• Title/Summary/Keyword: event detection

Search Result 637, Processing Time 0.024 seconds

A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation

  • Lee, Hyoung-Gyu;Park, So-Young;Rim, Hae-Chang;Lee, Do-Gil;Chun, Hong-Woo
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.248-265
    • /
    • 2015
  • In this paper, we propose a maximum entropy-based model, which can mathematically explain the bio-molecular event extraction problem. The proposed model generates an event table, which can represent the relationship between an event trigger and its arguments. The complex sentences with distinctive event structures can be also represented by the event table. Previous approaches intuitively designed a pipeline system, which sequentially performs trigger detection and arguments recognition, and thus, did not clearly explain the relationship between identified triggers and arguments. On the other hand, the proposed model generates an event table that can represent triggers, their arguments, and their relationships. The desired events can be easily extracted from the event table. Experimental results show that the proposed model can cover 91.36% of events in the training dataset and that it can achieve a 50.44% recall in the test dataset by using the event table.

An Efficient Complex Event Processing Algorithm based on INFA-HTS for Out-of-order RFID Event Streams

  • Wang, Jianhua;Wang, Tao;Cheng, Lianglun;Lu, Shilei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4307-4325
    • /
    • 2016
  • With the aim of solving the problems of long processing times, high memory consumption and low event throughput in the current processing approaches in out-of-order RFID event streams, an efficient complex event processing method based on INFA-HTS (Improved Nondeterministic Finite Automaton-Hash Table Structure) is presented in this paper. The contribution of this paper lies in the fact that we use INFA and HTS to successfully realize the detection of complex events for out-of-order RFID event streams. Specifically, in our scheme, to detect the disorder of out-of-order event streams, we expand the traditional NFA model into a new INFA model to capture the related RFID primitive events from the out-of-order event stream. To high-efficiently manage the large intermediate capturing results, we use the HTS to store and process them. As a result, these problems in the existing methods can be effectively solved by our scheme. The simulation results of our experiments show that our proposed method in this paper outperforms some of the current general processing approaches used to process out-of-order RFID event streams.

The Design of a Complex Event Model for Effective Service Monitoring in Enterprise Systems (엔터프라이즈 시스템에서 효과적인 서비스 모니터링을 위한 복합 이벤트 모델의 설계)

  • Kum, Deuk-Kyu;Lee, Nam-Yong
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.261-274
    • /
    • 2011
  • In recent competitive business environment each enterprise has to be agile and flexible. For these purposes run-time monitoring ofservices provided by an enterprise and early decision making through this becomes core competition of the enterprise. In addition, in order to process various innumerable events which are generated on enterprise systems techniques which make filtering of meaningful data are needed. However, the existing study related with this is nothing but discovering of service faults by monitoring depending upon API of BPEL engine or middleware, or is nothing but processing of simple events based on low-level events. Accordingly, there would be limitations to provide useful business information. In this paper, through situation detection an extended complex event model is presented, which is possible to provide more valuable and useful business information. Concretely, first of all an event processing architecture in an enterprise system is proposed, and event meta-model which is suitable to the proposed architecture is going to be defined. Based on the defined meta-model, It is presented that syntax and semantics of constructs in our event processing language including various and progressive event operators, complex event pattern, key, etc. In addition, an event context mechanism is proposed to analyze more delicate events. Finally, through application studies application possibility of this study would be shown and merits of this event model would be present through comparison with other event model.

An Efficient Event Detection Algorithm using Spatio-Temporal Correlation in Surveillance Reconnaissance Sensor Networks (감시정찰 센서네트워크에서 시공간 연관성를 이용한 효율적인 이벤트 탐지 기법)

  • Yeo, Myung-Ho;Kim, Yong-Hyun;Kim, Hun-Kyu;Lee, Noh-Bok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.5
    • /
    • pp.913-919
    • /
    • 2011
  • In this paper, we present a new efficient event detection algorithm for sensor networks with faults. We focus on multi-attributed events, which are sets of data points that correspond to interesting or unusual patterns in the underlying phenomenon that the network monitors. Conventional algorithms cannot detect some events because they treat only their own sensor readings which can be affected easily by environmental or physical problem. Our approach exploits spatio-temporal correlation of sensor readings. Sensor nodes exchange a fault-tolerant code encoded their own readings with neighbors, organize virtual sensor readings which have spatio-temporal correlation, and determine a result for multi-attributed events from them. In the result, our proposed algorithm provides improvement of detecting multi-attributed events and reduces the number of false-negatives due to negative environmental effects.

Naming Scheme for Standardization of Detection Rule on Security Monitoring Threat Event (보안관제 위협 이벤트 탐지규칙 표준 명명법 연구)

  • Park, Wonhyung;Kim, Yanghoon;Lim, YoungWhan;Ahn, Sungjin
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.83-90
    • /
    • 2015
  • Recent, Cyber attacks such as hacking and malicious code techniques are evolving very rapidly changing cyber a ttacks are increasing, the number of malicious code techniques vary accordingly become intelligent. In the case of m alware because of the ambiguity in the number of malware have increased rapidly by name or classified as maliciou s code may have difficulty coping with. This paper investigated the naming convention of the vaccine manufacturer s in Korea to solve this problem, the analysis and offers a naming convention for security control event detection r ule analysis to compare the pattern of the detection rule out based on this current.

Event-specific Detection Methods for Genetically Modified Maize MIR604 Using Real-time PCR

  • Kim, Jae-Hwan;Kim, Hae-Yeong
    • Food Science and Biotechnology
    • /
    • v.18 no.5
    • /
    • pp.1118-1123
    • /
    • 2009
  • Event-specific real-time polymerase chain reaction (PCR) detection method for genetically modified (GM) maize MIR604 was developed based on integration junction sequences between the host plant genome and the integrated transgene. In this study, 2 primer pairs and probes were designed for specific amplification of 100 and 111 bp DNA fragments from the zSSIIb gene (the maize endogenous reference gene) and MIR604. The quantitative method was validated using 3 certified reference materials (CRMs) with levels of 0.1, 1, and 10% MIR604. The method was also assayed with 14 different plants and other GM maize. No amplification signal was observed in real-time PCR assays with any of the species tested other than MIR604 maize. As a result, the bias from the true value and the relative deviation for MIR604 was within the range from 0 to 9%. Precision, expressed as relative standard deviation (RSD), varied from 2.7 to 10% for MIR604. Limits of detections (LODs) of qualitative and quantitative methods were all 0.1%. These results indicated that the event-specific quantitative PCR detection system for MIR604 is accurate and useful.

Sound System Analysis for Health Smart Home

  • CASTELLI Eric;ISTRATE Dan;NGUYEN Cong-Phuong
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.237-243
    • /
    • 2004
  • A multichannel smart sound sensor capable to detect and identify sound events in noisy conditions is presented in this paper. Sound information extraction is a complex task and the main difficulty consists is the extraction of high­level information from an one-dimensional signal. The input of smart sound sensor is composed of data collected by 5 microphones and its output data is sent through a network. For a real time working purpose, the sound analysis is divided in three steps: sound event detection for each sound channel, fusion between simultaneously events and sound identification. The event detection module find impulsive signals in the noise and extracts them from the signal flow. Our smart sensor must be capable to identify impulsive signals but also speech presence too, in a noisy environment. The classification module is launched in a parallel task on the channel chosen by data fusion process. It looks to identify the event sound between seven predefined sound classes and uses a Gaussian Mixture Model (GMM) method. Mel Frequency Cepstral Coefficients are used in combination with new ones like zero crossing rate, centroid and roll-off point. This smart sound sensor is a part of a medical telemonitoring project with the aim of detecting serious accidents.

  • PDF

Sound Event Detection based on Deep Neural Networks (딥 뉴럴네트워크 기반의 소리 이벤트 검출)

  • Chung, Suk-Hwan;Chung, Yong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.389-396
    • /
    • 2019
  • In this paper, various architectures of deep neural networks were applied for sound event detection and their performances were compared using a common audio database. The FNN, CNN, RNN and CRNN were implemented using hyper-parameters optimized for the database as well as the architecture of each neural network. Among the implemented deep neural networks, CRNN performed best at all testing conditions and CNN followed CRNN in performance. Although RNN has a merit in tracking the time-correlations in audio signals, it showed poor performance compared with CNN and CRNN.

Single Gyroscope Sensor Module System for Gait Event Detection (보행시점 검출을 위한 단일 각속도 센서모듈 시스템)

  • Kang, Dong-Won;Choi, Jin-Seung;Kim, Han-Su;Oh, Ho-Sang;Seo, Jeong-Woo;Tack, Gye-Rae
    • Korean Journal of Applied Biomechanics
    • /
    • v.21 no.4
    • /
    • pp.495-501
    • /
    • 2011
  • The purpose of this study was to develop the inertial sensor module system to detect gait event using single angular rate sensor(gyroscope), and evaluate the accuracy of this system. This sensor module is attached at the heel and gait events such as heel strike, foot flat, heel off, toe off are detected by using proposed automatic event detection algorithm. The developed algorithm detect characteristics of pitch data of the gyroscope to find gait event. To evaluate the accuracy of system, 3D motion capture system was used and synchronized with sensor module system for comparison of gait event timings. In experiment, 6 subjects performed 5 trials level walking with 3 different conditions such as slow, preferred and fast. Results showed that gait event timings by sensor module system are similar to that by kinematic data, because maximum absolute errors were under 37.4msec regardless of gait velocity. Therefore, this system can be used to detect gait events. Although this system has advantages of small, light weight, long-term monitoring and high accuracy, it is necessary to improve the system to get other gait information such as gait velocity, stride length, step width and joint angles.

Correlation Analysis of Event Logs for System Fault Detection (시스템 결함 분석을 위한 이벤트 로그 연관성에 관한 연구)

  • Park, Ju-Won;Kim, Eunhye;Yeom, Jaekeun;Kim, Sungho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.129-137
    • /
    • 2016
  • To identify the cause of the error and maintain the health of system, an administrator usually analyzes event log data since it contains useful information to infer the cause of the error. However, because today's systems are huge and complex, it is almost impossible for administrators to manually analyze event log files to identify the cause of an error. In particular, as OpenStack, which is being widely used as cloud management system, operates with various service modules being linked to multiple servers, it is hard to access each node and analyze event log messages for each service module in the case of an error. For this, in this paper, we propose a novel message-based log analysis method that enables the administrator to find the cause of an error quickly. Specifically, the proposed method 1) consolidates event log data generated from system level and application service level, 2) clusters the consolidated data based on messages, and 3) analyzes interrelations among message groups in order to promptly identify the cause of a system error. This study has great significance in the following three aspects. First, the root cause of the error can be identified by collecting event logs of both system level and application service level and analyzing interrelations among the logs. Second, administrators do not need to classify messages for training since unsupervised learning of event log messages is applied. Third, using Dynamic Time Warping, an algorithm for measuring similarity of dynamic patterns over time increases accuracy of analysis on patterns generated from distributed system in which time synchronization is not exactly consistent.