首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
玻璃缺陷检测新方法的研究   总被引:1,自引:0,他引:1  
玻璃缺陷检测已成为提高玻璃质量的重要技术之一,它在检测出不合格玻璃产品的同时,还能将缺陷信息传递给玻璃生产的各个流程,再对各个环节加以改进。为能够生产出高质量的玻璃和准确地获取玻璃缺陷信息,采用了一种基于莫尔条纹的玻璃缺陷检测新方法。这种检测方法不但能够检测出微小缺陷,并进行分类,还能有效地检测出玻璃的光学畸变。  相似文献   

2.
基于Hough变换和路径形态学的城区道路提取   总被引:1,自引:0,他引:1       下载免费PDF全文
刘小丹  刘岩 《计算机工程》2012,38(6):265-268
针对高分辨率遥感影像上城区道路的特点,提出一种基于Hough变换和路径形态学的高分辨率遥感影像城区道路提取方法。用Hough变换检测主要道路的方向及长度,建立邻接图,根据邻接图确定路径的方向和长度,将这些确定的路径看作狭长但并非完全笔直的结构元素。实验结果表明,该方法不仅能够检测出直线道路信息,还能检测出宽的弯曲的道路及细长的曲率比较小的道路信息。  相似文献   

3.
介绍了较为常见的信息隐藏分析方法,详细阐述了Sorina Dumltrescu,Xiao Linwu等提出的点对信息隐藏检测方法,并对该算法进行优化;在使用几种主流的隐写工具对一些BMP图像做信息隐藏后,使用上述算法做了测试,从实验所得数据来看此分析方法具有很高的检测准确率。  相似文献   

4.
何江远  唐明浩 《微计算机信息》2007,23(22):97-98,107
本文提出了一种基于数字图像处理的交通流量参数的检测方法,通过CMOS传感摄像头对交通道路摄取的车辆和交通场景来有效地检测交通参数,其中主要用到基于DSP的数字图像处理方法来对摄像头获取的图像进行获取、分析、分割及特征提取等。本方法可以完成单车道的城市交通要道的车辆计数和车辆速度检测等交通信息。该方法具有良好的实用性和可靠性,可用于现场采集交通信息以便调控交通道路状况。  相似文献   

5.
Most multimedia surveillance and monitoring systems nowadays utilize multiple types of sensors to detect events of interest as and when they occur in the environment. However, due to the asynchrony among and diversity of sensors, information assimilation – how to combine the information obtained from asynchronous and multifarious sources is an important and challenging research problem. In this paper, we propose a framework for information assimilation that addresses the issues – “when”, “what” and “how” to assimilate the information obtained from different media sources in order to detect events in multimedia surveillance systems. The proposed framework adopts a hierarchical probabilistic assimilation approach to detect atomic and compound events. To detect an event, our framework uses not only the media streams available at the current instant but it also utilizes their two important properties – first, accumulated past history of whether they have been providing concurring or contradictory evidences, and – second, the system designer’s confidence in them. The experimental results show the utility of the proposed framework.  相似文献   

6.
基于加权信息增益的恶意代码检测方法   总被引:1,自引:0,他引:1       下载免费PDF全文
采用数据挖掘技术检测恶意代码,提出一种基于加权信息增益的特征选择方法。该方法综合考虑特征频率和信息增益的作用,能够更加准确地选取有效特征,从而提高检测性能。实现一个恶意代码检测系统,采用二进制代码的N-gram和变长N-gram作为特征提取方法,加权信息增益作为特征选择方法,使用多种分类器进行恶意代码检测。实验结果证明,该方法能有效提高恶意代码的检测率和准确率。  相似文献   

7.
由于雷达探测存在盲区,低空与超低空飞行的入侵目标给雷达防御系统带来困难与威胁。基于GPS技术、多传感器技术、网络技术及单片机技术设计出一种分布式多传感器探测节点,把远程分布的多传感器探测节点所探测到的信息实时、有效地汇集在一起,实现超远距离的多传感器信息融合,实时进行目标发现,可弥补雷达防御系统存在的漏洞,有效地杜绝雷达防御系统存在的安全隐患。  相似文献   

8.
刘洪江  桑楠  罗惠琼 《计算机工程》2008,34(22):171-173
由于无线通信的距离限制,在无线Mesh网络(WMNs)中很难有效地检测高速移动的恶意节点。该文提出一种基于检测信息交换的入侵检测模型。该模型基于WMNs中大多数的Mesh路由器具有低移动性的特性,采用Mesh路由器之间交换检测信息的方法,实现检测WMNs中高速移动的恶意Mesh路由器。  相似文献   

9.
为帮助数据持有者规避法律风险,有必要对数据集中的个人信息做检测和统计.然而当前尚缺有效工具支持检测中文数据集中的个人信息.为应对上述问题,根据法律文献整理出需要检测的个人信息类别,提出综合了模式匹配与自然语言处理技术的个人信息自动化检测框架,对中文文本中的个人信息进行检测.同时,提出一种识别家庭住址的方法,解决地址格式...  相似文献   

10.
Visual correlation of network alerts   总被引:1,自引:0,他引:1  
The VisAlert visual correlation tool facilitates situational awareness in complex network environments by providing a holistic view of network security to help detect malicious activities. Information visualization techniques and methods in many applications have effectively increased operators' situational awareness, letting them more effectively detect, diagnose, and treat anomalous conditions. Visualization elevates information comprehension by fostering rapid correlation and perceived associations. Our visualization technique integrates the information in log and alert files into an intuitive, flexible, extensible, and scalable visualization tool - VisAlert - that presents critical information concerning network activity in an integrated manner, increasing the user's situational awareness.  相似文献   

11.
Smartphones centralize a great deal of users’ private information and are thus a primary target for cyber-attack. The main goal of the attacker is to try to access and exfiltrate the private information stored in the smartphone without detection. In situations where explicit information is lacking, these attackers can still be detected in an automated way by analyzing data streams (continuously sampled information such as an application’s CPU consumption, accelerometer readings, etc.). When clustered, anomaly detection techniques may be applied to the data stream in order to detect attacks in progress. In this paper we utilize an algorithm called pcStream that is well suited for detecting clusters in real world data streams and propose extensions to the pcStream algorithm designed to detect point, contextual, and collective anomalies. We provide a comprehensive evaluation that addresses mobile security issues on a unique dataset collected from 30 volunteers over eight months. Our evaluations show that the pcStream extensions can be used to effectively detect data leakage (point anomalies) and malicious activities (contextual anomalies) associated with malicious applications. Moreover, the algorithm can be used to detect when a device is being used by an unauthorized user (collective anomaly) within approximately 30 s with 1 false positive every two days.  相似文献   

12.
基于主成分变换的动态监测变化信息自动发现   总被引:5,自引:0,他引:5  
主成分变换法在对多波段遥感影像处理过程中具有降维、压缩、影像增强的作用,也可利用其对多时相数据进行处理以自动发现精度不错的土地利用变化信息。结合主成分变换原理和不同的数据处理过程,可以用不同的方式实现土地利用变化信息的自动发现。在对已有方法进行总结分析的基础上,提出了两次主成分变换法进行变化信息自动监测,经验证,该方法在去除影像噪声对监测结果的影响方面具有很好的效果。  相似文献   

13.
为了使底盘机构能够准确地辅助轮椅实现爬楼动作,为其安装检测楼梯环境信息的传感器系统,包括检测踏面与踢面距离的超声波模块和红外线模块,以及检测底盘角度的传感器模块.给出了各传感器模块在底盘机构的位置布局,并通过各传感器模块检测获取底盘机构周围环境的楼梯信息;将采集的模拟数据信息,送入主控板数字信号处理器(DSP)进行融合处理,并采用多机串行通信模式将数据通过串行通信接口(SCI)模块传送至上位机,上位机经分析处理后向电机传送命令使其带动执行机构部件完成相应调节动作,实现对轮椅底盘机构的控制;将传感器的采集结果在VC++6.0界面上实时显示.  相似文献   

14.
张彪  周治平 《计算机工程与设计》2007,28(6):1303-1305,1308
随着信息隐藏技术的发展,信息检测技术也越来越被人关注,其中检测分析的也变得更加重要.通过对GIF图像的信息隐藏嵌入方法中典型的EzStego算法做了分析,并根据其工作原理,实现了一种利用GIF图像中相邻像素之间平滑度的统计特征进行分析的方法.实验结果表明,该方法能有效地检测EzStego算法隐藏的信息.同时,对该方法的适用范围进行了分析.  相似文献   

15.
We propose a framework that uses (external) environment information to enhance computer security. The benefit of our framework is that the environment information is collected by sensors that are outside the control of a host and communicate to an external monitor via an out-of-band channel (w.r.t. the host), thus it cannot be compromised by malware on a host system. The information gathered still remains intact even if malware uses rootkit techniques to hide its activities. Our framework can be applied for a number of security applications: (1) intrusion detection; (2) rate monitoring/control of external resources; and (3) access control. We show that that the framework is useful even with coarse-grained and simple information. We present some experimental prototypes that employ the framework to detect/control email spam, detect/control DDoS zombie attacks and detect misuse of compute resources. Experimental evaluation shows that the framework is effecting in detecting or limiting the activities of such malware. The growing popularity of multimodal sensors and physical security information management systems suggests that such environmental sensors will become common making our framework cost effective and feasible in the near future.  相似文献   

16.
ContextThe employment of class loaders in component-based Java programs may introduce runtime type errors, which may happen at any statement related to class loading, and may be wrapped into various types of exceptions raised by JVM. Traditional static analysis approaches are inefficient to detect them.ObjectiveOur previous work proposed a semi-static detection work based on points-to analysis to detect such runtime type errors. In this paper, we extend previous work by referencing the information obtained from class loading to detect runtime type errors in component-based Java programs, without the need to running them.MethodOur approach extends the typical points-to analysis by gathering the behavior information of Java class loaders and figuring out the defining class loader of the allocation sites. By doing that, we obtain the runtime types of objects a reference variable may point to, and make use of such information to facilitate runtime type error detecting.ResultsResults on four case studies show that our approach is feasible, can effectively detect runtime errors missed by traditional static checking methods, and performs acceptably in both false negative test and scalability test.  相似文献   

17.
一种基于颜色和几何特征的人脸检测方法   总被引:2,自引:0,他引:2  
该文提出了一种有效的人脸定位方法。通过局部自适应门限提取图像边缘,用几何规则和颜色特征筛选出候选眼睛块,使用遗传算法将这些眼睛块配对验证,适应度函数采用一个新颖的眼睛及脸颊区域的灰度投影及肤色信息定义。该方法可以实现多尺度、多角度的正面人脸检测,实验结果令人满意。  相似文献   

18.
The presence of disfluencies in spontaneous speech, while poses a challenge for robust automatic recognition, also offers means for gaining additional insights into understanding a speaker's communicative and cognitive state. This paper analyzes disfluencies in children's spontaneous speech, in the context of spoken dialog based computer game play, and addresses the automatic detection of disfluency boundaries. Although several approaches have been proposed to detect disfluencies in speech, relatively little work has been done to utilize visual information to improve the performance and robustness of the disfluency detection system. This paper describes the use of visual information along with prosodic and language information to detect the presence of disfluencies in a child's computer-directed speech and shows how these information sources can be integrated to increase the overall information available for disfluency detection. The experimental results on our children's multimodal dialog corpus indicate that disfluency detection accuracy of over 80% can be obtained by utilizing audio-visual information. Specifically, results showed that the addition of visual information to prosody and language features yield relative improvements in disfluency detection error rates of 3.6% and 6.3%, respectively, for information fusion at the feature level and decision level.  相似文献   

19.
网页查重技术在企业数据仓库中的应用   总被引:1,自引:0,他引:1  
白广慧  连浩  刘悦  程学旗 《计算机应用》2005,25(7):1713-1715
介绍了处理网页排重的三类通用方法,并介绍了在企业数据仓库系统中,通过利用相似性检索技术实现情报资料自动排重的应用。通过对测试结果的评估表明,这种基于相似性检索技术的自动排重的方法能够达到较好的效果,实现了企业情报资料智能化预处理的应用。  相似文献   

20.
Since route discovery based on broadcasting query packets is the basis of route protocol in ad hoc network, any node may compromise the routing protocol functionality by disrupting the route discovery process by modifying routing topology information, by fabricating false routing topology information and by impersonating other nodes. To solve the problem of security routing and ensure the right routing information, we present a novel model called DIMH to detect, isolate the malicious host and provide the integrity and authentication mechanism for routing information. Method of isolating malicious host and ensuring the right route information is that the i + 1 th malicious host is carried out by cooperation between the ith host and i + 2 th host. The model can validly detect attack from two colluding malicious hosts that cooperate to tamper with routing information. Our model guarantees that fabricated, compromised, or replayed route replies would either be rejected or never reach back the querying node.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号