Search results for "Detection"

showing 10 items of 2543 documents

Fault detection for nonlinear networked systems based on quantization and dropout compensation: An interval type-2 fuzzy-model method

2016

Abstract This paper investigates the problem of filter-based fault detection for a class of nonlinear networked systems subject to parameter uncertainties in the framework of the interval type-2 (IT2) T–S fuzzy model-based approach. The Bernoulli random distribution process and logarithm quantizer are used to describe the measurement loss and signals quantization, respectively. In the framework of the IT2 T–S fuzzy model, the parameter uncertainty is handled by the membership functions with lower and upper bounds. A novel IT2 fault detection filter is designed to guarantee the residual system to be stochastically stable and satisfy the predefined H ∞ performance. It should be mentioned that…

0209 industrial biotechnologyLogarithmCognitive NeuroscienceQuantization (signal processing)02 engineering and technologyFuzzy control systemResidualFuzzy logicFault detection and isolationComputer Science ApplicationsNonlinear system020901 industrial engineering & automationArtificial IntelligenceControl theory0202 electrical engineering electronic engineering information engineeringFuzzy number020201 artificial intelligence & image processingMathematicsNeurocomputing
researchProduct

Multi-band identification for enhancing bearing fault detection in variable speed conditions

2020

Abstract Rolling element bearings are crucial components in rotating machinery, and avoiding unexpected breakdowns using fault detection methods is an increased demand in industry today. Variable speed conditions render a challenge for vibration-based fault diagnosis due to the non-stationary impact frequency. Computed order tracking transforms the vibration signal from time domain to the shaft-angle domain, allowing order analysis with the envelope spectrum. To enhance fault detection, the bearing resonance frequency region is isolated in the raw signal prior to order tracking. Identification of this region is not trivial but may be estimated using kurtosis-based methods reported in the li…

0209 industrial biotechnologyNoise (signal processing)Computer scienceMechanical EngineeringAerospace EngineeringCondition monitoring02 engineering and technologyFault (power engineering)01 natural sciencesNoise floorFault detection and isolationComputer Science Applications020901 industrial engineering & automationControl and Systems Engineering0103 physical sciencesSignal ProcessingCepstrumTime domain010301 acousticsOrder trackingAlgorithmCivil and Structural EngineeringMechanical Systems and Signal Processing
researchProduct

Food tray sealing fault detection using hyperspectral imaging and PCANet

2020

Abstract Food trays are very common in shops and supermarkets. Fresh food packaged in trays must be correctly sealed to protect the internal atmosphere and avoid contamination or deterioration. Due to the speed of production, it is not possible to have human quality inspection. Thus, automatic fault detection is a must to reach high production volume. This work describes a deep neural network based on Principal Component Analysis Network (PCANet) for food tray sealing fault detection. The input data come from hyperspectral cameras, showing more characteristics than regular industrial cameras or the human eye as they capture the spectral properties for each pixel. The proposed classification…

0209 industrial biotechnologyPixelbusiness.industryComputer scienceFeature vectorIndústria agroalimentària020208 electrical & electronic engineeringHyperspectral imagingPattern recognition02 engineering and technologyAliments ConservacióFilter bankFault detection and isolationControl de qualitatSupport vector machine020901 industrial engineering & automationTrayControl and Systems EngineeringPrincipal component analysis0202 electrical engineering electronic engineering information engineeringArtificial intelligencebusiness
researchProduct

Scale invariant line matching on the sphere

2013

International audience; This paper proposes a novel approach of line matching across images captured by different types of cameras, from perspective to omnidirectional ones. Based on the spherical mapping, this method utilizes spherical SIFT point features to boost line matching and searches line correspondences using an affine invariant measure of similarity. It permits to unify the commonest cameras and to process heterogeneous images with the least distortion of visual information.

0209 industrial biotechnologySimilarity (geometry)[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processingmobile roboticComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-invariant feature transformTime to contactmobile robotic.02 engineering and technology[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingMeasure (mathematics)obstacle avoidance020901 industrial engineering & automation[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processingomnidirectional visionDistortion0202 electrical engineering electronic engineering information engineeringPoint (geometry)Computer visionCollision detectioncollision detectionMathematics[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processingbusiness.industryPerspective (graphical)Computer Science::Computer Vision and Pattern RecognitionLine (geometry)020201 artificial intelligence & image processingArtificial intelligencebusiness[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
researchProduct

Collision detection for 3D rigid body motion planning with narrow passages

2017

In sampling-based 3D rigid body motion planning one of the major subroutines is collision detection. Especially for problems with narrow passages many samples have to be checked by a collision detection algorithm. In this application, the runtime of the motion planning algorithm is dominated by collision detection and the samples have the very specific characteristic that many of them are in collision and have small penetration volumes. In our work, we introduce a data structure and an algorithm that makes use of this characteristic by combining well-known data structures like a distance field and an octree with the swap algorithm by Llanas et al. For 3D rigid body motion planning with narr…

0209 industrial biotechnologySpeedupbusiness.industryComputer science02 engineering and technologyRigid bodyCollisionOctree020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingCollision detectionComputer visionArtificial intelligenceMotion planningPhysics enginebusinessDistance transformAlgorithmComputingMethodologies_COMPUTERGRAPHICS2017 IEEE International Conference on Robotics and Automation (ICRA)
researchProduct

Gradient-based time to contact on paracatadioptric camera

2013

International audience; The problem of time to contact or time to collision (TTC) estimation is largely discussed in perspective images. However, a few works have dealt with images of catadioptric sensors despite of their utility in robotics applications. The objective of this paper is to develop a novel model for estimating TTC with catadioptric images relative to a planar surface, and to demonstrate that TTC can be estimated only with derivative brightness and image coordinates. This model, called "gradient based time to contact", does not need high processing such as explicit estimation of optical flow and feature detection/or tracking. The proposed method allows to estimate TTC and give…

0209 industrial biotechnology[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingComputer sciencemobile roboticComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical flowTime to contactmobile robotic.[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processing02 engineering and technologyobstacle avoidanceCatadioptric system020901 industrial engineering & automation[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processingomnidirectional visionObstacle avoidance0202 electrical engineering electronic engineering information engineeringcollision detectionCollision detectionComputer visionImage sensor[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processingFeature detection (computer vision)Orientation (computer vision)business.industryPerspective (graphical)Mobile robot020201 artificial intelligence & image processingArtificial intelligencebusiness[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing2013 IEEE International Conference on Image Processing
researchProduct

Tolerating malicious monitors in detecting misbehaving robots

2008

This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.

0209 industrial biotechnologybusiness.industryComputer scienceDistributed computing020206 networking & telecommunicationsContext (language use)security02 engineering and technologyMotion (physics)consensus algorithm020901 industrial engineering & automationSettore ING-INF/04 - AutomaticaWork (electrical)Embedded system0202 electrical engineering electronic engineering information engineeringRobotDistributed software architectureIntrusion detectionmulti-agent systemsSoftware architecturebusiness
researchProduct

Automatic Acoustic Target Detecting and Tracking on the Azimuth Recording Diagram with Image Processing Methods

2019

International audience; Passive acoustic target detection has been a hot research topic for a few decades. Azimuth recording diagram is one of the most promising techniques to estimate the arrival direction of the interested signal by visualizing the sound wave information. However, this method is challenged by the random ambient noise, resulting in low reliability and short effective distance. This paper presents a real-time postprocessing framework for passive acoustic target detection modalities by using a sonar array, in which image processing methods are used to automate the target detecting and tracking on the azimuth recording diagram. The simulation results demonstrate that the prop…

0209 industrial biotechnologytarget detectingComputer scienceprincipal component analysisAmbient noise levelImage processing02 engineering and technologypassive detectionTracking (particle physics)01 natural sciencesBiochemistrySonarSignaldirection of arrivalArticleAnalytical Chemistry[SPI]Engineering Sciences [physics]020901 industrial engineering & automation[CHIM]Chemical SciencesComputer visionElectrical and Electronic EngineeringInstrumentationSound wave0105 earth and related environmental sciencestemplate matching010505 oceanographybusiness.industryTemplate matchingDirection of arrivalAtomic and Molecular Physics and Opticsimage processing[SPI.TRON]Engineering Sciences [physics]/ElectronicsAzimuthArtificial intelligencebusinesstarget tracking
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

2017

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…

021110 strategic defence & security studiesbusiness.industryComputer scienceVisibility (geometry)0211 other engineering and technologiesBotnetCloud computingcloud environments02 engineering and technologycomputer.software_genrepilvipalvelutInformation sensitivityMode (computer interface)Virtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingState (computer science)co-residence detectiontietoturvavirtual networksbusinessVirtual networkcomputerComputer network
researchProduct