• Title/Summary/Keyword: Automatic Detection

Search Result 1,687, Processing Time 0.03 seconds

The Determination of 5-Fluorourasil in Human Plasma by a Gas Chromatography-Mass Spectrometry (GC-MS에 의한 혈중 5-fluorouracil의 정량법)

  • Shin, Ho-Sang;Seo, Bae-Seck;Oh, Yun-Suk;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.36-41
    • /
    • 1998
  • A gas chromatography-mass spectrometry method for the determination of 5-fluorourasil in human plasma is described. The method involves a single extraction procedure with 10 ml of isopropanol-ether(20:80) solution and pentafluoro-benzylation. Samples were injected using an automatic injector, followed by separation on a nonpolar capillary column and detection with a mass selective detector(MSD). No endogeneous compounds were found to interfere. The detection limit, based upon an assayed plasma volume of 0.5, was 3 ng/ml. The extraction yield was found to be above 80%. Plasma 5-FU concentrations were determined by this method in about 500 plasma samples from cancer patients undergoing treatment with 5-FU. This method is suitable for monitoring of 5-FU in plasma of cancer patients.

  • PDF

DEVELOPMENT AND IMPLEMENTATION OF DISTRIBUTED HARDWARE-IN-THE-LOOP SIMULATOR FOR AUTOMOTIVE ENGINE CONTROL SYSTEMS

  • YOON M.;LEE W.;SUNWOO M.
    • International Journal of Automotive Technology
    • /
    • v.6 no.2
    • /
    • pp.107-117
    • /
    • 2005
  • A distributed hardware-in-the-loop simulation (HILS) platform is developed for designing an automotive engine control system. The HILS equipment consists of a widely used PC and commercial-off-the-shelf (COTS) I/O boards instead of a powerful computing system and custom-made I/O boards. The distributed structure of the HILS system supplements the lack of computing power. These features make the HILS equipment more cost-effective and flexible. The HILS uses an automatic code generation extension, REAL-TIME WORKSHOP$^{ (RTW$^{) of MATLAB$^{ tool-chain and RT-LAB$^{, which enables distributed simulation as well as the detection and generation of digital event between simulation time steps. The mean value engine model, which is used in control design phase, is imported into this HILS. The engine model is supplemented with some I/O subsystems and I/O boards to interface actual input and output signals in real-time. The I/O subsystems are designed to imitate real sensor signals with high fidelity as well as to convert the raw data of the I/O boards to the appropriate forms for proper interfaces. A lot of attention is paid to the generation of a precise crank/ earn signal which has the problem of quantization in a conventional fixed time step simulation. The detection of injection! command signal which occurs between simulation time steps are also successfully compensated. In order to prove the feasibility of the proposed environment, a simple PI controller for an air-to-fuel ratio (AFR) control is used. The proposed HILS environment and I/O systems are shown to be an efficient tool to develop various control functions and to validate the software and hardware of the engine control system.

A Study on Cloud Computing for Detecting Cyber Attacks (사이버공격 탐지를 위한 클라우드 컴퓨팅 활용방안에 관한 연구)

  • Lee, Jun-Won;Cho, Jae-Ik;Lee, Seok-Jun;Won, Dong-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.816-822
    • /
    • 2013
  • In modern networks, data rate is getting faster and transferred data is extremely increased. At this point, the malicious codes are evolving to various types very fast, and the frequency of occurring new malicious code is very short. So, it is hard to collect/analyze data using general networks with the techniques like traditional intrusion detection or anormaly detection. In this paper, we collect and analyze the data more effectively with cloud environment than general simple networks. Also we analyze the malicious code which is similar to real network's malware, using botnet server/client includes DNS Spoofing attack.

Background Subtraction Algorithm Based on Multiple Interval Pixel Sampling (다중 구간 샘플링에 기반한 배경제거 알고리즘)

  • Lee, Dongeun;Choi, Young Kyu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.1
    • /
    • pp.27-34
    • /
    • 2013
  • Background subtraction is one of the key techniques for automatic video content analysis, especially in the tasks of visual detection and tracking of moving object. In this paper, we present a new sample-based technique for background extraction that provides background image as well as background model. To handle both high-frequency and low-frequency events at the same time, multiple interval background models are adopted. The main innovation concerns the use of a confidence factor to select the best model from the multiple interval background models. To our knowledge, it is the first time that a confidence factor is used for merging several background models in the field of background extraction. Experimental results revealed that our approach based on multiple interval sampling works well in complicated situations containing various speed moving objects with environmental changes.

Design and Implementation of a Book Counting System based on the Image Processing (영상처리를 이용한 도서 권수 판별 시스템 설계 및 구현)

  • Yum, Hyo-Sub;Hong, Min;Oh, Dong-Ik
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.3
    • /
    • pp.195-198
    • /
    • 2013
  • Many libraries utilize RFID tags for checking in and out of books. However, the recognition rate of this automatic process may depend on the orientation of antennas and RFID tags. Therefore we need supplemental systems to improve the recognition rate. The proposed algorithm sets up the ROI of the book existing area from the input image and then performs Canny edge detection algorithm to extract edges of books. Finally Hough line transform algorithm allows to detect the number of books from the extracted edges. To evaluate the performance of the proposed method, we applied our method to 350 book images under various circumstances. We then analyzed the performance of proposed method from results using recognition and mismatch ratio. The experimental result gave us 97.1% accuracy in book counting.

Active Security System using IP Traceback Technology (IP 역추적 기술을 이용한 능동형 보안 시스템)

  • Kim, Jae-Dong;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.933-939
    • /
    • 2007
  • There is a tremendous increase in the growth of Internet making people's life easy. The rapid growth in technology has caused misuse of the Internet like cyber Crime. There are several vulnerabilities in current firewall and Intrusion Detection Systems (IDS) of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

Variations of SST around Korea Inferred from NOAA AVHRR Data

  • Kang, Yong-Q.;Hahn, Sang-Bok;Suh, Young-Sang;Park, Sung-Joo
    • Korean Journal of Remote Sensing
    • /
    • v.17 no.2
    • /
    • pp.183-188
    • /
    • 2001
  • The NOAA AVHRR remotely sensed SST data, collected by the National Fisheries Research and Development Institute (NFRDI), are analyzed in order to understand the spatial and temporal distributions of SST in the sea near korea. Our study is based on 10-day SST images during last 7 years (1991-1997). For a time series analysis of multiple SST images, all of images must be consistent exactly at the same position by adjusting the scales and positions of each SST image. We devised an algorithm which automatically detects cloud pixels from multiple SST images. The cloud detection algorithm is based on a physical constraint that SST anomalies in the ocean do not exceed certain limits (we used $\pm$3$^{\circ}C$ as a criterion of SST anomalies). The remotely sensed SST data are tuned by comparing remotely sensed data with observed SST at coastal stations. Seasonal variations of SST are studied by harmonic fit of SST normals at each pixel and the SST anomalies are studied by statistical method. It was found that the SST anomalies are rather persistent for one or two months. Utilizing the persistency of SST anomalies, we devised an algorithm for a prediction of future SST. In the Markov lprocess model of SST anomalies, autoregression coefficients of SST anomalies during a time elapse of 10 days are between 0.5 and 0.7. The developed algorithm with automatic cloud pixel detection and rediction of future SST is expected to be incorporated to the operational real time service of SST around Korea.

Relational matching for solving initial approximation (관계영상정합을 이용한 초기근사값 결정)

  • 조우석
    • Korean Journal of Remote Sensing
    • /
    • v.12 no.1
    • /
    • pp.43-59
    • /
    • 1996
  • The objective of this research is to investigate the potential of relational matching in one of the fundamental photogrammetric processes, that is initial approximation problem. The automatic relative orientation procedures of aerial stereopairs have been investigated. The fact that the existing methods suffer from approximations, distortions (geometric and radiometric), occlusions, and breaklines is the motivation to investigate relational matching which appears to be a much more general solution. An elegant way of solving the initial approximation problem by using distinct(special) relationship from relational description is suggested and experimented. As for evaluation function, the cost function was implemented. The detection of erroneous matching is incorporated as a part of proposed relational matching scheme. Experiments with real urban area images where large numbers of repetitive patterns, breaklines, and occluded areas are present prove the feasibility of implementation of the proposed relational matching scheme. The investigation of relational matching in the domain of image matching problem provides advantages and disadvantages over the existing image matching methods and shows the future area of development and implementation of relational matching in the field of digital photogrammetry.

Analysis of Understanding Using Deep Learning Facial Expression Recognition for Real Time Online Lectures (딥러닝 표정 인식을 활용한 실시간 온라인 강의 이해도 분석)

  • Lee, Jaayeon;Jeong, Sohyun;Shin, You Won;Lee, Eunhye;Ha, Yubin;Choi, Jang-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.12
    • /
    • pp.1464-1475
    • /
    • 2020
  • Due to the spread of COVID-19, the online lecture has become more prevalent. However, it was found that a lot of students and professors are experiencing lack of communication. This study is therefore designed to improve interactive communication between professors and students in real-time online lectures. To do so, we explore deep learning approaches for automatic recognition of students' facial expressions and classification of their understanding into 3 classes (Understand / Neutral / Not Understand). We use 'BlazeFace' model for face detection and 'ResNet-GRU' model for facial expression recognition (FER). We name this entire process 'Degree of Understanding (DoU)' algorithm. DoU algorithm can analyze a multitude of students collectively and present the result in visualized statistics. To our knowledge, this study has great significance in that this is the first study offers the statistics of understanding in lectures using FER. As a result, the algorithm achieved rapid speed of 0.098sec/frame with high accuracy of 94.3% in CPU environment, demonstrating the potential to be applied to real-time online lectures. DoU Algorithm can be extended to various fields where facial expressions play important roles in communications such as interactions with hearing impaired people.

Abnormal behaviour in rock bream (Oplegnathus fasciatus) detected using deep learning-based image analysis

  • Jang, Jun-Chul;Kim, Yeo-Reum;Bak, SuHo;Jang, Seon-Woong;Kim, Jong-Myoung
    • Fisheries and Aquatic Sciences
    • /
    • v.25 no.3
    • /
    • pp.151-157
    • /
    • 2022
  • Various approaches have been applied to transform aquaculture from a manual, labour-intensive industry to one dependent on automation technologies in the era of the fourth industrial revolution. Technologies associated with the monitoring of physical condition have successfully been applied in most aquafarm facilities; however, real-time biological monitoring systems that can observe fish condition and behaviour are still required. In this study, we used a video recorder placed on top of a fish tank to observe the swimming patterns of rock bream (Oplegnathus fasciatus), first one fish alone and then a group of five fish. Rock bream in the video samples were successfully identified using the you-only-look-once v3 algorithm, which is based on the Darknet-53 convolutional neural network. In addition to recordings of swimming behaviour under normal conditions, the swimming patterns of fish under abnormal conditions were recorded on adding an anaesthetic or lowering the salinity. The abnormal conditions led to changes in the velocity of movement (3.8 ± 0.6 cm/s) involving an initial rapid increase in speed (up to 16.5 ± 3.0 cm/s, upon 2-phenoxyethanol treatment) before the fish stopped moving, as well as changing from swimming upright to dying lying on their sides. Machine learning was applied to datasets consisting of normal or abnormal behaviour patterns, to evaluate the fish behaviour. The proposed algorithm showed a high accuracy (98.1%) in discriminating normal and abnormal rock bream behaviour. We conclude that artificial intelligence-based detection of abnormal behaviour can be applied to develop an automatic bio-management system for use in the aquaculture industry.