A detection and identification method based on signal power for different types of Electronic Jamming attacks on GPS signals

Author(s):  
Esat Elezi ◽  
Goksel Cankaya ◽  
Ali Boyaci ◽  
Serhan Yarkan
Author(s):  
SANG-HO CHO ◽  
TAEWAN KIM ◽  
DAIJIN KIM

This paper proposes a pose robust human detection and identification method for sequences of stereo images using multiply-oriented 2D elliptical filters (MO2DEFs), which can detect and identify humans regardless of scale and pose. Four 2D elliptical filters with specific orientations are applied to a 2D spatial-depth histogram, and threshold values are used to detect humans. The human pose is then determined by finding the filter whose convolution result was maximal. Candidates are verified by either detecting the face or matching head-shoulder shapes. Human identification employs the human detection method for a sequence of input stereo images and identifies them as a registered human or a new human using the Bhattacharyya distance of the color histogram. Experimental results show that (1) the accuracy of pose angle estimation is about 88%, (2) human detection using the proposed method outperforms that of using the existing Object Oriented Scale Adaptive Filter (OOSAF) by 15–20%, especially in the case of posed humans, and (3) the human identification method has a nearly perfect accuracy.


Author(s):  
Nicolo` Bachschmid ◽  
Paolo Pennacchi ◽  
Ezio Tanzi

This paper presents the experimental validation of a model based transverse crack identification method suitable for industrial machines, described in part 1. The method is validated by experimental results obtained on two test rigs, which were expressly designed for investigating the dynamical behavior of cracked horizontal rotors. On the first test rig, only one crack type is considered, while on the second one three different types of crack have been analyzed: the first is a slot, therefore not actually a crack since it has not the typical breathing behavior, the second a small crack (14% of the diameter) and the third a deep crack (47% of the diameter). The excellent accuracy obtained in identifying position and depth of different cracks proves the effectiveness and reliability of the proposed method. Moreover, the implementation of identification method operates on a PC and takes short time to run, therefore is suitable for industrial applications.


2019 ◽  
Vol 3 (1) ◽  
pp. 25
Author(s):  
Nola Verli Herlian ◽  
Komang Oka Saputra ◽  
I Gst A. Komang Diafari Djuni Hartawan

The increase of client devices along with the growth of internet access currently affects to security threats at the user's identity. Identifiers that commonly used today, such as SSID, IP address, MAC address, cookies, and session IDs have a weakness, which is easy to duplicate. Computer identification based on clock skew is an identification method that is not easily duplicated because it is based on the hardware characteristics of the device. Clock skew is the deviation of the clock to the true time which causes each clock to run at a slightly different speed. This study aims to determine the effect of network types to the clock skew stability as a reliable device identification method. This research was conducted on five client computers which running windows and linux operating systems. The measurement was conducted based on three different types of area networks, i.e., LAN, MAN, and WAN. The skew estimation was done using two linear methods i.e., linear programming and linear regression. The measurement results show that the most stable clock skew is found on the LAN measurement because it meets the threshold tolerance limit i.e., ±1 ppm. Skew estimation using linear programming method has better accuracy than linear regression method.


2020 ◽  
Vol 12 (1) ◽  
pp. 196 ◽  
Author(s):  
Gemine Vivone ◽  
Paolo Addesso ◽  
Amanda Ziemann

This special issue gathers fourteen papers focused on the application of a variety of target object detection and identification techniques for remotely-sensed data. These data are acquired by different types of sensors (both passive and active) and are located on various platforms, ranging from satellites to unmanned aerial vehicles. This editorial provides an overview of the contributed papers, briefly presenting the technologies and algorithms employed as well as the related applications.


Sign in / Sign up

Export Citation Format

Share Document