817 resultados para Intrusion Detection, Computer Security, Misuse
Resumo:
This paper proposes a method to locate and track people by combining evidence from multiple cameras using the homography constraint. The proposed method use foreground pixels from simple background subtraction to compute evidence of the location of people on a reference ground plane. The algorithm computes the amount of support that basically corresponds to the ""foreground mass"" above each pixel. Therefore, pixels that correspond to ground points have more support. The support is normalized to compensate for perspective effects and accumulated on the reference plane for all camera views. The detection of people on the reference plane becomes a search for regions of local maxima in the accumulator. Many false positives are filtered by checking the visibility consistency of the detected candidates against all camera views. The remaining candidates are tracked using Kalman filters and appearance models. Experimental results using challenging data from PETS`06 show good performance of the method in the presence of severe occlusion. Ground truth data also confirms the robustness of the method. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
Modern medical imaging techniques enable the acquisition of in vivo high resolution images of the vascular system. Most common methods for the detection of vessels in these images, such as multiscale Hessian-based operators and matched filters, rely on the assumption that at each voxel there is a single cylinder. Such an assumption is clearly violated at the multitude of branching points that are easily observed in all, but the Most focused vascular image studies. In this paper, we propose a novel method for detecting vessels in medical images that relaxes this single cylinder assumption. We directly exploit local neighborhood intensities and extract characteristics of the local intensity profile (in a spherical polar coordinate system) which we term as the polar neighborhood intensity profile. We present a new method to capture the common properties shared by polar neighborhood intensity profiles for all the types of vascular points belonging to the vascular system. The new method enables us to detect vessels even near complex extreme points, including branching points. Our method demonstrates improved performance over standard methods on both 2D synthetic images and 3D animal and clinical vascular images, particularly close to vessel branching regions. (C) 2008 Elsevier B.V. All rights reserved.
Resumo:
The performance of modular home made capillary electrophoresis equipment with spectrophotometric detection, at a visible region by means of a miniaturized linear charge coupled device, was evaluated for the determination of four food dyes. This system presents a simple but efficient home made cell detection scheme. A computer program that converts the spectral data after each run into the electropherograms was developed to evaluate the analytical parameters. The dyes selected for analytical evaluation of the system were Brilliant Blue FCF, Fast Green FCF, Sunset Yellow FCF, and Amaranth. Separation was carried out in a 29cm length and 75 mu m I.D fused silica capillary, using 10mmolL-1 borate buffer at pH 9, with separation voltage of 7.5kV. The detection limits for the dyes were between 0.3 and 1.5mgL-1 and the method presented adequate linearity over the ranges studied, with correlation coefficients greater than 0.99. The method was applied for determination and quantification of these dyes in fruit juices and candies.
Resumo:
In recent years, it has been observed that software clones and plagiarism are becoming an increased threat for one?s creativity. Clones are the results of copying and using other?s work. According to the Merriam – Webster dictionary, “A clone is one that appears to be a copy of an original form”. It is synonym to duplicate. Clones lead to redundancy of codes, but not all redundant code is a clone.On basis of this background knowledge ,in order to safeguard one?s idea and to avoid intentional code duplication for pretending other?s work as if their owns, software clone detection should be emphasized more. The objective of this paper is to review the methods for clone detection and to apply those methods for finding the extent of plagiarism occurrence among the Swedish Universities in Master level computer science department and to analyze the results.The rest part of the paper, discuss about software plagiarism detection which employs data analysis technique and then statistical analysis of the results.Plagiarism is an act of stealing and passing off the idea?s and words of another person?s as one?s own. Using data analysis technique, samples(Master level computer Science thesis report) were taken from various Swedish universities and processed in Ephorus anti plagiarism software detection. Ephorus gives the percentage of plagiarism for each thesis document, from this results statistical analysis were carried out using Minitab Software.The results gives a very low percentage of Plagiarism extent among the Swedish universities, which concludes that Plagiarism is not a threat to Sweden?s standard of education in computer science.This paper is based on data analysis, intelligence techniques, EPHORUS software plagiarism detection tool and MINITAB statistical software analysis.
Resumo:
The objective of this thesis work, is to propose an algorithm to detect the faces in a digital image with complex background. A lot of work has already been done in the area of face detection, but drawback of some face detection algorithms is the lack of ability to detect faces with closed eyes and open mouth. Thus facial features form an important basis for detection. The current thesis work focuses on detection of faces based on facial objects. The procedure is composed of three different phases: segmentation phase, filtering phase and localization phase. In segmentation phase, the algorithm utilizes color segmentation to isolate human skin color based on its chrominance properties. In filtering phase, Minkowski addition based object removal (Morphological operations) has been used to remove the non-skin regions. In the last phase, Image Processing and Computer Vision methods have been used to find the existence of facial components in the skin regions.This method is effective on detecting a face region with closed eyes, open mouth and a half profile face. The experiment’s results demonstrated that the detection accuracy is around 85.4% and the detection speed is faster when compared to neural network method and other techniques.
Resumo:
The project introduces an application using computer vision for Hand gesture recognition. A camera records a live video stream, from which a snapshot is taken with the help of interface. The system is trained for each type of count hand gestures (one, two, three, four, and five) at least once. After that a test gesture is given to it and the system tries to recognize it.A research was carried out on a number of algorithms that could best differentiate a hand gesture. It was found that the diagonal sum algorithm gave the highest accuracy rate. In the preprocessing phase, a self-developed algorithm removes the background of each training gesture. After that the image is converted into a binary image and the sums of all diagonal elements of the picture are taken. This sum helps us in differentiating and classifying different hand gestures.Previous systems have used data gloves or markers for input in the system. I have no such constraints for using the system. The user can give hand gestures in view of the camera naturally. A completely robust hand gesture recognition system is still under heavy research and development; the implemented system serves as an extendible foundation for future work.
Resumo:
AIRES, Kelson R. T. ; ARAÚJO, Hélder J. ; MEDEIROS, Adelardo A. D. . Plane Detection from Monocular Image Sequences. In: VISUALIZATION, IMAGING AND IMAGE PROCESSING, 2008, Palma de Mallorca, Spain. Proceedings..., Palma de Mallorca: VIIP, 2008
Resumo:
A new method to perform TCP/IP fingerprinting is proposed. TCP/IP fingerprinting is the process of identify a remote machine through a TCP/IP based computer network. This method has many applications related to network security. Both intrusion and defence procedures may use this process to achieve their objectives. There are many known methods that perform this process in favorable conditions. However, nowadays there are many adversities that reduce the identification performance. This work aims the creation of a new OS fingerprinting tool that bypass these actual problems. The proposed method is based on the use of attractors reconstruction and neural networks to characterize and classify pseudo-random numbers generators
Resumo:
This work uses a monitoring system based on a PC platform, where the acoustic emission and electric power signals generated during the grinding process are used to investigate superficial burning occurrence in a surface grinding operation using two types of steel, three grinding conditions and an Al203 vitrified grinding wheel. Acoustic emission signals on the workpiece and grinding power were measured during a surface plunge operation until the grinding burn happened. From the results the standard deviation of the acoustic emission signal and the maximum electric power were calculated for each grinding pass. The proposed DPO parameter is the product between the power level and acoustic emission standard deviation. The results show that both signals can be used for burning detection, and the parameter DPO is the best indicator for the burning studied in this work. This can be explained by the high dispersion of the acoustic emission RMS level associated to the high power consumption when the grinding wheel lose its sharpness.
Resumo:
The aim of this study was to evaluate the diagnostic agreement of conventional panoramic radiographs and their inverted scanned images in the detection of the mandibular canal and mental foramen. A total of 77 panoramic radiographs obtained from the files of totally edentulous patients were used. Digitization was done by means of a scanner with brightness and contrast adjustment, as well as image inversion. The extension of mandibular canal was divided into anterior, middle, and posterior regions, and the presence of a radiopaque line that characterized the mandibular canal was classified according to a 5-point confidence scale. The mental foramen was classified in 4 types: continuous, separated, diffuse, and unidentified. Both conventional and inverted scanned panoramic radiographs were evaluated by 3 calibrated implantologists at 2 distinct moments with a minimum interval of 10 days between them. Intraexaminer agreement was evaluated by Kappa statistics by point and by 95% confidence interval. Because the intraexaminer level of agreement was low, interexaminer agreements could not be carried out. The results showed a substantial (in 2 situations), moderate (in 16 situations), and fair (in 18 situations) intraexaminer agreement for mandibular canal and a substantial (in 1 situation), fair (in 1 situation), and moderate (in 10 situations) intraeaminer agreement for mental foramen. There were no statistically significant differences in most instances. In conclusion, the diagnostic agreement of conventional and inverted scanned panoramic radiographs for detection of mandibular canal and mental foramen was low.
Resumo:
This paper presents results from an efficient approach to an automatic detection and extraction of human faces from images with any color, texture or objects in background, that consist in find isosceles triangles formed by the eyes and mouth.
Resumo:
This paper presents a mathematical model and a methodology to solve the transmission network expansion planning problem with security constraints in full competitive market, assuming that all generation programming plans present in the system operation are known. The methodology let us find an optimal transmission network expansion plan that allows the power system to operate adequately in each one of the generation programming plans specified in the full competitive market case, including a single contingency situation with generation rescheduling using the security (n-1) criterion. In this context, the centralized expansion planning with security constraints and the expansion planning in full competitive market are subsets of the proposal presented in this paper. The model provides a solution using a genetic algorithm designed to efficiently solve the reliable expansion planning in full competitive market. The results obtained for several known systems from the literature show the excellent performance of the proposed methodology.