• Title/Summary/Keyword: 탐지성능 분석

Search Result 862, Processing Time 0.033 seconds

Development of CanSat System With 3D Rendering and Real-time Object Detection Functions (3D 렌더링 및 실시간 물체 검출 기능 탑재 캔위성 시스템 개발)

  • Kim, Youngjun;Park, Junsoo;Nam, Jaeyoung;Yoo, Seunghoon;Kim, Songhyon;Lee, Sanghyun;Lee, Younggun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.8
    • /
    • pp.671-680
    • /
    • 2021
  • This paper deals with the contents of designing and producing reconnaissance hardware and software, and verifying the functions after being installed on the CanSat platform and ground stations. The main reconnaissance mission is largely composed of two things: terrain search that renders the surrounding terrain in 3D using radar, GPS, and IMU sensors, and real-time detection of major objects through optical camera image analysis. In addition, data analysis efficiency was improved through GUI software to enhance the completeness of the CanSat system. Specifically, software that can check terrain information and object detection information in real time at the ground station was produced, and mission failure was prevented through abnormal packet exception processing and system initialization functions. Communication through LTE and AWS server was used as the main channel, and ZigBee was used as the auxiliary channel. The completed CanSat was tested for air fall using a rocket launch method and a drone mount method. In experimental results, the terrain search and object detection performance was excellent, and all the results were processed in real-time and then successfully displayed on the ground station software.

A Fusion Sensor System for Efficient Road Surface Monitorinq on UGV (UGV에서 효율적인 노면 모니터링을 위한 퓨전 센서 시스템 )

  • Seonghwan Ryu;Seoyeon Kim;Jiwoo Shin;Taesik Kim;Jinman Jung
    • Smart Media Journal
    • /
    • v.13 no.3
    • /
    • pp.18-26
    • /
    • 2024
  • Road surface monitoring is essential for maintaining road environment safety through managing risk factors like rutting and crack detection. Using autonomous driving-based UGVs with high-performance 2D laser sensors enables more precise measurements. However, the increased energy consumption of these sensors is limited by constrained battery capacity. In this paper, we propose a fusion sensor system for efficient surface monitoring with UGVs. The proposed system combines color information from cameras and depth information from line laser sensors to accurately detect surface displacement. Furthermore, a dynamic sampling algorithm is applied to control the scanning frequency of line laser sensors based on the detection status of monitoring targets using camera sensors, reducing unnecessary energy consumption. A power consumption model of the fusion sensor system analyzes its energy efficiency considering various crack distributions and sensor characteristics in different mission environments. Performance analysis demonstrates that setting the power consumption of the line laser sensor to twice that of the saving state when in the active state increases power consumption efficiency by 13.3% compared to fixed sampling under the condition of λ=10, µ=10.

Performance Evaluation of Scaling based Dynamic Time Warping Algorithms for the Detection of Low-rate TCP Attacks (Low-rate TCP 공격 탐지를 위한 스케일링 기반 DTW 알고리즘의 성능 분석)

  • So, Won-Ho;Shim, Sang-Heon;Yoo, Kyoung-Min;Kim, Young-Chon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.3 s.357
    • /
    • pp.33-40
    • /
    • 2007
  • In this paper, low-rate TCP attack as one of shrew attacks is considered and the scaling based dynamic time warping (S-DTW) algorithm is introduced. The low-rate TCP attack can not be detected by the detection method for the previous flooding DoS/DDoS (Denial of Service/Distirbuted Denial of Service) attacks due to its low average traffic rate. It, however, is a periodic short burst that exploits the homogeneity of the minimum retransmission timeout (RTO) of TCP flows and then some pattern matching mechanisms have been proposed to detect it among legitimate input flows. A DTW mechanism as one of detection approaches has proposed to detect attack input stream consisting of many legitimate or attack flows, and shown a depending method as well. This approach, however, has a problem that legitimate input stream may be caught as an attack one. In addition, it is difficult to decide a threshold for separation between the legitimate and the malicious. Thus, the causes of this problem are analyzed through simulation and the scaling by maximum auto-correlation value is executed before computing the DTW. We also discuss the results on applying various scaling approaches and using standard deviation of input streams monitored.

Reliability Analysis of The Mission-Critical Engagement Control Computer Using Active Sparing Redundancy (ASR 기법을 적용한 임무지향 교전통제 컴퓨터의 신뢰도 분석)

  • Shin, Jin-Beom;Kim, Sang-Ha
    • The KIPS Transactions:PartA
    • /
    • v.15A no.6
    • /
    • pp.309-316
    • /
    • 2008
  • The mission-critical engagement control computer for air defense has to maintain its operation without any fault for a long mission time. The mission performed by large-scale and complex embedded software is extremely critical in terms of dependability and safety of computer system, and it is very important that engagement control computer has high reliability. The engagement control computer was implemented using four processors. The distributed computer composed of four processors quarantees the dependability and safety, and ASR fault-tolerant technique applied to each processor guarantees the reliability. In this paper, the mechanism and performance of ASR fault-tolerant technique are analysed. And MTBF, reliability, availability, and cost-effectiveness for ASR, DMR and TMR techniques applied to the engagement control computer are analysed. The mission-critical engagement control computer using software-based ASR fault-tolerant technique provides high reliability and fast recovery time at a low cost. The mission reliability of the engagement control computer using ASR technique in 4 processors board is almost same the reliability of the computer using TMR technique in 6 processors board. ASR technique is most suitable to the mission-critical engagement control computer.

Development of Automatic Crack Detection using the Gabor Filter for Concrete Structures of Railway Tracks (가버 필터를 사용한 철도 콘크리트 궤도 도상의 자동 균열 감지 개발)

  • Na, Yong-Hyoun;Park, Mi-Yun;Park, Ji-Soo;Park, Sung-Baek;Kwon, Se-Gon
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.4
    • /
    • pp.458-465
    • /
    • 2018
  • Purpose: Concrete track that affects on railway safety can detect cracks using image processing technique. However, since a condition of concrete track and surface noisy are obstructed to detect cracks, there is a need for a way to remove them effectively. Method: In this study, we proposed an image processing to detect cracks effectively for Korean railway and verified its performance through experiment. We developed image acquisition system for capture a railway concrete track and acquired railway concrete track images, randomly selected 2000 images and detected cracks in the image process using proposed Gabor Filter Bank methods. Results: As a result, 94% of detection rate are matched to the actual cracks in same quality and format railway concrete track image. Conclution: The crack detection method using Garbor Filter Bank was confirmed to be effective for crack image including noise in the Korean railway concrete track. This system is expected to become an automated maintenance system in the existing human-centered railway industry.

Pulmonary Vessel Extraction and Nodule Reclassification Method Using Chest CT Images (흉부 CT 영상을 이용한 폐 혈관 추출 및 폐 결절 재분류 기법)

  • Kim, Hyun-Soo;Peng, Shao-Hu;Muzzammil, Khairul;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.35-43
    • /
    • 2009
  • In the Computer Aided Diagnosis(CAD) System, the efficient way of classifying nodules from chest CT images of a patient is to perform the classification of the remaining part after the pulmonary vessel extraction. During the pulmonary vessel extraction, due to the small difference between the vessel and nodule features in imaging studies such as CT scans after having an injection of contrast, nodule maybe extracted along with the pulmonary vessel. Therefore, the pulmonary vessel extraction method plays an important role in the nodule classification process. In this paper, we propose a nodule reclassification method based on vessel thickness analysis. The proposed method consist of four steps, lung region searching step, vessel extraction and thinning step, vessel topology formation and correction step and the reclassification of nodule in the vessel candidate step. The radiologists helped us to compare the accuracy of the CAD system using the proposed method and the accuracy of general one. Experimental results show that the proposed method can extract pulmonary vessels and reclassify false-positive nodules accurately.

Evaluation of Nondestructive Evaluation Size Measurement for Integrity Assessment of Axial Outside Diameter Stress Corrosion Cracking in Steam Generator Tubes (증기발생기 전열관 외면 축균열 건전성 평가를 위한 비파괴검사 크기 측정 평가)

  • Joo, Kyung-Mun;Hong, Jun-Hee
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.35 no.1
    • /
    • pp.61-67
    • /
    • 2015
  • Recently, the initiation of outside diameter stress corrosion cracking (ODSCC) at the tube support plate region of domestic steam generators (SG) with Alloy600 HTMA tubes has been increasing. As a result, SGs with Alloy600 HTMA tubes must be replaced early or are scheduled to be replaced prior to their designed lifetime. ODSCC is one of the biggest threats to the integrity of SG tubes. Therefore, the accurate evaluation of tube integrity to determine ODSCC is needed. Eddy current testing (ECT) is conducted periodically, and its results could be input as parameters for evaluating the integrity of SG tubes. The reliability of an ECT inspection system depends on the performance of the inspection technique and abilty of the analyst. The detection probability and ECT sizing error of degradation are considered to be the performance indices of a nondestructive evaluation (NDE) system. This paper introduces an optimized evaluation method for ECT, as well as the sizing error, including the analyst performance. This study was based on the results of a round robin program in which 10 inspection analysts from 5 different companies participated. The analysis of ECT sizing results was performed using a linear regression model relating the true defect size data to the measured ECT size data.

A Study on the Integration of Information Extraction Technology for Detecting Scientific Core Entities based on Large Resources (대용량 자원 기반 과학기술 핵심개체 탐지를 위한 정보추출기술 통합에 관한 연구)

  • Choi, Yun-Soo;Cheong, Chang-Hoo;Choi, Sung-Pil;You, Beom-Jong;Kim, Jae-Hoon
    • Journal of Information Management
    • /
    • v.40 no.4
    • /
    • pp.1-22
    • /
    • 2009
  • Large-scaled information extraction plays an important role in advanced information retrieval as well as question answering and summarization. Information extraction can be defined as a process of converting unstructured documents into formalized, tabular information, which consists of named-entity recognition, terminology extraction, coreference resolution and relation extraction. Since all the elementary technologies have been studied independently so far, it is not trivial to integrate all the necessary processes of information extraction due to the diversity of their input/output formation approaches and operating environments. As a result, it is difficult to handle scientific documents to extract both named-entities and technical terms at once. In this study, we define scientific as a set of 10 types of named entities and technical terminologies in a biomedical domain. in order to automatically extract these entities from scientific documents at once, we develop a framework for scientific core entity extraction which embraces all the pivotal language processors, named-entity recognizer, co-reference resolver and terminology extractor. Each module of the integrated system has been evaluated with various corpus as well as KEEC 2009. The system will be utilized for various information service areas such as information retrieval, question-answering(Q&A), document indexing, dictionary construction, and so on.

Analysis of Target Identification Performances against the Moving Targets Using a Bistatic Radar (바이스태틱 레이다를 이용한 이동표적에 대한 표적식별 성능 분석)

  • Lee, Seung-Jae;Bae, Ji-Hoon;Jeong, Seong-Jae;Yang, Eunjung;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.2
    • /
    • pp.198-207
    • /
    • 2016
  • Bistatric radar can perform detection and identification for stealth targets that are rarely detected by the conventional monostatic radar. However, high resolution range profile(HRRP) generated from the received signal in the bistatic radar cannot show exact range information of the target because the bistatic geometry lead to the distortions of the bistatic HRRP. In addition, electromagnetic scattering mechanisms of the target are varied depending on the bistatic geometry. Thus, efficient database construction is a crucial factor to achieve successful classification capability in bistatic target identification. In this paper, a database construction method based on realistic flight scenarios of a target, which provides a reliable identification performance for the monostatic radar, is applied to bistatic target identification. Then, the capability and efficiency of the method is analyzed. Simulation results show that reliable identification performance can be achieved using the database construction based on the flight scenarios when the target is a considerable distance away from the bistatic radar.

A Performance Monitoring System for Heterogeneous SOAP Nodes (이기종 SOAP 노드의 실시간 성능 모니터링 시스템)

  • Lee Woo-Joong;Kim Jungsun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.484-498
    • /
    • 2004
  • In this paper. we propose a novel performance monitoring scheme for heterogeneous SOAP nodes. The scheme is basically based on two-level (kernel-level and user-level) packet filtering of TCP flows. By TCP flow, we mean a sequence of raw packet streams on a TCP transaction. In this scheme, we detect and extract SOAP operations embedded in SOAP messages from TCP flows. Therefore, it becomes possible to monitor heterogeneous SOAP nodes deployed on diverse SOAP-based middlewares such as .Net and Apache AXIS. We present two implementation mechanisms for the proposed scheme. The first mechanism tries to identify SOAP operations by analyzing all fragmented SOAP messages on TCP flows. However, a naive policy would incur untolerable overhead since it needs to copy all packets from kernel to user space. The second mechanism overcomes this problem by selectively copying packets from kernel to user space. For selective copying, we use a kernel-level packet filtering method that makes use of some representative TCP flags.(e.g. SIN, FIN and PSH). In this mechanism, we can detect SOAP operations only from the last fragment of SOAP messages in most cases. Finally, we implement a SOAP monitoring system using a component ca]led SOAP Sniffer that realizes our proposed scheme, and show experimental results. We strongly believe that our system will play a vital role as a tool for various services such as transaction monitoring and load balancing among heterogeneous SOAP nodes.