• Title/Summary/Keyword: Active Detection

Search Result 1,107, Processing Time 0.023 seconds

Impact and Damage Detection Method Utilizing L-Shaped Piezoelectric Sensor Array (L-형상 압전체 센서 배열을 이용한 충격 및 손상 탐지 기법 개발)

  • Jung, Hwee-Kwon;Lee, Myung-Jun;Park, Gyuhae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.34 no.5
    • /
    • pp.369-376
    • /
    • 2014
  • This paper presents a method that integrates passive and active-sensing techniques for the structural health monitoring of plate-like structures. Three piezoelectric transducers are deployed in a L-shape to detect and locate an impact event by measuring and processing the acoustic emission data. The same sensor arrays are used to estimate the subsequent structural damage using guided waves. Because this method does not require a prior knowledge of the structural parameters, such as the wave velocity profile in various directions, accurate results could be achieved even on anisotropic or curved plates. A series of experiments was performed on plates, including a spar-wing structure, to demonstrate the capability of the proposed method. The performance was also compared to that of traditional approaches and the superior capability of the proposed method was experimentally demonstrated.

Performance Analysis of the Active SAS Autofocus Processing for UUV Trajectory Disturbances Compensation (수중무인체 궤적교란 보상을 위한 능동 SAS 자동초점처리 성능 분석)

  • Kim, Boo-il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.215-222
    • /
    • 2017
  • An active synthetic aperture sonar mounted on small UUV is generated various trajectory disturbances in the traveling path by the influence of external underwater environments. That is the phase mismatch occurs in the synthetic aperture processing of the signals reflected from seabed objects and fetches the detection performance decreases. In this paper, we compensated deteriorated images by the active SAS autofocus processing using DPC and analyzed the effects of detection performance when the periodic trajectory disturbances occur in the side direction at a constant velocity and straight movement of UUV. Through simulations, the deteriorated images according to the periodic disturbance magnitudes and period variations in the platform were compensated using difference phases processing of the overlapping displaced phase centers on the adjacent transmitted ping signals, and we conformed the improved performance characteristics of azimuth resolution and detection images at 3dB reference point.

Low Power Design of Filter Based Face Detection Hardware (필터방식 얼굴검출 하드웨어의 저전력 설계)

  • Kim, Yoon-Gu;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.6
    • /
    • pp.89-95
    • /
    • 2008
  • In this paper, we designed a low power face detection hardware and analysed its power consumption. The face detection hardware was fabricated using Samsung 0.18um CMOS technology and it can detect multiple face locations from a 2-D image. The hardware is composed of 6 functional modules and 11 internal memories. We introduced two operating modes(SLEEP and ACTIVE) to save power and a clock gating technique was used at two different levels: modules and registers. In additional, we divided an internal memory into several pieces to reduce the energy consumed when accessing memories, and fully utilized low power design option provided in Synopsis Design Compiler. As a result, we could obtain 68% power reduction in ACTIVE mode compared to the original design in which none of the above low power techniques were used.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Detection of Active Fire Objects from Drone Images Using YOLOv7x Model (드론영상과 YOLOv7x 모델을 이용한 활성산불 객체탐지)

  • Park, Ganghyun;Kang, Jonggu;Choi, Soyeon;Youn, Youjeong;Kim, Geunah;Lee, Yangwon
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_2
    • /
    • pp.1737-1741
    • /
    • 2022
  • Active fire monitoring using high-resolution drone images and deep learning technologies is now an initial stage and requires various approaches for research and development. This letter examined the detection of active fire objects using You Look Only Once Version 7 (YOLOv7), a state-of-the-art (SOTA) model that has rarely been used in fire detection with drone images. Our experiments showed a better performance than the previous works in terms of multiple quantitative measures. The proposed method can be applied to continuous monitoring of wide areas, with an integration of additional development of new technologies.

Real-Time Multiple Face Detection Using Active illumination (능동적 조명을 이용한 실시간 복합 얼굴 검출)

  • 한준희;심재창;설증보;나상동;배철수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.155-160
    • /
    • 2003
  • This paper presents a multiple face detector based on a robust pupil detection technique. The pupil detector uses active illumination that exploits the retro-reflectivity property of eyes to facilitate detection. The detection range of this method is appropriate for interactive desktop and kiosk applications. Once the location of the pupil candidates are computed, the candidates are filtered and grouped into pairs that correspond to faces using heuristic rules. To demonstrate the robustness of the face detection technique, a dual mode face tracker was developed, which is initialized with the most salient detected face. Recursive estimators are used to guarantee the stability of the process and combine the measurements from the multi-face detector and a feature correlation tracker. The estimated position of the face is used to control a pan-tilt servo mechanism in real-time, that moves the camera to keep the tracked face always centered in the image.

  • PDF

Fast Defect Detection of PCB using Ultrasound Thermography (초음파 서모그라피를 이용한 빠른 PCB 결함 검출)

  • Cho Jai-Wan;Seo Yong-Chil;Jung Seung-Ho;Kim Seungho;Jung Hyun-Kyu
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.2
    • /
    • pp.68-71
    • /
    • 2006
  • Active thermography has been used for several years in the field of remote non-destructive testing. It provides thermal images for remote detection and imaging of damages. Also, it is based on propagation and reflection of thermal waves which are launched from the surface into the inspected component by absorption of modulated radiation. For energy deposition, it use external heat sources (e.g., halogen lamp or convective heating) or internal heat generation (e.g., microwaves, eddy current, or elastic wave). Among the external heat sources, the ultrasound is generally used for energy deposition because of defect selective heating up. The heat source generating a thermal wave is provided by the defect itself due to the attenuation of amplitude modulated ultrasound. A defect causes locally enhanced losses and consequently selective heating up. Therefore amplitude modulation of the injected ultrasonic wave turns a defect into a thermal wave transmitter whose signal is detected at the surface by thermal infrared camera. This way ultrasound thermography(UT) allows for selective defect detection which enhances the probability of defect detection in the presence of complicated intact structures. In this paper the applicability of UT for fast defect detection is described. Examples are presented showing the detection of defects in PCB material. Measurements are performed on various kinds of typical defects in PCB materials (both Cu metal and non-metal epoxy). The obtained thermal image reveals area of defect in row of thick epoxy material and PCB.

Development of Tracking Equipment for Real­Time Multiple Face Detection (실시간 복합 얼굴 검출을 위한 추적 장치 개발)

  • 나상동;송선희;나하선;김천석;배철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1823-1830
    • /
    • 2003
  • This paper presents a multiple face detector based on a robust pupil detection technique. The pupil detector uses active illumination that exploits the retro­reflectivity property of eyes to facilitate detection. The detection range of this method is appropriate for interactive desktop and kiosk applications. Once the location of the pupil candidates are computed, the candidates are filtered and grouped into pairs that correspond to faces using heuristic rules. To demonstrate the robustness of the face detection technique, a dual mode face tracker was developed, which is initialized with the most salient detected face. Recursive estimators are used to guarantee the stability of the process and combine the measurements from the multi­face detector and a feature correlation tracker. The estimated position of the face is used to control a pan­tilt servo mechanism in real­time, that moves the camera to keep the tracked face always centered in the image.

Vision Based Traffic Data Collection in Intelligent Transportation Systems

  • Mei Yu;Kim, Yong-Deak
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.773-776
    • /
    • 2000
  • Traffic monitoring plays an important role in intelligent transportation systems. It can be used to collect real-time traffic data concerning traffic flow. Passive shadows resulted from roadside buildings or trees and active shadows caused by moving vehicles, are one of the factors that arise errors in vision based vehicle detection. In this paper, a land mark based method is proposed for vehicle detection and shadow rejection, and finally vehicle count are achieved based on the land mark detection method.

  • PDF

Modified Random Early Defection Algorithm for the Dynamic Congestion Control in Routers (라우터에서의 동적인 혼잡 제어를 위한 새로운 큐 관리 알고리즘)

  • Koo, Ja-Hon;Song, Byung-Hun;Chung, Kwang-Sue;Oh, Seoung-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.517-526
    • /
    • 2001
  • In order to reduce the increasing packet loss rates caused by an exponential increase in network traffic, the IETF(Internet Engineering Task Force) is considering the deployment of active queue management techniques such as RED(Random Early Detection). While active queue management in routers and gateways can potentially reduce total packet loss rates in the Internet, this paper has demonstrated the inherent weakness of current techniques and shows that they are ineffective in preventing high loss rates. The inherent problem with these queue management algorithms is that they all use queue lengths as the indicator of the severity of congestion. In this paper, in order to solve this problem, a new active queue management algorithm called MRED(Modified Random Early Detection) is proposed. MRED computes the packet drop probability based on our heuristic method rather than the simple method used in RED. Using simulation, MRED is shown to perform better than existing queue management schemes. To analyze the performance, we also measure throughput of traffics under the FIFO control, and compared the performance with that of this MRED system.

  • PDF