• Title/Summary/Keyword: automated detection technique

Search Result 98, Processing Time 0.027 seconds

Automated Detection Technique for Suspected Copyright Infringement Sites

  • Jeong, Hae Seon;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4889-4908
    • /
    • 2020
  • With the advances in Information Technology (IT), users can download or stream copyrighted works, such as videos, music, and webtoons, at their convenience. Thus, the frequency of use of copyrighted works has increased. Consequently, the number of unauthorized copies and sharing of copyrighted works has also increased. Monitoring is being conducted on sites suspected of conducting copyright infringement activities to reduce copyright holders' damage due to unauthorized sharing of copyrighted works. However, suspected copyright infringement sites respond by changing their domains or blocking access requests. Although research has been conducted for improving the effectiveness of suspected copyright infringement site detection by defining suspected copyright infringement sites' response techniques as a lifecycle step, there is a paucity of studies on automation techniques for lifecycle detection. This has reduced the accuracy of lifecycle step detection on suspected copyright infringement sites, which change domains and lifecycle steps in a short period of time. Thus, in this paper, an automated detection technique for suspected copyright infringement sites is proposed for efficient detection and response to suspected copyright infringement sites. Using our proposed technique, the response to each lifecycle step can be effectively conducted by automatically detecting the lifecycle step.

An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags (HTML 태그 순서를 이용한 불법 사이트 탐지 자동화 기술)

  • Lee, Kiryong;Lee, Heejo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1173-1178
    • /
    • 2016
  • Since the introduction of BitTorrent protocol in 2001, everything can be downloaded through file sharing, including music, movies and software. As a result, the copyright holder suffers from illegal sharing of copyright content. In order to solve this problem, countries have enacted illegal share related law; and internet service providers block pirate sites. However, illegal sites such as pirate bay easily reopen the site by changing the domain name. Thus, we propose a technique to easily detect pirate sites that are reopened. This automated technique collects the domain names using the google search engine, and measures similarity using Longest Common Subsequence (LCS) algorithm by comparing the tag structure of the source web page and reopened web page. For evaluation, we colledted 2,383 domains from google search. Experimental results indicated detection of a total of 44 pirate sites for collected domains when applying LCS algorithm. In addition, this technique detected 23 pirate sites for 805 domains when applied to foreign pirate sites. This experiment facilitated easy detection of the reopened pirate sites using an automated detection system.

Advanced Process Technique for Field Check Data Editing and Structured Editing on Digital Map Ver2.0, Applying Automatic Error Detection Method (자동 오류검출 방법을 적용한 수치지도 Ver2.0 정위치 및 구조화 편집 공정개선 연구)

  • Lee Jin Soo;Park Chang Taek;Park Ki Surk
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.23 no.3
    • /
    • pp.331-340
    • /
    • 2005
  • Digital map is very important digital geographic information which is the base for various fields such as building and using the geographic information system (GIS), planing the regional development, and etc. Therefore, it needs high accuracy. Then we offer the advanced technique which minimizes errors on digital maps, using the automated inspection through the whole figures. In addition this new technique raises the economical efficiency as well as accuracy applying the automated error detection method which can recognize, search and classify errors automatically.

Automated Mismatch Detection based on Matching and Robust Estimation for Automated Image Navigation

  • Lee Tae-Yoon;Kim Taejung;Choi Rae-Jin
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.709-712
    • /
    • 2005
  • Ground processing for geostationary weather satellite such as GOES, MTSAT includes the process called image navigation. Image navigation means the retrieval of satellite navigational parameters from images and requires landmark detection by matching satellite images against landmark chips. For an automated preprocessing, a matching must be performed automatically. However, if match results contain errors, the accuracy of image navigation deteriorates. To overcome this problem, we propose the use of a robust estimation technique, called Random Sample Consensus (RANSAC), to automatically detect mismatches. We tested GOES-9 satellite images with 30 landmark chips. Landmark chips were extracted from the world shoreline database. To them, matching was applied and mismatch results were detected automatically by RANSAC. Results showed that all mismatches were detected correctly by RANSAC with a threshold value of 2.5 pixels.

  • PDF

An Automated Technique for Detecting Axon Structure in Time-Lapse Neural Image Sequence (시간 경과 신경계 영상 시퀀스에서의 축삭돌기 추출 기법)

  • Kim, Nak Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.251-258
    • /
    • 2014
  • The purpose of the neural image analysis is to trace the velocities and the directions of moving mitochondria migrating through axons. This paper proposes an automated technique for detecting axon structure. Previously, the detection process has been carried out using a partially automated technique combined with some human intervention. In our algorithm, a consolidated image is built by taking the maximum intensity value on the all image frames at each pixel Axon detection is performed through vessel enhancement filtering followed by a peak detection procedure. In order to remove errors contained in ridge points, a filtering process is devised using a local reliability measure. Experiments have been performed using real neural image sequences and ground truth data extracted manually. It has been turned out that the proposed algorithm results in high detection rate and precision.

Defect detection for TFT-LCD panel using image processing (영상처리를 이용한 TFT-LCD의 불량 검출)

  • 이규봉;곽동민;최두현;송영철;박길흠
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1783-1786
    • /
    • 2003
  • In this paper, an automated line-defect detection method for TFT-LCD panel is presented. A DFB(Directional Filter Bank) and line-projection method are used to find line-defect which is one of the major defects occurred in TFT-LCD panel. The experimental results show that the proposed algorithm gave promising results for applying automated inspection technique for TFT-LCD panel.

  • PDF

The Study on the Automated Detection Algorithm for Penetration Scenarios using Association Mining Technique (연관마이닝 기법을 이용한 침입 시나리오 자동 탐지 알고리즘 연구)

  • 김창수;황현숙
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.371-384
    • /
    • 2001
  • In these days, it is continuously increased to the intrusion of system in internet environment. The methods of intrusion detection can be largely classified into anomaly detection and misuse detection. The former uses statistical methods, features selection method in order to detect intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching. The existing studies for IDS(intrusion detection system) use combined methods. In this paper, we propose a new intrusion detection algorithm combined both state transition analysis and association mining techniques. For the intrusion detection, the first step is generated state table for transmitted commands through the network. This method is similar to the existing state transition analysis. The next step is decided yes or no for intrusion using the association mining technique. According to this processing steps, we present the automated generation algorithm of the penetration scenarios.

  • PDF

Automated Analysis Technique Developed for Detection of ODSCC on the Tubes of OPR1000 Steam Generator

  • Kim, In Chul;Nam, Min Woo
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.33 no.6
    • /
    • pp.519-523
    • /
    • 2013
  • A steam generator (SG) tube is an important component of a nuclear power plant (NPP). It works as a pressure boundary between the primary and secondary systems. The integrity of a SG tube can be assessed by an eddy current test every outage. The eddy current technique(adopting a bobbin probe) is currently the main technique used to assess the integrity of the tubing of a steam generator. An eddy current signal analyst for steam generator tubes continuously analyzes data over a given period of time. However, there are possibilities that the analyst conducting the test may get tired and cause mistakes, such as: missing indications or not being able to separate a true defect signal from one that is more complicated. This error could lead to confusion and an improper interpretation of the signal analysis. In order to avoid these possibilities, many countries of opted for automated analyses. Axial ODSCC (outside diameter stress corrosion cracking) defects on the tubes of OPR1000 steam generators have been found on the tube that are in contract with tube support plates. In this study, automated analysis software called CDS (computer data screening) made by Zetec was used. This paper will discuss the results of introducing an automated analysis system for an axial ODSCC on the tubes of an OPR1000 steam generator.

Automated Generation Algorithm of the Penetration Scenarios using Association Mining Technique (연관 마이닝 기법을 이용한 침입 시나리오 자동생성 알고리즘)

  • 정경훈;주정은;황현숙;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.203-207
    • /
    • 1999
  • In this paper we propose the automated generation algorithm of penetration scenario using association mining technique. Until now known intrusion detections are classified into anomaly detection and misuse detection. The former uses statistical method, features selection, neural network method in order to decide intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching for deciding intrusion. In proposed many intrusion detection algorithms unknown penetrations are created and updated by security experts. Our algorithm automatically generates penetration scenarios applying association mining technique to state transition technique. Association mining technique discovers efficient and useful unknown information in existing data. In this paper the algorithm we propose can automatically generate penetration scenarios to have been produced by security experts and is easy to cope with intrusions when it is compared to existing intrusion algorithms. Also It has advantage that maintenance cost is not high.

  • PDF

Preliminary Study for Vision A.I-based Automated Quality Supervision Technique of Exterior Insulation and Finishing System - Focusing on Form Bonding Method - (인공지능 영상인식 기반 외단열 공법 품질감리 자동화 기술 기초연구 - 단열재 습식 부착방법을 중심으로 -)

  • Yoon, Sebeen;Lee, Byoungmin;Lee, Changsu;Kim, Taehoon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.133-134
    • /
    • 2022
  • This study proposed vision artificial intelligence-based automated supervision technology for external insulation and finishing system, and basic research was conducted for it. The automated supervision technology proposed in this study consists of the object detection model (YOLOv5) and the part that derives necessary information based on the object detection result and then determines whether the external insulation-related adhesion regulations are complied with. As a result of a test, the judgement accuracy of the proposed model showed about 70%. The results of this study are expected to contribute to securing the external insulation quality and further contributing to the realization of energy-saving eco-friendly buildings. As further research, it is necessary to develop a technology that can improve the accuracy of the object detection model by supplementing the number of data for model training and determine additional related regulations such as the adhesive area ratio.

  • PDF