• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.028 seconds

Shipping Container Load State and Accident Risk Detection Techniques Based Deep Learning (딥러닝 기반 컨테이너 적재 정렬 상태 및 사고 위험도 검출 기법)

  • Yeon, Jeong Hum;Seo, Yong Uk;Kim, Sang Woo;Oh, Se Yeong;Jeong, Jun Ho;Park, Jin Hyo;Kim, Sung-Hee;Youn, Joosang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.411-418
    • /
    • 2022
  • Incorrectly loaded containers can easily knock down by strong winds. Container collapse accidents can lead to material damage and paralysis of the port system. In this paper, We propose a deep learning-based container loading state and accident risk detection technique. Using Darknet-based YOLO, the container load status identifies in real-time through corner casting on the top and bottom of the container, and the risk of accidents notifies the manager. We present criteria for classifying container alignment states and select efficient learning algorithms based on inference speed, classification accuracy, detection accuracy, and FPS in real embedded devices in the same environment. The study found that YOLOv4 had a weaker inference speed and performance of FPS than YOLOv3, but showed strong performance in classification accuracy and detection accuracy.

Damaged cable detection with statistical analysis, clustering, and deep learning models

  • Son, Hyesook;Yoon, Chanyoung;Kim, Yejin;Jang, Yun;Tran, Linh Viet;Kim, Seung-Eock;Kim, Dong Joo;Park, Jongwoong
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.17-28
    • /
    • 2022
  • The cable component of cable-stayed bridges is gradually impacted by weather conditions, vehicle loads, and material corrosion. The stayed cable is a critical load-carrying part that closely affects the operational stability of a cable-stayed bridge. Damaged cables might lead to the bridge collapse due to their tension capacity reduction. Thus, it is necessary to develop structural health monitoring (SHM) techniques that accurately identify damaged cables. In this work, a combinational identification method of three efficient techniques, including statistical analysis, clustering, and neural network models, is proposed to detect the damaged cable in a cable-stayed bridge. The measured dataset from the bridge was initially preprocessed to remove the outlier channels. Then, the theory and application of each technique for damage detection were introduced. In general, the statistical approach extracts the parameters representing the damage within time series, and the clustering approach identifies the outliers from the data signals as damaged members, while the deep learning approach uses the nonlinear data dependencies in SHM for the training model. The performance of these approaches in classifying the damaged cable was assessed, and the combinational identification method was obtained using the voting ensemble. Finally, the combination method was compared with an existing outlier detection algorithm, support vector machines (SVM). The results demonstrate that the proposed method is robust and provides higher accuracy for the damaged cable detection in the cable-stayed bridge.

Recent Applications of Molecularly Imprinted Polymers (MIPs) on Screen-Printed Electrodes for Pesticide Detection

  • Adilah Mohamed Nageib;Amanatuzzakiah Abdul Halim;Anis Nurashikin Nordin;Fathilah Ali
    • Journal of Electrochemical Science and Technology
    • /
    • v.14 no.1
    • /
    • pp.1-14
    • /
    • 2023
  • The overuse of pesticides in agricultural sectors exposes people to food contamination. Pesticides are toxic to humans and can have both acute and chronic health effects. To protect food consumers from the adverse effects of pesticides, a rapid monitoring system of the residues is in dire need. Molecularly imprinted polymer (MIP) on a screen-printed electrode (SPE) is a leading and promising electrochemical sensing approach for the detection of several residues including pesticides. Despite the huge development in analytical instrumentation developed for contaminant detection in recent years such as HPLC and GC/MS, these conventional techniques are time-consuming and labor-intensive. Additionally, the imprinted SPE detection system offers a simple portable setup where all electrodes are integrated into a single strip, and a more affordable approach compared to MIP attached to traditional rod electrodes. Recently, numerous reviews have been published on the production and sensing applications of MIPs however, the research field lacks reviews on the use of MIPs on electrochemical sensors utilizing the SPE technology. This paper presents a distinguished overview of the MIP technique used on bare and modified SPEs for the detection of pesticides from four recent publications which are malathion, chlorpyrifos, paraoxon and cyhexatin. Different molecular imprint routes were used to prepare these biomimetic sensors including solution polymerization, thermal polymerization, and electropolymerization. The unique characteristics of each MIP-modified SPE are discussed and the comparison among the findings of the papers is critically reviewed.

Deep Learning based Dynamic Taint Detection Technique for Binary Code Vulnerability Detection (바이너리 코드 취약점 탐지를 위한 딥러닝 기반 동적 오염 탐지 기술)

  • Kwang-Man Ko
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.3
    • /
    • pp.161-166
    • /
    • 2023
  • In recent years, new and variant hacking of binary codes has increased, and the limitations of techniques for detecting malicious codes in source programs and defending against attacks are often exposed. Advanced software security vulnerability detection technology using machine learning and deep learning technology for binary code and defense and response capabilities against attacks are required. In this paper, we propose a malware clustering method that groups malware based on the characteristics of the taint information after entering dynamic taint information by tracing the execution path of binary code. Malware vulnerability detection was applied to a three-layered Few-shot learning model, and F1-scores were calculated for each layer's CPU and GPU. We obtained 97~98% performance in the learning process and 80~81% detection performance in the test process.

Multi-type object detection-based de-identification technique for personal information protection (개인정보보호를 위한 다중 유형 객체 탐지 기반 비식별화 기법)

  • Ye-Seul Kil;Hyo-Jin Lee;Jung-Hwa Ryu;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.11-20
    • /
    • 2022
  • As the Internet and web technology develop around mobile devices, image data contains various types of sensitive information such as people, text, and space. In addition to these characteristics, as the use of SNS increases, the amount of damage caused by exposure and abuse of personal information online is increasing. However, research on de-identification technology based on multi-type object detection for personal information protection is insufficient. Therefore, this paper proposes an artificial intelligence model that detects and de-identifies multiple types of objects using existing single-type object detection models in parallel. Through cutmix, an image in which person and text objects exist together are created and composed of training data, and detection and de-identification of objects with different characteristics of person and text was performed. The proposed model achieves a precision of 0.724 and mAP@.5 of 0.745 when two objects are present at the same time. In addition, after de-identification, mAP@.5 was 0.224 for all objects, showing a decrease of 0.4 or more.

A Hybrid Model for Android Malware Detection using Decision Tree and KNN

  • Sk Heena Kauser;V.Maria Anu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.186-192
    • /
    • 2023
  • Malwares are becoming a major problem nowadays all around the world in android operating systems. The malware is a piece of software developed for harming or exploiting certain other hardware as well as software. The term Malware is also known as malicious software which is utilized to define Trojans, viruses, as well as other kinds of spyware. There have been developed many kinds of techniques for protecting the android operating systems from malware during the last decade. However, the existing techniques have numerous drawbacks such as accuracy to detect the type of malware in real-time in a quick manner for protecting the android operating systems. In this article, the authors developed a hybrid model for android malware detection using a decision tree and KNN (k-nearest neighbours) technique. First, Dalvik opcode, as well as real opcode, was pulled out by using the reverse procedure of the android software. Secondly, eigenvectors of sampling were produced by utilizing the n-gram model. Our suggested hybrid model efficiently combines KNN along with the decision tree for effective detection of the android malware in real-time. The outcome of the proposed scheme illustrates that the proposed hybrid model is better in terms of the accurate detection of any kind of malware from the Android operating system in a fast and accurate manner. In this experiment, 815 sample size was selected for the normal samples and the 3268-sample size was selected for the malicious samples. Our proposed hybrid model provides pragmatic values of the parameters namely precision, ACC along with the Recall, and F1 such as 0.93, 0.98, 0.96, and 0.99 along with 0.94, 0.99, 0.93, and 0.99 respectively. In the future, there are vital possibilities to carry out more research in this field to develop new methods for Android malware detection.

A Study on Preprocessing Method in Deep Learning for ICS Cyber Attack Detection (ICS 사이버 공격 탐지를 위한 딥러닝 전처리 방법 연구)

  • Seonghwan Park;Minseok Kim;Eunseo Baek;Junghoon Park
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.36-47
    • /
    • 2023
  • Industrial Control System(ICS), which controls facilities at major industrial sites, is increasingly connected to other systems through networks. With this integration and the development of intelligent attacks that can lead to a single external intrusion as a whole system paralysis, the risk and impact of security on industrial control systems are increasing. As a result, research on how to protect and detect cyber attacks is actively underway, and deep learning models in the form of unsupervised learning have achieved a lot, and many abnormal detection technologies based on deep learning are being introduced. In this study, we emphasize the application of preprocessing methodologies to enhance the anomaly detection performance of deep learning models on time series data. The results demonstrate the effectiveness of a Wavelet Transform (WT)-based noise reduction methodology as a preprocessing technique for deep learning-based anomaly detection. Particularly, by incorporating sensor characteristics through clustering, the differential application of the Dual-Tree Complex Wavelet Transform proves to be the most effective approach in improving the detection performance of cyber attacks.

Highly Sensitive Biological Analysis Using Optical Microfluidic Sensor

  • Lee, Sang-Yeop;Chen, Ling-Xin;Choo, Jae-Bum;Lee, Eun-Kyu;Lee, Sang-Hoon
    • Journal of the Optical Society of Korea
    • /
    • v.10 no.3
    • /
    • pp.130-142
    • /
    • 2006
  • Lab-on-a-chip technology is attracting great interest because the miniaturization of reaction systems offers practical advantages over classical bench-top chemical systems. Rapid mixing of the fluids flowing through a microchannel is very important for various applications of microfluidic systems. In addition, highly sensitive on-chip detection techniques are essential for the in situ monitoring of chemical reactions because the detection volume in a channel is extremely small. Recently, a confocal surface enhanced Raman spectroscopic (SERS) technique, for the highly sensitive biological analysis in a microfluidic sensor, has been developed in our research group. Here, a highly precise quantitative measurement can be obtained if continuous flow and homogeneous mixing condition between analytes and silver nano-colloids are maintained. Recently, we also reported a new analytical method of DNA hybridization involving a PDMS microfluidic sensor using fluorescence energy transfer (FRET). This method overcomes many of the drawbacks of microarray chips, such as long hybridization times and inconvenient immobilization procedures. In this paper, our recent applications of the confocal Raman/fluorescence microscopic technology to a highly sensitive lab-on-a-chip detection will be reviewed.

An Investigation of Pine Wilt Damage by Using Ground Remote Sensing Technique (지상형 원격탐사기술을 이용한 소나무 재선충 피해조사)

  • Kim, Eung-Nam;Kim, Dae-Young
    • Journal of the Korean association of regional geographers
    • /
    • v.14 no.1
    • /
    • pp.84-92
    • /
    • 2008
  • The first pine wilt damage in Korea, which called AIDS of pine, was found out at Mt. Geumjeong of Pusan province in 1988. The damage area spread 53's city, Gun, Gu throughout the Gyeongsangnamdo in December 2005 since then find out. The best treatment for these damaged forests is well known as fumigation method after early detection. But early detection by an observer is very difficult because of the damaged forest areas are spread over huge range. Also the access of observer is difficult in condition of Korea topographical characteristic. In this study, an attempt was done to investigation about early detection of pine wilt damage using near infrared CCD camera.

  • PDF

Improved Weighted-Collaborative Spectrum Sensing Scheme Using Clustering in the Cognitive Radio System (클러스터링 기반의 CR시스템에서 가중치 협력 스펙트럼 센싱 기술의 개선연구)

  • Choi, Gyu-Jin;Shon, Sung-Hwan;Lee, Joo-Kwan;Kim, Jae-Moung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.101-109
    • /
    • 2008
  • In this paper, we introduce clustering scheme to calculate probability of detection which is practically required for conventional weighted-collaborative sensing technique. We also propose an improved weighted-collaborative spectrum sensing scheme using new weight generation algorithm to achieve better performance in Cognitive Radio systems. We calculate Pd in each cluster which is a CR users group with similar channel situation. New weight factor is generated using square sum of all cluster's Pds. Simulations under slow fading show that we can get better total detection probability and lower false alarm rate when PU (Primary User) suddenly terminates their transmission.

  • PDF