• Title/Summary/Keyword: Abnormal value detection

Search Result 94, Processing Time 0.038 seconds

Current advances in detection of abnormal egg: a review

  • Jun-Hwi, So;Sung Yong, Joe;Seon Ho, Hwang;Soon Jung, Hong;Seung Hyun, Lee
    • Journal of Animal Science and Technology
    • /
    • v.64 no.5
    • /
    • pp.813-829
    • /
    • 2022
  • Internal and external defects of eggs should be detected to prevent cross-contamination of intact eggs by abnormal eggs during storage. Emerging detection technologies for abnormal eggs were introduced as an alternative to human inspection. The advanced technologies could rapidly detect abnormal eggs. Abnormal egg detection technologies using acoustic response, machine vision, and spectroscopy have been commercialized in the poultry industry. Non-destructive egg quality assessment methods meanwhile could preserve the value of eggs and improve detection efficiency. In order to improve detection efficiency, it is essential to select a proper algorithm for classifying the types of abnormal eggs. This review deals with the performance of the detection technologies for various types of abnormal eggs in recently published resources. In addition, the discriminant methods and detection algorithms of abnormal eggs reported in the published literature were investigated. Although the majority of the studies were conducted on a laboratory scale, the developed detection technologies for internal and external defects in eggs were technically feasible to obtain the excellent detection accuracy. To apply the developed detection technologies to the poultry industry, it is necessary to achieve the detection rates required from the industry.

A Microcomputer-based EEG Spike Detection System (마이크로 콤퓨터를 이용한 뇌파 스파이크의 검출에 관한 연구)

  • 김종현;박상희
    • Journal of Biomedical Engineering Research
    • /
    • v.2 no.2
    • /
    • pp.83-88
    • /
    • 1981
  • A method of detecting abnormal spikes occuring in the EEG of subjects suffering from epilepsy is studied. The detection scheme is to take the first derivative of EEG and to determine if it exceed some threshold value. This study is focused on the digital signal processing for detecting abnormal spikes using microcomputer.

  • PDF

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

The Fault Diagnosis Method of Diesel Engines Using a Statistical Analysis Method (통계적 분석기법을 이용한 디젤기관의 고장진단 방법에 관한 연구)

  • Kim, Young-Il;Oh, Hyun-Kyung;Yu, Yung-Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.30 no.2
    • /
    • pp.247-252
    • /
    • 2006
  • Almost ship monitoring systems are event driven alarm system which warn only when the measurement value is over or under set point. These kinds of system cannot warn until signal is growing to abnormal state that the signal is over or under the set point. therefore cannot play a role for preventive maintenance system. This paper proposes fault diagnosis method which is able to diagnose and forecast the fault from present operating condition by analyzing monitored signals with present ship monitoring system without any additional sensors. By analyzing the data with high correlation coefficient(CC), correlation level of interactive data can be defined. Knowledge base of abnormal detection can be built by referring level of CC(Fault Detection CC. FDCC) to detect abnormal data among monitored data from monitoring system and knowledge base of diagnosis built by referring CC among interactive data for related machine each other to diagnose fault part.

The Fault Diagnosis Method of Diesel Engines Using a Statistical Analysis Method (통계적분석기법을 이용한 디젤기관의 고장진단 방법에 관한 연구)

  • Kim, Young-Il;Oh, Hyun-Gyeong;Cheon, Hang-Chun;Yu, Yung-Ho
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2005.06a
    • /
    • pp.281-286
    • /
    • 2005
  • Almost ship monitoring systems are event driven alarm system which warn only when the measurement value is over or under set point. These kinds of system cannot warn while signal is growing to abnormal state until the signal is over or under the set point and cannot play a role for preventive maintenance system. This paper proposes fault diagnosis method which is able to diagnose and forecast the fault from present operating condition by analyzing monitored signals with present ship monitoring system without additional sensors. By analyzing this data having high correlation coefficient(CC), correlation level of interactive data can be understood. Knowledge base of abnormal detection can be built by referring level of CC(Fault Detection CC, FDCC) to detect abnormal data among monitored data from monitoring system and knowledge base of diagnosis built by referring CC among interactive data for related machine each other to diagnose fault part.

  • PDF

A Study on Traffic Anomaly Detection Scheme Based Time Series Model (시계열 모델 기반 트래픽 이상 징후 탐지 기법에 관한 연구)

  • Cho, Kang-Hong;Lee, Do-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.304-309
    • /
    • 2008
  • This paper propose the traffic anomaly detection scheme based time series model. We apply ARIMA prediction model to this scheme and transform the value of the abnormal symptom into the probability value to maximize the traffic anomaly symptom detection. For this, we have evaluated the abnormal detection performance for the proposed model using total traffic and web traffic included the attack traffic. We will expect to have an great effect if this scheme is included in some network based intrusion detection system.

Abnormal Detection for Industrial Control Systems Using Ensemble Recurrent Neural Networks Model (산업제어시스템에서 앙상블 순환신경망 모델을 이용한 비정상 탐지)

  • Kim, HyoSeok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.401-410
    • /
    • 2021
  • Recently, as cyber attacks targeting industrial control systems increase, various studies are being conducted on the detection of abnormalities in industrial processes. Considering that the industrial process is deterministic and regular, It is appropriate to determine abnormality by comparing the predicted value of the detection model from which normal data is trained and the actual value. In this paper, HAI Datasets 20.07 and 21.03 are used. In addition, an ensemble model is created by combining models that have applied different time steps to Gated Recurrent Units. Then, the detection performance of the single model and the ensemble recurrent neural networks model were compared through various performance evaluation analysis, and It was confirmed that the proposed model is more suitable for abnormal detection in industrial control systems.

Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM (Mobile Ad - hoc Network에서 CP - SVM을 이용한 침입탐지)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.41-47
    • /
    • 2012
  • MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF