detection process
Recently Published Documents


TOTAL DOCUMENTS

315
(FIVE YEARS 101)

H-INDEX

18
(FIVE YEARS 3)

Author(s):  
Kokate Mahadeo Digamber ◽  
Wankhede Vishal Ashok ◽  
Pawar Dhananjay Jagdish

Today, we are thinking to raise Farmer’s income through various means and measures. Implementation of new crop patterns, technology inclusion and promoting the eshtablishment of numerous agro processing industries will play a major role in agriculture sector. The labour issue is also one of the main concerns in many of the agricultural activities. In this paper we propose a technological evolvement in onion detection process, where we apply image processing and sensory mechanism to identify sprouted and rotten onions respectively. This will yield to quick, accurate and prompt supply of goods to the market, irrespective of lack of consistent but costly manpower. The efficiency of this prototype in identifying the sprouted onions with the help of camera is observed to be upto 87% and also the response of Gas sensing system in detecting rooten onions under prescribed chamber dimensions is analysed and obtained encouraging results.


2022 ◽  
Vol 9 (1) ◽  
pp. 8-19
Author(s):  
Sultan Saud Alanazi ◽  
◽  
Adwan Alowine Alanazi ◽  

There are several ways to improve an organization’s cybersecurity protection against intruders. One of the ways is to proactively hunt for threats, i.e., threat hunting. Threat Hunting empowers organizations to detect the presence of intruders in their environment. It identifies and searches the tactics, techniques, and procedures (TTP) of the attackers to find them in the environment. To know what to look for in the collected data and environment, it is required to know and understand the attacker's TTPs. An attacker's TTPs information usually comes from signatures, indicators, and behavior observed in threat intelligence sources. Traditionally, threat hunting involves the analysis of collected logs for Indicator of Compromise (IOCs) through different tools. However, network and security infrastructure devices generate large volumes of logs and can be challenging to analyze thus leaving gaps in the detection process. Similarly, it is very difficult to identify the required IOCs and thus sometimes makes it difficult to hunt the threat which is one of the major drawbacks of the traditional threat hunting processes and frameworks. To address this issue, intelligent automated processes using machine learning can improve the threat hunting process, that will plug those gaps before an attacker can exploit them. This paper aims to propose a machine learning-based threat-hunting model that will be able to fill the gaps in the threat detection process and effectively detect the unknown adversaries by training the machine learning algorithms via extensive datasets of TTPs and normal behavior of the system and target environment. The model is comprised of five main stages. These are Hypotheses Development, Equip, Hunt, Respond and Feedback stages. This threat hunting model is a bit ahead of the traditional models and frameworks by employing machine learning algorithms.


Mathematics ◽  
2021 ◽  
Vol 10 (1) ◽  
pp. 60
Author(s):  
Qiuying Li ◽  
Hoang Pham

This paper presents a general testing coverage software reliability modeling framework that covers imperfect debugging and considers not only fault detection processes (FDP) but also fault correction processes (FCP). Numerous software reliability growth models have evaluated the reliability of software over the last few decades, but most of them attached importance to modeling the fault detection process rather than modeling the fault correction process. Previous studies analyzed the time dependency between the fault detection and correction processes and modeled the fault correction process as a delayed detection process with a random or deterministic time delay. We study the quantitative dependency between dual processes from the viewpoint of fault amount dependency instead of time dependency, then propose a generalized modeling framework along with imperfect debugging and testing coverage. New models are derived by adopting different testing coverage functions. We compared the performance of these proposed models with existing models under the context of two kinds of failure data, one of which only includes observations of faults detected, and the other includes not only fault detection but also fault correction data. Different parameter estimation methods and performance comparison criteria are presented according to the characteristics of different kinds of datasets. No matter what kind of data, the comparison results reveal that the proposed models generally give improved descriptive and predictive performance than existing models.


2021 ◽  
Vol 10 (6) ◽  
pp. 3211-3219
Author(s):  
Awang Hendrianto Pratomo ◽  
Wilis Kaswidjanti ◽  
Alek Setiyo Nugroho ◽  
Shoffan Saifullah

Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.


Synthetic Aperture Radar (SAR) images show promising results in monitoring maritime activities. Recently, Deep learning-based object detection techniques have impressive results in most detection applications but unfortunately there are challenging problems such as difficulty of detecting multiple ships, especially inshore ones. In this paper, a three-step ship detection process is described and a reliable and sensitive hybrid deep learning model is proposed as an efficient classifier in the middle step. The proposed model combines the finetuned Inception-Resnet-V2 model and the Long Short Term Memory model in two different approaches: parallel approach and cascaded approach. In experiments, the region proposal algorithm and the Non-Maxima suppression algorithm are applied in the first and last step in the three-step detection process. The comparative results show that the proposed approach in cascaded form outperforms the competitive recent state-of-the-art approaches by enhancement up to 16.3%, 16.5%, and 18.9% in terms of recall, precision and mean average precision, respectively. Moreover, the proposed approach shows high relative sensitivity for challenged cases of both inshore and offshore scenes by enhancement ratios up to 81.88% and 24.58%, respectively in recall perspective.


2021 ◽  
pp. 4181-4194
Author(s):  
Eman Hato

Shot boundary detection is the process of segmenting a video into basic units known as shots by discovering transition frames between shots. Researches have been conducted to accurately detect the shot boundaries. However, the acceleration of the shot detection process with higher accuracy needs improvement. A new method was introduced in this paper to find out the boundaries of abrupt shots in the video with high accuracy and lower computational cost. The proposed method consists of two stages. First, projection features were used to distinguish non boundary transitions and candidate transitions that may contain abrupt boundary. Only candidate transitions were conserved for next stage. Thus, the speed of shot detection was improved by reducing the detection scope. In the second stage, the candidate segments were refined using motion feature derived from the optical flow to remove non boundary frames. The results manifest that the proposed method achieved excellent detection accuracy (0.98 according to F-Score) and effectively speeded up detection process. In addition, the comparative analysis results confirmed the superior performance of the proposed method versus other methods.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Saurabh Panwar ◽  
Vivek Kumar ◽  
P.K. Kapur ◽  
Ompal Singh

PurposeSoftware testing is needed to produce extremely reliable software products. A crucial decision problem that the software developer encounters is to ascertain when to terminate the testing process and when to release the software system in the market. With the growing need to deliver quality software, the critical assessment of reliability, cost of testing and release time strategy is requisite for project managers. This study seeks to examine the reliability of the software system by proposing a generalized testing coverage-based software reliability growth model (SRGM) that incorporates the effect of testing efforts and change point. Moreover, the strategic software time-to-market policy based on costreliability criteria is suggested.Design/methodology/approachThe fault detection process is modeled as a composite function of testing coverage, testing efforts and the continuation time of the testing process. Also, to assimilate factual scenarios, the current research exhibits the influence of software users refer as reporters in the fault detection process. Thus, this study models the reliability growth phenomenon by integrating the number of reporters and the number of instructions executed in the field environment. Besides, it is presumed that the managers release the software early to capture maximum market share and continue the testing process for an added period in the user environment. The multiattribute utility theory (MAUT) is applied to solve the optimization model with release time and testing termination time as two decision variables.FindingsThe practical applicability and performance of the proposed methodology are demonstrated through real-life software failure data. The findings of the empirical analysis have shown the superiority of the present study as compared to conventional approaches.Originality/valueThis study is the first attempt to assimilate testing coverage phenomenon in joint optimization of software time to market and testing duration.


Sign in / Sign up

Export Citation Format

Share Document