Abstract: The early-stage damage detection in offshore
structures requires continuous structural health monitoring and for the
large area the position of sensors will also plays an important role in
the efficient damage detection. Determining the dynamic behavior of
offshore structures requires dense deployment of sensors. The wired
Structural Health Monitoring (SHM) systems are highly expensive
and always needs larger installation space to deploy. Wireless sensor
networks can enhance the SHM system by deployment of scalable
sensor network, which consumes lesser space. This paper presents the
results of wireless sensor network based Structural Health Monitoring
method applied to a scaled experimental model of offshore structure
that underwent wave loading. This method determines the
serviceability of the offshore structure which is subjected to various
environment loads. Wired and wireless sensors were installed in the
model and the response of the scaled BLSRP model under wave
loading was recorded. The wireless system discussed in this study is
the Raspberry pi board with Arm V6 processor which is programmed
to transmit the data acquired by the sensor to the server using Wi-Fi
adapter, the data is then hosted in the webpage. The data acquired
from the wireless and wired SHM systems were compared and the
design of the wireless system is verified.
Abstract: In this paper, approach to incoherent signal detection
in multi-element antenna array are researched and modeled. Two
types of useful signals with unknown wavefront were considered:
first one, deterministic (Barker code), and second one, random
(Gaussian distribution). The derivation of the sufficient statistics took
into account the linearity of the antenna array. The performance
characteristics and detecting curves are modeled and compared for
different useful signals parameters and for different number of
elements of the antenna array. Results of researches in case of some
additional conditions can be applied to a digital communications
systems.
Abstract: This paper integrates Octagon and Square Search
pattern (OCTSS) motion estimation algorithm into H.264/AVC
(Advanced Video Coding) video codec in Adaptive Group of Pictures
(AGOP) mode. AGOP structure is computed based on scene change
in the video sequence. Octagon and square search pattern block-based
motion estimation method is implemented in inter-prediction process
of H.264/AVC. Both these methods reduce bit rate and computational
complexity while maintaining the quality of the video sequence
respectively. Experiments are conducted for different types of video
sequence. The results substantially proved that the bit rate,
computation time and PSNR gain achieved by the proposed method
is better than the existing H.264/AVC with fixed GOP and AGOP.
With a marginal gain in quality of 0.28dB and average gain in bitrate
of 132.87kbps, the proposed method reduces the average computation
time by 27.31 minutes when compared to the existing state-of-art
H.264/AVC video codec.
Abstract: One of the tasks of optical surveillance is to detect
anomalies in large amounts of image data. However, if the size of the
anomaly is very small, limited information is available to distinguish
it from the surrounding environment. Spectral detection provides a
useful source of additional information and may help to detect
anomalies with a size of a few pixels or less. Unfortunately, spectral
cameras are expensive because of the difficulty of separating two
spatial in addition to one spectral dimension. We investigate the
possibility of modifying a simple spectral line detector for outdoor
detection. This may be especially useful if the area of interest forms a
line, such as the horizon. We use a monochrome CCD that also
enables detection into the near infrared. A simple camera is attached
to the setup to determine which part of the environment is spectrally
imaged. Our preliminary results indicate that sensitive detection of
very small targets is indeed possible. Spectra could be taken from the
various targets by averaging columns in the line image. By imaging a
set of lines of various widths we found narrow lines that could not be
seen in the color image but remained visible in the spectral line
image. A simultaneous analysis of the entire spectra can produce
better results than visual inspection of the line spectral image. We are
presently developing calibration targets for spatial and spectral
focusing and alignment with the spatial camera. This will present
improved results and more use in outdoor application.
Abstract: In this paper a novel color image compression
technique for efficient storage and delivery of data is proposed. The
proposed compression technique started by RGB to YCbCr color
transformation process. Secondly, the canny edge detection method is
used to classify the blocks into the edge and non-edge blocks. Each
color component Y, Cb, and Cr compressed by discrete cosine
transform (DCT) process, quantizing and coding step by step using
adaptive arithmetic coding. Our technique is concerned with the
compression ratio, bits per pixel and peak signal to noise ratio, and
produce better results than JPEG and more recent published schemes
(like CBDCT-CABS and MHC). The provided experimental results
illustrate the proposed technique that is efficient and feasible in terms
of compression ratio, bits per pixel and peak signal to noise ratio.
Abstract: This paper presents a new automatic vehicle detection
method from very high resolution aerial images to measure traffic
density. The proposed method starts by extracting road regions from
image using road vector data. Then, the road image is divided into
equal sections considering resolution of the images. Gradient vectors
of the road image are computed from edge map of the corresponding
image. Gradient vectors on the each boundary of the sections are
divided where the gradient vectors significantly change their
directions. Finally, number of vehicles in each section is carried out
by calculating the standard deviation of the gradient vectors in each
group and accepting the group as vehicle that has standard deviation
above predefined threshold value. The proposed method was tested in
four very high resolution aerial images acquired from Istanbul,
Turkey which illustrate roads and vehicles with diverse
characteristics. The results show the reliability of the proposed
method in detecting vehicles by producing 86% overall F1 accuracy
value.
Abstract: Driver fatigue is an important factor in the increasing
number of road accidents. Dynamic template matching method was
proposed to address the problem of real-time driver fatigue detection
system based on eye-tracking. An effective vision based approach
was used to analyze the driver’s eye state to detect fatigue. The driver
fatigue system consists of Face detection, Eye detection, Eye
tracking, and Fatigue detection. Initially frames are captured from a
color video in a car dashboard and transformed from RGB into YCbCr
color space to detect the driver’s face. Canny edge operator was used
to estimating the eye region and the locations of eyes are extracted.
The extracted eyes were considered as a template matching for eye
tracking. Edge Map Overlapping (EMO) and Edge Pixel Count
(EPC) matching function were used for eye tracking which is used to
improve the matching accuracy. The pixel of eyeball was tracked
from the eye regions which are used to determine the fatigue state of
the driver.
Abstract: Thousands of organisations store important and
confidential information related to them, their customers, and their
business partners in databases all across the world. The stored data
ranges from less sensitive (e.g. first name, last name, date of birth) to
more sensitive data (e.g. password, pin code, and credit card
information). Losing data, disclosing confidential information or
even changing the value of data are the severe damages that
Structured Query Language injection (SQLi) attack can cause on a
given database. It is a code injection technique where malicious SQL
statements are inserted into a given SQL database by simply using a
web browser. In this paper, we propose an effective pattern
recognition neural network model for detection and classification of
SQLi attacks. The proposed model is built from three main elements
of: a Uniform Resource Locator (URL) generator in order to generate
thousands of malicious and benign URLs, a URL classifier in order
to: 1) classify each generated URL to either a benign URL or a
malicious URL and 2) classify the malicious URLs into different
SQLi attack categories, and a NN model in order to: 1) detect either a
given URL is a malicious URL or a benign URL and 2) identify the
type of SQLi attack for each malicious URL. The model is first
trained and then evaluated by employing thousands of benign and
malicious URLs. The results of the experiments are presented in
order to demonstrate the effectiveness of the proposed approach.
Abstract: A simple adaptive voice activity detector (VAD) is
implemented using Gabor and gammatone atomic decomposition of
speech for high Gaussian noise environments. Matching pursuit is
used for atomic decomposition, and is shown to achieve optimal
speech detection capability at high data compression rates for low
signal to noise ratios. The most active dictionary elements found by
matching pursuit are used for the signal reconstruction so that the
algorithm adapts to the individual speakers dominant time-frequency
characteristics. Speech has a high peak to average ratio enabling
matching pursuit greedy heuristic of highest inner products to isolate
high energy speech components in high noise environments. Gabor
and gammatone atoms are both investigated with identical
logarithmically spaced center frequencies, and similar bandwidths.
The algorithm performs equally well for both Gabor and gammatone
atoms with no significant statistical differences. The algorithm
achieves 70% accuracy at a 0 dB SNR, 90% accuracy at a 5 dB SNR
and 98% accuracy at a 20dB SNR using 30d B SNR as a reference
for voice activity.
Abstract: In order to avoid self-collision of space manipulators
during operation process, a real-time detection method is proposed in
this paper. The manipulator is fitted into a cylinder-enveloping
surface, and then, a kind of detection algorithm of collision between
cylinders is analyzed. The collision model of space manipulator
self-links can be detected by using this algorithm in real-time detection
during the operation process. To ensure security of the operation, a
safety threshold is designed. The simulation and experiment results
verify the effectiveness of the proposed algorithm for a 7-DOF space
manipulator.
Abstract: The edges of low contrast images are not clearly
distinguishable to human eye. It is difficult to find the edges and
boundaries in it. The present work encompasses a new approach for
low contrast images. The Chebyshev polynomial based fractional
order filter has been used for filtering operation on an image. The
preprocessing has been performed by this filter on the input image.
Laplacian of Gaussian method has been applied on preprocessed
image for edge detection. The algorithm has been tested on two test
images.
Abstract: A Distributed Denial of Service (DDoS) attack is a
major threat to cyber security. It originates from the network layer or
the application layer of compromised/attacker systems which are
connected to the network. The impact of this attack ranges from the
simple inconvenience to use a particular service to causing major
failures at the targeted server. When there is heavy traffic flow to a
target server, it is necessary to classify the legitimate access and
attacks. In this paper, a novel method is proposed to detect DDoS
attacks from the traces of traffic flow. An access matrix is created
from the traces. As the access matrix is multi dimensional, Principle
Component Analysis (PCA) is used to reduce the attributes used for
detection. Two classifiers Naive Bayes and K-Nearest neighborhood
are used to classify the traffic as normal or abnormal. The
performance of the classifier with PCA selected attributes and actual
attributes of access matrix is compared by the detection rate and
False Positive Rate (FPR).
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.
Abstract: Artificial Immune Systems (AIS), inspired by the
human immune system, are algorithms and mechanisms which are
self-adaptive and self-learning classifiers capable of recognizing and
classifying by learning, long-term memory and association. Unlike
other human system inspired techniques like genetic algorithms and
neural networks, AIS includes a range of algorithms modeling on
different immune mechanism of the body. In this paper, a mechanism
of a human immune system based on apoptosis is adopted to build an
Intrusion Detection System (IDS) to protect computer networks.
Features are selected from network traffic using Fisher Score. Based
on the selected features, the record/connection is classified as either
an attack or normal traffic by the proposed methodology. Simulation
results demonstrates that the proposed AIS based on apoptosis
performs better than existing AIS for intrusion detection.
Abstract: Multispectral screening systems are becoming more
popular because of their very interesting properties and applications.
One of the most significant applications of multispectral screening
systems is prevention of terrorist attacks. There are many kinds of
threats and many methods of detection. Visual detection of objects
hidden under clothing of a person is one of the most challenging
problems of threats detection. There are various solutions of the
problem; however, the most effective utilize multispectral
surveillance imagers. The development of imaging devices and
exploration of new spectral bands is a chance to introduce new
equipment for assuring public safety. We investigate the possibility
of long lasting detection of potentially dangerous objects covered
with various types of clothing. In the article we present the results of
comparative studies of passive imaging in three spectrums – visible,
infrared and terahertz.
Abstract: This paper presents general results on the Java source
code snippet detection problem. We propose the tool which uses
graph and subgraph isomorphism detection. A number of solutions
for all of these tasks have been proposed in the literature. However,
although that all these solutions are really fast, they compare just the
constant static trees. Our solution offers to enter an input sample
dynamically with the Scripthon language while preserving an
acceptable speed. We used several optimizations to achieve very low
number of comparisons during the matching algorithm.
Abstract: The measured data obtained from sensors in
continuous monitoring of civil structures are mainly used for modal
identification and damage detection. Therefore, when modal
identification analysis is carried out the quality in the identification of
the modes will highly influence the damage detection results. It is
also widely recognized that the usefulness of the measured data used
for modal identification and damage detection is significantly
influenced by the number and locations of sensors. The objective of
this study is the numerical implementation of two widely known
optimum sensor placement methods in beam-like structures.
Abstract: FMEA has been used for several years and proved its efficiency for system’s risk analysis due to failures. Risk priority number found in FMEA is used to rank failure modes that may occur in a system. There are some guidelines in the literature to assign the values of FMEA components known as Severity, Occurrence and Detection. This paper propose a method to assign the value for occurrence in more realistic manner representing the state of the system under study rather than depending totally on the experience of the analyst. This method uses the hazard function of a system to determine the value of occurrence depending on the behavior of the hazard being constant, increasing or decreasing.
Abstract: Object detection using Wavelet Neural Network (WNN) plays a major contribution in the analysis of image processing. Existing cluster-based algorithm for co-saliency object detection performs the work on the multiple images. The co-saliency detection results are not desirable to handle the multi scale image objects in WNN. Existing Super Resolution (SR) scheme for landmark images identifies the corresponding regions in the images and reduces the mismatching rate. But the Structure-aware matching criterion is not paying attention to detect multiple regions in SR images and fail to enhance the result percentage of object detection. To detect the objects in the high-resolution remote sensing images, Tagged Grid Matching (TGM) technique is proposed in this paper. TGM technique consists of the three main components such as object determination, object searching and object verification in WNN. Initially, object determination in TGM technique specifies the position and size of objects in the current image. The specification of the position and size using the hierarchical grid easily determines the multiple objects. Second component, object searching in TGM technique is carried out using the cross-point searching. The cross out searching point of the objects is selected to faster the searching process and reduces the detection time. Final component performs the object verification process in TGM technique for identifying (i.e.,) detecting the dissimilarity of objects in the current frame. The verification process matches the search result grid points with the stored grid points to easily detect the objects using the Gabor wavelet Transform. The implementation of TGM technique offers a significant improvement on the multi-object detection rate, processing time, precision factor and detection accuracy level.
Abstract: In communication systems, frequency jump is a serious problem caused by the oscillators used. Kalman filters are used to detect that jump, despite the tradeoff between the noise level and the speed of the detection. In this paper, an improvement is introduced in the Kalman filter, through a nonlinear change in the bandwidth of the filter. Simulation results show a considerable improvement in the filter speed with a very low noise level. Additionally, the effect on the response to false alarms is also presented and false alarm rate show improvement.