• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.035 seconds

UT Inspection Technique of Cast Stainless Steel Piping Welds Using Low Frequency TRL UT Probe (저주파수 TRL 탐촉자를 이용한 Cast Stainless Steel 배관 용접부 초음파탐상기법)

  • Shin, Keon-Cheol;Chang, Hee-Jun;Jeong, Young-Cheol;Noh, Ik-Jun;Lee, Dong-Jin
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.6 no.1
    • /
    • pp.29-36
    • /
    • 2010
  • Ultrasonic inspection of heavy walled cast austenitic stainless steel(CASS)welds is very difficult due to complex and coarse grained structure of CASS material. The large size of anisotropic grain strongly affects the propagation of ultrasound by severe attenuation, change in velocity, and scattering of ultrasonic energy. therefore, the signal patterns originated from flaws can be difficult to distinguish from scattered signals. To improve detection and sizing capability of ID connected defect for heavy walled CASS piping welds, the low frequency segmented TRL Pulse Echo and Phased Array probe has been developed. The experimental studies have been performed using CASS pipe mock-up block containing artificial reflectors(ID connected EDM notch). The automatic pulse echo and phase array technique is applied the detection and the length sizing of the ID connected artificial reflectors and the results for detection and sizing has been compared respectively. The goal of this study is to assess a newly developed ultrasonic probe to improve the detection ability and the sizing of the crack in coarse-grained CASS components.

  • PDF

Correlation of the Wall Skin-Friction and Streamwise Velocity Fluctuations in a Turbulent Boundary Layer(II) (난류경계층에서 벽마찰력과 유동방향 속도성분과의 상관관계(II))

  • Yang, Jun-Mo;Yu, Jeong-Yeol;Choe, Hae-Cheon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.21 no.3
    • /
    • pp.427-435
    • /
    • 1997
  • Conditional sampling techniques are utilized to investigate the relation between the wall skin-friction and stream wise velocity fluctuations in a turbulent boundary layer. Conditionally averaged results using a peak detection and the VITA (variable-interval time-averaging) technique show that a high skin friction is associated with high frequency components of the wall skin-friction fluctuations. The conditionally averaged wall skin-friction fluctuations obtained by using the VITA technique have a positively-skewed characteristics compared with the conditionally averaged stream wise velocity fluctuations. It is confirmed that there exists a phase shift between the wall skin-friction and stream wise velocity fluctuations, which was also found from the long-time averaged space-time correlations. The amount of phase shift between the wall skin-friction and stream wise velocity fluctuations is the same as that from the long-time averaged space-time correlations and does not change despite the variation of the detection threshold.

A Study on Fault Diagnosis of Boiler Tube Leakage based on Neural Network using Data Mining Technique in the Thermal Power Plant (데이터마이닝 기법을 이용한 신경망 기반의 화력발전소 보일러 튜브 누설 고장 진단에 관한 연구)

  • Kim, Kyu-Han;Lee, Heung-Seok;Jeong, Hee-Myung;Kim, Hyung-Su;Park, June-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.10
    • /
    • pp.1445-1453
    • /
    • 2017
  • In this paper, we propose a fault detection model based on multi-layer neural network using data mining technique for faults due to boiler tube leakage in a thermal power plant. Major measurement data related to faults are analyzed using statistical methods. Based on the analysis results, the number of input data of the proposed fault detection model is simplified. Then, each input data is clustering with normal data and fault data by applying K-Means algorithm, which is one of the data mining techniques. fault data were trained by the neural network and tested fault detection for boiler tube leakage fault.

Thermal Imaging for Detection of SM45C Subsurface Defects Using Active Infrared Thermography Techniques (능동 적외선 열화상 기법에 의한 SM45C 이면결함 검출 열영상에 관한 연구)

  • Chung, Yoonjae;Ranjit, Shrestha;Kim, Wontae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.35 no.3
    • /
    • pp.193-199
    • /
    • 2015
  • Active thermography techniques have the capability of inspecting a broad range simultaneously. By evaluating the phase difference between the defected area and the healthy area, the technique indicates the qualitative location and size of the defect. Previously, the development of the defect detection method used a variety of materials and the test specimen was done. In this study, the proposed technique of lock-in is verified with artificial specimens that have different size and depth of subsurface defects. Finally, the defect detection capability was evaluated using comparisons of the phase image and the amplitude image according to the size and depth of defects.

Traffic Extraction and Verification for Attack Detection Experimentation (공격탐지 실험을 위한 네트워크 트래픽 추출 및 검증)

  • Park, In-Sung;Lee, Eun-Young;Oh, Hyung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.49-57
    • /
    • 2006
  • Firewall to block a network access of unauthorized IP system and IDS (Intrusion Detection System) to detect malicious code pattern to be known consisted the main current of the information security system at the past. But, with rapid growth the diffusion speed and damage of malicious code like the worm, study of the unknown attack traffic is processed actively. One of such method is detection technique using traffic statistics information on the network viewpoint not to be an individual system. But, it is very difficult but to reserve traffic raw data or statistics information. Therefore, we present extraction technique of a network traffic Raw data and a statistics information like the time series. Also, We confirm the validity of a mixing traffic and show the evidence which is suitable to the experiment.

  • PDF

A Smart Framework for Mobile Botnet Detection Using Static Analysis

  • Anwar, Shahid;Zolkipli, Mohamad Fadli;Mezhuyev, Vitaliy;Inayat, Zakira
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2591-2611
    • /
    • 2020
  • Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.

Design and Implementation of IDS and Management Modules based on Network (네트워크 기반의 침입 탐지 시스템 관리 모듈 설계 및 구현)

  • 양동수;윤덕현;황현숙;정동호;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.680-683
    • /
    • 2001
  • As the rapid information communication technique, internet users have been continuously increasing every year, but on the other hand many damages have occurred on the internet because of dysfunction for computer system intrusion. To reduce damages, network and system security mechanism is variously developed by researcher, IDS(Intrusion Detection System) is commercialized to security technique. In this paper we describe for intrusion detection based on network, we design and implement IDS to detect illegal intrusion using misuse detection model. Implemented IDS can detect various intrusion types. When IDS detected illegal intrusion, we implemented for administrator to be possible management and control through mechanisms of alert message transmission, mail transmission, mail at the remote.

  • PDF

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

A Study on the Fault Detection Technique of the Grid-Connected Photovoltaic System using Wavelet Transformation (웨이블렛 변환을 이용한 태양광 발전시스템의 고장진단에 관한 연구)

  • Lee, Jeong-Eun;Kim, Il-Song
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.79-87
    • /
    • 2011
  • The fault detection technique of the grid-connected photovoltaic system using wavelet transform has been suggested in this paper. The additional hardware and sensors are required to detect the inverter failure in the conventional method, and it has the disadvantage of high cost and re-design problem if the inverter specification has been changed. The suggested method used the inverter voltage and current waveform to detect the failure and the location by the wavelet coefficients variations. The prompt and accurate diagnostic function is possible using the normalized standard deviation method. The merit of the proposed method is the simple calculation and precise diagnostic capabilities of the fault detection. The computer simulation is performed and the experimental result verifies the validity of the proposed method.

Skin Segmentation Using YUV and RGB Color Spaces

  • Al-Tairi, Zaher Hamid;Rahmat, Rahmita Wirza;Saripan, M. Iqbal;Sulaiman, Puteri Suhaiza
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.283-299
    • /
    • 2014
  • Skin detection is used in many applications, such as face recognition, hand tracking, and human-computer interaction. There are many skin color detection algorithms that are used to extract human skin color regions that are based on the thresholding technique since it is simple and fast for computation. The efficiency of each color space depends on its robustness to the change in lighting and the ability to distinguish skin color pixels in images that have a complex background. For more accurate skin detection, we are proposing a new threshold based on RGB and YUV color spaces. The proposed approach starts by converting the RGB color space to the YUV color model. Then it separates the Y channel, which represents the intensity of the color model from the U and V channels to eliminate the effects of luminance. After that the threshold values are selected based on the testing of the boundary of skin colors with the help of the color histogram. Finally, the threshold was applied to the input image to extract skin parts. The detected skin regions were quantitatively compared to the actual skin parts in the input images to measure the accuracy and to compare the results of our threshold to the results of other's thresholds to prove the efficiency of our approach. The results of the experiment show that the proposed threshold is more robust in terms of dealing with the complex background and light conditions than others.