• Title/Summary/Keyword: detection and analysis

Search Result 9,145, Processing Time 0.035 seconds

A Development of Stereo Camera based on Mobile Road Surface Condition Detection System (스테레오카메라 기반 이동식 노면정보 검지시스템 개발에 관한 연구)

  • Kim, Jonghoon;Kim, Youngmin;Baik, Namcheol;Won, Jaemoo
    • International Journal of Highway Engineering
    • /
    • v.15 no.5
    • /
    • pp.177-185
    • /
    • 2013
  • PURPOSES : This study attempts to design and establish the road surface condition detection system by using the image processing that is expected to help implement the low-cost and high-efficiency road information detection system by examining technology trends in the field of road surface condition information detection and related case studies. METHODS : Adapted visual information collecting method(setting a stereo camera outside of the vehicle) and visual information algorithm(transform a Wavelet Transform, using the K-means clustering) Experiments and Analysis on Real-road, just as four states(Dry, Wet, Snow, Ice). RESULTS : Test results showed that detection rate of 95% or more was found under the wet road surface, and the detection rate of 85% or more in snowy road surface. However, the low detection rate of 30% was found under the icy road surface. CONCLUSIONS : As a method to improve the detection rate of the mobile road surface condition information detection system developed in this study, more accurate phase analysis in the image processing process was needed. If periodic synchronization through automatic settings of the camera according to weather or ambient light was not made at the time of image acquisition, a significant change in the values of polarization coefficients occurs.

In-situ Endpoint Detection for Dielectric Films Plasma Etching Using Plasma Impedance Monitoring and Self-plasma Optical Emission Spectroscopy with Modified Principal Component Analysis

  • Jang, Hae-Gyu;Chae, Hui-Yeop
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.08a
    • /
    • pp.153-153
    • /
    • 2012
  • Endpoint detection with plasma impedance monitoring and self-plasma optical emission spectroscopy is demonstrated for dielectric layers etching processes. For in-situ detecting endpoint, optical-emission spectroscopy (OES) is used for in-situ endpoint detection for plasma etching. However, the sensitivity of OES is decreased if polymer is deposited on viewport or the proportion of exposed area on the wafer is too small. To overcome these problems, the endpoint was determined by impedance signal variation from I-V monitoring (VI probe) and self-plasma optical emission spectroscopy. In addition, modified principal component analysis was applied to enhance sensitivity for small area etching. As a result, the sensitivity of this method is increased about twice better than that of OES. From plasma impedance monitoring and self-plasma optical emission spectroscopy, properties of plasma and chamber are analyzed, and real-time endpoint detection is achieved.

  • PDF

Web-Server Security Management system using the correlation analysis (상호연관성 분석을 이용한 웹서버 보안관리 시스템)

  • Kim Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.157-165
    • /
    • 2004
  • The paper suggests that web-server security management system will be able to detect the web service attack accurately and swiftly which is keeping on increasing at the moment and reduce the possibility of the false positive detection. This system gathers the results of many unit security modules at the real time and enhances the correctness of the detection through the correlation analysis procedure. The unit security module consists of Network based Intrusion Detection System module. File Integrity Check module. System Log Analysis module, and Web Log Analysis and there is the Correlation Analysis module that analyzes the correlations on the spot as a result of each unit security module processing. The suggested system provides the feasible framework of the range extension of correlation analysis and the addition of unit security module, as well as the correctness of the attack detection. In addition, the attack detection system module among the suggested systems has the faster detection time by means of restructuring Snort with multi thread base system. WSM will be improved through shortening the processing time of many unit security modules with heavy traffic.

  • PDF

A Robust Crack Filter Based on Local Gray Level Variation and Multiscale Analysis for Automatic Crack Detection in X-ray Images

  • Peng, Shao-Hu;Nam, Hyun-Do
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.4
    • /
    • pp.1035-1041
    • /
    • 2016
  • Internal cracks in products are invisible and can lead to fatal crashes or damage. Since X-rays can penetrate materials and be attenuated according to the material’s thickness and density, they have rapidly become the accepted technology for non-destructive inspection of internal cracks. This paper presents a robust crack filter based on local gray level variation and multiscale analysis for automatic detection of cracks in X-ray images. The proposed filter takes advantage of the image gray level and its local variations to detect cracks in the X-ray image. To overcome the problems of image noise and the non-uniform intensity of the X-ray image, a new method of estimating the local gray level variation is proposed in this paper. In order to detect various sizes of crack, this paper proposes using different neighboring distances to construct an image pyramid for multiscale analysis. By use of local gray level variation and multiscale analysis, the proposed crack filter is able to detect cracks of various sizes in X-ray images while contending with the problems of noise and non-uniform intensity. Experimental results show that the proposed crack filter outperforms the Gaussian model based crack filter and the LBP model based method in terms of detection accuracy, false detection ratio and processing speed.

A Study on Filtering Techniques for Dynamic Analysis of Data Races in Multi-threaded Programs

  • Ha, Ok-Kyoon;Yoo, Hongseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.1-7
    • /
    • 2017
  • In this paper, we introduce three monitoring filtering techniques which reduce the overheads of dynamic data race detection. It is well known that detecting data races dynamically in multi-threaded programs is quite hard and troublesome task, because the dynamic detection techniques need to monitor all execution of a multi-threaded program and to analyse every conflicting memory and thread operations in the program. Thus, the main drawback of the dynamic analysis for detecting data races is the heavy additional time and space overheads for running the program. For the practicality, we also empirically compare the efficiency of three monitoring filtering techniques. The results using OpenMP benchmarks show that the filtering techniques are practical for dynamic data race detection, since they reduce the average runtime overhead to under 10% of that of the pure detection.

LSTM Android Malicious Behavior Analysis Based on Feature Weighting

  • Yang, Qing;Wang, Xiaoliang;Zheng, Jing;Ge, Wenqi;Bai, Ming;Jiang, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2188-2203
    • /
    • 2021
  • With the rapid development of mobile Internet, smart phones have been widely popularized, among which Android platform dominates. Due to it is open source, malware on the Android platform is rampant. In order to improve the efficiency of malware detection, this paper proposes deep learning Android malicious detection system based on behavior features. First of all, the detection system adopts the static analysis method to extract different types of behavior features from Android applications, and extract sensitive behavior features through Term frequency-inverse Document Frequency algorithm for each extracted behavior feature to construct detection features through unified abstract expression. Secondly, Long Short-Term Memory neural network model is established to select and learn from the extracted attributes and the learned attributes are used to detect Android malicious applications, Analysis and further optimization of the application behavior parameters, so as to build a deep learning Android malicious detection method based on feature analysis. We use different types of features to evaluate our method and compare it with various machine learning-based methods. Study shows that it outperforms most existing machine learning based approaches and detects 95.31% of the malware.

Detection Performance Analysis of Underwater Vehicles by Long-Range Underwater Acoustic Communication Signals (장거리 수중 음향 통신 신호에 의한 수중 운동체 피탐지 성능 분석)

  • Hyung-Moon, Kim;Jong-min, Ahn;In-Soo, Kim;Wan-Jin, Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.4
    • /
    • pp.11-22
    • /
    • 2022
  • Unlike a short-range, a long-range underwater acoustic communication(UWAC) uses low frequency signal and deep sound channel to minimize propagation loss. In this case, even though communication signals are modulated using a covert transmission technique such as spread spectrum, it is hard to conceal the existence of the signals. The unconcealed communication signal can be utilized as active sonar signal by enemy and presence of underwater vehicles may be exposed to the interceptor. Since it is very important to maintain stealthiness for underwater vehicles, the detection probability of friendly underwater vehicles should be considered when interceptor utilizes our long-range UWAC signal. In this paper, we modeled a long-range UWAC environment for analyzing the detection performance of underwater vehicles and proposed the region of interest(ROI) setup method and the measurement of detection performance. By computer simulations, we yielded parameters, analyzed the detection probability and the detection performance in ROI. The analysis results showed that the proposed detection performance analysis method for underwater vehicles could play an important role in the operation of long-range UWAC equipment.

Lane Detection Using Biased Discriminant Analysis

  • Kim, Tae Kyung;Kwak, Nojun;Choi, Sang-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.27-34
    • /
    • 2017
  • We propose a cascade lane detector that uses biased discriminant analysis (BDA) to work effectively even when there are various external factors on the road. The proposed cascade detector was designed with an existing lane detector and the detection module using BDA. By placing the BDA module in the latter stage of the cascade detector, the erroneously detected results by the existing detector due to sunlight or road fraction were filtered out at the final lane detection results. Experimental results on road images taken under various environmental conditions showed that the proposed method gave more robust lane detection results than conventional methods alone.

Neighborhood Correlation Image Analysis for Change Detection Using Different Spatial Resolution Imagery

  • Im, Jung-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.5
    • /
    • pp.337-350
    • /
    • 2006
  • The characteristics of neighborhood correlation images for change detection were explored at different spatial resolution scales. Bi-temporal QuickBird datasets of Las Vegas, NV were used for the high spatial resolution image analysis, while bi-temporal Landsat $TM/ETM^{+}$ datasets of Suwon, South Korea were used for the mid spatial resolution analysis. The neighborhood correlation images consisting of three variables (correlation, slope, and intercept) were evaluated and compared between the two scales for change detection. The neighborhood correlation images created using the Landsat datasets resulted in somewhat different patterns from those using the QuickBird high spatial resolution imagery due to several reasons such as the impact of mixed pixels. Then, automated binary change detection was also performed using the single and multiple neighborhood correlation image variables for both spatial resolution image scales.

The Study on the Automated Detection Algorithm for Penetration Scenarios using Association Mining Technique (연관마이닝 기법을 이용한 침입 시나리오 자동 탐지 알고리즘 연구)

  • 김창수;황현숙
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.371-384
    • /
    • 2001
  • In these days, it is continuously increased to the intrusion of system in internet environment. The methods of intrusion detection can be largely classified into anomaly detection and misuse detection. The former uses statistical methods, features selection method in order to detect intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching. The existing studies for IDS(intrusion detection system) use combined methods. In this paper, we propose a new intrusion detection algorithm combined both state transition analysis and association mining techniques. For the intrusion detection, the first step is generated state table for transmitted commands through the network. This method is similar to the existing state transition analysis. The next step is decided yes or no for intrusion using the association mining technique. According to this processing steps, we present the automated generation algorithm of the penetration scenarios.

  • PDF