• Title/Summary/Keyword: Alarm processing

Search Result 241, Processing Time 0.026 seconds

Development of GK2A Convective Initiation Algorithm for Localized Torrential Rainfall Monitoring (국지성 집중호우 감시를 위한 천리안위성 2A호 대류운 전조 탐지 알고리즘 개발)

  • Park, Hye-In;Chung, Sung-Rae;Park, Ki-Hong;Moon, Jae-In
    • Atmosphere
    • /
    • v.31 no.5
    • /
    • pp.489-510
    • /
    • 2021
  • In this paper, we propose an algorithm for detecting convective initiation (CI) using GEO-KOMPSAT-2A/advanced meteorological imager data. The algorithm identifies clouds that are likely to grow into convective clouds with radar reflectivity greater than 35 dBZ within the next two hours. This algorithm is developed using statistical and qualitative analysis of cloud characteristics, such as atmospheric instability, cloud top height, and phase, for convective clouds that occurred on the Korean Peninsula from June to September 2019. The CI algorithm consists of four steps: 1) convective cloud mask, 2) cloud object clustering and tracking, 3) interest field tests, and 4) post-processing tests to remove non-convective objects. Validation, performed using 14 CI events that occurred in the summer of 2020 in Korean Peninsula, shows a total probability of detection of 0.89, false-alarm ratio of 0.46, and mean lead-time of 39 minutes. This algorithm can be useful warnings of rapidly developing convective clouds in future by providing information about CI that is otherwise difficult to predict from radar or a numerical prediction model. This CI information will be provided in short-term forecasts to help predict severe weather events such as localized torrential rainfall and hail.

Efficient Forest Fire Detection using Rule-Based Multi-color Space and Correlation Coefficient for Application in Unmanned Aerial Vehicles

  • Anh, Nguyen Duc;Van Thanh, Pham;Lap, Doan Tu;Khai, Nguyen Tuan;Van An, Tran;Tan, Tran Duc;An, Nguyen Huu;Dinh, Dang Nhu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.381-404
    • /
    • 2022
  • Forest fires inflict great losses of human lives and serious damages to ecological systems. Hence, numerous fire detection methods have been proposed, one of which is fire detection based on sensors. However, these methods reveal several limitations when applied in large spaces like forests such as high cost, high level of false alarm, limited battery capacity, and other problems. In this research, we propose a novel forest fire detection method based on image processing and correlation coefficient. Firstly, two fire detection conditions are applied in RGB color space to distinguish between fire pixels and the background. Secondly, the image is converted from RGB to YCbCr color space with two fire detection conditions being applied in this color space. Finally, the correlation coefficient is used to distinguish between fires and objects with fire-like colors. Our proposed algorithm is tested and evaluated on eleven fire and non-fire videos collected from the internet and achieves up to 95.87% and 97.89% of F-score and accuracy respectively in performance evaluation.

Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network

  • Shyam Sundar S;R.S. Bhuvaneswaran;SaiRamesh L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2214-2229
    • /
    • 2024
  • Wireless sensor network (WSN) consists of large number of sensor nodes that are deployed in geographical locations to collect sensed information, process data and communicate it to the control station for further processing. Due the unfriendly environment where the sensors are deployed, there exist many possibilities of malicious nodes which performs malicious activities in the network. Therefore, the security threats affect performance and life time of sensor networks, whereas various security aspects are there to address security issues in WSN namely Cryptography, Trust Management, Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS). However, IDS detect the malicious activities and produce an alarm. These malicious activities exploit vulnerabilities in the network layer and affect all layers in the network. Existing feature selection methods such as filter-based methods are not considering the redundancy of the selected features and wrapper method has high risk of overfitting the classification of intrusion. Due to overfitting, the classification algorithm fails to detect the intrusion in better manner. The main objective of this paper is to provide the efficient feature selection algorithm which was suitable for any type classification algorithm to detect the intrusion in an effective manner. This paper, the security of the network is addressed by proposing Feature Selection Algorithm using Chi Squared with Ensemble Method (FSChE). The proposed scheme employs the combination of decision tree along with the random forest classification algorithm to form ensemble classifier. The experimental results justify the feasibility of the proposed scheme in terms of attack detection, packet delivery ratio and time analysis by employing NSL KDD cup data Set. The obtained results shows that the proposed ensemble method increases the overall performance by 10% to 25% with respect to mentioned parameters.

A neck healthy warning algorithm for identifying text neck posture prevention (거북목 자세를 예방하기 위한 목 건강 경고 알고리즘)

  • Jae-Eun Lee;Jong-Nam Kim;Hong-Seok Choi;Young-Bong Kim
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.3
    • /
    • pp.115-122
    • /
    • 2022
  • With the outbreak of COVID-19 a few years ago, video conferencing and electronic document work have increased, and for this reason, the proportion of computer work among modern people's daily routines is increasing. However, as more and more people work on computers in the wrong posture for a long time, the number of patients with poor eyesight and text neck is increasing. Until recently, many studies have been published to correct posture, but most of them have limitations that users may experience discomfort because they have to correct posture by wearing equipment. A posture correction sensor algorithm is proposed to prevent access to the minimum distance between a computer monitor and a person using an ultrasonic sensor device. At this time, an algorithm for minimizing false alarms among warning alarms that sound at the minimum distance is also proposed. Because the ultrasonic sensor device is used, posture correction can be performed without attaching a device to the body, and the user can relieve discomfort. In addition, experimental results showed that accuracy can be improved by reducing false alarms by removing more than half of the noise generated during distance measurement.

Automatic Detection of Type II Solar Radio Burst by Using 1-D Convolution Neutral Network

  • Kyung-Suk Cho;Junyoung Kim;Rok-Soon Kim;Eunsu Park;Yuki Kubo;Kazumasa Iwai
    • Journal of The Korean Astronomical Society
    • /
    • v.56 no.2
    • /
    • pp.213-224
    • /
    • 2023
  • Type II solar radio bursts show frequency drifts from high to low over time. They have been known as a signature of coronal shock associated with Coronal Mass Ejections (CMEs) and/or flares, which cause an abrupt change in the space environment near the Earth (space weather). Therefore, early detection of type II bursts is important for forecasting of space weather. In this study, we develop a deep-learning (DL) model for the automatic detection of type II bursts. For this purpose, we adopted a 1-D Convolution Neutral Network (CNN) as it is well-suited for processing spatiotemporal information within the applied data set. We utilized a total of 286 radio burst spectrum images obtained by Hiraiso Radio Spectrograph (HiRAS) from 1991 and 2012, along with 231 spectrum images without the bursts from 2009 to 2015, to recognizes type II bursts. The burst types were labeled manually according to their spectra features in an answer table. Subsequently, we applied the 1-D CNN technique to the spectrum images using two filter windows with different size along time axis. To develop the DL model, we randomly selected 412 spectrum images (80%) for training and validation. The train history shows that both train and validation losses drop rapidly, while train and validation accuracies increased within approximately 100 epoches. For evaluation of the model's performance, we used 105 test images (20%) and employed a contingence table. It is found that false alarm ratio (FAR) and critical success index (CSI) were 0.14 and 0.83, respectively. Furthermore, we confirmed above result by adopting five-fold cross-validation method, in which we re-sampled five groups randomly. The estimated mean FAR and CSI of the five groups were 0.05 and 0.87, respectively. For experimental purposes, we applied our proposed model to 85 HiRAS type II radio bursts listed in the NGDC catalogue from 2009 to 2016 and 184 quiet (no bursts) spectrum images before and after the type II bursts. As a result, our model successfully detected 79 events (93%) of type II events. This results demonstrates, for the first time, that the 1-D CNN algorithm is useful for detecting type II bursts.

An Implementation Method of the Character Recognizer for the Sorting Rate Improvement of an Automatic Postal Envelope Sorting Machine (우편물 자동구분기의 구분율 향상을 위한 문자인식기의 구현 방법)

  • Lim, Kil-Taek;Jeong, Seon-Hwa;Jang, Seung-Ick;Kim, Ho-Yon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.4
    • /
    • pp.15-24
    • /
    • 2007
  • The recognition of postal address images is indispensable for the automatic sorting of postal envelopes. The process of the address image recognition is composed of three steps-address image preprocessing, character recognition, address interpretation. The extracted character images from the preprocessing step are forwarded to the character recognition step, in which multiple candidate characters with reliability scores are obtained for each character image extracted. aracters with reliability scores are obtained for each character image extracted. Utilizing those character candidates with scores, we obtain the final valid address for the input envelope image through the address interpretation step. The envelope sorting rate depends on the performance of all three steps, among which character recognition step could be said to be very important. The good character recognizer would be the one which could produce valid candidates with very reliable scores to help the address interpretation step go easy. In this paper, we propose the method of generating character candidates with reliable recognition scores. We utilize the existing MLP(multilayered perceptrons) neural network of the address recognition system in the current automatic postal envelope sorters, as the classifier for the each image from the preprocessing step. The MLP is well known to be one of the best classifiers in terms of processing speed and recognition rate. The false alarm problem, however, might be occurred in recognition results, which made the address interpretation hard. To make address interpretation easy and improve the envelope sorting rate, we propose promising methods to reestimate the recognition score (confidence) of the existing MLP classifier: the generation method of the statistical recognition properties of the classifier and the method of the combination of the MLP and the subspace classifier which roles as a reestimator of the confidence. To confirm the superiority of the proposed method, we have used the character images of the real postal envelopes from the sorters in the post office. The experimental results show that the proposed method produces high reliability in terms of error and rejection for individual characters and non-characters.

  • PDF

Development of the Algofithm for Gaussian Mixture Models based Traffic Accident Auto-Detection in Freeway (GMM(Gaussian Mixture Model)을 적용한 영상처리기법의 연속류도로 사고 자동검지 알고리즘 개발)

  • O, Ju-Taek;Im, Jae-Geuk;Yeo, Tae-Dong
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.3
    • /
    • pp.169-183
    • /
    • 2010
  • Image-based traffic information collection systems have entered widespread adoption and use in many countries since these systems are not only capable of replacing existing loop-based detectors which have limitations in management and administration, but are also capable of providing and managing a wide variety of traffic related information. In addition, these systems are expanding rapidly in terms of purpose and scope of use. Currently, the utilization of image processing technology in the field of traffic accident management is limited to installing surveillance cameras on locations where traffic accidents are expected to occur and digitalizing of recorded data. Accurately recording the sequence of situations around a traffic accident in a freeway and then objectively and clearly analyzing how such accident occurred is more urgent and important than anything else in resolving a traffic accident. Therefore, in this research, existing technologies, this freeway attribute, velocity changes, volume changes, occupancy changes reflect judge the primary. Furthermore, We pointed out by many past researches while presenting and implementing an active and environmentally adaptive methodology capable of effectively reducing false detection situations which frequently occur even with the Gaussian Mixture model analytical method which has been considered the best among well-known environmental obstacle reduction methods. Therefore, in this way, the accident was the final decision. Also, environmental factors occur frequently, and with the index finger situations, effectively reducing that can actively and environmentally adaptive techniques through accident final judgment. This implementation of the evaluate performance of the experiment road of 12 incidents in simulated and the jang-hang IC's real-time accident experiment. As a result, the do well detection 93.33%, false alarm 6.7% as showed high reliability.

Effective Harmony Search-Based Optimization of Cost-Sensitive Boosting for Improving the Performance of Cross-Project Defect Prediction (교차 프로젝트 결함 예측 성능 향상을 위한 효과적인 하모니 검색 기반 비용 민감 부스팅 최적화)

  • Ryu, Duksan;Baik, Jongmoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.3
    • /
    • pp.77-90
    • /
    • 2018
  • Software Defect Prediction (SDP) is a field of study that identifies defective modules. With insufficient local data, a company can exploit Cross-Project Defect Prediction (CPDP), a way to build a classifier using dataset collected from other companies. Most machine learning algorithms for SDP have used more than one parameter that significantly affects prediction performance depending on different values. The objective of this study is to propose a parameter selection technique to enhance the performance of CPDP. Using a Harmony Search algorithm (HS), our approach tunes parameters of cost-sensitive boosting, a method to tackle class imbalance causing the difficulty of prediction. According to distributional characteristics, parameter ranges and constraint rules between parameters are defined and applied to HS. The proposed approach is compared with three CPDP methods and a Within-Project Defect Prediction (WPDP) method over fifteen target projects. The experimental results indicate that the proposed model outperforms the other CPDP methods in the context of class imbalance. Unlike the previous researches showing high probability of false alarm or low probability of detection, our approach provides acceptable high PD and low PF while providing high overall performance. It also provides similar performance compared with WPDP.

Driver's Status Recognition Using Multiple Wearable Sensors (다중 웨어러블 센서를 활용한 운전자 상태 인식)

  • Shin, Euiseob;Kim, Myong-Guk;Lee, Changook;Kang, Hang-Bong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.6
    • /
    • pp.271-280
    • /
    • 2017
  • In this paper, we propose a new safety system composed of wearable devices, driver's seat belt, and integrating controllers. The wearable device and driver's seat belt capture driver's biological information, while the integrating controller analyzes captured signal to alarm the driver or directly control the car appropriately according to the status of the driver. Previous studies regarding driver's safety from driver's seat, steering wheel, or facial camera to capture driver's physiological signal and facial information had difficulties in gathering accurate and continuous signals because the sensors required the upright posture of the driver. Utilizing wearable sensors, however, our proposed system can obtain continuous and highly accurate signals compared to the previous researches. Our advanced wearable apparatus features a sensor that measures the heart rate, skin conductivity, and skin temperature and applies filters to eliminate the noise generated by the automobile. Moreover, the acceleration sensor and the gyro sensor in our wearable device enable the reduction of the measurement errors. Based on the collected bio-signals, the criteria for identifying the driver's condition were presented. The accredited certification body has verified that the devices has the accuracy of the level of medical care. The laboratory test and the real automobile test demonstrate that our proposed system is good for the measurement of the driver's condition.

Evaluation of Source Identification Method Based on Energy-Weighting Level with Portal Monitoring System Using Plastic Scintillator

  • Lee, Hyun Cheol;Koo, Bon Tack;Choi, Chang Il;Park, Chang Su;Kwon, Jeongwan;Kim, Hong-Suk;Chung, Heejun;Min, Chul Hee
    • Journal of Radiation Protection and Research
    • /
    • v.45 no.3
    • /
    • pp.117-129
    • /
    • 2020
  • Background: Radiation portal monitors (RPMs) involving plastic scintillators installed at the border inspection sites can detect illicit trafficking of radioactive sources in cargo containers within seconds. However, RPMs may generate false alarms because of the naturally occurring radioactive materials. To manage these false alarms, we previously suggested an energy-weighted algorithm that emphasizes the Compton-edge area as an outstanding peak. This study intends to evaluate the identification of radioactive sources using an improved energy-weighted algorithm. Materials and Methods: The algorithm was modified by increasing the energy weighting factor, and different peak combinations of the energy-weighted spectra were tested for source identification. A commercialized RPM system was used to measure the energy-weighted spectra. The RPM comprised two large plastic scintillators with dimensions of 174 × 29 × 7 ㎤ facing each other at a distance of 4.6 m. In addition, the in-house-fabricated signal processing boards were connected to collect the signal converted into a spectrum. Further, the spectra from eight radioactive sources, including special nuclear materials (SNMs), which were set in motion using a linear motion system (LMS) and a cargo truck, were estimated to identify the source identification rate. Results and Discussion: Each energy-weighted spectrum exhibited a specific peak location, although high statistical fluctuation errors could be observed in the spectrum with the increasing source speed. In particular, 137Cs and 60Co in motion were identified completely (100%) at speeds of 5 and 10 km/hr. Further, SNMs, which trigger the RPM alarm, were identified approximately 80% of the time at both the aforementioned speeds. Conclusion: Using the modified energy-weighted algorithm, several characteristics of the energy weighted spectra could be observed when the used sources were in motion and when the geometric efficiency was low. In particular, the discrimination between 60Co and 40K, which triggers false alarms at the primary inspection sites, can be improved using the proposed algorithm.