35 resultados para detection method

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

A new two-level real-time vehicle detection method is proposed in order to meet the robustness and efficiency requirements of real world applications. At the high level, pixels of the background image are classified into three categories according to the characteristics of Red, Green, Blue (RGB) curves. The robustness of the classification is further enhanced by using
line detection and pattern connectivity. At the lower level, an exponential forgetting algorithm with adaptive parameters for different categories is utilised to calculate the background and reduce the distortion by the small motion of video cameras. Scene tests show that the proposed method is more robust and faster than previous methods, which is very suitable for real-time vehicle detection in outdoor environments, especially concerning locations where the level of illumination changes frequently and speed detection is important.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, S-parameters investigation of a variable incidence angle multilayer SPR biosensor is presented. Both magnitude and phase of the S-parameters are taken into account in the investigation. The work presented in this paper is the first attempt to apply S-parameters analysis to a multilayer SPR biosensor. The goal is to improve sensitivity through involving S-parameters including their phase values. In addition, further investigation is carried out to understand the relationship between the S-parameters and thickness of biomolecular layer and also the design parameters including the number of graphene layers.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This communication reports an efficient visual detection method of Cu2+ by L-cysteine functionalized gold nanoparticles in aqueous solution. Upon exposure to Cu2+, the gold nanoparticle solution changed from red to blue, in response to surface plasmon absorption of dispersed and aggregated nanoparticles. This colorimetric sensor allows a rapid quantitative assay of Cu2+ down to the concentration range of 10−5 M. Recognition of Cu2+ and formation of the aggregates are proposed to occur via a 2 : 1 sandwich complex between L-cysteine and Cu2+.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Video event detection is an effective way to automatically understand the semantic content of the video. However, due to the mismatch between low-level visual features and high-level semantics, the research of video event detection encounters a number of challenges, such as how to extract the suitable information from video, how to represent the event, how to build up reasoning mechanism to infer the event according to video information. In this paper, we propose a novel event detection method. The method detects the video event based on the semantic trajectory, which is a high-level semantic description of the moving object’s trajectory in the video. The proposed method consists of three phases to transform low-level visual features to middle-level raw trajectory information and then to high-level semantic trajectory information. Event reasoning is then carried out with the assistance of semantic trajectory information and background knowledge. Additionally, to release the users’ burden in manual event definition, a method is further proposed to automatically discover the event-related semantic trajectory pattern from the sample semantic trajectories. Furthermore, in order to effectively use the discovered semantic trajectory patterns, the associative classification-based event detection framework is adopted to discover the possibly occurred event. Empirical studies show our methods can effectively and efficiently detect video events.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

We identify and formulate a novel problem: crosschannel anomaly detection from multiple data channels. Cross channel anomalies are common amongst the individual channel anomalies, and are often portent of significant events. Using spectral approaches, we propose a two-stage detection method: anomaly detection at a single-channel level, followed by the detection of cross-channel anomalies from the amalgamation of single channel anomalies. Our mathematical analysis shows that our method is likely to reduce the false alarm rate. We demonstrate our method in two applications: document understanding with multiple text corpora, and detection of repeated anomalies in video surveillance. The experimental results consistently demonstrate the superior performance of our method compared with related state-of-art methods, including the one-class SVM and principal component pursuit. In addition, our framework can be deployed in a decentralized manner, lending itself for large scale data stream analysis.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Fingertips of human hand play an important role in hand-based interaction with computers. Therefore, identification of fingertips' positions on hand image is vital for developing a human computer interaction system. All most all of the research works for fingertips detection, initially isolate hand image from the background image. Most of these techniques develop color based segmentation methods because human skin color possess an exceptional characterises that can be used to isolate hand from the rest of the image quite easily. Sometimes color image segmentation becomes difficult due to illumination and background variations. To make it simple and reliable, this paper proposes a robust method for detecting fingertips of a hand image based on the combination of color segmentation and circle detection. Due to the characteristics of circularity of fingertips regions of hand boundary, any existing circle detection algorithms can be applied to detect circles at fingertips region. It is difficult to detect fingertips solely based on the circle detection method. For this reason, initially the proposed method detects all the circular regions on the image applying Circle Hough Transformation (CHT) then the fingertips are selected based on the color characteristics of the fingertips regions. Experimental results show that the proposed approach is promising.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

DDoS attacks are one of the major threats to Internet services. Sophisticated hackers are mimicking the features of legitimate network events, such as flash crowds, to fly under the radar. This poses great challenges to detect DDoS attacks. In this paper, we propose an attack feature independent DDoS flooding attack detection method at local area networks. We employ flow entropy on local area network routers to supervise the network traffic and raise potential DDoS flooding attack alarms when the flow entropy drops significantly in a short period of time. Furthermore, information distance is employed to differentiate DDoS attacks from flash crowds. In general, the attack traffic of one DDoS flooding attack session is generated by many bots from one botnet, and all of these bots are executing the same attack program. As a result, the similarity among attack traffic should higher than that among flash crowds, which are generated by many random users. Mathematical models have been established for the proposed detection strategies. Analysis based on the models indicates that the proposed methods can raise the alarm for potential DDoS flooding attacks and can differentiate DDoS flooding attacks from flash crowds with conditions. The extensive experiments and simulations confirmed the effectiveness of our proposed detection strategies.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This thesis describes a novel approach towards the trace level detection of nitramine explosives, by exploring various reduction strategies and utilising ruthenium chemiluminescence. Synthesis of novel chemiluminescence compounds has been achieved, as well as the development of a detection method for determining the shelf life of ammunition.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Remote sensing is a useful tool for detecting change over time.We introduce a hybrid change-detection method for forest and protected-area vegetation and demonstrate its use with two satellite images of Golestan National Park in northern Iran (1998 and 2010). We report on the advantages and disadvantages of the hybrid method relative to the standard change-detection method. In the proposed hybrid algorithm, the change vector analysis technique was used to determine changes in vegetation. Following this, we used postclassification comparison to determine the nature of the changes observed and their accuracy and to evaluate the effects of different parameters on the performance of the proposed method. We determined 85% accuracy for the proposed hybrid change-detection method, thus demonstrating a method for discovering and assessing environmental threats to natural treasures. © 2014 Society of Photo-Optical Instrumentation Engineers.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Web servers are usually located in a well-organized data center where these servers connect with the outside Internet directly through backbones. Meanwhile, the application-layer distributed denials of service (AL-DDoS) attacks are critical threats to the Internet, particularly to those business web servers. Currently, there are some methods designed to handle the AL-DDoS attacks, but most of them cannot be used in heavy backbones. In this paper, we propose a new method to detect AL-DDoS attacks. Our work distinguishes itself from previous methods by considering AL-DDoS attack detection in heavy backbone traffic. Besides, the detection of AL-DDoS attacks is easily misled by flash crowd traffic. In order to overcome this problem, our proposed method constructs a Real-time Frequency Vector (RFV) and real-timely characterizes the traffic as a set of models. By examining the entropy of AL-DDoS attacks and flash crowds, these models can be used to recognize the real AL-DDoS attacks. We integrate the above detection principles into a modularized defense architecture, which consists of a head-end sensor, a detection module and a traffic filter. With a swift AL-DDoS detection speed, the filter is capable of letting the legitimate requests through but the attack traffic is stopped. In the experiment, we adopt certain episodes of real traffic from Sina and Taobao to evaluate our AL-DDoS detection method and architecture. Compared with previous methods, the results show that our approach is very effective in defending AL-DDoS attacks at backbones. © 2013 Elsevier B.V. All rights reserved.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper presents a functional observer based fault detection method. The fault detection is achieved using a functional observer based fault indicator that asymptotically converges to a fault indicator that can be derived based on the nominal system. The asymptotic value of the proposed fault indicator is independent of the functional observer parameters and also the convergence rate of the fault indicator can be altered by choosing appropriate functional observer parameters. The advantage of using this new method is that the observed system is not necessarily needed to be observable; therefore, the proposed fault detection technique is also applicable for systems where state observers cannot be designed; moreover, the functional observer fault detection scheme is always of reduced order in comparison to a state observer based scheme.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Proposing efficient methods for fire protection is becoming more and more important, because a small flame of fire may cause huge problems in social safety. In this paper, an effective fire flame detection method is investigated. This fire detection method includes four main stages: in the first step, a linear transformation is applied to convert red, green, and blue (RGB) color space through a 3∗3 matrix to a new color space. In the next step, fuzzy c-mean clustering method (FCM) is used to distinguish between fire flame and non-fire flame pixels. Particle Swarm Optimization algorithm (PSO) is also utilized in the last step to decrease the error value measured by FCM after conversion. Finally, we apply Otsu threshold method to the new converted images to make a binary picture. Empirical results show the strength, accuracy and fast-response of the proposed algorithm in detecting fire flames in color images.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Classification of electrocardiogram (ECG) data stream is essential to diagnosis of critical heart conditions. It is vital to accurately detect abnormality in the ECG in order to prevent possible beginning of life-threatening cardiac symptoms. In this paper, we focus on identifying premature ventricular contraction (PVC) which is one of the most common heart rhythm abnormalities. We use "Replacing" strategy to check the effects of each individual heartbeat on the variation of principal directions. Based on this idea, an online PVC detection method is proposed to classify the new arriving PVC beats in the real-time and online manner. The proposed approach is tested on the MIT-BIH arrhythmia database (MIT-BIH-AR). The PVC detection accuracy was 98.77%, with the sensitivity and positive predictivity of 96.12% and 86.48%, respectively. These results are an improvement on previous reported results for PVC detection. In addition, our proposed method is effective in terms of computation time. The average execution time of our proposed method was 3.83 s for a 30 min ECG recording. It shows the capability of the classifier to detect abnormal PVCs in online manner.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

A novel electrochemical sensor for highly sensitive and selective detection of dopamine (DA) was developed based on a graphene quantum dots (GQDs) and Nafion composite modified glassy carbon electrode (GCE). GQDs were synthesized by a hydrothermal approach for cutting graphene sheets into GQDs and characterized by TEM, UV-vis, photoluminescence, and FT-IR spectra. The GQDs had carboxyl groups with a negative charge, which not only provided good stability, but also enabled interaction with amine functional groups in DA through electrostatic interaction to enhance the specificity of DA. The interaction and electron communication between GQDs and DA can be further strengthened via π-π stacking force. Nafion was used as an anchoring agent to increase the robustness of GQDs on the electrode surface and sensor stability and reproducibility. The GQDs-Nafion composite exhibits a good linear range of 5 nM to 100 μM and a limit of detection as low as 0.45 nM in the detection of DA. The proposed electrochemical sensor also displays good selectivity and high stability and could be used for the determination of DA in real samples with satisfactory results. The present study provides a powerful avenue for the design of an ultrasensitive detection method for clinical application.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A retrospective assessment of exposure to benzene was carried out for a nested case control study of lympho-haematopoietic cancers, including leukaemia, in the Australian petroleum industry. Each job or task in the industry was assigned a Base Estimate (BE) of exposure derived from task-based personal exposure assessments carried out by the company occupational hygienists. The BEs corresponded to the estimated arithmetic mean exposure to benzene for each job or task and were used in a deterministic algorithm to estimate the exposure of subjects in the study. Nearly all of the data sets underlying the BEs were found to contain some values below the limit of detection (LOD) of the sampling and analytical methods and some were very heavily censored; up to 95% of the data were below the LOD in some data sets. It was necessary, therefore, to use a method of calculating the arithmetic mean exposures that took into account the censored data. Three different methods were employed in an attempt to select the most appropriate method for the particular data in the study. A common method is to replace the missing (censored) values with half the detection limit. This method has been recommended for data sets where much of the data are below the limit of detection or where the data are highly skewed; with a geometric standard deviation of 3 or more. Another method, involving replacing the censored data with the limit of detection divided by the square root of 2, has been recommended when relatively few data are below the detection limit or where data are not highly skewed. A third method that was examined is Cohen's method. This involves mathematical extrapolation of the left-hand tail of the distribution, based on the distribution of the uncensored data, and calculation of the maximum likelihood estimate of the arithmetic mean. When these three methods were applied to the data in this study it was found that the first two simple methods give similar results in most cases. Cohen's method on the other hand, gave results that were generally, but not always, higher than simpler methods and in some cases gave extremely high and even implausible estimates of the mean. It appears that if the data deviate substantially from a simple log-normal distribution, particularly if high outliers are present, then Cohen's method produces erratic and unreliable estimates. After examining these results, and both the distributions and proportions of censored data, it was decided that the half limit of detection method was most suitable in this particular study.