• Title/Summary/Keyword: concept-based detection

Search Result 249, Processing Time 0.023 seconds

Online damage detection using pair cointegration method of time-varying displacement

  • Zhou, Cui;Li, Hong-Nan;Li, Dong-Sheng;Lin, You-Xin;Yi, Ting-Hua
    • Smart Structures and Systems
    • /
    • v.12 no.3_4
    • /
    • pp.309-325
    • /
    • 2013
  • Environmental and operational variables are inevitable concerns by researchers and engineers when implementing the damage detection algorithm in practical projects, because the change of structural behavior could be masked by the conditions in a large extent. Thus, reliable damage detection methods should have a virtue of immunity from environmental and operational variables. In this paper, the pair cointegration method was presented as a novel way to remove the effect of environmental variables. At the beginning, the concept and procedure of this approach were introduced, and then the theoretical formulation and numerical simulations were put forward to illustrate the feasibility. The jump exceeding the control limit in the residual indicates the occurrence of damage, while the direction and magnitude imply the most potential damage location. In addition, the simulation results show that the proposed method has strong ability to resist the noise.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Tree-Pattern-Based Clone Detection with High Precision and Recall

  • Lee, Hyo-Sub;Choi, Myung-Ryul;Doh, Kyung-Goo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.1932-1950
    • /
    • 2018
  • The paper proposes a code-clone detection method that gives the highest possible precision and recall, without giving much attention to efficiency and scalability. The goal is to automatically create a reliable reference corpus that can be used as a basis for evaluating the precision and recall of clone detection tools. The algorithm takes an abstract-syntax-tree representation of source code and thoroughly examines every possible pair of all duplicate tree patterns in the tree, while avoiding unnecessary and duplicated comparisons wherever possible. The largest possible duplicate patterns are then collected in the set of pattern clusters that are used to identify code clones. The method is implemented and evaluated for a standard set of open-source Java applications. The experimental result shows very high precision and recall. False-negative clones missed by our method are all non-contiguous clones. Finally, the concept of neighbor patterns, which can be used to improve recall by detecting non-contiguous clones and intertwined clones, is proposed.

Introduction to a Novel Optimization Method : Artificial Immune Systems (새로운 최적화 기법 소개 : 인공면역시스템)

  • Yang, Byung-Hak
    • IE interfaces
    • /
    • v.20 no.4
    • /
    • pp.458-468
    • /
    • 2007
  • Artificial immune systems (AIS) are one of natural computing inspired by the natural immune system. The fault detection, the pattern recognition, the system control and the optimization are major application area of artificial immune systems. This paper gives a concept of artificial immune systems and useful techniques as like the clonal selection, the immune network theory and the negative selection. A concise survey on the optimization problem based on artificial immune systems is generated. The overall performance of artificial immune systems for the optimization problem is discussed.

The Weld Defects Expression Method by the Concept of Segment Splitting Method and Mean Distance (분할법과 평균거리 개념에 의한 용접 결함 표현 방법)

  • Lee, Jeong-Ick;Koh, Byung-Kab
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.16 no.2
    • /
    • pp.37-43
    • /
    • 2007
  • In this paper, laser vision sensor is used to detect some defects any $co_{2}$ welded specimen in hardware. But, as the best expression of defects of welded specimen, the concept of segment splitting method and mean distance are introduced in software. The developed GUI software is used for deriding whether any welded specimen makes as proper shape or detects in real time. The criteria are based upon ISO 5817 as limits of imperfections in metallic fusion welds.

Integrated Logical Model Based on Sensor and Guidance Light Networks for Fire Evacuation (화재 대피 유도를 위한 센서 및 유도등 네트워크 기반의 통합 논리 모델)

  • Boo, Jun-Pil;Kim, Do-Hyeun;Park, Dong-Gook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.109-114
    • /
    • 2009
  • At the present time, buildings are designed higher and more complex than ever before. Therefore the potential disasters are happened such as fire, power outage, earthquake, flood, hurricanes. Their disasters require people inside buildings to be evacuated as soon as possible. This paper presents a new disaster evacuation guidance concept of inner buildings, whiche aims at integrated the constructing of a sensor network and a guidance light networks in order to provide a quick detection of disasters and accurate evacuation guidance based on indoor geo-information, and sends these instructions to people. In this paper, we present the integrated logical model based on sensor and guidance light networks for the fire disaster management in inner building using our concept. And we verify proposed logical model according to experiments with visualization and operations on map.

  • PDF

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

Anomaly Detection Mechanism based on the Session Patterns and Fuzzy Cognitive Maps (퍼지인식도와 세션패턴 기반의 비정상 탐지 메커니즘)

  • Ryu Dae-Hee;Lee Se-Yul;Kim Hyeock-Jin;Song Young-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.9-16
    • /
    • 2005
  • Recently, since the number of internet users is increasing rapidly and, by using the Public hacking tools, general network users can intrude computer systems easily, the hacking problem is setting more serious. In order to prevent the intrusion. it is needed to detect the sign in advance of intrusion in a Positive Prevention by detecting the various forms of hackers intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port-scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various. In this Paper, we propose a detection algorithm for session patterns and FCM.

  • PDF

Active Sonar Target Detection Using Fractional Fourier Transform (Fractional 푸리에 변환을 이용한 능동소나 표적탐지)

  • Baek, Jongdae;Seok, Jongwon;Bae, Keunsung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.22-29
    • /
    • 2016
  • Many studies in detection and classification of the targets in the underwater environments have been conducted for military purposes, as well as for non-military purpose. Due to the complicated characteristics of underwater acoustic signal reflecting multipath environments and spatio-temporal varying characteristics, active sonar target detection technique has been considered as a difficult technique. In this paper, we describe the basic concept of Fractional Fourier transform and optimal transform order. Then we analyze the relationship between time-frequency characteristics of an LFM signal and its spectrum using Fractional Fourier transform. Based on the analysis results, we present active sonar target detection method. To verify the performance of proposed methods, we compared the results with conventional FFT-based matched filter. The experimental results demonstrate the superiority of the proposed method compared to the conventional method in the aspect of AUC(Area Under the ROC Curve).

Extraction of Changed Pixels for Hyperion Hyperspectral Images Using Range Average Based Buffer Zone Concept (구간평균 그래프 기반의 버퍼존 개념을 적용한 Hyperion 초분광영상의 변화화소 추출)

  • Kim, Dae-Sung;Pyen, Mu-Wook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.5
    • /
    • pp.487-496
    • /
    • 2011
  • This study is aimed to perform more reliable unsupervised change detection through the re-extraction of the changed pixels which were extracted with global thresholding by applying buffer zone concept. First, three buffer zone was divided on the basis of the thresholding value which was determined using range average and the maximum distance point from a straight line. We re-extracted the changed pixels by performing unsupervised classification for buffer zone II which consists of changed pixels and unchanged pixels. The proposed method was implemented in Hyperion hyperspectral images and evaluated comparing to the existing global thresholding method. The experimental results demonstrated that the proposed method performed more accuracy change detection for vegetation area even if extracted slightly more changed pixels.