• Title/Summary/Keyword: Detection and identification Mechanism

Search Result 35, Processing Time 0.032 seconds

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.

Detection of odorants and study on the odorant sensor system by using SAW device (SAW 디바이스를 이용한 냄새물질 측정 및 냄새센서 시스템의 연구)

  • 장상목;김기영;김종민;최용성;권영수
    • Electrical & Electronic Materials
    • /
    • v.8 no.1
    • /
    • pp.48-55
    • /
    • 1995
  • A surface acoustic wave (SAW) sensor for the detection of odorants has been constructed by depositing various phospholipids and fatty acids onto the surface of the SAW device. The characteristics of a SAW device operating at 310 MHz deposited with silicon monoxide were analyzed. Menthone, amylacetate, acetoin, and other organic gases show different affinities to the coated lipids. An explanation is given for different odorant affinities based on the monolayer properties of phospholipids. The identification of odorants depending on the tkpe of lipid used for coating is discussed in terms of the similarity of their normalized resonant frequency shift patterns. Using a number of different lipid-coated SAW devices, odorants can be identified by a computerized pattern recognition algorithm.

  • PDF

Wave propagation simulation and its wavelet package analysis for debonding detection of circular CFST members

  • Xu, Bin;Chen, Hongbing;Xia, Song
    • Smart Structures and Systems
    • /
    • v.19 no.2
    • /
    • pp.181-194
    • /
    • 2017
  • In order to investigate the interface debonding defects detection mechanism between steel tube and concrete core of concrete-filled steel tubes (CFSTs), multi-physical fields coupling finite element models constituted of a surface mounted Piezoceramic Lead Zirconate Titanate (PZT) actuator, an embedded PZT sensor and a circular cross section of CFST column are established. The stress wave initiation and propagation induced by the PZT actuator under sinusoidal and sweep frequency excitations are simulated with a two dimensional (2D) plain strain analysis and the difference of stress wave fields close to the interface debonding defect and within the cross section of the CFST members without and with debonding defects are compared in time domain. The linearity and stability of the embedded PZT response under sinusoidal signals with different frequencies and amplitudes are validated. The relationship between the amplitudes of stress wave and the measurement distances in a healthy CFST cross section is also studied. Meanwhile, the responses of PZT sensor under both sinusoidal and sweep frequency excitations are compared and the influence of debonding defect depth and length on the output voltage is also illustrated. The results show the output voltage signal amplitude and head wave arriving time are affected significantly by debonding defects. Moreover, the measurement of PZT sensor is sensitive to the initiation of interface debonding defects. Furthermore, wavelet packet analysis on the voltage signal under sweep frequency excitations is carried out and a normalized wavelet packet energy index (NWPEI) is defined to identify the interfacial debonding. The value of NWPEI attenuates with the increase in the dimension of debonding defects. The results help understand the debonding defects detection mechanism for circular CFST members with PZT technique.

A study of noise source identification on plate excited structure borne sound by acoustic intensity method (음향인텐시티법에 의한 고체진동 가진판의 소음원 검출에 관한 연구)

  • 오재응;김상헌;홍동표;이찬홍
    • Journal of the korean Society of Automotive Engineers
    • /
    • v.8 no.4
    • /
    • pp.43-55
    • /
    • 1986
  • In the studies of noise reduction, it is important to know the generation mechanism of noise in order to identify the noise source. The relation between the structural vibration and the radiated sound is very complex and so this paper deals with a simplified radiation model that was originally developed as a verification tool for the acoustic intensity measurement procedure. As the first step for the identification of the noise source, this study deals with the noise evaluation by measuring sound pressure. On the next step, the acoustic radiational pattern is determined by the acoustic intensity method and this paper established that the acoustic intensity method is effective on the detection of noise. In the study, furthermore, the method could be used to predict the change in the sound radiational characteristics with the attachment of absorber and could be used in determining the attachment position.

  • PDF

Unknown Threats Detection by Using Incremental Knowledge Acquisition (상황 지식 축적에 의한 알려지지 않은 위협의 검출)

  • Park, Gil-Cheol;Cooke, Hamid B. M.;Kim, Yang-Sok;Kang, Byeong-Ho;Youk, Sang-Jo;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.19-27
    • /
    • 2007
  • Detecting unknown threats is a paradox ; how do you detect a threat if it is not known to exist? The answer is that unknown threat detection is the process of making a previously unknown threat identifiable in the shortest possible time frame. This paper examines the possibility of creating an unknown threat detection mechanism that security experts can use for developing a flexible protection system for networks. A system that allows the detection of unknown threats through monitoring system and the incorporation of dynamic and flexible logics with situational knowledge is described as well as the mechanisms used to develop such a system is illustrated. The system not only allows the detection of new threats but does so in a fast and efficient manner to increase the available time for responding to these threats.

  • PDF

A flexible Feature Matching for Automatic Face and Facial Feature Points Detection (얼굴과 얼굴 특징점 자동 검출을 위한 탄력적 특징 정합)

  • 박호식;배철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.705-711
    • /
    • 2003
  • An automatic face and facial feature points(FFPs) detection system is proposed. A face is represented as a graph where the nodes are placed at facial feature points(FFPs) labeled by their Gabor features and the edges are describes their spatial relations. An innovative flexible feature matching is proposed to perform features correspondence between models and the input image. This matching model works likes random diffusion process in !be image space by employing the locally competitive and globally corporative mechanism. The system works nicely on the face images under complicated background, pose variations and distorted by facial accessories. We demonstrate the benefits of our approach by its implementation on the face identification system.

A Study on the Hair Line detection Using Feature Points Matching in Hair Beauty Fashion Design (헤어 뷰티 패션 디자인 선별을 위한 특징 점 정합을 이용한 헤어 라인 검출)

  • 송선희;나상동;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.934-940
    • /
    • 2003
  • In this paper, hair beauty fashion design feature points detection system is proposed. A hair models and hair face is represented as a graph where the nodes are placed at facial feature points labeled by their Gabor features and the edges are describes their spatial relations. An innovative flexible feature matching is proposed to perform features correspondence between hair models and the input image. This matching hair model works like random diffusion process in the image space by employing the locally competitive and globally corporative mechanism. The system works nicely on the face images under complicated background. pose variations and distorted by accessories. We demonstrate the benefits of our approach by its implementation on the face identification system.

A Flexible Feature Matching for Automatic face and Facial feature Points Detection (얼굴과 얼굴 특징점 자동 검출을 위한 탄력적 특징 정합)

  • 박호식;손형경;정연길;배철수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.608-612
    • /
    • 2002
  • An automatic face and facial feature points(FFPs) detection system is proposed. A face is represented as a graph where the nodes are placed at facial feature points(FFPs) labeled by their Gabor features md the edges are describes their spatial relations. An innovative flexible feature matching is proposed to perform features correspondence between models and the input image. This matching model works likes random diffusion process in the image spare by employing the locally competitive and globally corporative mechanism. The system works nicely on the face images under complicated background, pose variations and distorted by facial accessories. We demonstrate the benefits of our approach by its implementation on the fare identification system.

  • PDF

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

A Flexible Feature Matching for Automatic Facial Feature Points Detection (얼굴 특징점 자동 검출을 위한 탄력적 특징 정합)

  • Hwang, Suen-Ki;Bae, Cheol-Soo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.2
    • /
    • pp.12-17
    • /
    • 2010
  • An automatic facial feature points(FFPs) detection system is proposed. A face is represented as a graph where the nodes are placed at facial feature points(FFPs) labeled by their Gabor features and the edges are describes their spatial relations. An innovative flexible feature matching is proposed to perform features correspondence between models and the input image. This matching model works likes random diffusion process in the image space by employing the locally competitive and globally corporative mechanism. The system works nicely on the face images under complicated background, pose variations and distorted by facial accessories. We demonstrate the benefits of our approach by its implementation on the system.

  • PDF