• Title/Summary/Keyword: Detection technique

Search Result 4,097, Processing Time 0.051 seconds

A near and far-field monitoring technique for damage detection in concrete structures

  • Providakis, Costas;Stefanaki, K.;Voutetaki, M.;Tsompanakis, J.;Stavroulaki, M.
    • Structural Monitoring and Maintenance
    • /
    • v.1 no.2
    • /
    • pp.159-171
    • /
    • 2014
  • Real-time near and far-field monitoring of concrete structural components gives enough information on the time and condition at which damage occurs, thereby facilitating damage detection while in the same time evaluate the cause of the damage. This paper experimentally investigates an integrated monitoring technique for near and far-field damage detection in concrete structures based on simultaneous use of electromechanical admittance technique in combination with guided wave propagation. The proposed sensing system does not measure the electromechanical admittance itself but detect time variations in output voltages of the response signal obtained across the electrodes of piezoelectric transducers bonded on surfaces of concrete structures. The damage identification is based on the spectral estimation MUSIC algorithm. Experimental results show the efficiency and performance of the proposed measuring technique.

Sludge Detection Inside Pipes Using Torsional Guided Waves (비틀림 유도파를 이용한 배관 내부 슬러지검출)

  • Park, Kyung-Jo;Kim, Chung-Yup
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2013.10a
    • /
    • pp.757-762
    • /
    • 2013
  • A technique is presented that uses a new guided wave technique for sludge and blockages detection in long-range pipelines. Existing techniques have the limitations that the sludge position needs to be known a priori and the area to be inspected needs to be accessible. Two guided wave techniques have been developed which allow the sludge or blockages to be detected remotely without the need to access the specific location where the pipe is blocked, nor to open the pipe. The first technique measures the reflection of guided waves by sludge which can be used to accurately locate the blocked region; the second technique detects sludge by revealing the changes to the transmitted guided waves propagating in the blocked region or after it. The two techniques complement each other and their combination leads to a reliable sludge or blockage detection. Various types of realistic sludge have been considered in the study and the practical capabilities of the two techniques have been demonstrated.

  • PDF

Unsupervised Learning-Based Pipe Leak Detection using Deep Auto-Encoder

  • Yeo, Doyeob;Bae, Ji-Hoon;Lee, Jae-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.21-27
    • /
    • 2019
  • In this paper, we propose a deep auto-encoder-based pipe leak detection (PLD) technique from time-series acoustic data collected by microphone sensor nodes. The key idea of the proposed technique is to learn representative features of the leak-free state using leak-free time-series acoustic data and the deep auto-encoder. The proposed technique can be used to create a PLD model that detects leaks in the pipeline in an unsupervised learning manner. This means that we only use leak-free data without labeling while training the deep auto-encoder. In addition, when compared to the previous supervised learning-based PLD method that uses image features, this technique does not require complex preprocessing of time-series acoustic data owing to the unsupervised feature extraction scheme. The experimental results show that the proposed PLD method using the deep auto-encoder can provide reliable PLD accuracy even considering unsupervised learning-based feature extraction.

Multiple Ship Object Detection Based on Background Registration Technique and Morphology Operation (배경 구축 기법과 형태학적 연산 기반의 다중 선박 객체 검출)

  • Kim, Won-Hee;Arshad, Nasim;Kim, Jong-Nam;Moon, Kwang-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.11
    • /
    • pp.1284-1291
    • /
    • 2012
  • Ship object detection is a technique to detect the existence and the location of ship when ship objects are shown on input image sequence, and there are wide variations in accuracy due to environmental changes and noise of input image. In order to solve this problem, in this paper, we propose multiple ship object detection based on background registration technique and morphology operation. The proposed method consists of the following five steps: background elimination step, noise elimination step, object standard position setting step, object restructure step, and multiple object detection steps. The experimental results show accurate and real-time ship detection for 15 different test sequences with a detection rate of 98.7%, and robustness against variable environment. The proposed method may be helpful as the base technique of sea surface monitoring or automatic ship sailing.

An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks

  • Lee, Yun-Ho;Yoo, Sang-Guun;Lee, Soo-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1874-1893
    • /
    • 2012
  • An approach to detect abnormal activities based on reputations created individually by each node is vulnerable to a false accusation since intrusion detection in ad-hoc networks is done in a distributed and cooperative manner. Detection of false accusation is considered important because the efficiency or survivability of the network can be degraded severely if normal nodes were excluded from the network by being considered as abnormal ones in the intrusion detection process. In this paper, we propose an improved reputation-based intrusion detection technique to efficiently detect and manage false accusations in ad-hoc networks. Additionally, we execute simulations of the proposed technique to analyze its performance and feasibility to be implemented in a real environment.

Detection of Xanthomonas axonopodis pv. citri on Satsuma Mandarin Orange Fruits Using Phage Technique in Korea

  • Myung, Inn-Shik;Hyun, Jae-Wook;Cho, Weon-Dae
    • The Plant Pathology Journal
    • /
    • v.22 no.4
    • /
    • pp.314-317
    • /
    • 2006
  • A phage technique for detection of Xanthomonas axonopodis pv. citri, a causal bacterium of canker on Sastuma mandarin fruits was developed. Phage and ELISA techniques were compared for their sensitivity for detection of Xanthomonas axonopodis pv. citri on orange fruits. Both of techniques revealed a similar efficiency for the bacterial detection; the pathogenic bacteria were observed in pellet from the fruits with over one canker spot with below 2 mm in diameter. In field assays, the increase of phage population(120%) on surface of the fruits related to the disease development one month later indicated that the bacterial pathogens inhabit on the surface. The procedure will be effectively used for detection of only living bacterial pathogen on fruit surfaces of Satsuma mandarin and for the disease forecasting.

Signal Processing Algorithm of FMCW RADAR using DSP (DSP를 이용한 FMCW 레이다 신호처리 알고리즘)

  • 한성칠;박상진;강성민;구경헌
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.425-428
    • /
    • 2001
  • In this paper, FMCW radar signal processing technique for the vehicle detection system are studied. And FMCW radar sensor is used as a equipment for vehicle detection. To test the performance of developed algorithm, the evaluation of the algorithm is done by simulation for signal processing technique of vehicle detection system. RADAR signal of a driving vehicle is generated by using the Matlab. Distance and velocity of vehicles are calculated with developed a1gorithm. Also the signal processing procedure is done for the virtual data with FM-AM converted noise.

  • PDF

An Improvement in Detection Performance of Logarithmic Receiver (대수수신계통의 탐색특성개선)

  • 윤현보;장태무;조광래
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.9 no.1
    • /
    • pp.45-48
    • /
    • 1984
  • A serious degradation of blocking of the detection performance in a cell aeraging-logarithmic detector/constant false alarm rate(CA-LOG/CFAR) is known to be caused by the presence of a large interfering noise in the set of sample mean. A technique consisting of the logarithmic circuit and inverter has been proposed to alleviate this problem, by modifying the conventional CA-LOG/CFAR receiver. The detection performance of the proposed technique is linearly improbed over the normal output level and the blocking characteristics of the CA-LOG/CFAR can be changed to finite output level.

  • PDF

A Design of FHIDS(Fuzzy logic based Hybrid Intrusion Detection System) using Naive Bayesian and Data Mining (나이브 베이지안과 데이터 마이닝을 이용한 FHIDS(Fuzzy Logic based Hybrid Intrusion Detection System) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.5 no.3
    • /
    • pp.158-163
    • /
    • 2012
  • This paper proposes an FHIDS(Fuzzy logic based Hybrid Intrusion Detection System) design that detects anomaly and misuse attacks by using a Naive Bayesian algorithm, Data Mining, and Fuzzy Logic. The NB-AAD(Naive Bayesian based Anomaly Attack Detection) technique using a Naive Bayesian algorithm within the FHIDS detects anomaly attacks. The DM-MAD(Data Mining based Misuse Attack Detection) technique using Data Mining within it analyzes the correlation rules among packets and detects new attacks or transformed attacks by generating the new rule-based patterns or by extracting the transformed rule-based patterns. The FLD(Fuzzy Logic based Decision) technique within it judges the attacks by using the result of the NB-AAD and DM-MAD. Therefore, the FHIDS is the hybrid attack detection system that improves a transformed attack detection ratio, and reduces False Positive ratio by making it possible to detect anomaly and misuse attacks.

A Novel Jamming Detection Technique for Wireless Sensor Networks

  • Vijayakumar, K.P.;Ganeshkumar, P.;Anandaraj, M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4223-4249
    • /
    • 2015
  • A novel jamming detection technique to detect the presence of jamming in the downstream direction for cluster based wireless sensor networks is proposed in this paper. The proposed technique is deployed in base station and in cluster heads. The proposed technique is novel in two aspects: Firstly, whenever a cluster head receives a packet it verifies whether the source node is legitimate node or new node. Secondly if a source node is declared as new node in the first step, then this technique observes the behavior of the new node to find whether the new node is legitimate node or jammed node. In order to monitor the behavior of the existing node and new node, the second step uses two metrics namely packet delivery ratio (PDR) and received signal strength indicator (RSSI). The rationality of using PDR and RSSI is presented by performing statistical test. PDR and RSSI of every member in the cluster is measured and assessed by the cluster head. And finally the cluster head determines whether the members of the cluster are jammed or not. The CH can detect the presence of jamming in the cluster at member level. The base station can detect the presence of jamming in the wireless sensor network at CH level. The simulation result shows that the proposed technique performs extremely well and achieves jamming detection rate as high as 99.85%.