• Title/Summary/Keyword: Fact Detection

Search Result 279, Processing Time 0.024 seconds

Health monitoring of pressurized pipelines by finite element method using meta-heuristic algorithms along with error sensitivity assessment

  • Amirmohammad Jahan;Mahdi Mollazadeh;Abolfazl Akbarpour;Mohsen Khatibinia
    • Structural Engineering and Mechanics
    • /
    • v.87 no.3
    • /
    • pp.211-219
    • /
    • 2023
  • The structural health of a pipeline is usually assessed by visual inspection. In addition to the fact that this method is expensive and time consuming, inspection of the whole structure is not possible due to limited access to some points. Therefore, adopting a damage detection method without the mentioned limitations is important in order to increase the safety of the structure. In recent years, vibration-based methods have been used to detect damage. These methods detect structural defects based on the fact that the dynamic responses of the structure will change due to damage existence. Therefore, the location and extent of damage, before and after the damage, are determined. In this study, fuzzy genetic algorithm has been used to monitor the structural health of the pipeline to create a fuzzy automated system and all kinds of possible failure scenarios that can occur for the structure. For this purpose, the results of an experimental model have been used. Its numerical model is generated in ABAQUS software and the results of the analysis are used in the fuzzy genetic algorithm. Results show that the system is more accurate in detecting high-intensity damages, and the use of higher frequency modes helps to increase accuracy. Moreover, the system considers the damage in symmetric regions with the same degree of membership. To deal with the uncertainties, some error values are added, which are observed to be negligible up to 10% of the error.

A Study on the Detection of Pulmonary Blood Vessel Using Pyramid Images and Fuzzy Theory (피라미드 영상과 퍼지이론을 이용한 폐부 혈관의 검출에 관한 연구)

  • Hwang, Jun-Hyun;Park, Kwang-Suk;Min, Byoung-Gu
    • Journal of Biomedical Engineering Research
    • /
    • v.12 no.2
    • /
    • pp.99-106
    • /
    • 1991
  • For the automatic detection of pulmonary blood vessels, a new algorithm is proposed using the fact that human recognizes a pattern orderly according to their size. This method simulates the human recognition process by the pyramid images. For the detection of vessels using multilevel image, large and wtde ones are detected from the most compressed level, followed by the detection of small and narrow ones from the less compressed images with FCM(fuzzy c means) clustering algorithm which classifies similar data into a group. As the proposed algorithm detects blood vessels orderly according to their size, there is no need to consider the variation of parameters and the branch points which should be considered in other detection algirithms. In the detection of patterns whose size changes successively like pulmonary blood vessels, this proposed algorithm can be properly applied

  • PDF

Detection of Defects on Repeated Multi-Patterned Images (반복되는 다수 패턴 영상에서의 불량 검출)

  • Lee, Jang-Hee;Yoo, Suk-In
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.5
    • /
    • pp.386-393
    • /
    • 2010
  • A defect in an image is a set of pixels forming an irregular shape. Since a defect, in most cases, is not easy to be modeled mathematically, the defect detection problem still resides in a research area. If a given image, however, composed by certain patterns, a defect can be detected by the fact that a non-defect area should be explained by another patch in terms of a rotation, translation, and noise. In this paper, therefore, the defect detection method for a repeated multi-patterned image is proposed. The proposed defect detection method is composed of three steps. First step is the interest point detection step, second step is the selection step of a appropriate patch size, and the last step is the decision step. The proposed method is illustrated using SEM images of semiconductor wafer samples.

An Analysis on the Identification Rate of Detection System Using Non-Homogeneous Discrete Absorbing Markov Chains (비 동질성 이산시간 흡수마코프체인을 활용한 탐지체계의 식별률 분석에 관한 연구)

  • Kim, Seong-Woo;Yoon, Bong-Kyoo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.40 no.2
    • /
    • pp.31-42
    • /
    • 2015
  • The purpose of airborne radars is to detect and identify approaching targets as early as possible. If the targets are identified as enemies, detection systems must provide defense systems with information of the targets to counter. Though many previous studies based on the detection theory of the target have shown various ways to derive detection probability of each radar, optimal arrangement of radars for effective detection, and determination of the search pattern, they did not reflect the fact that most military radar sites run multiple radars in order to increase the accuracy of identifications by radars. In this paper, we propose a model to analyze the probability of identification generated by the multiple radars using non-homogeneous absorbing markov chains. Our results are expected to help the military commanders counter the enemy targets effectively by using radars in a way to maximize the identification rate of targets.

Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.676-682
    • /
    • 2011
  • Sybil attack can disrupt proper operations of wireless sensor network by forging its sensor node to multiple identities. To protect the sensor network from such an attack, a number of countermeasure methods based on RSSI (Received Signal Strength Indicator) and LQI (Link Quality Indicator) have been proposed. However, previous works on the Sybil attack detection do not consider the fact that Sybil nodes can change their RSSI and LQI strength for their malicious purposes. In this paper, we present a Sybil attack detection method based on a transmission power range. Our proposed method initially measures range of RSSI and LQI from sensor nodes, and then set the minimum, maximum and average RSSI and LQI strength value. After initialization, monitoring nodes request that each sensor node transmits data with different transmission power strengths. If the value measured by monitoring node is out of the range in transmission power strengths, the node is considered as a malicious node.

Fall Detection System using Smartphone for Mobile Healthcare (모바일 헬스케어 지원을 위한 스마트폰을 이용한 낙상 감지 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.435-447
    • /
    • 2013
  • If we use a smartphone to analyze and detect falling, it is a huge advantage that the person with a sensor attached to one's body is free from awareness of difference and limitation of space, unlike attaching sensors on certain fixed areas. In this paper, we suggested effective posture analysis of smartphone users, and fall detecting system. Suggested algorithm enables to detect falling accurately by using the fact that instantaneous change of acceleration sensor is different according to user's posture. Since mobile applications working on smart phones are low in compatibility according to mobile platforms, it is a constraint that new development is needed which is suitable for sensor equipment's characteristics. In this paper, we suggested posture analysis algorithm using smartphones to solve the problems related to user's inconvenience and limitation of development according to sensor equipment's characteristics. Also, we developed fall detection system with the suggested algorithm, using hybrid mobile application which is not limited to platform.

Detection of Hepatitis B Virus and Mycobacterium tuberculosis in Korean Dental Patients

  • Lee, Sun-A;Yoo, So Young;Kay, Kee-Sung;Kook, Joong-Ki
    • Journal of Microbiology
    • /
    • v.42 no.3
    • /
    • pp.239-242
    • /
    • 2004
  • This study examined the detection rate of the hepatitis B virus (HBV) and Mycobacterium tuberculosis (Mtb) in serum and saliva samples, respectively, from 120 dental patients who were unaware if they have or had either hepatitis or tuberculosis. The frequencies of HBsAg and anti-HBs were determined using an immunochromatic assay. Mtb positivity was determined by the PCR method. Of the 120 patients, 7 (5.8%) were HBV positive and 30 (25.0%) were Mtb positive. This highlights the fact that dental health care workers (DHCWs) can be exposed to the risk of infection from blood- or saliva-borne pathogens as a consequence of their work. Therefore, it is very important to prevent cross infection between patients and dental personnel. Accordingly, laboratory tests prior to surgical treatment are needed to determine the infectious state of dental patients in order to prevent the transmission of infectious diseases in dental clinics.

A Study of Ionospheric Time Delay for Single-Frequency GPS Systems (단일 주파수 GPS 시스템에서의 전리층 전파지연 연구)

  • Park, Sung-Kyung
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.9
    • /
    • pp.1-9
    • /
    • 1994
  • Through the low orbit GPS satellite for a 3-dimensional real time position detechtion can be achieved anywhere. Utilizing the GPS sate llite detection values an analysis of the varing characteristics of the ionosphere can be achieved, and by calculating the correlation relationship of the position detection error and the ionospheric time delay characteristics, an advanced algorithm technique can be developed. Computer simulation of the developed algorithm for defining the corelation between the position detection error and the varing ionospheric time delay charcteristics has been proceeded. The results of simulation reveal the fact that the varing characteristics of the ionosphere nearly match the actual ionospheric time delay characteristics.

  • PDF

Advanced insider threat detection model to apply periodic work atmosphere

  • Oh, Junhyoung;Kim, Tae Ho;Lee, Kyung Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1722-1737
    • /
    • 2019
  • We developed an insider threat detection model to be used by organizations that repeat tasks at regular intervals. The model identifies the best combination of different feature selection algorithms, unsupervised learning algorithms, and standard scores. We derive a model specifically optimized for the organization by evaluating each combination in terms of accuracy, AUC (Area Under the Curve), and TPR (True Positive Rate). In order to validate this model, a four-year log was applied to the system handling sensitive information from public institutions. In the research target system, the user log was analyzed monthly based on the fact that the business process is processed at a cycle of one year, and the roles are determined for each person in charge. In order to classify the behavior of a user as abnormal, the standard scores of each organization were calculated and classified as abnormal when they exceeded certain thresholds. Using this method, we proposed an optimized model for the organization and verified it.

An application of operational deflection shapes and spatial filtration for damage detection

  • Mendrok, Krzysztof;Wojcicki, Jeremi;Uhl, Tadeusz
    • Smart Structures and Systems
    • /
    • v.16 no.6
    • /
    • pp.1049-1068
    • /
    • 2015
  • In the paper, the authors propose the application of operational deflection shapes (ODS) for the detection of structural changes in technical objects. The ODS matrix is used to formulate the spatial filter that is further used for damage detection as a classical modal filter (Meirovitch and Baruh 1982, Zhang et al. 1990). The advantage of the approach lies in the fact that no modal analysis is required, even on the reference spatial filter formulation and other components apart from structural ones can be filtered (e.g. harmonics of rotational velocity). The proposed methodology was tested experimentally on a laboratory stand, a frame-like structure, excited from two sources: an impact hammer, which provided a wide-band excitation of all modes, and an electro-dynamic shaker, which simulated a harmonic component in the output spectra. The damage detection capabilities of the proposed method were tested by changing the structural properties of the model and comparing the results with the original ones. The quantitative assessment of damage was performed by employing a damage index (DI) calculation. Comparison of the output of the ODS filter and the classical modal filter is also presented and analyzed in the paper. The closing section of the paper describes the verification of the method on a real structure - a road viaduct.