• 제목/요약/키워드: detection technique

Search Result 4,105, Processing Time 0.037 seconds

Automatic Detection Approach of ship using RADARSAT-l

  • Kwon Seung-Joon;Yoo KiYun;Kim Kyoung-Ok;Yang Chan-Su
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.290-293
    • /
    • 2005
  • This paper proposes and evaluates a new approach to detect ships as targets from Radarslit-l SAR (Synthetic Aperture Radar) imagery in the vicinity of Korean peninsula. To be more specific, a labeling technique and morphological filtering in conjunction with some other methods are employed to automatically detect the ships. From the test, the ships are revealed to be detected. For ground truth data, information from a radar system is used, which allows assessing accuracy of the approach. The results showed that the proposed approach has the high potential in automatically detecting the ships

  • PDF

BAYESIAN CLASSIFICATION AND FREQUENT PATTERN MINING FOR APPLYING INTRUSION DETECTION

  • Lee, Heon-Gyu;Noh, Ki-Yong;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.713-716
    • /
    • 2005
  • In this paper, in order to identify and recognize attack patterns, we propose a Bayesian classification using frequent patterns. In theory, Bayesian classifiers guarantee the minimum error rate compared to all other classifiers. However, in practice this is not always the case owing to inaccuracies in the unrealistic assumption{ class conditional independence) made for its use. Our method addresses the problem of attribute dependence by discovering frequent patterns. It generates frequent patterns using an efficient FP-growth approach. Since the volume of patterns produced can be large, we propose a pruning technique for selection only interesting patterns. Also, this method estimates the probability of a new case using different product approximations, where each product approximation assumes different independence of the attributes. Our experiments show that the proposed classifier achieves higher accuracy and is more efficient than other classifiers.

  • PDF

Diagnosis of Aseptic Necrosis of the Talus by Bone Scan; Case Report (골(骨)스캔에 의한 거골(距骨)의 비패혈성(非敗血性) 괴사진단(壞死診斷) 예(例))

  • Park, Hyoung-Gun;Lee, Myung-Chul;Koh, Chang-Soon;Yang, Yung-Sik;Park, Won-Chang
    • The Korean Journal of Nuclear Medicine
    • /
    • v.18 no.1
    • /
    • pp.63-65
    • /
    • 1984
  • Bone scan is a very useful technique for detection of aseptic necrosis and frequently used in the detection of aseptic necrosis of the femoral head. We have used this diagnostic tool in a patient to detect aseptic necrosis of the talus, a common complication resulting from foot injuries.

  • PDF

Study on The Corrosion Rate Monitoring of Steel in Concrete Using Electric resistance Sensor and Electrochemical Methods. (전기저항형 센서 및 전기화학적 방법을 이용한 철근콘크리트 구조물의 부식속도 측정 방법에 관한 연구)

  • 조용범;김용철;장상엽;고영태
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2001.11a
    • /
    • pp.1185-1192
    • /
    • 2001
  • This paper reviews available techniques for monitoring corrosion of steel in concrete. The need for early detection and diagnosis of corrosion related deterioration in reinforced structures is widely acknowledged. This is particularly important in reinforced concrete structures on account of the economic and social significance of the problem. The current generally used on-site procedure for corrosion monitoring of reinforced structures employs a method of half-cell surface potential measurements. While the technique has provided a useful means of delineating areas of high or low corrosion risk, there are difficulties in its use and interpretation when assessing rates of deterioration. Electrochemical techniques are by far the most suitable for corrosion monitoring purpose and meet most of the requirements. The aim of this paper is to describe the electric resistance sensor(ER sensor) and electrochemical techniques employed to monitor and estimate corrosion rates of reinforcement. Early detection and diagnosis of corrosion hazards allows preventive measures to be taken, hence the typically expensive repair of severely deteriorated structures can be avoided.

  • PDF

A real-time face tracking method using fuzzy controller (Fuzzy controller를 이용한 실시간 얼굴 추적하는 방법)

  • Sa, In-Kyu;Ahn, Ho-Seok;Lee, Hyung-Kyu;Choi, Jin-Young
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.333-334
    • /
    • 2008
  • A real-time face tracking is a broad topic, covering a large spectrum of technologies and applications. Briefly face tracking is a kind of tracing technique which follows human face in any directions. It needs some algorithms such as human face detection and motion controller to track face. Moreover, both processing time and calculation time are the most important factors that influence to drive tracking system. In this paper, two algorithms are used to find human face: earn-shift algorithm and face detection algorithm using OpenCV. Fuzzy controller is utilized to move pan-tilt camera system which can move four directions along to x-y axis.

  • PDF

Respiration Detection Method Using the PPG Signal Pattern (광용적맥파의 신호 패턴을 이용한 호흡 검출 기법)

  • Park, Moon Su;Kim, Jeong Goo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.11
    • /
    • pp.1862-1870
    • /
    • 2016
  • A respiration is one of the most useful techniques for vital checking and an abnormal respiration is often the earliest sign of critical illness. Detection of respiration is based on the photo-plethysmography (PPG) with photodiode technique. Because PPG sensor using photodiode can be easily miniaturized, it is suitable for wearable devices. A system to measure respiration rate based on PPG signal is implemented and for a reliable measurement an improved algorithm in accuracy using PPG signal pattern is proposed in this paper. As results regarding to three types of respirations (regular interval, free interval, and weak respiration) the proposed algorithm showed error rate of 0.047, 0.067, and 0.122 respectively.

Power control in Ad Hoc network using ZigBee/IEEE802.15.4 Standard (ZigBee/IEEE802.15.4 표준을 사용하는 Ad Hoc 네트워크 상의 전력 통제)

  • Kirubakaran K.;Lee Jae-Kwang
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper an intrusion detection system technique of wireless Ad Hoc network is explained and the advantage of making them work in IEEE 802.15.4/ZigBee wireless standard is also discussed. The methodology that is mentioned here is intrusion detection architecture based on a local intrusion database [1]. An ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Due to increased connectivity (especially on the Internet), and the vast spectrum of financial possibilities that are opening up, more and more systems are subject to attack by intruders. An ideal IDS should able to detect an anomaly caused by the intruders quickly so that the misbehaving node/nodes can be identified and appropriate actions (e.g. punish or avoid misbehaving nodes) can be taken so that further damage to the network is minimized

  • PDF

A Study on Cumean - a self Starting Cusum (누적합(累積合)에서 출발(出發)한 누적평균(累積平均)에 관한 고찰(考察))

  • Jo, Jae-Ip
    • Journal of Korean Society for Quality Management
    • /
    • v.9 no.2
    • /
    • pp.26-30
    • /
    • 1981
  • A typical industrial data - monitoring scheme often requires trend detection Trend detection can be accomplished in many ways. Common statistical methods are the sign test, the run test, and the trend test. Graphical methods include various smoothing schemes and the cusum. The cusum has established itself as an efficient method of detecting changes in the mean level of a process being monitored. The cusum requires a "target value" with which the raw data are compared. At production start - up it is often difficult to designate the target value. This paper offers a means of initiating the cusum technique without a target value.

  • PDF

Esophageal pH and Combined Impedance-pH Monitoring in Children

  • Shin, Myung Seok
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.17 no.1
    • /
    • pp.13-22
    • /
    • 2014
  • Esophageal pH monitoring is considered the gold standard for the diagnosis of gastroesophageal reflux disease because of the normal ranges across the pediatric age range. However, this method can only detect acid reflux. Multichannel intraluminal impedance-pH (MII-pH) monitoring has recently been used for the detection of bolus reflux in infants and children. This method allows for the detection of liquid, gas or mixed reflux in addition to acid, weakly acidic or weakly alkaline reflux. MII-pH monitoring can record the direction of flow and the height of reflux, which are useful parameters to identify an association between symptoms and reflux. However, the technique is limited by its high cost and the lack of normative data of MII-pH in the pediatric population. Despite certain limitations, MII-pH monitoring will become more common and gradually replace pH monitoring in the future, because pH monitoring is part of MII-pH.

Structural Damage Detection for Metal Panel Using Embedded Sensitivity Functions (내재민감도 함수를 이용한 단열타일의 손상 탐지 기법)

  • Yang, Chul-Ho;Adams, Douglas E.
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.15 no.6 s.99
    • /
    • pp.697-705
    • /
    • 2005
  • Vibration-based damage identification method using embedded sensitivity functions is discussed. The theory of embedded sensitivity functions is reviewed and applied to identify damage in a three degree-of-freedom system and a metallic panel. Embedded sensitivity functions are algebraic combinations of measured frequency response functions that reflect changes in the response of mechanical systems when mass, damping or stiffness parameters are changed. By comparing the embedded sensitivity functions with finite difference functions using undamaged and damaged frequency response functions, damage is shown to be properly detected, located and quantified in theory and practice assuming that structures of interest are only damaged in one location. Simulated and experimental results indicate that the technique is most effective when changes to frequency response functions are small to avoid distorsions in the estimated perturbations due to variations in the sensitivity functions.