A new corner detection algorithm based on the topological median filter is proposed. Topological quasi dilation and erosion operators with circular structuring element are used to detect the corners on gray level images.
A new corner detection algorithm based on the topological median filter is proposed. Topological quasi dilation and erosion operators with circular structuring element are used to detect the corners on gray level images.
In this study, we present detection algorithms of characteristic points of the QRS and T waves based on the continuous wavelet transform (CWT) with splines. This technique can handle any integer scale and the analysis...
详细信息
In this study, we present detection algorithms of characteristic points of the QRS and T waves based on the continuous wavelet transform (CWT) with splines. This technique can handle any integer scale and the analysis is not restricted to scales that are powers of two, which allows to use a wide range of scales and to more efficiently reduce noise and artifacts. Evaluation of the QRS detection algorithm performance has been done in eight ECG data files of the MIT-BIH database, and the accuracy has been of 99.5%. Evaluation of the detection algorithms of the QRS wave onset and offsets of QRS and T waves has been done in the CSE multi-lead measurement database, and the measurements were within the tolerance limits for deviations with respect of the manual measurements determined by the CSE experts. Therefore, the proposed algorithms to detect characteristic points of the QRS and T waves based on this technique allow the evaluation of the CWT in more scales, are robust to noise and artifacts and have the accuracy of a human expert.
It is a commonly held belief that IPv6 provides greater security against random scanning worms by virtue of a very sparse address space. As a result, worm authors are looking for new ways to acquire vulnerable targets...
详细信息
It is a commonly held belief that IPv6 provides greater security against random scanning worms by virtue of a very sparse address space. As a result, worm authors are looking for new ways to acquire vulnerable targets without relying on random scanning for them. It is possible to find vulnerable Web servers by sending carefully crafted queries to search engines or Domain Name System (DNS) queries to DNS servers. In this paper, we discuss scanning strategies of possible worms in the IPv6 Internet. The performance of the worm depends heavily on these strategies, which in turn depend on how secure directory and naming services of a network are. We present an integrated system for the detection and automatic containment of worm propagation in an IPv6 local area network. The detection engine of our system utilizes the DNS anomalies of the worm traffic. We propose a worm detection algorithm based on user habit of sending DNS queries in an IPv6 Internet. Experiment results show that the algorithm is able to detect worms propagation accurately at its early stage in real-time. Our results bring insight on the future battle against worm attacks.
We propose a principled statistical approach for using 3D information and scene context to reduce the number of false positives in stereo based pedestrian detection. Current pedestrian detection algorithms have focuse...
详细信息
We propose a principled statistical approach for using 3D information and scene context to reduce the number of false positives in stereo based pedestrian detection. Current pedestrian detection algorithms have focused on improving the discriminability of 2D features that capture the pedestrian appearance, and on using various classifier architectures. However, there has been less focus on exploiting the geometry and spatial context in the scene to improve pedestrian detection performance. We make several contributions: (i) we define a new 3D feature, called a Vertical Support Histogram, from dense stereo range maps to locally characterize 3D structure; (ii) we estimate the likelihoods of these 3D features using kernel density estimation, and use them within a Markov Random Field (MRF) to enforce spatial constraints between the features, and to obtain the Maximum A-Posteriori (MAP) scene labeling; (iii) we employ the MAP scene labelings to reduce the number of candidate windows that are tested by a standard, state-of-the-art pedestrian appearance classifier. We evaluate our algorithm on a very challenging, publicly available stereo dataset and compare the performance with state-of-the-art methods.
We first describe the traffic congestion problem that many countries are facing with in the world. Then we propose a traffic incident detection algorithm based on non-parametric regression to solve the congestion prob...
详细信息
We first describe the traffic congestion problem that many countries are facing with in the world. Then we propose a traffic incident detection algorithm based on non-parametric regression to solve the congestion problem. Finally, we compare the algorithm with other incident detection algorithms on the detection rate, false alarm rate and mean detection time. A simulation result shows the algorithm proposed has higher detection rate, lower false alarm rate and longer mean time detection. Furthermore, we state the direction of our next study.
Reduction of Quality (RoQ) attack is a stealthy denial of service attack. It can decrease or inhibit normal TCP flows in network. Victims are hard to perceive it as the final network throughput is decreasing instead o...
详细信息
ISBN:
(纸本)9781479935734
Reduction of Quality (RoQ) attack is a stealthy denial of service attack. It can decrease or inhibit normal TCP flows in network. Victims are hard to perceive it as the final network throughput is decreasing instead of increasing during the attack. Therefore, the attack is strongly hidden and it is difficult to be detected by existing detection systems. Based on the principle of Time-Frequency analysis, we propose a two-stage detection algorithm which combines anomaly detection with misuse detection. In the first stage, we try to detect the potential anomaly by analyzing network traffic through Wavelet multiresolution analysis method. According to different time-domain characteristics, we locate the abrupt change points. In the second stage, we further analyze the local traffic around the abrupt change point. We extract the potential attack characteristics by autocorrelation analysis. By the two-stage detection, we can ultimately confirm whether the network is affected by the attack. Results of simulations and real network experiments demonstrate that our algorithm can detect RoQ attacks, with high accuracy and high efficiency.
This paper presents pedestrian detection algorithm on labeled depth data which is obtained from road scenes. Our approach computes feature responses for head and legs of human body using depth and label data. And then...
详细信息
This paper presents pedestrian detection algorithm on labeled depth data which is obtained from road scenes. Our approach computes feature responses for head and legs of human body using depth and label data. And then, it detects pedestrians by removing edges and partitioning a bipartite graph of head and leg response blobs using prior knowledge about human body. In the experiments, the proposed algorithm produces better result compared to the method which uses histogram of gradient feature and the ground plane for road scenes.
QRS detection is a standard procedure in electrocardiogram (ECG) signal classification and analysis. Although there is a large number of methods published, some featuring high accuracy, the problem remains open. This ...
详细信息
ISBN:
(纸本)9781467348232
QRS detection is a standard procedure in electrocardiogram (ECG) signal classification and analysis. Although there is a large number of methods published, some featuring high accuracy, the problem remains open. This is especially true with respect to high accuracy QRS detection in noisy ECGs such as long-term Holter monitoring during normal daily activity. In this paper a robust real-time QRS detector for noisy applications is proposed. It exploits a modified curve-length concept with combined adaptive threshold derived by basic mean, standard deviation and average peak-to-peak interval. The method was tested using the MIT-BIH arrhythmia database with an observed detection accuracy of 99.70%, sensitivity of 99.86%, positive prediction of 99.84%, and an average failed detection of 0.30%. The proposed approach compares favourably with published results for other QRS detectors, and proves superior to those having constant and manually entered threshold parameters.
Due to the fast growing computing need catered by Cloud infrastructure, energy consumption reduction has been an active field of research. Dynamic VM consolidation is one such research area where server load is monito...
详细信息
Due to the fast growing computing need catered by Cloud infrastructure, energy consumption reduction has been an active field of research. Dynamic VM consolidation is one such research area where server load is monitored and intelligent decision is taken to optimize the usage of datacenters. In our research, we have designed an overload detection method and several VM selection methods for VM migration to achieve the trade off in VM consolidation. We have redesigned and updated an existing overload detection algorithm using heuristics and implement it in our new VM selection algorithms combining migration control and heuristics that was introduced in[9,10]. We have evaluated our algorithms through simulation on large-scale experiments driven by real-world workload traces from more than a thousand Planet lab VMs. From the comparison with existing energy aware VM consolidation methods, it is found that performance of proposed method incurs least energy consumption.
Misconnection of ECG lead-wires can generate abnormal ECG and erroneous diagnosis. Existing methods for detecting lead-wire interchange were designed for ECG devices using conventional lead system. In this work we dev...
详细信息
Misconnection of ECG lead-wires can generate abnormal ECG and erroneous diagnosis. Existing methods for detecting lead-wire interchange were designed for ECG devices using conventional lead system. In this work we developed an automatic ECG cable interchange detection algorithm and compared the algorithm performance between conventional and Mason-Likar (ML) electrode placements. The algorithm was developed based on a decision tree classifier which uses beat morphology measurements that were obtained using Philips DXL ECG algorithm. The algorithm was evaluated for detecting limb cable interchanges on an independent database which included both conventional and ML ECG recordings for each subject (total 423 subjects). There was no statistically significant difference in terms of overall sensitivity and specificity. This morphology-based cable interchange detection algorithm showed similarly high performance for maintaining a low false positive rate for both lead systems. Therefore, in practice, the same algorithm may be used with either electrode placement without a need for a special configuration.
暂无评论