• Title/Summary/Keyword: detection mechanism

Search Result 843, Processing Time 0.027 seconds

Snoring sound detection method using attention-based convolutional bidirectional gated recurrent unit (주의집중 기반의 합성곱 양방향 게이트 순환 유닛을 이용한 코골이 소리 검출 방식)

  • Kim, Min-Soo;Lee, Gi Yong;Kim, Hyoung-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.2
    • /
    • pp.155-160
    • /
    • 2021
  • This paper proposes an automatic method for detecting snore sound, one of the important symptoms of sleep apnea patients. In the proposed method, sound signals generated during sleep are input to detect a sound generation section, and a spectrogram transformed from the detected sound section is applied to a classifier based on a Convolutional Bidirectional Gated Recurrent Unit (CBGRU) with attention mechanism. The applied attention mechanism improved the snoring sound detection performance by extending the CBGRU model to learn discriminative feature representation for the snoring detection. The experimental results show that the proposed snoring detection method improves the accuracy by approximately 3.1 % ~ 5.5 % than existing method.

Study on Availability Guarantee Mechanism on Smart Grid Networks: Detection of Attack and Anomaly Node Using Signal Information (스마트그리드 네트워크에서 가용성 보장 메커니즘에 관한 연구: 신호정보를 이용한 공격 및 공격노드 검출)

  • Kim, Mihui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.279-286
    • /
    • 2013
  • The recent power shortages due to surge in demand for electricity highlights the importance of smart grid technologies for efficient use of power. The experimental content for vulnerability against availability of smart meter, an essential component in smart grid networks, has been reported. Designing availability protection mechanism to boost the realization possibilities of the secure smart grid is essential. In this paper, we propose a mechanism to detect the availability infringement attack for smart meter and also to find anomaly nodes through analyzing smart grid structure and traffic patterns. The proposed detection mechanism uses approximate entropy technique to decrease the detection load and increase the detection rate with few samples and utilizes the signal information(CIR or RSSI, etc.) that the anomaly node can not be changed to find the anomaly nodes. Finally simulation results of proposed method show that the detection performance and the feasibility.

Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1119-1143
    • /
    • 2014
  • Lightweight trust mechanism with lightweight cryptographic primitives has emerged as an important mechanism in resource constraint wireless sensor based mobile devices. In this work, outlier detection in lightweight Mobile Ad-hoc NETworks (MANETs) is extended to create the space of reliable trust cycle with anomaly detection mechanism and minimum energy losses [1]. Further, system is tested against outliers through detection ratios and anomaly scores before incorporating virtual programmable nodes to increase the efficiency. Security in proposed system is verified through ProVerif automated toolkit and mathematical analysis shows that it is strong against bad mouthing and on-off attacks. Performance of proposed technique is analyzed over different MANET routing protocols with variations in number of nodes and it is observed that system provide good amount of throughput with maximum of 20% increase in delay on increase of maximum of 100 nodes. System is reflecting good amount of scalability, optimization of resources and security. Lightweight modeling and policy analysis with lightweight cryptographic primitives shows that the intruders can be detection in few milliseconds without any conflicts in access rights.

Screw Transformation Mechanism of Screw-Propelled Robot for Efficient Void Detection in Grease Pipe (스크류 추진형 검측 로봇의 효율적인 검측을 위한 스크류 구조 변화 메커니즘)

  • Kim, Dongseon;Kim, Hojoong;Kim, Jinhyun
    • The Journal of Korea Robotics Society
    • /
    • v.17 no.2
    • /
    • pp.172-177
    • /
    • 2022
  • In general, detection robots using ultrasonic sensors are equipped with sensors to protrude outward or to contact objects. However, in the case of a screw-propelled robot that detects the inside of a reactor tendon duct, if the ultrasonic sensor protrudes to the outside, resistance due to grease is generated, and thus the propulsion efficiency is reduced. In order to increase the propulsion efficiency, the screw must be sharp, and the sharper the screw, the more difficult it is to apply a high-performance ultrasonic sensor, and the detection efficiency decreases. This paper proposes a screw shape-changing mechanism that can improve both propulsion efficiency and detection efficiency. This mechanism includes an overlapped helical ring (OHR) structure and a magnetic clutch system (MCS), and thus the shape of a screw may be changed to a compact size. As a result, the Screw-propelled robot with this mechanism can reduce the overall length by about 150 mm and change the shape of the screw faster and more accurately than a robot with a linear actuator.

A Study on Mine Detection System with Automatic Height Control (높이 자동제어가 가능한 차량 장착형 지뢰탐지장치에 대한 연구)

  • Kang, Sin Cheon;Chung, Hoe Young;Jung, Dae Yon;Sung, Gi Yeul;Kim, Do Jong;Kim, Ji Woong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.558-565
    • /
    • 2017
  • The vehicle-mounted mine detection system with large detection sensor modules can search wide areas with a fast detection speed. To mount the heavy mine detectors on a manned or unmanned vehicle, it is necessary to design the detector driving mechanism and control system based on the considerations driven from the characteristic analysis and the operation requirements of the detection system. Furthermore, while operating the mine detector mounted on a mobile vehicle, it is significant to keep the height from the ground to sensors within a certain distance in order to get a qualified detection performance. As the mine detection sensor, we used ground penetrating radar widely used to geotechnical exploration, mine detection and etc. In this paper, we introduce a driving mechanism through analyzing the characteristics of the vehicle-mounted mine detection system. We also suggest a method to automatically control the distance between the ground and GPR by utilizing the GPR output values, used to detect mines at the same time.

Application of YOLOv5 Neural Network Based on Improved Attention Mechanism in Recognition of Thangka Image Defects

  • Fan, Yao;Li, Yubo;Shi, Yingnan;Wang, Shuaishuai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.245-265
    • /
    • 2022
  • In response to problems such as insufficient extraction information, low detection accuracy, and frequent misdetection in the field of Thangka image defects, this paper proposes a YOLOv5 prediction algorithm fused with the attention mechanism. Firstly, the Backbone network is used for feature extraction, and the attention mechanism is fused to represent different features, so that the network can fully extract the texture and semantic features of the defect area. The extracted features are then weighted and fused, so as to reduce the loss of information. Next, the weighted fused features are transferred to the Neck network, the semantic features and texture features of different layers are fused by FPN, and the defect target is located more accurately by PAN. In the detection network, the CIOU loss function is used to replace the GIOU loss function to locate the image defect area quickly and accurately, generate the bounding box, and predict the defect category. The results show that compared with the original network, YOLOv5-SE and YOLOv5-CBAM achieve an improvement of 8.95% and 12.87% in detection accuracy respectively. The improved networks can identify the location and category of defects more accurately, and greatly improve the accuracy of defect detection of Thangka images.

Study on the Selection Criteria of 3D Collision Detection Model (3D 충돌 검출 모델의 선정 기준에 관한 연구)

  • Kang, Yun-Mi;Park, Young-B.
    • Journal of IKEEE
    • /
    • v.7 no.2 s.13
    • /
    • pp.253-259
    • /
    • 2003
  • In a good 3D engine, objects interactions are similar to those of real-world. Collision is one of the interactions. It includes whether collision took place or not, where collision took placed, and reaction after collision took place. More precise collision detection needs more time. If there exist required precision, detection time can be controlled by choosing appropriate detection model. Therefore, we need a selection mechanism for the collision detection with respect to required precision and detection time. In this paper, a collision detection model with seven different precision levels is examined. And relationship between detection time and precision is analyzed. Consequently, we propose a selection mechanism for collision detection model.

  • PDF

Laser Sensor for Obstacle Detection of AGV

  • Park, Kyoung-Taik;Shin, Young-Tae;Kang, Byung-Su
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.653-657
    • /
    • 2005
  • AGV is very useful equipment to transfer containers in automated container terminal. AGV must have Obstacle Detection System (ODS) for port automation. ODS needs the function to classify some specified object from background in acquired data. And it must be able to track classified moving objects. Finally, ODS could determine its next action for safe driving whether it should do emergency stop or speed down, or it should change its deriving lane. For these functions, ODS can have many different kinds of algorithm. In this paper, we present one of AGV to be used in automated container terminal.

  • PDF

Crack detection based on ResNet with spatial attention

  • Yang, Qiaoning;Jiang, Si;Chen, Juan;Lin, Weiguo
    • Computers and Concrete
    • /
    • v.26 no.5
    • /
    • pp.411-420
    • /
    • 2020
  • Deep Convolution neural network (DCNN) has been widely used in the healthy maintenance of civil infrastructure. Using DCNN to improve crack detection performance has attracted many researchers' attention. In this paper, a light-weight spatial attention network module is proposed to strengthen the representation capability of ResNet and improve the crack detection performance. It utilizes attention mechanism to strengthen the interested objects in global receptive field of ResNet convolution layers. Global average spatial information over all channels are used to construct an attention scalar. The scalar is combined with adaptive weighted sigmoid function to activate the output of each channel's feature maps. Salient objects in feature maps are refined by the attention scalar. The proposed spatial attention module is stacked in ResNet50 to detect crack. Experiments results show that the proposed module can got significant performance improvement in crack detection.

A Detection Rule Exchange Mechanism for the Collaborative Intrusion Detection in Defense-ESM (국방통합보안관제체계에서의 협업 침입탐지를 위한 탐지규칙 교환 기법)

  • Lee, Yun-Hwan;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.57-69
    • /
    • 2011
  • Many heterogeneous Intrusion Detection Systems(IDSs) based in misuse detection technique including the self-developed IDS are now operating in Defense-ESM(Enterprise Security Management System). IDS based on misuse detection may have different capability in the intrusion detection process according to the frequency and quality of its signature update. This makes the integration and collaboration with other IDSs more difficult. In this paper, with the purpose of creating the proper foundation for integration and collaboration between heterogeneous IDSs being operated in Defense-ESM, we propose an effective mechanism that can enable one IDS to propagate its new detection rules to other IDSs and receive updated rules from others. We also prove the performance of rule exchange and application possibility to defense environment through the implementation and experiment.