AMETHYST: an enhanced detection system intelligently combining video detection and non-video detection systems

Author(s):  
M. Horner
Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2674
Author(s):  
Qingying Ren ◽  
Wen Zuo ◽  
Jie Xu ◽  
Leisheng Jin ◽  
Wei Li ◽  
...  

At present, the proposed microwave power detection systems cannot provide a high dynamic detection range and measurement sensitivity at the same time. Additionally, the frequency band of these detection systems cannot cover the 5G-communication frequency band. In this work, a novel microwave power detection system is proposed to measure the power of the 5G-communication frequency band. The detection system is composed of a signal receiving module, a power detection module and a data processing module. Experiments show that the detection frequency band of this system ranges from 1.4 GHz to 5.3 GHz, the dynamic measurement range is 70 dB, the minimum detection power is −68 dBm, and the sensitivity is 22.3 mV/dBm. Compared with other detection systems, the performance of this detection system in the 5G-communication frequency band is significantly improved. Therefore, this microwave power detection system has certain reference significance and application value in the microwave signal detection of 5G communication systems.


Author(s):  
Nicole Gailey ◽  
Noman Rasool

Canada and the United States have vast energy resources, supported by thousands of kilometers (miles) of pipeline infrastructure built and maintained each year. Whether the pipeline runs through remote territory or passing through local city centers, keeping commodities flowing safely is a critical part of day-to-day operation for any pipeline. Real-time leak detection systems have become a critical system that companies require in order to provide safe operations, protection of the environment and compliance with regulations. The function of a leak detection system is the ability to identify and confirm a leak event in a timely and precise manner. Flow measurement devices are a critical input into many leak detection systems and in order to ensure flow measurement accuracy, custody transfer grade liquid ultrasonic meters (as defined in API MPMS chapter 5.8) can be utilized to provide superior accuracy, performance and diagnostics. This paper presents a sample of real-time data collected from a field install base of over 245 custody transfer grade liquid ultrasonic meters currently being utilized in pipeline leak detection applications. The data helps to identify upstream instrumentation anomalies and illustrate the abilities of the utilization of diagnostics within the liquid ultrasonic meters to further improve current leak detection real time transient models (RTTM) and pipeline operational procedures. The paper discusses considerations addressed while evaluating data and understanding the importance of accuracy within the metering equipment utilized. It also elaborates on significant benefits associated with the utilization of the ultrasonic meter’s capabilities and the importance of diagnosing other pipeline issues and uncertainties outside of measurement errors.


Author(s):  
Renan Martins Baptista

This paper describes procedures developed by PETROBRAS Research & Development Center to assess a software-based leak detection system (LDS) for short pipelines. These so-called “Low Complexity Pipelines” are short pipeline segments with single-phase liquid flow. Detection solutions offered by service companies are frequently designed for large pipeline networks, with batches and multiple injections and deliveries. Such solutions are sometimes impractical for short pipelines, due to high cost, long tuning procedures, complex instrumentation and substantial computing requirements. The approach outlined here is a corporate approach that optimizes a LDS for shorter lines. The two most popular implemented techniques are the Compensated Volume Balance (CVB), and the Real Time Transient Model (RTTM). The first approach is less accurate, reliable and robust when compared to the second. However, it can be cheaper, simpler, faster to install and very effective, being marginally behind the second one, and very cost-efective. This paper describes a procedure to determine whether one can use a CVB in a short pipeline.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 10
Author(s):  
V Mala ◽  
K Meena

Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.


2021 ◽  
Author(s):  
Nasim Beigi Mohammadi

Smart grid is expected to improve the efficiency, reliability and economics of current energy systems. Using two-way flow of electricity and information, smart grid builds an automated, highly distributed energy delivery network. In this thesis, we present the requirements for intrusion detection systems in smart grid, neighborhood area network (NAN) in particular. We propose an intrusion detection system (IDS) that considers the constraints and requirements of the NAN. It captures the communication and computation overhead constraints as well as the lack of a central point to install the IDS. The IDS is distributed on some nodes which are powerful in terms of memory, computation and the degree of connectivity. Our IDS uses an analytical approach for detecting Wormhole attack. We simulate wireless mesh NANs in OPNET Modeler and for the first time, we integrate our analytical model in Maple from MapleSoft with our OPNET simulation model.


2020 ◽  
Vol 3 (7) ◽  
pp. 17-30
Author(s):  
Tamara Radivilova ◽  
Lyudmyla Kirichenko ◽  
Maksym Tawalbeh ◽  
Petro Zinchenko ◽  
Vitalii Bulakh

The problem of load balancing in intrusion detection systems is considered in this paper. The analysis of existing problems of load balancing and modern methods of their solution are carried out. Types of intrusion detection systems and their description are given. A description of the intrusion detection system, its location, and the functioning of its elements in the computer system are provided. Comparative analysis of load balancing methods based on packet inspection and service time calculation is performed. An analysis of the causes of load imbalance in the intrusion detection system elements and the effects of load imbalance is also presented. A model of a network intrusion detection system based on packet signature analysis is presented. This paper describes the multifractal properties of traffic. Based on the analysis of intrusion detection systems, multifractal traffic properties and load balancing problem, the method of balancing is proposed, which is based on the funcsioning of the intrusion detection system elements and analysis of multifractal properties of incoming traffic. The proposed method takes into account the time of deep packet inspection required to compare a packet with signatures, which is calculated based on the calculation of the information flow multifractality degree. Load balancing rules are generated by the estimated average time of deep packet inspection and traffic multifractal parameters. This paper presents the simulation results of the proposed load balancing method compared to the standard method. It is shown that the load balancing method proposed in this paper provides for a uniform load distribution at the intrusion detection system elements. This allows for high speed and accuracy of intrusion detection with high-quality multifractal load balancing.


2021 ◽  
Vol 17 (2) ◽  
Author(s):  
Kisron Kisron ◽  
Bima Sena Bayu Dewantara ◽  
Hary Oktavianto

In a visual-based real detection system using computer vision, the most important thing that must be considered is the computation time. In general, a detection system has a heavy algorithm that puts a strain on the performance of a computer system, especially if the computer has to handle two or more different detection processes. This paper presents an effort to improve the performance of the trash detection system and the target partner detection system of a trash bin robot with social interaction capabilities. The trash detection system uses a combination of the Haar Cascade algorithm, Histogram of Oriented Gradient (HOG) and Gray-Level Coocurrence Matrix (GLCM). Meanwhile, the target partner detection system uses a combination of Depth and Histogram of Oriented Gradient (HOG) algorithms. Robotic Operating System (ROS) is used to make each system in separate modules which aim to utilize all available computer system resources while reducing computation time. As a result, the performance obtained by using the ROS platform is a trash detection system capable of running at a speed of 7.003 fps. Meanwhile, the human target detection system is capable of running at a speed of 8,515 fps. In line with the increase in fps, the accuracy also increases to 77%, precision increases to 87,80%, recall increases to 82,75%, and F1-score increases to 85,20% in trash detection, and the human target detection system has also improved accuracy to 81%, %, precision increases to 91,46%, recall increases to 86,20%, and F1-score increases to 88,42%.


ACTA IMEKO ◽  
2019 ◽  
Vol 8 (4) ◽  
pp. 20
Author(s):  
Daniela Doroftei ◽  
Geert De Cubber

Now that the use of drones is becoming more common, the need to regulate the access to airspace for these systems is becoming more pressing. A necessary tool in order to do this is a means of detecting drones. Numerous parties have started the development of such drone detection systems. A big problem with these systems is that the evaluation of the performance of drone detection systems is a difficult operation that requires the careful consideration of all technical and non-technical aspects of the system under test. Indeed, weather conditions and small variations in the appearance of the targets can have a huge difference on the performance of the systems. In order to provide a fair evaluation, it is therefore paramount that a validation procedure that finds a compromise between the requirements of end users (who want tests to be performed in operational conditions) and platform developers (who want statistically relevant tests) is followed. Therefore, we propose in this article a qualitative and quantitative validation methodology for drone detection systems. The proposed validation methodology seeks to find this compromise between operationally relevant benchmarking (by providing qualitative benchmarking under varying environmental conditions) and statistically relevant evaluation (by providing quantitative score sheets under strictly described conditions).


2021 ◽  
Author(s):  
William Urquhart

While copyright legally protects the ownership of created works, fair dealing with copyrighted content has become a problematic topic with the rise of user-generated content. User-generated content can be easily produced with modern technology and shared on the internet. This has resulted in websites having complicated processes for dealing with copyrighted content and many have introduced automated copyright detection systems to limit their liabilities of copyright infringement. Since automated copyright detection systems have been introduced, they have fundamentally changed the way copyright infringement is managed online. However, a problem arises with automated copyright detection systems as they are incapable of detecting fair dealing. Fair dealing is a provision under New Zealand’s Copyright Act 1994 that allows the use of copyrighted content in certain cases. Consequently, this has turned into a controversial area between content creators and copyright holders as most user-generated content usually contains copyrighted content. Copyright laws also favour mass media companies as they control significant copyright properties, and this plays a key role in the economy. For this reason, copyright genuinely tends to focus on the rights of copyright holders and not so much for users of copyrighted content. Furthermore, New Zealand's Copyright Act 1994 has not been updated since 2011 and has become unsuitable for modern forms of creation on the internet. This research portfolio investigates the problematic issues concerning New Zealand’s Copyright Act 1994 with its application to user-generated content and YouTube’s automated copyright detection system called ‘Content ID’. To express research findings, this research portfolio contains a user-generated documentary and several other proposed methods of bypassing Content ID.


Sign in / Sign up

Export Citation Format

Share Document