• Title/Summary/Keyword: data detection error

Search Result 727, Processing Time 0.026 seconds

PinMemcheck: Pin-Based Memory Leakage Detection Tool for Mobile Device Development (PinMemcheck: 이동통신 기기 개발을 위한 Pin 기반의 메모리 오류 검출 도구(道具))

  • Jo, Kyong-Jin;Kim, Seon-Wook
    • The KIPS Transactions:PartA
    • /
    • v.18A no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Memory error debugging is one of the most critical processes in improving software quality. However, due to the extensive time consumed to debug, the enhancement often leads to a huge bottle neck in the development process of mobile devices. Most of the existing memory error detection tools are based on static error detection; however, the tools cannot be used in mobile devices due to their use of large working memory. Therefore, it is challenging for mobile device vendors to deliver high quality mobile devices to the market in time. In this paper, we introduce "PinMemcheck", a pin-based memory error detection tool, which detects all potential memory errors within $1.5{\times}$ execution time overhead compared with that of a baseline configuration by applying the Pin's binary instrumentation process and a simple data structure.

Correlation Analysis of Event Logs for System Fault Detection (시스템 결함 분석을 위한 이벤트 로그 연관성에 관한 연구)

  • Park, Ju-Won;Kim, Eunhye;Yeom, Jaekeun;Kim, Sungho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.129-137
    • /
    • 2016
  • To identify the cause of the error and maintain the health of system, an administrator usually analyzes event log data since it contains useful information to infer the cause of the error. However, because today's systems are huge and complex, it is almost impossible for administrators to manually analyze event log files to identify the cause of an error. In particular, as OpenStack, which is being widely used as cloud management system, operates with various service modules being linked to multiple servers, it is hard to access each node and analyze event log messages for each service module in the case of an error. For this, in this paper, we propose a novel message-based log analysis method that enables the administrator to find the cause of an error quickly. Specifically, the proposed method 1) consolidates event log data generated from system level and application service level, 2) clusters the consolidated data based on messages, and 3) analyzes interrelations among message groups in order to promptly identify the cause of a system error. This study has great significance in the following three aspects. First, the root cause of the error can be identified by collecting event logs of both system level and application service level and analyzing interrelations among the logs. Second, administrators do not need to classify messages for training since unsupervised learning of event log messages is applied. Third, using Dynamic Time Warping, an algorithm for measuring similarity of dynamic patterns over time increases accuracy of analysis on patterns generated from distributed system in which time synchronization is not exactly consistent.

Radar, Vision, Lidar Fusion-based Environment Sensor Fault Detection Algorithm for Automated Vehicles (레이더, 비전, 라이더 융합 기반 자율주행 환경 인지 센서 고장 진단)

  • Choi, Seungrhi;Jeong, Yonghwan;Lee, Myungsu;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.9 no.4
    • /
    • pp.32-37
    • /
    • 2017
  • For automated vehicles, the integrity and fault tolerance of environment perception sensor have been an important issue. This paper presents radar, vision, lidar(laser radar) fusion-based fault detection algorithm for autonomous vehicles. In this paper, characteristics of each sensor are shown. And the error of states of moving targets estimated by each sensor is analyzed to present the method to detect fault of environment sensors by characteristic of this error. Each estimation of moving targets isperformed by EKF/IMM method. To guarantee the reliability of fault detection algorithm of environment sensor, various driving data in several types of road is analyzed.

Reinforcement Data Mining Method for Anomaly&Misuse Detection (침입탐지시스템의 정확도 향상을 위한 개선된 데이터마이닝 방법론)

  • Choi, Yun Jeong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2010
  • Recently, large amount of information in IDS(Intrusion Detection System) can be un manageable and also be mixed with false prediction error. In this paper, we propose a data mining methodology for IDS, which contains uncertainty based on training process and post-processing analysis additionally. Our system is trained to classify the existing attack for misuse detection, to detect the new attack pattern for anomaly detection, and to define border patter between attack and normal pattern. In experimental results show that our approach improve the performance against existing attacks and new attacks,from 0.62 to 0.84 about 35%.

Performance Comparison of Coherent and Non-Coherent Detection Schemes in LR-UWB System

  • Kwon, Soonkoo;Ji, Sinae;Kim, Jaeseok
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.518-523
    • /
    • 2012
  • This paper presents new coherent and non-coherent detection methods for the IEEE 802.15.4a low-rate ultra-wideband physical layer with forward error correction (FEC) coding techniques. The coherent detection method involving channel estimation is based on the correlation characteristics of the preamble signal. A coherent receiver uses novel iterated selective-rake (IT-SRAKE) to detect 2-bit data in a non-line-of-sight channel. The non-coherent detection method that does not involve channel estimation employs a 2-bit data detection scheme using modified transmitted reference pulse cluster (M-TRPC) methods. To compare the two schemes, we have designed an IT-SRAKE receiver and a MTRPC receiver using an IEEE 802.15.4a physical layer. Simulation results show the performance of IT-SRAKE is better than that of the M-TRPC by 3-9 dB.

Improved Target Localization Using Line Fitting in Distributed Sensor Network of Detection-Only Sensor (탐지만 가능한 센서로 구성된 분산센서망에서 라인피팅을 이용한 표적위치 추정기법의 성능향상)

  • Ryu, Chang Soo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.362-369
    • /
    • 2012
  • Recently, a target detection based on a distributed sensor network has been much studied in active sonar. Zhou et al. proposed a target localization method using line fitting based on a distributed sensor network which consists of low complexity sensors that only report binary detection results. This method has three advantages relative to ML estimator. First, there is no need to estimate propagation model parameters. Second, the computation is simple. Third, it only use sensors with "detection", which implies less data to be collected by data processing center. However, this method has larger target localization error than the ML estimator. In this paper, a target localization method which modifies Zhou's method is proposed for reducing the localization error. The modified method shows the performance improvement that the target localization error is reduced by 40.7% to Zhou's method in the point of RMSE.

Validation of MODIS fire product over Sumatra and Borneo using High Resolution SPOT Imagery

  • LIEW, Soo-Chin;SHEN, Chaomin;LOW, John;Lim, Agnes;KWOH, Leong-Keong
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1149-1151
    • /
    • 2003
  • We performed a validation study of the MODIS active fire detection algorithm using high resolution SPOT image as the reference data set. Fire with visible smoke plumes are detected in the SPOT scenes, while the hotspots in MODIS data are detected using NASA's new version 4 fire detection algorithm. The detection performance is characterized by the commission error rate (false alarms) and the omission error rate (undetected fires). In the Sumatra and Kalimantan study area, the commission rate and the omission rate are 27% and 34% respectively. False alarms are probably due to recently burnt areas with warm surfaces. False negative detection occur where there are long smoke plumes and where fires occur in densely vegetated areas.

  • PDF

Reversible Data Hiding Algorithm Based on Pixel Value Ordering and Edge Detection Mechanism

  • Nguyen, Thai-Son;Tram, Hoang-Nam;Vo, Phuoc-Hung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3406-3418
    • /
    • 2022
  • Reversible data hiding is an algorithm that has ability to extract the secret data and to restore the marked image to its original version after data extracting. However, some previous schemes offered the low image quality of marked images. To solve this shortcoming, a new reversible data hiding scheme based on pixel value ordering and edge detection mechanism is proposed. In our proposed scheme, the edge image is constructed to divide all pixels into the smooth regions and rough regions. Then, the pixels in the smooth regions are separated into non overlapping blocks. Then, by taking advantages of the high correlation of current pixels and their adjacent pixels in the smooth regions, PVO algorithm is applied for embedding secret data to maintain the minimum distortion. The experimental results showed that our proposed scheme obtained the larger embedding capacity. Moreover, the greater image quality of marked images are achieved by the proposed scheme than that other previous schemes while the high EC is embedded.

A Study on the Cut Detection System of Video Data using MSE (MSE를 이용한 동영상데이터의 컷 검출시스템에 관한 연구)

  • Kim Dan-Hwan;Joung Ki-Bong;Oh Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1399-1404
    • /
    • 2004
  • The development of computer technology and the advancement of the technology of information and communications spread the technology of multimedia and increased the use of multimedia data with large capacity. Users can grasp the overall video data and they are able to play wanted video back. To grasp the overall video data it is necessary to offer the list of summarized video data information. In order to search video efficiently an index process of video data is essential and it is also indispensable skill. Therefore, this thesis suggested the effective method about the cut detection of frames which will become a basis of an index based on contents of video image data. This suggested method was detected as the unchanging pixel rotor intelligence value, classified into diagonal direction. Pixel value of color detected in each frame of video data is stored as A(i, i) matrix - i is the number of frames, i is an image height of frame. By using the stored pixel value as the method of UE(Mean Square Error) I calculated a specified value difference between frames and detected cut quickly and exactly in case it is bigger than threshold value set in advance. To carry out an experiment on the cut detection of lames comprehensively, 1 experimented on many kinds of video, analyzing and comparing efficiency of the cut detection system.

Compound Outlier Assessment and Verification for Multiple Field Monitoring Data (다수 계측 데이터에 대한 복합 이상치 평가 및 검증)

  • Jeon, Jesung
    • Journal of the Korean GEO-environmental Society
    • /
    • v.19 no.1
    • /
    • pp.5-14
    • /
    • 2018
  • All kinds of monitoring data in construction site could have outlier created from diverse cause. In this study generation technique of synthesis value, its regression, final outlier detection and assessment are conducted to distinct outlier data included in extensive time series dataset. Synthesis value having weight factor of correlation between a number of datasets consist of many monitoring data enable to detect outlier by increasing its correlation. Standard artificial dataset in which intentional outliers are inserted has been used for assessment of synthesis value technique. These results showed increase of detection accuracy for outlier and general tendency in case of having different time series models in common. Accuracy of outlier detection increased in case of using more dataset and showing similar time series pattern.