• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.035 seconds

Comparison of CNN Structures for Detection of Surface Defects (표면 결함 검출을 위한 CNN 구조의 비교)

  • Choi, Hakyoung;Seo, Kisung
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.7
    • /
    • pp.1100-1104
    • /
    • 2017
  • A detector-based approach shows the limited performances for the defect inspections such as shallow fine cracks and indistinguishable defects from background. Deep learning technique is widely used for object recognition and it's applications to detect defects have been gradually attempted. Deep learning requires huge scale of learning data, but acquisition of data can be limited in some industrial application. The possibility of applying CNN which is one of the deep learning approaches for surface defect inspection is investigated for industrial parts whose detection difficulty is challenging and learning data is not sufficient. VOV is adopted for pre-processing and to obtain a resonable number of ROIs for a data augmentation. Then CNN method is applied for the classification. Three CNN networks, AlexNet, VGGNet, and mofified VGGNet are compared for experiments of defects detection.

The Development of Camera Detection System for the Measurement Road Traffic Data (영상검지 카메라를 이용한 도로상의 차량흐름 계측방안 연구)

  • Kim, Hie-Sik;Kim, Jin-Man
    • Journal of the Korean Society of Safety
    • /
    • v.18 no.4
    • /
    • pp.23-27
    • /
    • 2003
  • To improve the road transportation safety, the road traffic data is monitored by applying an image detection system. The road traffic safety is analysed using image processing techniques. For more accurate measurement, the coordinate matching of real road data to image is one of the most essential parts of the image detection technique. The road image is skewed at the input screen, because the video camera is installed at the roadside. A fast and precise algorithm for the coordinate matching is developed to convert image coordinates into road coordinates.

An Efficient Object Detection Algorithm Using Stereo Images (스테레오 영상을 이용한 효율적 전방 장애물 검출)

  • 김정우;손창훈;전병우;이근영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1704-1712
    • /
    • 1999
  • This research features efficient detection of obstacles, especially vehicles, in the forward direction of navigation for the development of unmanned automous vehicle. We separate image regions into ground and non-ground planes using the Helmholtz shearing technique in order to reliably exclude regions that do not contain obstacles. We propose a computationally simple and efficient method for the detection of vehicles in the forward direction by analysis of horizontally and vertically projected histograms of residual disparity map obtained from Helmholtz shearing. We have experimented the proposed method on real outdoor stereo data. Experimental results show that our method gives accurate detection of forward vehicles and is computationally very efficient.

  • PDF

Studies on the Influence of Various factors in Ultrasonic Flaw Detection in Ferrite Steel Butt Weld Joints

  • Baby, Sony;Balasubramanian, T.;Pardikar, R.J.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.23 no.3
    • /
    • pp.270-279
    • /
    • 2003
  • Parametric studies have been conducted into the variability of the factors affecting the ultrasonic testing applied to weldments. The influence of ultrasonic equipment, transducer parameters, test technique, job parameters, defect type and characteristics on reliability far defect detection and sizing was investigated by experimentation. The investigation was able to build up substantial bank of information on the reliability of manual ultrasonic method for testing weldments. The major findings of the study separate into two parts, one dealing with correlation between ultrasonic techniques, equipment and defect parameters and inspection performance effectiveness and other with human factors. Defect detection abilities are dependent on the training, experience and proficiency of the UT operators, the equipment used, the effectiveness of procedures and techniques.

Pedestrian identification in infrared images using visual saliency detection technique

  • Truong, Mai Thanh Nhat;Kim, Sanghoon
    • Annual Conference of KIPS
    • /
    • 2019.05a
    • /
    • pp.615-618
    • /
    • 2019
  • Visual saliency detection is an important part in various vision-based applications. There are a myriad of techniques for saliency detection in color images. However, the number of methods for saliency detection in infrared images is inadequate. In this paper, we introduce a simple approach for pedestrian identification in infrared images using saliency. The input image is thresholded into several Boolean maps, an initial saliency map is then calculated as a weighted sum of created Boolean maps. The initial map is further refined by using thresholding, morphology operation, and Gaussian filter to produce the final, high-quality saliency map. The experiment showed that the proposed method produced high performance results when applied to real-life data.

An improved cross-correlation method based on wavelet transform and energy feature extraction for pipeline leak detection

  • Li, Suzhen;Wang, Xinxin;Zhao, Ming
    • Smart Structures and Systems
    • /
    • v.16 no.1
    • /
    • pp.213-222
    • /
    • 2015
  • Early detection and precise location of leakage is of great importance for life-cycle maintenance and management of municipal pipeline system. In the past few years, acoustic emission (AE) techniques have demonstrated to be an excellent tool for on-line leakage detection. Regarding the multi-mode and frequency dispersion characteristics of AE signals propagating along a pipeline, the direct cross-correlation technique that assumes the constant AE propagation velocity does not perform well in practice for acoustic leak location. This paper presents an improved cross-correlation method based on wavelet transform, with due consideration of the frequency dispersion characteristics of AE wave and the contribution of different mode. Laboratory experiments conducted to simulate pipeline gas leakage and investigate the frequency spectrum signatures of AE leak signals. By comparing with the other methods for leak location identification, the feasibility and superiority of the proposed method are verified.

Proposal of Image Detection Algorithm to Implement Hand Gestures

  • Woo, Eun-Ju;Moon, Yu-Sung;Choi, Ung-Se;Kim, Jung-Won
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1222-1225
    • /
    • 2018
  • This paper proposes an image detection algorithm to implement gesture. By using a camera sensor, the performance of the extracted image algorithm based on the gesture pattern was verified through experiments. In addition, through the experiments, we confirmed the proposed method's possibility of the implementation. For efficient image detection, we applied a segmentation technique based on image transition which divides into small units. To improve gesture recognition, the proposed method not only has high recognition rate and low false acceptance rate in real gesture environment, but also designed an algorithm that efficiently finds optimal thresholds that can be applied.

An iterative method for damage identification of skeletal structures utilizing biconjugate gradient method and reduction of search space

  • Sotoudehnia, Ebrahim;Shahabian, Farzad;Sani, Ahmad Aftabi
    • Smart Structures and Systems
    • /
    • v.23 no.1
    • /
    • pp.45-60
    • /
    • 2019
  • This paper is devoted to proposing a new approach for damage detection of structures. In this technique, the biconjugate gradient method (BCG) is employed. To remedy the noise effects, a new preconditioning algorithm is applied. The proposed preconditioner matrix significantly reduces the condition number of the system. Moreover, based on the characteristics of the damage vector, a new direct search algorithm is employed to increase the efficiency of the suggested damage detection scheme by reducing the number of unknowns. To corroborate the high efficiency and capability of the presented strategy, it is applied for estimating the severity and location of damage in the well-known 31-member and 52-member trusses. For damage detection of these trusses, the time history responses are measured by a limited number of sensors. The results of numerical examples reveal high accuracy and robustness of the proposed method.

A Study on Edge Detection Algorithm for Character Recognition (문자인식을 위한 에지검출 알고리즘에 관한 연구)

  • Lee, Chang-Young;Hwang, Yeong-Yeun;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.792-794
    • /
    • 2014
  • Character recognition is an image processing technique for obtaining the character information such as documents and automobile license plate and for this edge detection methods are commonly used. The previous edge detection methods are mostly applying the weighted value mask on the image and because it applies the same mask to the entire areas of the image, the processing results are somewhat insufficient. Therefore, this paper has proposed an edge detection algorithm by applying the weighted value mask considering the distribution and location of pixels to be suitable for the character recognition.

  • PDF

Network intrusion detection method based on matrix factorization of their time and frequency representations

  • Chountasis, Spiros;Pappas, Dimitrios;Sklavounos, Dimitris
    • ETRI Journal
    • /
    • v.43 no.1
    • /
    • pp.152-162
    • /
    • 2021
  • In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network. This approach is applicable to the broad scientific field of information security, including intrusion detection and prevention. The proposed method employs bidimensional (time-frequency) data representations of the forms of the short-time Fourier transform, as well as the Wigner distribution. Moreover, the method applies matrix factorization using singular value decomposition and principal component analysis of the two-dimensional data representation matrices to detect intrusions. The current scheme was evaluated using numerous tests on network activities, which were recorded and presented in the KDD-NSL and UNSW-NB15 datasets. The efficiency and robustness of the technique have been experimentally proved.