• Title/Summary/Keyword: Realtime Detection

Search Result 177, Processing Time 0.032 seconds

Effcient Neural Network Architecture for Fat Target Detection and Recognition (목표물의 고속 탐지 및 인식을 위한 효율적인 신경망 구조)

  • Weon, Yong-Kwan;Baek, Yong-Chang;Lee, Jeong-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2461-2469
    • /
    • 1997
  • Target detection and recognition problems, in which neural networks are widely used, require translation invariant and real-time processing in addition to the requirements that general pattern recognition problems need. This paper presents a novel architecture that meets the requirements and explains effective methodology to train the network. The proposed neural network is an architectural extension of the shared-weight neural network that is composed of the feature extraction stage followed by the pattern recognition stage. Its feature extraction stage performs correlational operation on the input with a weight kernel, and the entire neural network can be considered a nonlinear correlation filter. Therefore, the output of the proposed neural network is correlational plane with peak values at the location of the target. The architecture of this neural network is suitable for implementing with parallel or distributed computers, and this fact allows the application to the problems which require realtime processing. Net training methodology to overcome the problem caused by unbalance of the number of targets and non-targets is also introduced. To verify the performance, the proposed network is applied to detection and recognition problem of a specific automobile driving around in a parking lot. The results show no false alarms and fast processing enough to track a target that moves as fast as about 190 km per hour.

  • PDF

A Study for Detecting Fuel-cut Driving of Vehicle Using GPS (GPS를 이용한 차량 연료차단 관성주행의 감지에 관한 연구)

  • Ko, Kwang-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.207-213
    • /
    • 2019
  • The fuel-cut coast-down driving mode is activated when the acceleration pedal is released with transmission gear engaged, and it's a default function for electronic-controlled engine of vehicles. The fuel economy becomes better because fuel injection stops during fuel-cut driving mode. A fuel-cut detection method is suggested in the study and it's based on the speed, acceleration and road gradient data from GPS sensor. It detects fuel-cut driving mode by comparing calculated acceleration and realtime acceleration value. The one is estimated with driving resistance in the condition of fuel-cut driving and the other is from GPS sensor. The detection accuracy is about 80% when the method is verified with road driving data. The result is estimated with 9,600 data set of vehicle speed, acceleration, fuel consumption and road gradient from test driving on the road of 12km during 16 minutes, and the road slope is rather high. It's easy to detect fuel-cut without injector signal obtained by connecting wire. The detection error is from the fact that the variation range of speed, acceleration and road gradient data, used for road resistance force, is larger than the value of fuel consumption data.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

Capture of Foot Motion for Real-time Virtual Wearing by Stereo Cameras (스테레오 카메라로부터 실시간 가상 착용을 위한 발동작 검출)

  • Jung, Da-Un;Yun, Yong-In;Choi, Jong-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1575-1591
    • /
    • 2008
  • In this paper, we propose a new method detecting foot motion capture in order to overlap in realtime foot's 3D virtual model from stereo cameras. In order to overlap foot's virtual model at the same position of the foot, a process of the foot's joint detection to regularly track the foot's joint motion is necessary, and accurate register both foot's virtual model and user's foot in complicated motion is most important problem in this technology. In this paper, we propose a dynamic registration using two types of marker groups. A plane information of the ground handles the relationship between foot's virtual model and user's foot and obtains foot's pose and location. Foot's rotation is predicted by two attached marker groups according to instep of center framework. Consequently, we had implemented our proposed system and estimated the accuracy of the proposed method using various experiments.

  • PDF

Impact of Fermentation Rate Changes on Potential Hydrogen Sulfide Concentrations in Wine

  • Butzke, C.E.;Park, Seung-Kook
    • Journal of Microbiology and Biotechnology
    • /
    • v.21 no.5
    • /
    • pp.519-524
    • /
    • 2011
  • The correlation between alcoholic fermentation rate, measured as carbon dioxide ($CO_2$) evolution, and the rate of hydrogen sulfide ($H_2S$) formation during wine production was investigated. Both rates and the resulting concentration peaks in fermentor headspace $H_2S$ were directly impacted by yeast assimilable nitrogenous compounds in the grape juice. A series of model fermentations was conducted in temperature-controlled and stirred fermentors using a complex model juice with defined concentrations of ammonium ions and/or amino acids. The fermentation rate was measured indirectly by noting the weight loss of the fermentor; $H_2S$ was quantitatively trapped in realtime using a pre-calibrated $H_2S$ detection tube which was inserted into a fermentor gas relief port. Evolution rates for $CO_2$ and $H_2S$ as well as the relative ratios between them were calculated. These fermentations confirmed that total sulfide formation was strongly yeast strain-dependent, and high concentrations of yeast assimilable nitrogen did not necessarily protect against elevated $H_2S$ formation. High initial concentrations of ammonium ions via addition of diammonium phosphate (DAP) caused a higher evolution of $H_2S$ when compared with a non-supplemented but nondeficient juice. It was observed that the excess availability of a certain yeast assimilable amino acid, arginine, could result in a more sustained $CO_2$ production rate throughout the wine fermentation. The contribution of yeast assimilable amino acids from conventional commercial yeast foods to lowering of the $H_2S$ formation was marginal.

Development of 3 Channel Biomedical Signal Measurement System for Mac-yule (맥율용 3채널 생체신호 계측시스템 개발)

  • Byeon, M.K.;Kim, H.J.;Jang, J.K.;Han, S.W.;Huh, W.
    • Journal of IKEEE
    • /
    • v.11 no.1 s.20
    • /
    • pp.24-29
    • /
    • 2007
  • In this paper, we developed a Mac-Yule measurement system which consider psychological stable state of patience. The developed system consist with a hardware device that can derive a EEG, respiration and pulse wave, and a software which acquire a biological signal and signal processing The EEGs are derived with bipolar method from frontal head. The respiration signals obtain from nasal front with a transducer which consist with thermistor bridge. The pulse waves are detected from earlobe with photoplethysmograph method. A power spectrum of EEG are used as the decision parameters of psychological stable state of patience. The decision of Mac-Yule are defined as origin text method that of numbers of pulse to 1 respiration period. As the results of experiment with developed system, we could have a spectrum band discretion of EEG signal, stable respiration signal detection and automatic gain controlled pulse signal with realtime. And then, we could detect Mac-Yules from processed signals.

  • PDF

A Hardware Design of Feature Detector for Realtime Processing of SIFT(Scale Invariant Feature Transform) Algorithm in Embedded Systems (임베디드 환경에서 SIFT 알고리즘의 실시간 처리를 위한 특징점 검출기의 하드웨어 구현)

  • Park, Chan-Il;Lee, Su-Hyun;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.3
    • /
    • pp.86-95
    • /
    • 2009
  • SIFT is an algorithm to extract vectors at pixels around keypoints, in which the pixel colors are very different from neighbors, such as vertices and edges of an object. The SIFT algorithm is being actively researched for various image processing applications including 3D image reconstructions and intelligent vision system for robots. In this paper, we implement a hardware to sift feature detection algorithm for real time processing in embedded systems. We estimate that the hardware implementation give a performance 25ms of $1,280{\times}960$ image and 5ms of $640{\times}480$ image at 100MHz. And the implemented hardware consumes 45,792 LUTs(85%) with Synplify 8.li synthesis tool.

Development of PCS and an experiment for performance evaluation (PCS(Pressure Core Sampler) 개발 및 성능평가실험)

  • Lee, Ha-jung;Kim, Hae-jin;Lee, Gye-gwang;Jung, Hyo-seok;Son, In-rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.9
    • /
    • pp.973-980
    • /
    • 2015
  • With their wide geographical distribution, unconventional resources are continuously compared against conventional resources, but their development is expanding because TRRs (Technical Recoverable Resources) are similar to conventional resources. In particular, there is active development of unconventional gas resources such as shale gas, tight gas, CBM (coalbed methane) and gas hydrate. However, it is difficult to calculate the material properties of unconventional resources, especially the gas content, with current geophysical logging technology. Additionally, some overseas companies have monopolies on related equipment and materials. Therefore, this study developed a reservoir PCS (Pressure Core Sampler). It can collect core samples without gaseous loss by maintaining high pressure from the moment the core is sampled and record pressure and temperature in real time. Successful performance testing was also carried out for official verification of the manufactured PCS. The reservoir PCS will contribute to the acquisition of geophysical well logging data as well as accurate and reliable cores.

Design and Implementation of an OSGi-based Old Age Patient Care System in Embedded Programming on RFIDs and Infrared Sensors (RFID와 적외선 센서의 임베디드 프로그래밍을 통한 OSGi 기반 노령 환자 케어 시스템의 설계 및 구현)

  • Cha, Si-Ho;Kim, Dae-Young;Choi, Jae-Ho;Lee, Jong-Eon;Kim, Kyu-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11B
    • /
    • pp.1005-1012
    • /
    • 2008
  • According to an aging population has dramatically increased in over the world, silver care becomes more important than other field. In this paper, we design and implement an old age patient care system that allows a carer to instantly monitor the status of proteges and notifies emergency of a patient to a medical institute. The system uses RFIDs and infrared sensors implemented in embedded software to analyze the activity and movement detection of the elderly. And the home gateway allows easy integration with heterogeneous devices by employing OSGi that is a middleware standard for home gateways. We can verify the information on the activity per day and the activity per week by Web browsers and view realtime video on the elderly by Web Cam using the implemented system. The system also can send us cell phone messages and E-mail in case of emergency.