• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.037 seconds

CAD for Detection of Brain Tumor Using the Symmetry Contribution From MR Image Applying Unsharp Mask Filter

  • Kim, Dong-Hyun;Ye, Soo-Young
    • Transactions on Electrical and Electronic Materials
    • /
    • v.15 no.4
    • /
    • pp.230-234
    • /
    • 2014
  • Automatic detection of disease helps medical institutions that are introducing digital images to read images rapidly and accurately, and is thus applicable to lesion diagnosis and treatment. The aim of this study was to apply a symmetry contribution algorithm to unsharp mask filter-applied MR images and propose an analysis technique to automatically recognize brain tumor and edema. We extracted the skull region and drawed outline of the skull in database of images obtained at P University Hospital and detected an axis of symmetry with cerebral characteristics. A symmetry contribution algorithm was then applied to the images around the axis of symmetry to observe intensity changes in pixels and detect disease areas. When we did not use the unsharp mask filter, a brain tumor was detected in 60 of a total of 95 MR images. The disease detection rate for the brain was 63.16%. However, when we used the unsharp mask filter, the tumor was detected in 87 of a total of 95 MR images, with a disease detection rate of 91.58%. When the unsharp mask filter was used in the pre-process stage, the disease detection rate for the brain was higher than when it was not used. We confirmed that unsharp mask filter can be used to rapidly and accurately to read many MR images stored in a database.

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.385-399
    • /
    • 2017
  • Nowadays, with the development of signal processing technique, the protection to the integrity and authenticity of images has become a topic of great concern. A blind image authentication technology with high tamper detection accuracy for different common attacks is urgently needed. In this paper, an improved fragile watermarking method based on local binary pattern (LBP) is presented for blind tamper location in images. In this method, a binary watermark is generated by LBP operator which is often utilized in face identification and texture analysis. In order to guarantee the safety of the proposed algorithm, Arnold transform and logistic map are used to scramble the authentication watermark. Then, the least significant bits (LSBs) of original pixels are substituted by the encrypted watermark. Since the authentication data is constructed from the image itself, no original image is needed in tamper detection. The LBP map of watermarked image is compared to the extracted authentication data to determine whether it is tampered or not. In comparison with other state-of-the-art schemes, various experiments prove that the proposed algorithm achieves better performance in forgery detection and location for baleful attacks.

Improved Decoupled Control and Islanding Detection of Inverter-Based Distribution in Multibus Microgrid Systems

  • Pinto, Smitha Joyce;Panda, Gayadhar
    • Journal of Power Electronics
    • /
    • v.16 no.4
    • /
    • pp.1526-1540
    • /
    • 2016
  • This work mainly discusses an accurate and fast islanding detection based on fractional wavelet packet transform (FRWPT)for multibus microgrid systems. The proposed protection scheme uses combined desirable features retrieved from discrete fractional Fourier transform (FRFT) and wavelet packet transform (WPT) techniques, which provides precise time-frequency information on minute perturbation signals introduced in the system. Moreover, this study focuses on the design of decoupling control with a distributed controller based on state feedback for the efficient operation of microgrid systems that are transitioning from the grid-connected mode to the islanded mode. An IEEE 9-bus test system with inverter based distributed generation (DG) units is considered for islanding assessment and smooth operation. Finally, tracking errors are greatly reduced with stability improvement based on the proposed controller. FRWPT based islanding detection is demonstrated via a time domain simulation of the system. Simulated results show an improvement in system stability with the application of the proposed controller and accurate islanding detection based on the FRWPT technique in comparison with the results obtained by applying the wavelet transform (WT) and WPT.

An adaptive method of multi-scale edge detection for underwater image

  • Bo, Liu
    • Ocean Systems Engineering
    • /
    • v.6 no.3
    • /
    • pp.217-231
    • /
    • 2016
  • This paper presents a new approach for underwater image analysis using the bi-dimensional empirical mode decomposition (BEMD) technique and the phase congruency information. The BEMD algorithm, fully unsupervised, it is mainly applied to texture extraction and image filtering, which are widely recognized as a difficult and challenging machine vision problem. The phase information is the very stability feature of image. Recent developments in analysis methods on the phase congruency information have received large attention by the image researchers. In this paper, the proposed method is called the EP model that inherits the advantages of the first two algorithms, so this model is suitable for processing underwater image. Moreover, the receiver operating characteristic (ROC) curve is presented in this paper to solve the problem that the threshold is greatly affected by personal experience when underwater image edge detection is performed using the EP model. The EP images are computed using combinations of the Canny detector parameters, and the binaryzation image results are generated accordingly. The ideal EP edge feature extractive maps are estimated using correspondence threshold which is optimized by ROC analysis. The experimental results show that the proposed algorithm is able to avoid the operation error caused by manual setting of the detection threshold, and to adaptively set the image feature detection threshold. The proposed method has been proved to be accuracy and effectiveness by the underwater image processing examples.

Simplified MMSE Detection with SoIC for Iterative Receivers in Multiple Antenna Systems (다중 안테나 시스템에서 연 간섭 제거를 이용한 저 복잡도 MMSE 신호 검출 방법)

  • Kim, Jong-Kyung;Seo, Jong-Soo
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.385-392
    • /
    • 2009
  • Simplified minimum mean square error (MMSE) detection technique combined with soft interference cancellation(SoIC) is proposed for iterative receivers in multiple antenna systems. To avoid repeated matrix inversions required to obtain the MMSE filter coefficients during the iteration between the soft detector and decoder, simplified matrix inversion techniques are applied to calculate the filter coefficient matrix. Simulation results show that the proposed MMSE detections with SoIC indicate a comparable or slightly degraded detection performance while achieving a significantly reduced complexity as compared to the conventional MMSE detection with SoIC.

  • PDF

Framework for False Alarm Pattern Analysis of Intrusion Detection System using Incremental Association Rule Mining

  • Chon Won Yang;Kim Eun Hee;Shin Moon Sun;Ryu Keun Ho
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.716-718
    • /
    • 2004
  • The false alarm data in intrusion detection systems are divided into false positive and false negative. The false positive makes bad effects on the performance of intrusion detection system. And the false negative makes bad effects on the efficiency of intrusion detection system. Recently, the most of works have been studied the data mining technique for analysis of alert data. However, the false alarm data not only increase data volume but also change patterns of alert data along the time line. Therefore, we need a tool that can analyze patterns that change characteristics when we look for new patterns. In this paper, we focus on the false positives and present a framework for analysis of false alarm pattern from the alert data. In this work, we also apply incremental data mining techniques to analyze patterns of false alarms among alert data that are incremental over the time. Finally, we achieved flexibility by using dynamic support threshold, because the volume of alert data as well as included false alarms increases irregular.

  • PDF

Flame Detection of Steam Boilers using Neural Networks and Image Information (영상신호와 신경회로망을 이용한 보일러 화염 검출)

  • Bae, Hyeon;Park, Dong-Jae;Ahan, Hang-Bae;Kim, Sung-Shin
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.163-168
    • /
    • 2003
  • Several equipments for flame detection are employed in the power generations. But these flame detectors have some problems for the correct performance. So in this paper, we apply different techniques for the flame detection. Image processing techniques are broadly applied in industrial fields. In this paper, the image information is recorded by a camcoder and then these images are preprocessed for the input values of neural network model. We can test and evaluate the approach that uses image information for the flame detection of burners. If this technique is implemented in physical plant, the economical and effective operation could be achieved.

Performance Analysis of Iterative Detection Scheme for the D-STTD System

  • Yoon, Gil-Sang;Lee, Jeong-Hwan;Cho, In-Sik;Seo, Chang-Woo;Ryoo, Sang-Jin;You, Cheol-Woo;Hwang, In-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.235-240
    • /
    • 2009
  • This paper combines various detection techniques and analyzes their performances in detecting the transmission information of the D-STTD scheme that uses, in parallel, the STTD scheme known as the Alamouti code. The D-STTD scheme adopts one of the STTD schemes for transmission to acquire diverse effects and uses another form of STTD for multiplexing effects. Due to the multiplexing effect that transmits different data, it is difficult to apply D-STTD to the conventional STTD combining technique. This paper combines the D-STTD system with linear algorithm, SIC algorithm and OSIC algorithm known as multiplexing detection scheme based on MMSE scheme. And we propose the detection scheme of the D-STTD using MAP algorithm and analyze the performance of each system. The simulation results showed that the detector using iterative algorithm has better performance than Linear MMSE Detector. Especially, we can show that the detector using MAP algorithm outperforms conventional detector.

People Detection Algorithm in Dynamic Background (동적인 배경에서의 사람 검출 알고리즘)

  • Choi, Yu Jung;Lee, Dong Ryeol;Kim, Yoon
    • Journal of Industrial Technology
    • /
    • v.38 no.1
    • /
    • pp.41-52
    • /
    • 2018
  • Recently, object detection is a critical function for any system that uses computer vision and is widely used in various fields such as video surveillance and self-driving cars. However, the conventional methods can not detect the objects clearly because of the dynamic background change in the beach. In this paper, we propose a new technique to detect humans correctly in the dynamic videos like shores. A new background modeling method that combines spatial GMM (Gaussian Mixture Model) and temporal GMM is proposed to make more correct background image. Also, the proposed method improve the accuracy of people detection by using SVM (Support Vector Machine) to classify people from the objects and KCF (Kernelized Correlation Filter) Tracker to track people continuously in the complicated environment. The experimental result shows that our method can work well for detection and tracking of objects in videos containing dynamic factors and situations.

Finding Rotten Eggs: A Review Spam Detection Model using Diverse Feature Sets

  • Akram, Abubakker Usman;Khan, Hikmat Ullah;Iqbal, Saqib;Iqbal, Tassawar;Munir, Ehsan Ullah;Shafi, Dr. Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5120-5142
    • /
    • 2018
  • Social media enables customers to share their views, opinions and experiences as product reviews. These product reviews facilitate customers in buying quality products. Due to the significance of online reviews, fake reviews, commonly known as spam reviews are generated to mislead the potential customers in decision-making. To cater this issue, review spam detection has become an active research area. Existing studies carried out for review spam detection have exploited feature engineering approach; however limited number of features are considered. This paper proposes a Feature-Centric Model for Review Spam Detection (FMRSD) to detect spam reviews. The proposed model examines a wide range of feature sets including ratings, sentiments, content, and users. The experimentation reveals that the proposed technique outperforms the baseline and provides better results.