• Title/Summary/Keyword: Tree Detection

Search Result 527, Processing Time 0.035 seconds

PD Detection and Analysis of Electrical Treeing Progress into XLPE Insulator (XLPE 절연물내의 전기트리 진전 시 PD 검출 및 특성분석)

  • Park, Seong-Hee;Jung, Hae-Eun;Kang, Seong-Hwa;Lim, Kee-Jo
    • Proceedings of the KIEE Conference
    • /
    • 2006.10a
    • /
    • pp.215-216
    • /
    • 2006
  • Solid insulation exposed to voltage is degraded by electrical tree process. And the degradation of the insulation is accelerated by voltage application. For this experimental, specimen of e1ectrical tree model is made by XLPE (cross-linked polyethylene). And the size of the specimen is $7*5*7\;mm^3$. Distance of need1e and plane is 2 mm. Voltages applied for acceleration test are 12 kV to 15 kV. And distribution characteristic of degraded stage is studied too. As a PD detecting and data process, discharge data acquire from PD detecting system (Biddle instrument). The system presents statistical distribution as phase resolved. Moreover the processing time of electrical tree is recorded to know the speed of degradation according to voltage.

  • PDF

A Study on Fault Diagnosis of the Motor by Fuzzy Fault Tree (퍼지 Fault Tree 기법에 의한 모터 고장진단에 관한 연구)

  • Lee, Sung-Hwan;Choi, Chul-Hwan;Jang, Nak-Won
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.969-970
    • /
    • 2007
  • In this thesis, an algorithm of fault detection and diagnosis during operation for induction motors under the condition of various loads and rates is investigated. For this purpose, the spectrum pattern of input cutterrents was used to monitor the state of induction motors, and by clustering the spectrum pattern of input currents, the newly occurrence of spectrums pattern caused by faults were detected. For diagnosis of the fault detected, the fuzzy fault tree was designed, and the fuzzy relation equation representing the relation between an induction motor fault and each fault type, was solved. The solution of the fuzzy relation equation shows the possibility of each fault's occurring.

  • PDF

Classification of Apple Tree Leaves Diseases using Deep Learning Methods

  • Alsayed, Ashwaq;Alsabei, Amani;Arif, Muhammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.324-330
    • /
    • 2021
  • Agriculture is one of the essential needs of human life on planet Earth. It is the source of food and earnings for many individuals around the world. The economy of many countries is associated with the agriculture sector. Lots of diseases exist that attack various fruits and crops. Apple Tree Leaves also suffer different types of pathological conditions that affect their production. These pathological conditions include apple scab, cedar apple rust, or multiple diseases, etc. In this paper, an automatic detection framework based on deep learning is investigated for apple leaves disease classification. Different pre-trained models, VGG16, ResNetV2, InceptionV3, and MobileNetV2, are considered for transfer learning. A combination of parameters like learning rate, batch size, and optimizer is analyzed, and the best combination of ResNetV2 with Adam optimizer provided the best classification accuracy of 94%.

DDoS attack analysis based on decision tree considering importance (중요도를 고려한 의사 결정 트리 기반 DDoS 공격 분석)

  • Youm, Sungkwan;Park, Sangyoon;Shin, Kwang-Seong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.652-654
    • /
    • 2021
  • Attacks such as DDoS are detected by the intrusion detection system and can be prevented early. DDoS attack traffic was analyzed using the decision tree. Deterministic features with high importance were found, and the accuracy was verified by proceeding the decision tree for only those properties. And the contents of false positive and false negative traffic were analyzed. As a result, the accuracy of one attribute was 98% and the two attributes were 99.8%, respectively.

  • PDF

Nondestructive Methods for the Detection of Internal Decay and the Vitality Measurement of Old-Giant Trees (노거수 활력 측정 및 내부 부후 검출을 위한 비파괴검사법)

  • Gao, Yuliang;Cha, Byeong Jin
    • Korean Journal of Heritage: History & Science
    • /
    • v.42 no.1
    • /
    • pp.144-157
    • /
    • 2009
  • Nondestructive methods to check the vitality of trees and to find out internal decay of old-giant trees include the use of electrical resistance, ultrasound transmission time, microdrilling, and infrared thermography etc. Among these, ultrasound transmission offers some advantages compared to others such as it is an entirely nondestructive detection method and it can be applied to very big trees. However, the ultrasound equipment is comparatively expensive and not broadly spread yet. On the other hand, Shigometer is versatile to be applied to check vitality of the tree and find out internal decay. Electrical conductivity of plant tissues is a very useful characteristics to determine the vitality and internal decay of trees. Electrical resistance of cambial area tells about the vitality of a tree and electrical resistance of heartwood reveals discoloration or decay of it. For determination of the vitality of the tree, the standard equation for calibration of measured electrical resistances should be developed by measuring and analyzing electrical resistance from at least 30-40 trees of the same species with that tree. All the factors, especially tree species, diameter of the stem, and temperature, which can altered the electrical resistance of trees, should be taken into consideration in the development of the equation. If the standard equation is developed for old-giant trees that we should conserve, it will be very useful. In addition, periodical and continued measuring of a certain tree will help to determine the condition of the tree by comparing the measurement with accumulated data of the tree. Measuring electrical resistance of wood might not require the standard equation. But it also needs to check electrical resistance of sound wood of the same tree species. If the stems that should be examined is thicker than 40cm, it is better to use the ultrasound measurement combined to Shigometer.

Video Matching Algorithm of Content-Based Video Copy Detection for Copyright Protection (저작권보호를 위한 내용기반 비디오 복사검출의 비디오 정합 알고리즘)

  • Hyun, Ki-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.315-322
    • /
    • 2008
  • Searching a location of the copied video in video database, signatures should be robust to video reediting, channel noise, time variation of frame rate. Several kinds of signatures has been proposed. Ordinal signature, one of them, is difficult to describe the spatial characteristics of frame due to the site of fixed window, $N{\times}N$, which is compute the average gray value. In this paper, I studied an algorithm of sequence matching in video copy detection for the copyright protection, employing the R-tree index method for retrieval and suggesting a robust ordinal signatures for the original video clips and the same signatures of the pirated video. Robust ordinal has a 2-dimensional vector structures that has a strong to the noise and the variation of the frame rate. Also, it express as MBR form in search space of R-tree. Moreover, I focus on building a video copy detection method into which content publishers register their valuable digital content. The video copy detection algorithms compares the web content to the registered content and notifies the content owners of illegal copies. Experimental results show the proposed method is improve the video matching rate and it has a characteristics of signature suitable to the large video databases.

  • PDF

Improved Ad Hoc On-demand Distance Vector Routing(AODV) Protocol Based on Blockchain Node Detection in Ad Hoc Networks

  • Yan, Shuailing;Chung, Yeongjee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.46-55
    • /
    • 2020
  • Ad Hoc network is a special wireless network, mainly because the nodes are no control center, the topology is flexible, and the networking could be established quickly, which results the transmission stability is lower than other types of networks. In order to guarantee the transmission of data packets in the network effectively, an improved Queue Ad Hoc On-demand Distance Vector Routing protocol (Q-AODV) for node detection by using blockchain technology is proposed. In the route search process. Firstly, according to the node's daily communication record the cluster is formed by the source node using the smart contract and gradually extends to the path detection. Then the best optional path nodes are chained in the form of Merkle tree. Finally, the best path is chosen on the blockchain. Simulation experiments show that the stability of Q-AODV protocol is higher than the AODV protocol or the Dynamic Source Routing (DSR) protocol.

An Intrusion Detection System Using Pattern Classification (패턴 분류를 이용한 침입탐지 시스템 모델)

  • 윤은준;김현성;부기동
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.59-65
    • /
    • 2002
  • Recently, lots of researchers work focused on the intrusion detection system. Pattern matching technique is commonly used to detect the intrusion in the system, However, the method requires a lot of time to match between systems rule and inputted packet data. This paper proposes a new intrusion detection system based on the pattern matching technique. Proposed system reduces the required time for pattern matching by using classified system rule. The classified rule is implemented with a general tree for efficient pattern matching. Thereby, proposed system could perform network intrusion detection efficiently.

  • PDF

An Intrusion Detection System Using Pattern Classification (패턴 분류를 이용한 침입탐지 시스템 모델)

  • 윤은준;김현성;부기동
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.59-65
    • /
    • 2002
  • Recently, lots of researchers work focused on the intrusion detection system. Pattern matching technique is commonly used to detect the intrusion in the system, However, the method requires a lot of time to match between systems rule and inputted packet data. This paper proposes a new intrusion detection system based on the pattern matching technique. Proposed system reduces the required time for pattern matching by using classified system rule. The classified rule is implemented with a general tree for efficient pattern matching. Thereby, proposed system could perform network intrusion detection efficiently.

  • PDF

Intrusion Detection System using Pattern Classification with Hashing Technique (패턴분류와 해싱기법을 이용한 침입탐지 시스템)

  • 윤은준;김현성;부기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.75-82
    • /
    • 2003
  • Computer and network security has recently become a popular subject due to the explosive growth of the Internet Especially, attacks based on malformed packet are difficult to detect because these attacks use the skill of bypassing the intrusion detection system and Firewall. This paper designs and implements a network-based intrusion detection system (NIDS) which detects intrusions with malformed-packets in real-time. First, signatures, rules in NIDS like Snouts rule files, are classified using similar properties between signatures NIDS creates a rule tree applying hashing technique based on the classification. As a result the system can efficiently perform intrusion detection.

  • PDF