• Title/Summary/Keyword: Detection characteristics

Search Result 3,413, Processing Time 0.077 seconds

The Implementation of the Detection System of RFID Defective Tags Using UML and LabVIEW OOP (UML과 LVOOP를 활용한 RFID 불량 검출 시스템의 구현)

  • Jung, Min-Po;Cho, Hyuk-Gyu;Jung, Deok-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.382-386
    • /
    • 2011
  • It has been required to develop a defect detection system to perform defect detection capabilities after the bonding process in the production of RFID tags. However, we are difficult to design a system with understanding the characteristics of RFID tags and design concepts. Also we are difficult to modify even minor changes in features. In this paper, we design the defect RFID detection system using UML and object-oriented design techniques. We suggest the method for apply the UML Diagram to LabVIEW OOP and the technique for redesign the effect detection system's changes.

  • PDF

Detection and Recovery of Failure Node in SAN-based Cluster Shared File System $SANique^{TM}$ (SAN 기반 클러스터 공유 파일 시스템 $SANique^{TM}$의 오류 노드 탐지 및 회복 기법)

  • Lee, Kyu-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2609-2617
    • /
    • 2009
  • This paper describes the design overview of shared file system $SANique^{TM}$ and proposes the method for detection of failure node and recovery management algorithm. We also illustrate the characteristics and system architecture of shared file system based on SAN. In order to provide uninterrupted service, the detection and recovery methods are proposed under the all possible system failures and natural disasters. The various kinds of system failures and disasters are characterized and then the detection and recovery method are proposed in each disconnected computing node group.

Defect Detection in Laser Welding Using Multidimensional Discretization and Event-Codification (Multidimensional Discretization과 Event-Codification 기법을 이용한 레이저 용접 불량 검출)

  • Baek, Su Jeong;Oh, Rocku;Kim, Duck Young
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.32 no.11
    • /
    • pp.989-995
    • /
    • 2015
  • In the literature, various stochastic anomaly detection methods, such as limit checking and PCA-based approaches, have been applied to weld defect detection. However, it is still a challenge to identify meaningful defect patterns from very limited sensor signals of laser welding, characterized by intermittent, discontinuous, very short, and non-stationary random signals. In order to effectively analyze the physical characteristics of laser weld signals: plasma intensity, weld pool temperature, and back reflection, we first transform the raw data of laser weld signals into the form of event logs. This is done by multidimensional discretization and event-codification, after which the event logs are decoded to extract weld defect patterns by $Na{\ddot{i}}ve$ Bayes classifier. The performance of the proposed method is examined in comparison with the commercial solution of PRECITEC's LWM$^{TM}$ and the most recent PCA-based detection method. The results show higher performance of the proposed method in terms of sensitivity (1.00) and specificity (0.98).

Night-Time Blind Spot Vehicle Detection Using Visual Property of Head-Lamp (전조등의 시각적 특성을 이용한 야간 사각 지대 차량 검출 기법)

  • Joung, Jung-Eun;Kim, Hyun-Koo;Park, Ju-Hyun;Jung, Ho-Youl
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.5
    • /
    • pp.311-317
    • /
    • 2011
  • The blind spot is an area where drivers visibility does not reach. When drivers change a lane to adjacent lane, they need to give an attention because of the blind spot. If drivers try to change lane without notice of vehicle approaching in the blind spot, it causes a reason to have a car accident. This paper proposes a night-time blind spot vehicle detection using cameras. At nighttime, head-lights are used as characteristics to detect vehicles. Candidates of headlight are selected by high luminance feature and then shape filter and kalman filter are employed to remove other noisy blobs having similar luminance to head-lights. In addition, vehicle position is estimated from detected head-light, using virtual center line represented by approximated the first order linear equation. Experiments show that proposed method has relatively high detection porformance in clear weather independent to the road types, but has not sufficient performance in rainy weather because of various ground reflectors.

CNN-based Android Malware Detection Using Reduced Feature Set

  • Kim, Dong-Min;Lee, Soo-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.19-26
    • /
    • 2021
  • The performance of deep learning-based malware detection and classification models depends largely on how to construct a feature set to be applied to training. In this paper, we propose an approach to select the optimal feature set to maximize detection performance for CNN-based Android malware detection. The features to be included in the feature set were selected through the Chi-Square test algorithm, which is widely used for feature selection in machine learning and deep learning. To validate the proposed approach, the CNN model was trained using 36 characteristics selected for the CICANDMAL2017 dataset and then the malware detection performance was measured. As a result, 99.99% of Accuracy was achieved in binary classification and 98.55% in multiclass classification.

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks

  • Xiao, Xin;Zhang, Ruirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2732-2753
    • /
    • 2019
  • With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.

A study on the Corrosion Detection Sensor using Multi-Wall Carbon Nanotube (다중벽 탄소나노튜브를 이용한 철근 부식 검출 센서 제작 연구)

  • Park, Soobin;Kim, Sungyeon;Lee, Sujeong;Choi, Munjeong;Hong, Yeongjun;Kwon, Sungjun;Yoo, Bongyoung;Yoon, Sanghwa
    • Journal of the Korean institute of surface engineering
    • /
    • v.54 no.4
    • /
    • pp.194-199
    • /
    • 2021
  • In this study, rebar corrosion detection sensor was fabricated using multi-walled carbon nanotubes (MWCNTs). MWCNTs were pre-treated in the acid electrolytes to attach the carboxylic acid to the surface of MWCNTs. The fabricated sensor was attached on the surface of rebar and it detected the corrosion of steel using LCR meter with variation of capacitance. The surface morphology and electrical properties were characterized using scanning electron microscope (SEM) and electrical test equipment, respectively. To verify the corrosion detection characteristics, comparison experiment using plastic bar was performed. Moreover, mechanism of corrosion detection sensor was discussed.

Development of an Object Collision Detection Algorithm for Prevention of Collision Accidents on Living Roads (생활도로에서의 충돌사고 예방을 위한 객체 충돌 감지 알고리즘 개발)

  • Seo, Myoung Kook;Shin, Hee Young;Jeong, Hwang Hun;Chae, Jun Seong
    • Journal of Drive and Control
    • /
    • v.19 no.3
    • /
    • pp.23-31
    • /
    • 2022
  • Traffic safety issues have recently been seriously magnified, due to child deaths in apartment complexes and parking lots. Accordingly, traffic safety technologies are being developed to recognize dangerous situations on living roads and to provide warning services. In this study, a collision detection algorithm was developed to prevent collision accidents between moving objects, by using object type and location information provided from CCTV monitoring devices. To determine the exact collision between moving objects, an object movement model was developed to predict the range of movement by considering the moving characteristics of the object, and a collision detection algorithm was developed to efficiently analyze the presence and location of the collision. The developed object movement model as well as the collision detection algorithm were simulated, in a virtual space of an actual living road to verify performance and derive supplementary matters.

Change Detection of Hangul Documents Based on X-treeDiff+ (X-treeDiff+ 기반의 한글 문서에 대한 변화 탐지)

  • Lee, Suk-Kyoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.29-37
    • /
    • 2010
  • The change detection of XML documents is a major research area. However, though XML becomes a file format for Hangul documents, research on change detection of Hangul documents based on the characteristics of Hangul documents is rather scarce. Since format data in Hangul documents are very large, which is different from ordinary XML documents, it is not proper to apply general XML change detection algorithms such as X-treeDiff+ to Hangul documents without any change. In this paper, we propose new contents-based matching algorithm and implement it in X-treeDiff+. The result of our testing shows better performance for most documents in editing process.

Robust transformer-based anomaly detection for nuclear power data using maximum correntropy criterion

  • Shuang Yi;Sheng Zheng;Senquan Yang;Guangrong Zhou;Junjie He
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1284-1295
    • /
    • 2024
  • Due to increasing operational security demands, digital and intelligent condition monitoring of nuclear power plants is becoming more significant. However, establishing an accurate and effective anomaly detection model is still challenging. This is mainly because of data characteristics of nuclear power data, including the lack of clear class labels combined with frequent interference from outliers and anomalies. In this paper, we introduce a Transformer-based unsupervised model for anomaly detection of nuclear power data, a modified loss function based on the maximum correntropy criterion (MCC) is applied in the model training to improve the robustness. Experimental results on simulation datasets demonstrate that the proposed Trans-MCC model achieves equivalent or superior detection performance to the baseline models, and the use of the MCC loss function is proven can obviously alleviate the negative effect of outliers and anomalies in the training procedure, the F1 score is improved by up to 0.31 compared to Trans-MSE on a specific dataset. Further studies on genuine nuclear power data have verified the model's capability to detect anomalies at an earlier stage, which is significant to condition monitoring.