Research on TV Goniometer Object Extraction Algorithm Based on Threshold Segmentation

2014 ◽  
Vol 889-890 ◽  
pp. 1093-1098
Author(s):  
He Chen ◽  
Nan Li ◽  
Tian Chen Huang ◽  
Rong Xia Duan

In the TV goniometer detection system, to play the signal and field of view points line extraction is a key link in the process of parameter detection. Combination of target processing requirements, this article will target extraction algorithm based on gray level threshold and edge detection algorithm is studied, and through the experimental analysis to select the optimal algorithm was applied to the detection of TV goniometer; According to the characteristics of the standard signal and view points, lines, and put forward the corresponding methods of target recognition, and is verified through experiments

2021 ◽  
Vol 11 (12) ◽  
pp. 5567
Author(s):  
Gianmarco Baldini ◽  
Jose Luis Hernandez Ramos ◽  
Irene Amerini

The Intrusion Detection System (IDS) is an important tool to mitigate cybersecurity threats in an Information and Communication Technology (ICT) infrastructure. The function of the IDS is to detect an intrusion to an ICT system or network so that adequate countermeasures can be adopted. Desirable features of IDS are computing efficiency and high intrusion detection accuracy. This paper proposes a new anomaly detection algorithm for IDS, where a machine learning algorithm is applied to detect deviations from legitimate traffic, which may indicate an intrusion. To improve computing efficiency, a sliding window approach is applied where the analysis is applied on large sequences of network flows statistics. This paper proposes a novel approach based on the transformation of the network flows statistics to gray images on which Gray level Co-occurrence Matrix (GLCM) are applied together with an entropy measure recently proposed in literature: the 2D Dispersion Entropy. This approach is applied to the recently public IDS data set CIC-IDS2017. The results show that the proposed approach is competitive in comparison to other approaches proposed in literature on the same data set. The approach is applied to two attacks of the CIC-IDS2017 data set: DDoS and Port Scan achieving respectively an Error Rate of 0.0016 and 0.0048.


In this proposed system a digital imagefalsification can be identified using the combination of both adaptive over block based segmentation, feature keypointbased feature extraction algorithms(Scale Invariant Feature Transform (SIFT) and Speeded Up Robust Features (SURF)) and forgery region extraction algorithm. The proposed falsification detection algorithm comprises both block based falsification detection algorithm (adaptive over block based segmentation and block feature matching algorithm) and the keypoint based falsification detection algorithm(forgery region extraction algorithm). Adaptive over block based Segmentation algorithm adaptively segments the input digital image into separate(non overlapped) blocks in irregular manner. Scale Invariant Feature Transform (SIFT) algorithm and Speeded Up Robust Features (SURF) algorithms are used to draw out features from the segmentedblocks as a block features. Then the extracted features are matched with the feature points of other segmented block. If the feature key points are matched with any other feature point presents in the segmented blocks, then the matched feature points are marked as Labeled key Points (LKP), which can be doubted as a forged regions. Finally, the Forgery Region Extraction algorithm can be used to detect the forged region from the input digital image based on the extracted labeled feature points. The experimental outcomesdisplay that the novelfalsification detection system can accomplished the requirements compared with the existing digital imagefalsification detection methods


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1081
Author(s):  
Tamon Miyake ◽  
Shintaro Yamamoto ◽  
Satoshi Hosono ◽  
Satoshi Funabashi ◽  
Zhengxue Cheng ◽  
...  

Gait phase detection, which detects foot-contact and foot-off states during walking, is important for various applications, such as synchronous robotic assistance and health monitoring. Gait phase detection systems have been proposed with various wearable devices, sensing inertial, electromyography, or force myography information. In this paper, we present a novel gait phase detection system with static standing-based calibration using muscle deformation information. The gait phase detection algorithm can be calibrated within a short time using muscle deformation data by standing in several postures; it is not necessary to collect data while walking for calibration. A logistic regression algorithm is used as the machine learning algorithm, and the probability output is adjusted based on the angular velocity of the sensor. An experiment is performed with 10 subjects, and the detection accuracy of foot-contact and foot-off states is evaluated using video data for each subject. The median accuracy is approximately 90% during walking based on calibration for 60 s, which shows the feasibility of the static standing-based calibration method using muscle deformation information for foot-contact and foot-off state detection.


2014 ◽  
Vol 530-531 ◽  
pp. 705-708
Author(s):  
Yao Meng

This paper first engine starting defense from Intrusion Detection, Intrusion detection engine analyzes the hardware platform, the overall structure of the technology and the design of the overall structure of the plug, which on the whole structure from intrusion defense systems were designed; then described in detail improved DDOS attack detection algorithm design thesis, and the design of anomaly detection algorithms.


2017 ◽  
Vol 7 (1) ◽  
pp. 32-48 ◽  
Author(s):  
Samar Fathy ◽  
Nahla El-Haggar ◽  
Mohamed H. Haggag

Emotions can be judged by a combination of cues such as speech facial expressions and actions. Emotions are also articulated by text. This paper shows a new hybrid model for detecting emotion from text which depends on ontology with keywords semantic similarity. The text labelled with one of the six basic Ekman emotion categories. The main idea is to extract ontology from input sentences and match it with the ontology base which created from simple ontologies and the emotion of each ontology. The ontology extracted from the input sentence by using a triplet (subject, predicate, and object) extraction algorithm, then the ontology matching process is applied with the ontology base. After that the emotion of the input sentence is the emotion of the ontology which it matches with the highest score of matching. If the extracted ontology doesn't match with any ontology from the ontology base, then the keyword semantic similarity approach used. The suggested approach depends on the meaning of each sentence, the syntax and semantic analysis of the context.


2013 ◽  
Vol 655-657 ◽  
pp. 1787-1790
Author(s):  
Sheng Chen Yu ◽  
Li Min Sun ◽  
Yang Xue ◽  
Hui Guo ◽  
Xiao Ju Wang ◽  
...  

Intrusion detection algorithm based on support vector machine with pre-extracting support vector is proposed which combines the center distance ratio and classification algorithm. Given proper thresholds, we can use the support vector as a substitute for the training examples. Then the scale of dataset is decreased and the performance of support vector machine is improved in the detection rate and the training time. The experiment result has shown that the intrusion detection system(IDS) based on support vector machine with pre-extracting support needs less training time under the same detection performance condition.


Sign in / Sign up

Export Citation Format

Share Document