detection time
Recently Published Documents


TOTAL DOCUMENTS

357
(FIVE YEARS 122)

H-INDEX

18
(FIVE YEARS 4)

Energies ◽  
2022 ◽  
Vol 15 (2) ◽  
pp. 526
Author(s):  
Edmilson Bermudes Rocha Junior ◽  
Oureste Elias Batista ◽  
Domingos Sávio Lyrio Simonetti

This paper proposes a methodology to monitor the instantaneous value of the current and its derivative in the abc, αβ0, and dq0 reference frames to act in the detection of fault current in medium-voltage distribution systems. The method employed to calculate the derivative was Euler’s, with processing sampling rates of 10, 50, 100, and 200 μs. Using the MATLAB/Simulink platform, fault situations were analyzed on a real feeder of approximately 1.1132 km in length, fed by an 11.4 kV source, composed of 26 unbalanced loads and modeled as constant power. The simulation results show that the detection occurred in the different fault situations implemented in the feeder and that the detection speed is related to the value of the processing sampling rate (PSR) used. Considering all fault situations and regardless of the PSR value used, the total average detection time was 49 µs. Besides that, the joint action of the detection system with the Thyristor Controlled Series Capacitor (TCSC) limited the fault current in each situation. The average detection time for each fault situation analyzed was below the typical time for a recloser to act, regardless of the reference adopted for the analysis.


Author(s):  
Anna M. Nelson ◽  
Sanaz Habibi ◽  
Jaesung Lee ◽  
Mark A. Burns

Abstract Lead contamination in drinking water can pose serious health risks to humans, and can often go undetected as a result of corrosion of lead infrastructure installed in buildings constructed prior to 1986. Thus, there is an unmet need for timely, cost-effective, and onsite monitoring of lead in drinking water. Here, we have designed a four-electrode system to reliably respond to electrodeposited lead oxide that provides a near real-time indication of lead presence. To better understand this detection mechanism, we investigated the temporal and spatial electrochemical deposition of lead using potential response data, scanning electron microscopy (SEM), fractal dimension (fD), and COMSOL Multiphysics® finite element analysis. Our results suggest that the deposition of lead oxide on the sensor is diffusion limited. Such fundamental understanding of the detection mechanism is critical to improve and shorten the detection time of the sensor. We used this information to improve the detection time and reliability of the signal by reducing the electrode gap distance and agitating the solution. This study provides a path for further optimization of a continuous electrochemical sensor for onsite monitoring of lead in drinking water.


Author(s):  
Antonio Candelieri ◽  
Andrea Ponti ◽  
Francesco Archetti

This paper is focused on two topics very relevant in water distribution networks (WDNs): vulnerability assessment and the optimal placement of water quality sensors. The main novelty element of this paper is to represent the data of the problem, in this case all objects in a graph underlying a water distribution network, as discrete probability distributions. For vulnerability (and the related issue of re-silience) the metrics from network theory, widely studied and largely adopted in the water research community, reflect connectivity expressed as closeness centrality or, betweenness centrality based on the average values of shortest paths between all pairs of nodes. Also network efficiency and the related vulnerability measures are related to average of inverse distances. In this paper we propose a different approach based on the discrete probability distribution, for each node, of the node-to-node distances. For the optimal sensor placement, the elements to be represented as dis-crete probability distributions are sub-graphs given by the locations of water quality sensors. The objective functions, detection time and its variance as a proxy of risk, are accordingly represented as a discrete e probability distribution over contamination events. This problem is usually dealt with by EA algorithm. We’ll show that a probabilistic distance, specifically the Wasserstein (WST) distance, can naturally allow an effective formulation of genetic operators. Usually, each node is associated to a scalar real number, in the optimal sensor placement considered in the literature, average detection time, but in many applications, node labels are more naturally expressed as histograms or probability distributions: the water demand at each node is naturally seen as a histogram over the 24 hours cycle. The main aim of this paper is twofold: first to show how different problems in WDNs can take advantage of the representational flexibility inherent in WST spaces. Second how this flexibility translates into computational procedures.


Author(s):  
Ehsan Mohammadi ◽  
Bahador Makkiabadi ◽  
Mohammad Bagher Shamsollahi ◽  
Parham Reisi ◽  
Saeed Kermani

Many studies in the field of sleep have focused on connectivity and coherence. Still, the nonstationary nature of electroencephalography (EEG) makes many of the previous methods unsuitable for automatic sleep detection. Time-frequency representations and high-order spectra are applied to nonstationary signal analysis and nonlinearity investigation, respectively. Therefore, combining wavelet and bispectrum, wavelet-based bi-phase (Wbiph) was proposed and used as a novel feature for sleep–wake classification. The results of the statistical analysis with emphasis on the importance of the gamma rhythm in sleep detection show that the Wbiph is more potent than coherence in the wake–sleep classification. The Wbiph has not been used in sleep studies before. However, the results and inherent advantages, such as the use of wavelet and bispectrum in its definition, suggest it as an excellent alternative to coherence. In the next part of this paper, a convolutional neural network (CNN) classifier was applied for the sleep–wake classification by Wbiph. The classification accuracy was 97.17% in nonLOSO and 95.48% in LOSO cross-validation, which is the best among previous studies on sleep–wake classification.


Author(s):  
RunQi Li

Aiming at the problems of low precision, long detection time and poor detection effect in current cross domain information sharing key security detection methods, a cross domain information sharing key security detection method based on PKG trust gateway is proposed. By analyzing bilinear pairing based on elliptic curve and identity based encryption scheme, according to the independent system parameters of PKG management platform, cross domain authentication access mechanism is proposed. PKG of different trust domains is used as the trust gateway for cross domain authentication. The key escrow problem of PKG of different trust domains is solved through key sharing, and the communication key agreement mechanism is established to mutually authenticate the user nodes in the trust domains with different system parameters. The formal description of the rule detection of cryptographic functions, parameters and other information, supported by the dynamic binary analysis platform pin, dynamically records the encryption and decryption process information during the operation of the program, and realizes cross domain information sharing key security detection through the design of correlation vulnerability detection algorithm. The experimental results show that the cross-domain information shared key security detection effect of the proposed method is better, which can effectively improve the detection accuracy and shorten the detection time.


2021 ◽  
Vol 11 (24) ◽  
pp. 12134
Author(s):  
Xiaofeng Lu ◽  
Fei Wang ◽  
Cheng Jiang ◽  
Pietro Lio

In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents. Malicious PDF and Word document features are abstracted and extended, which can be used to detect other types of documents. A universal static detection framework for malicious documents based on feature generalization is then proposed. The generalized features include specification check errors, the structure path, code keywords, and the number of objects. The proposed method is verified on two datasets, and is compared with Kaspersky, NOD32, and McAfee antivirus software. The experimental results demonstrate that the proposed method achieves good performance in terms of the detection accuracy, runtime, and scalability. The average F1-score of all types of documents is found to be 0.99, and the average detection time of a document is 0.5926 s, which is at the same level as the compared antivirus software.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Shuo Wang ◽  
Jian Wang ◽  
Yafei Song ◽  
Song Li

The increasing volume and types of malwares bring a great threat to network security. The malware binary detection with deep convolutional neural networks (CNNs) has been proved to be an effective method. However, the existing malware classification methods based on CNNs are unsatisfactory to this day because of their poor extraction ability, insufficient accuracy of malware classification, and high cost of detection time. To solve these problems, a novel approach, namely, multiscale feature fusion convolutional neural networks (MFFCs), was proposed to achieve an effective classification of malware based on malware visualization utilizing deep learning, which can defend against malware variants and confusing malwares. The approach firstly converts malware code binaries into grayscale images, and then, these images will be normalized in size by utilizing the MFFC model to identify malware families. Comparative experiments were carried out to verify the performance of the proposed method. The results indicate that the MFFC stands out among the recent advanced methods with an accuracy of 98.72% and an average cost of 5.34 milliseconds on the Malimg dataset. Our method can effectively identify malware and detect variants of malware families, which has excellent feature extraction capability and higher accuracy with lower detection time.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8289
Author(s):  
Shilan S. Hameed ◽  
Ali Selamat ◽  
Liza Abdul Latiff ◽  
Shukor A. Razak ◽  
Ondrej Krejcar ◽  
...  

Cyber-attack detection via on-gadget embedded models and cloud systems are widely used for the Internet of Medical Things (IoMT). The former has a limited computation ability, whereas the latter has a long detection time. Fog-based attack detection is alternatively used to overcome these problems. However, the current fog-based systems cannot handle the ever-increasing IoMT’s big data. Moreover, they are not lightweight and are designed for network attack detection only. In this work, a hybrid (for host and network) lightweight system is proposed for early attack detection in the IoMT fog. In an adaptive online setting, six different incremental classifiers were implemented, namely a novel Weighted Hoeffding Tree Ensemble (WHTE), Incremental K-Nearest Neighbors (IKNN), Incremental Naïve Bayes (INB), Hoeffding Tree Majority Class (HTMC), Hoeffding Tree Naïve Bayes (HTNB), and Hoeffding Tree Naïve Bayes Adaptive (HTNBA). The system was benchmarked with seven heterogeneous sensors and a NetFlow data infected with nine types of recent attack. The results showed that the proposed system worked well on the lightweight fog devices with ~100% accuracy, a low detection time, and a low memory usage of less than 6 MiB. The single-criteria comparative analysis showed that the WHTE ensemble was more accurate and was less sensitive to the concept drift.


2021 ◽  
Author(s):  
Jinyeop Lee ◽  
Abdurhaman Teyib Abafogi ◽  
Sujin Oh ◽  
Ho Eun Chang ◽  
Wu Tepeng ◽  
...  

Abstract Bacterial contamination of blood products is a major problem in transfusion medicine, in terms of both morbidity and mortality. Platelets (PLTs) are stored at room temperature (under constant agitation) for more than 5 days, and bacteria can thus grow significantly from a low level to high titers. However, conventional methods like blood culture and lateral flow assay have disadvantages such as long detection time, low sensitivity, and the need for a large volume of blood components. We used real-time polymerase chain reaction (PCR) assays with antibiotic-conjugated magnetic nanobeads (MNBs) to detect enriched Gram-positive and -negative bacteria. The MNBs were coated with polyethylene glycol (PEG) to prevent aggregation by blood components. Over 80% of all bacteria were captured by the MNBs, and the levels of detection were 101 colony forming unit [CFU]/mL and 102 CFU/mL for Gram-positive and -negative bacteria, respectively. The detection time is < 3 h using only small volumes of blood components. Thus, compared to conventional methods, real-time PCR using MNBs allows for rapid detection with high sensitivity using only a small volume of blood components.


Sign in / Sign up

Export Citation Format

Share Document