• Title/Summary/Keyword: Early detection algorithm

Search Result 224, Processing Time 0.028 seconds

Development of Flame and Smoke Detection for Early Fire Recognition (화재 조기 인식을 위한 화염 및 연기 검출 알고리즘 개발)

  • Park, Jang-Sik;Kim, Dae-Kyung;Choi, Soo-Young;Lee, Young-Sung
    • Fire Science and Engineering
    • /
    • v.22 no.4
    • /
    • pp.27-32
    • /
    • 2008
  • In this paper, a flame and smoke detection algorithm is proposed to recognize a fire. Flame and smoke have specific color distribution and continuously change shapes of them. In the proposed flame detection algorithm, specific regions are candidated as flame by color distributions and variations of frames of video. Some of candidated regions are decided as flame by the magnitude of motion vector. To determine smoke in the field of view of camera, edge is important because high frequency component is decreased by it. Candidated region of smoke is assigned by color distributions, inter-frame differences and the value of edge. The candidated region is settled as smoke region with magnitude of motion vector. As results of simulations, it is shown that the proposed algorithm is useful for flame and smoke detection.

Performance Analysis on Early Detection of Fault Symptom of a Pump with Abnormal Signals (오신호 입력에 따른 펌프의 고장징후 조기감지 성능분석)

  • Jung, Jae-Young;Lee, Byoung-Oh;Kim, Hyoung-Kyun;Kim, Dae-Woong
    • Journal of Power System Engineering
    • /
    • v.20 no.2
    • /
    • pp.66-72
    • /
    • 2016
  • As a method to improve the equipment reliability, early warning researches that can be detected fault symptom of an equipment at an early stage are being performed out among developed countries. In this paper, when abnormal signal is input to actual normal signal of a pump, early detection studies on pump's fault symptom were carried out with auto-associative kernel regression as an advanced pattern recognition algorithm. From analysis, correlations among power of motor driving pump, discharge flow of pump, power output of pump, and discharge pressure of pump are exited. When the abnormal signal is input to one of those normal signals, the other expected values are changed due to the influence of the abnormal signal. Therefore, the fault symptom of pump through the early-warning index is able to detect at an early stage.

A New Active RED Algorithm for Congestion Control in IP Networks (IP 네트워크에서 혼잡제어를 위한 새로운 Active RED 알고리즘)

  • Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.437-446
    • /
    • 2002
  • In order to reduce the increasing packet loss rates caused by an exponential increase in network traffic, the IETF (Internet Engineering Task Force) is considering the deployment of active queue management techniques such as RED (Random Early Detection). While active queue management in routers and gateways can potentially reduce packet loss rates in the Internet, this paper has demonstrated the inherent weakness of current techniques and shows that they are ineffective in preventing high loss rates. The inherent problem with these queue management algorithms is that they all use static parameter setting. So, in case where these parameters do not match the requirement of the network load, the performance of these algorithms can approach that of a traditional Drop-tail. In this paper, in order to solve this problem, a new active queue management algorithm called ARED (Active RED) is proposed. ARED computes the parameter based on our heuristic method. This algorithm can effectively reduce packet loss while maintaining high link utilizations.

Detection Algorithm of Scanning worms using network traffic characteristics (네트워크 트래픽 특성을 이용한 스캐닝 웜 탐지기법)

  • Kim, Jae-Hyun;Kang, Shin-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.57-66
    • /
    • 2007
  • Scanning worms increase network traffic load because they randomly scan network addresses to find hosts that are susceptible to infection. Since propagation speed is faster than human reaction, scanning worms cause severe network congestion. So we need to build an early detection system which can automatically detect and quarantine such attacks. We propose algorithms to detect scanning worms using network traffic characteristics such as variance, variance to mean ratio(VMR) and correlation coefficient. The proposed algorithm have been verified by computer simulation. Compared to existing algorithm, the proposed algorithm not only reduced computational complexity but also improved detection accuracy.

Development of Real-Time Arrhythmia Detection and BLE-based Data Communication Algorithm for Wearable Devices (웨어러블 디바이스를 위한 실시간 부정맥 검출 및 BLE기반 데이터 통신 알고리즘 개발과 적용)

  • SooHoon, Maeng;Daegwan, Kim;Hyunseok, Lee;Hyojeong, Moon
    • Journal of Biomedical Engineering Research
    • /
    • v.43 no.6
    • /
    • pp.399-408
    • /
    • 2022
  • Because arrhythmia occurs irregularly, it should be examined for at least 24 hours for accurate diagnosis. For this reason, this paper developed firmware software for arrhythmia detection and prevented consumption of temporal and human resources and enabled continuous management and early diagnosis. Prior to the experiment, the interval between the R peaks of the QRS Complex was calculated using the Pan-Tompkins algorithm. The developed firmware software designed and implemented an algorithm to detect arrhythmia such as tachycardia, bradycardia, ventricular tachycardia, persistent tachycardia, and non-persistent tachycardia, and a data transmission format to monitor the collected data based on BLE. As a result of the experiment, arrhythmia was found in real time according to the change in BPM as designed in this paper. And the data quality for BLE communication was verified by comparing the sensor's serial communication value with the Android application reception value. In the future, wearable devices for real-time arrhythmia detection will be lightweight and developed firmware software will be applied.

Iterative damage index method for structural health monitoring

  • You, Taesun;Gardoni, Paolo;Hurlebaus, Stefan
    • Structural Monitoring and Maintenance
    • /
    • v.1 no.1
    • /
    • pp.89-110
    • /
    • 2014
  • Structural Health Monitoring (SHM) is an effective alternative to conventional inspections which are time-consuming and subjective. SHM can detect damage early and reduce maintenance cost and thereby help reduce the likelihood of catastrophic structural events to infrastructure such as bridges. After reviewing the Damage Index Method (DIM), an Iterative Damage Index Method (IDIM) is proposed to improve the accuracy of damage detection. These two damage detection techniques are compared based on damage on two structures, a simply supported beam and a pedestrian bridge. Compared to the traditional damage detection algorithm, the proposed IDIM is shown to be less arbitrary and more accurate.

Temperature compensation algorithm implemented in a portable radiation detection device based on the Android platform (안드로이드 플랫폼 기반의 휴대용 방사선 검출장치에서의 온도보상 알고리즘 구현)

  • Lee, Jon-hwey;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.141-143
    • /
    • 2013
  • Portable radiation detection devices currently available, there are a lot of functional constraints. In order to solve these drawbacks, research has been done on a portable radiation detection device based on the Android platform. Since the early stages of research, it is possible to measure the radiation, but The accuracy is worse than the product being sold. Portable radiation detection device based on the Android platform, the error occurs when the temperature changes. Temperature compensation algorithm was implemented to improve accuracy by eliminating errors due to temperature changes.

  • PDF

Evidence-based Screening, Early Diagnosis and Treatment Strategy of Cervical Cancer for National Policy in Low-resource countries: Example of India

  • Saxena, Upma;Sauvaget, Catherine;Sankaranarayanan, Rengaswamy
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.4
    • /
    • pp.1699-1703
    • /
    • 2012
  • Cervical cancer remains the most frequent cancer in women from the developing world. More than 88% of deaths occur in low-income countries, and it is predicted to climb to 91.5% by 2030. Although Pap-based screening programmes have shown to be effective in reducing the disease burden in high-resource countries, implementation and sustention of cytology-based programmes is quite challenging in low-resource settings. The present paper reviews evidence-based alternatives of screening methods, triaging algorithm, treatment of cervical precancerous lesions, and age-group at screening appropriate for low-income countries. Evidence shows that visual inspection methods using diluted acid acetic or Lugol's iodine, and HPV-DNA testing are more sensitive tests than the Pap-smear screening test. Visual inspection allows an immediate result and, when appropriate, may be immediately followed by cryotherapy, the so called "screen-and-treat" approach, achieved in a single visit, by trained nurses and midwives. Examples of cervical cancer prevention programmes in India and selected low-income countries are given.

Design and Performance Evaluation of GPS Spoofing Signal Detection Algorithm at RF Spoofing Simulation Environment

  • Lim, Soon;Lim, Deok Won;Chun, Sebum;Heo, Moon Beom;Choi, Yun Sub;Lee, Ju Hyun;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.4 no.4
    • /
    • pp.173-180
    • /
    • 2015
  • In this study, an algorithm that detects a spoofing signal for a GPS L1 signal was proposed, and the performance was verified through RF spoofing signal simulation. The proposed algorithm determines the reception of a spoofing signal by detecting a correlation distortion of GPS L1 C/A code caused by the spoofing signal. To detect the correlation distortion, a detection criterion of a spoofing signal was derived from the relationship among the Early, Prompt, and Late tap correlation values of a receiver correlator; and a detection threshold was calculated from the false alarm probability of spoofing signal detection. In this study, an RF spoofing environment was built using the GSS 8000 simulator (Spirent). For the RF spoofing signal generated from the simulator, the RF spoofing environment was verified using the commercial receiver DL-V3 (Novatel Inc.). To verify the performance of the proposed algorithm, the RF signal was stored as IF band data using a USRP signal collector (NI) so that the data could be processed by a CNU software receiver (software defined radio). For the performance of the proposed algorithm, results were obtained using the correlation value of the software receiver, and the performance was verified through the detection of a spoofing signal and the detection time of a spoofing signal.

A Study of Computer-aided Detection System for Dental Cavity on Digital X-ray Image (디지털 X선 영상을 이용한 치아 와동 컴퓨터 보조 검출 시스템 연구)

  • Heo, Chang-hoe;Kim, Min-jeong;Cho, Hyun-chong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.8
    • /
    • pp.1424-1429
    • /
    • 2016
  • Segmentation is one of the first steps in most diagnosis systems for characterization of dental caries in an early stage. The purpose of automatic dental cavity detection system is helping dentist to make more precise diagnosis. We proposed the semi-automatic method for the segmentation of dental caries on digital x-ray images. Based on a manually and roughly selected ROI (Region of Interest), it calculated the contour for the dental cavity. A snake algorithm which is one of active contour models repetitively refined the initial contour and self-examination and correction on the segmentation result. Seven phantom tooth from incisor to molar were made for the evaluation of the developed algorithm. They contained a different form of cavities and each phantom tooth has two dental cavities. From 14 dental cavities, twelve cavities were accurately detected including small cavities. And two cavities were segmented partly. It demonstrates the practical feasibility of the dental lesion detection using Computer-aided Detection (CADe).