• Title/Summary/Keyword: signature-based detection

Search Result 199, Processing Time 0.025 seconds

Computationally Efficient Rotor Fault Detection Algorithm Based on Motor Current Signature Analysis (효율적인 MCSA 기반 회전자 고장 검출 알고리즘)

  • Jeong, Chun-Ho;Song, Myung-Hyun;Kang, Eui-Sung;Kim, Kyung-Min
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2310-2312
    • /
    • 2002
  • 전류 신호에 대한 고속 퓨리에 변환(FFT)은 유도전동기의 고장 검출에 널리 사용되어 왔다. 본 논문에서는 고정자 전류 스펙트럼 중에서 회전자 고장에 의해서 많은 영향을 받는 주파수 성분들로 특징 벡터를 구성하고, 이를 단순한 산술 연산만으로 처리함으로써 회전자 고장을 검출한다. 제안한 방법에서는 고장의 유무를 검출하기 위해서 기준 벡터와 입력 고정자 전류 신호로부터 추출된 특징 벡터 간의 차이 신호만을 이용하기 때문에 신경망에 의한 고장 검출 알고리즘 등에 비해서 훨씬 적은 계산량 만으로도 모터의 고장을 효율적으로 검출할 수 있다.

  • PDF

Web-based Real Time Failure Diagnosis System Development for Induction Motor Bearing (유도전동기 베어링의 원거리 실시간 결함진단시스템 개발)

  • Kwon, Oh-Heon;Lee, Seung-Hyun
    • Journal of the Korean Society of Safety
    • /
    • v.20 no.3 s.71
    • /
    • pp.1-8
    • /
    • 2005
  • The industrial induction motor is widely used in the rotating electrical machine for the transmission of power. It is very reliable equipment, but it could lead to the loss of production and lift when failure occurs. Therefore, the failure data is acquired and analyzed by attaching an exclusive instrument to existing induction motor. However, these instruments could lead to side effects, increasing the production costs, because they are very expensive. The purpose of this study is the development of an induction motor bearing failure diagnosis system constructed using LabVIEW which can be supplied the kernelled function, process monitoring and current signature analysis. In addition, the availability and reasonability of the constructed system was examined for an induction motor with failure defects in outer raceway and ball bearing. From the results, it shows that failure diagnosis system constructed is useful for real-time monitoring with detection of bearing defects over the web.

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.

Multi Signature Based Polymorphic Worm Detection (다중 시그니쳐에 기반한 변형웜 탐지 기법)

  • Lee, Injoon;Song, Chihwan;Kang, Jaewoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1252-1255
    • /
    • 2010
  • 기존의 단일 시그니쳐를 이용한 악성 코드 침입 탐지 시스템은 자신의 컨텐츠를 변형시키는 변형웜을 잡기에는 적합하지 않다. 변형웜을 탐지하기 위한 노력으로 변형웜에 적합한 시그니쳐를 만들기 위한 노력이 있어왔다. 이 연구는 기존의 변형웜 탐지 시그니쳐 방법들을 분석하고 비교하여, 상호 보완적인 멀티 시그니쳐 방법을 제안한다. 이 방법은 정확도 높은 변형웜 탐지 시스템을 구성하기 위한 근본 기술로 활용될 것으로 기대한다.

New surveillance concepts in food safety in meat producing animals: the advantage of high throughput 'omics' technologies - A review

  • Pfaffl, Michael W.;Riedmaier-Sprenzel, Irmgard
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.31 no.7
    • /
    • pp.1062-1071
    • /
    • 2018
  • The misuse of anabolic hormones or illegal drugs is a ubiquitous problem in animal husbandry and in food safety. The ban on growth promotants in food producing animals in the European Union is well controlled. However, application regimens that are difficult to detect persist, including newly designed anabolic drugs and complex hormone cocktails. Therefore identification of molecular endogenous biomarkers which are based on the physiological response after the illicit treatment has become a focus of detection methods. The analysis of the 'transcriptome' has been shown to have promise to discover the misuse of anabolic drugs, by indirect detection of their pharmacological action in organs or selected tissues. Various studies have measured gene expression changes after illegal drug or hormone application. So-called transcriptomic biomarkers were quantified at the mRNA and/or microRNA level by reverse transcription-quantitative polymerase chain reaction (RT-qPCR) technology or by more modern 'omics' and high throughput technologies including RNA-sequencing (RNA-Seq). With the addition of advanced bioinformatical approaches such as hierarchical clustering analysis or dynamic principal components analysis, a valid 'biomarker signature' can be established to discriminate between treated and untreated individuals. It has been shown in numerous animal and cell culture studies, that identification of treated animals is possible via our transcriptional biomarker approach. The high throughput sequencing approach is also capable of discovering new biomarker candidates and, in combination with quantitative RT-qPCR, validation and confirmation of biomarkers has been possible. These results from animal production and food safety studies demonstrate that analysis of the transcriptome has high potential as a new screening method using transcriptional 'biomarker signatures' based on the physiological response triggered by illegal substances.

Adaptive Intrusion Detection Algorithm based on Learning Algorithm (학습 알고리즘 기반의 적응형 침입 탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.1
    • /
    • pp.75-81
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn`t make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.

Smart PZT-interface for wireless impedance-based prestress-loss monitoring in tendon-anchorage connection

  • Nguyen, Khac-Duy;Kim, Jeong-Tae
    • Smart Structures and Systems
    • /
    • v.9 no.6
    • /
    • pp.489-504
    • /
    • 2012
  • For the safety of prestressed structures such as cable-stayed bridges and prestressed concrete bridges, it is very important to ensure the prestress force of cable or tendon. The loss of prestress force could significantly reduce load carrying capacity of the structure and even result in structural collapse. The objective of this study is to present a smart PZT-interface for wireless impedance-based prestress-loss monitoring in tendon-anchorage connection. Firstly, a smart PZT-interface is newly designed for sensitively monitoring of electro-mechanical impedance changes in tendon-anchorage subsystem. To analyze the effect of prestress force, an analytical model of tendon-anchorage is described regarding to the relationship between prestress force and structural parameters of the anchorage contact region. Based on the analytical model, an impedance-based method for monitoring of prestress-loss is conducted using the impedance-sensitive PZT-interface. Secondly, wireless impedance sensor node working on Imote2 platforms, which is interacted with the smart PZT-interface, is outlined. Finally, experiment on a lab-scale tendon-anchorage of a prestressed concrete girder is conducted to evaluate the performance of the smart PZT-interface along with the wireless impedance sensor node on prestress-loss detection. Frequency shift and cross correlation deviation of impedance signature are utilized to estimate impedance variation due to prestress-loss.

Detection of flexural damage stages for RC beams using Piezoelectric sensors (PZT)

  • Karayannis, Chris G.;Voutetaki, Maristella E.;Chalioris, Constantin E.;Providakis, Costas P.;Angeli, Georgia M.
    • Smart Structures and Systems
    • /
    • v.15 no.4
    • /
    • pp.997-1018
    • /
    • 2015
  • Structural health monitoring along with damage detection and assessment of its severity level in non-accessible reinforced concrete members using piezoelectric materials becomes essential since engineers often face the problem of detecting hidden damage. In this study, the potential of the detection of flexural damage state in the lower part of the mid-span area of a simply supported reinforced concrete beam using piezoelectric sensors is analytically investigated. Two common severity levels of flexural damage are examined: (i) cracking of concrete that extends from the external lower fiber of concrete up to the steel reinforcement and (ii) yielding of reinforcing bars that occurs for higher levels of bending moment and after the flexural cracking. The purpose of this investigation is to apply finite element modeling using admittance based signature data to analyze its accuracy and to check the potential use of this technique to monitor structural damage in real-time. It has been indicated that damage detection capability greatly depends on the frequency selection rather than on the level of the harmonic excitation loading. This way, the excitation loading sequence can have a level low enough that the technique may be considered as applicable and effective for real structures. Further, it is concluded that the closest applied piezoelectric sensor to the flexural damage demonstrates higher overall sensitivity to structural damage in the entire frequency band for both damage states with respect to the other used sensors. However, the observed sensitivity of the other sensors becomes comparatively high in the peak values of the root mean square deviation index.

Detection of Car Hacking Using One Class Classifier (단일 클래스 분류기를 사용한 차량 해킹 탐지)

  • Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.33-38
    • /
    • 2018
  • In this study, we try to detect new attacks for vehicle by learning only one class. We use Car-Hacking dataset, an intrusion detection dataset, which is used to evaluate classification performance. The dataset are created by logging CAN (Controller Area Network) traffic through OBD-II port from a real vehicle. The dataset have four attack types. One class classification is one of unsupervised learning methods that classifies attack class by learning only normal class. When using unsupervised learning, it difficult to achieve high efficiency because it does not use negative instances for learning. However, unsupervised learning has the advantage for classifying unlabeled data, which are new attacks. In this study, we use one class classifier to detect new attacks that are difficult to detect using signature-based rules on network intrusion detection system. The proposed method suggests a combination of parameters that detect all new attacks and show efficient classification performance for normal dataset.

Technique for Malicious Code Detection using Stacked Convolution AutoEncoder (적층 콘볼루션 오토엔코더를 활용한 악성코드 탐지 기법)

  • Choi, Hyun-Woong;Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.39-44
    • /
    • 2020
  • Malicious codes cause damage to equipments while avoiding detection programs(vaccines). The reason why it is difficult to detect such these new malwares using the existing vaccines is that they use "signature-based" detection techniques. these techniques effectively detect already known malicious codes, however, they have problems about detecting new malicious codes. Therefore, most of vaccines have recognized these drawbacks and additionally make use of "heuristic" techniques. This paper proposes a technology to detecting unknown malicious code using deep learning. In addition, detecting malware skill using Supervisor Learning approach has a clear limitation. This is because, there are countless files that can be run on the devices. Thus, this paper utilizes Stacked Convolution AutoEncoder(SCAE) known as Semi-Supervisor Learning. To be specific, byte information of file was extracted, imaging was carried out, and these images were learned to model. Finally, Accuracy of 98.84% was achieved as a result of inferring unlearned malicious and non-malicious codes to the model.