• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.047 seconds

Implementation of Radar Drone Detection Based on ISAR Technique (ISAR 영상 기반 소형 드론 탐지 구현)

  • Lee, Kee-Woong;Song, Kyoung-Min;Song, Jung-Hwan;Jung, Chul-Ho;Lee, Woo-kyung;Lee, Myeong-Jin;Song, Yong-Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.2
    • /
    • pp.159-162
    • /
    • 2017
  • Along with the popular use of commercial drones, there are increased concerns on the possible threats from drones intruding into secured areas. The difficulty of drone detection is attributed to its stealthy operation flying at low altitude with low level signature. Consequently, the anti-drone technique has been of major research topic in recent years and among others, the radar detection is considered as the most promising technique. However, the use of conventional radar detection may not be effective due to the low level radar cross sections of the commercial drones. In this paper, ISAR technique has been employed to implement drone detection in urban area. To this purpose, a pulsed radar system is set up on the ground to track flying drones and the corresponding ISAR images are produced by coherent processing.

A Cross-check based Vulnerability Analysis Method using Static and Dynamic Analysis (정적 및 동적 분석을 이용한 크로스 체크기반 취약점 분석 기법)

  • Song, Jun-Ho;Kim, Kwang-Jik;Ko, Yong-Sun;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.863-871
    • /
    • 2018
  • Existing vulnerability analysis tools are prone to missed detections, incorrect detections, and over-detection, which reduces accuracy. In this paper, cross-checking based on a vulnerability detection method using static and dynamic analysis is proposed, which develops and manages safe applications and can resolve and analyze these problems. Risks due to vulnerabilities are computed, and an intelligent vulnerability detection technique is used to improve accuracy and evaluate risks under the final version of the application. This helps the development and execution of safe applications. Through incorporation of tools that use static analysis and dynamic analysis techniques, our proposed technique overcomes weak points at each stage, and improves the accuracy of vulnerability detection. Existing vulnerability risk-evaluation systems only evaluate self-risks, whereas our proposed vulnerability risk-evaluation system reflects the vulnerability of self-risk and the detection accuracy in a complex fashion to evaluate relative. Our proposed technique compares and analyzes existing analysis tools, such as lists for detections and detection accuracy based on the top 10 items of SANS at CWE. Quantitative evaluation systems for existing vulnerability risks and the proposed application's vulnerability risks are compared and analyzed. We developed a prototype analysis tool using our technique to test the application's vulnerability detection ability, and to show that our proposed technique is superior to existing ones.

An Effective Intrusion Detection System for MobileAdHocNetwork (모바일 에드혹네트워크를 위한 효과적인 침입 탐지 시스템)

  • Shrestha, Rakesh;Park, Kyu-Jin;Park, Kwang-Chae;Choi, Dong-You;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.271-276
    • /
    • 2008
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies is dynamic, lack centralization and are vulnerable to attacks. This paper is about the effective enhancement of the IDS technique that is being implemented in the mobile ad hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

  • PDF

Fractional Multi-bit Differential Detection Technique for Continuous Phase Modulation

  • Lee, Kee-Hoon;Seo, Jong-Soo
    • ETRI Journal
    • /
    • v.26 no.6
    • /
    • pp.635-640
    • /
    • 2004
  • A new low-complexity differential detection technique, fractional multi-bit differential detection (FMDD), is proposed in order to improve the performance of continuous phase modulation (CPM) signals such as Gaussian minimum shift keying (GMSK) and Gaussian frequency shift keying (GFSK). In comparison to conventional one-bit differential detected (1DD) GFSK, the FMDD-employed GFSK provides a signal-to-noise ratio advantage of up to 1.8 dB in an AWGN channel. Thus, the bit-error rate performance of the proposed FMDD is brought close to that of an ideal coherent detection while avoiding the implementation complexity associated with the carrier recovery. In the adjacent channel interference environment, FMDD achieves an even larger SNR advantage compared to 1DD.

  • PDF

A Vision-based Damage Detection for Bridge Cables (교량케이블 영상기반 손상탐지)

  • Ho, Hoai-Nam;Lee, Jong-Jae
    • 한국방재학회:학술대회논문집
    • /
    • 2011.02a
    • /
    • pp.39-39
    • /
    • 2011
  • This study presents an effective vision-based system for cable bridge damage detection. In theory, cable bridges need to be inspected the outer as well as the inner part. Starting from August 2010, a new research project supported by Korea Ministry of Land, Transportation Maritime Affairs(MLTM) was initiated focusing on the damage detection of cable system. In this study, only the surface damage detection algorithm based on a vision-based system will be focused on, an overview of the vision-based cable damage detection is given in Fig. 1. Basically, the algorithm combines the image enhancement technique with principal component analysis(PCA) to detect damage on cable surfaces. In more detail, the input image from a camera is processed with image enhancement technique to improve image quality, and then it is projected into PCA sub-space. Finally, the Mahalanobis square distance is used for pattern recognition. The algorithm was verified through laboratory tests on three types of cable surface. The algorithm gave very good results, and the next step of this study is to implement the algorithm for real cable bridges.

  • PDF

Phantom Experiments for Breast Cancer Detection by Ultrasound Transmission Period

  • Sakasegawa, Aya;Hoshino, Hirokazu;Tsuji, Kiichi;Hayakawa, Yoshinori
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2002.09a
    • /
    • pp.481-484
    • /
    • 2002
  • In every cancer early detection and early treatment is the best way to decrease mortality of patients. Moreover early detection of breast cancer increases the possibility of breast conservation treatment. Although mammography is the most powerful modality for early detection, it is hazardous to be used for young women due to X-ray exposure. Another modality of image diagnosis is ultrasound echo technique. But it is not so powerful to detect breast cancer compared to mammography. Palpation is another modality, but is largely dependent on the skill and experience of medical doctors. A new technique is tested its validity in phantom experiments with good results.

  • PDF

Crack Detection of Concrete Structures Using Optical Fiber Cables (광섬유 케이블을 이용한 콘크리트 구조물의 균열 탐사)

  • 조남소;김남식
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2000.04a
    • /
    • pp.896-902
    • /
    • 2000
  • Crack detection technique for concrete structures has been developed in this study,. The technique utilizes OTDR(Optical Time Domain Reflectometer) method that is widely used in the field of optical engineering. At present, some techniques, such as the naked eye inspection, inspection by crack gauge, ultra sonic detection and os on, are used for crack detection. However, these are not economical and are often time-consuming works. This method employs a common optical fiber as a means of crack detection. Th optical fiber is fully attached to concrete surface, and a crack on concrete could be detected to synchronize with the crack on optical fiber. The experimental verification was performed for concrete beams and the intial crack on the beam was detected under cracking force.

  • PDF

Detection of Noise Sources in a Cavitation Tunnel by using Beam-Forming Method (빔형성 기법을 이용한 공동수조 내부의 소음원 탐지)

  • 이정학;서종수
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.749-754
    • /
    • 2003
  • In this paper, we introduce the measurement of the underwater noise with 32channel hydrophone array of Samsung CAvitation Tunnel (SCAT) and the detection technique of noise sources by using the beam-forming method. Measurement and way signal Processing under fluid flow are essential works for the underwater acoustics, especially for the detection of noise sources. As the acoustic impedance of the water is relatively high and the tunnel is an enclosed system, we have to consider the interaction between tunnel and water together with the reflection of noise in the beam-forming technique. Also, for a hydrophone array system that is fixed on one side of tunnel wall as done in SCAT is liable to suffer from some limitations in the detection of the noise sources with the array, we discuss these limitations particularly on the frequency range and spacing of noise sources.

  • PDF

Detection and quantification of structural damage under ambient vibration environment

  • Yun, Gun Jin
    • Structural Engineering and Mechanics
    • /
    • v.42 no.3
    • /
    • pp.425-448
    • /
    • 2012
  • In this paper, a new damage detection and quantification method has been presented to perform detection and quantification of structural damage under ambient vibration loadings. To extract modal properties of the structural system under ambient excitation, natural excitation technique (NExT) and eigensystem realization algorithm (ERA) are employed. Sensitivity matrices of the dynamic residual force vector have been derived and used in the parameter subset selection method to identify multiple damaged locations. In the sequel, the steady state genetic algorithm (SSGA) is used to determine quantified levels of the identified damage by minimizing errors in the modal flexibility matrix. In this study, performance of the proposed damage detection and quantification methodology is evaluated using a finite element model of a truss structure with considerations of possible experimental errors and noises. A series of numerical examples with five different damage scenarios including a challengingly small damage level demonstrates that the proposed methodology can efficaciously detect and quantify damage under noisy ambient vibrations.

Face Detection using Template Matching and Ellipse Fitting (템플릿과 타원정보를 이용한 얼굴검출)

  • Jung, Tae-Yun;Kim, Hyun-Sool;Kang, Woo-Seok;Park, Sang-Hui
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.11
    • /
    • pp.1472-1475
    • /
    • 1999
  • This paper proposes a new detection method of human faces in grey scale images with cluttered background using a facial template and elliptical structure of the human head. Face detection technique can be applied in many areas of image processing such as face recognition, composition and computer graphics, etc. Until now, many researches about face detection have been done, and applications in more complicated conditions are increasing. The existing technique proposed by Sirohey shows relatively good performance in image with cluttered background, but can apply only to image with one face and needs much computation time. The proposed method is designed to reduce complexity and be applied even in the image with several faces by introducing template matching as preprocess. The results show that the proposed method produces more correct detection rate and needs less computation time than the existing one.

  • PDF