• Title/Summary/Keyword: Automatic detection

Search Result 1,695, Processing Time 0.03 seconds

Efficient Drone Detection method using a Radio-Frequency (RF를 이용한 효과적인 드론 탐지 기법)

  • Choi, Hong-Rak;Jeong, Won-Ho;Kim, Kyung-Seok
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.26-33
    • /
    • 2017
  • A drone performs a mission through remote control or automatic control, which uses wireless communications technology. Recently the increasing use of drones, the drone signal RF detection is necessary. In this paper, we propose an efficient dron RF detection method through simulations considering Wi-Fi, Bluetooth and dedicated protocol dron communication method in ISM(Industry Science Medical) band.. After configuring an environment where a common terminal and a drone signal are mixed, a general terminal and a drone signal are distinguished from each other by using a RF characteristic according to a dron movement. The proposed drone RF detection method is the WRMD(Windowed RSSI Moving Detection) operation and the Doppler frequency identification method. The simulation environments consist to mixed for two signals and four signals. We analysis the performance to proposed drone RF detection technique thorough detection rate.

Multiple-Background Model-Based Object Detection for Fixed-Embedded Surveillance System (고정형 임베디드 감시 카메라 시스템을 위한 다중 배경모델기반 객체검출)

  • Park, Su-In;Kim, Min Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.11
    • /
    • pp.989-995
    • /
    • 2015
  • Due to the recent increase of the importance and demand of security services, the importance of a surveillance monitor system that makes an automatic security system possible is increasing. As the market for surveillance monitor systems is growing, price competitiveness is becoming important. As a result of this trend, surveillance monitor systems based on an embedded system are widely used. In this paper, an object detection algorithm based on an embedded system for a surveillance monitor system is introduced. To apply the object detection algorithm to the embedded system, the most important issue is the efficient use of resources, such as memory and processors. Therefore, designing an appropriate algorithm considering the limit of resources is required. The proposed algorithm uses two background models; therefore, the embedded system is designed to have two independent processors. One processor checks the sub-background models for if there are any changes with high update frequency, and another processor makes the main background model, which is used for object detection. In this way, a background model will be made with images that have no objects to detect and improve the object detection performance. The object detection algorithm utilizes one-dimensional histogram distribution, which makes the detection faster. The proposed object detection algorithm works fast and accurately even in a low-priced embedded system.

ANALYSIS OF HUMAN DECISION MAKING PROCESS BASED ON CONDITIONAL PROBABLILTY

  • Nakamura, Masatoshi;Goto, Satoru
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.783-786
    • /
    • 1997
  • Automatic realization of on-off human decision making was derived based on a conditional probability. Following the proposed procedure, problems of insulator washing timing in power substations and spike detection on EEG(electroencephalogram) records were appropriately solved.

  • PDF

Real Time Edge Detection for Rounding Machines Using by CCD Vision (Vision을 이용한 실시간 모서리 가공부재의 에지검출 자동화)

  • 박종현;함이준;노태정;김경환;손상익
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.695-698
    • /
    • 2000
  • Round-cornering machines are mainly used for cornering of stiffners for ship buildings. In the present time they have been operated manually by operators. so they are need to be operated automatically without regard to any shapes of stiffners. We developed the automatic round cornering system which consists of CCd Camera, PC and laser diode to detect automatically the edge of stiffners to be processed

  • PDF

Automatic Face Recognition Using Neural Network (신경회로망에 기초한 자동얼굴인식)

  • 김재철;이민중;김현식;최영규
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.417-417
    • /
    • 2000
  • This paper proposes a face detection and recognition method that combines the template matching method and the eigenface method with the neural network. In the face extraction step, the skin color information is used. Therefore, the search region is reduced. The global property of the face is achieved by the eigenface method. Face recognition is performed by a neural network that can learn the face property.

  • PDF

Robust Scene Change Detection Method for MPEG Video (MPEG 동영상에서의 강인한 장면 전환 검출 기법의 연구)

  • 이흔진;이재호;김회율
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.157-160
    • /
    • 2002
  • Scene change detection is the fundamental process of automatic video indexing and retrieving. In this paper we propose a method which utilizes both compressed and uncompressed domain methods to detect scene change in a video. Candidate locations for scene change are estimated from DC images and motion vector information in compressed domain. And candidate frames are verified using edge histogram distance and color histogram distance, in uncompressed domain. The experimental results show that scene change can be detected fast and correctly by proposed method.

  • PDF

A Study on Detection of Runout Eccentric Error Using CCS Sensor at CNC Lathe (CNC선반에서 주축변위센서를 이용한 가공편심오차의 검출에 관한 연구)

  • 양재생;맹희영
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2002.10a
    • /
    • pp.468-473
    • /
    • 2002
  • This paper presents the methodology for measuring eccentricity of the cylindricaliy machined part using CCS(Cylindrical Capacity Spindle Sensor) signal in the CNC turning process. In order to investigate the relationships between CCS orbits and eccentricities, the initial conditions for various eccentricity state and machining process is applied to the experimental strategy. AS a result, it is considered the linearities of CCS signal and magnitude of eccentricity of machined cylindrical surfaces based on the possibility as a automatic detection apparatus for the CNC lathe.

  • PDF

Automatic Change Detection of Digital Elevation Models Using Matching Method

  • Lee, Seung-Woo;Lee, Ho-Nam;Oh, Hae-Seok
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.393-395
    • /
    • 2003
  • The changes of DEMs(Digital Elevation Models) will be detected to correct the information of DEMs and/or to get the information about themselves. This study suggests the evaluation of DEM using correlation coefficient value between the target and the reference DEMs for detect the changes.

  • PDF

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

A Fuzzy Logic System for Detection and Recognition of Human in the Automatic Surveillance System (유전자 알고리즘과 퍼지규칙을 기반으로한 지능형 자동감시 시스템의 개발)

  • 장석윤;박민식;이영주;박민용
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.237-240
    • /
    • 2001
  • An image processing and decision making method for the Automatic Surveillance System is proposed. The aim of our Automatic Surveillance System is to detect a moving object and make a decision on whether it is human or not. Various object features such as the ratio of the width and the length of the moving object, the distance dispersion between the principal axis and the object contour, the eigenvectors, the symmetric axes, and the areas if the segmented region are used in this paper. These features are not the unique and decisive characteristics for representing human Also, due to the outdoor image property, the object feature information is unavoidably vague and inaccurate. In order to make an efficient decision from the information, we use a fuzzy rules base system ai an approximate reasoning method. The fuzzy rules, combining various object features, are able to describe the conditions for making an intelligent decision. The fuzzy rule base system is initially constructed by heuristic approach and then, trained and tasted with input/output data Experimental result are shown, demonstrating the validity of our system.

  • PDF