scholarly journals A Multiple Target Positioning and Tracking System Behind Brick-Concrete Walls Using Multiple Monostatic IR-UWB Radars

Sensors ◽  
2019 ◽  
Vol 19 (18) ◽  
pp. 4033 ◽  
Author(s):  
Yoo ◽  
Wang ◽  
Seol ◽  
Lee ◽  
Chung ◽  
...  

Recognizing and tracking the targets located behind walls through impulse radio ultra-wideband (IR-UWB) radar provides a significant advantage, as the characteristics of the IR-UWB radar signal enable it to penetrate obstacles. In this study, we design a through-wall radar system to estimate and track multiple targets behind a wall. The radar signal received through the wall experiences distortion, such as attenuation and delay, and the characteristics of the wall are estimated to compensate the distance error. In addition, unlike general cases, it is difficult to maintain a high detection rate and low false alarm rate in this through-wall radar application due to the attenuation and distortion caused by the wall. In particular, the generally used delay-and-sum algorithm is significantly affected by the motion of targets and distortion caused by the wall, rendering it difficult to obtain a good performance. Thus, we propose a novel method, which calculates the likelihood that a target exists in a certain location through a detection process. Unlike the delay-and-sum algorithm, this method does not use the radar signal directly. Simulations and experiments are conducted in different cases to show the validity of our through-wall radar system. The results obtained by using the proposed algorithm as well as delay-and-sum and trilateration are compared in terms of the detection rate, false alarm rate, and positioning error.

Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1375
Author(s):  
Celestine Iwendi ◽  
Joseph Henry Anajemba ◽  
Cresantus Biamba ◽  
Desire Ngabo

Web security plays a very crucial role in the Security of Things (SoT) paradigm for smart healthcare and will continue to be impactful in medical infrastructures in the near future. This paper addressed a key component of security-intrusion detection systems due to the number of web security attacks, which have increased dramatically in recent years in healthcare, as well as the privacy issues. Various intrusion-detection systems have been proposed in different works to detect cyber threats in smart healthcare and to identify network-based attacks and privacy violations. This study was carried out as a result of the limitations of the intrusion detection systems in responding to attacks and challenges and in implementing privacy control and attacks in the smart healthcare industry. The research proposed a machine learning support system that combined a Random Forest (RF) and a genetic algorithm: a feature optimization method that built new intrusion detection systems with a high detection rate and a more accurate false alarm rate. To optimize the functionality of our approach, a weighted genetic algorithm and RF were combined to generate the best subset of functionality that achieved a high detection rate and a low false alarm rate. This study used the NSL-KDD dataset to simultaneously classify RF, Naive Bayes (NB) and logistic regression classifiers for machine learning. The results confirmed the importance of optimizing functionality, which gave better results in terms of the false alarm rate, precision, detection rate, recall and F1 metrics. The combination of our genetic algorithm and RF models achieved a detection rate of 98.81% and a false alarm rate of 0.8%. This research raised awareness of privacy and authentication in the smart healthcare domain, wireless communications and privacy control and developed the necessary intelligent and efficient web system. Furthermore, the proposed algorithm was applied to examine the F1-score and precisionperformance as compared to the NSL-KDD and CSE-CIC-IDS2018 datasets using different scaling factors. The results showed that the proposed GA was greatly optimized, for which the average precision was optimized by 5.65% and the average F1-score by 8.2%.


2019 ◽  
Vol 2019 ◽  
pp. 1-8 ◽  
Author(s):  
Sijie Kong ◽  
Jin Zhou ◽  
Wenli Ma

A method with high detection rate, low false-alarm rate, and low computational cost is presented for removing stars and noise and detecting space debris with signal-to-noise ratio (SNR>3) in consecutive raw frames. The top-hat transformation is implemented firstly to remove background, then a masking technique is proposed to remove stars, and finally, a weighted algorithm is used to detect the pieces of space debris. The simulation samples are images taken by 600 mm ground-based telescope. And a series of simulation targets are added to the image in order to test the detection rate and false-alarm rate of different SNRs. The telescope in this paper is worked in “staring target mode.” The experimental results show that the proposed method can detect space debris effectively with low false-alarm by only three frames. When the SNR is higher than 3, the detection probability can reach 94%, and the false-alarm rate is below 2%. The running time of this algorithm is within 1 second. Additionally, algorithm performance tests in different regions are also carried out. A large set of image sequences are tested, which proves the stableness and effectiveness of the proposed method.


2018 ◽  
Vol 18 (01) ◽  
pp. e05 ◽  
Author(s):  
John Adedapo Ojo ◽  
Jamiu Alabi Oladosu

Video-based fire detection (VFD) technologies have received significant attention from both academic and industrial communities recently. However, existing VFD approaches are still susceptible to false alarms due to changes in illumination, camera noise, variability of shape, motion, colour, irregular patterns of smoke and flames, modelling and training inaccuracies. Hence, this work aimed at developing a VSD system that will have a high detection rate, low false-alarm rate and short response time. Moving blocks in video frames were segmented and analysed in HSI colour space, and wavelet energy analysis of the smoke candidate blocks was performed. In addition, Dynamic texture descriptors were obtained using Weber Local Descriptor in Three Orthogonal Planes (WLD-TOP). These features were combined and used as inputs to Support Vector Classifier with radial based kernel function, while post-processing stage employs temporal image filtering to reduce false alarm. The algorithm was implemented in MATLAB 8.1.0.604 (R2013a). Accuracy of 99.30%, detection rate of 99.28% and false alarm rate of 0.65% were obtained when tested with some online videos. The output of this work would find applications in early fire detection systems and other applications such as robot vision and automated inspection.


2012 ◽  
Vol 562-564 ◽  
pp. 1693-1696
Author(s):  
Li Juan Duan ◽  
Ze Cheng Sun ◽  
Chun Peng Wu ◽  
Xue Bin Wang ◽  
Zhen Yang ◽  
...  

In this paper, a method of detecting adult images based on AdaBoost was proposed. We focused on the detection of the adult images that have naked breasts or naked genitalia. By using basic and rotated Haar-like features extracted from the samples in the training set, we trained a cascade detector. The detector would classify the image whether to be a pornographic one or not. The results showed that this method achieved a high detection rate and a low false alarm rate.


Sensors ◽  
2020 ◽  
Vol 20 (8) ◽  
pp. 2303
Author(s):  
Ning Chu ◽  
Linlin Wang ◽  
Liang Yu ◽  
Changbo He ◽  
Linlin Cao ◽  
...  

Cavitation failure often occurs in centrifugal pumps, resulting in severe harm to their performance and life-span. Nowadays, it has become crucial to detect incipient cavitation ahead of cavitation failure. However, most envelope demodulation methods suffer from strong noise and repetitive impacts. This paper proposes an adaptive Autogram approach based on the Constant False Alarm Rate (CFAR). A cyclic amplitude model (CAM) is presented to reveal the cyclostationarity and autocorrelation-periodicity of pump cavitation-caused signals. The Autogram method is improved for envelope demodulation and cyclic feature extraction by introducing the character to noise ratio (CNR) and CFAR threshold. To achieve a high detection rate, CNR parameters are introduced to represent the cavitation intensity in the combined square-envelope spectrum. To maintain a low false alarm, the CFAR detector is combined with the CNR parameter to obtain adaptive thresholds for different data along with sensor positions. By carrying out various experiments of a centrifugal water pump from Status 1 to 10 at different flow rates, the proposed approach is capable of cavitation feature extraction with respect to the CAM model, and can achieve more than a 90% detection rate of incipient cavitation and maintain a 5% false alarm rate. This paper offers an alternative solution for the predictive maintenance of pump cavitation.


Author(s):  
Mingming Fan ◽  
Shaoqing Tian ◽  
Kai Liu ◽  
Jiaxin Zhao ◽  
Yunsong Li

AbstractInfrared small target detection has been a challenging task due to the weak radiation intensity of targets and the complexity of the background. Traditional methods using hand-designed features are usually effective for specific background and have the problems of low detection rate and high false alarm rate in complex infrared scene. In order to fully exploit the features of infrared image, this paper proposes an infrared small target detection method based on region proposal and convolution neural network. Firstly, the small target intensity is enhanced according to the local intensity characteristics. Then, potential target regions are proposed by corner detection to ensure high detection rate of the method. Finally, the potential target regions are fed into the classifier based on convolutional neural network to eliminate the non-target regions, which can effectively suppress the complex background clutter. Extensive experiments demonstrate that the proposed method can effectively reduce the false alarm rate, and outperform other state-of-the-art methods in terms of subjective visual impression and quantitative evaluation metrics.


Author(s):  
Sunilkumar Soni ◽  
Santanu Das ◽  
Aditi Chattopadhyay

An optimal sensor placement methodology is proposed based on detection theory framework to maximize the detection rate and minimize the false alarm rate. Minimizing the false alarm rate for a given detection rate plays an important role in improving the efficiency of a Structural Health Monitoring (SHM) system as it reduces the number of false alarms. The placement technique is such that the sensor features are as directly correlated and as sensitive to damage as possible. The technique accounts for a number of factors, like actuation frequency and strength, minimum damage size, damage detection scheme, material damping, signal to noise ratio (SNR) and sensing radius. These factors are not independent and affect each other. Optimal sensor placement is done in two steps. First, a sensing radius, which can capture any detectable change caused by a perturbation and above a certain threshold, is calculated. This threshold value is based on Neyman-Pearson detector that maximizes the detection rate for a fixed false alarm rate. To avoid sensor redundancy, a criterion to minimize sensing region overlaps of neighboring sensors is defined. Based on the sensing region and the minimum overlap concept, number of sensors needed on a structural component is calculated. In the second step, a damage distribution pattern, known as probability of failure distribute, is calculated for a structural component using finite element analysis. This failure distribution helps in selecting the most sensitive sensors, thereby removing those making remote contributions to the overall detection scheme.


Author(s):  
P. Manoj Kumar ◽  
M. Parvathy ◽  
C. Abinaya Devi

Intrusion Detection Systems (IDS) is one of the important aspects of cyber security that can detect the anomalies in the network traffic. IDS are a part of Second defense line of a system that can be deployed along with other security measures such as access control, authentication mechanisms and encryption techniques to secure the systems against cyber-attacks. However, IDS suffers from the problem of handling large volume of data and in detecting zero-day attacks (new types of attacks) in a real-time traffic environment. To overcome this problem, an intelligent Deep Learning approach for Intrusion Detection is proposed based on Convolutional Neural Network (CNN-IDS). Initially, the model is trained and tested under a new real-time traffic dataset, CSE-CIC-IDS 2018 dataset. Then, the performance of CNN-IDS model is studied based on three important performance metrics namely, accuracy / training time, detection rate and false alarm rate. Finally, the experimental results are compared with those of various Deep Discriminative models including Recurrent Neural network (RNN), Deep Neural Network (DNN) etc., proposed for IDS under the same dataset. The Comparative results show that the proposed CNN-IDS model is very much suitable for modelling a classification model both in terms of binary and multi-class classification with higher detection rate, accuracy, and lower false alarm rate. The CNN-IDS model improves the accuracy of intrusion detection and provides a new research method for intrusion detection.


Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2559 ◽  
Author(s):  
Celestine Iwendi ◽  
Suleman Khan ◽  
Joseph Henry Anajemba ◽  
Mohit Mittal ◽  
Mamdouh Alenezi ◽  
...  

The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides many researchers have applied machine learning around this area. Obviously, a single classifier alone in the classifications seems impossible to control network intruders. This limitation is what led us to perform dimensionality reduction by means of correlation-based feature selection approach (CFS approach) in addition to a refined ensemble model. The paper aims to improve the Intrusion Detection System (IDS) by proposing a CFS + Ensemble Classifiers (Bagging and Adaboost) which has high accuracy, high packet detection rate, and low false alarm rate. Machine Learning Ensemble Models with base classifiers (J48, Random Forest, and Reptree) were built. Binary classification, as well as Multiclass classification for KDD99 and NSLKDD datasets, was done while all the attacks were named as an anomaly and normal traffic. Class labels consisted of five major attacks, namely Denial of Service (DoS), Probe, User-to-Root (U2R), Root to Local attacks (R2L), and Normal class attacks. Results from the experiment showed that our proposed model produces 0 false alarm rate (FAR) and 99.90% detection rate (DR) for the KDD99 dataset, and 0.5% FAR and 98.60% DR for NSLKDD dataset when working with 6 and 13 selected features.


Sign in / Sign up

Export Citation Format

Share Document