• Title/Summary/Keyword: detection mechanism

Search Result 854, Processing Time 0.025 seconds

Shot Boundary Detection Algorithm using Multi-Pass Mechanism (Multi-Pass 구조를 가지는 Shot 경계 검출기법)

  • Seong Changwoo;Kang Dae-Seong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.1
    • /
    • pp.58-63
    • /
    • 2000
  • This paper describes an efficient algorithm for shot boundary detection in MPEG video stream. There are two types of shot boundary: abrupt and gradual. The proposed algorithm for detecting the abrupt shot boundaries used DCT DC value in compressed domain. The proposed algorithm of the gradual change detection consists of two-pass mechanism. In the first pass, the expected positions of shot boundaries are extracted using ratio value of motion vectors. After decoding frames that are extracted in the first pass, we will make the dissolving image using (n)th and (n+2)th image of expected position. The gradual shot boundaries are selected by similarity of the dissolving image and the image of (n+1)th expected position. As applying the algorithm for detecting shot boundaries, the gradual changes as well as the abrupt changes are detected efficiently. Experimental results indicate that the proposed method is computationally fast for detecting shot boundaries and robust to the variation of the video characteristic that is different for the kind of videos.

  • PDF

An active learning method with difficulty learning mechanism for crack detection

  • Shu, Jiangpeng;Li, Jun;Zhang, Jiawei;Zhao, Weijian;Duan, Yuanfeng;Zhang, Zhicheng
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.195-206
    • /
    • 2022
  • Crack detection is essential for inspection of existing structures and crack segmentation based on deep learning is a significant solution. However, datasets are usually one of the key issues. When building a new dataset for deep learning, laborious and time-consuming annotation of a large number of crack images is an obstacle. The aim of this study is to develop an approach that can automatically select a small portion of the most informative crack images from a large pool in order to annotate them, not to label all crack images. An active learning method with difficulty learning mechanism for crack segmentation tasks is proposed. Experiments are carried out on a crack image dataset of a steel box girder, which contains 500 images of 320×320 size for training, 100 for validation, and 190 for testing. In active learning experiments, the 500 images for training are acted as unlabeled image. The acquisition function in our method is compared with traditional acquisition functions, i.e., Query-By-Committee (QBC), Entropy, and Core-set. Further, comparisons are made on four common segmentation networks: U-Net, DeepLabV3, Feature Pyramid Network (FPN), and PSPNet. The results show that when training occurs with 200 (40%) of the most informative crack images that are selected by our method, the four segmentation networks can achieve 92%-95% of the obtained performance when training takes place with 500 (100%) crack images. The acquisition function in our method shows more accurate measurements of informativeness for unlabeled crack images compared to the four traditional acquisition functions at most active learning stages. Our method can select the most informative images for annotation from many unlabeled crack images automatically and accurately. Additionally, the dataset built after selecting 40% of all crack images can support crack segmentation networks that perform more than 92% when all the images are used.

Lane Detection Based on Inverse Perspective Transformation and Kalman Filter

  • Huang, Yingping;Li, Yangwei;Hu, Xing;Ci, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.643-661
    • /
    • 2018
  • This paper proposes a novel algorithm for lane detection based on inverse perspective transformation and Kalman filter. A simple inverse perspective transformation method is presented to remove perspective effects and generate a top-view image. This method does not need to obtain the internal and external parameters of the camera. The Gaussian kernel function is used to convolute the image to highlight the lane lines, and then an iterative threshold method is used to segment the image. A searching method is applied in the top-view image obtained from the inverse perspective transformation to determine the lane points and their positions. Combining with feature voting mechanism, the detected lane points are fitted as a straight line. Kalman filter is then applied to optimize and track the lane lines and improve the detection robustness. The experimental results show that the proposed method works well in various road conditions and meet the real-time requirements.

Visual Saliency Detection Based on color Frequency Features under Bayesian framework

  • Ayoub, Naeem;Gao, Zhenguo;Chen, Danjie;Tobji, Rachida;Yao, Nianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.676-692
    • /
    • 2018
  • Saliency detection in neurobiology is a vehement research during the last few years, several cognitive and interactive systems are designed to simulate saliency model (an attentional mechanism, which focuses on the worthiest part in the image). In this paper, a bottom up saliency detection model is proposed by taking into account the color and luminance frequency features of RGB, CIE $L^*a^*b^*$ color space of the image. We employ low-level features of image and apply band pass filter to estimate and highlight salient region. We compute the likelihood probability by applying Bayesian framework at pixels. Experiments on two publically available datasets (MSRA and SED2) show that our saliency model performs better as compared to the ten state of the art algorithms by achieving higher precision, better recall and F-Measure.

Efficient Congestion Detection and Control Algorithm based on Threshold for Wireless Sensor Network (무선 센서 네트워크를 위한 임계치 기반 효율적인 혼잡 탐지 및 제어 알고리즘)

  • Lee, Dae-Woon;Lee, Tae-Woo;Choi, Seung-Kwon;Lee, Joon-Suk;Jin, Guangxun;Lee, Jae-Youp
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.45-56
    • /
    • 2010
  • This paper reports a new mechanism for congestion controls. The proposed congestion detection algorithm can be provided with delay and unnecessary energy consumption. Conventional congestion control methods decide congestion by queue occupancy or mean packet arrival rate of MAC layer only, however, our method can perform precise detection by considering queue occupancy and mean packet arrival rate. In addition, the congestion avoiding method according to congestion degree and scheduling method using priority for real time packets are proposed. Finally, simulation results show that proposed congestion detection and control methods outperforms conventional scheduling schemes for wireless sensor network.

A Effective Sinkhole Attack Detection Mechanism for LQI based Routing in WSN (무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법)

  • Choi, Byung-Goo;Cho, Eung-Jun;Hong, Choong-Seon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.901-905
    • /
    • 2008
  • In this paper, we propose a detection scheme for sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks. We analyze sinkhole attack methods in the networks that use LQI based routing. For the purpose of response to each attack method, we propose methods to detect attacks. Our scheme can work for those sensor networks which use LQI based dynamic routing protocol. And we show the detection of sinkhole attack can be achieved by using a few detector nodes.

Performance of the Maximum-Likelihood Detector by Estimation of the Trellis Targets on the Sixteen-Level Cell NAND Flash Memory (16레벨셀 낸드 플래시 메모리에서 트렐리스 정답 추정 기법을 이용한 최대 유사도 검출기의 성능)

  • Park, Dong-Hyuk;Lee, Jae-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.1-7
    • /
    • 2010
  • In this paper, we use the maximum-likelihood detection by the estimation of trellis targets on the 16-level cell NAND flash memory. This mechanism has a performance gain by using a maximum-likelihood detector. The NAND flash memory channel is a memory channel because of the coupling effect. Thus, we use the known data arrays to finding the targets of trellis. The maximum-likelihood detection by proposed scheme performs better than the threshold detection on the 16-level cell NAND flash memory channel.

Protective Effect of Coptidis Rhizoma on SNAP-Induced Cytotoxicity in Pancreatic RINm5F Cells (SNAP 유도성 RINm5F 세포 독성에 대한 황연 추출물의 방어효과)

  • 류도곤;권강범;양정예;김은경;김강산
    • The Journal of Korean Medicine
    • /
    • v.24 no.2
    • /
    • pp.159-165
    • /
    • 2003
  • Objectives : Coptidis rhizoma (CR) is an oriental medicine that has been used in many traditional prescriptions against diabetes mellitus in Korea for centuries. Our purpose was to determine the protective effect and its action mechanism of CR on the cytotoxicity of pancreatic -cell line (RINm5F cell). Methods : In this experiment, we used methods such as MTT assay for detection of cytotoxicity, DNA fragmentation assay for detection of apoptotic cell death, LDH activity assay for detection of necrotic cell death, and measurement of $DiOC_{6}$ (3) retention for detection of mitochondrial membrane potential (MMP). Background : Nitric oxide (NO) is believed to playa key role in the process of pancreatic -cell destruction leading to insulin-dependent diabetes mellitus (IDDM). Results : Exposure of RINm5F cells to chemical NO donor such as S-nitroso-N-acetylpenicillamine (SNAP) induced cytotoxic events such as DNA fragmentation and lactate dehydrogenase (LDH) release into medium. However, pretreatment of RINm5F cells with CR extract ($10~50{\mu\textrm{g}}/ml$) for 3 hours prevented SNAP-induced DNA fragmentation and LDH release into medium through the inhibition of MMP disruption. Conclusions : These results suggest that CR may be a candidate for a therapeutic or preventing agent against IDDM.

  • PDF

Design and Implementation of IDS and Management Modules based on Network (네트워크 기반의 침입 탐지 시스템 관리 모듈 설계 및 구현)

  • 양동수;윤덕현;황현숙;정동호;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.680-683
    • /
    • 2001
  • As the rapid information communication technique, internet users have been continuously increasing every year, but on the other hand many damages have occurred on the internet because of dysfunction for computer system intrusion. To reduce damages, network and system security mechanism is variously developed by researcher, IDS(Intrusion Detection System) is commercialized to security technique. In this paper we describe for intrusion detection based on network, we design and implement IDS to detect illegal intrusion using misuse detection model. Implemented IDS can detect various intrusion types. When IDS detected illegal intrusion, we implemented for administrator to be possible management and control through mechanisms of alert message transmission, mail transmission, mail at the remote.

  • PDF

Fast Handover Provision Mechanism through Reduction of CoA Configuration Time (CoA 설정 시간 단축을 통한 빠른 핸드오버 제공 메카니즘)

  • Choi, Ji-Hyoung;Lee, Dong-Chul;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.79-82
    • /
    • 2007
  • Recently the diffusion of the advancement of mobile communication technique and mobile terminal increased, The users were demanded seamless services when carrying and moving. It proposed the FMIPv6 (Fast Handoff for Mobile IPv6) from the IETF like this meeting this requirement. The handover procedure of the FMIPv6 causes to defecate with movement detection, new CoA configuration and binding update. But, the delay occurs from each process, when the DAD(Duplicate Address Detection) of the CoA executing, the big delay occurs. This paper proposes a scheme of delay reduction, it omits DAD process and stores in the AR(Access Router) relates in the CoA of the mobile terminal information.

  • PDF