Autonomous Utility Vehicle (Auvs) Based Emergency Human Drowning Detection System Using Sonar and Thermal Detection Methods

Author(s):  
Yaswanthkumar S K ◽  
Praveen O K ◽  
Rohit R V
Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2538
Author(s):  
Shuang Zhang ◽  
Feng Liu ◽  
Yuang Huang ◽  
Xuedong Meng

The direct-sequence spread-spectrum (DSSS) technique has been widely used in wireless secure communications. In this technique, the baseband signal is spread over a wider bandwidth using pseudo-random sequences to avoid interference or interception. In this paper, the authors propose methods to adaptively detect the DSSS signals based on knowledge-enhanced compressive measurements and artificial neural networks. Compared with the conventional non-compressive detection system, the compressive detection framework can achieve a reasonable balance between detection performance and sampling hardware cost. In contrast to the existing compressive sampling techniques, the proposed methods are shown to enable adaptive measurement kernel design with high efficiency. Through the theoretical analysis and the simulation results, the proposed adaptive compressive detection methods are also demonstrated to provide significantly enhanced detection performance efficiently, compared to their counterpart with the conventional random measurement kernels.


2021 ◽  
Vol 3 (6) ◽  
Author(s):  
R. Sekhar ◽  
K. Sasirekha ◽  
P. S. Raja ◽  
K. Thangavel

Abstract Intrusion Detection Systems (IDSs) have received more attention to safeguarding the vital information in a network system of an organization. Generally, the hackers are easily entering into a secured network through loopholes and smart attacks. In such situation, predicting attacks from normal packets is tedious, much challenging, time consuming and highly technical. As a result, different algorithms with varying learning and training capacity have been explored in the literature. However, the existing Intrusion Detection methods could not meet the desired performance requirements. Hence, this work proposes a new Intrusion Detection technique using Deep Autoencoder with Fruitfly Optimization. Initially, missing values in the dataset have been imputed with the Fuzzy C-Means Rough Parameter (FCMRP) algorithm which handles the imprecision in datasets with the exploit of fuzzy and rough sets while preserving crucial information. Then, robust features are extracted from Autoencoder with multiple hidden layers. Finally, the obtained features are fed to Back Propagation Neural Network (BPN) to classify the attacks. Furthermore, the neurons in the hidden layers of Deep Autoencoder are optimized with population based Fruitfly Optimization algorithm. Experiments have been conducted on NSL_KDD and UNSW-NB15 dataset. The computational results of the proposed intrusion detection system using deep autoencoder with BPN are compared with Naive Bayes, Support Vector Machine (SVM), Radial Basis Function Network (RBFN), BPN, and Autoencoder with Softmax. Article Highlights A hybridized model using Deep Autoencoder with Fruitfly Optimization is introduced to classify the attacks. Missing values have been imputed with the Fuzzy C-Means Rough Parameter method. The discriminate features are extracted using Deep Autoencoder with more hidden layers.


2021 ◽  
Vol 186 (Supplement_1) ◽  
pp. 801-807
Author(s):  
Nathaniel A Young ◽  
Ryan L Lambert ◽  
Angela M Buch ◽  
Christen L Dahl ◽  
Jackson D Harris ◽  
...  

ABSTRACT Introduction Per- and polyfluoroalkyl substances (PFAS) are a class of synthetic compounds used industrially for a wide variety of applications. These PFAS compounds are very stable and persist in the environment. The PFAS contamination is a growing health issue as these compounds have been reported to impact human health and have been detected in both domestic and global water sources. Contaminated water found on military bases poses a potentially serious health concern for active duty military, their families, and the surrounding communities. Previous detection methods for PFAS in contaminated water samples require expensive and time-consuming testing protocols that limit the ability to detect this important global pollutant. The main objective of this work was to develop a novel detection system that utilizes a biological reporter and engineered bacteria as a way to rapidly and efficiently detect PFAS contamination. Materials and Methods The United States Air Force Academy International Genetically Engineered Machine team is genetically engineering Rhodococcus jostii strain RHA1 to contain novel DNA sequences composed of a propane 2-monooxygenase alpha (prmA) promoter and monomeric red fluorescent protein (mRFP). The prmA promoter is activated in the presence of PFAS and transcribes the mRFP reporter. Results The recombinant R. jostii containing the prmA promoter and mRFP reporter respond to exposure of PFAS by activating gene expression of the mRFP. At 100 µM of perfluorooctanoic acid, the mRFP expression was increased 3-fold (qRT-PCR). Rhodococcus jostii without exposure to PFAS compounds had no mRFP expression. Conclusions This novel detection system represents a synthetic biology approach to more efficiently detect PFAS in contaminated samples. With further refinement and modifications, a similar system could be readily deployed in the field around the world to detect this critical pollutant.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 10
Author(s):  
V Mala ◽  
K Meena

Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.


2019 ◽  
pp. 1952-1983
Author(s):  
Pourya Shamsolmoali ◽  
Masoumeh Zareapoor ◽  
M.Afshar Alam

Distributed Denial of Service (DDoS) attacks have become a serious attack for internet security and Cloud Computing environment. This kind of attacks is the most complex form of DoS (Denial of Service) attacks. This type of attack can simply duplicate its source address, such as spoofing attack, which defending methods do not able to disguises the real location of the attack. Therefore, DDoS attack is the most significant challenge for network. In this chapter we present different aspect of security in Cloud Computing, mostly we concentrated on DDOS Attacks. The Authors illustrated all types of Dos Attacks and discussed the most effective detection methods.


Author(s):  
Umashankar Ghugar ◽  
Jayaram Pradhan

Intrusion detection in wireless sensor network (WSN) has been a critical issue for the stable functioning of the networks during last decade. Wireless sensors are small and cheap devices that have a capacity to sense actions, data movement, and communicate with each other. It is a self-governing network that consists of sensor nodes deployed in a particular environment, which has wide applications in various areas such as data gathering, military surveillance, transportation, medical system, agriculture, smart building, satellite communication, and healthcare. Wormhole attack is one of the serious attacks, which is smoothly resolved in networks but difficult to observe. There are various techniques used to detect the malicious node such as LITEWORP, SAM, DelPHI, GRPW, and WRHT. This chapter focuses on detection methods for wormhole attacks using trust-based systems in WSN.


Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1937 ◽  
Author(s):  
Adam Stawiarski ◽  
Aleksander Muc

In this paper, the elastic wave propagation method was used in damage detection in thin structures. The effectiveness and accuracy of the system based on the wave propagation phenomenon depend on the number and localization of the sensors. The utilization of the piezoelectric (PZT) transducers makes possible to build a low-cost damage detection system that can be used in structural health monitoring (SHM) of the metallic and composite structures. The different number and localization of transducers were considered in the numerical and experimental analysis of the wave propagation phenomenon. The relation of the sensors configuration and the damage detection capability was demonstrated. The main assumptions and requirements of SHM systems of different levels were discussed with reference to the damage detection expectations. The importance of the damage detection system constituents (sensors number, localization, or damage index) in different levels of analysis was verified and discussed to emphasize that in many practical applications introducing complicated procedures and sophisticated data processing techniques does not lead to improving the damage detection efficiency. Finally, the necessity of the appropriate formulation of SHM system requirements and expectations was underlined to improve the effectiveness of the detection methods in particular levels of analysis and thus to improve the safety of the monitored structures.


Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2536 ◽  
Author(s):  
Jian He ◽  
Yongfei Guo ◽  
Hangfei Yuan

Efficient ship detection is essential to the strategies of commerce and military. However, traditional ship detection methods have low detection efficiency and poor reliability due to uncertain conditions of the sea surface, such as the atmosphere, illumination, clouds and islands. Hence, in this study, a novel ship target automatic detection system based on a modified hypercomplex Flourier transform (MHFT) saliency model is proposed for spatial resolution of remote-sensing images. The method first utilizes visual saliency theory to effectively suppress sea surface interference. Then we use OTSU methods to extract regions of interest. After obtaining the candidate ship target regions, we get the candidate target using a method of ship target recognition based on ResNet framework. This method has better accuracy and better performance for the recognition of ship targets than other methods. The experimental results show that the proposed method not only accurately and effectively recognizes ship targets, but also is suitable for spatial resolution of remote-sensing images with complex backgrounds.


Aerospace ◽  
2006 ◽  
Author(s):  
Gerardo Pen˜a ◽  
Kenneth Hunziker ◽  
Christopher Davis ◽  
Matthew Malkin

Corrosion affects the maintenance of metal aircraft. Because the onset of corrosion is unpredictable, sensing corrosion is a challenge and scheduled inspections are mandated by corrosion prevention and control programs. Visual inspection is the most common method of corrosion detection. Visual inspections of aircraft structures that are difficult to access are costly and invasive. Beyond visual inspection, several non-destructive corrosion detection methods exist, such as ultrasonic scanners and pulsed eddy current systems. The functionality of these systems, however, does not minimize the invasiveness of inspections. Access to the structure under inspection is required to use these systems or to perform visual inspections. This paper describes a self-powered, wireless corrosion detection system which could enable modification of existing inspection schemes in difficult-to-access areas where corrosion is expected to develop, for example, on structure beneath an aircraft galley or lavatory. The system consists of an energy harvester, an energy storage and conditioning circuit, a corrosion sensing element, and a wireless transceiver network. Advances in energy harvesting and low-power wireless transceivers have enabled the design. The system allows users to download corrosion data from a sensor through a wireless connection, without the need for costly structural disassembly. Because the device is self-powered and wireless, it operates indefinitely without battery replacement, and does not require power or data wiring from the aircraft.


Sign in / Sign up

Export Citation Format

Share Document