• Title/Summary/Keyword: Detection Key

Search Result 1,206, Processing Time 0.031 seconds

Conjugate Point Extraction for High-Resolution Stereo Satellite Images Orientation

  • Oh, Jae Hong;Lee, Chang No
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.2
    • /
    • pp.55-62
    • /
    • 2019
  • The stereo geometry establishment based on the precise sensor modeling is prerequisite for accurate stereo data processing. Ground control points are generally required for the accurate sensor modeling though it is not possible over the area where the accessibility is limited or reference data is not available. For the areas, the relative orientation should be carried out to improve the geometric consistency between the stereo data though it does not improve the absolute positional accuracy. The relative orientation requires conjugate points that are well distributed over the entire image region. Therefore the automatic conjugate point extraction is required because the manual operation is labor-intensive. In this study, we applied the method consisting of the key point extraction, the search space minimization based on the epipolar line, and the rigorous outlier detection based on the RPCs (Rational Polynomial Coefficients) bias compensation modeling. We tested different parameters of window sizes for Kompsat-2 across track stereo data and analyzed the RPCs precision after the bias compensation for the cases whether the epipolar line information is used or not. The experimental results showed that matching outliers were inevitable for the different matching parameterization but they were successfully detected and removed with the rigorous method for sub-pixel level of stereo RPCs precision.

Attacks, Detection, and Countermeasures in WSN Network Layer (WSN의 네트워크 계층에서의 공격과 탐지 및 대응 방안)

  • Lee, Daeun;Rhee, Eugene
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.413-418
    • /
    • 2019
  • Attacks on existing sensor networks include sniffing, flooding, and spoofing attacks. The basic countermeasures include encryption and authentication methods and switching methods. Wormhole attack, HELLO flood attack, Sybil attack, sinkhole attack, and selective delivery attack are the attacks on the network layer in wireless sensor network (WSN). These attacks may not be defended by the basic countmeasures mentioned above. In this paper, new countermeasures against these attacks include periodic key changes and regular network monitoring. Moreover, we present various threats (attacks) in the network layer of wireless sensor networks and new countermeasures accordingly.

A Study on Improvement of Image Processing for Precision Inner Diameter Measurement of Circular Hole (원형구멍 정밀 내경측정을 위한 영상처리 개선에 관한 연구)

  • Park, ChangYong;Kweon, HyunKyu;Li, JingHua;Zhang, Hua Xin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.16 no.3
    • /
    • pp.8-13
    • /
    • 2017
  • In this paper, the measurement of the inner diameter dimension of the circular hole by using a machine vision system was studied. This paper was focused on the theory and key technologies of machine vision inspection technology for the improvement of measurement accuracy and speed of the micro circular holes. A new method was proposed and was verified through the experiments on Gray conversion, binarization, edge extraction and Hough transform in machine vision system processes. Firstly, the Hough transform was proposed in order to improve the speed increase and implementation ease, it demonstrated the superiority of Hough transform and improvement through a comparative experiment. Secondly, we propose a calibration method of the system in order to obtain exactly the inner diameter of the circular hole. Finally, we demonstrate the reliability of the entire system as a MATLAB-based implementation of the GUI program, measuring the inner diameter of the circular hole through the circular holes of different dimensions measuring experiment.

  • PDF

Surgical Treatment of Ten Adults with Spinal Extradural Meningeal Cysts in the Thoracolumbar Spine

  • Xu, Feifan;Jian, Fengzeng;Li, Liang;Guan, Jian;Chen, Zan
    • Journal of Korean Neurosurgical Society
    • /
    • v.64 no.2
    • /
    • pp.238-246
    • /
    • 2021
  • Objective : To retrospectively analyze the clinical characteristics and surgical experience of 10 adults with spinal extradural meningeal cysts (SEMCs) in the thoracolumbar spine which may further provide evidence for surgical decision-making. Methods : Ten adults with SEMCs in the thoracolumbar spine were surgically treated and enrolled in this study. Clinical manifestations, imaging data, intraoperative findings and postoperative outcome were recorded. Results : Clinical manifestations of SEMCs included motor and sensory dysfunction of the lower limbs and urination and defecation disturbance. The cysts presented as intraspinal occupying lesions dorsal to the spine, ranging from the T8 to L3 level. Defects of eight cases were found on preoperative magnetic resonance imaging (MRI). Selective hemilaminectomy or laminectomy were used to reveal the defect within the cyst, which was further sutured with microscopic technique. The final outcome was excellent or good in seven cases and fair in three cases. No recurrence was observed during follow-up. Conclusion : SEMCs are rare intraspinal cystic lesions. Radiography and MRI are clinically practical methods to assess defects within SEMCs. Selective hemilaminectomy or laminectomy may reduce surgical trauma. Detection and microscopic suturing of the defects are the key steps to adequately decompress the nervous tissue and prevent postoperative recurrence.

A Novel Nucleic Lateral Flow Assay for Screening phaR-Containing Bacillus spp.

  • Wint, Nay Yee;Han, Khine Kyi;Yamprayoonswat, Wariya;Ruangsuj, Pattarawan;Mangmool, Supachoke;Promptmas, Chamras;Yasawong, Montri
    • Journal of Microbiology and Biotechnology
    • /
    • v.31 no.1
    • /
    • pp.123-129
    • /
    • 2021
  • Polyhydroxyalkanoate (PHA) synthase is a key enzyme for PHA production in microorganisms. The class IV PHA synthase is composed of two subunits: PhaC and PhaR. The PhaR subunit, which encodes the phaR gene, is only present in class IV PHA synthases. Therefore, the phaR gene is used as a biomarker for bacteria that contain a class IV PHA synthase, such as some Bacillus spp. The phaR gene was developed to screen phaR-containing Bacillus spp. The phaR screening method involved two steps: phaR gene amplification by PCR and phaR amplicon detection using a DNA lateral flow assay. The screening method has a high specificity for phaR-containing Bacillus spp. The lowest amount of genomic DNA of B. thuringiensis ATCC 10792 that the phaR screening method could detect was 10 pg. This novel screening method improves the specificity and sensitivity of phaR gene screening and reduces the time and cost of the screening process, which could enhance the opportunity to discover good candidate PHA producers. Nevertheless, the screening method can certainly be used as a tool to screen phaR-containing Bacillus spp. from environmental samples.

Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN (무선 랜 환경 인증 메커니즘의 취약성 분석 및 대응방안 연구)

  • Choi, Jin-Ho;Oh, Soohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1219-1230
    • /
    • 2012
  • Recently, lots of users are using wireless LAN providing authentication and confidentiality with security mechanism such as WEP, WPA. But, weakness of each security mechanism was discovered and attack methods that user's information was exposed or modified to the third parties with it and abused by them were suggested. In this paper, we analyzed architecture of security mechanisms in wireless LAN and performed PSK cracking attack and cookie session hijacking attack with the known vulnerability. And, an improved 4-way handshake mechanism which can counter PSK cracking attack and a cookie replay detection mechanism which can prevent cookie session hijacking attack were proposed. Proposed mechanisms are expected to apply to establish more secure wireless LAN environment by countering existing vulnerability.

Importance-Performance Analysis (IPA) of Cyber Security Management: Focused on ECDIS User Experience

  • Park, Sangwon;Chang, Yeeun;Park, Youngsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • The mandatory installation of the ECDIS (Electronic Chart Display and Information System) became an important navigational equipment for navigation officer. In addition, ECDIS is a key component of the ship's digitalization in conjunction with various navigational equipment. Meanwhile, cyber-attacks emerge as a new threat along with digitalization. Damage caused by cyber-attacks is also reported in the shipping sector, and IMO recommends that cybersecurity guidelines be developed and included in International Security Management (ISM). This study analyzed the cybersecurity hazards of ECDIS, where various navigational equipment are connected. To this end, Importance-Performance Analysis (IPA) was conducted on navigation officer using ECDIS. As a result, the development of technologies for cyber-attack detection and prevention should be priority. In addition, policies related to 'Hardware and Software upgrade', 'network access control', and 'data backup and recovery' were analyzed as contents to be maintained. This paper is significant in deriving risk factors from the perspective of ECDIS users and analyzing their priorities, and it is necessary to analyze various cyber-attacks that may occur on ships in the future.

Development of an RNA sequencing panel to detect gene fusions in thyroid cancer

  • Kim, Dongmoung;Jung, Seung-Hyun;Chung, Yeun-Jun
    • Genomics & Informatics
    • /
    • v.19 no.4
    • /
    • pp.41.1-41.10
    • /
    • 2021
  • In addition to mutations and copy number alterations, gene fusions are commonly identified in cancers. In thyroid cancer, fusions of important cancer-related genes have been commonly reported; however, extant panels do not cover all clinically important gene fusions. In this study, we aimed to develop a custom RNA-based sequencing panel to identify the key fusions in thyroid cancer. Our ThyChase panel was designed to detect 87 types of gene fusion. As quality control of RNA sequencing, five housekeeping genes were included in this panel. When we applied this panel for the analysis of fusions containing reference RNA (HD796), three expected fusions (EML4-ALK, CCDC6-RET, and TPM3-NTRK1) were successfully identified. We confirmed the fusion breakpoint sequences of the three fusions from HD796 by Sanger sequencing. Regarding the limit of detection, this panel could detect the target fusions from a tumor sample containing a 1% fusion-positive tumor cellular fraction. Taken together, our ThyChase panel would be useful to identify gene fusions in the clinical field.

Advanced Navigation Technology Development Trend as an Unmanned Vehicle Core Technology

  • Seok, Hyo-Jeong;Hwang, In Seong;Kang, Wanggu
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.10 no.4
    • /
    • pp.235-242
    • /
    • 2021
  • Unmanned Aerial Vehicles (UAVs), which were used for military purposes, are gradually expanding their application fields under the influence of electrification and digitalization. Starting from the field of aerial imaging and Intelligence Surveillance and Reconnaissance (ISR) mission, nowadays the possibility of Urban Air Mobility (UAM), which transports passengers and cargo with drones, is widely under discussion. In order to occupy the rapidly growing global unmanned aerial vehicle market in advance, it is necessary to secure core technologies and develop key UAVs components based on the new technologies. In the navigation field, it is necessary to secure a precise position with guaranteed reliability and continuity, unrelated to the operating environments. The reliability and continuity should be secured in the algorithm level and in the H/W component levels also. In order to achieve this technical goal, the Ministry of Science and ICT has launched the 'Unmanned Vehicle Core Technology Research and Development Program' in 2019 to support the R&D on the unmanned vehicle technologies. In this paper, authors introduce the unmanned vehicle core technology research and development program to the related researchers. The authors summarize the backgrounds of the program and show the technological tasks and objectives on the sub-programs in the unmanned vehicle navigation program. We present the program schedules especially focused on the test and evaluation of the developed technologies and components.

Rapid Nondestructive Prediction of Multiple Quality Attributes for Different Commercial Meat Cut Types Using Optical System

  • An, Jiangying;Li, Yanlei;Zhang, Chunzhi;Zhang, Dequan
    • Food Science of Animal Resources
    • /
    • v.42 no.4
    • /
    • pp.655-671
    • /
    • 2022
  • There are differences of spectral characteristics between different types of meat cut, which means the model established using only one type of meat cut for meat quality prediction is not suitable for other meat cut types. A novel portable visible and near-infrared (Vis/NIR) optical system was used to simultaneously predict multiple quality indicators for different commercial meat cut types (silverside, back strap, oyster, fillet, thick flank, and tenderloin) from Small-tailed Han sheep. The correlation coefficients of the calibration set (Rc) and prediction set (Rp) of the optimal prediction models were 0.82 and 0.81 for pH, 0.88 and 0.84 for L*, 0.83 and 0.78 for a*, 0.83 and 0.82 for b*, 0.94 and 0.86 for cooking loss, 0.90 and 0.88 for shear force, 0.84 and 0.83 for protein, 0.93 and 0.83 for fat, 0.92 and 0.87 for moisture contents, respectively. This study demonstrates that Vis/NIR spectroscopy is a promising tool to achieve the predictions of multiple quality parameters for different commercial meat cut types.