. Results obtained in this study indicate that adsorption of octadecylamine film on carbon steel proceeds with the multi-layer adsorption mechanism.

A Technique of Watermark Generation and Similarity Embedding for Still Images Based on Cross Reference Points (교차참조점에 기반한 정지영상의 워터마크 생성 및 유사성 삽입 기법)

  • Lee, Hang-Chan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.8
    • /
    • pp.1484-1490
    • /
    • 2007
  • The Cross Reference Point(CRP) is a robust method for finding salient points in watermarking systems because it is based on the geometrical structure of a normalized image in order to avoid pointing error caused by digital attacks. After normalization of an image, the 100 CRPs are calculated. Next, the 100 blocks centered by CRPS are formed. These 100 blocks are arranged using a secrete key. Each boundary of 50 out of 100 blocks is surrounded by 8 blocks which are selected by the ordered number of a preceding block. This number is a seed of random number generator for selecting 8 out of 50 blocks. The search area of a center block is formed by a secrete key. The pixels of a center block are quantized to 10 levels by predefined thresholds. The watermarks are generated by the 50 quantized center blocks. These watermarks are embedded directly in the remaining 50 blocks. In other words, 50 out of 100 blocks are utilized to generate watermarks and the remaining 50 blocks are used to watermark embedding. Because the watermarks are generated in the given images, we can successfully detect watermarks after several digital attacks. The reason is that the blocks for the generation and detection of watermarks are equally affected by digital attacks except for the case of local distortion such as cropping.