Search results for "DETECT"

showing 10 items of 5902 documents

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

UAV-based hyperspectral monitoring of small freshwater area

2014

Recent development in compact, lightweight hyperspectral imagers have enabled UAV-based remote sensing with reasonable costs. We used small hyperspectral imager based on Fabry-Perot interferometer for monitoring small freshwater area in southern Finland. In this study we shortly describe the utilized technology and the field studies performed. We explain processing pipeline for gathered spectral data and introduce target detection-based algorithm for estimating levels of algae, aquatic chlorophyll and turbidity in freshwater. Certain challenges we faced are pointed out.

ta113hyperspectral imaginguavtarget detectionta1171Hyperspectral imagingPipeline (software)InterferometryGeographyRemote sensing (archaeology)Fabry-Perot interferometerSpectral datafreshwaterta218Remote sensing
researchProduct

Revealing Fake Profiles in Social Networks by Longitudinal Data Analysis

2017

ta113longitudinal dataidentiteettiväärennöksetsocial network analysisComputer scienceLongitudinal dataverkkoprofiilitsosiaalinen mediaData scienceanomaly detectiongraph miningväärennöksetidentiteettisuspicious behaviour
researchProduct

Using VIS/NIR and IR spectral cameras for detecting and separating crime scene details

2012

Detecting invisible details and separating mixed evidence is critical for forensic inspection. If this can be done reliably and fast at the crime scene, irrelevant objects do not require further examination at the laboratory. This will speed up the inspection process and release resources for other critical tasks. This article reports on tests which have been carried out at the University of Jyväskylä in Finland together with the Central Finland Police Department and the National Bureau of Investigation for detecting and separating forensic details with hyperspectral technology. In the tests evidence was sought after at an assumed violent burglary scene with the use of VTT's 500-900 nm wave…

ta113medicine.medical_specialtySDG 16 - PeaceComputer scienceGunshot residueSDG 16 - Peace Justice and Strong InstitutionsdetectionHyperspectral imagingPolice departmentspectral imagingFingerprint recognition/dk/atira/pure/sustainabledevelopmentgoals/peace_justice_and_strong_institutionslatent fingerprintsJustice and Strong InstitutionsVNIRSpectral imagingmedicineCrime sceneDried bloodforensic investigationseparation of bloodRemote sensingCrime scene
researchProduct

Modelling Recurrent Events for Improving Online Change Detection

2016

The task of online change point detection in sensor data streams is often complicated due to presence of noise that can be mistaken for real changes and therefore affecting performance of change detectors. Most of the existing change detection methods assume that changes are independent from each other and occur at random in time. In this paper we study how performance of detectors can be improved in case of recurrent changes. We analytically demonstrate under which conditions and for how long recurrence information is useful for improving the detection accuracy. We propose a simple computationally efficient message passing procedure for calculating a predictive probability distribution of …

ta113noiseComputer scienceData stream miningMessage passingDetectordata streamsonline change detection02 engineering and technologycomputer.software_genreTask (computing)recurrent eventschange points020204 information systems0202 electrical engineering electronic engineering information engineeringProbability distribution020201 artificial intelligence & image processingNoise (video)Data miningBaseline (configuration management)computerChange detectionProceedings of the 2016 SIAM International Conference on Data Mining
researchProduct

Methods for estimating forest stem volumes by tree species using digital surface model and CIR images taken from light UAS

2012

In this paper we consider methods for estimating forest tree stem volumes by species using images taken from light unmanned aircraft systems (UAS). Instead of using LiDAR and additional multiband imagery a color infrared camera mounted to a light UAS is used to acquire both imagery and the DSM of target area. The goal of this study is to accurately estimate tree stem volumes in three classes. The status of the ongoing work is described and an initial method for delineating and classifying treetops is presented.

ta113precision agriculturebusiness.industryComputer scienceUAVtarget detectionPiezo actuatorsmedical imagingairborneFabry-Perot Interferometerimaging spectrometerTree (data structure)Hyperspectral sensorsLidarRemote sensing (archaeology)Computer visionArtificial intelligencemultispectral image sensorsDigital surfacebusinessTree speciesRemote sensingProceedings of SPIE
researchProduct

An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction

2014

Network traffic is increasing all the time and network services are becoming more complex and vulnerable. To protect these networks, intrusion detection systems are used. Signature-based intrusion detection cannot find previously unknown attacks, which is why anomaly detection is needed. However, many new systems are slow and complicated. We propose a log anomaly detection framework which aims to facilitate quick anomaly detection and also provide visualizations of the network traffic structure. The system preprocesses network logs into a numerical data matrix, reduces the dimensionality of this matrix using random projection and uses Mahalanobis distance to find outliers and calculate an a…

ta113random projectionMahalanobis distanceComputer sciencebusiness.industryAnomaly-based intrusion detection systemintrusion detectionDimensionality reductionRandom projectionPattern recognitionIntrusion detection systemcomputer.software_genrekoneoppiminenAnomaly detectionData miningArtificial intelligencetiedonlouhintaAnomaly (physics)mahalanobis distancebusinesscomputerCurse of dimensionality2014 6th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

High yield neutron generator based on a high-current gasdynamic electron cyclotron resonance ion source

2015

In present paper, an approach for high yield compact D-D neutron generator based on a high current gasdynamic electron cyclotron resonance ion source is suggested. Results on dense pulsed deuteron beam production with current up to 500 mA and current density up to 750 mA/cm2 are demonstrated. Neutron yield from D2O and TiD2 targets was measured in case of its bombardment by pulsed 300 mA Dþ beam with 45 keV energy. Neutron yield density at target surface of 109 s 1 cm2 was detected with a system of two 3 He proportional counters. Estimations based on obtained experimental results show that neutron yield from a high quality TiD2 target bombarded by Dþ beam demonstrated in present work accele…

ta114ChemistryAstrophysics::High Energy Astrophysical PhenomenaNuclear TheoryGeneral Physics and AstronomyNeutron scatteringelectron cyclotron resonance ion sourceNeutron temperatureNuclear physicsNeutron captureneutron generatorsneutron yieldNeutron generatorNeutron cross sectionNeutron detectionNeutron sourceNeutronNuclear ExperimentJournal of Applied Physics
researchProduct

The hyperspectral and smartphone technology in CBRNE countermeasures and defence

2016

Caused by industrial and military use as well as other sources of chemical, biological, radiological, nuclear and high-yield explosive (CBRNE) materials, the global threat of weapons of mass destruction (WMDs) remains in spite of such weapons being internationally prohibited. With these materials, industrial and transportation accidents are likely in all countries and can also be triggered by natural disasters, such as in Fukushima in 2011. In addition, governments cannot fully control the manufacturing and usage of WMDs, as extreme terrorists have access to as well as the knowledge and motivation to use such materials. Due to multiple large-scale risks, the countering of CBRNE threats requ…

tekninen rikostutkintaemergency alertinghälytysjärjestelmätspektrikuvaussuuronnettomuudetmiehittämättömät ilma-alukseträjähdysaineethälytyksetkriisiviestintäälypuhelimetpublic warningCBRNE defencehyperspectral technologyvaaralliset aineetjoint operationCBRNE countermeasuresCBRNE detectioncrisis managementsmartphone technologyturvallisuustekniikkakemialliset aseetmyrkylliset aineetkriisinhallinta
researchProduct

CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications

2022

The increased, widespread, unwarranted, and unaccountable use of Closed-Circuit TeleVision (CCTV) cameras globally has raised concerns about privacy risks for the last several decades. Recent technological advances implemented in CCTV cameras, such as Artificial Intelligence (AI)-based facial recognition and Internet of Things (IoT) connectivity, fuel further concerns among privacy advocates. Machine learning and computer vision automated solutions may prove necessary and efficient to assist CCTV forensics of various types. In this paper, we introduce and release the first and only computer vision models are compatible with Microsoft common object in context (MS COCO) and capable of accurately…

tekninen rikostutkintasovellukset (soveltaminen)datasetsobject detectiontekoälyprivacykameratcomputer visiontietosuojamachine learningkoneoppiminencamerasyksityisyyskameravalvontavideo surveillancekonenäköCCTVmappingkasvontunnistus (tietotekniikka)2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
researchProduct