• Title/Summary/Keyword: Event detection

Search Result 650, Processing Time 0.04 seconds

Deep-learning-based GPR Data Interpretation Technique for Detecting Cavities in Urban Roads (도심지 도로 지하공동 탐지를 위한 딥러닝 기반 GPR 자료 해석 기법)

  • Byunghoon, Choi;Sukjoon, Pyun;Woochang, Choi;Churl-hyun, Jo;Jinsung, Yoon
    • Geophysics and Geophysical Exploration
    • /
    • v.25 no.4
    • /
    • pp.189-200
    • /
    • 2022
  • Ground subsidence on urban roads is a social issue that can lead to human and property damages. Therefore, it is crucial to detect underground cavities in advance and repair them. Underground cavity detection is mainly performed using ground penetrating radar (GPR) surveys. This process is time-consuming, as a massive amount of GPR data needs to be interpreted, and the results vary depending on the skills and subjectivity of experts. To address these problems, researchers have studied automation and quantification techniques for GPR data interpretation, and recent studies have focused on deep learning-based interpretation techniques. In this study, we described a hyperbolic event detection process based on deep learning for GPR data interpretation. To demonstrate this process, we implemented a series of algorithms introduced in the preexisting research step by step. First, a deep learning-based YOLOv3 object detection model was applied to automatically detect hyperbolic signals. Subsequently, only hyperbolic signals were extracted using the column-connection clustering (C3) algorithm. Finally, the horizontal locations of the underground cavities were determined using regression analysis. The hyperbolic event detection using the YOLOv3 object detection technique achieved 84% precision and a recall score of 92% based on AP50. The predicted horizontal locations of the four underground cavities were approximately 0.12 ~ 0.36 m away from their actual locations. Thus, we confirmed that the existing deep learning-based interpretation technique is reliable with regard to detecting the hyperbolic patterns indicating underground cavities.

The Method for Real-time Complex Event Detection of Unstructured Big data (비정형 빅데이터의 실시간 복합 이벤트 탐지를 위한 기법)

  • Lee, Jun Heui;Baek, Sung Ha;Lee, Soon Jo;Bae, Hae Young
    • Spatial Information Research
    • /
    • v.20 no.5
    • /
    • pp.99-109
    • /
    • 2012
  • Recently, due to the growth of social media and spread of smart-phone, the amount of data has considerably increased by full use of SNS (Social Network Service). According to it, the Big Data concept is come up and many researchers are seeking solutions to make the best use of big data. To maximize the creative value of the big data held by many companies, it is required to combine them with existing data. The physical and theoretical storage structures of data sources are so different that a system which can integrate and manage them is needed. In order to process big data, MapReduce is developed as a system which has advantages over processing data fast by distributed processing. However, it is difficult to construct and store a system for all key words. Due to the process of storage and search, it is to some extent difficult to do real-time processing. And it makes extra expenses to process complex event without structure of processing different data. In order to solve this problem, the existing Complex Event Processing System is supposed to be used. When it comes to complex event processing system, it gets data from different sources and combines them with each other to make it possible to do complex event processing that is useful for real-time processing specially in stream data. Nevertheless, unstructured data based on text of SNS and internet articles is managed as text type and there is a need to compare strings every time the query processing should be done. And it results in poor performance. Therefore, we try to make it possible to manage unstructured data and do query process fast in complex event processing system. And we extend the data complex function for giving theoretical schema of string. It is completed by changing the string key word into integer type with filtering which uses keyword set. In addition, by using the Complex Event Processing System and processing stream data at real-time of in-memory, we try to reduce the time of reading the query processing after it is stored in the disk.

A Study on Fault Detection Scheme on TMRed Circuits (삼중화된 회로에서의 결함 감지를 위한 방법에 관한 연구)

  • Kang, Dong-Soo;Lee, Jong-Kil;Jhang, Kyoung-Son
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.313-316
    • /
    • 2011
  • SRAM-based FPGAs are very sensitive to single event upset(SEU) induced by space irradiation. To mitigate SEU effects, space applications employ some mitigation schemes. The triple modular redundancy(TMR) is a well-known mitigation scheme. It uses one or three voters as well as three identical blocks performing the same work. The voters can mask out one error in the outputs from the three replicated blocks. One SEU error in TMRed circuits can be masked but it needs to be detected for some reasons such as to analyze the SEU effects in the satellite or to recover the circuits from the error before additional error occur. In this paper, we developed a fault detection circuit and reporting system to detect a fault on the TMRed circuits. To verify our error detection circuit and reporting circuit, we performed an irradiation test at MC-50 Cyclotron. Experimental results showed that error detection circuit can detect a fault on the TMRed test circuit in radiation environment.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Integrated vibration control and health monitoring of building structures: a time-domain approach

  • Chen, B.;Xu, Y.L.;Zhao, X.
    • Smart Structures and Systems
    • /
    • v.6 no.7
    • /
    • pp.811-833
    • /
    • 2010
  • Vibration control and health monitoring of building structures have been actively investigated in recent years but treated separately according to the primary objective pursued. This paper presents a general approach in the time domain for integrating vibration control and health monitoring of a building structure to accommodate various types of control devices and on-line damage detection. The concept of the time-domain approach for integrated vibration control and health monitoring is first introduced. A parameter identification scheme is then developed to identify structural stiffness parameters and update the structural analytical model. Based on the updated analytical model, vibration control of the building using semi-active friction dampers against earthquake excitation is carried out. By assuming that the building suffers certain damage after extreme event or long service and by using the previously identified original structural parameters, a damage detection scheme is finally proposed and used for damage detection. The feasibility of the proposed approach is demonstrated through detailed numerical examples and extensive parameter studies.

An implementation of automated ECG interpretation algorithm and system(III) - Detector of atrium and ventricle activity (심전도 자동 진단 알고리즘 및 장치 구현(III) - 심방 및 심실활동 검출기)

  • Kweon, H.J.;Lee, J.W.;Yoon, J.Y.;Choi, S.K.;Lee, J.Y.;Lee, M.H.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1996 no.05
    • /
    • pp.288-292
    • /
    • 1996
  • This paper describes far the detection of heart event that is, QRS complex and P wave which are result from heart activity. The proposed QRS detection method by using the spatial velocity was identified as having the 99.6% detection accuracy as well as fast processing time. Atrial flutter, coupled P wave, and noncoupled P wave as well as atrial fibrillation could be detected correctly by three different algorithms according to their origination farm. About 99.6% correction accuracy coupled P wave could be obtained and we could be found that most detection errors are caused by establishing wrong search interval.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

A Study on the Satellite Launch Vehicle Separation Detection Interface to Improve the Reliability of the Launch and Early Operation Phase

  • Lee, Nayoung;Kwon, Dong-young;Jeon, Hyeon-Jin;Jeon, Moon-Jin;Cheon, Yee-Jin
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.4
    • /
    • pp.57-63
    • /
    • 2021
  • The launch vehicle (LV) separation detection interface of the satellite, which is designed to initiate the launch and early operation phase (LEOP) for S-band data transmission and the solar array deployment after the LV separation, is one of the hazard items at the launch site. Therefore, this interface should satisfy the single-fault tolerance requirement for the range safety. In this paper, we discuss the LV separation detection interfaces for two different satellite launch configurations and propose a method to guarantee for the satellite to start the LEOP even under the emergency case such as a partial separation from the LV. Furthermore, the proposed method meets the range safety requirement of the launch site. As this method only changes the external harness configuration of the satellite, it increases the reliability of the satellite early operation without any modification of the existing internal logics to detect the separation event.

The Implementation of Day and Night Intruder Motion Detection System using Arduino Kit (아두이노 키트를 이용한 주야간 침입자 움직임 감지 시스템 구현)

  • Young-Oh Han
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.919-926
    • /
    • 2023
  • In this paper, we implemented the surveillance camera system capable of day and night shooting. To this end, it is designed to capture clear images even at night using a CMOS image sensor as well as an IR-LED. In addition, a relatively simple motion detection algorithm was proposed through color model separation. Motions can be detected by extracting only the H channel from the color model, dividing the image into blocks, and then applying the block matching method using the average color value between consecutive frames. When motions are detected during filming, an alarm sounds automatically and a day and night motion detection system is implemented that can capture and save the event screen to a PC.

Noisy OTDR Data Event Detection Analysis for the Real Time Optical Fiber Link Monitoring (실시간 광선로망 감시를 위한 Noisy OTDR 신호 분석 방법)

  • Ko, Dae-Young;Baek, Sung-June;Park, Aaron;Kim, Jin-Bong;Nah, Yong-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.122-128
    • /
    • 2016
  • This paper, proposes a new analysis method for the event detection of an OTDR signal. An OTDR signal was passed through the Hamming filter to remove the high frequency noise included in the signal. The signal was then passed consecutively through a differential filter to detect the events of interest. The terminal position was determined using the fact that there is a large gap between the signal and the trailing noise power beyond the terminal. This study examined the local maxima of the signal up to the terminal position and determined the peak regions. The real events were determined from the peak regions using noise information and peak threshold. Finally, the user events were found by inspecting the user peaks beyond the terminal position. The events of the OTDR signal without users are located at less than 17m compared to the optical fiber link setup. The events of the JDSU device are located less than 25m and their users are less than 5m. For the RadianTech device, the events are detected at less than 19m and the users are found in 5m. The results suggest that the proposed method is sufficiently applicable to an optical fiber link monitoring system.