• Title/Summary/Keyword: Abnormal Behavior

Search Result 549, Processing Time 0.024 seconds

Signal Analysis for Detecting Abnormal Breathing (비정상 호흡 감지를 위한 신호 분석)

  • Kim, Hyeonjin;Kim, Jinhyun
    • Journal of Sensor Science and Technology
    • /
    • v.29 no.4
    • /
    • pp.249-254
    • /
    • 2020
  • It is difficult to control children who exhibit negative behavior in dental clinics. Various methods are used for preventing pediatric dental patients from being afraid and for eliminating the factors that cause psychological anxiety. However, when it is difficult to apply this routine behavioral control technique, sedation therapy is used to provide quality treatment. When the sleep anesthesia treatment is performed at the dentist's clinic, it is challenging to identify emergencies using the current breath detection method. When a dentist treats a patient that is under the influence of an anesthetic, the patient is unconscious and cannot immediately respond, even if the airway is blocked, which can cause unstable breathing or even death in severe cases. During emergencies, respiratory instability is not easily detected with first aid using conventional methods owing to time lag or noise from medical devices. Therefore, abnormal breathing needs to be evaluated in real-time using an intuitive method. In this paper, we propose a method for identifying abnormal breathing in real-time using an intuitive method. Respiration signals were measured using a 3M Littman electronic stethoscope when the patient's posture was supine. The characteristics of the signals were analyzed by applying the signal processing theory to distinguish abnormal breathing from normal breathing. By applying a short-time Fourier transform to the respiratory signals, the frequency range for each patient was found to be different, and the frequency of abnormal breathing was distributed across a broader range than that of normal breathing. From the wavelet transform, time-frequency information could be identified simultaneously, and the change in the amplitude with the time could also be determined. When the difference between the amplitude of normal breathing and abnormal breathing in the time domain was very large, abnormal breathing could be identified.

Design and Synthesis of Resin-Conjugated Tamiflu Analogs for Affinity Chromatography

  • Kimura, Yasuaki;Yamatsugu, Kenzo;Kanai, Motomu;Echigo, Noriko;Kuzuhara, Takashi;Shibasaki, Masakatsu
    • Bulletin of the Korean Chemical Society
    • /
    • v.31 no.3
    • /
    • pp.588-594
    • /
    • 2010
  • Two types of resin-conjugated Tamiflu analogs were synthesized by modifying our original synthetic route of oseltamivir phosphate (Tamiflu). The prepared resins bound to influenza virus neuraminidase, the main target of Tamiflu. The resins will be useful for isolating and identifying presumed endogenous vertebrate proteins that interact with Tamiflu, which might relate to the rarely observed abnormal behavior exhibited by some influenza patients treated with Tamiflu.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Mitigating Cache Pollution Attack in Information Centric Mobile Internet

  • Chen, Jia;Yue, Liang;Chen, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5673-5691
    • /
    • 2019
  • Information centric mobile network can significantly improve the data retrieving efficiency by caching contents at mobile edge. However, the cache pollution attack can affect the data obtaining process severely by requiring unpopular contents deliberately. To tackle the problem, we design an algorithm of mitigating cache pollution attacks in information centric mobile network. Particularly, the content popularity distribution statistic is proposed to detect abnormal behavior. Then a probabilistic caching strategy based on abnormal behavior is applied to dynamically maintain the steady-state distribution for content visiting probability and achieve the purpose of defense. The experimental results show that the proposed scheme can achieve higher request hit ratio and smaller latency for false locality content pollution attack than the CacheShield approach and the baseline approach where no mitigation approach is applied.

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

Anomaly Detection using Combination of Motion Features (움직임 특징 조합을 통한 이상 행동 검출)

  • Jeon, Minseong;Cheoi, Kyung Joo
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.3
    • /
    • pp.348-357
    • /
    • 2018
  • The topic of anomaly detection is one of the emerging research themes in computer vision, computer interaction, video analysis and monitoring. Observers focus attention on behaviors that vary in the magnitude or direction of the motion and behave differently in rules of motion with other objects. In this paper, we use this information and propose a system that detects abnormal behavior by using simple features extracted by optical flow. Our system can be applied in real life. Experimental results show high performance in detecting abnormal behavior in various videos.

Simulation of Electro-optical Properties of IPS-LCDs and VA-LCOs Considering Flow Effect (흐름효과를 고려한 IPS-LCDs, VA-LCDs의 전기광학적 특성 시뮬레이션)

  • Kim, Hoon-Bae;Park, Woo-Sang
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.20 no.2
    • /
    • pp.167-172
    • /
    • 2007
  • In this paper, we analyzed the molecular behavior of IPS-LCDs and VA-LCDs by using numerical simulation. The numerical simulation was performed on the basis of Ericksen-Leslie continuum theory. To improve the accuracy of the calculation, we considered fluid balance equation and director balance equation at the same time. thus, we calculated the flow effect for both switching on and off states. As the results of simulation, we confirmed abnormal twist in IPS-LCDs and fast molecular behavior in VA-LCDs which could influence response time.

Abnormal Crowd Behavior Detection using a Modified Feature Map (특징점 맵 보정을 통한 군중 이상행동패턴 인식 방법)

  • Jung, Sung-Uk;Jee, Hyung-Keun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.252-253
    • /
    • 2015
  • 군중의 이상행동을 검출하는 것은 군중 모니터링, 보안 및 CRM 시스템의 관점에서 중요한 요소 중의 하나이다. 기존의 방법은 대다수가 옵티컬플로우를 기반으로한 검출방법으로 객체가 움직이지 않는 경우에는 객체로 인식할 수 없는 문제점이 생긴다. 또한, 많은 데이터량을 처리하기 때문에 실시간성이 보장되지 않는다는 단점이 있다. 이를 극복하기 위해서, 본 논문에서는 특징점 맵 보정과 분포분석을 통한 군중의 밀집과 대피하는 현상을 검출하는 방법을 제안한다. 먼저, 군중에서 옵티컬플로우 기반으로 움직이는 FAST 특징점을 추출하고 추출된 특징점의 분포에따라 특징점맵을 복원한다. 복원된 특징점 맵과 특징점의 분포에 기반하여 군중의 이상정도를 결정하게 된다. PETS2009 데이터베이스를 사용하여 결과를 측정하였다.

  • PDF

An Implementation of Control Command Acquisition System for Analysis of Abnormal Behavior (이상행위 분석을 위한 제어명령 수집 시스템 구현)

  • Lee, Jin-Heung;An, Pa-Ul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.137-140
    • /
    • 2019
  • 본 논문에서는 자동 제어 시스템의 이상행위를 분석하기 위하여 MODBUS 프로토콜 기반의 제어 명령을 수집 분류하여 등록된 화이트리스트 기반으로 이를 탐지하는 시스템을 구현하였다. 구현 시스템은 자동 제어 시스템 기반으로 다양한 생산설비를 동작시키는 스마트팩토리 시스템을 비롯하여 국가기간 산업에 활용 가능하며, 생산설비의 이상 작동을 확인하기 위하여 생산설비의 동작 신호를 주기적으로 수집 분석하여 정상적인 작업형태에서 벗어나는 이상 작업을 판단할 수 있도록 구성하였다. 또한, 소형화된 공장 자동화 설비를 구성하여 실제 스마트팩토리 환경에서 제어명령을 수집하고, 수집된 신호로부터 이상 작동을 검출하는 제안 시스템의 구현 결과를 설명한다.

  • PDF

Advanced insider threat detection model to apply periodic work atmosphere

  • Oh, Junhyoung;Kim, Tae Ho;Lee, Kyung Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1722-1737
    • /
    • 2019
  • We developed an insider threat detection model to be used by organizations that repeat tasks at regular intervals. The model identifies the best combination of different feature selection algorithms, unsupervised learning algorithms, and standard scores. We derive a model specifically optimized for the organization by evaluating each combination in terms of accuracy, AUC (Area Under the Curve), and TPR (True Positive Rate). In order to validate this model, a four-year log was applied to the system handling sensitive information from public institutions. In the research target system, the user log was analyzed monthly based on the fact that the business process is processed at a cycle of one year, and the roles are determined for each person in charge. In order to classify the behavior of a user as abnormal, the standard scores of each organization were calculated and classified as abnormal when they exceeded certain thresholds. Using this method, we proposed an optimized model for the organization and verified it.