• 제목/요약/키워드: Approach Detection System

검색결과 895건 처리시간 0.027초

Automatic Detection Approach of ship using RADARSAT-l

  • Kwon Seung-Joon;Yoo KiYun;Kim Kyoung-Ok;Yang Chan-Su
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.290-293
    • /
    • 2005
  • This paper proposes and evaluates a new approach to detect ships as targets from Radarslit-l SAR (Synthetic Aperture Radar) imagery in the vicinity of Korean peninsula. To be more specific, a labeling technique and morphological filtering in conjunction with some other methods are employed to automatically detect the ships. From the test, the ships are revealed to be detected. For ground truth data, information from a radar system is used, which allows assessing accuracy of the approach. The results showed that the proposed approach has the high potential in automatically detecting the ships

  • PDF

Automatic Detection Approach of Ship using RADARSAT-1 Synthetic Aperture Radar

  • Kwan, Seung-Joon;Gong, In-Young;Yang, Chan-Su
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2005년도 춘계학술대회 논문집
    • /
    • pp.147-152
    • /
    • 2005
  • This paper proposes an evaluates a new approach to detect ships as targets from Radarsat-1 SAR (Synthetic Aperture Radar) imagery in the vicinity of Korean peninsula. To be more specific, a labeling technique and morphological filtering in conjunction with some other methods are employed to automatically detect the ships. From the test, the ships are revealed to be detected. For ground truth data, information from a radar system is used, which allows assessing accuracy of the approach. The results showed that the proposed approach has the high potential in automatically detecting the ships.

  • PDF

Developing an Intrusion Detection Framework for High-Speed Big Data Networks: A Comprehensive Approach

  • Siddique, Kamran;Akhtar, Zahid;Khan, Muhammad Ashfaq;Jung, Yong-Hwan;Kim, Yangwoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.4021-4037
    • /
    • 2018
  • In network intrusion detection research, two characteristics are generally considered vital to building efficient intrusion detection systems (IDSs): an optimal feature selection technique and robust classification schemes. However, the emergence of sophisticated network attacks and the advent of big data concepts in intrusion detection domains require two more significant aspects to be addressed: employing an appropriate big data computing framework and utilizing a contemporary dataset to deal with ongoing advancements. As such, we present a comprehensive approach to building an efficient IDS with the aim of strengthening academic anomaly detection research in real-world operational environments. The proposed system has the following four characteristics: (i) it performs optimal feature selection using information gain and branch-and-bound algorithms; (ii) it employs machine learning techniques for classification, namely, Logistic Regression, Naïve Bayes, and Random Forest; (iii) it introduces bulk synchronous parallel processing to handle the computational requirements of large-scale networks; and (iv) it utilizes a real-time contemporary dataset generated by the Information Security Centre of Excellence at the University of Brunswick (ISCX-UNB) to validate its efficacy. Experimental analysis shows the effectiveness of the proposed framework, which is able to achieve high accuracy, low computational cost, and reduced false alarms.

A novel transmissibility concept based on wavelet transform for structural damage detection

  • Fan, Zhe;Feng, Xin;Zhou, Jing
    • Smart Structures and Systems
    • /
    • 제12권3_4호
    • /
    • pp.291-308
    • /
    • 2013
  • A novel concept of transmissibility based on a wavelet transform for structural damage detection is presented in this paper. The main objective of the research was the development of a method for detecting slight damage at the incipient stage. As a vibration-based approach, the concept of transmissibility has attracted considerable interest because of its advantages and effectiveness in damage detection. However, like other vibration-based methods, transmissibility-based approaches suffer from insensitivity to slight local damage because of the regularity of the traditional Fourier transform. Therefore, the powerful signal processing techniques must be found to solve this problem. Wavelet transform that is able to capture subtle information in measured signals has received extensive attention in the field of damage detection in recent decades. In this paper, we first propose a novel transmissibility concept based on the wavelet transform. Outlier analysis was adopted to construct a damage detection algorithm with wavelet-based transmissibility. The feasibility of the proposed method was numerically investigated with a typical six-degrees-of-freedom spring-mass system, and comparative investigations were performed with a conventional transmissibility approach. The results demonstrate that the proposed transmissibility is more sensitive than conventional transmissibility, and the former is a promising tool for structural damage detection at the incipient stage.

A Fault Detection Method of Redundant IMU Using Modified Principal Component Analysis

  • Lee, Won-Hee;Park, Chan-Gook
    • International Journal of Aeronautical and Space Sciences
    • /
    • 제13권3호
    • /
    • pp.398-404
    • /
    • 2012
  • A fault detection process is necessary for high integrity systems like satellites, missiles and aircrafts. Especially, the satellite has to be expected to detect faults autonomously because it cannot be fixed by an expert in the space. Faults can cause critical errors to the entire system and the satellite does not have sufficient computation power to operate a large scale fault management system. Thus, a fault detection method, which has less computational burden, is required. In this paper, we proposed a modified PCA (Principal Component Analysis) as a powerful fault detection method of redundant IMU (Inertial Measurement Unit). The proposed method combines PCA with the parity space approach and it is much more efficient than the others. The proposed fault detection algorithm, modified PCA, is shown to outperform fault detection through a simulation example.

Approximate ML Detection with the Best Channel Matrix Selection for MIMO Systems

  • Jin, Ji-Yu;Kim, Seong-Cheol;Park, Yong-Wan
    • Journal of Electrical Engineering and Technology
    • /
    • 제3권2호
    • /
    • pp.280-284
    • /
    • 2008
  • In this paper, a best channel matrix selection scheme(BCMS) is proposed to approximate maximum likelihood(ML) detection for a multiple-input multiple-output system. For a one stage BCMS scheme, one of the transmitted symbols is selected to perform ML detection and the other symbols are detected by zero forcing(ZF). To increase the diversity of the symbols that are detected by ZF, multi-stage BCMS detection scheme is used to further improve the system performance. Simulation results show that the performance of the proposed BCMS scheme can approach that of ML detection with a significant reduction in complexity.

SURF와 Label Cluster를 이용한 이동형 카메라에서 동적물체 추출 (Moving Object Detection Using SURF and Label Cluster Update in Active Camera)

  • 정용한;박은수;이형호;왕덕창;허욱열;김학일
    • 제어로봇시스템학회논문지
    • /
    • 제18권1호
    • /
    • pp.35-41
    • /
    • 2012
  • This paper proposes a moving object detection algorithm for active camera system that can be applied to mobile robot and intelligent surveillance system. Most of moving object detection algorithms based on a stationary camera system. These algorithms used fixed surveillance system that does not consider the motion of the background or robot tracking system that track pre-learned object. Unlike the stationary camera system, the active camera system has a problem that is difficult to extract the moving object due to the error occurred by the movement of camera. In order to overcome this problem, the motion of the camera was compensated by using SURF and Pseudo Perspective model, and then the moving object is extracted efficiently using stochastic Label Cluster transport model. This method is possible to detect moving object because that minimizes effect of the background movement. Our approach proves robust and effective in terms of moving object detection in active camera system.

A FUZZY-BASED APPROACH FOR TRAFFIC JAM DETECTION

  • Abd El-Tawaba, Ayman Hussein;Abd El Fattah, Tarek;Mahmood, Mahmood A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.257-263
    • /
    • 2021
  • Though many have studied choosing one of the alternative ways to reach a destination, the factors such as average road speed, distance, and number of traffic signals, traffic congestion, safety, and services still presents an indisputable challenge. This paper proposes two approaches: Appropriate membership function and ambiguous rule-based approach. It aims to tackle the route choice problem faced by almost all drivers in any city. It indirectly helps in tackling the problem of traffic congestion. The proposed approach considers the preference of each driver which is determined in a flexible way like a human and stored in the driver profile. These preferences relate to the criteria for evaluating each candidate route, considering the average speed, distance, safety, and services available. An illustrative case study demonstrates the added value of the proposed approach compared to some other approaches.

Novel Approach for Eliminating BER Irreducible Floor in the Enhanced Blind Cyclic Detection for Space-Time Coding

  • Pham, Van-Su;Le, Minh-Tuan;Mai, Linh;Kabir, S.M.Humayun;Yoon, Gi-Wan
    • Journal of information and communication convergence engineering
    • /
    • 제6권2호
    • /
    • pp.150-153
    • /
    • 2008
  • In the blind Maximum-likelihood (ML) detection for Orthogonal Space-Time Block Codes (OSTBC), the problem of ambiguity in determining the symbols has been a great concern. A possible solution to this problem is to apply semi-blind ML detection, i.e. the blind ML decoding with pilot symbols or training sequence. In order to increase the performance, the number of pilot symbols or length of training sequence should be increased. Unfortunately, this leads to a significantly decrease in system spectral efficiency. This work presents an approach to resolve the aforementioned issue by introducing a new method for constructing transmitted information symbols, in which transmitting information symbols drawn form different modulation constellations. Therefore, the ambiguity can be easily eliminated. In addition, computer simulation is implemented to verify the performance of the proposed approach.

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • 제9권2호
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.