Search results for "DETECT"
showing 10 items of 5902 documents
Cognitive self-healing system for future mobile networks
2015
This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…
UAV-based hyperspectral monitoring of small freshwater area
2014
Recent development in compact, lightweight hyperspectral imagers have enabled UAV-based remote sensing with reasonable costs. We used small hyperspectral imager based on Fabry-Perot interferometer for monitoring small freshwater area in southern Finland. In this study we shortly describe the utilized technology and the field studies performed. We explain processing pipeline for gathered spectral data and introduce target detection-based algorithm for estimating levels of algae, aquatic chlorophyll and turbidity in freshwater. Certain challenges we faced are pointed out.
Revealing Fake Profiles in Social Networks by Longitudinal Data Analysis
2017
Using VIS/NIR and IR spectral cameras for detecting and separating crime scene details
2012
Detecting invisible details and separating mixed evidence is critical for forensic inspection. If this can be done reliably and fast at the crime scene, irrelevant objects do not require further examination at the laboratory. This will speed up the inspection process and release resources for other critical tasks. This article reports on tests which have been carried out at the University of Jyväskylä in Finland together with the Central Finland Police Department and the National Bureau of Investigation for detecting and separating forensic details with hyperspectral technology. In the tests evidence was sought after at an assumed violent burglary scene with the use of VTT's 500-900 nm wave…
Modelling Recurrent Events for Improving Online Change Detection
2016
The task of online change point detection in sensor data streams is often complicated due to presence of noise that can be mistaken for real changes and therefore affecting performance of change detectors. Most of the existing change detection methods assume that changes are independent from each other and occur at random in time. In this paper we study how performance of detectors can be improved in case of recurrent changes. We analytically demonstrate under which conditions and for how long recurrence information is useful for improving the detection accuracy. We propose a simple computationally efficient message passing procedure for calculating a predictive probability distribution of …
Methods for estimating forest stem volumes by tree species using digital surface model and CIR images taken from light UAS
2012
In this paper we consider methods for estimating forest tree stem volumes by species using images taken from light unmanned aircraft systems (UAS). Instead of using LiDAR and additional multiband imagery a color infrared camera mounted to a light UAS is used to acquire both imagery and the DSM of target area. The goal of this study is to accurately estimate tree stem volumes in three classes. The status of the ongoing work is described and an initial method for delineating and classifying treetops is presented.
An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction
2014
Network traffic is increasing all the time and network services are becoming more complex and vulnerable. To protect these networks, intrusion detection systems are used. Signature-based intrusion detection cannot find previously unknown attacks, which is why anomaly detection is needed. However, many new systems are slow and complicated. We propose a log anomaly detection framework which aims to facilitate quick anomaly detection and also provide visualizations of the network traffic structure. The system preprocesses network logs into a numerical data matrix, reduces the dimensionality of this matrix using random projection and uses Mahalanobis distance to find outliers and calculate an a…
High yield neutron generator based on a high-current gasdynamic electron cyclotron resonance ion source
2015
In present paper, an approach for high yield compact D-D neutron generator based on a high current gasdynamic electron cyclotron resonance ion source is suggested. Results on dense pulsed deuteron beam production with current up to 500 mA and current density up to 750 mA/cm2 are demonstrated. Neutron yield from D2O and TiD2 targets was measured in case of its bombardment by pulsed 300 mA Dþ beam with 45 keV energy. Neutron yield density at target surface of 109 s 1 cm2 was detected with a system of two 3 He proportional counters. Estimations based on obtained experimental results show that neutron yield from a high quality TiD2 target bombarded by Dþ beam demonstrated in present work accele…
The hyperspectral and smartphone technology in CBRNE countermeasures and defence
2016
Caused by industrial and military use as well as other sources of chemical, biological, radiological, nuclear and high-yield explosive (CBRNE) materials, the global threat of weapons of mass destruction (WMDs) remains in spite of such weapons being internationally prohibited. With these materials, industrial and transportation accidents are likely in all countries and can also be triggered by natural disasters, such as in Fukushima in 2011. In addition, governments cannot fully control the manufacturing and usage of WMDs, as extreme terrorists have access to as well as the knowledge and motivation to use such materials. Due to multiple large-scale risks, the countering of CBRNE threats requ…
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications
2022
The increased, widespread, unwarranted, and unaccountable use of Closed-Circuit TeleVision (CCTV) cameras globally has raised concerns about privacy risks for the last several decades. Recent technological advances implemented in CCTV cameras, such as Artificial Intelligence (AI)-based facial recognition and Internet of Things (IoT) connectivity, fuel further concerns among privacy advocates. Machine learning and computer vision automated solutions may prove necessary and efficient to assist CCTV forensics of various types. In this paper, we introduce and release the first and only computer vision models are compatible with Microsoft common object in context (MS COCO) and capable of accurately…