• Title/Summary/Keyword: detect

Search Result 14,605, Processing Time 0.041 seconds

A RADIOGRAPHIC STUDY OF THE EXPERIMENTAL LESIONS IN THE MAXILLARY SINUS (상악동의 실험병소에 관한 X선학적 연구)

  • Lee Joo Hyun;Hwang Eui Hwan;Lee Sang Rae
    • Journal of Korean Academy of Oral and Maxillofacial Radiology
    • /
    • v.24 no.1
    • /
    • pp.115-124
    • /
    • 1994
  • The purpose of this study was to examine the differences in representation of a globular radiopaque mass on the pantomograms and Waters' views and to compare the efficacy of periapical radiograms, pantomograms and Waters' views in detection of defects on the internal walls of the maxillary sinus. This study was performed with dried human skull. For the study of difference of radiopaque mass shadow in the two views, rubber ball with a diameter of 10㎜ was used as the experimental lesion. It was placed successively on the internal wall of the anterior, posterior, medial, lateral walls and floor of the maxillary sinus. To examine the detectability of defects for radiographic techniques, defects were formed in the anterior, posterior, medial, lateral walls, and floor of the maxillary sinus. They were formed with 0.5㎜, 0.75㎜, 1.0㎜, 2.0㎜ and 3.0㎜ sized steel round burs with a slow speed dental handpiece. By subsequently plugging the holes with zinc oxide eugenol paste, radiopaque defects were produced. After that the periapical radiograms, the pantomograms and the Waters' views were taken each and every defect. The obtained results were as follows: 1. Rubber balls placed on each internal wall of the maxillary sinus were correctly depicted on the posterior wall and the floor in case of the pantomogram, and on the anterior wall and the medial wall in case of the Waters' view. 2. On the detectability of defects for each radiographic technique, radiolucent defects were detected in different places for each technique. Periapical radiogram could detect 1.0㎜ defect on the floor of the maxillary sinus, pantomogram could detect 2.0㎜ defect on every internal wall of the maxillary sinus, and Waters' view could detect 3.0㎜ defect on the anterior wall of the maxillary sinus. 3. On the detectability of defects for each radiographic technique, radiopaque defects were detected in different places for each technique. Periapical radiogram could clearly detect 0.5㎜ defect on the floor of the maxillary sinus, pantomogram could detect 0.5㎜ defect on every internal wall of the maxillary sinus, and finally Waters' view could detect 0.5㎜defect on the anterior wall of the maxillary sinus but 0.75㎜ defect on the anterior wall, lateral wall and floor of the maxillary sinus. As the result, the periapical radiogram is the most simple and satisfactory method for investigating in the maxillary sinus. The pantomogram is suitable method for screening of changes in the maxillary sinus. And the Waters' view is available for detect of lesion in the anterior wall of the maxillary sinus. For the purpose of accurate diagnosis and evaluation of lesion in the maxillary sinus, these techniques supplement each other.

  • PDF

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

Policy Based Cloned CSD Detection Mechanism in Logistics (항만 물류 환경에서의 복제된 CSD 탐지를 위한 정책 기반 복제 탐지 매커니즘)

  • Hwang, Ah-Reum;Suh, Hwa-Jung;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.98-106
    • /
    • 2012
  • CSD(Container Security Device) is a security device with sensors that can detect the abnormal behavior such as illegal opening of a container door. Since the CSD provides security and safety of the container, CSD should not only provide security services such as confidentiality and integrity but also cloning detection. If we can not detect the cloned CSD, an adversary can use the cloned CSD for many illegal purposes. In this paper, we propose a policy based cloned CSD detection mechanism. To evaluate proposed clone detection mechanism, we have implemented the proposed scheme and evaluated the results.

A New Method to Detect Inner/Outer Race Bearing Fault Using Discrete Wavelet Transform in Frequency-Domain

  • Ghods, Amirhossein;Lee, Hong-Hee
    • Proceedings of the KIPE Conference
    • /
    • 2013.11a
    • /
    • pp.63-64
    • /
    • 2013
  • Induction motors' faults detection is almost a popular topic among researchers. Monitoring the output of motors is a key factor in detecting these faults. (Short-time) Fourier, (continuous, discrete) wavelet, and extended Park vector transformations are among the methods for fault detection. One major deficiency of these methods is not being able to detect the severity of faults that carry low energy information, e.g. in ball bearing system failure, there is absolutely no way to detect the severity of fault using Fourier or wavelet transformations. In this paper, the authors have applied the Discrete Wavelet Transform (DWT) frequency-domain analysis to detect bearing faults in an induction motor. In other words, in discrete transform which the output signal is decomposed in several steps and frequency resolution increases considerably, the frequency-band analysis is performed and it will be verified that first of all, fault sidebands become more recognizable for detection in higher levels of decomposition, and secondly, the inner race bearing faults turn out easier in these levels; and all these matter because of eliminating the not-required high energy components in lower levels of decomposing.

  • PDF

Detection of Mutated DNA Fragment by the Heteroduplex Analysis at the Temperature Gradient Gel (온도 기울기(temperature gradient) 젤에서 Heteroduplex Analysis 기법을 이용한 돌연변이 DNA의 검출)

  • 조용석;구미자;박귀근;박영서;강종백
    • Environmental Mutagens and Carcinogens
    • /
    • v.18 no.2
    • /
    • pp.83-88
    • /
    • 1998
  • To detect the mutation in a given sequence, there are variety of methods developed by use of the gel electrophoresis. One of the methods, TGGE (Temperature Gradient Gel Electrophoresis), is a popular technique because it can detect mutations in DNA fragment with ease and at low cost. This study used 200 bp BamHI-digested DNA fragment containing the human $\varepsilon$-globin promoter which was mutated[$\varepsilon$ F1*(-141), GATA- I*(-163), and GATA-1* & $\varepsilon$F1]. This BamHI-digested DNA fragment was directly used to detect the mutated DNA fragment on 50% denaturant gel with temperature gradient of 45$^{\circ}C$ through $53^{\circ}C$. In agreement with the theoretical result of MELTSCAN program (Brossette and Wallet, 1994) the mobilities of mutated DNA fragments were shown to be nearly distinguished on the temperature gradient gel. In contrast to the above result the heteroduplex analysis under the temperature gradient condition was shown to detect the mutated DNA fragments through the heteroduplex formation between strands of mutated DNA and wild-type DNA.

  • PDF

Boundary Line Extract for Moving Object Tracking (이동 물체 추적을 위한 경계선 추출)

  • Kim, Tea-Sik;Lee, Ju-Shin
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.2
    • /
    • pp.28-34
    • /
    • 1998
  • In this paper, I'd like to make a suggestion for boundary line detect algorithm which is used 3-D image processing system in order to track moving object. Through this study, more than anything else, difference image method was adopted to detect moving object in input image. To detect moving object, I made use of detect windows constructed by 4's predictive areas and object area for the purpose of reducing processing time and its size was determined by the size of moving object and prediction parameter directed center position. And also, tracking camera was movable toward the direction of X, Y by DC motor. As a conclusion of the study proposed algorithm, I found out the following results that tracking error was less than 6% of total moving object size and maximum tracking time 2 seconds by toy-car simulation.

  • PDF

THE EFFICIENT METHOD TO DETECT DEFECTIVE DETECTOR OF THE SWIR BAND OF SPOT 4

  • Jung Hyung-sup;Kang Myung-Ho;Lee Yong-Woong;Won Joong-Sun
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.130-133
    • /
    • 2005
  • This paper presents the efficient method to detect the defective detectors of the SWIR band of SPOT 4. The key of this method are to flatten the baseline of the data using high pass band filter instead of differentiation. This method is made up six steps. First step is to apply image enhancement techniques to enhance the lines imaged by defective detector and improve the quality of an image. Second step is processed by summing the enhanced image in line direction. These summed data have the peaks that represent the defective detectors and the curved baseline characterized by the reflectivity of Earth surface. In order to exactly detect these peaks, third step is to flatten the curved baseline using high pass filtering in the frequency domain. In fourth step, the data with flat baseline is normalized to have zero mean and unity standard deviation. In fifth step, the defective detectors are detected using $99.9\%$ confidence interval. Finally, after removing the detected ones in summed data, the steps from third to five are iterated. Three SPOT 4 images, which have different reflectivity of Earth surface and different sensor, were used to validate this method. The overall accuracy of detection for three images was $97.9\%$. This result shows that this method can detect efficiently the lines made by defective detectors.

  • PDF

Representation and Detection of Video Shot s Features for Emotional Events (감정에 관련된 비디오 셧의 특징 표현 및 검출)

  • Kang, Hang-Bong;Park, Hyun-Jae
    • The KIPS Transactions:PartB
    • /
    • v.11B no.1
    • /
    • pp.53-62
    • /
    • 2004
  • The processing of emotional information is very important in Human-Computer Interaction (HCI). In particular, it is very important in video information processing to deal with a user's affection. To handle emotional information, it is necessary to represent meaningful features and detect them efficiently. Even though it is not an easy task to detect emotional events from low level features such as colour and motion, it is possible to detect them if we use statistical analysis like Linear Discriminant Analysis (LDA). In this paper, we propose a representation scheme for emotion-related features and a defection method. We experiment with extracted features from video to detect emotional events and obtain desirable results.

The Development of Detection System of Conveyer Belt Damage using Magnetic Flux (자기장을 이용한 컨베이어 벨트 파손 감지장치 개발)

  • Yang, Keun-Ho;Min, Byung-Woon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.815-822
    • /
    • 2013
  • In this paper, the research is to develop a system that can detect the breakage of the rubber belt conveyor system in the transport of the raw materials required for the operation of logistics. We are to develop a system that can detect the breakage of the belt due to the electronic system of belt breakage occurs by placing the material on the inside of the belt, electric induction to minimize the damage of the belt. The belt repair costs, or reorder the steps of the logistics transit time can be reduced. Induced in the coil, and belt embedded in the transmitted signal as a way to detect the breakage of the belt was to detect the damage of the belt by detecting the electrical phenomena induced in the coil at the receiving end.

A Novel Current Sensing Method for Low-Cost Vector-Controlled Inverter of AC Motor (저가형 교류전동기 벡터제어 인버터를 위한 새로운 전류측정 방법)

  • Lee, Won-Il;Yoon, Duck-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.7
    • /
    • pp.950-955
    • /
    • 2013
  • This paper proposes a new low-cost current detection method to implement vector-controlled inverter of 3-phase induction motor or permanent-magnet synchronous motor using 2 shunt resistors instead of expensive Hall current sensors. The proposed method can detect perfect phase currents without current-immeasurable area in all operating conditions of motor. This method uses 2 shunt resistors in Hall current sensor positions conventionally used to detect phase currents. Therefore, it requires accurate analog differential amplifiers to detect voltages across shunt resistors at high electric potential to ground. We show the good solutions which are implemented by voltage-divider resistors networks and the instrumentation amplifiers using several Op Amps at cheap price. Computer simulations and experiments were performed to confirm the effectiveness of proposed method. These results show that proposed method can perfectly detect phase currents without current-immeasurable area in all operating conditions of motor.