• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.04 seconds

Value of Image Subtraction for the Identification of Hepatocellular Carcinoma Capsule on Gadoxetic Acid-Enhanced MRI (가도세틱산-조영증강 MRI에서 간세포암 피막 발견에 대한 영상차감기법의 진단적 가치)

  • Kim, Hyunjung;Ahn, Jhii-Hyun;Moon, Jin Sil;Cha, Seung-Whan
    • Journal of the Korean Society of Radiology
    • /
    • v.79 no.6
    • /
    • pp.340-347
    • /
    • 2018
  • Purpose: To evaluate value of image subtraction for identifying hepatocellular carcinoma (HCC) capsule on gadoxetic acid-enhanced MR images. Materials and Methods: This study involved 108 patients at risk of HCC preoperatively examined using gadoxetic acid-enhanced MRI with hepatic resection between May 2015 and February 2017. We evaluated qualities of subtraction images and presence of capsular appearance on portal venous or transitional phases conventional and subtraction images. We assessed effect of capsular appearance on subtraction images on HCC. Results: After excluding 1 patient who had treated by transarterial chemoembolization prior to surgery and 33 patients with unsatisfactory subtraction image qualities, 82 focal hepatic lesions (73 HCC, 5 non-HCC malignancies, and 4 benign) from 74 patients were analyzed. Regarding detection of capsules, sensitivity, accuracy, and area under the receiver operating characteristic curve (AUC) on subtraction images were significantly higher than those on conventional images (95.4%, 89.0%, and 0.80, respectively; p < 0.001), though specificities were same (64.7%). For diagnosis of HCC, sensitivity, accuracy, and AUC on subtraction images were significantly higher than on conventional images (82.2%, 79.3%, and 0.69, respectively; p = 0.011), though specificities were identical (55.6%). Conclusion: Portal venous or transitional phase gadoxetic acid-enhanced MRI subtraction images could improve detection of HCC capsule.

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.

Metamorphic Malware Detection using Subgraph Matching (행위 그래프 기반의 변종 악성코드 탐지)

  • Kwon, Jong-Hoon;Lee, Je-Hyun;Jeong, Hyun-Cheol;Lee, Hee-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.37-47
    • /
    • 2011
  • In the recent years, malicious codes called malware are having shown significant increase due to the code obfuscation to evade detection mechanisms. When the code obfuscation technique is applied to malwares, they can change their instruction sequence and also even their signature. These malwares which have same functionality and different appearance are able to evade signature-based AV products. Thus, AV venders paid large amount of cost to analyze and classify malware for generating the new signature. In this paper, we propose a novel approach for detecting metamorphic malwares. The proposed mechanism first converts malware's API call sequences to call graph through dynamic analysis. After that, the callgraph is converted to semantic signature using 128 abstract nodes. Finally, we extract all subgraphs and analyze how similar two malware's behaviors are through subgraph similarity. To validate proposed mechanism, we use 273 real-world malwares include obfuscated malware and analyze 10,100 comparison results. In the evaluation, all metamorphic malwares are classified correctly, and similar module behaviors among different malwares are also discovered.

Fruit's Defective Area Detection Using Yolo V4 Deep Learning Intelligent Technology (Yolo V4 딥러닝 지능기술을 이용한 과일 불량 부위 검출)

  • Choi, Han Suk
    • Smart Media Journal
    • /
    • v.11 no.4
    • /
    • pp.46-55
    • /
    • 2022
  • It is very important to first detect and remove defective fruits with scratches or bruised areas in the automatic fruit quality screening system. This paper proposes a method of detecting defective areas in fruits using the latest artificial intelligence technology, the Yolo V4 deep learning model in order to overcome the limitations of the method of detecting fruit's defective areas using the existing image processing techniques. In this study, a total of 2,400 defective fruits, including 1,000 defective apples and 1,400 defective fruits with scratch or decayed areas, were learned using the Yolo V4 deep learning model and experiments were conducted to detect defective areas. As a result of the performance test, the precision of apples is 0.80, recall is 0.76, IoU is 69.92% and mAP is 65.27%. The precision of pears is 0.86, recall is 0.81, IoU is 70.54% and mAP is 68.75%. The method proposed in this study can dramatically improve the performance of the existing automatic fruit quality screening system by accurately selecting fruits with defective areas in real time rather than using the existing image processing techniques.

An Algorithm of Welding Bead Detection and Evaluation Using and Multiple Filters Geodesic Active Contour (다중필터와 축지적 활성 윤곽선 알고리즘을 이용한 용접 비드 검출 및 판단 알고리즘)

  • Milyahilu, John;Kim, Young-Bong;Lee, Jae Eun;Kim, Jong-Nam
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.3
    • /
    • pp.141-148
    • /
    • 2021
  • In this paper, we propose an algorithm of welding bead detection and evaluation using geodesic active contour algorithm and high pass filter with image processing technique. The algorithm uses histogram equalization and high pass filter as gaussian filter to improve contrast. The image processing techniques smoothens the welding beads reduce the noise on an image. Then, the algorithm detects the welding bead area by applying the geodesic active contour algorithm and morphological ooperation. It also applies the balloon force that either inflates in, or deflates out the evolving contour for a better segmentation. After that, we propose a method for determining the quality of welding bead using effective length and width of the detected bead. In the experiments, our algorithm achieved the highest recall, precision, F-measure and IOU as 0.9894, 0.9668, 0.9780, and 0.8957 respectively. We compared the proposed algorithm with the conventional algorithms to evaluate the performance of the proposed algorithm. The proposed algorithm achieved better performance compared to the conventional ones with a maximum computational time of 0.6 seconds for segmenting and evaluating one welding bead.

A Study for Generation of Artificial Lunar Topography Image Dataset Using a Deep Learning Based Style Transfer Technique (딥러닝 기반 스타일 변환 기법을 활용한 인공 달 지형 영상 데이터 생성 방안에 관한 연구)

  • Na, Jong-Ho;Lee, Su-Deuk;Shin, Hyu-Soung
    • Tunnel and Underground Space
    • /
    • v.32 no.2
    • /
    • pp.131-143
    • /
    • 2022
  • The lunar exploration autonomous vehicle operates based on the lunar topography information obtained from real-time image characterization. For highly accurate topography characterization, a large number of training images with various background conditions are required. Since the real lunar topography images are difficult to obtain, it should be helpful to be able to generate mimic lunar image data artificially on the basis of the planetary analogs site images and real lunar images available. In this study, we aim to artificially create lunar topography images by using the location information-based style transfer algorithm known as Wavelet Correct Transform (WCT2). We conducted comparative experiments using lunar analog site images and real lunar topography images taken during China's and America's lunar-exploring projects (i.e., Chang'e and Apollo) to assess the efficacy of our suggested approach. The results show that the proposed techniques can create realistic images, which preserve the topography information of the analog site image while still showing the same condition as an image taken on lunar surface. The proposed algorithm also outperforms a conventional algorithm, Deep Photo Style Transfer (DPST) in terms of temporal and visual aspects. For future work, we intend to use the generated styled image data in combination with real image data for training lunar topography objects to be applied for topographic detection and segmentation. It is expected that this approach can significantly improve the performance of detection and segmentation models on real lunar topography images.

Evaluation of Reservoir Monitoring-based Hydrological Drought Index Using Sentinel-1 SAR Waterbody Detection Technique (Sentinel-1 SAR 영상의 수체 탐지 기법을 활용한 저수지 관측 기반 수문학적 가뭄 지수 평가)

  • Kim, Wanyub;Jeong, Jaehwan;Choi, Minha
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.2
    • /
    • pp.153-166
    • /
    • 2022
  • Waterstorage is one of the factorsthat most directly represent the amount of available water resources. Since the effects of drought can be more intuitively expressed, it is also used in variousstudies for drought evaluation. In a recent study, hydrological drought was evaluated through information on observing reservoirs with optical images. The short observation cycle and diversity of optical satellites provide a lot of data. However, there are some limitations because it is vulnerable to the influence of weather or the atmospheric environment. Therefore, thisstudy attempted to conduct a study on estimating the drought index using Synthetic Aperture Radar (SAR) image with relatively little influence from the observation environment. We produced the waterbody of Baekgok and Chopyeong reservoirs using SAR images of Sentinel-1 satellites and calculated the Reservoir Area Drought Index (RADI), a hydrological drought index. In order to validate the applicability of RADI to drought monitoring, it was compared with Reservoir Storage Drought Index (RSDI) based on measured storage. The two indices showed a very high correlation with the correlation coefficient, r=0.87, Area Under curve, AUC=0.97. These results show the possibility of regional-scale hydrological drought monitoring of SAR-based RADI. As the number of available SAR images increases in the future, it is expected that the utilization of drought monitoring will also increase.

Research of Water-related Disaster Monitoring Using Satellite Bigdata Based on Google Earth Engine Cloud Computing Platform (구글어스엔진 클라우드 컴퓨팅 플랫폼 기반 위성 빅데이터를 활용한 수재해 모니터링 연구)

  • Park, Jongsoo;Kang, Ki-mook
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_3
    • /
    • pp.1761-1775
    • /
    • 2022
  • Due to unpredictable climate change, the frequency of occurrence of water-related disasters and the scale of damage are also continuously increasing. In terms of disaster management, it is essential to identify the damaged area in a wide area and monitor for mid-term and long-term forecasting. In the field of water disasters, research on remote sensing technology using Synthetic Aperture Radar (SAR) satellite images for wide-area monitoring is being actively conducted. Time-series analysis for monitoring requires a complex preprocessing process that collects a large amount of images and considers the noisy radar characteristics, and for this, a considerable amount of time is required. With the recent development of cloud computing technology, many platforms capable of performing spatiotemporal analysis using satellite big data have been proposed. Google Earth Engine (GEE)is a representative platform that provides about 600 satellite data for free and enables semi real time space time analysis based on the analysis preparation data of satellite images. Therefore, in this study, immediate water disaster damage detection and mid to long term time series observation studies were conducted using GEE. Through the Otsu technique, which is mainly used for change detection, changes in river width and flood area due to river flooding were confirmed, centered on the torrential rains that occurred in 2020. In addition, in terms of disaster management, the change trend of the time series waterbody from 2018 to 2022 was confirmed. The short processing time through javascript based coding, and the strength of spatiotemporal analysis and result expression, are expected to enable use in the field of water disasters. In addition, it is expected that the field of application will be expanded through connection with various satellite bigdata in the future.

Fusion Strategy on Heterogeneous Information Sources for Improving the Accuracy of Real-Time Traffic Information (실시간 교통정보 정확도 향상을 위한 이질적 교통정보 융합 연구)

  • Kim, Jong-Jin;Chung, Younshik
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.1
    • /
    • pp.67-74
    • /
    • 2022
  • In recent, the number of real-time traffic information sources and providers has increased as increasing smartphone users and intelligent transportation system facilities installed at roadways including vehicle detection system (VDS), dedicated short-ranged communications (DSRC), and global positioning system (GPS) probe vehicle. The accuracy of such traffic information would vary with these heterogeneous information sources or spatiotemporal traffic conditions. Therefore, the purpose of this study is to propose an empirical strategy of heterogeneous information fusion to improve the accuracy of real-time traffic information. To carry out this purpose, travel speed data collection based on the floating car technique was conducted on 227 freeway links (or 892.2 km long) and 2,074 national highway links (or 937.0 km long). The average travel speed for 5 probe vehicles on a specific time period and a link was used as a ground truth measure to evaluate the accuracy of real-time heterogeneous traffic information for that time period and that link. From the statistical tests, it was found that the proposed fusion strategy improves the accuracy of real-time traffic information.

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.