• Title/Summary/Keyword: cut detection

Search Result 358, Processing Time 0.023 seconds

Determination of methamphetamine in the hair of Korean abuser by CG/MS (GC/MS에 의한 한국인의 모발중 Methamphetamine검출)

  • 유영찬;정희선;최화경
    • YAKHAK HOEJI
    • /
    • v.37 no.4
    • /
    • pp.356-361
    • /
    • 1993
  • A sensitive method for the determination of methamphetamine(MA) and amphetamine(AM) in hair was developed by gas chromatography/mass spectrometry using stable isotope-labeled internal standards, amphetamine-d$_{5}$ and methamphetamine-d$_{5}$. Hair sample was washed with MeOH, incubated with MeOH(I% HCI) overnight at $37^{\circ}C$ while stirring and extracted using solid phase extraction column on a vacuum manifold. The extract obtained was pentafluoropropionated, and applied to GC/MS. The calibration curves of MA and AM were linear from 2.5 to 250 ng (r>0.99 for both). The limit of detection was 0.1 ng/mg in hair and cut-off level was set at 0.25 ng/mg for both. Hair samples of 27 MA abusers showed positive results in the range 0.7 to 106.8 ng/mg. AM, its metabolite, was detected in 20 out of 27 samples. The ratio of MA versus AM was 4.6~38.3 in specimens. Hair analysis for methamphetamine by GC/MS is an effective method for identifying long-term drug abusers.

  • PDF

Cut Detection Using Color Histogram and Energy Vector in Wavelet Transform Domain (웨이블릿 변환영역에서 칼라 히스토그램과 에너지 벡터를 이용한 컷 검출)

  • 김수정;정성환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10b
    • /
    • pp.467-469
    • /
    • 2000
  • 본 논문은 웨이블릿 변환영역 하에서 칼라 히스토그램과 에너지 벡터를 이용한 컷검출 방법을 제안한다. 기존의 컷 검출 방법들은 대부분 공간영역과 변환영역 각각에 대한 특징을 이용해 컷을 검출하였다. 그러나 본 논문에서는 웨이블릿 변환영역 하에서도 공간영역 특성을 유지하는 LL밴드 상의 칼라 히스토그램과 LH와 HL밴드의 에너지 값을 변환영역 특성으로 함께 고려하였다. 최근 영상 압축 표준에 웨이블릿을 이용한 압축기법이 사용되고 있으므로, 제안한 방법은 웨이블릿 압축 영상에서 압축을 해제할 필요 없이 검출하는데 사용되어질 수 있다. 제안한 방법의 성능평가를 위하여 광고, 뉴스, 스포츠, 영화 등 5개 분야의 다양한 TV 프로그램에서 약 10,000개의 프레임으로 실험한 결과, Recall에서는 약 90%, Precision에서는 약 94%의 컷 검출 성능을 나타내었다.

  • PDF

A Study on the Signal Process of Cutting Forces in Turning and its Application (2nd Report) -Automatic Monitor of Chip Rorms using Cutting Forces- (선삭가공에 있어서 선삭저항의 신호처리와 그 응용에 관한 연구(II))

  • Kim, Do-Yeong;Yun, Eul-Jae;Nam, Gung-Seok
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.7 no.2
    • /
    • pp.85-94
    • /
    • 1990
  • In automatic metal cuttings, the chip control is one of the serious problems. So the automatic detection of chip forms is essential to the chip control in automatic metal cuttings. Cutting experiments were carried out under the variety of cutting conditions (cutting speed, feed, depth of cut and tool geometry) and with workpiece made of steel (S45C), and cutting forces were measured in-processing by using a piezoelectric type Tool Dynamometer. In this report, the frequency analysis of dynamic components, the upper frequency distributions, the ratio of RMS values, the numbers of null point and the probability density were calculated from the dynamic componeents of cutting forces filtered through various band pass filters. Experimental results showed that computer chip form monitoring system based on the cutting forces was designed and simulated and that 6 type of chip forms could be detected while in-process machining.

  • PDF

Studies on the Detection of Visual-TEP with Average Method & the Improvement of TEP with DC-Drift Elinination (Average 기법에 의한 Visual-TEP의 검출과 DC-Drift 제거에 의한 TEP 신호개선에 관한 연구)

  • 배병훈;최정미
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.2
    • /
    • pp.135-142
    • /
    • 1994
  • This paper presents average method to detect Visual-Transient Evoked Potential from the human scalp electric potential measured by the ElectroEncephaloGram. To confirm the validity of average method, the average-process is performed with both stimulated and no-stimulated potentials respectively, and both results are compared. The specific waveform, which is visual-transient evoked potential, is produced only in the case of stimulated potential. It was found that a dc-drift, due to instrumentation errors and other noises, can produce significant changes in the evoked-potential waveform. This can be removed with a high-pass filter (cut-off frequency=0.5Hz).

  • PDF

Data-centric Energy-aware Re-clustering Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 데이터 중심의 에너지 인식 재클러스터링 기법)

  • Choi, Dongmin;Lee, Jisub;Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.5
    • /
    • pp.590-600
    • /
    • 2014
  • In the wireless sensor network environment, clustering scheme has a problem that a large amount of energy is unnecessarily consumed because of frequently occurred entire re-clustering process. Some of the studies were attempted to improve the network performance by getting rid of the entire network setup process. However, removing the setup process is not worthy. Because entire network setup relieves the burden of some sensor nodes. The primary aim of our scheme is to cut down the energy consumption through minimizing entire setup processes which occurred unnecessarily. Thus, we suggest a re-clustering scheme that considers event detection, transmitting energy, and the load on the nodes. According to the result of performance analysis, our scheme reduces energy consumption of nodes, prolongs the network lifetime, and shows higher data collection rate and higher data accuracy than the existing schemes.

Implementation Of DDoS Botnet Detection System On Local Area Network (근거리 통신망에서의 DDoS 봇넷 탐지 시스템 구현)

  • Huh, Jun-Ho;Hong, Myeong-Ho;Lee, JeongMin;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.6
    • /
    • pp.678-688
    • /
    • 2013
  • Different Different from a single attack, in DDoS Attacks, the botnets that are distributed on network initiate attacks against the target server simultaneously. In such cases, it is difficult to take an action while denying the access of packets that are regarded as DDoS since normal user's convenience should also be considered at the target server. Taking these considerations into account, the DDoS botnet detection system that can reduce the strain on the target server by detecting DDoS attacks on each user network basis, and then lets the network administrator to take actions that reduce overall scale of botnets, has been implemented in this study. The DDoS botnet detection system proposed by this study implemented the program which detects attacks based on the database composed of faults and abnormalities collected through analyzation of hourly attack traffics. The presence of attack was then determined using the threshold of current traffic calculated with the standard deviation and the mean number of packets. By converting botnet-based detection method centering around the servers that become the targets of attacks to the network based detection, it was possible to contemplate aggressive defense concept against DDoS attacks. With such measure, the network administrator can cut large scale traffics of which could be referred as the differences between DDoS and DoS attacks, in advance mitigating the scale of botnets. Furthermore, we expect to have an effect that can considerably reduce the strain imposed on the target servers and the network loads of routers in WAN communications if the traffic attacks can be blocked beforehand in the network communications under the router equipment level.

Slope Movement Detection using Ubiquitous Sensor Network (USN을 이용한 사면거동 탐지)

  • Chang, K.T.;Ho, Albert;Jung, Chun-Suk;Jung, Hoon
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.2
    • /
    • pp.61-66
    • /
    • 2008
  • More than 70% of Korea consists of mountainous area and during the construction of roads and railroads many cut-slopes are inevitably formed. A number of environmental factors, such as the rainy season and frost heave during winter/thaw during spring, can result in rock falls and landslides. The failure of slopes is increasing every year and can cause damage to vehicles, personal injury and even fatality. In order to help protect people and property, there is a need for real-time monitoring systems to detect the early stages of slope failures. In this respect, the GMG has been using Translation Rotation Settlement (TRS) sensor units installed on slopes to monitor movement in real-time. However, the data lines of this system are vulnerable and the whole system can be damaged by a single lightning strike. In order to overcome this, GMG have proposed the use of Ubiquitous Sensor Networks (USN). The adoption of a USN system in lieu of data cables can help to minimize the risk of lightning damage and improve the reliability of slope monitoring systems.

  • PDF

Electrochemical Properties of Individual Carbon Nanotube Fabricated by Reactive Ion Etching (반응성 이온 식각법에 의해 제작된 탄소나노튜브 전극의 전기화학적 특성)

  • Hwang, Sook-Hyun;Choi, Hyon-Kwang;Kim, Sang-Hyo;Han, Young-Moon;Jeon, Min-Hyon
    • Korean Journal of Materials Research
    • /
    • v.21 no.2
    • /
    • pp.89-94
    • /
    • 2011
  • In this work, fabrication and electrochemical analysis of an individual multi-walled carbon nanotube (MWNT) electrode are carried out to confirm the applicability of electrochemical sensing. The reactive ion etching (RIE) process is performed to obtain sensitive MWNT electrodes. In order to characterize the electrochemical properties, an individual MWNT is cut by RIE under oxygen atmosphere into two segments with a small gap: one segment is applied to the working electrode and the other is used as a counter electrode. Electrical contacts are provided by nanolithography to the two MWNT electrodes. Dopamine is specially selected as an analytical molecule for electrochemical detection using the MWNT electrode. Using a quasi-Ag/AgCl reference electrode, which was fabricated by us, the nanoelectrodes are subjected to cyclic voltammetry inside a $2{\mu}L$ droplet of dopamine solution. In the experiment, RIE power is found to be a more effective parameter to cut an individual MWNT and to generate "broken" open state, which shows good electrochemical performance, at the end of the MWNT segments. It is found that the pico-molar level concentration of analytical molecules can be determined by an MWNT electrode. We believe that the MWNT electrode fabricated and treated by RIE has the potential for use in high-sensitivity electrochemical measurement and that the proposed scheme can contribute to device miniaturization.

An Adaptive Control of Symmetry Contribution Based Generalized Symmetry Transform (적응적 대칭기여도 제어 기반 일반화 대칭변환)

  • Jeon, Joon-Hyung;Lee, Seung-Hee;Park, Kil-Houm
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.208-217
    • /
    • 2014
  • This paper propose an adaptive control of symmetry contribution based generalized symmetry transform. which can be controlled symmetry contribution according to the intensity orientation of two pixels. In the proposed method, we define the C-D(convergent and divergent)plane which represents convergence and divergence region of gradient pairs. and used the gaussian phase wight function, with respect to the distance from the gradient pair to an extreme point, in calculating the symmetry contribution. The proposed method can be detect the object more efficiently by adaptive controlling the cut-off frequency of the gaussian phase wight function. To evaluate a performance of the proposed method, we compare the proposed method and conventional GST method in various images including IR image. we prove that the proposed method have better performance in object detection.

Fragile Watermarking for Image Authentication and Detecting Image Modification (영상 인증과 변형 검출을 위한 Fragile 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.459-465
    • /
    • 2009
  • Digital watermarking is a technique to insert a visually imperceptible information into an image so that the information can be extracted for the purposes of ownership verification or authentication. And watermarking techniques can be classified as either fragile or robust. Robust watermarks are useful for copyright and ownership assertion purposes. They cannot be easily removed and should resist common image manipulation procedures such as rotation, scaling, cropping, etc. On the other hand, fragile watermarks are easily corrupted by any image processing procedure, it can detect any change to an image as well as localizing the areas that have been changed. In this paper, we propose a fragile watermarking algorithm using a special hierarchical structure for integrity verification of image and detection of manipulated location. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in this hierarchy. The proposed method thwarts the cut-and-paste attack and the experimental results to demonstrate the effectiveness of the proposed method.

  • PDF