• Title/Summary/Keyword: Detection Model

Search Result 5,030, Processing Time 0.03 seconds

Real-time Human Detection under Omni-dir ectional Camera based on CNN with Unified Detection and AGMM for Visual Surveillance

  • Nguyen, Thanh Binh;Nguyen, Van Tuan;Chung, Sun-Tae;Cho, Seongwon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1345-1360
    • /
    • 2016
  • In this paper, we propose a new real-time human detection under omni-directional cameras for visual surveillance purpose, based on CNN with unified detection and AGMM. Compared to CNN-based state-of-the-art object detection methods. YOLO model-based object detection method boasts of very fast object detection, but with less accuracy. The proposed method adapts the unified detecting CNN of YOLO model so as to be intensified by the additional foreground contextual information obtained from pre-stage AGMM. Increased computational time incurred by additional AGMM processing is compensated by speed-up gain obtained from utilizing 2-D input data consisting of grey-level image data and foreground context information instead of 3-D color input data. Through various experiments, it is shown that the proposed method performs better with respect to accuracy and more robust to environment changes than YOLO model-based human detection method, but with the similar processing speeds to that of YOLO model-based one. Thus, it can be successfully employed for embedded surveillance application.

Fault Detection Method of Laser Inertial Navigation System Based on the Overlapping Model (중첩모델 기반 레이저 관성항법장치 고장검출 기법)

  • Kim, Cheon-Joong;Yoo, Ki-Jeong;Kim, Hyeon-Suk;Lyou, Joon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.11
    • /
    • pp.1106-1116
    • /
    • 2011
  • LINS (Laser Inertial Navigation System) consists of RLG (Ring Laser Gyroscopes)/accelerometers and provides real-time navigation information to the target system. Therefore it is very important to make a decision in the real time whether LINS is in the normal operation or not. That is called a fault detection method. In this paper, we propose the fault detection method of LINS based on the overlapping model. We also show that the fault detection probability is increased through overlapping the hardware model and the software model. It is verified through the long-term operation and RAM (Reliability Availability Maintainability) analysis of LINS that the fault detection method proposed in this paper is able to detect about 97% of probable system failures.

Experimental Verification of Crack Detection Model using Vibration Measurement (진동실험에 의한 균열발견모델의 실험적 검증)

  • Kim Jeong Tae;Ryu Yeon Sun;Song Chul Min;Cho Hyun Man
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1998.04a
    • /
    • pp.309-316
    • /
    • 1998
  • In this paper, a newly derived formulation of a crack detection model is presented and its feasibility to detect cracks in structures is verified experimentally. To meet this objective, the followig approach is utilized. Firstly, the crack detection scheme which consists of the damage localization model and the crack detection model is formulated. Secondly, the feasibility and practicality of the complete procedure of the crack detection model is evaluated by locating and sizing cracks in clamped-clamped beams for which a f3w modal parameters were measured for sixteen uncracked and cracked states. Major results observed from the crack detection exercises include that far most damage cases, the predicted crack locations falls within very close to the inflicted locations of cracks in the test beam and the size of crack values estimated at the predicted locations are very close to the inflicted magnitudes.

  • PDF

An Adaptive Probe Detection Model using Fuzzy Cognitive Maps

  • Lee, Se-Yul;Kim, Yong-Soo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.660-663
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using Fuzzy Cognitive Maps(FCM) that can detect intrusion by the Denial of Service(DoS) attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The Sp flooding Preventer using Fuzzy cognitive maps(SPuF) model captures and analyzes the packet information to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulating the "KDD ′99 Competition Data Set" in the SPuF model shows that the Probe detection rates were over 97 percentages.

  • PDF

A Study on the Fault Detection of an Integrated Servo Actuator (통합 서보 액츄에이터의 고장 감지시스템 연구)

  • 신기현;임광호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1996.11a
    • /
    • pp.306-312
    • /
    • 1996
  • The performance of the failure detection algorithm may be greatly influenced by the model uncertainty. It is very important to design a robust failure detection system to the model uncertainty. In this paper, a design procedure to generate failure detection algorithm is proposed. The design procedure suggested is based on the concept of the‘threshold selector[1]’. The H$\infty$ control algorithm is used to derive a threshold selector which is robust to the model uncertainty, The threshold selector derived can be used to develop a failure detection system together with the weighted cumulative sum algorithm[3]. Computer simulation study showed that the failure detection system designed for an ISA(Integrated Servo Actuator) system by using the proposed method is robust to the model uncertainty.

  • PDF

Safety Inspection Surveying using Change Detection Technique (Change Detection 기법을 이용한 구조물 안전진단측량)

  • Choi, Chul-Ung;Khak, Jae-Ha;Kang, In-Joon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.3 no.2 s.6
    • /
    • pp.151-158
    • /
    • 1995
  • Change detection, image differencing technique, is the most widely used in a variety of image environments. The digital terrain model and digital images have the same data structure. This study applied digital terrain model and change detection technique for inspecting the deflection of the structure. Authors make digital terrain model from triangular irregular network(TIN) by leveling data and suggest to possibility recognize modification part and volumes by digital terrain model and change detection technique. Authors can reduce testing materials and man power, and displayed his modification part.

  • PDF

Application of robust fault detection method for uncertain systms to diesel engine system (불확실성을 고려한 디젤엔진의 견실한 이상검출)

  • 유경상;김대우;권오규
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.1419-1422
    • /
    • 1997
  • This paper deals with the Appliation of robust fault detection problem in uncertain linear systems, having both model mismatch and noise. A robust fault detection method presented by Kwon et al.(1994) for SISO uncertain systems. Here we experimented this method to the diesel engine systems described by difference ARMA models. The model mismatch includes here linearization error as well as undermodeling. Comparisons are made with alternative fault detection method which do not account noise. The new method is shown to have good performance.

  • PDF

Robust fault detection method for uncertain multivariable systems (불확실성을 갖는 다변수 시스템의 이상검출기법)

  • 홍일선;김대우;권오규
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.710-713
    • /
    • 1996
  • This paper deals with the fault detection problem in uncertain linear multivariable systems having both model mismatch and noise. A robust detection presented by Kwon et al.(1994) for SISO systems has been here extended to the multivariable systems are derived. The model mismatch includes here linearization error as well as undermodelling. Comparisons are made with alternative fault detection method which do not account noise. The new method is shown to have good performance.

  • PDF

Detection Range of Passive Sonar System in Range-Dependent Ocean Environment (거리의존 해양환경에서 수동소나체계의 표적탐지거리예측)

  • Kim, Tae-Hak;Kim, Jea-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.16 no.4
    • /
    • pp.29-34
    • /
    • 1997
  • The prediction of detection range of a passive sonar system is essential to estimate the performance and to optimize the operation of a developed sonar system. In this paper, a model for the prediction of detection range in a range-dependent ocean environment based on the sonar equation is developed and tested. The prediction model calculates the transmission loss using PE propagation model, signal excess, and the detection probability at each target depth and range. The detection probability is integrated to give the estimated detection range. In order to validate the developed model, two cases are considered. One is the case when target depth is known. The other is the case when the target depth is unknown. The computational results agree well with the previously published results for the range-independent environment. Also,the developed model is applied to the range-dependent ocean environment where the warm eddy exists. The computational results are shown and discussed. The developed model can be used to find the optimal frequency of detection, as well as the optimal search depth for the given range-dependent ocean environment.

  • PDF

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.239-251
    • /
    • 2018
  • In existing cloud services, information security and privacy concerns have been worried, and have become one of the major factors that hinder the popularization and promotion of cloud computing. As the cloud computing infrastructure, the security of virtual machine systems is very important. This paper presents an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted I-VMIDS, to ensure the safety of user-level applications in client virtual machines. The model extracts system call sequences of programs, abstracts them into antigens, fuses environmental information of client virtual machines into danger signals, and implements intrusion detection by immune mechanisms. The model is capable of detecting attacks on processes which are statically tampered, and is able to detect attacks on processes which are dynamically running. Therefore, the model supports high real time. During the detection process, the model introduces information monitoring mechanism to supervise intrusion detection program, which ensures the authenticity of the test data. Experimental results show that the model does not bring much spending to the virtual machine system, and achieves good detection performance. It is feasible to apply I-VMIDS to the cloud computing platform.