• 제목/요약/키워드: detection technique

Search Result 4,102, Processing Time 0.03 seconds

Fault Detection Algorithm of Charge-discharge System of Hybrid Electric Vehicle Using SVDD (SVDD기법을 이용한 하이브리드 전기자동차 충-방전시스템의 고장검출 알고리듬)

  • Na, Sang-Gun;Yang, In-Beom;Heo, Hoon
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.21 no.11
    • /
    • pp.997-1004
    • /
    • 2011
  • A fault detection algorithm of a charge and discharge system to ensure the safe use of hybrid electric vehicle is proposed in this paper. This algorithm can be used as a complementary way to existing fault detection technique for a charge and discharge system. The proposed algorithm uses a SVDD technique, which additionally utilizes two methods for learning a large amount of data; one is to incrementally learn a large amount of data, the other one is to remove the data that does not affect the next learning using a new data reduction technique. Removal of data is selected by using lines connecting support vectors. In the proposed method, the data processing speed is drastically improved and the storage space used is remarkably reduced than the conventional methods using the SVDD technique only. A battery data and speed data of a commercial hybrid electrical vehicle are utilized in this study. A fault boundary is produced via SVDD techniques using the input and output in normal operation of the system without using mathematical modeling. A fault detection simulation is performed using both an artificial fault data and the obtained fault boundary via SVDD techniques. In the fault detection simulation, fault detection time via proposed algorithm is compared with that of the peak-peak method. Also the proposed algorithm is revealed to detect fault in the region where conventional peak-peak method is never able to do.

Assessment of Wavelet Technique Applied to Incident Detection - Case of Seoul Urban Freeway (Naebusunhwallo) - (돌발상황 검지를 위한 Wavelet 기법의 적용성 평가 - 서울특별시 도시고속도로를 중심으로 -)

  • Kim, Dong Sun;Baek, Joo Hyun;Song, Ki Han;Rhee, Sung Mo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4D
    • /
    • pp.581-586
    • /
    • 2006
  • Incidents, which is unexpected unusual events such as traffic accidents, have increased on the most roads in Korea. The obstruction of a fluent traffic flow occurred by incidents causes the traffic congestion and decreases the capacity. The Wavelet technique was applied to detect the road section and the happening time of incidents on urban freeways in this study, and this technique has been widely used in many engineering fields such as an electrical engineering, etc. The availability and validity of the Wavelet technique to the detection of incidents was examined by the occupancy rate, the important element of traffic flows, which is extracted from the data of detectors installed on Seoul Urban freeways. Then, this result is compared to the California Algorithm and the Low-Pass Filtering Algorithm among basic present detection algorithms, which are based on the occupancy rate. As a result, the false alarm rate of this method was similar as that of the California algorithm and the Low-Pass Filtering algorithm, but the detection rate is higher.

A Study on Candidate Lane Detection using Hybrid Detection Technique (하이브리드 검출기법을 이용한 후보 차선검출에 관한 연구)

  • Park, Sang-Joo;Oh, Joong-Duk;Park, Roy C.
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.18-25
    • /
    • 2016
  • As more people have cars, the threat of traffic accidents is posed on men and women of all ages. The main culprit of traffic accidents is driving while intoxicated or drowsy. The method to recognize and prevent the cause of traffic accidents is to use lane detection. In this study, a total of 4,000 frames (day image: 2,900 frames, night image: 1,100 frames) were used to test lane detection. According to the test, in the case of day image, when the threshold of Sobel edge detection technique was detected with second-order differential equation, there was the highest candidate lane detection rate which was 86.1%. In the threshold of Canny edge detection technique, the highest detection rate of 88.0% was found at Low=50, and High=300. In the case of night image, the threshold of Sobel edge detection technique, when horizontal calculation and vertical calculation had second-order differential equation, and when horizontal-vertical calculation had 1.5th-order differential equation, there was the highest detection rate which was 83.1%. In the threshold of Canny edge detection technique, the highest detection rate of 89.9% was found at Low=50, and High=300.

A Malware Detection Method using Analysis of Malicious Script Patterns (악성 스크립트 패턴 분석을 통한 악성코드 탐지 기법)

  • Lee, Yong-Joon;Lee, Chang-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.613-621
    • /
    • 2019
  • Recently, with the development of the Internet of Things (IoT) and cloud computing technologies, security threats have increased as malicious codes infect IoT devices, and new malware spreads ransomware to cloud servers. In this study, we propose a threat-detection technique that checks obfuscated script patterns to compensate for the shortcomings of conventional signature-based and behavior-based detection methods. Proposed is a malicious code-detection technique that is based on malicious script-pattern analysis that can detect zero-day attacks while maintaining the existing detection rate by registering and checking derived distribution patterns after analyzing the types of malicious scripts distributed through websites. To verify the performance of the proposed technique, a prototype system was developed to collect a total of 390 malicious websites and experiment with 10 major malicious script-distribution patterns derived from analysis. The technique showed an average detection rate of about 86% of all items, while maintaining the existing detection speed based on the detection rule and also detecting zero-day attacks.

An Efficient Error Detection Technique for 3D Bit-Partitioned SRAM Devices

  • Yoon, Heung Sun;Park, Jong Kang;Kim, Jong Tae
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.5
    • /
    • pp.445-454
    • /
    • 2015
  • As the feature sizes and the operating charges continue to be scaled down, multi-bit soft errors are becoming more critical in SRAM designs of a few nanometers. In this paper, we propose an efficient error detection technique to reduce the size of parity bits by applying a 2D bit-interleaving technique to 3D bit-partitioned SRAM devices. Our proposed bit-interleaving technique uses only 1/K (where K is the number of dies) parity bits, compared with conventional bit-interleaving structures. Our simulation results show that 1/K parity bits are needed with only a 0.024-0.036% detection error increased over that of the existing bit-interleaving method. It is also possible for our technique to improve the burst error coverage, by adding more parity bits.

IMPROVEMENT OF CROSS-CORRELATION TECHNIQUE FOR LEAK DETECTION OF A BURIED PIPE IN A TONAL NOISY ENVIRONMENT

  • Yoon, Doo-Byung;Park, Jin-Ho;Shin, Sung-Hwan
    • Nuclear Engineering and Technology
    • /
    • v.44 no.8
    • /
    • pp.977-984
    • /
    • 2012
  • The cross-correlation technique has been widely used for leakage detection of buried pipes, and this technique can be successfully applied when the leakage signal has a high signal-to-noise ratio. In the case of a power plant, the measured leakage signals obtained from the sensors may contain background noise and mechanical noise generated by adjacent machinery. In such a case, the conventional method using the cross-correlation function may fail to estimate the leakage point. In order to enhance the leakage estimation capability of a buried pipe in a noisy environment, an improved cross-correlation technique is proposed. It uses a noise rejection technique in the frequency domain to effectively eliminate the tonal noise due to rotating machinery. Experiments were carried out to verify the validity of the proposed method. The results show that even in a tonal noisy environment, the proposed method can provide more reliable means for estimating the time delay of the leakage signals.

System Condensation Technique-Based Inverse Perturbation Method of Damage Detection (시스템 축소기법이 적용된 역섭동법을 이용한 손상탐지)

  • Choi, Young-Jae;Lee, U-Sik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.7
    • /
    • pp.98-104
    • /
    • 2002
  • System condensation technique improves the efficiency of the inverse perturbation method of damage detection developed in the previous work. The technique is applied to transform the unmeasured DOFs to the measured DOFs. This approach makes it possible to eliminate the unmeasured DOFs, which accelerates the computational efficiency. The numerical instability problems due to the system condensation technique are also resolved by updating the transformation matrix for each step, and also by adopting the accelerated improved reduced system(AIRS) condensation method.

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

A method based on Multi-Convolution layers Joint and Generative Adversarial Networks for Vehicle Detection

  • Han, Guang;Su, Jinpeng;Zhang, Chengwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1795-1811
    • /
    • 2019
  • In order to achieve rapid and accurate detection of vehicle objects in complex traffic conditions, we propose a novel vehicle detection method. Firstly, more contextual and small-object vehicle information can be obtained by our Joint Feature Network (JFN). Secondly, our Evolved Region Proposal Network (EPRN) generates initial anchor boxes by adding an improved version of the region proposal network in this network, and at the same time filters out a large number of false vehicle boxes by soft-Non Maximum Suppression (NMS). Then, our Mask Network (MaskN) generates an example that includes the vehicle occlusion, the generator and discriminator can learn from each other in order to further improve the vehicle object detection capability. Finally, these candidate vehicle detection boxes are optimized to obtain the final vehicle detection boxes by the Fine-Tuning Network(FTN). Through the evaluation experiment on the DETRAC benchmark dataset, we find that in terms of mAP, our method exceeds Faster-RCNN by 11.15%, YOLO by 11.88%, and EB by 1.64%. Besides, our algorithm also has achieved top2 comaring with MS-CNN, YOLO-v3, RefineNet, RetinaNet, Faster-rcnn, DSSD and YOLO-v2 of vehicle category in KITTI dataset.

Automated Detection Technique for Suspected Copyright Infringement Sites

  • Jeong, Hae Seon;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4889-4908
    • /
    • 2020
  • With the advances in Information Technology (IT), users can download or stream copyrighted works, such as videos, music, and webtoons, at their convenience. Thus, the frequency of use of copyrighted works has increased. Consequently, the number of unauthorized copies and sharing of copyrighted works has also increased. Monitoring is being conducted on sites suspected of conducting copyright infringement activities to reduce copyright holders' damage due to unauthorized sharing of copyrighted works. However, suspected copyright infringement sites respond by changing their domains or blocking access requests. Although research has been conducted for improving the effectiveness of suspected copyright infringement site detection by defining suspected copyright infringement sites' response techniques as a lifecycle step, there is a paucity of studies on automation techniques for lifecycle detection. This has reduced the accuracy of lifecycle step detection on suspected copyright infringement sites, which change domains and lifecycle steps in a short period of time. Thus, in this paper, an automated detection technique for suspected copyright infringement sites is proposed for efficient detection and response to suspected copyright infringement sites. Using our proposed technique, the response to each lifecycle step can be effectively conducted by automatically detecting the lifecycle step.