detection algorithm for pedestrians is proposed for the real surveillance system based on color similarity for dynamic color images under low illumination, where the proposed color similarity is defined by color chang...
详细信息
detection algorithm for pedestrians is proposed for the real surveillance system based on color similarity for dynamic color images under low illumination, where the proposed color similarity is defined by color change vectors in the L*a*b* color metric space and the time taken by pedestrians to pass between surveillance camera. It provides continuous detection results through surveillance cameras under lower luminance conditions in real surveillance system. Experimental results for dynamic image taken under low illumination in streets show that detected frames with the proposed algorithm increased by 20% compared to detection results without geographic information. The proposed algorithm is being considered for use in poor security areas in downtown Japan.
Today, 77 GHz FMCW (Frequency Modulation Continuous Wave) radar has strong advantages of range and velocity detection for automotive applications. However, FMCW radar brings out ghost targets and missed targets in mul...
详细信息
ISBN:
(纸本)9780819490391
Today, 77 GHz FMCW (Frequency Modulation Continuous Wave) radar has strong advantages of range and velocity detection for automotive applications. However, FMCW radar brings out ghost targets and missed targets in multi-target situations. In this paper, in order to resolve these limitations, we propose an effective pairing algorithm, which consists of two steps. In the proposed method, a waveform with different slopes in two periods is used. In the 1st pairing processing, all combinations of range and velocity are obtained in each of two wave periods. In the 2nd pairing step, using the results of the 1st pairing processing, fine range and velocity are detected. In that case, we propose the range-velocity windowing technique in order to compensate for the non-ideal beat-frequency characteristic that arises due to the non-linearity of the RF module. Based on experimental results, the performance of the proposed algorithm is improved compared with that of the typical method.
The wide area monitoring system (WAMS) is critical for power system situational awareness, but represents a growing cybersecurity vulnerability. Malicious adversaries may seek to compromise one or more PMUs in order t...
详细信息
ISBN:
(纸本)9781728104072
The wide area monitoring system (WAMS) is critical for power system situational awareness, but represents a growing cybersecurity vulnerability. Malicious adversaries may seek to compromise one or more PMUs in order to effect control decisions that unnecessarily disrupt typical grid operations. One example of a particularly pernicious attack vector is the spoofing or replaying of a fault event using one or more compromised PMUs. This work documents the development and validation of a coherency-based cyberattack detection algorithm that integrates a sliding-window singular value decomposition (SVD) with physics-based partitioning analysis to achieve accurate classification of events. Special consideration is given to discerning a sophisticated fault-replay or fault spoofing attack from actual faults. A software-based cybersecurity testbed has been developed for rigorous testing of the algorithm. The algorithm is further validated using simulated synchrophasor datasets obtained from a MinniWECC 63-bus test system. Results show that the algorithm can successfully detect faultreplay attacks even when over half of the PMUs are compromised.
Without zero-crossings, dc series arc faults result in much more serious safety threats. As the dc voltage level rises and the system capacity increases, series arc faults appear in dc systems more frequently. To elim...
详细信息
ISBN:
(纸本)9781728136844
Without zero-crossings, dc series arc faults result in much more serious safety threats. As the dc voltage level rises and the system capacity increases, series arc faults appear in dc systems more frequently. To eliminate their damages, specific arc fault circuit interrupters (AFCI) should be developed. In this paper, two kinds of dc systems are considered in the designed experimental setup. Firstly, a dc simulated source with the ac-dc-dc structure is connected to a resistor. This source could act as a constant voltage or photovoltaic (PV) source by operating in different U-I output modes. Then a real PV array outputting the nonlinear U-I output curve is also conducted as a comparison. Next, a simple detection algorithm is proposed based on the established time-domain detection variable. Finally, this series arc fault detection algorithm is implemented using a digital signal processing (DSP) chip. The performance of this hardware behaves satisfying under various system transitions and multiple arc fault conditions with diverse operation points and current
The detection algorithm of compensation current command signal is one of the key technologies of power quality regulator. The real time nature of the detection algorithm affects the effect of compensation. Conventiona...
详细信息
ISBN:
(纸本)9781538653739
The detection algorithm of compensation current command signal is one of the key technologies of power quality regulator. The real time nature of the detection algorithm affects the effect of compensation. Conventional i(p)-i(q) detection algorithm is commonly filtered by Butterworth filters. However, its inherent delay characteristics make the detection real-time poor. In order to improve the real-time of the detection algorithm, this paper proposes an i(p)-i(q) detection algorithm based on Kalman filter. First, Establish equations of state and measurement for the Kalman filter based on i(p)-i(q). Then, the Kalman filter algorithm is used to filter i(p)-i(q) to obtain DC component, inverting the DC component to obtain the three-phase fundamental current. Finally, the proposed algorithm is simulated by matlab and compared with the algorithm which using Butterworth filter. The results show that the proposed algorithm is better than the latter in real-time.
The working status of huge rotating mechanical equipment can be judged with the method of detection and processing its acoustics. It is analyzed that the variation of the sound reflected the variation of the material ...
详细信息
ISBN:
(纸本)9781467398596
The working status of huge rotating mechanical equipment can be judged with the method of detection and processing its acoustics. It is analyzed that the variation of the sound reflected the variation of the material percentage in the equipment. The sound caused by different material percentage is collected and analyzed in time and frequency domain in this paper. A practical material percentage detection algorithm is proposed. The frequency spectrum of quantitative analysis for the material percentage is determined. The procedure of algorithm design includes calibration and quantitative detection. The field detection results show its effectiveness.
Pavement crack detection plays a vital part in highway maintenance and management. It is difficult to detect cracks effectively and accurately through ideal detecting algorithm. This paper improves the pavement crack ...
详细信息
ISBN:
(纸本)9781509007684
Pavement crack detection plays a vital part in highway maintenance and management. It is difficult to detect cracks effectively and accurately through ideal detecting algorithm. This paper improves the pavement crack image processing algorithm from the angle of grey level transformation, median filter and image intensification according to the characteristics of the pavement crack image. Based on defect image segmentation and image edge detection, results show that the proposed detection method can effectively remove the isolated noise point, smooth the edge and improve the segmentation accuracy.
Hardware trojan detection is paid more and more attention in recent years due to the great potential threat imposed by hardware trojan to the whole integrated circuit industry. In this paper, ring oscillator network b...
详细信息
ISBN:
(纸本)9781467386609
Hardware trojan detection is paid more and more attention in recent years due to the great potential threat imposed by hardware trojan to the whole integrated circuit industry. In this paper, ring oscillator network based hardware trojan detection method is tactfully implemented in FPGA and a novel corresponding detection algorithm is proposed. Incremental compilation technique is applied to design ring oscillator network and to insert trojans in FPGA. The method is verified effective for both sequential and combinational trojans. The trojans can be found with up to 20 to 200 times of detecting measurement based on their active status. Particularly, besides dynamic power consumption, extra static power consumed by trojan circuits are also used to differentiate trojan-free and trojan-inserted circuits.
In order to improve the accuracy of coal gangue detection, this paper proposes to use yolov4 algorithm to detect coal gangue. Through the training and detection experiments of coal gangue data set, it is found that th...
详细信息
ISBN:
(数字)9781510651319
ISBN:
(纸本)9781510651319;9781510651302
In order to improve the accuracy of coal gangue detection, this paper proposes to use yolov4 algorithm to detect coal gangue. Through the training and detection experiments of coal gangue data set, it is found that the optimized yolov4 detection algorithm can accurately detect small coal gangue, high-carbon coal gangue, partially masked coal gangue and masked high-carbon coal gangue in different backgrounds, and has considerable real-time, which verifies the feasibility of yolov4 detection of coal gangue.
With the rapid development and popularization of mobile Internet in recent years, security issues have become increasingly prominent. Based on the mobile Internet, this paper studies the security issues caused by abno...
详细信息
ISBN:
(纸本)9781665426428
With the rapid development and popularization of mobile Internet in recent years, security issues have become increasingly prominent. Based on the mobile Internet, this paper studies the security issues caused by abnormal users for users, mobile devices, and social network service platforms. Aiming at the needs of users for detecting abnormal network behaviors in a real-time network environment, this paper designs and implements a data-based Layered network abnormal behavior detection system. The system is divided into a data acquisition module, a data conversion module, a rule editing module, an anomaly detection module, and a detection result visualization module.
暂无评论