• Title/Summary/Keyword: Detection Systems

Search Result 5,982, Processing Time 0.036 seconds

Design of Remote Early Dementia Diagnosis Systems (원격 치매 조기 진단 시스템 설계)

  • Choi, Jongmyung;Jeon, Gyeong-Suk;Kim, Sunkyung;Choi, Jungmin;Rhyu, Dong Young;Yoon, Sook
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.27-32
    • /
    • 2020
  • Along with the aging of the population, the number of dementia patients is increasing, and the social and economic burden is also increasing. Currently, the effective way to manage dementia patients is to identify patients with dementia early. However, in rural and island areas where medical staff are scarce, there is a problem that it is difficult to visit a hospital and get an early examination. Therefore, we propose a remote early detection system for dementia to solve the problems. The remote dementia early diagnosis system is a system that allows a patient to receive examination and treatment from a remote dementia expert using remote medical technology based on real-time image communication. The remote early diagnosis system for dementia consists of a local client system used by medical staff at health centers in the island, an image server that transmits, stores and manages images, and an expert client used by remote dementia experts. The local client subsystem satisfies the current medical law's remote collaboration by allowing the patient to use it with the health center's medical staff. In addition, expert clients are used by dementia experts, and can store/manage patient information, analyze patient history information, and predict the degree of dementia progression in the future.

Outbreak of Fire Blight of Apple and Pear and Its Characteristics in Korea in 2019 (2019년 국내 사과와 배 화상병 대발생과 그 특징)

  • Ham, Hyeonheui;Lee, Kyong Jae;Hong, Seong Jun;Kong, Hyun Gi;Lee, Mi-Hyun;Kim, Hyun-Ran;Lee, Yong Hwan
    • Research in Plant Disease
    • /
    • v.26 no.4
    • /
    • pp.239-249
    • /
    • 2020
  • To find out the cause of the fire blight outbreak in apples and pears of Korea in 2019, we investigated disease appearing situation of thirty fire blight infected orchards, and interviewed farmers to determine the cultivation characteristics. Fire blight occurred mostly in orchards that had infected more than 2 years before. The cause of this were as follows: farmers did not know the symptoms of the disease properly. It is presumed that it has spread from the first occurrence to the surrounding orchards by flower-visiting insects or farmers and to a short distance or a long distance by the same cultivator or co-farmer. These series of processes repeated in the newly spreading area, and then disease reports increased as farmers became aware of fire blight. To minimize the spread of fire blight in Korea, it suggested that thorough education of farmers for early diagnosis and quantitative detection technology that can diagnose even in no symptom showing plants. And chemical or biological spraying systems suitable for domestic cultivation methods, which are producing large fruits, and molecular epidemiological studies of pathogens.

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Effect of Hypersonic Missiles on Maritime Strategy: Focus on Securing and Exploiting Sea Control (극초음속 미사일이 해양전략에 미치는 영향: 해양통제의 확보와 행사를 중심으로)

  • Cho, Seongjin
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.241-271
    • /
    • 2020
  • The military technology currently receiving the most attention is the hypersonic missile. hypersonic is faster than the speed of sound or Mach 5+. The vast majority of the ballistic missiles that it inspired achieved hypersonic speeds as they fell from the sky. Rather than speed, today's renewed attention to hypersonic weapons owes to developments that enable controlled flight. These new systems have two sub-varieties: hypersonic glide vehicles and hypersonic cruise missiles. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. The fundamental question of this study is: 'What effect will the hypersonic missile have on the maritime strategy?' It is quite prudent to analyze and predict the impact of technology in the development stage on strategy in advance. However, strategy is essential because it affect future force construction. hypersonic missiles act as a limiting factor in securing sea control. The high speed and powerful destructive power of the hypersonic missile are not only difficult to intercept, but it also causes massive ship damage at a single shot. As a result, it is analyzed that the Securing sea control will be as difficult as the capacity of sea denial will be improved geographically and qualitatively. In addition, the concept of Fortress Fleet, which was criticized for its passive strategy in the past, could be reborn in a modern era. There are maritime power projection/defence, SLOC attack/defence in exploiting sea control. The effects of hypersonic missiles on exploiting sea control could be seen as both limiting and opportunity factors.

  • PDF

Technology Development for Non-Contact Interface of Multi-Region Classifier based on Context-Aware (상황 인식 기반 다중 영역 분류기 비접촉 인터페이스기술 개발)

  • Jin, Songguo;Rhee, Phill-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.175-182
    • /
    • 2020
  • The non-contact eye tracking is a nonintrusive human-computer interface providing hands-free communications for people with severe disabilities. Recently. it is expected to do an important role in non-contact systems due to the recent coronavirus COVID-19, etc. This paper proposes a novel approach for an eye mouse using an eye tracking method based on a context-aware based AdaBoost multi-region classifier and ASSL algorithm. The conventional AdaBoost algorithm, however, cannot provide sufficiently reliable performance in face tracking for eye cursor pointing estimation, because it cannot take advantage of the spatial context relations among facial features. Therefore, we propose the eye-region context based AdaBoost multiple classifier for the efficient non-contact gaze tracking and mouse implementation. The proposed method detects, tracks, and aggregates various eye features to evaluate the gaze and adjusts active and semi-supervised learning based on the on-screen cursor. The proposed system has been successfully employed in eye location, and it can also be used to detect and track eye features. This system controls the computer cursor along the user's gaze and it was postprocessing by applying Gaussian modeling to prevent shaking during the real-time tracking using Kalman filter. In this system, target objects were randomly generated and the eye tracking performance was analyzed according to the Fits law in real time. It is expected that the utilization of non-contact interfaces.

Platelet-Derived Growth Factor Receptor-α Subunit Targeting Suppresses Metastasis in Advanced Thyroid Cancer In Vitro and In Vivo

  • Lin, Ching-Ling;Tsai, Ming-Lin;Chen, Yu-hsin;Liu, Wei-Ni;Lin, Chun-Yu;Hsu, Kai-Wen;Huang, Chien-Yu;Chang, Yu-Jia;Wei, Po-Li;Chen, Shu-Huey;Huang, Li-Chi;Lee, Chia-Hwa
    • Biomolecules & Therapeutics
    • /
    • v.29 no.5
    • /
    • pp.551-561
    • /
    • 2021
  • Thyroid cancer is the most common endocrine malignancy. Patients with well-differentiated thyroid cancers, such as papillary and follicular cancers, have a favorable prognosis. However, poorly differentiated thyroid cancers, such as medullary, squamous and anaplastic advanced thyroid cancers, are very aggressive and insensitive to radioiodine treatment. Thus, novel therapies that attenuate metastasis are urgently needed. We found that both PDGFC and PDGFRA are predominantly expressed in thyroid cancers and that the survival rate is significantly lower in patients with high PDGFRA expression. This finding indicates the important role of PDGF/PDGFR signaling in thyroid cancer development. Next, we established a SW579 squamous thyroid cancer cell line with 95.6% PDGFRA gene insertion and deletions (indels) through CRISPR/Cas9. Protein and invasion analysis showed a dramatic loss in EMT marker expression and metastatic ability. Furthermore, xenograft tumors derived from PDGFRA geneedited SW579 cells exhibited a minor decrease in tumor growth. However, distant lung metastasis was completely abolished upon PDGFRA gene editing, implying that PDGFRA could be an effective target to inhibit distant metastasis in advanced thyroid cancers. To translate this finding to the clinic, we used the most relevant multikinase inhibitor, imatinib, to inhibit PDGFRA signaling. The results showed that imatinib significantly suppressed cell growth, induced cell cycle arrest and cell death in SW579 cells. Our developed noninvasive apoptosis detection sensor (NIADS) indicated that imatinib induced cell apoptosis through caspase-3 activation. In conclusion, we believe that developing a specific and selective targeted therapy for PDGFRA would effectively suppress PDGFRA-mediated cancer aggressiveness in advanced thyroid cancers.

Detection Scheme Based on Gauss - Seidel Method for OTFS Systems (OTFS 시스템을 위한 Gauss - Seidel 방법 기반의 검출 기법)

  • Cha, Eunyoung;Kim, Hyeongseok;Ahn, Haesung;Kwon, Seol;Kim, Jeongchang
    • Journal of Broadcast Engineering
    • /
    • v.27 no.2
    • /
    • pp.244-247
    • /
    • 2022
  • In this paper, the performance of the decoding schemes using linear MMSE filters in the frequency and time domains and the reinforcement Gauss-Seidel algorithm for the orthogonal time frequency space (OTFS) system that can improve robustness under high-speed mobile environments are compared. The reinforcement Gauss-Seidel algorithm can improve the bit error rate performance by suppressing the noise enhancement. The simulation results show that the performance of the decoding scheme using the linear MMSE filter in the frequency domain is severely degraded due to the effect of Doppler shift as the mobile speed increases. In addition, the decoding scheme using the reinforcement Gauss-Seidel algorithm under the channel environment with 120 km/h and 500 km/h speeds outperforms the decoding schemes using linear MMSE filters in the frequency and time domains.

Counting and Localizing Occupants using IR-UWB Radar and Machine Learning

  • Ji, Geonwoo;Lee, Changwon;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • Localization systems can be used with various circumstances like measuring population movement and rescue technology, even in security technology (like infiltration detection system). Vision sensors such as camera often used for localization is susceptible with light and temperature, and can cause invasion of privacy. In this paper, we used ultra-wideband radar technology (which is not limited by aforementioned problems) and machine learning techniques to measure the number and location of occupants in other indoor spaces behind the wall. We used four different algorithms and compared their results, including extremely randomized tree for four different situations; detect the number of occupants in a classroom, split the classroom into 28 locations and check the position of occupant, select one out of the 28 locations, divide it into 16 fine-grained locations, and check the position of occupant, and checking the positions of two occupants (existing in different locations). Overall, four algorithms showed good results and we verified that detecting the number and location of occupants are possible with high accuracy using machine learning. Also we have considered the possibility of service expansion using the oneM2M standard platform and expect to develop more service and products if this technology is used in various fields.

A Study on the Design and Implementation of a Thermal Imaging Temperature Screening System for Monitoring the Risk of Infectious Diseases in Enclosed Indoor Spaces (밀폐공간 내 감염병 위험도 모니터링을 위한 열화상 온도 스크리닝 시스템 설계 및 구현에 대한 연구)

  • Jae-Young, Jung;You-Jin, Kim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.2
    • /
    • pp.85-92
    • /
    • 2023
  • Respiratory infections such as COVID-19 mainly occur within enclosed spaces. The presence or absence of abnormal symptoms of respiratory infectious diseases is judged through initial symptoms such as fever, cough, sneezing and difficulty breathing, and constant monitoring of these early symptoms is required. In this paper, image matching correction was performed for the RGB camera module and the thermal imaging camera module, and the temperature of the thermal imaging camera module for the measurement environment was calibrated using a blackbody. To detection the target recommended by the standard, a deep learning-based object recognition algorithm and the inner canthus recognition model were developed, and the model accuracy was derived by applying a dataset of 100 experimenters. Also, the error according to the measured distance was corrected through the object distance measurement using the Lidar module and the linear regression correction module. To measure the performance of the proposed model, an experimental environment consisting of a motor stage, an infrared thermography temperature screening system and a blackbody was established, and the error accuracy within 0.28℃ was shown as a result of temperature measurement according to a variable distance between 1m and 3.5 m.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.