• Title/Summary/Keyword: Detection Rules

Search Result 317, Processing Time 0.027 seconds

Design of Fuzzy System for Decision of Arrhythmia using Wavelet Coefficients (웨이브렛 계수를 이용한 부정맥 판정용 퍼지시스템 설계)

  • Kim, Min-Soo;Seo, Hee-Don
    • Journal of Sensor Science and Technology
    • /
    • v.11 no.4
    • /
    • pp.230-238
    • /
    • 2002
  • In this paper, we designed a fuzzy system using the wavelet coefficients to detection the PVCs effectively and to increase the accuracy of decision of the arrhythmia. In the proposed Fuzzy system, the QRS complex of ECG signal is divided into 6th level frequence bands by wavelet transform using Haar wavelet. The MIT/BIH database for the source of input signal is used in order to evaluate the performance of the proposed system. From the simulation results, the decision of membership functions for PVCs and heart rates by using Fuzzy rules, we detected the abnormal values effectively by application of leaned from neural network and we also found results in classification ratio of 95% the decision of arrhythmia.

Realtime Monitoring System using AJAX + XML (AJAX+XML 기반의 모니터링 시스템)

  • Choi, Yun Jeong;Park, Seung Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.39-49
    • /
    • 2009
  • Nowadays, according to rapid development of computing environments, information processing and analysis system are very interesting research area. As a viewpoint of data preparation-processing-analysis in knowledge technology, the goal of automated information system is to satisfy high reliability and confidence and to minimize of human-administrator intervention. In addition, we expect the system which can deal with problem and abnormal error effectively as a fault detection and fault tolerance. In this paper, we design a monitoring system as follows. A productive monitoring information from various systems has unstructured forms and characteristics and crawls informative data by conditions and gathering rules. For representing of monitering information which requested by administrator, running-status can be able to check dynamically and systematic like connection/closed status in real-time. Our proposed system can easily correct and processing for monitoring information from various type of server and support to make objective judgement and analysis of administrator under operative target of information system. We implement semi-realtime monitering system using AJAX technology for dynamic browsing of web information and information processing using XML and XPATH. We apply our system to SMS server for checking running status and the system shows that has high utility and reliability.

Fault Detection, Diagnosis, and Optimization of Wafer Manufacturing Processes utilizing Knowledge Creation

  • Bae Hyeon;Kim Sung-Shin;Woo Kwang-Bang;May Gary S.;Lee Duk-Kwon
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.3
    • /
    • pp.372-381
    • /
    • 2006
  • The purpose of this study was to develop a process management system to manage ingot fabrication and improve ingot quality. The ingot is the first manufactured material of wafers. Trace parameters were collected on-line but measurement parameters were measured by sampling inspection. The quality parameters were applied to evaluate the quality. Therefore, preprocessing was necessary to extract useful information from the quality data. First, statistical methods were used for data generation. Then, modeling was performed, using the generated data, to improve the performance of the models. The function of the models is to predict the quality corresponding to control parameters. Secondly, rule extraction was performed to find the relation between the production quality and control conditions. The extracted rules can give important information concerning how to handle the process correctly. The dynamic polynomial neural network (DPNN) and decision tree were applied for data modeling and rule extraction, respectively, from the ingot fabrication data.

Geometrical Building Analysis for Outdoor Environment Understanding of Autonomous Navigation Robot (자율주행 로봇의 외부환경 이해를 위한 기하학적인 빌딩 분석)

  • Kim, Dae-Nyeon;Trinh, Hoang-Hon;Jo, Kang-Hyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.3
    • /
    • pp.277-285
    • /
    • 2010
  • This paper describes an approach to analyze geometrical information of building images for understanding outdoor environment of autonomous navigation robot. Line segments and color information are used to classily a building with the other objects such as sky, trees, and roads. The line segments and their two neighboring regions are extracted from detected edges in image. The model of line segment (MLS) consists of color information of neighbor regions. This model rules out the line segments of non-building face. A building face converges into dominant vanishing points (DVPs) which include one vertical point and one of five horizontal points in maximum. The intersection of vertical and horizontal lines creates a facet of building. The geometrical characteristics such as the center coordinates, area, aspect ratio and aligned coexistence are used for extracting the windows in the building facet. In experiments, 150 building faces and 1607 windows were detected from the database of outdoor environment. We found that this result shows 94.46% detection rate. These experimental images were all taken in Ulsan metropolitan city in Korea under difference of viewpoints, daytime, camera system and weather condition.

Anomaly Detection using Temporal Association Rules and Classification (시간연관규칙과 분류규칙을 이용한 비정상행위 탐지 기법)

  • Lee, Hohn-Gyu;Lee, Yang-Woo;Kim, Lyong;Seo, Sung-Bo;Ryu, Keun-Ho;Park, Jin-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1579-1582
    • /
    • 2003
  • 점차 네트워크상의 침입 시도가 증가되고 다변화되어 침입탐지에 많은 어려움을 주고 있다. 시스템에 새로운 침입에 대한 탐지능력과 다량의 감사데이터의 효율적인 분석을 위해 데이터마이닝 기법이 적용된다. 침입탐지 방법 중 비정상행위 탐지는 모델링된 정상행위에서 벗어나는 행위들을 공격행위로 간주하는 기법이다. 비정상행위 탐지에서 정상행위 모델링을 하기 위해 연관규칙이나 빈발에피소드가 적용되었다. 그러나 이러한 기법들에서는 시간요소를 배제하거나 패턴들의 발생순서만을 다루기 때문에 정확하고 유용한 정보를 제공할 수 없다. 따라서 이 논문에서는 이 문제를 해결할 수 있는 시간연관규칙과 분류규칙을 이용한 비정상행위 탐지 모델을 제안하였다. 즉, 발생되는 패턴의 주기성과 달력표현을 이용, 유용한 시간지식표현을 갖는 시간연관규칙을 이용해 정상행위 프로파일을 생성하였고 이 프로파일에 의해 비정상행위로 간주되는 규칙들을 발견하고 보다 정확한 비정상행위 판별 여부를 결정하기 위해서 분류기법을 적용하였다.

  • PDF

Link Adaptation and Selection Method for OFDM Based Wireless Relay Networks

  • Can, Basak;Yomo, Hiroyuki;Carvalho, Elisabeth De
    • Journal of Communications and Networks
    • /
    • v.9 no.2
    • /
    • pp.118-127
    • /
    • 2007
  • We propose a link adaptation and selection method for the links constituting an orthogonal frequency division multiplexing (OFDM) based wireless relay network. The proposed link adaptation and selection method selects the forwarding, modulation, and channel coding schemes providing the highest end-to-end throughput and decides whether to use the relay or not. The link adaptation and selection is done for each sub-channel based on instantaneous signal to interference plus noise ratio (SINR) conditions in the source-to-destination, source-to-relay and relay-to-destination links. The considered forwarding schemes are amplify and forward (AF) and simple adaptive decode and forward (DF). Efficient adaptive modulation and coding decision rules are provided for various relaying schemes. The proposed end-to-end link adaptation and selection method ensures that the end-to-end throughput is always larger than or equal to that of transmissions without relay and non-adaptive relayed transmissions. Our evaluations show that over the region where relaying improves the end-to-end throughput, the DF scheme provides significant throughput gain over the AF scheme provided that the error propagation is avoided via error detection techniques. We provide a frame structure to enable the proposed link adaptation and selection method for orthogonal frequency division multiple access (OFDMA)-time division duplex relay networks based on the IEEE 802.16e standard.

A Covariance-matching-based Model for Musical Symbol Recognition

  • Do, Luu-Ngoc;Yang, Hyung-Jeong;Kim, Soo-Hyung;Lee, Guee-Sang;Dinh, Cong Minh
    • Smart Media Journal
    • /
    • v.7 no.2
    • /
    • pp.23-33
    • /
    • 2018
  • A musical sheet is read by optical music recognition (OMR) systems that automatically recognize and reconstruct the read data to convert them into a machine-readable format such as XML so that the music can be played. This process, however, is very challenging due to the large variety of musical styles, symbol notation, and other distortions. In this paper, we present a model for the recognition of musical symbols through the use of a mobile application, whereby a camera is used to capture the input image; therefore, additional difficulties arise due to variations of the illumination and distortions. For our proposed model, we first generate a line adjacency graph (LAG) to remove the staff lines and to perform primitive detection. After symbol segmentation using the primitive information, we use a covariance-matching method to estimate the similarity between every symbol and pre-defined templates. This method generates the three hypotheses with the highest scores for likelihood measurement. We also add a global consistency (time measurements) to verify the three hypotheses in accordance with the structure of the musical sheets; one of the three hypotheses is chosen through a final decision. The results of the experiment show that our proposed method leads to promising results.

Pattern Generation Technique for Network-based Intrusion Detection using Association Rules (연관 규칙을 이용한 네트워크 기반 침입 탐지 패턴생성 기술)

  • Soh, Jin;Lee, Sang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.619-621
    • /
    • 2002
  • 네트워크 기반 컴퓨터 시스템은 현대사회에 있어서 매우 중요한 역할을 담당하고 있기 때문에 이들은 정보 범죄들로부터 안정적이면서 효율적인 환경을 제공하는 것은 매우 중요한 일이다. 현재의 침입탐지 시스템은 네트워크 상에서 지속적으로 처리되는 대량의 패킷에 대하여 탐지속도가 떨어지고, 새로운 침입유형에 대한 대응방법이나 인지능력에도 한계가 있기 때문이다. 따라서 다양한 트래픽 속에서 탐지율을 높이고 탐지속도를 개선하기 위한 방안이 필요하다. 본 논문에서는 침입탐지 능력을 개선하기 위해 먼저, 광범위한 침입항목들에 대한 탐지 적용기술을 학습하고, 데이터 마이닝 기법을 이용하여 침입패턴 인식능력 및 새로운 패턴을 생성하는 적용기술을 제안하고자 한다. 침입 패턴생성을 위해 각 네트워크에 돌아다니는 관련된 패킷 정보와 호스트 세션에 기록되어진 자료를 필터링하고, 각종 로그 화일을 추출하는 프로그램들을 활용하여 침입과 일반적인 행동들을 분류하여 규칙들을 생성하였다. 마이닝 기법으로는 학습된 항목들에 대한 연관 규칙을 찾기 위한 연역적 알고리즘을 이용하였다. 또한, 추출 분석된 자료는 리눅스기반의 환경 하에서 다양하게 모아진 네트워크 로그파일들을 본 논문에서 제안한 방법에 따라 적용한 결과이다.

  • PDF

Collaborative Spectrum Sensing with Correlated Local Decisions (상관된 국부 결정을 사용하는 협력 스펙트럼 감지)

  • Lim, Chang-Heon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8C
    • /
    • pp.713-719
    • /
    • 2010
  • Collaborative spectrum sensing has been found to be an effective means for detecting the activity of primary users in a fading environment. Most previous works on collaborative spectrum sensing are based on the assumption that the local spectrum sensing decisions of secondary users are statistically independent. However, it may not hold in some practical situations. In this paper, we consider a cognitive radio network where the local spectrum sensing decisions of secondary users are statistically correlated with the same level of correlation if they are next to each other in location and statistically independent, otherwise. Then, for the system, we analyzed the performance of the collaborative spectrum sensing with the AND and the OR fusion rules and found that the scheme with the AND fusion rule performs better than the one with OR fusion rule when the degree of correlation is significant.

Stackelberg Game between Multi-Leader and Multi-Follower for Detecting Black Hole and Warm Hole Attacks In WSN

  • S.Suganthi;D.Usha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.159-167
    • /
    • 2023
  • Objective: • To detect black hole and warm hole attacks in wireless sensor networks. • To give a solution for energy depletion and security breach in wireless sensor networks. • To address the security problem using strategic decision support system. Methods: The proposed stackelberg game is used to make the spirited relations between multi leaders and multi followers. In this game, all cluster heads are acts as leaders, whereas agent nodes are acts as followers. The game is initially modeled as Quadratic Programming and also use backtracking search optimization algorithm for getting threshold value to determine the optimal strategies of both defender and attacker. Findings: To find optimal payoffs of multi leaders and multi followers are based on their utility functions. The attacks are easily detected based on some defined rules and optimum results of the game. Finally, the simulations are executed in matlab and the impacts of detection of black hole and warm hole attacks are also presented in this paper. Novelty: The novelty of this study is to considering the stackelberg game with backtracking search optimization algorithm (BSOA). BSOA is based on iterative process which tries to minimize the objective function. Thus we obtain the better optimization results than the earlier approaches.