Abstract: For lack of the visualization of the ultrasonic detection
method of partial discharge (PD), the ultrasonic detection technology
combined with the X-ray visual detection method (UXV) is proposed.
The method can conduct qualitative analysis accurately and conduct
reliable positioning diagnosis to the internal insulation defects of
GIS, and while it could make up the blindness of the X-ray visual
detection method and improve the detection rate. In this paper, an
experimental model of GIS is used as the trial platform, a variety of
insulation defects are set inside the GIS cavity. With the proposed
method, the ultrasonic method is used to conduct the preliminary
detection, and then the X-ray visual detection is used to locate and
diagnose precisely. Therefore, the proposed UXV technology is
feasible and practical.
Abstract: With a surge of stream processing applications novel
techniques are required for generation and analysis of association
rules in streams. The traditional rule mining solutions cannot handle
streams because they generally require multiple passes over the data
and do not guarantee the results in a predictable, small time. Though
researchers have been proposing algorithms for generation of rules
from streams, there has not been much focus on their analysis.
We propose Association rule profiling, a user centric process for
analyzing association rules and attaching suitable profiles to them
depending on their changing frequency behavior over a previous
snapshot of time in a data stream.
Association rule profiles provide insights into the changing nature
of associations and can be used to characterize the associations. We
discuss importance of characteristics such as predictability of
linkages present in the data and propose metric to quantify it. We
also show how association rule profiles can aid in generation of user
specific, more understandable and actionable rules.
The framework is implemented as SUPAR: System for Usercentric
Profiling of Association Rules in streaming data. The
proposed system offers following capabilities:
i) Continuous monitoring of frequency of streaming item-sets
and detection of significant changes therein for association rule
profiling.
ii) Computation of metrics for quantifying predictability of
associations present in the data.
iii) User-centric control of the characterization process: user
can control the framework through a) constraint specification and b)
non-interesting rule elimination.
Abstract: One main drawback of intrusion detection system is the
inability of detecting new attacks which do not have known
signatures. In this paper we discuss an intrusion detection method
that proposes independent component analysis (ICA) based feature
selection heuristics and using rough fuzzy for clustering data. ICA is
to separate these independent components (ICs) from the monitored
variables. Rough set has to decrease the amount of data and get rid of
redundancy and Fuzzy methods allow objects to belong to several
clusters simultaneously, with different degrees of membership. Our
approach allows us to recognize not only known attacks but also to
detect activity that may be the result of a new, unknown attack. The
experimental results on Knowledge Discovery and Data Mining-
(KDDCup 1999) dataset.
Abstract: Design and implementation of a novel B-ACOSD CFAR algorithm is presented in this paper. It is proposed for detecting radar target in log-normal distribution environment. The BACOSD detector is capable to detect automatically the number interference target in the reference cells and detect the real target by an adaptive threshold. The detector is implemented as a System on Chip on FPGA Altera Stratix II using parallelism and pipelining technique. For a reference window of length 16 cells, the experimental results showed that the processor works properly with a processing speed up to 115.13MHz and processing time0.29 ┬Ás, thus meets real-time requirement for a typical radar system.
Abstract: In non destructive testing by radiography, a perfect
knowledge of the weld defect shape is an essential step to
appreciate the quality of the weld and make decision on its
acceptability or rejection. Because of the complex nature of the
considered images, and in order that the detected defect region
represents the most accurately possible the real defect, the choice
of thresholding methods must be done judiciously. In this paper,
performance criteria are used to conduct a comparative study of
four non parametric histogram thresholding methods for automatic
extraction of weld defect in radiographic images.
Abstract: In this paper we propose a novel method for human
face segmentation using the elliptical structure of the human head. It
makes use of the information present in the edge map of the image.
In this approach we use the fact that the eigenvalues of covariance
matrix represent the elliptical structure. The large and small
eigenvalues of covariance matrix are associated with major and
minor axial lengths of an ellipse. The other elliptical parameters are
used to identify the centre and orientation of the face. Since an
Elliptical Hough Transform requires 5D Hough Space, the Circular
Hough Transform (CHT) is used to evaluate the elliptical parameters.
Sparse matrix technique is used to perform CHT, as it squeeze zero
elements, and have only a small number of non-zero elements,
thereby having an advantage of less storage space and computational
time. Neighborhood suppression scheme is used to identify the valid
Hough peaks. The accurate position of the circumference pixels for
occluded and distorted ellipses is identified using Bresenham-s
Raster Scan Algorithm which uses the geometrical symmetry
properties. This method does not require the evaluation of tangents
for curvature contours, which are very sensitive to noise. The method
has been evaluated on several images with different face orientations.
Abstract: It is well known that metallic particles reduce the
reliability of Gas-Insulated Substation (GIS) equipments by initiating
partial discharge (PDs) that can lead to breakdown and complete
failure of GIS. This paper investigates the characteristics of PDs
caused by metallic particle adhering to the solid spacer. The PD
detection and measurement were carried out by using IEC 60270
method with particles of different sizes and at different positions on
the spacer surface. The results show that a particle of certain size at
certain position possesses a unique PD characteristic as compared to
those caused by particles of different sizes and/or at different
positions. Therefore PD characteristics may be useful for the particle
size and position identification.
Abstract: This paper presents an automated inspection algorithm
for a thick plate. Thick plates typically have various types of surface
defects, such as scabs, scratches, and roller marks. These defects have
individual characteristics including brightness and shape. Therefore, it
is not simple to detect all the defects. In order to solve these problems
and to detect defects more effectively, we propose a dual light
switching lighting method and a defect detection algorithm based on
Gabor filters.
Abstract: Detection and classification of power quality (PQ)
disturbances is an important consideration to electrical utilities and
many industrial customers so that diagnosis and mitigation of such
disturbance can be implemented quickly. S-transform algorithm and
continuous wavelet transforms (CWT) are time-frequency
algorithms, and both of them are powerful in detection and
classification of PQ disturbances. This paper presents detection and
classification of PQ disturbances using S-transform and CWT
algorithms. The results of detection and classification, provides that
S-transform is more accurate in detection and classification for most
PQ disturbance than CWT algorithm, where as CWT algorithm more
powerful in detection in some disturbances like notching
Abstract: The aim of the current work is to present a comparison among three popular optimization methods in the inverse elastostatics problem (IESP) of flaw detection within a solid. In more details, the performance of a simulated annealing, a Hooke & Jeeves and a sequential quadratic programming algorithm was studied in the test case of one circular flaw in a plate solved by both the boundary element (BEM) and the finite element method (FEM). The proposed optimization methods use a cost function that utilizes the displacements of the static response. The methods were ranked according to the required number of iterations to converge and to their ability to locate the global optimum. Hence, a clear impression regarding the performance of the aforementioned algorithms in flaw identification problems was obtained. Furthermore, the coupling of BEM or FEM with these optimization methods was investigated in order to track differences in their performance.
Abstract: This paper presents a distributed intrusion
detection system IDS, based on the concept of specialized
distributed agents community representing agents with the
same purpose for detecting distributed attacks. The semantic of
intrusion events occurring in a predetermined network has been
defined. The correlation rules referring the process which our
proposed IDS combines the captured events that is distributed
both spatially and temporally. And then the proposed IDS tries
to extract significant and broad patterns for set of well-known
attacks. The primary goal of our work is to provide intrusion
detection and real-time prevention capability against insider
attacks in distributed and fully automated environments.
Abstract: Ultrafast doped zinc oxide crystal promised us a good
opportunity to build new instruments for ICF fusion neutron
measurement. Two pulsed neutron detectors based on ZnO crystal
wafer have been conceptually designed, the superfast ZnO timing
detector and the scintillation recoil proton neutron detection system.
The structure of these detectors was presented, and some characters
were studied as well. The new detectors could be much faster than
existing systems, and would be more competent for ICF neutron
diagnostics.
Abstract: One of the biggest problems of SMEs is their tendencies to financial distress because of insufficient finance background. In this study, an Early Warning System (EWS) model based on data mining for financial risk detection is presented. CHAID algorithm has been used for development of the EWS. Developed EWS can be served like a tailor made financial advisor in decision making process of the firms with its automated nature to the ones who have inadequate financial background. Besides, an application of the model implemented which covered 7,853 SMEs based on Turkish Central Bank (TCB) 2007 data. By using EWS model, 31 risk profiles, 15 risk indicators, 2 early warning signals, and 4 financial road maps has been determined for financial risk mitigation.
Abstract: Spam mails are unwanted mails sent to large number
of users. Spam mails not only consume the network resources, but
cause security threats as well. This paper proposes an efficient
technique to detect, and to prevent spam mail in the sender side rather
than the receiver side. This technique is based on a counter set on the
sender server. When a mail is transmitted to the server, the mail server
checks the number of the recipients based on its counter policy. The
counter policy performed by the mail server is based on some
pre-defined criteria. When the number of recipients exceeds the
counter policy, the mail server discontinues the rest of the process, and
sends a failure mail to sender of the mail; otherwise the mail is
transmitted through the network. By using this technique, the usage of
network resources such as bandwidth, and memory is preserved. The
simulation results in real network show that when the counter is set on
the sender side, the time required for spam mail detection is 100 times
faster than the time the counter is set on the receiver side, and the
network resources are preserved largely compared with other
anti-spam mail techniques in the receiver side.
Abstract: IPsec has now become a standard information security
technology throughout the Internet society. It provides a well-defined
architecture that takes into account confidentiality, authentication,
integrity, secure key exchange and protection mechanism against
replay attack also. For the connectionless security services on packet
basis, IETF IPsec Working Group has standardized two extension
headers (AH&ESP), key exchange and authentication protocols. It is
also working on lightweight key exchange protocol and MIB's for
security management. IPsec technology has been implemented on
various platforms in IPv4 and IPv6, gradually replacing old
application-specific security mechanisms. IPv4 and IPv6 are not
directly compatible, so programs and systems designed to one
standard can not communicate with those designed to the other. We
propose the design and implementation of controlled Internet security
system, which is IPsec-based Internet information security system in
IPv4/IPv6 network and also we show the data of performance
measurement. With the features like improved scalability and
routing, security, ease-of-configuration, and higher performance of
IPv6, the controlled Internet security system provides consistent
security policy and integrated security management on IPsec-based
Internet security system.
Abstract: Phytophthora cinnamomi (P. c) is a plant pathogenic
oomycete that is capable of damaging plants in commercial production
systems and natural ecosystems worldwide. The most common
methods for the detection and diagnosis of P. c infection are
expensive, elaborate and time consuming. This study was carried out
to examine whether species specific and life cycle specific volatile
organic compounds (VOCs) can be absorbed by solid-phase
microextraction fibers and detected by gas chromatography that are
produced by P. c and another oomycete Pythium dissotocum. A
headspace solid-phase microextraction (HS-SPME) together with gas
chromatography (GC) method was developed and optimized for the
identification of the VOCs released by P. c. The optimized parameters
included type of fiber, exposure time, desorption temperature and
desorption time. Optimization was achieved with the analytes of P.
c+V8A and V8A alone. To perform the HS-SPME, six types of fiber
were assayed and compared: 7μm Polydimethylsiloxane (PDMS),
100μm Polydimethylsiloxane (PDMS), 50/30μm
Divinylbenzene/CarboxenTM/Polydimethylsiloxane
DVB/CAR/PDMS), 65μm Polydimethylsiloxane/Divinylbenzene
(PDMS/DVB), 85μm Polyacrylate (PA) fibre and 85μm CarboxenTM/
Polydimethylsiloxane (Carboxen™/PDMS). In a comparison of the
efficacy of the fibers, the bipolar fiber DVB/CAR/PDMS had a higher
extraction efficiency than the other fibers. An exposure time of 16h
with DVB/CAR/PDMS fiber in the sample headspace was enough to
reach the maximum extraction efficiency. A desorption time of 3min
in the GC injector with the desorption temperature of 250°C was
enough for the fiber to desorb the compounds of interest. The chromatograms and morphology study confirmed that the VOCs from
P. c+V8A had distinct differences from V8A alone, as did different
life cycle stages of P. c and different taxa such as Pythium dissotocum.
The study proved that P. c has species and life cycle specific VOCs,
which in turn demonstrated the feasibility of this method as means of
Abstract: We developed a multi-camera control system that a (one) cameraman can operate several cameras at a compact studio. we analyzed a workflow of a cameraman of some program shootings with two cameras and clarified their heavy tasks. The system based on a dynamic workflow which adapts a program progressing and recommends of cameraman. we perform the automation of multicamera controls by modeling of studio environment and perform automatic camera adjustment for suitable angle of view with face detection. Our experiment at a real program shooting showed that one cameraman can carry out the task of shooting sufficiently.
Abstract: P2P Networks are highly dynamic structures since
their nodes – peer users keep joining and leaving continuously. In the
paper, we study the effects of network change rates on query routing
efficiency. First we describe some background and an abstract system
model. The chosen routing technique makes use of cached metadata
from previous answer messages and also employs a mechanism for
broken path detection and metadata maintenance. Several metrics are
used to show that the protocol behaves quite well even with high rate
of node departures, but above a certain threshold it literally breaks
down and exhibits considerable efficiency degradation.
Abstract: Skin color can provide a useful and robust cue
for human-related image analysis, such as face detection,
pornographic image filtering, hand detection and tracking,
people retrieval in databases and Internet, etc. The major
problem of such kinds of skin color detection algorithms is
that it is time consuming and hence cannot be applied to a real
time system. To overcome this problem, we introduce a new
fast technique for skin detection which can be applied in a real
time system. In this technique, instead of testing each image
pixel to label it as skin or non-skin (as in classic techniques),
we skip a set of pixels. The reason of the skipping process is
the high probability that neighbors of the skin color pixels are
also skin pixels, especially in adult images and vise versa. The
proposed method can rapidly detect skin and non-skin color
pixels, which in turn dramatically reduce the CPU time
required for the protection process. Since many fast detection
techniques are based on image resizing, we apply our
proposed pixel skipping technique with image resizing to
obtain better results. The performance evaluation of the
proposed skipping and hybrid techniques in terms of the
measured CPU time is presented. Experimental results
demonstrate that the proposed methods achieve better result
than the relevant classic method.
Abstract: In this study, a novel approach of image embedding is introduced. The proposed method consists of three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six bits represent the original image with very little difference in contrast. The proposed method embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images. Image embedding method is considered to be one of the good compression methods, in terms of reserving memory space. Moreover, information hiding within digital image can be used for security information transfer. The creation and extraction of three embedded images, and hiding text information is discussed and illustrated, in the following sections.