scholarly journals An Event-Based Verification Scheme for the Real-Time Flare Detection System at Kanzelhöhe Observatory

Solar Physics ◽  
2018 ◽  
Vol 293 (6) ◽  
Author(s):  
W. Pötzi ◽  
A. M. Veronig ◽  
M. Temmer
2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Dhanalakshmi Krishnan Sadhasivan ◽  
Kannapiran Balasubramanian

Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to detect the anomalies in the real-time datasets such as KDD and SCADA. Besides, the feedback loop provides the necessary update of attacks in the database that leads to the improvement in the detection accuracy. The combination of the rules and responsibilities for multiagents effectively detects the anomaly behavior, misuse of response, or relay reports of gas/water pipeline data in KDD and SCADA, respectively. The comparative analysis of the proposed ARMA-IDS with the various existing path mining methods, namely, random forest, JRip, a combination of AdaBoost/JRip, and common path mining on the SCADA dataset conveys that the effectiveness of the proposed ARMA-IDS in the real-time fault monitoring. Moreover, the proposed ARMA-IDS offers the higher detection rate in the SCADA and KDD cup 1999 datasets.


2021 ◽  
Vol 2137 (1) ◽  
pp. 012009
Author(s):  
Ning Zhang ◽  
Yinxin Yan ◽  
Houcheng Yang ◽  
Zhangsi Yu

Abstract This paper presents a sliding wire detection system of electric screw locking tool based on the characteristics of motor. The system can judge whether the screw has sliding wire through the current change of motor during normal operation, and realize the real-time detection and alarm of sliding wire. The system has the advantages of high sensitivity, low cost and high accuracy. It can be widely used in automatic assembly and other fields.


2013 ◽  
Vol 333-335 ◽  
pp. 1060-1064 ◽  
Author(s):  
Yang Lu ◽  
Chao Gao

This work presents the design and implementation of drivers fatigue detection system based on FPGA to prevent car accidents. According to the bright pupil phenomenon, which is produced by the retina when the incident lights wavelength is 850 nm, drivers eyes can be detected easily. While acquiring the real-time video of the drivers face by camera, the system accomplishes the detection of drivers eyes by using a simplified PCNN (pulse coupled neural network) and the computation of the PERCLOS (Percentage of Eye Closure) to decide whether the driver is fatigue or not. All the designing and accomplishments of the system are based on the FPGA platform Xilinx Virtex Pro Development Board. During the experiments, the system has the ability of processing 25 frames/sec, which is the speed of collection of the used camera. Also, the fatigue detection system has good stability and accuracy.


2012 ◽  
Vol 472-475 ◽  
pp. 954-957
Author(s):  
Ji Li Lu ◽  
Ming Xing Lin

Surface defects detection is an important application of machine vision. In this paper, an online surface defects detection system of step-axis is studied based on image recognition. To ensure the real-time property, a fast axial surface defects inspection method is put forward, including improved median filtering to reduce noise, gray variation for fast judgment, the maximum variance method (OTSU) to select threshold automatically, contour features for feature extraction, mathematical morphology to detect defect targets, and finally, support vector machine (SVM) to classify and recognize the surface defects of ladder shaft. Experimental results show that the system can detect surface defects of the step-axis in 0.5s, which can meet the real-time requirements.


2011 ◽  
Vol 55 (1) ◽  
pp. 85-87 ◽  
Author(s):  
R. GAO ◽  
D. WANG ◽  
L. WEN ◽  
X. LI ◽  
W. WANG ◽  
...  

2013 ◽  
Vol 475-476 ◽  
pp. 198-203
Author(s):  
Lei Li ◽  
Zheng Li

In order to obtain the real-time hydrological information, and conduct the analysis and early warning on hydrological data, this paper studied the water level acquisition algorithm, used the dissection method to make the water level more accurate, optimized through image refining to reduce the complexity of the algorithm; it designed the data acquisition module of water level detection system, realized the real-time data transmission through programming, used Microsoft Access database to exchange data between server and communication module, manipulated data in the database, and designed the human-computer interaction interface; experimental studies have shown that this system can have access to information in a real-time and accurate way, and has the functions of warning, settlement &accumulation, statistical analysis and so on, which effectively improves the water level monitoring automation and control level, and helps to improve the management level of the hydrological industry.


Author(s):  
Xue Zhai ◽  
Shanchen Pang ◽  
Min Wang ◽  
Sibo Qiao ◽  
Zhihan Lv

AbstractTo realize the encryption of document information, authority authentication, and traceability of historical records, we propose a trusted verification scheme (TVS) for office documents to ensure security. Specifically, the scheme is realized by timestamps, smart contracts (or chaincode), and other blockchain technologies. It is based on the features of blockchain, such as security, credibility, immutability, and traceability of network behavior. And the TVS stores users and documents information through blockchain; it can monitor the state changes of office documents in real time by setting the trigger conditions of smart contracts. The experiment indicates that we have realized the real-time monitoring of data and the traceability of historical records. Moreover, we have achieved the purpose of document encryption and authority authentication, ensuring the authenticity and objectivity of data, avoiding the illegal tampering of malicious users to realize the trusted verification for documents.


Sign in / Sign up

Export Citation Format

Share Document