• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.034 seconds

Early caries detection using optical coherence tomography: a review of the literature (광간섭단층촬영술을 이용한 치아우식증의 발견)

  • Park, Young-Seok;Cho, Byeong-Hoon;Lee, Seung-Pyo;Shon, Won-Jun
    • Restorative Dentistry and Endodontics
    • /
    • v.36 no.5
    • /
    • pp.367-376
    • /
    • 2011
  • Early detection of carious lesions increases the possibility of treatment without the need for surgical intervention. Optical coherence tomography (OCT) is an emerging three-dimensional imaging technique that has been successfully used in other medical fields, such as ophthalmology for optical biopsy, and is a prospective candidate for early caries detection. The technique is based on low coherence interferometry and is advantageous in that it is non-invasive, does not use ionizing radiation, and can render threedimensional images. A brief history of the development of this technique and its principles are discussed in this paper. There have been numerous studies on caries detection, which were mostly in vitro or ex vivo experiments. Through these studies, the feasibility of OCT for caries detection was confirmed. However, further research should be performed, including in vivo studies of OCT applications, in order to prove the clinical usefulness of this technique. In addition, some technological problems must be resolved in the near future to allow for the use of OCT in everyday practice.

Damage detection using finite element model updating with an improved optimization algorithm

  • Xu, Yalan;Qian, Yu;Song, Gangbing;Guo, Kongming
    • Steel and Composite Structures
    • /
    • v.19 no.1
    • /
    • pp.191-208
    • /
    • 2015
  • The sensitivity-based finite element model updating method has received increasing attention in damage detection of structures based on measured modal parameters. Finding an optimization technique with high efficiency and fast convergence is one of the key issues for model updating-based damage detection. A new simple and computationally efficient optimization algorithm is proposed and applied to damage detection by using finite element model updating. The proposed method combines the Gauss-Newton method with region truncation of each iterative step, in which not only the constraints are introduced instead of penalty functions, but also the searching steps are restricted in a controlled region. The developed algorithm is illustrated by a numerically simulated 25-bar truss structure, and the results have been compared and verified with those obtained from the trust region method. In order to investigate the reliability of the proposed method in damage detection of structures, the influence of the uncertainties coming from measured modal parameters on the statistical characteristics of detection result is investigated by Monte-Carlo simulation, and the probability of damage detection is estimated using the probabilistic method.

Gait-Event Detection for FES Locomotion (FES 보행을 위한 보행 이벤트 검출)

  • Heo Ji-Un;Kim Chul-Seung;Eom Gwang-Moon
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.3 s.168
    • /
    • pp.170-178
    • /
    • 2005
  • The purpose of this study is to develop a gait-event detection system, which is necessary for the cycle-to-cycle FES control of locomotion. Proposed gait event detection system consists of a signal measurement part and gait event detection part. The signal measurement was composed of the sensors and the LabVIEW program for the data acquisition and synchronization of the sensor signals. We also used a video camera and a motion capture system to get the reference gait events. Machine learning technique with ANN (artificial neural network) was adopted for automatic detection of gait events. 2 cycles of reference gait events were used as the teacher signals for ANN training and the remnants ($2\sim5$ cycles) were used fur the evaluation of the performance in gait-event detection. 14 combinations of sensor signals were used in the training and evaluation of ANN to examine the relationship between the number of sensors and the gait-event detection performance. The best combinations with minimum errors of event-detection time were 1) goniometer, foot-switch and 2) goniometer, foot-switch, accelerometer x(anterior-posterior) component. It is expected that the result of this study will be useful in the design of cycle-to-cycle FES controller.

Nanosecond Gated Raman Spectroscopy for Standoff Detection of Hazardous Materials

  • Chung, Jin Hyuk;Cho, Soo Gyeong
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.12
    • /
    • pp.3547-3552
    • /
    • 2014
  • Laser Raman spectroscopy is one of the most powerful technologies for standoff detection of hazardous materials including explosives. Supported by recent development of laser and sensitive ICCD camera, the technology can identify trace amount of unknown substances in a distance. Using this concept, we built a standoff detection system, in which nanosecond pulse laser and nanosecond gating ICCD technique were delicately devised to avoid the large background noise which suppressed weak Raman signals from the target sample. In standoff detection of explosives which have large kill radius, one of the most important technical issues is the detection distance from the target. Hence, we focused to increase the detection distance up to 54 m by careful optimization of optics and laser settings. The Raman spectra of hazardous materials observed at the distance of 54 m were fully identifiable. We succeeded to detect and identify eleven hazardous materials of liquid or solid particles, which were either explosives or chemical substances used frequently in chemical plants. We also performed experiments to establish the limit of detection (LOD) of HMX at 10 m, which was estimated to be 6 mg.

A Detection Rule Exchange Mechanism for the Collaborative Intrusion Detection in Defense-ESM (국방통합보안관제체계에서의 협업 침입탐지를 위한 탐지규칙 교환 기법)

  • Lee, Yun-Hwan;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.57-69
    • /
    • 2011
  • Many heterogeneous Intrusion Detection Systems(IDSs) based in misuse detection technique including the self-developed IDS are now operating in Defense-ESM(Enterprise Security Management System). IDS based on misuse detection may have different capability in the intrusion detection process according to the frequency and quality of its signature update. This makes the integration and collaboration with other IDSs more difficult. In this paper, with the purpose of creating the proper foundation for integration and collaboration between heterogeneous IDSs being operated in Defense-ESM, we propose an effective mechanism that can enable one IDS to propagate its new detection rules to other IDSs and receive updated rules from others. We also prove the performance of rule exchange and application possibility to defense environment through the implementation and experiment.

Fast and Robust Face Detection based on CNN in Wild Environment (CNN 기반의 와일드 환경에 강인한 고속 얼굴 검출 방법)

  • Song, Junam;Kim, Hyung-Il;Ro, Yong Man
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1310-1319
    • /
    • 2016
  • Face detection is the first step in a wide range of face applications. However, detecting faces in the wild is still a challenging task due to the wide range of variations in pose, scale, and occlusions. Recently, many deep learning methods have been proposed for face detection. However, further improvements are required in the wild. Another important issue to be considered in the face detection is the computational complexity. Current state-of-the-art deep learning methods require a large number of patches to deal with varying scales and the arbitrary image sizes, which result in an increased computational complexity. To reduce the complexity while achieving better detection accuracy, we propose a fully convolutional network-based face detection that can take arbitrarily-sized input and produce feature maps (heat maps) corresponding to the input image size. To deal with the various face scales, a multi-scale network architecture that utilizes the facial components when learning the feature maps is proposed. On top of it, we design multi-task learning technique to improve detection performance. Extensive experiments have been conducted on the FDDB dataset. The experimental results show that the proposed method outperforms state-of-the-art methods with the accuracy of 82.33% at 517 false alarms, while improving computational efficiency significantly.

Study on Ship Detection Using SAR Dual-polarization Data: ENVISAT ASAR AP Mode

  • Yang, Chan-Su;Ouchi, Kazuo
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.5
    • /
    • pp.445-452
    • /
    • 2008
  • Preliminary results are reported on ship detection using coherence images computed from cross-correlating images of multi-look-processed dual-polarization data (HH and HV) of ENVISAT ASAR. The traditional techniques of ship detection by radars such as CFAR (Constant False Alarm Rate) rely on the amplitude data, and therefore the detection tends to become difficult when the amplitudes of ships images are at similar level as the mean amplitude of surrounding sea clutter. The proposed method utilizes the property that the multi-look images of ships are correlated with each other. Because the inter-look images of sea surface are covered by uncorrelated speckle, cross-correlation of multi-look images yields the different degrees of coherence between the images and water. In this paper, the polarimetric information of ships, land and intertidal zone are first compared based on the cross-correlation between HH and HV images, In the next step, we examine the technique when the dual-polarization data are split into two multi-look images, It was shown that the inter-look cross-correlation method could be applicable in the performance improvement of small ship detection and the land masking, It was also found that a simple combination of coherence images from each co-polarised (HH) inter-look and cross-polarised (HV) inter-look data can provide much higher target-detection possibilities.

Detection of System Abnormal State by Cyber Attack (사이버 공격에 의한 시스템 이상상태 탐지 기법)

  • Yoon, Yeo-jeong;Jung, You-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1027-1037
    • /
    • 2019
  • Conventional cyber-attack detection solutions are generally based on signature-based or malicious behavior analysis so that have had difficulty in detecting unknown method-based attacks. Since the various information occurring all the time reflects the state of the system, by modeling it in a steady state and detecting an abnormal state, an unknown attack can be detected. Since a variety of system information occurs in a string form, word embedding, ie, techniques for converting strings into vectors preserving their order and semantics, can be used for modeling and detection. Novelty Detection, which is a technique for detecting a small number of abnormal data in a plurality of normal data, can be performed in order to detect an abnormal condition. This paper proposes a method to detect system anomaly by cyber attack using embedding and novelty detection.

Dynamic data validation and reconciliation for improving the detection of sodium leakage in a sodium-cooled fast reactor

  • Sangjun Park;Jongin Yang;Jewhan Lee;Gyunyoung Heo
    • Nuclear Engineering and Technology
    • /
    • v.55 no.4
    • /
    • pp.1528-1539
    • /
    • 2023
  • Since the leakage of sodium in an SFR (sodium-cooled fast reactor) causes an explosion upon reaction with air and water, sodium leakages represent an important safety issue. In this study, a novel technique for improving the reliability of sodium leakage detection applying DDVR (dynamic data validation and reconciliation) is proposed and verified to resolve this technical issue. DDVR is an approach that aims to improve the accuracy of a target system in a dynamic state by minimizing random errors, such as from the uncertainty of instruments and the surrounding environment, and by eliminating gross errors, such as instrument failure, miscalibration, or aging, using the spatial redundancy of measurements in a physical model and the reliability information of the instruments. DDVR also makes it possible to estimate the state of unmeasured points. To validate this approach for supporting sodium leakage detection, this study applies experimental data from a sodium leakage detection experiment performed by the Korea Atomic Energy Research Institute. The validation results show that the reliability of sodium leakage detection is improved by cooperation between DDVR and hardware measurements. Based on these findings, technology integrating software and hardware approaches is suggested to improve the reliability of sodium leakage detection by presenting the expected true state of the system.

Accuracy Improvement of Pig Detection using Image Processing and Deep Learning Techniques on an Embedded Board (임베디드 보드에서 영상 처리 및 딥러닝 기법을 혼용한 돼지 탐지 정확도 개선)

  • Yu, Seunghyun;Son, Seungwook;Ahn, Hanse;Lee, Sejun;Baek, Hwapyeong;Chung, Yongwha;Park, Daihee
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.4
    • /
    • pp.583-599
    • /
    • 2022
  • Although the object detection accuracy with a single image has been significantly improved with the advance of deep learning techniques, the detection accuracy for pig monitoring is challenged by occlusion problems due to a complex structure of a pig room such as food facility. These detection difficulties with a single image can be mitigated by using a video data. In this research, we propose a method in pig detection for video monitoring environment with a static camera. That is, by using both image processing and deep learning techniques, we can recognize a complex structure of a pig room and this information of the pig room can be utilized for improving the detection accuracy of pigs in the monitored pig room. Furthermore, we reduce the execution time overhead by applying a pruning technique for real-time video monitoring on an embedded board. Based on the experiment results with a video data set obtained from a commercial pig farm, we confirmed that the pigs could be detected more accurately in real-time, even on an embedded board.