• Title/Summary/Keyword: Detection Methodology

Search Result 605, Processing Time 0.027 seconds

Structural damage detection in continuum structures using successive zooming genetic algorithm

  • Kwon, Young-Doo;Kwon, Hyun-Wook;Kim, Whajung;Yeo, Sim-Dong
    • Structural Engineering and Mechanics
    • /
    • v.30 no.2
    • /
    • pp.135-146
    • /
    • 2008
  • This study utilizes the fine-tuning and small-digit characteristics of the successive zooming genetic algorithm (SZGA) to propose a method of structural damage detection in a continuum structure, where the differences in the natural frequencies of a structure obtained by experiment and FEM are compared and minimized using an assumed location and extent of structural damage. The final methodology applied to the structural damage detection is a kind of pseudo-discrete-variable-algorithm that counts the soundness variables as one (perfectly sound) if they are above a certain standard, such as 0.99. This methodology is based on the fact that most well-designed structures exhibit failures at some critical point due to manufacturing error, while the remaining region is free of damage. Thus, damage of 1% (depending on the given standard) or less can be neglected, and the search concentrated on finding more serious failures. It is shown that the proposed method can find out the exact structural damage of the monitored structure and reduce the time and amount of computation.

An Implementation Scheme for the Detection System of RFID Defective Tags Using LabVIEW OOP

  • Jung, Deok-Gil;Jung, Min-Po;Cho, Hyuk-Gyu;Lho, Young-Uhg
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.1
    • /
    • pp.21-26
    • /
    • 2011
  • In this paper, we suggest the object-oriented methodology for the design and implementation scheme for the program development in the application of control and instrumentation such as the detection system of RFID defective tags which needs the embedded programming. We apply the design methodology of UML in the system design phase, and suggest the implementation scheme of LabVIEW programs using LVOOP(LabVIEW Object Oriented Programming)in which make it possible to write the object-oriented programming. We design the class diagram and the sequence diagram using UML, and write the classes of LVOOP from the designed class diagram and the main VI from the sequence diagram, respectively. We show that it is possible to develop the embedded programs such as the RFID application through the implementation example of the detection system of RFID defective tags in this paper. And, we obtain the advantages based on the object-oriented design and implementation using the LVOOP approach such as the development of LabVIEW programs by adding the classes and the concept of object of the object-oriented language to LabVIEW.

Role of Machine Learning in Intrusion Detection System: A Systematic Review

  • Alhasani, Areej;Al omrani, Faten;Alzahrani, Taghreed;alFahhad, Rehab;Alotaibi, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.155-162
    • /
    • 2022
  • Over the last 10 years, there has been rapid growth in the use of Machine Learning (ML) techniques to automate the process of intrusion threat detection at a scale never imagined before. This has prompted researchers, software engineers, and network specialists to rethink the applications of machine ML techniques particularly in the area of cybersecurity. As a result there exists numerous research documentations on the use ML techniques to detect and block cyber-attacks. This article is a systematic review involving the identification of published scholarly articles as found on IEEE Explore and Scopus databases. The articles exclusively related to the use of machine learning in Intrusion Detection Systems (IDS). Methods, concepts, results, and conclusions as found in the texts are analyzed. A description on the process taken in the identification of the research articles included: First, an introduction to the topic which is followed by a methodology section. A table is used to list identified research articles in the form of title, authors, methodology, and key findings.

Development of a Methodology for Detecting Intentional Aggressive Driving Events Using Multi-agent Driving Simulations (Multi-agent 주행 시뮬레이션을 이용한 운전자 주행패턴을 반영한 공격운전 검지기법 개발)

  • KIM, Yunjong;OH, Cheol;CHOE, Byongho;CHOI, Saerona;KIM, Kiyong
    • Journal of Korean Society of Transportation
    • /
    • v.36 no.1
    • /
    • pp.51-65
    • /
    • 2018
  • Intentional aggressive driving (IAD) is defined as a hazardous driving event that the aggressive driver intentionally threatens neighbor drivers with abrupt longitudinal and lateral maneuvering. This study developed a methodology for detecting IAD events based on the analysis of interactions between aggressive driver and normal driver. Three major aggressive events including rear-close following, side-close driving, and sudden deceleration were analyzed to develop the algorithm. Then, driving simulation experiments were conducted using a multi-agent driving simulator to obtain data to be used for the development of the detection algorithm. In order to detect the driver's intention to attack, a relative evaluation index (Erratic Driving Index, EDI) reflecting the driving pattern was derived. The derived IAD event detection algorithm utilizes both the existing absolute detection method and the relative detection method. It is expected that the proposed methodology can be effectively used for detecting IAD events in support of in-vehicle data recorder technology in practice.

An Exploratory Study of Collective E-Petitions Estimation Methodology Using Anomaly Detection: Focusing on the Voice of Citizens of Changwon City (이상탐지 활용 전자집단민원 추정 방법론에 관한 탐색적 연구: 창원시 시민의 소리 사례를 중심으로)

  • Jeong, Ha-Yeong
    • Informatization Policy
    • /
    • v.26 no.4
    • /
    • pp.85-106
    • /
    • 2019
  • Recently, there have been increasing cases of collective petitions filed in the electronic petitions system. However, there is no efficient management system, raising concerns on side effects such as increased administrative workload and mass production of social conflicts. Aimed at suggesting a methodology for estimating electronic collective petitions using anomaly detection and corpus linguistics-based content analysis, this study conducted the followings: i) a theoretical review of the concept of collective petitions, ii) estimation of electronic collective petitions using anomaly detection based on nonparametric unsupervised learning, iii) a content similarity analysis on petitions using n-gram cosine angle distance, and iv) a case study on the Voice of Citizens of Changwon City, through which the utility of the proposed methodology, policy implications and future tasks were reviewed.

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.

Analysis of detection probability of torpedo using statistical metamodel (통계적 메타모델을 이용한 어뢰의 탐지확률 분석)

  • 허성필
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.147-150
    • /
    • 1996
  • A homing torpedo's performance can be expressed a function of many variables, i.e. technical and tactical variables. When designing a homing torpedo, these variables have to be decided upon. The system effectiveness of a homing torpedo can be determined by analyzing of these variables. This paper describes a procedure of simulation metamodelling using a Factor Analysis methodology. A simulation model was used in order to obtain the data base for analyzing detection probability of torpedo. By analyzing the main and interaction effects these variables on the analysis of detection probability, we will show the importance of certain variables, of a homing torpedo.

  • PDF

Monitoring and Control of Turing Chatter using Sound Pressure and Stability Control Methodology (음압신호와 안정도제어법을 이용한 선삭작업에서의 채터 감시 및 제어)

  • 이성일
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.6 no.4
    • /
    • pp.101-107
    • /
    • 1997
  • In order to detect and suppress chatter in turning process, a stability control methodology was studied through manipulation of spindle speeds regarding to chatter frequencies, The chatter frequency was identified by monitoring and signal processing of sound pressure during turing on a lathe. The stability control methodology can select stable spindle speeds without knowing a prior knowledge of machine compliances and cutting dynamics. Reliability of the developed stability control methodology was verified through turing experiments on an engine lathe. Experimental results show that a microphone is an excellent sensor for chatter detection and control .

  • PDF

A Computational Efficient General Wheel-Rail Contact Detection Method

  • Pombo Joao;Ambrosio Jorge
    • Journal of Mechanical Science and Technology
    • /
    • v.19 no.spc1
    • /
    • pp.411-421
    • /
    • 2005
  • The development and implementation of an appropriate methodology for the accurate geometric description of track models is proposed in the framework of multibody dynamics and it includes the representation of the track spatial geometry and its irregularities. The wheel and rail surfaces are parameterized to represent any wheel and rail profiles obtained from direct measurements or design requirements. A fully generic methodology to determine, online during the dynamic simulation, the coordinates of the contact points, even when the most general three dimensional motion of the wheelset with respect to the rails is proposed. This methodology is applied to study specific issues in railway dynamics such as the flange contact problem and lead and lag contact configurations. A formulation for the description of the normal contact forces, which result from the wheel-rail interaction, is also presented. The tangential creep forces and moments that develop in the wheel-rail contact area are evaluated using : Kalker linear theory ; Heuristic force method ; Polach formulation. The methodology is implemented in a general multibody code. The discussion is supported through the application of the methodology to the railway vehicle ML95, used by the Lisbon metro company.