• Title/Summary/Keyword: error detection

Search Result 2,315, Processing Time 0.033 seconds

Block-Adaptive Optimum Auto-Thresholding (블록 적응의 자동 최적 Thresholding)

  • Suh, Sang-Yong;Kim, Nam-Chul
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1418-1421
    • /
    • 1987
  • An important problem in edge detection is to select a proper threshold that transforms the gradient picture to e two level picture containing optimum edges between regions, Such a threshold is determined depending on some measures of errors in tresholding. In this paper, an error criterion on extracting edges by thresholding the block gradient image is presented. Based on the error measure, the optimum threshold is chosen for the detection of acceptable edges.

  • PDF

An Ordered Successive Interference Cancellation Scheme in UWB MIMO Systems

  • An, Jin-Young;Kim, Sang-Choon
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.472-474
    • /
    • 2009
  • In this letter, an ordered successive interference cancellation (OSIC) scheme is applied for multiple-input multiple-output (MIMO) detection in ultra-wideband (UWB) communication systems. The error rate expression of an OSIC receiver on a log-normal multipath fading channel is theoretically derived in a closed form solution. Its bit error rate performance is analytically compared with that of a zero forcing receiver in the UWB MIMO detection scheme followed by RAKE combining.

Gaze Detection Using Two Neural Networks (다중 신경망을 이용한 사용자의 응시 위치 추출)

  • 박강령;이정준;이동재;김재희
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.587-590
    • /
    • 1999
  • Gaze detection is to locate the position on a monitor screen where a user is looking at. We implement it by a computer vision system setting a camera above a monitor, and a user move (rotates and or translates) her face to gaze at a different position on the monitor. Up to now, we have tried several different approaches and among them the Two Neural Network approach shows the best result which is described in this paper (1.7 inch error for test data including facial rotation. 3.1 inch error for test data including facial rotation and translation).

  • PDF

An Algorithm for Transformer Tap Estimation by WLAV State Estimator (가중최소절대값을 이용한 변압기 텝 추정 알고리즘)

  • Kim, Hong-Rae;Kwon, Hyung-Seok
    • Proceedings of the KIEE Conference
    • /
    • 1999.11b
    • /
    • pp.279-281
    • /
    • 1999
  • This paper addresses the issues of the parameter error detection and identification in power system. The parameter error identification is carried out as part of the state estimation procedure. The weighted least absolute value(WLAV) estimation method is used for this procedure. The standard formulation of the state estimation problem is modified to include the effects of the parameter errors as well. A two step procedure for the detection and identification of faulted parameters is proposed. Supporting examples are given using IEEE 14 bus system.

  • PDF

Testable Design on the Built In Test Method (고장검출이 용이한 Built-In Test 방식의 설계)

  • Seung Ryong Rho
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.24 no.3
    • /
    • pp.535-540
    • /
    • 1987
  • This paper proposes a circuit partitioning method and a multifunctional BILBO which can perform the multimodule test in the case of testing VLSI circuits. By using these circuit partitioning method and multifunctional BILBO, test time and cost can be reduced greatly by performing the pipeline test method. And the quantity of circuit that shold be added for testing is also reduced in half by interposing only one BILBO between each module. Also, we confirmed that the multifunctional BILBO proposed here has high error detection capability by analyzing error detection capability of this multifunctional BILBO in mathematics.

  • PDF

Bad Data Detection Method in Power System State Estimation (전력계통 상태주정에서의 불량정보 검출기법)

  • 최상봉;문영현
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.40 no.2
    • /
    • pp.144-153
    • /
    • 1991
  • This paper presents an algorithm to improve accuracy and reliability in the state estimation of contaminated bad data. The conventional algorithms for detection of bad data have the problems of excessive memory requirements and long computation time. In order to overcome these problems, a measurement compensation approach is proposed to reduce computation time, and the partitioned measurement error model has the advantage of remarkable reduction in computation time and memory requirements in estimated error computation. The proposed algorithm has been tested for IEEE sample systems, which shows its applicability to on-line power systems.

A Voltage Disturbance Detection Method for Computer Application Loads (컴퓨터 응용 부하들을 위한 전압 외란 검출 방법)

  • 최재호
    • Proceedings of the KIPE Conference
    • /
    • 2000.07a
    • /
    • pp.245-248
    • /
    • 2000
  • In this paper a novel method for voltage disturbance detection is presented. This is a instantaneous detection method using normalized error get in synchronous reference frame and also it is implemented in digital. Feedback noise the problem of digital implementation is removed by a digital filter of which the time delay is compensated through numerical analysis.

  • PDF

Automatic Programming-Error Detection by Plan Matching and Program Execution (플랜정합과 프로그램 실행을 통한 프로그래밍 오류분석에 관한 연구)

  • Song, Jong-Soo;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.985-997
    • /
    • 2004
  • In this paper, an automatic programming error-diagnosing system is provided for novice C programmers by plan matching and program execution. Program execution results are used to provide flexibility in describing the relationship between programming plans, to verify the correctness of the plan matching differences, and to detect the influence of a plan's error to the related plan. We can give easy and informative explanations to the students according to a plan's error and the resulting effects to related plans. The students are consulted to check their program's correctness with the given test data. Our error-diagnosing system is tested with student's programs for the 14 various and difficult problems and gives acceptable recognition results.

  • PDF

Design of Intelligent Servocontroller for Proportional Flow Control Solenoid Valve with Large Capacity (지능형 대용량 비례유량제어밸브 서보컨트롤러 설계)

  • Jung, G.H.
    • Transactions of The Korea Fluid Power Systems Society
    • /
    • v.8 no.3
    • /
    • pp.1-7
    • /
    • 2011
  • As the technologies of electronic device have advanced these days, most of mechanical systems are designed with electronic control unit to take advantage of control parameter adaption to operating conditions and firmware flexibilities as well. On-board diagnosis, which detects the system malfunction and identifies potential source of error with its own diagnostic criteria, and fail-safe that can switch the mode of operation in view of recognized error characteristics enables easy maintenance and troubleshooting as well as system protection. This paper dealt with the development of diagnosis and fail-safe function for proportional flow control valve. All type of errors related to valve control system components are investigated and assigned to a specific hexadecimal codes. Cumulative error detection algorithm is applied in order for the sensitivity and reliability to be appropriate. Embedded simulator which runs simultaneously with system program provides the virtual error simulation environment for expeditious development of error detection algorithm. The diagnosis function was verified both with solenoid valve and embedded simulator test and it will enhance the valve control system monitoring function.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.