• 제목/요약/키워드: Issue Detection

Search Result 583, Processing Time 0.145 seconds

Novel Approach for Eliminating BER Irreducible Floor in the Enhanced Blind Cyclic Detection for Space-Time Coding

  • Pham, Van-Su;Le, Minh-Tuan;Mai, Linh;Kabir, S.M.Humayun;Yoon, Gi-Wan
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.150-153
    • /
    • 2008
  • In the blind Maximum-likelihood (ML) detection for Orthogonal Space-Time Block Codes (OSTBC), the problem of ambiguity in determining the symbols has been a great concern. A possible solution to this problem is to apply semi-blind ML detection, i.e. the blind ML decoding with pilot symbols or training sequence. In order to increase the performance, the number of pilot symbols or length of training sequence should be increased. Unfortunately, this leads to a significantly decrease in system spectral efficiency. This work presents an approach to resolve the aforementioned issue by introducing a new method for constructing transmitted information symbols, in which transmitting information symbols drawn form different modulation constellations. Therefore, the ambiguity can be easily eliminated. In addition, computer simulation is implemented to verify the performance of the proposed approach.

Crack Detection in Tunnel Using Convolutional Encoder-Decoder Network (컨볼루셔널 인코더-디코더 네트워크를 이용한 터널에서의 균열 검출)

  • Han, Bok Gyu;Yang, Hyeon Seok;Lee, Jong Min;Moon, Young Shik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.80-89
    • /
    • 2017
  • The classical approaches to detect cracks are performed by experienced inspection professionals by annotating the crack patterns manually. Because of each inspector's personal subjective experience, it is hard to guarantee objectiveness. To solve this issue, automated crack detection methods have been proposed however the methods are sensitive to image noise. Depending on the quality of image obtained, the image noise affect overall performance. In this paper, we propose crack detection method using a convolutional encoder-decoder network to overcome these weaknesses. Performance of which is significantly improved in terms of the recall, precision rate and F-measure than the previous methods.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Intrusion Detection Using Log Server and Support Vector Machines

  • Donghai Guan;Donggyu Yeo;Lee, Juwan;Dukwhan Oh
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.682-684
    • /
    • 2003
  • With the explosive rapid expansion of computer using during the past few years, security has become a crucial issue for modem computer systems. Today, there are many intrusion detection systems (IDS) on the Internet. A variety of intrusion detection techniques and tools exist in the computer security community such as enterprise security management system (ESM) and system integrity checking tools. However, there is a potential problem involved with intrusion detection systems that are installed locally on the machines to be monitored. If the system being monitored is compromised, it is quite likely that the intruder will after the system logs and the intrusion logs while the intrusion remains undetected. In this project KIT-I, we adopt remote logging server (RLS) mechanism, which is used to backup the log files to the server. Taking into account security, we make use of the function of SSL of Java and certificate authority (CA) based key management. Furthermore, Support Vector Machine (SVM) is applied in our project to detect the intrusion activities.

  • PDF

Class Knowledge-oriented Automatic Land Use and Land Cover Change Detection

  • Jixian, Zhang;Yu, Zeng;Guijun, Yang
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.47-49
    • /
    • 2003
  • Automatic land use and land cover change (LUCC) detection via remotely sensed imagery has a wide application in the area of LUCC research, nature resource and environment monitoring and protection. Under the condition that one time (T1) data is existed land use and land cover maps, and another time (T2) data is remotely sensed imagery, how to detect change automatically is still an unresolved issue. This paper developed a land use and land cover class knowledge guided method for automatic change detection under this situation. Firstly, the land use and land cover map in T1 and remote sensing images in T2 were registered and superimposed precisely. Secondly, the remotely sensed knowledge database of all land use and land cover classes was constructed based on the unchanged parcels in T1 map. Thirdly, guided by T1 land use and land cover map, feature statistics for each parcel or pixel in RS images were extracted. Finally, land use and land cover changes were found and the change class was recognized through the automatic matching between the knowledge database of remote sensing information of land use & land cover classes and the extracted statistics in that parcel or pixel. Experimental results and some actual applications show the efficiency of this method.

  • PDF

A Comparative Study on Deepfake Detection using Gray Channel Analysis (Gray 채널 분석을 사용한 딥페이크 탐지 성능 비교 연구)

  • Son, Seok Bin;Jo, Hee Hyeon;Kang, Hee Yoon;Lee, Byung Gul;Lee, Youn Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.9
    • /
    • pp.1224-1241
    • /
    • 2021
  • Recent development of deep learning techniques for image generation has led to straightforward generation of sophisticated deepfakes. However, as a result, privacy violations through deepfakes has also became increased. To solve this issue, a number of techniques for deepfake detection have been proposed, which are mainly focused on RGB channel-based analysis. Although existing studies have suggested the effectiveness of other color model-based analysis (i.e., Grayscale), their effectiveness has not been quantitatively validated yet. Thus, in this paper, we compare the effectiveness of Grayscale channel-based analysis with RGB channel-based analysis in deepfake detection. Based on the selected CNN-based models and deepfake datasets, we measured the performance of each color model-based analysis in terms of accuracy and time. The evaluation results confirmed that Grayscale channel-based analysis performs better than RGB-channel analysis in several cases.

Moon Phase based Threshold Determination for VIIRS Boat Detection

  • Kim, Euihyun;Kim, Sang-Wan;Jung, Hahn Chul;Ryu, Joo-Hyung
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.1
    • /
    • pp.69-84
    • /
    • 2021
  • Awareness of boats is a main issue in areas of fishery management, illegal fishing, and maritime traffic, etc. For the awareness, Automatic Identification System (AIS) and Vessel-Pass System (V-PASS) have been widely used to collect the boat-related information. However, only using these systems makes it difficult to collect the accurate information. Recently, satellite-based data has been increasingly used as a cooperative system. In 2015, U.S. National Oceanic and Atmospheric Administration (NOAA) developed a boat detection algorithm using Visible Infrared Imaging Radiometer Suite (VIIRS) Day & Night Band (DNB) data. Although the detections have been widely utilized in many publications, it is difficult to estimate the night-time fishing boats immediately. Particularly, it is difficult to estimate the threshold due to the lunar irradiation effect. This effect must be corrected to apply a single specific threshold. In this study, the moon phase was considered as the main frequency of this effect. Considering the moon phase, relational expressions are derived and then used as offsets for relative correction. After the correction, it shows a significant reduction in the standard deviation of the threshold compared to the threshold of NOAA. Through the correction, this study can set a constant threshold every day without determination of different thresholds. In conclusion, this study can achieve the detection applying the single specific threshold regardless of the moon phase.

Semantic crack-image identification framework for steel structures using atrous convolution-based Deeplabv3+ Network

  • Ta, Quoc-Bao;Dang, Ngoc-Loi;Kim, Yoon-Chul;Kam, Hyeon-Dong;Kim, Jeong-Tae
    • Smart Structures and Systems
    • /
    • v.30 no.1
    • /
    • pp.17-34
    • /
    • 2022
  • For steel structures, fatigue cracks are critical damage induced by long-term cycle loading and distortion effects. Vision-based crack detection can be a solution to ensure structural integrity and performance by continuous monitoring and non-destructive assessment. A critical issue is to distinguish cracks from other features in captured images which possibly consist of complex backgrounds such as handwritings and marks, which were made to record crack patterns and lengths during periodic visual inspections. This study presents a parametric study on image-based crack identification for orthotropic steel bridge decks using captured images with complicated backgrounds. Firstly, a framework for vision-based crack segmentation using the atrous convolution-based Deeplapv3+ network (ACDN) is designed. Secondly, features on crack images are labeled to build three databanks by consideration of objects in the backgrounds. Thirdly, evaluation metrics computed from the trained ACDN models are utilized to evaluate the effects of obstacles on crack detection results. Finally, various training parameters, including image sizes, hyper-parameters, and the number of training images, are optimized for the ACDN model of crack detection. The result demonstrated that fatigue cracks could be identified by the trained ACDN models, and the accuracy of the crack-detection result was improved by optimizing the training parameters. It enables the applicability of the vision-based technique for early detecting tiny fatigue cracks in steel structures.

A group-wise attention based decoder for lightweight salient object detection on edge-devices (엣지 디바이스에서 객체 탐지를 위한 그룹별 어탠션 기반 경량 디코더 연구)

  • Thien-Thu Ngo;Md Delowar Hossain;Eui-Nam Huh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.30-33
    • /
    • 2023
  • The recent scholarly focus has been directed towards the expeditious and accurate detection of salient objects, a task that poses considerable challenges for resource-limited edge devices due to the high computational demands of existing models. To mitigate this issue, some contemporary research has favored inference speed at the expense of accuracy. In an effort to reconcile the intrinsic trade-off between accuracy and computational efficiency, we present novel model for salient object detection. Our model incorporate group-wise attentive module within the decoder of the encoder-decoder framework, with the aim of minimizing computational overhead while preserving detection accuracy. Additionally, the proposed architectural design employs attention mechanisms to generate boundary information and semantic features pertinent to the salient objects. Through various experimentation across five distinct datasets, we have empirically substantiated that our proposed models achieve performance metrics comparable to those of computationally intensive state-of-the-art models, yet with a marked reduction in computational complexity.

Failure Detection and Resilience in HRing Overlay Network (HRing 오버레이 네트워크에서 실패 탐지 및 회복)

  • Gu, Tae-Wan;Lee, Kwang-Mo
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.21-33
    • /
    • 2007
  • An overlay network is a virtual network which is constructed on top of a physical computer network. A node in the overlay network is connected through virtual or logical links, where each link corresponds to a path of the links in the underlying physical network. Overlay networks are suitable for sharing heterogeneous resources in distributed environments, However, overlay networks are limited for achieving reliable communication that failure detection in overlay networks is a very important issue. In this paper, we review conditions of conventional failure detection and propose a new approach to failure detection and resilience which can be applied to HRing (Hierarchical Ring) overlay networks. The proposed method consists of the failure detection and the failure resilience phases. Because it utilizes the characteristics of the HRing overlay network for failure detection, it can reduce unnecessary network traffic and provide better scalability and flexibility. We also analyzed and evaluated the performance of the proposed approach through simulations.

  • PDF