In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f...In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.展开更多
In cognitive radio networks(CoR),the performance of cooperative spectrum sensing is improved by reducing the overall error rate or maximizing the detection probability.Several optimization methods are usually used to ...In cognitive radio networks(CoR),the performance of cooperative spectrum sensing is improved by reducing the overall error rate or maximizing the detection probability.Several optimization methods are usually used to optimize the number of user-chosen for cooperation and the threshold selection.However,these methods do not take into account the effect of sample size and its effect on improving CoR performance.In general,a large sample size results in more reliable detection,but takes longer sensing time and increases complexity.Thus,the locally sensed sample size is an optimization problem.Therefore,optimizing the local sample size for each cognitive user helps to improve CoR performance.In this study,two new methods are proposed to find the optimum sample size to achieve objective-based improved(single/double)threshold energy detection,these methods are the optimum sample size N^(*)and neural networks(NN)optimization.Through the evaluation,it was found that the proposed methods outperform the traditional sample size selection in terms of the total error rate,detection probability,and throughput.展开更多
A model (Bayesian oceanic front detection, BOFD) of sea surface temperature (SST) front detection in satel- lite-derived SST images based on a threshold interval is presented, to be used in different applications ...A model (Bayesian oceanic front detection, BOFD) of sea surface temperature (SST) front detection in satel- lite-derived SST images based on a threshold interval is presented, to be used in different applications such as climatic and environmental studies or fisheries. The model first computes the SST gradient by using a Sobel algorithm template. On the basis of the gradient value, the threshold interval is determined by a gradi- ent cumulative histogram. According to this threshold interval, front candidates can be acquired and prior probability and likelihood can be calculated. Whether or not the candidates are front points can be deter- mined by using the Bayesian decision theory. The model is evaluated on the Advanced Very High-Resolution Radiometer images of part of the Kuroshio front region. Results are compared with those obtained by using several SST front detection methods proposed in the literature. This comparison shows that the BOFD not only suppresses noise and small-scale fronts, but also retains continuous fronts.展开更多
Since the atmospheric correction is a necessary preprocessing step of remote sensing image before detecting green tide, the introduced error directly affects the detection precision. Therefore, the detection method of...Since the atmospheric correction is a necessary preprocessing step of remote sensing image before detecting green tide, the introduced error directly affects the detection precision. Therefore, the detection method of green tide is presented from Landsat TM/ETM plus image which needs not the atmospheric correction. In order to achieve an automatic detection of green tide, a linear relationship(y =0.723 x+0.504) between detection threshold y and subtraction x(x=λnir–λred) is found from the comparing Landsat TM/ETM plus image with the field surveys.Using this relationship, green tide patches can be detected automatically from Landsat TM/ETM plus image.Considering there is brightness difference between different regions in an image, the image will be divided into a plurality of windows(sub-images) with a same size firstly, and then each window will be detected using an adaptive detection threshold determined according to the discovered linear relationship. It is found that big errors will appear in some windows, such as those covered by clouds seriously. To solve this problem, the moving step k of windows is proposed to be less than the window width n. Using this mechanism, most pixels will be detected[n/k]×[n/k] times except the boundary pixels, then every pixel will be assigned the final class(green tide or sea water) according to majority rule voting strategy. It can be seen from the experiments, the proposed detection method using multi-windows and their adaptive thresholds can detect green tide from Landsat TM/ETM plus image automatically. Meanwhile, it avoids the reliance on the accurate atmospheric correction.展开更多
In order to solve the problems of local maximum modulus extraction and threshold selection in the edge detection of finite resolution digital images, a new wavelet transform based adaptive dual threshold edge detec...In order to solve the problems of local maximum modulus extraction and threshold selection in the edge detection of finite resolution digital images, a new wavelet transform based adaptive dual threshold edge detection algorithm is proposed. The local maximum modulus is extracted by linear interpolation in wavelet domain. With the analysis on histogram, the image is filtered with an adaptive dual threshold method, which effectively detects the contours of small structures as well as the boundaries of large objects. A wavelet domain's propagation function is used to further select weak edges. Experimental results have shown the self adaptivity of the threshold to images having the same kind of histogram, and the efficiency even in noise tampered images.展开更多
The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization effici...The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result.展开更多
Detection of cracks at the early stage is considered as very constructive since precautionary steps need to be taken to avoid the damage to the civil structures.Moreover,identifying and classifying the severity level ...Detection of cracks at the early stage is considered as very constructive since precautionary steps need to be taken to avoid the damage to the civil structures.Moreover,identifying and classifying the severity level of cracks is inevitable in order to find the stability of buildings.Hence,this paper proposes an efficient strategy to classify the cracks into fine,medium,and thick using a novel bilayer crack detection algorithm.The bilayer crack detection algorithm helps in extracting the requisite features from the crack for efficient classification.The proposed algorithm works well in the dark background and connects the discontinued cracks too.The first layer is used to detect cracks under texture variations and manufacturing defects,through segmented adaptive thresholding and morphological operations.The residual noise present in the output of the first layer is removed in the second layer of crack detection.The second layer includes the double scan and the noise reduction algorithms and is used to join the missed crack parts.As a result,a segmented crack is formed.Further classification is done using an ensemble classifier with bagging,and decision tree techniques by extracting the geometrical features and the weaker crack criterion from the segmented part.The results of the proposed technique are compared with the existing techniques for different datasets and have obtained a rise in True Positive Rate(TPR),accuracy and precision value.The proposed technique is also implemented in Raspberry Pi for further real-time evaluation.展开更多
This work proposes a robust fault detection and isolation scheme for discrete-time systems subject to actuator faults,in which a bank of H_/H∞ fault detection unknown input observers(UIOs) and a zonotopic threshold a...This work proposes a robust fault detection and isolation scheme for discrete-time systems subject to actuator faults,in which a bank of H_/H∞ fault detection unknown input observers(UIOs) and a zonotopic threshold analysis strategy are considered. In observer design, finite-frequency H_ index based on the generalized Kalman-Yakubovich-Popov lemma and H∞ technique are utilized to evaluate worst-case fault sensitivity and disturbance attenuation performance, respectively. The proposed H_/H∞ fault detection observers are designed to be insensitive to the corresponding actuator fault only, but sensitive to others.Then, to overcome the weakness of predefining threshold for FDI decision-making, this work proposes a zonotopic threshold analysis method to evaluate the generated residuals. The FDI decision-making relies on the evaluation with a dynamical zonotopic threshold. Finally, numerical simulations are provided to show the feasibility of the proposed scheme.展开更多
The chaotic oscillator has already been considered as a powerful method to detect weak signals, even weak signals accompanied with noises. However, many examples, analyses and simulations indicate that chaotic oscilla...The chaotic oscillator has already been considered as a powerful method to detect weak signals, even weak signals accompanied with noises. However, many examples, analyses and simulations indicate that chaotic oscillator detection system cannot guarantee the immunity to noises (even white noise). In fact the randomness of noises has a serious or even a destructive effect on the detection results in many cases. To solve this problem, we present a new detecting method based on wavelet threshold processing that can detect the chaotic weak signal accompanied with noise. All theoretical analyses and simulation experiments indicate that the new method reduces the noise interferences to detection significantly, thereby making the corresponding chaotic oscillator that detects the weak signals accompanied with noises more stable and reliable.展开更多
Edge detection is an effective method for image segmentation and feature extraction.Therefore,extracting weak edges with the inhomogeneous gray of Corona Virus Disease 2019(COVID-19)CT images is extremely important.Mu...Edge detection is an effective method for image segmentation and feature extraction.Therefore,extracting weak edges with the inhomogeneous gray of Corona Virus Disease 2019(COVID-19)CT images is extremely important.Multiscale morphology has been widely used in the edge detection of medical images due to its excellent boundary detection accuracy.In this paper,we propose a weak edge detection method based on Gaussian filtering and singlescale Retinex(GF_SSR),and improved multiscale morphology and adaptive threshold binarization(IMSM_ATB).As all the CT images have noise,we propose to remove image noise by Gaussian filtering.The edge of CT images is enhanced using the SSR algorithm.In addition,based on the extracted edge of CT images using improved Multiscale morphology,a particle swarm optimization(PSO)algorithm is introduced to binarize the image by automatically getting the optimal threshold.To evaluate our method,we use images from three datasets,namely COVID-19,Kaggle-COVID-19,and COVID-Chestxray,respectively.The average values of results are worthy of reference,with the Shannon information entropy of 1.8539,the Precision of 0.9992,the Recall of 0.8224,the F-Score of 1.9158,running time of 11.3000.Finally,three types of lesion images in the COVID-19 dataset are selected to evaluate the visual effects of the proposed algorithm.Compared with the other four algorithms,the proposed algorithm effectively detects the weak edge of the lesion and provides help for image segmentation and feature extraction.展开更多
The essential tool in image processing,computer vision and machine vision is edge detection,especially in the fields of feature extraction and feature detection.Entropy is a basic area in information theory.The entrop...The essential tool in image processing,computer vision and machine vision is edge detection,especially in the fields of feature extraction and feature detection.Entropy is a basic area in information theory.The entropy,in image processing field has a role associated with image settings.As an initial step in image processing,the entropy is always used the image’s segmentation to determine the regions of image which is used to separate the background and objects in image.Image segmentation known as the process which divides the image into multiple regions or sets of pixels.Many applications have been development to enhance the image processing.This paper utilizes the Shannon entropy to achieve edge detection process and segmentation of the image.It introduces a new method of edge detection for 2-D histogram and Shannon entropy based on multilevel threshold.The method utilizes the gray value and the average gray value of the pixels to achieve the two dimensional histogram.The current method has apriority in comparison to some upper classical methods.The experimental results exhibited that the proposed method could capture a moderate quality and execution time better than other comparative methods,particularly in the largest images size.The proposed method offers good results when applied with images of different sizes from the civilization of ancient Egyptians.展开更多
A credible method of calculating the detection threshold is presented for the multiple target situations, which appear frequently in the lower Doppler velocity region during the surveillance of sea with HF ground wave...A credible method of calculating the detection threshold is presented for the multiple target situations, which appear frequently in the lower Doppler velocity region during the surveillance of sea with HF ground wave radar. This method defines a whole-peak-outlier elimination (WPOE) criterion, which is based on in-peak-samples correlation of each target echo spectra, to trim off the target signals and abnormal disturbances with great amplitude from the complex spectra. Therefore, cleaned background noise samples are obtained to improve the accuracy and reliability of noise level estimation. When the background noise is nonhomogeneous, the detection samples are limited and often occupied heavily with outliers. In this case, the problem that the detection threshold is overvalued can be solved. In applications on experimental data, it is verified that this method can reduce the miss alarm rate of signal detection effectively in multiple target situations as well as make the adaptability of the detector better.展开更多
In order to accurately detect the occasional negative R waves in electrocardiography (ECG) signals, the positive-negative adaptive threshold method is adopted to determine the positive R waves and the negative R wav...In order to accurately detect the occasional negative R waves in electrocardiography (ECG) signals, the positive-negative adaptive threshold method is adopted to determine the positive R waves and the negative R waves, according to difference characteristics of ECG signals. The Q and S waves can then be accurately positioned based on the basic characteristics of QRS waves. Finally, the algorithm simulation is made based on the signals from MIT-BIH database with MATLAB. The ex- perimental results show that the algorithm can improve the detection accuracy rate to 99. 91% and o- vercome the problem of larger computation load for wavelet transform and other methods, so the al- gorithm is suitable for real-time detection.展开更多
Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior chara...Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work avoids false alarm rate of attacks and remains to be relatively robust against malicious attacks as compared to existing methods.展开更多
Low-order Duffing and high-order Rossler chaotic oscillator are connected together and new self-adaption frequency detection method is presented. The frequency difference control between unknown signal and the periodi...Low-order Duffing and high-order Rossler chaotic oscillator are connected together and new self-adaption frequency detection method is presented. The frequency difference control between unknown signal and the periodic driving force is realized in this paper and the self-adaption is obtained. Thus, the detection precision and speed are promoted. The limitation that there are too many chaotic oscillators in Duffing system is broken. Meanwhile the disadvantage that the detection speed is lower in R ssler chaotic control is overcome. The self-adaption choice of frequency difference control is realized using the Duffing and Rssler different chaotic oscillators to obtain unknown signal frequency. The simulation results show that the presented method is feasible and effective.展开更多
Automatic edge detection of an image is considered a type of crucial information that can be extracted by applying detectors with different techniques. It is a main tool in pattern recognition, image segmentation, and...Automatic edge detection of an image is considered a type of crucial information that can be extracted by applying detectors with different techniques. It is a main tool in pattern recognition, image segmentation, and scene analysis. This paper introduces an edge-detection algorithm, which generates multi-threshold values. It is based on non-Shannon measures such as Havrda & Charvat’s entropy, which is commonly used in gray level image analysis in many types of images such as satellite grayscale images. The proposed edge detection performance is compared to the previous classic methods, such as Roberts, Prewitt, and Sobel methods. Numerical results underline the robustness of the presented approach and different applications are shown.展开更多
Failure detection module is one of important components in fault-tolerant distributed systems,especially cloud platform.However,to achieve fast and accurate detection of failure becomes more and more difficult especia...Failure detection module is one of important components in fault-tolerant distributed systems,especially cloud platform.However,to achieve fast and accurate detection of failure becomes more and more difficult especially when network and other resources' status keep changing.This study presented an efficient adaptive failure detection mechanism based on volterra series,which can use a small amount of data for predicting.The mechanism uses a volterra filter for time series prediction and a decision tree for decision making.Major contributions are applying volterra filter in cloud failure prediction,and introducing a user factor for different QoS requirements in different modules and levels of IaaS.Detailed implementation is proposed,and an evaluation is performed in Beijing and Guangzhou experiment environment.展开更多
To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform ...To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform (NSBT) domain is proposed. First, the Canny operator is utilized to detect and remove edges from the SAR image. Then the NSBT which has an optimal approximation to the edges of images and a hard thresholding rule are used to approximate the details while despeckling the edge-removed image. Finally, the removed edges are added to the reconstructed image. As the edges axe detected and protected, and the NSBT is used, the proposed algorithm reaches the state-of-the-art effect which realizes both despeckling and preserving edges and details simultaneously. Experimental results show that both the subjective visual effect and the mainly objective performance indexes of the proposed algorithm outperform that of both Bayesian wavelet shrinkage with edge detection and Bayesian least square-Gaussian scale mixture (BLS-GSM).展开更多
Real-time wild smoke detection utilizing machine based identification method is not produced proper accuracy,and it is not suitable for accurate prediction.However,various video smoke detection approaches involve mini...Real-time wild smoke detection utilizing machine based identification method is not produced proper accuracy,and it is not suitable for accurate prediction.However,various video smoke detection approaches involve minimum lighting,and it is required for the cameras to identify the existence of smoke particles in a scene.To overcome such challenges,our proposed work introduces a novel concept like deep VGG-Net Convolutional Neural Network(CNN)for the classification of smoke particles.This Deep Feature Synthesis algorithm automatically generated the characteristics for relational datasets.Also hybrid ABC optimization rectifies the problem related to the slow convergence since complexity is reduced.The proposed real-time algorithm uses some pre-processing for the image enhancement and next to the image enhancement processing;foreground and background regions are separated with Otsu thresholding.Here,to regulate the linear combination of foreground and background components alpha channel is applied to the image components.Here,Farneback optical flow evaluation technique diminishes the false finding rate and finally smoke particles are classified with the VGG-Net CNN classifier.In the end,the investigational outcome shows better statistical stability and performance regarding classification accuracy.The algorithm has better smoke detection performance among various video scenes.展开更多
Hypothesis testing analysis and unknown parameter estimation of both the intermediate frequency(IF) and baseband GPS signal detection are given by using the generalized likelihood ratio test(GLRT) approach,applying th...Hypothesis testing analysis and unknown parameter estimation of both the intermediate frequency(IF) and baseband GPS signal detection are given by using the generalized likelihood ratio test(GLRT) approach,applying the model of GPS signal in white Gaussian noise,It is proved that the test statistic follows central or noncentral F distribution,It is also pointed out that the test statistic is nearly identical to central or noncentral chi-squared distribution because the processing samples are large enough to be considered as infinite in GPS acquisition problem.It is also proved that the probability of false alarm,the probability of detection and the threshold are affected largely when the hypothesis testing refers to the full pseudorandom noise(PRN) code phase and Doppler frequency search space cells instead of each individual cell.The performance of the test statistic is also given with combining the noncoherent integration.展开更多
基金National Natural Science Foundation of China(U2133208,U20A20161)National Natural Science Foundation of China(No.62273244)Sichuan Science and Technology Program(No.2022YFG0180).
文摘In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.
基金This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R97),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘In cognitive radio networks(CoR),the performance of cooperative spectrum sensing is improved by reducing the overall error rate or maximizing the detection probability.Several optimization methods are usually used to optimize the number of user-chosen for cooperation and the threshold selection.However,these methods do not take into account the effect of sample size and its effect on improving CoR performance.In general,a large sample size results in more reliable detection,but takes longer sensing time and increases complexity.Thus,the locally sensed sample size is an optimization problem.Therefore,optimizing the local sample size for each cognitive user helps to improve CoR performance.In this study,two new methods are proposed to find the optimum sample size to achieve objective-based improved(single/double)threshold energy detection,these methods are the optimum sample size N^(*)and neural networks(NN)optimization.Through the evaluation,it was found that the proposed methods outperform the traditional sample size selection in terms of the total error rate,detection probability,and throughput.
基金The National Key Technology R&D Program of China under contract No.2011BAH23B04the National High Technology Research and Development Program(863 Program)of China under contract No.2007AA092202
文摘A model (Bayesian oceanic front detection, BOFD) of sea surface temperature (SST) front detection in satel- lite-derived SST images based on a threshold interval is presented, to be used in different applications such as climatic and environmental studies or fisheries. The model first computes the SST gradient by using a Sobel algorithm template. On the basis of the gradient value, the threshold interval is determined by a gradi- ent cumulative histogram. According to this threshold interval, front candidates can be acquired and prior probability and likelihood can be calculated. Whether or not the candidates are front points can be deter- mined by using the Bayesian decision theory. The model is evaluated on the Advanced Very High-Resolution Radiometer images of part of the Kuroshio front region. Results are compared with those obtained by using several SST front detection methods proposed in the literature. This comparison shows that the BOFD not only suppresses noise and small-scale fronts, but also retains continuous fronts.
基金The National Natural Science Foundation of China under contract Nos 41506198 and 41476101the Natural Science Foundation Projects of Shandong Province of China under contract No.ZR2012FZ003the Science and Technology Development Plan of Qingdao City of China under contract No.13-1-4-121-jch
文摘Since the atmospheric correction is a necessary preprocessing step of remote sensing image before detecting green tide, the introduced error directly affects the detection precision. Therefore, the detection method of green tide is presented from Landsat TM/ETM plus image which needs not the atmospheric correction. In order to achieve an automatic detection of green tide, a linear relationship(y =0.723 x+0.504) between detection threshold y and subtraction x(x=λnir–λred) is found from the comparing Landsat TM/ETM plus image with the field surveys.Using this relationship, green tide patches can be detected automatically from Landsat TM/ETM plus image.Considering there is brightness difference between different regions in an image, the image will be divided into a plurality of windows(sub-images) with a same size firstly, and then each window will be detected using an adaptive detection threshold determined according to the discovered linear relationship. It is found that big errors will appear in some windows, such as those covered by clouds seriously. To solve this problem, the moving step k of windows is proposed to be less than the window width n. Using this mechanism, most pixels will be detected[n/k]×[n/k] times except the boundary pixels, then every pixel will be assigned the final class(green tide or sea water) according to majority rule voting strategy. It can be seen from the experiments, the proposed detection method using multi-windows and their adaptive thresholds can detect green tide from Landsat TM/ETM plus image automatically. Meanwhile, it avoids the reliance on the accurate atmospheric correction.
文摘In order to solve the problems of local maximum modulus extraction and threshold selection in the edge detection of finite resolution digital images, a new wavelet transform based adaptive dual threshold edge detection algorithm is proposed. The local maximum modulus is extracted by linear interpolation in wavelet domain. With the analysis on histogram, the image is filtered with an adaptive dual threshold method, which effectively detects the contours of small structures as well as the boundaries of large objects. A wavelet domain's propagation function is used to further select weak edges. Experimental results have shown the self adaptivity of the threshold to images having the same kind of histogram, and the efficiency even in noise tampered images.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.60971082,60872049,60972073and60871042)the National Key Basic Research Program of China(Grant No.2009CB320400)+1 种基金the National Great Science Specific Project(Grant Nos.2009ZX03003-001,2009ZX03003-011and2010ZX03001003)Chinese Universities Scientific Fund,China
文摘The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result.
文摘Detection of cracks at the early stage is considered as very constructive since precautionary steps need to be taken to avoid the damage to the civil structures.Moreover,identifying and classifying the severity level of cracks is inevitable in order to find the stability of buildings.Hence,this paper proposes an efficient strategy to classify the cracks into fine,medium,and thick using a novel bilayer crack detection algorithm.The bilayer crack detection algorithm helps in extracting the requisite features from the crack for efficient classification.The proposed algorithm works well in the dark background and connects the discontinued cracks too.The first layer is used to detect cracks under texture variations and manufacturing defects,through segmented adaptive thresholding and morphological operations.The residual noise present in the output of the first layer is removed in the second layer of crack detection.The second layer includes the double scan and the noise reduction algorithms and is used to join the missed crack parts.As a result,a segmented crack is formed.Further classification is done using an ensemble classifier with bagging,and decision tree techniques by extracting the geometrical features and the weaker crack criterion from the segmented part.The results of the proposed technique are compared with the existing techniques for different datasets and have obtained a rise in True Positive Rate(TPR),accuracy and precision value.The proposed technique is also implemented in Raspberry Pi for further real-time evaluation.
基金partially supported by National Key R&D Program of China(2018YFB1304600)National Natural Science Foundation of China(51805021,U1813220)+1 种基金China Postdoctoral Science Foundation Grant(2018M631311)the Fundamental Research Funds for the Central Universities(XK1802-4)
文摘This work proposes a robust fault detection and isolation scheme for discrete-time systems subject to actuator faults,in which a bank of H_/H∞ fault detection unknown input observers(UIOs) and a zonotopic threshold analysis strategy are considered. In observer design, finite-frequency H_ index based on the generalized Kalman-Yakubovich-Popov lemma and H∞ technique are utilized to evaluate worst-case fault sensitivity and disturbance attenuation performance, respectively. The proposed H_/H∞ fault detection observers are designed to be insensitive to the corresponding actuator fault only, but sensitive to others.Then, to overcome the weakness of predefining threshold for FDI decision-making, this work proposes a zonotopic threshold analysis method to evaluate the generated residuals. The FDI decision-making relies on the evaluation with a dynamical zonotopic threshold. Finally, numerical simulations are provided to show the feasibility of the proposed scheme.
基金Project supported by the National Natural Science Foundation of China (Grant No. 10731050)the Program for Changjiang Scholars and Innovative Research Team in University of Ministry of Education of China (Grant No. IRTO0742)
文摘The chaotic oscillator has already been considered as a powerful method to detect weak signals, even weak signals accompanied with noises. However, many examples, analyses and simulations indicate that chaotic oscillator detection system cannot guarantee the immunity to noises (even white noise). In fact the randomness of noises has a serious or even a destructive effect on the detection results in many cases. To solve this problem, we present a new detecting method based on wavelet threshold processing that can detect the chaotic weak signal accompanied with noise. All theoretical analyses and simulation experiments indicate that the new method reduces the noise interferences to detection significantly, thereby making the corresponding chaotic oscillator that detects the weak signals accompanied with noises more stable and reliable.
基金Research on the Application of MR Technology in the Teaching of Emergency Nursing Training(HBKC217154).
文摘Edge detection is an effective method for image segmentation and feature extraction.Therefore,extracting weak edges with the inhomogeneous gray of Corona Virus Disease 2019(COVID-19)CT images is extremely important.Multiscale morphology has been widely used in the edge detection of medical images due to its excellent boundary detection accuracy.In this paper,we propose a weak edge detection method based on Gaussian filtering and singlescale Retinex(GF_SSR),and improved multiscale morphology and adaptive threshold binarization(IMSM_ATB).As all the CT images have noise,we propose to remove image noise by Gaussian filtering.The edge of CT images is enhanced using the SSR algorithm.In addition,based on the extracted edge of CT images using improved Multiscale morphology,a particle swarm optimization(PSO)algorithm is introduced to binarize the image by automatically getting the optimal threshold.To evaluate our method,we use images from three datasets,namely COVID-19,Kaggle-COVID-19,and COVID-Chestxray,respectively.The average values of results are worthy of reference,with the Shannon information entropy of 1.8539,the Precision of 0.9992,the Recall of 0.8224,the F-Score of 1.9158,running time of 11.3000.Finally,three types of lesion images in the COVID-19 dataset are selected to evaluate the visual effects of the proposed algorithm.Compared with the other four algorithms,the proposed algorithm effectively detects the weak edge of the lesion and provides help for image segmentation and feature extraction.
文摘The essential tool in image processing,computer vision and machine vision is edge detection,especially in the fields of feature extraction and feature detection.Entropy is a basic area in information theory.The entropy,in image processing field has a role associated with image settings.As an initial step in image processing,the entropy is always used the image’s segmentation to determine the regions of image which is used to separate the background and objects in image.Image segmentation known as the process which divides the image into multiple regions or sets of pixels.Many applications have been development to enhance the image processing.This paper utilizes the Shannon entropy to achieve edge detection process and segmentation of the image.It introduces a new method of edge detection for 2-D histogram and Shannon entropy based on multilevel threshold.The method utilizes the gray value and the average gray value of the pixels to achieve the two dimensional histogram.The current method has apriority in comparison to some upper classical methods.The experimental results exhibited that the proposed method could capture a moderate quality and execution time better than other comparative methods,particularly in the largest images size.The proposed method offers good results when applied with images of different sizes from the civilization of ancient Egyptians.
文摘A credible method of calculating the detection threshold is presented for the multiple target situations, which appear frequently in the lower Doppler velocity region during the surveillance of sea with HF ground wave radar. This method defines a whole-peak-outlier elimination (WPOE) criterion, which is based on in-peak-samples correlation of each target echo spectra, to trim off the target signals and abnormal disturbances with great amplitude from the complex spectra. Therefore, cleaned background noise samples are obtained to improve the accuracy and reliability of noise level estimation. When the background noise is nonhomogeneous, the detection samples are limited and often occupied heavily with outliers. In this case, the problem that the detection threshold is overvalued can be solved. In applications on experimental data, it is verified that this method can reduce the miss alarm rate of signal detection effectively in multiple target situations as well as make the adaptability of the detector better.
文摘In order to accurately detect the occasional negative R waves in electrocardiography (ECG) signals, the positive-negative adaptive threshold method is adopted to determine the positive R waves and the negative R waves, according to difference characteristics of ECG signals. The Q and S waves can then be accurately positioned based on the basic characteristics of QRS waves. Finally, the algorithm simulation is made based on the signals from MIT-BIH database with MATLAB. The ex- perimental results show that the algorithm can improve the detection accuracy rate to 99. 91% and o- vercome the problem of larger computation load for wavelet transform and other methods, so the al- gorithm is suitable for real-time detection.
文摘Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work avoids false alarm rate of attacks and remains to be relatively robust against malicious attacks as compared to existing methods.
基金supported by the Talent Scientific Research Foundation of China Three Gorges University(Grant No.KJ2013B079)
文摘Low-order Duffing and high-order Rossler chaotic oscillator are connected together and new self-adaption frequency detection method is presented. The frequency difference control between unknown signal and the periodic driving force is realized in this paper and the self-adaption is obtained. Thus, the detection precision and speed are promoted. The limitation that there are too many chaotic oscillators in Duffing system is broken. Meanwhile the disadvantage that the detection speed is lower in R ssler chaotic control is overcome. The self-adaption choice of frequency difference control is realized using the Duffing and Rssler different chaotic oscillators to obtain unknown signal frequency. The simulation results show that the presented method is feasible and effective.
文摘Automatic edge detection of an image is considered a type of crucial information that can be extracted by applying detectors with different techniques. It is a main tool in pattern recognition, image segmentation, and scene analysis. This paper introduces an edge-detection algorithm, which generates multi-threshold values. It is based on non-Shannon measures such as Havrda & Charvat’s entropy, which is commonly used in gray level image analysis in many types of images such as satellite grayscale images. The proposed edge detection performance is compared to the previous classic methods, such as Roberts, Prewitt, and Sobel methods. Numerical results underline the robustness of the presented approach and different applications are shown.
基金supported by the National High-tech Research and Development Program(863) of China under Grant No. 2011AA01A102
文摘Failure detection module is one of important components in fault-tolerant distributed systems,especially cloud platform.However,to achieve fast and accurate detection of failure becomes more and more difficult especially when network and other resources' status keep changing.This study presented an efficient adaptive failure detection mechanism based on volterra series,which can use a small amount of data for predicting.The mechanism uses a volterra filter for time series prediction and a decision tree for decision making.Major contributions are applying volterra filter in cloud failure prediction,and introducing a user factor for different QoS requirements in different modules and levels of IaaS.Detailed implementation is proposed,and an evaluation is performed in Beijing and Guangzhou experiment environment.
基金supported by the National Natural Science Foundation of China(6067309760702062)+3 种基金the National HighTechnology Research and Development Program of China(863 Program)(2008AA01Z1252007AA12Z136)the National ResearchFoundation for the Doctoral Program of Higher Education of China(20060701007)the Program for Cheung Kong Scholarsand Innovative Research Team in University(IRT 0645).
文摘To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform (NSBT) domain is proposed. First, the Canny operator is utilized to detect and remove edges from the SAR image. Then the NSBT which has an optimal approximation to the edges of images and a hard thresholding rule are used to approximate the details while despeckling the edge-removed image. Finally, the removed edges are added to the reconstructed image. As the edges axe detected and protected, and the NSBT is used, the proposed algorithm reaches the state-of-the-art effect which realizes both despeckling and preserving edges and details simultaneously. Experimental results show that both the subjective visual effect and the mainly objective performance indexes of the proposed algorithm outperform that of both Bayesian wavelet shrinkage with edge detection and Bayesian least square-Gaussian scale mixture (BLS-GSM).
文摘Real-time wild smoke detection utilizing machine based identification method is not produced proper accuracy,and it is not suitable for accurate prediction.However,various video smoke detection approaches involve minimum lighting,and it is required for the cameras to identify the existence of smoke particles in a scene.To overcome such challenges,our proposed work introduces a novel concept like deep VGG-Net Convolutional Neural Network(CNN)for the classification of smoke particles.This Deep Feature Synthesis algorithm automatically generated the characteristics for relational datasets.Also hybrid ABC optimization rectifies the problem related to the slow convergence since complexity is reduced.The proposed real-time algorithm uses some pre-processing for the image enhancement and next to the image enhancement processing;foreground and background regions are separated with Otsu thresholding.Here,to regulate the linear combination of foreground and background components alpha channel is applied to the image components.Here,Farneback optical flow evaluation technique diminishes the false finding rate and finally smoke particles are classified with the VGG-Net CNN classifier.In the end,the investigational outcome shows better statistical stability and performance regarding classification accuracy.The algorithm has better smoke detection performance among various video scenes.
文摘Hypothesis testing analysis and unknown parameter estimation of both the intermediate frequency(IF) and baseband GPS signal detection are given by using the generalized likelihood ratio test(GLRT) approach,applying the model of GPS signal in white Gaussian noise,It is proved that the test statistic follows central or noncentral F distribution,It is also pointed out that the test statistic is nearly identical to central or noncentral chi-squared distribution because the processing samples are large enough to be considered as infinite in GPS acquisition problem.It is also proved that the probability of false alarm,the probability of detection and the threshold are affected largely when the hypothesis testing refers to the full pseudorandom noise(PRN) code phase and Doppler frequency search space cells instead of each individual cell.The performance of the test statistic is also given with combining the noncoherent integration.