• Title/Summary/Keyword: abnormal behavior detect

Search Result 71, Processing Time 0.028 seconds

Comparison of Frequency and Stay Time between Normal and Abnormal Elimination Behavior of Cats Using a Litter Box with Automatic Sensor

  • Ji-Woo Shin;Sun-Woo Han;Soon-Hak Kweon;Myungseok Kang;Jong-Hyuk Kim;Chung-Gwang Choi;Joon-Seok Chae
    • Journal of Veterinary Clinics
    • /
    • v.41 no.2
    • /
    • pp.71-78
    • /
    • 2024
  • Changes in elimination behavior, including urination and defecation, are common clinical signs of numerous disorders in cats. Therefore, this study attempted to automatically measure the elimination behavior of cats using the litter box and develop an early warning system for the guardian in case of abnormalities. To construct an early warning system for abnormal changes through cat elimination behavior, it consisted of a litter box, an automatic sensor for data collection and data wifi transmission, a server for data analysis, and a mobile phone app for result transmission and early warning. To establish the reference interval (RI), the elimination behavior was monitored for more than 2 weeks using a motion sensor within a litter box in 37 healthy cats and 19 diseased cats. The data were expressed as daily total visits, daily total stay duration, average stay duration per elimination, weekly total visits, and weekly total stay duration. Healthy cats showed median daily total visits of 3 times/day (RI 1.0-7.0) and daily total stay duration of 192 s/day (RI 8.0-452.0). For weekly data, the median total visits were 20 times/week (RI 3.0-35.25) and the median total stay duration was 1,147 s/week (RI 80.0-2,249.5). The average stay duration per elimination was 59 s/elimination (RI 4.67-132.0). Diseased cats showed more frequent elimination behavior than healthy cats (p < 0.001). Otherwise, for each elimination, diseased cats had shorter stay durations than healthy cats (p < 0.001). This study established the RIs of elimination behavior parameters (frequency and duration) in healthy cats. The present study might help guardians and veterinarians detect changes in elimination behaviors in diseased cats at an early stage.

A Study on a Violence Recognition System with CCTV (CCTV에서 폭력 행위 감지 시스템 연구)

  • Shim, Young-Bin;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.25-32
    • /
    • 2015
  • With the increased frequency of crime such as assaults and sexual violence, the reliance on CCTV in arresting criminals has increased as well. However, CCTV, which should be monitored by human labor force at all times, has limits in terms of budget and man-power. Thereby, the interest in intelligent security system is growing nowadays. Expanding the techniques of an objects behavior recognition in previous studies, we propose a system to detect forms of violence between 2~3 objects from images obtained in CCTV. It perceives by detecting the object with the difference operation and the morphology of the background image. The determinant criteria to define violent behaviors are suggested. Moreover, provable decision metric values through measurements of the number of violent condition are derived. As a result of the experiments with the threshold values, showed more than 80% recognition success rate. A future research for abnormal behaviors recognition system in a crowded circumstance remains to be developed.

Development of Statistical/Probabilistic-Based Adaptive Thresholding Algorithm for Monitoring the Safety of the Structure (구조물의 안전성 모니터링을 위한 통계/확률기반 적응형 임계치 설정 알고리즘 개발)

  • Kim, Tae-Heon;Park, Ki-Tae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.4
    • /
    • pp.1-8
    • /
    • 2016
  • Recently, buildings tend to be large size, complex shape and functional. As the size of buildings is becoming massive, the need for structural health monitoring(SHM) technique is ever-increasing. Various SHM techniques have been studied for buildings which have different dynamic characteristics and are influenced by various external loads. Generally, the visual inspection and non-destructive test for an accessible point of structures are performed by experts. But nowadays, the system is required which is online measurement and detect risk elements automatically without blind spots on structures. In this study, in order to consider the response of non-linear structures, proposed a signal feature extraction and the adaptive threshold setting algorithm utilized to determine the abnormal behavior by using statistical methods such as control chart, root mean square deviation, generalized extremely distribution. And the performance of that was validated by using the acceleration response of structures during earthquakes measuring system of forced vibration tests and actual operation.

A Study on the Modeling and Diagnostics in Drilling Operation (드릴링 작업의 모델링과 진단법에 관한 연구)

  • Yoon, M.C.
    • Journal of Power System Engineering
    • /
    • v.2 no.2
    • /
    • pp.73-80
    • /
    • 1998
  • The identification of drilling joint dynamics which consists of drilling and structural dynamics and the on-line time series detection of malfunction process is substantial not only for the investigation of the static and dynamic characteristics but also for the analytic realization of diagnostic and control systems in drilling. Therefore, We have discussed on the comparative assessment of two recursive time series modeling algorithms that can represent the drilling operation and detect the abnormal geometric behaviors in precision roundshape machining such as turning, drilling and boring in precision diemaking. For this purpose, simulation and experimental work were performed to show the malfunctional behaviors for drilling operation. For this purpose, a new two recursive approach (Recursive Extended Instrument Variable Method : REIVM, Recursive Least Square Method : RLSM) may be adopted for the on-line system identification and monitoring of a malfunction behavior of drilling process, such as chipping, wear, chatter and hole lobe waviness.

  • PDF

Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM (Mobile Ad - hoc Network에서 CP - SVM을 이용한 침입탐지)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.41-47
    • /
    • 2012
  • MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.

Structural novelty detection based on sparse autoencoders and control charts

  • Finotti, Rafaelle P.;Gentile, Carmelo;Barbosa, Flavio;Cury, Alexandre
    • Structural Engineering and Mechanics
    • /
    • v.81 no.5
    • /
    • pp.647-664
    • /
    • 2022
  • The powerful data mapping capability of computational deep learning methods has been recently explored in academic works to develop strategies for structural health monitoring through appropriate characterization of dynamic responses. In many cases, these studies concern laboratory prototypes and finite element models to validate the proposed methodologies. Therefore, the present work aims to investigate the capability of a deep learning algorithm called Sparse Autoencoder (SAE) specifically focused on detecting structural alterations in real-case studies. The idea is to characterize the dynamic responses via SAE models and, subsequently, to detect the onset of abnormal behavior through the Shewhart T control chart, calculated with SAE extracted features. The anomaly detection approach is exemplified using data from the Z24 bridge, a classical benchmark, and data from the continuous monitoring of the San Vittore bell-tower, Italy. In both cases, the influence of temperature is also evaluated. The proposed approach achieved good performance, detecting structural changes even under temperature variations.

Dementia Patient Wandering Behavior and Anomaly Detection Technique through Biometric Authentication and Location-based in a Private Blockchain Environment (프라이빗 블록체인 환경에서 생체인증과 위치기반을 통한 치매환자 배회행동 및 이상징후 탐지 기법)

  • Han, Young-Ae;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.119-125
    • /
    • 2022
  • With the recent increase in dementia patients due to aging, measures to prevent their wandering behavior and disappearance are urgently needed. To solve this problem, various authentication methods and location detection techniques have been introduced, but the security problem of personal authentication and a system that can check indoor and outdoor overall was lacking. In order to solve this problem, various authentication methods and location detection techniques have been introduced, but it was difficult to find a system that can check the security problem of personal authentication and indoor/outdoor overall. In this study, we intend to propose a system that can identify personal authentication, basic health status, and overall location indoors and outdoors by using wristband-type wearable devices in a private blockchain environment. In this system, personal authentication uses ECG, which is difficult to forge and highly personally identifiable, Bluetooth beacon that is easy to use with low power, non-contact and automatic transmission and reception indoors, and DGPS that corrects the pseudorange error of GPS satellites outdoors. It is intended to detect wandering behavior and abnormal signs by locating the patient. Through this, it is intended to contribute to the prompt response and prevention of disappearance in case of wandering behavior and abnormal symptoms of dementia patients living at home or in nursing homes.

Study for Determination of Management Thresholds of Bridge Structural Health Monitoring System based on Probabilistic Method (확률론적 방법에 의한 교량계측시스템의 관리기준치 설정에 관한 연구)

  • Kim, Haeng-Bae;Song, Jae-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.3
    • /
    • pp.103-110
    • /
    • 2016
  • Recently, structural health monitoring system(SHMS) has been appled cable bridges as the effective maintenance tool and the management threshold is considered to assess the status of the bridge in SHMS. The threshold is generally determined by the allowable limit based on design specification because there is no method and standard for threshold calculation. In case of the conventional thresholds, it is difficult to recognize the event, abnormal behavior and gradual damage within the threshold. Therefore, this study reviewed the problem of previous methods and proposed the advanced methodologies based on probabilistic approach for threshold calculation which can be applied to practice work. Gumbel distribution is adopted in order to calculate the threshold for caution and warning states considering the expectations for return periods of 50 and 100 years. The thresholds were individually determined for measurement data and data variation to detect the various abnormal behaviors within allowable range. Finally, it has confirmed that the thresholds by the proposed method is detectable the abnormal behavior of real-time measuring data from SHMS.

Traffic Anomaly Detection for Campus Networks using Fisher Linear Discriminant (Fisher 선형 분류법을 이용한 비정상 트래픽 탐지)

  • Park, Hyun-Hee;Kim, Mee-Joung;Kang, Chul-Hee
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.140-149
    • /
    • 2009
  • Traffic anomaly detection is one of important technology that should be considered in network security and administration. In this paper, we propose an abnormal traffic detection mechanism that includes traffic monitoring and traffic analysis. We develop analytical passive monitoring system called WISE-Mon which can inspect traffic behavior. We establish a criterion by analyzing the characteristics of a traffic training set. To detect abnormal traffic, we derive a hyperplane by using Fisher linear discriminant and chi-square distribution as well as the analyzed characteristics of traffic. Our mechanism can support reliable results for traffic anomaly detection and is compatible to real-time detection. In addition, since the trend of traffic can be changed as time passes, the hyperplane has to be updated periodically to reflect the changes. Accordingly, we consider the self-learning algorithm which reflects the trend of the traffic and so enables to increase the pliability of detection probability. Numerical results are presented to validate the accuracy of proposed mechanism. It shows that the proposed mechanism is reliable and relevant for traffic anomaly detection.

  • PDF

Individual Pig Detection Using Kinect Depth Information (키넥트 깊이 정보를 이용한 개별 돼지의 탐지)

  • Choi, Jangmin;Lee, Jonguk;Chung, Yongwha;Park, Daihee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.319-326
    • /
    • 2016
  • Abnormal situation caused by aggressive behavior of pigs adversely affects the growth of pigs, and comes with an economic loss in intensive pigsties. Therefore, IT-based video surveillance system is needed to monitor the abnormal situations in pigsty continuously in order to minimize the economic demage. In this paper, we propose a new Kinect camera-based monitoring system for the detection of the individual pigs. The proposed system is characterized as follows. 1) The background subtraction method and depth-threshold are used to detect only standing-pigs in the Kinect-depth image. 2) The moving-pigs are labeled as regions of interest. 3) A contour method is proposed and applied to solve the touching-pigs problem in the Kinect-depth image. The experimental results with the depth videos obtained from a pig farm located in Sejong illustrate the efficiency of the proposed method.