• Title/Summary/Keyword: False Detection

Search Result 1,207, Processing Time 0.032 seconds

Integrated Approach of Multiple Face Detection for Video Surveillance

  • Kim, Tae-Kyun;Lee, Sung-Uk;Lee, Jong-Ha;Kee, Seok-Cheol;Kim, Sang-Ryong
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1960-1963
    • /
    • 2003
  • For applications such as video surveillance and human computer interface, we propose an efficiently integrated method to detect and track faces. Various visual cues are combined to the algorithm: motion, skin color, global appearance and facial pattern detection. The ICA (Independent Component Analysis)-SVM (Support Vector Machine based pattern detection is performed on the candidate region extracted by motion, color and global appearance information. Simultaneous execution of detection and short-term tracking also increases the rate and accuracy of detection. Experimental results show that our detection rate is 91% with very few false alarms running at about 4 frames per second for 640 by 480 pixel images on a Pentium IV 1㎓.

  • PDF

The Development of Fire Detection System Using Fuzzy Logic and Multivariate Signature (퍼지논리 및 다중신호를 이용한 화재감지시스템의 개발)

  • Hong, Sung-Ho;Kim, Doo-Hyun
    • Journal of the Korean Society of Safety
    • /
    • v.19 no.1
    • /
    • pp.49-55
    • /
    • 2004
  • This study presents an analysis of comparison of P-type fire detection system with fuzzy logic-applied fire detection system. The fuzzy logic-applied fire detection system has input variables obtained by fire experiment of small scale with K-type temperature sensor and optical smoke sensor. And the antecedent part of fuzzy rules consists of temperature and smoke density, and the consequent part consists of fire probability. Also triangular fuzzy membership function is used for input variables and fuzzy rules. To calculate the final fire probability a centroid method is introduced. A fire experiment is conducted with controlling wood crib layer, cigarette to simulate actual fire and false alarm situation. The results show that peak fire probability is 25[%] for non-fire and is more than 80[%] for fire situation, respectively. The fuzzy logic-applied fire detection system suggested here is able to distinguish fire situation and non-fire situation very precisely.

Deep Learning and Color Histogram based Fire and Smoke Detection Research

  • Lee, Yeunghak;Shim, Jaechang
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.116-125
    • /
    • 2019
  • The fire should extinguish as soon as possible because it causes economic loss and loses precious life. In this study, we propose a new atypical fire and smoke detection algorithm using deep learning and color histogram of fire and smoke. First, input frame images obtain from the ONVIF surveillance camera mounted in factory search motion candidate frame by motion detection algorithm and mean square error (MSE). Second deep learning (Faster R-CNN) is used to extract the fire and smoke candidate area of motion frame. Third, we apply a novel algorithm to detect the fire and smoke using color histogram algorithm with local area motion, similarity, and MSE. In this study, we developed a novel fire and smoke detection algorithm applied the local motion and color histogram method. Experimental results show that the surveillance camera with the proposed algorithm showed good fire and smoke detection results with very few false positives.

Analysis of MODIS cloud masking algorithm using direct broadcast data over Korea and its improvement

  • Lee, H.J.;Chung, C.Y.;Ahn, M.H.;Nam, J.C.
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.461-463
    • /
    • 2003
  • The information on the cloud presence within a instantaneous field of view is the first step toward the derivation of many other geophysical parameters. Here, we first applied the current MODIS cloud detection algorithm developed by University of Wisconsin and compared the results to a visual interpretation of composite data, especially during the daytime. Most of cases, the detection algorithm performs very well, except a few cases with over-detection. One of the reasons for the false detection is due to the time independent use of land information which affects the threshold values of visible channel test. In the presentation, we show detailed analysis of the current cloud detection algorithm and suggest possible way to overcome the current shortfall.

  • PDF

A Multi-Sensor Fire Detection Method based on Trend Predictive BiLSTM Networks

  • Gyu-Li Kim;Seong-Jun Ro;Kwangjae Lee
    • Journal of Sensor Science and Technology
    • /
    • v.33 no.5
    • /
    • pp.248-254
    • /
    • 2024
  • Artificial intelligence techniques have improved fire-detection methods; however, false alarms still occur. Conventional methods detect fires using current sensors, which can lead to detection errors due to temporary environmental changes or noise. Thus, fire-detection methods must include a trend analysis of past information. We propose a deep-learning-based fire detection method using multi-sensor data and Kendall's tau. The proposed system used a BiLSTM model to predict fires using pre-processed multi-sensor data and extracted trend information. Kendall's tau indicates the trend of a time-series data as a score; therefore, it is easy to obtain a target pattern. The experimental results showed that the proposed system with trend values recorded an accuracy of 99.93% for BiLSTM and GRU models in a 20-tap moving average filter and 40% fire threshold. Thus, the proposed trend approach is more accurate than that of conventional approaches.

Development of a Novel Immunochromatographic Assay for Rapid Detection of OXA-23 β-lactamase-producing Acinetobacter baumannii

  • Ji, Gil Young;Song, Hyung Geun;Jo, Mi Young;Hong, Seung Bok;Shin, Kyeong Seob
    • Biomedical Science Letters
    • /
    • v.22 no.2
    • /
    • pp.29-36
    • /
    • 2016
  • Among the several agents causing carbapenem resistance of Acinetobacter baumannii, the most common cause is OXA-23 ${\beta}$-lactamase, which is known to hydrolyze carbapenem. To effectively control dissemination of carbapenem-resistant Acinetobacter baumannii (CRAB), development of both rapid and easy-to-use detection methods are required. The aim of this study is to develop a novel immunochromatographic assay (ICA) for rapid detection of OXA-23 ${\beta}$-lactamase. Of the seven monoclonal antibodies (mAbs) screened by ELISA, four mAbs (4G6, 4H6, 6G4, 9A4) exhibited high reactivity. Of these four specific antibodies, the combination of 6G4/4G6 showed the greatest reactivity and this combination of mAbs (6G4/4G6 mAbs) was used to develop the OXA-23 ${\beta}$-lactamase ICA. Of 102 A. baumannii isolates tested, the OXA-23 ${\beta}$-lactamase ICA results were consistent with PCR analysis except one false positive and one false negative isolate. The overall sensitivity and specificity were 98.36% and 97.56%, respectively. In conclusion, to the best of our knowledge, we have developed the first specific antibody set to detect OXA-23 ${\beta}$-lactamase using an ICA kit. This novel ICA can be used as a reliable and easy-to-use immunological assay for detection of OXA-23 ${\beta}$-lactamase producing CRAB in clinical laboratories.

Detection of Void Defects in Ball Grid Array X-ray Image Using a New Blob Filter (볼 그리드 배열 기판의 X-ray 영상에서의 새로운 덩어리 검출 필터를 이용한 기포 형태 결함 검출 방법)

  • Peng, Shao-Hu;Lee, Hye-Jung;Nam, Hyun-Do
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.2005-2006
    • /
    • 2011
  • Due to the advantages of small sizes, more I/O ports, etc., Ball Grid Array (BGA) has been used in the production of printed circuit board (PCB). However, BGA voids can degrade the performance of the board and cause failure. To automatically detect the voids in X-ray image, a novel blob filter that makes use of the local image gradient magnitude is proposed in this paper. The utilization of the local image gradient magnitude makes the proposed filter invariant to the image brightness, void shape, void position, and component interference. Furthermore, different sizes of box filters are employed to analyze the image in multi-scale, and as a result, the proposed blob filter is robust to void size. Experimental results show that the proposed method can obtain void detection accuracy up to 96.104% while keep low false ratio.

  • PDF

An Improved Normalization Method for Haar-like Features for Real-time Object Detection (실시간 객체 검출을 위한 개선된 Haar-like Feature 정규화 방법)

  • Park, Ki-Yeong;Hwang, Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8C
    • /
    • pp.505-515
    • /
    • 2011
  • This paper describes a normalization method of Haar-like features used for object detection. Previous method which performs variance normalization on Haar-like features requires a lot of calculations, since it uses an additional integral image for calculating the standard deviation of intensities of pixels in a candidate window and increases possibility of false detection in the area where variance of brightness is small. The proposed normalization method can be performed much faster than the previous method by not using additional integral image and classifiers which are trained with the proposed normalization method show robust performance in various lighting conditions. Experimental result shows that the object detector which uses the proposed method is 26% faster than the one which uses the previous method. Detection rate is also improved by 5% without increasing false alarm rate and 45% for the samples whose brightness varies significantly.

A Study on the Abrupt Scene Change Detection Using the Features of B frame in the MPEG Sequence (MPEG에서 B 프레임의 특징을 이용한 급진적 장면전환 검출에 관한 연구)

  • Kim Joong-Heon;Jang Jong-Whan
    • The KIPS Transactions:PartB
    • /
    • v.12B no.5 s.101
    • /
    • pp.617-630
    • /
    • 2005
  • General scene change detection determines the changes of a scene by using feature comparison of two continuous images that are above the fixed threshold. But existing algerian detects scene change that was used in comparing the features of two images continuously, it usually takes a lot of time in decrypting the image data and false-detection problem occurs when there is an object motion or a change of illumination. In this paper, macroblock were used to extract the information directly from the MPEG compression area and suggests algorithm that will detect scene changes more effectively. Existing algorithm have shown numerous arithmetic problems that were improved in the proposed algorithm. The existing algorithm cannot detect the changes of a scene after analyzing the relationship of the previousand futureimages while the algorithm being proposed can detect the changes of a scene continuously and resolves the problem of false-detection. To this end, the data used in general were tested to prove that this algerian would be able to detect the scene changes faster and more correctly than the existing ones. The performance of the suggested algorithm was analyzed basedontheresultsoftheexperiment. .

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.