• Title/Summary/Keyword: Fast Detection

Search Result 1,445, Processing Time 0.024 seconds

Automatic Detection of Dissolving Scene Change in Video (Video 장면전환 중 디졸브 검출에 관한 연구)

  • 박성준;송문호;곽대호;김운경;정민교
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.1057-1060
    • /
    • 1999
  • For efficient storage and retrieval of large video data sets, automatic video scene change detection is a necessary tool. Video scene changes fall into two categories, namely fast and gradual scene changes. The gradual scene change effects include, dissolves, wipes, fades, etc. Although currently existing algorithms are able to detect fast scene changes quite accurately, the detection of gradual scene changes continue to remain a difficult problem. In this paper, among various gradual scene changes, we focus on dissolves. The algorithm uses a subset of the entire video, namely the sequence of DC images, for improvement of detection velocity

  • PDF

Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks

  • Kim, Sun-Ho;Roh, Byeong-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.3
    • /
    • pp.135-149
    • /
    • 2008
  • Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but they have a limitation to figure out the pattern of the distributed global scale network attack. In this paper, we propose an efficient and fast method for detecting distributed global-scale network attack symptoms in high-speed backbone networks. The proposed method is implemented at the aggregate traffic level. So, our proposed scheme has much lower computational complexity, and is implemented in very high-speed backbone networks. In addition, the proposed method can detect attack patterns, such as attacks in which the target is a certain host or the backbone infrastructure itself, via collaboration of edge routers on the backbone network. The effectiveness of the proposed method are demonstrated via simulation.

Fast Detection of Copy-Move Forgery Image using DCT

  • Shin, Yong-Dal
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.4
    • /
    • pp.411-417
    • /
    • 2013
  • In this paper, we proposed a fast detection method of copy-move forgery image based on low frequency coefficients of the DCT coefficients. We proposed a new matching criterion of copy-moved forgery image detection (MCD) using discrete cosine transform. For each $8{\times}8$ pixel block, the DCT transform is calculated. Our algorithm uses low frequency four (DC, 3 AC coefficient) and six coefficients (DC, 5 AC coefficients) of DCT per $8{\times}8$ pixel block. Our algorithm worked block matching for DCT coefficients of the $8{\times}8$ pixel block is slid by one pixel along the image from the upper left corner to the lower right corner. Our algorithm can reduce computational complexity more than conventional copy moved forgery detection algorithms.

Mutual Information Applied to Anomaly Detection

  • Kopylova, Yuliya;Buell, Duncan A.;Huang, Chin-Tser;Janies, Jeff
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.89-97
    • /
    • 2008
  • Anomaly detection systems playa significant role in protection mechanism against attacks launched on a network. The greatest challenge in designing systems detecting anomalous exploits is defining what to measure. Effective yet simple, Shannon entropy metrics have been successfully used to detect specific types of malicious traffic in a number of commercially available IDS's. We believe that Renyi entropy measures can also adequately describe the characteristics of a network as a whole as well as detect abnormal traces in the observed traffic. In addition, Renyi entropy metrics might boost sensitivity of the methods when disambiguating certain anomalous patterns. In this paper we describe our efforts to understand how Renyi mutual information can be applied to anomaly detection as an offline computation. An initial analysis has been performed to determine how well fast spreading worms (Slammer, Code Red, and Welchia) can be detected using our technique. We use both synthetic and real data audits to illustrate the potentials of our method and provide a tentative explanation of the results.

The Study on The Complex Composition By SFCL and Power Equipments for Fault Detection in HVDC Line (HVDC 선로 내 초전도 한류기와 전력기기들의 복합 구성을 통한 고장 검출에 관한 연구)

  • Kim, Myong-Hyon;Kim, Jae-Chul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.8
    • /
    • pp.1113-1118
    • /
    • 2018
  • Protection in HVDC(High Voltage Direct Current) have the very fast velocity of fault detection. Because Fault in HVDC has the fast propagation, large currents, high interruption cost. The focus to velocity caused possibility of errors like a detection error like a high impedance fault. In this paper, Proposed complex composition for get the reliability and velocity. That used SFCL(Super Conducting Fault Current Limiter), Protection Zone and DTS(Distributed Temperature Sensing). The SFCL was detect the fault by quench and DTS&Protection Zone were perceive the detect by variation too. To examine the proposed method, PSCAD/EMTDC simulated. The results of simulation, proposed methods could the detect of fault to whole HVDC line. And that improved the reliability of fault clearing.

Fast Detection of Forgery Image using Discrete Cosine Transform Four Step Search Algorithm

  • Shin, Yong-Dal;Cho, Yong-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.5
    • /
    • pp.527-534
    • /
    • 2019
  • Recently, Photo editing softwares such as digital cameras, Paintshop Pro, and Photoshop digital can create counterfeit images easily. Various techniques for detection of tamper images or forgery images have been proposed in the literature. A form of digital forgery is copy-move image forgery. Copy-move is one of the forgeries and is used wherever you need to cover a part of the image to add or remove information. Copy-move image forgery refers to copying a specific area of an image itself and pasting it into another area of the same image. The purpose of copy-move image forgery detection is to detect the same or very similar region image within the original image. In this paper, we proposed fast detection of forgery image using four step search based on discrete cosine transform and a four step search algorithm using discrete cosine transform (FSSDCT). The computational complexity of our algorithm reduced 34.23 % than conventional DCT three step search algorithm (DCTTSS).

Voiced-Unvoiced-Silence Detection Algorithm using Perceptron Neural Network (퍼셉트론 신경회로망을 사용한 유성음, 무성음, 묵음 구간의 검출 알고리즘)

  • Choi, Jae-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.2
    • /
    • pp.237-242
    • /
    • 2011
  • This paper proposes a detection algorithm for each section which detects the voiced section, unvoiced section, and the silence section at each frame using a multi-layer perceptron neural network. First, a power spectrum and FFT (fast Fourier transform) coefficients obtained by FFT are used as the input to the neural network for each frame, then the neural network is trained using these power spectrum and FFT coefficients. In this experiment, the performance of the proposed algorithm for detection of the voiced section, unvoiced section, and silence section was evaluated based on the detection rates using various speeches, which are degraded by white noise and used as the input data of the neural network. In this experiment, the detection rates were 92% or more for such speech and white noise when training data and evaluation data were the different.

Fast Defect Detection of PCB using Ultrasound Thermography (초음파 서모그라피를 이용한 빠른 PCB 결함 검출)

  • Cho, Jai-Wan;Jung, Hyun-Kyu;Seo, Yong-Chil;Jung, Seung-Ho;Kim, Seung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.273-275
    • /
    • 2005
  • Active thermography is being used since several years for remote non-destructive testing. It provides thermal images for remote detection and imaging of damages. Also, it is based on propagation and reflection of thermal waves which are launched from the surface into the inspected component by absorption of modulated radiation. For energy deposition, it use external heat sources (e.g., halogen lamp or convective heating) or internal heat generation (e.g., microwaves, eddy current, or elastic wave). Among the external heat sources, the ultrasound is generally used for energy deposition because of defect selective heating up. The heat source generating a thermal wave is provided by the defect itself due to the attenuation of amplitude modulated ultrasound. A defect causes locally enhanced losses and consequently selective heating up. Therefore amplitude modulation of the injected ultrasonic wave turns a defect into a thermal wave transmitter whose signal is detected at the surface by thermal infrared camera. This way ultrasound thermography(UT) allows for selective defect detection which enhances the probability of defect detection in the presence of complicated intact structures. In this paper the applicability of UT for fast defect detection is described. Examples are presented showing the detection of defects in PCB material. Measurements were performed on various kinds of typical defects in PCB materials (both Cu metal and non-metal epoxy). The obtained thermal image reveals area of defect in row of thick epoxy material and PCB.

  • PDF

Robust Speech Endpoint Detection in Noisy Environments for HRI (Human-Robot Interface) (인간로봇 상호작용을 위한 잡음환경에 강인한 음성 끝점 검출 기법)

  • Park, Jin-Soo;Ko, Han-Seok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.2
    • /
    • pp.147-156
    • /
    • 2013
  • In this paper, a new speech endpoint detection method in noisy environments for moving robot platforms is proposed. In the conventional method, the endpoint of speech is obtained by applying an edge detection filter that finds abrupt changes in the feature domain. However, since the feature of the frame energy is unstable in such noisy environments, it is difficult to accurately find the endpoint of speech. Therefore, a novel feature extraction method based on the twice-iterated fast fourier transform (TIFFT) and statistical models of speech is proposed. The proposed feature extraction method was applied to an edge detection filter for effective detection of the endpoint of speech. Representative experiments claim that there was a substantial improvement over the conventional method.

A Collision detection from division space for performance improvement of MMORPG game engine (MMORPG 게임엔진의 성능개선을 위한 분할공간에서의 충돌검출)

  • Lee, Sung-Ug
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.567-574
    • /
    • 2003
  • Application field of third dimension graphic is becoming diversification by the fast development of hardware recently. Various theory of details technology necessary to design game such as 3D MMORPG (Massive Multi-play Online Role Flaying Game) that do with third dimension. Cyber city should be absorbed. It is the detection speed that this treatise is necessary in game engine design. 3D MMORPG game engine has much factor that influence to speed as well as rendering processing because it express huge third dimension city´s grate many building and individual fast effectively by real time. This treatise nay get concept about the collision in 3D MMORPG and detection speed elevation of game engine through improved detection method. Space division is need to process fast dynamically wide outside that is 3D MMORPG´s main detection target. 3D is constructed with tree construct individual that need collision using processing geometry dataset that is given through new graph. We may search individual that need in collision detection and improve the collision detection speed as using hierarchical bounding box that use it with detection volume. Octree that will use by division octree is used mainly to express rightly static object but this paper use limited OSP by limited space division structure to use this in dynamic environment. Limited OSP space use limited space with method that divide square to classify typically complicated 3D space´s object. Through this detection, this paper propose follow contents, first, this detection may judge collision detection at early time without doing all polygon´s collision examination. Second, this paper may improve detection efficiency of game engine through and then reduce detection time because detection time of bounding box´s collision detection.