• 제목/요약/키워드: Abnormal value detection

검색결과 94건 처리시간 0.02초

Current advances in detection of abnormal egg: a review

  • Jun-Hwi, So;Sung Yong, Joe;Seon Ho, Hwang;Soon Jung, Hong;Seung Hyun, Lee
    • Journal of Animal Science and Technology
    • /
    • 제64권5호
    • /
    • pp.813-829
    • /
    • 2022
  • Internal and external defects of eggs should be detected to prevent cross-contamination of intact eggs by abnormal eggs during storage. Emerging detection technologies for abnormal eggs were introduced as an alternative to human inspection. The advanced technologies could rapidly detect abnormal eggs. Abnormal egg detection technologies using acoustic response, machine vision, and spectroscopy have been commercialized in the poultry industry. Non-destructive egg quality assessment methods meanwhile could preserve the value of eggs and improve detection efficiency. In order to improve detection efficiency, it is essential to select a proper algorithm for classifying the types of abnormal eggs. This review deals with the performance of the detection technologies for various types of abnormal eggs in recently published resources. In addition, the discriminant methods and detection algorithms of abnormal eggs reported in the published literature were investigated. Although the majority of the studies were conducted on a laboratory scale, the developed detection technologies for internal and external defects in eggs were technically feasible to obtain the excellent detection accuracy. To apply the developed detection technologies to the poultry industry, it is necessary to achieve the detection rates required from the industry.

마이크로 콤퓨터를 이용한 뇌파 스파이크의 검출에 관한 연구 (A Microcomputer-based EEG Spike Detection System)

  • 김종현;박상희
    • 대한의용생체공학회:의공학회지
    • /
    • 제2권2호
    • /
    • pp.83-88
    • /
    • 1981
  • A method of detecting abnormal spikes occuring in the EEG of subjects suffering from epilepsy is studied. The detection scheme is to take the first derivative of EEG and to determine if it exceed some threshold value. This study is focused on the digital signal processing for detecting abnormal spikes using microcomputer.

  • PDF

전자무역의 베이지안 네트워크 개선방안에 관한 연구 (A Study on the Improvement of Bayesian networks in e-Trade)

  • 정분도
    • 통상정보연구
    • /
    • 제9권3호
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • 제18권2호
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

통계적 분석기법을 이용한 디젤기관의 고장진단 방법에 관한 연구 (The Fault Diagnosis Method of Diesel Engines Using a Statistical Analysis Method)

  • 김영일;오현경;유영호
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제30권2호
    • /
    • pp.247-252
    • /
    • 2006
  • Almost ship monitoring systems are event driven alarm system which warn only when the measurement value is over or under set point. These kinds of system cannot warn until signal is growing to abnormal state that the signal is over or under the set point. therefore cannot play a role for preventive maintenance system. This paper proposes fault diagnosis method which is able to diagnose and forecast the fault from present operating condition by analyzing monitored signals with present ship monitoring system without any additional sensors. By analyzing the data with high correlation coefficient(CC), correlation level of interactive data can be defined. Knowledge base of abnormal detection can be built by referring level of CC(Fault Detection CC. FDCC) to detect abnormal data among monitored data from monitoring system and knowledge base of diagnosis built by referring CC among interactive data for related machine each other to diagnose fault part.

통계적분석기법을 이용한 디젤기관의 고장진단 방법에 관한 연구 (The Fault Diagnosis Method of Diesel Engines Using a Statistical Analysis Method)

  • 김영일;오현경;천행춘;유영호
    • 한국마린엔지니어링학회:학술대회논문집
    • /
    • 한국마린엔지니어링학회 2005년도 전기학술대회논문집
    • /
    • pp.281-286
    • /
    • 2005
  • Almost ship monitoring systems are event driven alarm system which warn only when the measurement value is over or under set point. These kinds of system cannot warn while signal is growing to abnormal state until the signal is over or under the set point and cannot play a role for preventive maintenance system. This paper proposes fault diagnosis method which is able to diagnose and forecast the fault from present operating condition by analyzing monitored signals with present ship monitoring system without additional sensors. By analyzing this data having high correlation coefficient(CC), correlation level of interactive data can be understood. Knowledge base of abnormal detection can be built by referring level of CC(Fault Detection CC, FDCC) to detect abnormal data among monitored data from monitoring system and knowledge base of diagnosis built by referring CC among interactive data for related machine each other to diagnose fault part.

  • PDF

시계열 모델 기반 트래픽 이상 징후 탐지 기법에 관한 연구 (A Study on Traffic Anomaly Detection Scheme Based Time Series Model)

  • 조강홍;이도훈
    • 한국통신학회논문지
    • /
    • 제33권5B호
    • /
    • pp.304-309
    • /
    • 2008
  • 본 논문에서는 시계열 예측 모델을 이용하여 웡 또는 바이러스 등과 같은 공격 트래픽에 의해 네트워크상에 발생할 수 있는 트래픽 이상 징후를 탐지할 수 있는 예측 모델 기반 트래픽 이상 징후 탐지 기법을 제안한다. 제안 기법은 비교적 정확한 예측모델로 알려져 있는 ARIMA 모델을 이용하였고 이상 징후 여부를 확률값으로 변화하여 확률 임계값에 따라 이상 징후를 탐지하도록 하여 그 성능을 극대화할 수 있도록 하였다. 이를 위해 제안 기법을 네트워크상에 발생시킨 웜과 같은 비정상 공격 트래픽을 포함한 전체 트래픽과 웹 트래픽에 적용하여 트래픽의 이상 징후를 신뢰성 있는 수준에서 탐지함을 보여주었다. 이 기법을 네트워크 기반의 침입탐지시스템에 적용할 강제 큰 효과 가져올 수 있을 것이다.

산업제어시스템에서 앙상블 순환신경망 모델을 이용한 비정상 탐지 (Abnormal Detection for Industrial Control Systems Using Ensemble Recurrent Neural Networks Model)

  • 김효석;김용민
    • 정보보호학회논문지
    • /
    • 제31권3호
    • /
    • pp.401-410
    • /
    • 2021
  • 최근 산업제어시스템은 인터넷에 연결하지 않은 폐쇄적 상태로 운영하는 과거와 달리 원격지에서 데이터를 확인하고 시스템 유지보수를 위해서 개방적 통합적인 스마트한 환경으로 변화하고 있다. 반면에 상호연결성이 증가하는 만큼 산업제어시스템을 대상으로 사이버 공격이 증가함에 따라 산업 공정의 비정상 탐지를 위한 다양한 연구가 진행되고 있다. 산업 공정의 결정적 규칙적인 점을 고려하여 정상데이터만을 학습시킨 탐지 모델의 결과 값과 실제 값을 비교해서 비정상 여부를 판별하는 것이 적절하다고 할 수 있다. 본 논문에서는 HAI 데이터셋 20.07과 21.03을 이용하며, 순환신경망에 게이트 구조가 적용된 GRU 알고리즘으로 서로 다른 타임 스텝을 적용한 모델을 결합하여 앙상블 모델을 생성한다. 그리고 다양한 성능평가 분석을 통해 단일 모델과 앙상블 순환신경망 모델의 탐지 성능을 비교하였으며 제안하는 모델이 산업제어시스템에서 비정상 탐지하는데 더욱 적합한 것으로 확인하였다.

Mobile Ad - hoc Network에서 CP - SVM을 이용한 침입탐지 (Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권2호
    • /
    • pp.41-47
    • /
    • 2012
  • MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • 한국멀티미디어학회논문지
    • /
    • 제10권12호
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF