• Title/Summary/Keyword: detection methods

Search Result 7,086, Processing Time 0.032 seconds

Effect of Pre-treatments on the Content of Heavy Metals in Packaging Paper

  • Jo, Byoung-Muk;Jeong, Myung-Joon
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2006.06b
    • /
    • pp.465-469
    • /
    • 2006
  • Pre-treatment methods to determine various heavy metal contents in packaging papers were investigated by ICP-ES (Inductively Coupled Plasma Emission Spectrometry) analysis. Pre-treatment methods utilized in this study include dry ashing and decomposition methods ($HNO_{3-}HClO_{4-}HF,\;HNO_{3},\;and\;H_{2}SO_{4-}HNO_{3}$). They were compared with the conventional extraction (water) and migration (3% acetic acid) methods. The five representative heavy metals (Cd, As, Pb, Cr and Hg) were analyzed. For Cd, Hg, and As, the results were below detection limit of the instrument. In case of Cr and Pb, the migration test is considered to be a better method compared to the extraction test, but all pretreated methods showed much higher detection efficiency than the extraction or migration test. However, the detection ratio between the migration test and decomposition methods was different. Among all decomposition methods, the nitric acid - perchloric acid - hydrofluoric acid treatment brought a slightly higher detection value than others, but there was no significant difference among them except sulfuric acid - nitric acid method. Concerning Pb, the sulfuric acid - nitric acid method showed a low detection efficiency compared to other decomposition methods. The sulfuric acid - nitric acid method is, thus, not considered to be a suitable analysis method for Pb in packaging papers.

  • PDF

Pedestrian Detection using RGB-D Information and Distance Transform (RGB-D 정보 및 거리변환을 이용한 보행자 검출)

  • Lee, Ho-Hun;Lee, Dae-Jong;Chun, Myung-Geun
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.1
    • /
    • pp.66-71
    • /
    • 2016
  • According to the development of depth sensing devices and depth estimation technology, depth information becomes more important for object detection in computer vision. In terms of recognition rate, pedestrian detection methods have been improved more accurately. However, the methods makes slower detection time. So, many researches have overcome this problem by using GPU. Here, we propose a real-time pedestrian detection algorithm that does not rely on GPU. First, the depth-weighted distance map is used for detecting expected human regions. Next, human detection is performed on the regions. The performance for the proposed approach is evaluated and compared with the previous methods. We show that proposed method can detect human about 7 times faster than conventional ones.

Driver's Face Detection Using Space-time Restrained Adaboost Method

  • Liu, Tong;Xie, Jianbin;Yan, Wei;Li, Peiqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2341-2350
    • /
    • 2012
  • Face detection is the first step of vision-based driver fatigue detection method. Traditional face detection methods have problems of high false-detection rates and long detection times. A space-time restrained Adaboost method is presented in this paper that resolves these problems. Firstly, the possible position of a driver's face in a video frame is measured relative to the previous frame. Secondly, a space-time restriction strategy is designed to restrain the detection window and scale of the Adaboost method to reduce time consumption and false-detection of face detection. Finally, a face knowledge restriction strategy is designed to confirm that the faces detected by this Adaboost method. Experiments compare the methods and confirm that a driver's face can be detected rapidly and precisely.

Multi-scale crack detection using decomposition and composition (해체와 구성을 이용한 다중 스케일 균열 검출)

  • Kim, Young Ro;Chung, Ji Yung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.13-20
    • /
    • 2013
  • In this paper, we propose a multi-scale crack detection method. This method uses decomposition, composition, and shape properties. It is based on morphology algorithm, crack features. We use a morphology operator which extracts patterns of crack. It segments cracks and background using opening and closing operations. Morphology based segmentation is better than existing integration methods using subtraction in detecting a crack it has small width. However, morphology methods using only one structure element could detect only fixed width crack. Thus, we use decomposition and composition methods. We use a decimation method for decomposition. After decomposition and morphology operation, we get edge images given by binary values. Our method calculates values of properties such as the number of pixels and the maximum length of the segmented region. We decide whether the segmented region belongs to cracks according to those data. Experimental results show that our proposed multi-scale crack detection method has better results than those of existing detection methods.

Performance Analysis of SIC-based Signal Detection Methods in MIMO Systems (순차적 간섭 제거 기반 신호 검출 기법의 성능분석)

  • Yang, Yu-Sik;Kim, Jae-Kwon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.189-196
    • /
    • 2011
  • In this paper, we analyze the error performance of SIC-based signal detection methods in MIMO systems. Considered detection methods are SIC signal detection and LR-SIC signal detection. We derive BLER performance of the methods and the performance is confirmed by computer simulations.

A Study on Edge Detection using Weighted Value with Threshold (임계값에 따른 가중치를 이용한 에지 검출에 관한 연구)

  • Lee, Chang-Young;Hwang, Yeong-Yeun;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.886-888
    • /
    • 2013
  • An edge includes information of objects such as magnitude, orientation, and location. Conventional edge detection methods to detect those edge are methods using Sobel, Prewitt, Roberts, Laplacian operator. Existing methods use fixed weighted mask to detect edges, and their edge detection characteristics are insufficient. Therefore, to remedy weakness of conventional methods, in this paper, an edge detection algorithm using weight with standard deviation and thresholds is proposed.

  • PDF

Blur Detection through Multinomial Logistic Regression based Adaptive Threshold

  • Mahmood, Muhammad Tariq;Siddiqui, Shahbaz Ahmed;Choi, Young Kyu
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.4
    • /
    • pp.110-115
    • /
    • 2019
  • Blur detection and segmentation play vital role in many computer vision applications. Among various methods, local binary pattern based methods provide reasonable blur detection results. However, in conventional local binary pattern based methods, the blur map is computed by using a fixed threshold irrespective of the type and level of blur. It may not be suitable for images with variations in imaging conditions and blur. In this paper we propose an effective method based on local binary pattern with adaptive threshold for blur detection. The adaptive threshold is computed based on the model learned through the multinomial logistic regression. The performance of the proposed method is evaluated using different datasets. The comparative analysis not only demonstrates the effectiveness of the proposed method but also exhibits it superiority over the existing methods.

Effective scene change detection methods using characteristics of MPEG video (MPEG 비디오의 특성 추출을 이용한 효과적인 장면 전환 검출 기법)

  • 곽영경;최윤석;고성제
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.8B
    • /
    • pp.1567-1576
    • /
    • 1999
  • In this paper, we propose new methods to detect a scene cut and a dissolve region in compressed MPEG video sequences. The scene cut detection method uses edge images obtained using DCT AC coefficients and the dissolve detection method utilizes the macroblock type information of the MPEG stream. The proposed scene cut detection method is insensitive to brightness and can detect scene changes more precisely than the methods using DC coefficients since AC edge images can express original images more exactly than DC edge images do. The proposed dissolve detection method using the number of intra macroblocks(MBs) computationally efficient since it does not require the decoding process. Experimental results show that the proposed methods perform better in detection scene changes than conventional other methods.

  • PDF

Reviewing And Analysis of The Deadlock Handling Methods

  • El-Sharawy, Enas E.;Ahmed, Thowiba E;Alshammari, Reem H;Alsubaie, Wafaa;Almuhanna, Norah;Alqahtani, Asma
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.230-236
    • /
    • 2022
  • Objectives: The primary goal of this article is to compare the multiple algorithms used for deadlock handling methods and then outline the common method in deadlock handling methods. Methods: The article methodology begins with introducing a literature review studying different algorithms used in deadlock detection and many algorithms for deadlocks prevented, recovered, and avoided. Discussion and analysis of the literature review were done to classify and compare the studied algorithms. Findings: The results showed that the deadlock detection method solves the deadlock. As soon as the real-time deadlock detection algorithm is identified and indicated, it performs better than the non-real-time deadlock detection algorithm. Our novelty the statistics that we get from the percentages of reviewing outcomes that show the most effective rate of 47% is in deadlock prevention. Then deadlock detection and recovery with 28% finally, a rate of 25% for deadlock avoidance.

Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration (데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석)

  • Lim, Wongi;Kwon, Koohyung;Kim, Jung-Jae;Lee, Jong-Eon;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.440-446
    • /
    • 2016
  • Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to data exfiltration creates many problems, because the methods do not consider a number of variables or the internal network environment. In this paper, we describe issues considered in data exfiltration detection for anomaly detection (DEDfAD) to improve the accuracy of the methods, classify the methods as profile-based detection or machine learning-based detection, and analyze their advantages and disadvantages. We also suggest future research challenges through comparative analysis of the issues with classification of the detection methods.