• Title/Summary/Keyword: Detection and identification Mechanism

Search Result 35, Processing Time 0.021 seconds

Depth Image Based Feature Detection Method Using Hybrid Filter (융합형 필터를 이용한 깊이 영상 기반 특징점 검출 기법)

  • Jeon, Yong-Tae;Lee, Hyun;Choi, Jae-Sung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.395-403
    • /
    • 2017
  • Image processing for object detection and identification has been studied for supply chain management application with various approaches. Among them, feature pointed detection algorithm is used to track an object or to recognize a position in automated supply chain systems and a depth image based feature point detection is recently highlighted in the application. The result of feature point detection is easily influenced by image noise. Also, the depth image has noise itself and it also affects to the accuracy of the detection results. In order to solve these problems, we propose a novel hybrid filtering mechanism for depth image based feature point detection, it shows better performance compared with conventional hybrid filtering mechanism.

Idle Slots Skipped Mechanism based Tag Identification Algorithm with Enhanced Collision Detection

  • Su, Jian;Xu, Ruoyu;Yu, ShiMing;Wang, BaoWei;Wang, Jiuru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2294-2309
    • /
    • 2020
  • In this article, a new Aloha-based tag identification protocol is presented to improve the reading efficiency of the EPC C1 Gen2-based UHF RFID system. Collision detection (CD) plays a vital role in tag identification process which determines the efficiency of anti-collision protocols since most Aloha-based protocols optimize the incoming frame length based on the collisions in current frame. Existing CD methods are ineffective in identifying collision, resulting in a degradation of identification performance. Our proposed algorithm adopts an enhanced CD (ECD) scheme based on the EPC C1 Gen2 standard to optimize identification performance. The ECD method can realize timely and effective CD by detecting the pulse width of the randomly sent by tags. According to the ECD, the reader detects the slot distribution and predicts tag cardinality in every collision slot. The tags involved in each collision slot are identified by independently assigned sub-frames. A large number of numerical results show that the proposed solution is superior to other existing anti-collision protocols in various performance evaluation metrics.

Fault Detection and Diagnosis System for a Three-Phase Inverter Using a DWT-Based Artificial Neural Network

  • Rohan, Ali;Kim, Sung Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.4
    • /
    • pp.238-245
    • /
    • 2016
  • Inverters are considered the basic building blocks of industrial electrical drive systems that are widely used for various applications; however, the failure of electronic switches mainly affects the constancy of these inverters. For safe and reliable operation of an electrical drive system, faults in power electronic switches must be detected by an efficient system that is capable of identifying the type of faults. In this paper, an open switch fault identification technique for a three-phase inverter is presented. Single, double, and triple switching faults can be diagnosed using this method. The detection mechanism is based on stator current analysis. Discrete wavelet transform (DWT) using Daubechies is performed on the Clarke transformed (-) stator current and features are extracted from the wavelets. An artificial neural network is then used for the detection and identification of faults. To prove the feasibility of this method, a Simulink model of the DWT-based feature extraction scheme using a neural network for the proposed fault detection system in a three-phase inverter with an induction motor is briefly discussed with simulation results. The simulation results show that the designed system can detect faults quite efficiently, with the ability to differentiate between single and multiple switching faults.

Structural damage detection based on Chaotic Artificial Bee Colony algorithm

  • Xu, H.J.;Ding, Z.H.;Lu, Z.R.;Liu, J.K.
    • Structural Engineering and Mechanics
    • /
    • v.55 no.6
    • /
    • pp.1223-1239
    • /
    • 2015
  • A method for structural damage identification based on Chaotic Artificial Bee Colony (CABC) algorithm is presented. ABC is a heuristic algorithm with simple structure, ease of implementation, good robustness but with slow convergence rate. To overcome the shortcoming, the tournament selection mechanism is chosen instead of the roulette mechanism and chaotic search mechanism is also introduced. Residuals of natural frequencies and modal assurance criteria (MAC) are used to establish the objective function, ABC and CABC are utilized to solve the optimization problem. Two numerical examples are studied to investigate the efficiency and correctness of the proposed method. The simulation results show that the CABC algorithm can identify the local damage better compared with ABC and other evolutionary algorithms, even with noise corruption.

Scaling Reuse Detection in the Web through Two-way Boosting with Signatures and LSH

  • Kim, Jong Wook
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.6
    • /
    • pp.735-745
    • /
    • 2013
  • The emergence of Web 2.0 technologies, such as blogs and wiki, enable even naive users to easily create and share content on the Web using freely available content sharing tools. Wide availability of almost free data and promiscuous sharing of content through social networking platforms created a content borrowing phenomenon, where the same content appears (in many cases in the form of extensive quotations) in different outlets. An immediate side effect of this phenomenon is that identifying which content is re-used by whom is becoming a critical tool in social network analysis, including expert identification and analysis of information flow. Internet-scale reuse detection, however, poses extremely challenging scalability issues: considering the large size of user created data on the web, it is essential that the techniques developed for content-reuse detection should be fast and scalable. Thus, in this paper, we propose a $qSign_{lsh}$ algorithm, a mechanism for identifying multi-sentence content reuse among documents by efficiently combining sentence-level evidences. The experiment results show that $qSign_{lsh}$ significantly improves the reuse detection speed and provides high recall.

Collision-Free Arbitration Protocol for Active RFID Systems

  • Wang, Honggang;Pei, Changxing;Su, Bo
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.34-39
    • /
    • 2012
  • Collisions between tags greatly reduce the identification speed in radio frequency identification (RFID) systems and increase communication overhead. In particular for an active RFID system, tags are powered by small batteries, and a large number of re-transmissions caused by collisions can deteriorate and exhaust the tag energy which may result in missing tags. An efficient collision-free arbitration protocol for active RFID systems is proposed in this paper. In this protocol, a new mechanism involving collision detection, collision avoidance, and fast tag access is introduced. Specifically, the pulse burst duration and busy-tone-detection delay are introduced between the preamble and data portion of a tag-to-reader (T-R) frame. The reader identifies tag collision by detecting pulses and transmits a busy tone to avoid unnecessary transmission when collision occurs. A polling process is then designed to quickly access the collided tags. It is shown that the use of the proposed protocol results in a system throughput of 0.612, which is an obvious improvement when compared to the framed-slotted ALOHA (FSA) arbitration protocol for ISO/IEC 18000-7 standard. Furthermore, the proposed protocol greatly reduces communication overhead, which leads to energy conservation.

Cryptography Module Detection and Identification Mechanism on Malicious Ransomware Software (악성 랜섬웨어 SW에 사용된 암호화 모듈에 대한 탐지 및 식별 메커니즘)

  • Hyung-Woo Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Cases in which personal terminals or servers are infected by ransomware are rapidly increasing. Ransomware uses a self-developed encryption module or combines existing symmetric key/public key encryption modules to illegally encrypt files stored in the victim system using a key known only to the attacker. Therefore, in order to decrypt it, it is necessary to know the value of the key used, and since the process of finding the decryption key takes a lot of time, financial costs are eventually paid. At this time, most of the ransomware malware is included in a hidden form in binary files, so when the program is executed, the user is infected with the malicious code without even knowing it. Therefore, in order to respond to ransomware attacks in the form of binary files, it is necessary to identify the encryption module used. Therefore, in this study, we developed a mechanism that can detect and identify by reverse analyzing the encryption module applied to the malicious code hidden in the binary file.

Synergetics based damage detection of frame structures using piezoceramic patches

  • Hong, Xiaobin;Ruan, Jiaobiao;Liu, Guixiong;Wang, Tao;Li, Youyong;Song, Gangbing
    • Smart Structures and Systems
    • /
    • v.17 no.2
    • /
    • pp.167-194
    • /
    • 2016
  • This paper investigates the Synergetics based Damage Detection Method (SDDM) for frame structures by using surface-bonded PZT (Lead Zirconate Titanate) patches. After analyzing the mechanism of pattern recognition from Synergetics, the operating framework with cooperation-competition-update process of SDDM was proposed. First, the dynamic identification equation of structural conditions was established and the adjoint vector (AV) set of original vector (OV) set was obtained by Generalized Inverse Matrix (GIM).Then, the order parameter equation and its evolution process were deduced through the strict mathematics ratiocination. Moreover, in order to complete online structural condition update feature, the iterative update algorithm was presented. Subsequently, the pathway in which SDDM was realized through the modified Synergetic Neural Network (SNN) was introduced and its assessment indices were confirmed. Finally, the experimental platform with a two-story frame structure was set up. The performances of the proposed methodology were tested for damage identifications by loosening various screw nuts group scenarios. The experiments were conducted in different damage degrees, the disturbance environment and the noisy environment, respectively. The results show the feasibility of SDDM using piezoceramic sensors and actuators, and demonstrate a strong ability of anti-disturbance and anti-noise in frame structure applications. This proposed approach can be extended to the similar structures for damage identification.

Identification of N-acetyl and hydroxylated N-acetyltranylcypromine from tranylcypromine-dosed rat urine

  • Kang, Gun-Il;Chung, Soon-Young
    • Archives of Pharmacal Research
    • /
    • v.7 no.1
    • /
    • pp.65-68
    • /
    • 1984
  • Mechanism of the monoamine oxidase inhibition by tranylcypromine was studied in relation to its metabolism to reactive apecies. A metabolic study performed to collect general biotransformation pathway in rats provided GC/MS evidence for the detection of two new metabolites, N-acetyl and hydroxylated N-acetyltranylacypromine.

  • PDF

Vessel Detection Using Satellite SAR Images and AIS Data (위성 SAR 영상과 AIS을 활용한 선박 탐지)

  • Lee, Kyung-Yup;Hong, Sang-Hoon;Yoon, Bo-Yeol;Kim, Youn-Soo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.2
    • /
    • pp.103-112
    • /
    • 2012
  • We demonstrate the preliminary results of ship detection application using synthetic aperture radar (SAR) and automatic identification system (AIS) together. Multi-frequency and multi-temporal SAR images such as TerraSAR-X and Cosmo-SkyMed (X-band), and Radarsat-2 (C-band) are acquired over the West Sea in South Korea. In order to compare with SAR data, we also collected an AIS data. The SAR data are pre-processed considering by the characteristics of scattering mechanism as for sea surface. We proposed the "Adaptive Threshold Algorithm" for classification ship efficiently. The analyses using the combination of the SAR and AIS data with time series will be very useful to ship detection or tracing of the ship.