• Title/Summary/Keyword: Detection techniques

Search Result 2,594, Processing Time 0.028 seconds

Detection of Xanthomonas axonopodis pv. citri on Satsuma Mandarin Orange Fruits Using Phage Technique in Korea

  • Myung, Inn-Shik;Hyun, Jae-Wook;Cho, Weon-Dae
    • The Plant Pathology Journal
    • /
    • v.22 no.4
    • /
    • pp.314-317
    • /
    • 2006
  • A phage technique for detection of Xanthomonas axonopodis pv. citri, a causal bacterium of canker on Sastuma mandarin fruits was developed. Phage and ELISA techniques were compared for their sensitivity for detection of Xanthomonas axonopodis pv. citri on orange fruits. Both of techniques revealed a similar efficiency for the bacterial detection; the pathogenic bacteria were observed in pellet from the fruits with over one canker spot with below 2 mm in diameter. In field assays, the increase of phage population(120%) on surface of the fruits related to the disease development one month later indicated that the bacterial pathogens inhabit on the surface. The procedure will be effectively used for detection of only living bacterial pathogen on fruit surfaces of Satsuma mandarin and for the disease forecasting.

Face Detection Algorithm for Automatic Teller Machine(ATM) (현금 인출기 적용을 위한 얼굴인식 알고리즘)

  • 이혁범;유지상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6B
    • /
    • pp.1041-1049
    • /
    • 2000
  • A face recognition algorithm for the user identification procedure of automatic teller machine(ATM), as an application of the still image processing techniques is proposed in this paper. In the proposed algorithm, face recognition techniques, especially, face region detection, eye and mouth detection schemes, which can distinguish abnormal faces from normal faces, are proposed. We define normal face, which is acceptable, as a face without sunglasses or a mask, and abnormal face, which is non-acceptable, as that wearing both, or either one of them. The proposed face recognition algorithm is composed of three stages: the face region detection stage, the preprocessing stage for facial feature detection and the eye and mouth detection stage. Experimental results show that the proposed algorithm can distinguish abnormal faces from normal faces accurately from restrictive sample images.

  • PDF

SMD Detection and Classification Using YOLO Network Based on Robust Data Preprocessing and Augmentation Techniques

  • NDAYISHIMIYE, Fabrice;Lee, Joon Jae
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.211-220
    • /
    • 2021
  • The process of inspecting SMDs on the PCB boards improves the product quality, performance and reduces frequent issues in this field. However, undesirable scenarios such as assembly failure and device breakdown can occur sometime during the assembly process and result in costly losses and time-consuming. The detection of these components with a model based on deep learning may be effective to reduce some errors during the inspection in the manufacturing process. In this paper, YOLO models were used due to their high speed and good accuracy in classification and target detection. A SMD detection and classification method using YOLO networks based on robust data preprocessing and augmentation techniques to deal with various types of variation such as illumination and geometric changes is proposed. For 9 different components of data provided from a PCB manufacturer company, the experiment results show that YOLOv4 is better with fast detection and classification than YOLOv3.

Research Trends on Deep Learning for Anomaly Detection of Aviation Safety (딥러닝 기반 항공안전 이상치 탐지 기술 동향)

  • Park, N.S.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.5
    • /
    • pp.82-91
    • /
    • 2021
  • This study reviews application of data-driven anomaly detection techniques to the aviation domain. Recent advances in deep learning have inspired significant anomaly detection research, and numerous methods have been proposed. However, some of these advances have not yet been explored in aviation systems. After briefly introducing aviation safety issues, data-driven anomaly detection models are introduced. Along with traditional statistical and well-established machine learning models, the state-of-the-art deep learning models for anomaly detection are reviewed. In particular, the pros and cons of hybrid techniques that incorporate an existing model and a deep model are reviewed. The characteristics and applications of deep learning models are described, and the possibility of applying deep learning methods in the aviation field is discussed.

Leakage detection and management in water distribution systems

  • Sangroula, Uchit;Gnawali, Kapil;Koo, KangMin;Han, KukHeon;Yum, KyungTaek
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.160-160
    • /
    • 2019
  • Water is a limited source that needs to be properly managed and distributed to the ever-growing population of the world. Rapid urbanization and development have increased the overall water demand of the world drastically. However, there is loss of billions of liters of water every year due to leakages in water distribution systems. Such water loss means significant financial loss for the utilities as well. World bank estimates a loss of $14 billion annually from wasted water. To address these issues and for the development of efficient and reliable leakage management techniques, high efforts have been made by the researchers and engineers. Over the past decade, various techniques and technologies have been developed for leakage management and leak detection. These include ideas such as pressure management in water distribution networks, use of Advanced Metering Infrastructure, use of machine learning algorithms, etc. For leakage detection, techniques such as acoustic technique, and in recent yeats transient test-based techniques have become popular. Smart Water Grid uses two-way real time network monitoring by utilizing sensors and devices in the water distribution system. Hence, valuable real time data of the water distribution network can be collected. Best results and outcomes may be produced by proper utilization of the collected data in unison with advanced detection and management techniques. Long term reduction in Non Revenue Water can be achieved by detecting, localizing and repairing leakages as quickly and as efficiently as possible. However, there are still numerous challenges to be met and future research works to be conducted in this field.

  • PDF

Sludge Detection Inside Pipes Using Torsional Guided Waves (비틀림 유도파를 이용한 배관 내부 슬러지검출)

  • Park, Kyung-Jo;Kim, Chung-Yup
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.23 no.3
    • /
    • pp.282-290
    • /
    • 2013
  • A new method is presented that uses guided wave techniques for sludge and blockages detection in long-range pipelines. Existing techniques have the limitations that the sludge position needs to be known a priori and the area to be inspected needs to be accessible. Two guided wave techniques have been developed which allow the sludge or blockages to be detected remotely without the need to access the specific location where the pipe is blocked, nor to open the pipe. The first technique measures the reflection of guided waves by sludge which can be used to accurately locate the blocked region; the second technique detects sludge by revealing the changes to the transmitted guided waves propagating in the blocked region or after it. The two techniques complement each other and their combination leads to a reliable sludge or blockage detection. Various types of realistic sludge have been considered in the study and the practical capabilities of the two techniques have been demonstrated.

Data Mining-Aided Automatic Landslide Detection Using Airborne Laser Scanning Data in Densely Forested Tropical Areas

  • Mezaal, Mustafa Ridha;Pradhan, Biswajeet
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.1
    • /
    • pp.45-74
    • /
    • 2018
  • Landslide is a natural hazard that threats lives and properties in many areas around the world. Landslides are difficult to recognize, particularly in rainforest regions. Thus, an accurate, detailed, and updated inventory map is required for landslide susceptibility, hazard, and risk analyses. The inconsistency in the results obtained using different features selection techniques in the literature has highlighted the importance of evaluating these techniques. Thus, in this study, six techniques of features selection were evaluated. Very-high-resolution LiDAR point clouds and orthophotos were acquired simultaneously in a rainforest area of Cameron Highlands, Malaysia by airborne laser scanning (LiDAR). A fuzzy-based segmentation parameter (FbSP optimizer) was used to optimize the segmentation parameters. Training samples were evaluated using a stratified random sampling method and set to 70% training samples. Two machine-learning algorithms, namely, Support Vector Machine (SVM) and Random Forest (RF), were used to evaluate the performance of each features selection algorithm. The overall accuracies of the SVM and RF models revealed that three of the six algorithms exhibited higher ranks in landslide detection. Results indicated that the classification accuracies of the RF classifier were higher than the SVM classifier using either all features or only the optimal features. The proposed techniques performed well in detecting the landslides in a rainforest area of Malaysia, and these techniques can be easily extended to similar regions.

A Review of Detection Methods for the Plant Viruses

  • Jeong, Joo-Jin;Ju, Ho-Jong;Noh, Jaejong
    • Research in Plant Disease
    • /
    • v.20 no.3
    • /
    • pp.173-181
    • /
    • 2014
  • The early and accurate detection of plant viruses is an essential component to control those. Because the globalization of trade by free trade agreement (FTA) and the rapid climate change promote the country-to-country transfer of viruses and their hosts and vectors, diagnosis of viral diseases is getting more important. Because symptoms of viral diseases are not distinct with great variety and are confused with those of abiotic stresses, symptomatic diagnosis may not be appropriate. From the last three decades, enzyme-linked immunosorbent assays (ELISAs), developed based on serological principle, have been widely used. However, ELISAs to detect plant viruses decrease due to some limitations such as availability of antibody for target virus, cost to produce antibody, requirement of large volume of sample, and time to complete ELISAs. Many advanced techniques allow overcoming demerits of ELISAs. Since the polymerase chain reaction (PCR) developed as a technique to amplify target DNA, PCR evolved to many variants with greater sensitivity than ELISAs. Many systems of plant virus detection are reviewed here, which includes immunological-based detection system, PCR techniques, and hybridization-based methods such as microarray. Some of techniques have been used in practical, while some are still under developing to get the level of confidence for actual use.

Research on Overheat Protection Techniques of Connection Parts of MCCB by Poor Contact (MCCB 단자 접속부의 접촉불량에 의한 과열사고 방지기법에 관한 연구)

  • Kim, Dong-Woo;Lee, Ki-Yeon;Moon, Hyun-Wook;Kim, Hyang-Kon;Cho, Chung-Seog
    • Fire Science and Engineering
    • /
    • v.22 no.4
    • /
    • pp.54-60
    • /
    • 2008
  • In this study, damage characteristics of MCCB and terminal block due to poor contact were analyzed, and various poor contact detection techniques were suggested. Firstly, the detection techniques using thermocouple and infrared thermal camera were analyzed respectively. Also, thermo-cap during poor contact detected abnormal status effectively by changing its color, and the detection system using an odor detector and odor capsules was analyzed. Lastly, poor contact detection screw was made using characteristics of fusible alloy, and we applied the poor contact detection screw to terminal block. The above methods could prevent electrical fire caused by poor contact effectively if they are used properly.

Fileless cyberattacks: Analysis and classification

  • Lee, GyungMin;Shim, ShinWoo;Cho, ByoungMo;Kim, TaeKyu;Kim, Kyounggon
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.332-343
    • /
    • 2021
  • With cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection techniques. To combat this trend, security vendors are publishing analysis reports to help manage and better understand fileless malware. However, only fragmentary analysis reports for specific fileless cyberattacks exist, and there have been no comprehensive analyses on the variety of fileless cyberattacks that can be encountered. In this study, we analyze 10 selected cyberattacks that have occurred over the past five years in which fileless techniques were utilized. We also propose a methodology for classification based on the attack techniques and characteristics used in fileless cyberattacks. Finally, we describe how the response time can be improved during a fileless attack using our quick and effective classification technique.