• Title/Summary/Keyword: signs detection

Search Result 230, Processing Time 0.036 seconds

Smart Helmet for Vital Sign-Based Heatstroke Detection Using Support Vector Machine (SVM 이용한 다중 생체신호기반 온열질환 감지 스마트 안전모 개발)

  • Jaemin, Jang;Kang-Ho, Lee;Subin, Joo;Ohwon, Kwon;Hak, Yi;Dongkyu, Lee
    • Journal of Sensor Science and Technology
    • /
    • v.31 no.6
    • /
    • pp.433-440
    • /
    • 2022
  • Recently, owing to global warming, average summer temperatures are increasing and the number of hot days is increasing is increasing, which leads to an increase in heat stroke. In particular, outdoor workers directly exposed to the heat are at higher risk of heat stroke; therefore, preventing heat-related illnesses and managing safety have become important. Although various wearable devices have been developed to prevent heat stroke for outdoor workers, applying various sensors to the safety helmets that workers must wear is an excellent alternative. In this study, we developed a smart helmet that measures various vital signs of the wearer such as body temperature, heart rate, and sweat rate; external environmental signals such as temperature and humidity; and movement signals of the wearer such as roll and pitch angles. The smart helmet can acquire the various data by connecting with a smartphone application. Environmental data can check the status of heat wave advisory, and the individual vital signs can monitor the health of workers. In addition, we developed an algorithm that classifies the risk of heat-related illness as normal and abnormal by inputting a set of vital signs of the wearer using a support vector machine technique, which is a machine learning technique that allows for rapid binary classification with high reliability. Furthermore, the classified results suggest that the safety manager can supervise the prevention of heat stroke by receiving feedback from the control system.

Vital Sign Detection in a Noisy Environment by Undesirable Micro-Motion (원하지 않는 작은 동작에 의한 잡음 환경 내 생체신호 탐지 기법)

  • Choi, In-Oh;Kim, Min;Choi, Jea-Ho;Park, Jeong-Ki;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.5
    • /
    • pp.418-426
    • /
    • 2019
  • Recently, many studies on vital sign detection using a radar sensor related to Internet of Things(IoT) smart home systems have been conducted. Because vital signs such as respiration and cardiac rates generally cause micro-motions in the chest or back, the phase of the received echo signal from a target fluctuates according to the micro-motion. Therefore, vital signs are usually detected via spectral analysis of the phase. However, the probability of false alarms in cardiac rate detection increases as a result of various problems in the measurement environment, such as very weak phase fluctuations caused by the cardiac rate. Therefore, this study analyzes the difficulties of vital sign detection and proposes an efficient vital sign detection algorithm consisting of four main stages: 1) phase decomposition, 2) phase differentiation and filtering, 3) vital sign detection, and 4) reduction of the probability of false alarm. Experimental results using impulse-radio ultra-wideband radar show that the proposed algorithm is very efficient in terms of computation and accuracy.

Android Malware Detection using Machine Learning Techniques KNN-SVM, DBN and GRU

  • Sk Heena Kauser;V.Maria Anu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.202-209
    • /
    • 2023
  • Android malware is now on the rise, because of the rising interest in the Android operating system. Machine learning models may be used to classify unknown Android malware utilizing characteristics gathered from the dynamic and static analysis of an Android applications. Anti-virus software simply searches for the signs of the virus instance in a specific programme to detect it while scanning. Anti-virus software that competes with it keeps these in large databases and examines each file for all existing virus and malware signatures. The proposed model aims to provide a machine learning method that depend on the malware detection method for Android inability to detect malware apps and improve phone users' security and privacy. This system tracks numerous permission-based characteristics and events collected from Android apps and analyses them using a classifier model to determine whether the program is good ware or malware. This method used the machine learning techniques KNN-SVM, DBN, and GRU in which help to find the accuracy which gives the different values like KNN gives 87.20 percents accuracy, SVM gives 91.40 accuracy, Naive Bayes gives 85.10 and DBN-GRU Gives 97.90. Furthermore, in this paper, we simply employ standard machine learning techniques; but, in future work, we will attempt to improve those machine learning algorithms in order to develop a better detection algorithm.

A Gaussian Mixture Model for Binarization of Natural Scene Text

  • Tran, Anh Khoa;Lee, Gueesang
    • Smart Media Journal
    • /
    • v.2 no.2
    • /
    • pp.14-19
    • /
    • 2013
  • Recently, due to the increase of the use of scanned images, the text segmentation techniques, which play critical role to optimize the quality of the scanned images, are required to be updated and advanced. In this study, an algorithm has been developed based on the modification of Gaussian mixture model (GMM) by integrating the calculation of Gaussian detection gradient and the estimation of the number clusters. The experimental results show an efficient method for text segmentation in natural scenes such as storefronts, street signs, scanned journals and newspapers at different size, shape or color of texts in condition of lighting changes and complex background. These indicate that our model algorithm and research approach can address various issues, which are still limitations of other senior algorithms and methods.

  • PDF

Porcine circovirus: detection of antibodies and virus antigen in Chungbdk area (Porcine circovirus에 대한 항체가 조사 및 바이러스 항원 확인)

  • 강신석;박재명;이종진;류재윤;최해연
    • Korean Journal of Veterinary Service
    • /
    • v.24 no.2
    • /
    • pp.127-132
    • /
    • 2001
  • Porcine circoviruses(PCV) are the smallest nonenveloped DNA viruses containing a unique single-stranded circular genome. No recognized link was found between PCV infection of pig and disease. But the PCV consistently identified from postweaning multisystemic wasting syndrome(PMWS) and researches indicate that there are strong relationships between PCV and PMWS. Clinical signs were emaciation, dyspnea, high fever with normal appetite. Necropsy findings showed respiratory disease complex lesion and lymph node anomalities. An indirect-immunofluorescent antibody procedure was used to assay swine sera for the presence of PCV atibodies. Antibodies against PCV were found in an average of 20% of the samples tested. The PCV DNA was amplified from lymph nodes collected from pigs. PCV specific primers were successfully amplified PCV DNAs. Further studies are needed to determine the possible role this virus might have in disease.

  • PDF

Detection of Neospora caninum in the blood of Korean native cattle and dairy cows using PCR (한우와 젖소에서 PCR을 이용한 혈액내 Neospora caninum 검출)

  • Lee, Sang-Eun;Lee, Jung-Youn
    • Korean Journal of Veterinary Research
    • /
    • v.48 no.2
    • /
    • pp.191-195
    • /
    • 2008
  • This study was performed to detect Neospora caninum in blood of 61 Korean native cattle and 50 dairy cows in Chungnam province. All of them were healthy and did not show any clinical signs. DNA was isolated from blood samples and a 328 bp fragment was amplified by PCR using primer pair Np21 and Np6. The PCR positive rate was 14.8% in Korean native cattle and 0% in dairy cows. Cows with 15.6% were a little higher than bulls with 12.5% in gender. The detection rate of over 3-year-old Korean native cattle was 28.6% in age. The results demonstrate that N. caninum DNA can be detected in blood by PCR. PCR analysis in blood may be useful to annually screening test for N. caninum infection in clinically healthy cattle.

A nonparametric detector for random signals in a multiplicative noise model (곱셈꼴 잡음모형에서 비모수 확률 신호 검파기)

  • 배진수;박정순;김광순;송익호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.4
    • /
    • pp.796-804
    • /
    • 1998
  • Multiplicative noise is known to be useful in modeling multipath propagation, which is crucial in mobile communication systems analysis. In this paper, nonparametric detection of weak random signals in multiplicative noise is considered. The locally optimum detector based on signs and ranks of observations isderived for good weak-signal detection performance under any noise probability density function. the detector has similarities to the locally optimum detector for random signals in multiplicative noise. It is shown that the nonparametric detector asymptotically hs almost the same performance as the locally optimum detector.

  • PDF

Suggestions for Detection System of Bid-rigging in Public Construction Projects

  • Song, Sanghoon;Bang, Jong-Dae;Sohn, Jeong-Rak;Cho, Gun-Hee
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.712-713
    • /
    • 2015
  • In recent years, the bid-rigging in public construction markets has been treated as a critical issue in Fair Trade Commission. The investigation revealed that the collusion was implemented extensively in every area from the material supply to the construction service of general contractors. This study reviewed the causes of the bid-rigging in public construction projects, and proposed the improvement plan to eradicate bad practices. Firstly, the causes and purposes of bid-rigging were categorized into two types of internal factors from construction companies and external environment factors influencing business activities. Secondly, the system development method was explained to detect the signs of bid-rigging based on the technical proposal documents in open tender. The detection systems of repetitive public owner also provide the function of sharing data on the companies and cases to violate the fair trade regulation. In addition, the problems and improvement direction of public procurement policies were discussed.

  • PDF

Car Driver Drowsiness Detection Technology (자동차 운전자 졸림 감지 기술)

  • Chung, Wan-Young;Kim, Jong-Jin;Kwon, Tae-Ha
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.481-484
    • /
    • 2011
  • Recent Automotive technology is driven from mechanical device to the electronic components which improve the vehicle's safety and convenience. The future competitiveness of the car will come from safety issues and energy efficiency, convenience and the application of the technologies. In this study, various techniques for driver drowsiness detection are introduced and compared with each others. The advantages and disadvantages of commercially available technologies and developed technologies are compared. To enhance the detection resolution, multiple sensing technologies are introduced in this paper. The feasibility of two drowsiness detection methods, that is, existing camera image recognition method and bio signal analysis method, are tested. The direct drowsiness detection by the camera image of eyes and driver's vital signs detected indirectly are combined and analyzed by the developed noble algorithm for stress, fatigue, drowsiness detection with a more accurate high-drowsiness detection.

  • PDF

MITRE ATT&CK and Anomaly detection based abnormal attack detection technology research (MITRE ATT&CK 및 Anomaly Detection 기반 이상 공격징후 탐지기술 연구)

  • Hwang, Chan-Woong;Bae, Sung-Ho;Lee, Tae-Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.13-23
    • /
    • 2021
  • The attacker's techniques and tools are becoming intelligent and sophisticated. Existing Anti-Virus cannot prevent security accident. So the security threats on the endpoint should also be considered. Recently, EDR security solutions to protect endpoints have emerged, but they focus on visibility. There is still a lack of detection and responsiveness. In this paper, we use real-world EDR event logs to aggregate knowledge-based MITRE ATT&CK and autoencoder-based anomaly detection techniques to detect anomalies in order to screen effective analysis and analysis targets from a security manager perspective. After that, detected anomaly attack signs show the security manager an alarm along with log information and can be connected to legacy systems. The experiment detected EDR event logs for 5 days, and verified them with hybrid analysis search. Therefore, it is expected to produce results on when, which IPs and processes is suspected based on the EDR event log and create a secure endpoint environment through measures on the suspicious IP/Process.