• 제목/요약/키워드: detection module

Search Result 692, Processing Time 0.028 seconds

Three-stream network with context convolution module for human-object interaction detection

  • Siadari, Thomhert S.;Han, Mikyong;Yoon, Hyunjin
    • ETRI Journal
    • /
    • v.42 no.2
    • /
    • pp.230-238
    • /
    • 2020
  • Human-object interaction (HOI) detection is a popular computer vision task that detects interactions between humans and objects. This task can be useful in many applications that require a deeper understanding of semantic scenes. Current HOI detection networks typically consist of a feature extractor followed by detection layers comprising small filters (eg, 1 × 1 or 3 × 3). Although small filters can capture local spatial features with a few parameters, they fail to capture larger context information relevant for recognizing interactions between humans and distant objects owing to their small receptive regions. Hence, we herein propose a three-stream HOI detection network that employs a context convolution module (CCM) in each stream branch. The CCM can capture larger contexts from input feature maps by adopting combinations of large separable convolution layers and residual-based convolution layers without increasing the number of parameters by using fewer large separable filters. We evaluate our HOI detection method using two benchmark datasets, V-COCO and HICO-DET, and demonstrate its state-of-the-art performance.

A Design of SWAD-KNH Scheme for Sensor Network Security (센서 네트워크 보안을 위한 SWAD-KNH 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1462-1470
    • /
    • 2013
  • This paper proposes an SWAD-KNH(Sybil & Wormhole Attack Detection using Key, Neighbor list and Hop count) technique which consists of an SWAD(Sybil & Wormhole Attack Detection) module detecting an Worm attack and a KGDC(Key Generation and Distribution based on Cluster) module generating and an sense node key and a Group key by the cluster and distributing them. The KGDC module generates a group key and an sense node key by using an ECDH algorithm, a hash function, and a key-chain technique and distributes them safely. An SWAD module strengthens the detection of an Sybil attack by accomplishing 2-step key acknowledgement procedure and detects a Wormhole attack by using the number of the common neighbor nodes and hop counts of an source and destination node. As the result of the SWAD-KNH technique shows an Sybil attack detection rate is 91.2% and its average FPR 3.82%, a Wormhole attack detection rate is 90%, and its average FPR 4.64%, Sybil and wormhole attack detection rate and its reliability are improved.

Nondestructive Detection of Defect in a Pipe Using Thermography

  • Choi, Hee-Seok;Joung, Ok-Jin;Kim, Young-Han
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1413-1416
    • /
    • 2005
  • An infrared temperature sensor module developed for the detection of defects in a plate was modified to use in a cylinder. A set of optical fiber leads and a mechanism maintaining sensor-object distance constant were utilized for the modification of the IR sensor module. The detection performance was experimentally investigated, and the measured temperature was also compared with computed temperature distribution. The experimental outcome indicates that the detection of a simulated defect is readily available. The temperature distribution is better for defect detection than that with the previous device. In addition, the measured distribution is comparable to the calculated one using a heat conduction equation. The developed device of defect detection is suitable to be utilized in chemical processes where most of vessels and piping systems are in the shape of a cylinder.

  • PDF

Implementation of Face Detection System on Android Platform for Real-Time Applications (실시간 응용을 위한 안드로이드 플랫폼에서의 안면 검출 시스템 구현)

  • Han, Byung-Gil;Lim, Kil-Taek
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.3
    • /
    • pp.137-143
    • /
    • 2013
  • This paper describes an implementation of face detection technology for a real-time application on the Android platform. Java class of Face-Detection for detection of human face is provided by the Android API. However, this function is not suitable to apply for the real-time applications due to inadequate detection speed and accuracy. In this paper, the AdaBoost based classification method which utilizes Local Binary Pattern (LBP) histogram is employed for face detection. The face detection module has been developed by C/C++ language for high-speed image processing, and this module is included to the Android platform using the Java Native Interface (JNI). The experiments were carried out in the Java-based environment and JNI-based environment. The experimental results have shown that the performance of JNI-based is faster than Java-based method and our system is well enough to apply for real-time applications.

A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol (TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델)

  • Lee, Se-Yul;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

An Intelligent Wireless Camera Surveillance System with Motion sensor and Remote Control (무선조종과 모션 센서를 이용한 지능형 무선감시카메라 구현)

  • Lee, Young-Woong;Kim, Jong-Nam
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.672-676
    • /
    • 2009
  • Recently, intelligent surveillance camera systems are needed popularly. However, current researches are focussed on improvement of a single module rather than implementation of an integrated system. In this paper, we implemented a wireless surveillance camera system which is composed of face detection, and using motion sensor. In our implementation, we used a camera module from SHARP, a pair of wireless video transmission module from ECOM, a pair of ZigBee RF wireless transmission module from ROBOBLOCK, and a motion sensor module (AMN14111) from PANASONIC. We used OpenCV library for face dection and MFC for implement software. We identified real-time operations of face detection, PTT control, and motion sensor detecton. Thus, the implemented system will be useful for the applications of remote control, human detection, and using motion sensor.

  • PDF

Development of Unmanned Remote Radiation Detection Module (무인 원격 방사선 검출 모듈 개발)

  • Chang, Bo-Seok
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.6
    • /
    • pp.795-801
    • /
    • 2021
  • The designed drone-based unmanned remote radiation detection module was developed according to the needs of the nuclear power plant decommissioning workshop. Using the Geiger-Mueller tube sensitive to low-level radiation measurement, It was manufactured to measure the amount of radiation leaking into and out of the containment vessel. The drone-based radiation detection module weighs less than 200g, It can be operated inside and outside the containment vessel of a nuclear power plant. To check the performance of the designed equipment, a performance evaluation test was conducted with reference to the international standard (IEC-60864). The stability of the radiation detection module designed to meet the needs of the field the statistical rate of change by repeated measurements in the rate of change experiment to evaluate the measurement accuracy was ±4.6%. The accuracy ±7.3% in the linearity experiment to evaluate the dose rate dependence, the linear The figure satisfies the international performance evaluation standard of ±3.5%. The radiation detection module developed in this study is a customized equipment for a nuclear power plant dismantling workshop. It will be helpful for accurate measurement of space dose rate and safety management of radiation worksites in sites with a lot of radiation dust.

Development of Stand-alone Image Processing Module on ARM CPU Employing Linux OS. (리눅스 OS를 이용한 ARM CPU 기반 독립형 영상처리모듈 개발)

  • Lee, Seok;Moon, Seung-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.2
    • /
    • pp.38-44
    • /
    • 2003
  • This paper describes the development of stand-alone image processing module on Strong Arm CPU employing an embedded Linux. Stand-alone image Processing module performs various functions such as thresholding, edge detection, and image enhancement of a raw image data in real time. The comparison of execution time between similar PC and developed module shows the satisfactory results. This Paper provides the possibility of applying embedded Linux successfully in industrial devices.

Detection of an Open-Source Software Module based on Function-level Features (함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지)

  • Kim, Dongjin;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.713-722
    • /
    • 2015
  • As open-source software (OSS) becomes more widely used, many users breach the terms in the license agreement of OSS, or reuse a vulnerable OSS module. Therefore, a technique needs to be developed for investigating if a binary program includes an OSS module. In this paper, we propose an efficient technique to detect a particular OSS module in an executable program using its function-level features. The conventional methods are inappropriate for determining whether a module is contained in a specific program because they usually measure the similarity between whole programs. Our technique determines whether an executable program contains a certain OSS module by extracting features such as its function-level instructions, control flow graph, and the structural attributes of a function from both the program and the module, and comparing the similarity of features. In order to demonstrate the efficiency of the proposed technique, we evaluate it in terms of the size of features, detection accuracy, execution overhead, and resilience to compiler optimizations.