• Title/Summary/Keyword: Approach Detection System

Search Result 888, Processing Time 0.041 seconds

Fault Detection and Diagnosis Systems of Induction Machines using Real-Time Stochastic Modeling Approach (실시간 확률 모델링 기법을 이용한 유도기기의 고장검출 및 진단시스템)

  • Lee, Jin-Woo;Kim, Kwang-Soo;Cho, Hyun-Cheol;Lee, Young-Jin;Lee, Kwon-Soon
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.58 no.3
    • /
    • pp.241-248
    • /
    • 2009
  • This paper presents stochastic methodology based fault detection algorithm for induction motor systems. We measure current of healthy induction motors by means of hall sensor systems and then establish its probability distribution. We propose online probability density estimation which is effective in real-time implementation due to its simplicity and low computational burden. In addition, we accomplish theoretical analysis of the proposed estimation to demonstrate its convergence property by using statistical convergence and system stability theories. We apply our fault detection approach to three-phase induction motors and achieve real-time experiment for evaluating its reliability and practicability in industrial fields.

Combined burst synchronization/error detection systems maximizing bit slip correction ranges (최대 비트슬립 정정범위를 가지는 복합 버스트 동기/에러 검출 시스템)

  • 최양호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.7
    • /
    • pp.1477-1486
    • /
    • 1997
  • Conventioally the decoding methods and the design of coset codes for burst synchronization and error detection have been based on the concept that slips occuring to the right or to the left with respect to a reference timing are corrected. In this paper we newly approach to the design of coset codes relying on the condition that only a single code word can exists in an observation interval, which provides an extentended view on the conventional approach. A theorem concerning the condition is presented. A combined burst synchronization and error detection system with maximum slip correction capability have been devised based on the theorem and a detection method is falsely accepted in the presented of channel errors. The false acceptance probabilities of the system are derived and its performance is analyzed through computer computation using the derived results.

  • PDF

An Outlier Cluster Detection Technique for Real-time Network Intrusion Detection Systems (실시간 네트워크 침입탐지 시스템을 위한 아웃라이어 클러스터 검출 기법)

  • Chang, Jae-Young;Park, Jong-Myoung;Kim, Han-Joon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.43-53
    • /
    • 2007
  • Intrusion detection system(IDS) has recently evolved while combining signature-based detection approach with anomaly detection approach. Although signature-based IDS tools have been commonly used by utilizing machine learning algorithms, they only detect network intrusions with already known patterns, Ideal IDS tools should always keep the signature database of your detection system up-to-date. The system needs to generate the signatures to detect new possible attacks while monitoring and analyzing incoming network data. In this paper, we propose a new outlier cluster detection algorithm with density (or influence) function, Our method assumes that an outlier is a kind of cluster with similar instances instead of a single object in the context of network intrusion, Through extensive experiments using KDD 1999 Cup Intrusion Detection dataset. we show that the proposed method outperform the conventional outlier detection method using Euclidean distance function, specially when attacks occurs frequently.

  • PDF

Two-Faults Detection and Isolation Using Extended Parity Space Approach

  • Lee, Won-Hee;Kim, Kwang-Hoon;Park, Chan-Gook;Lee, Jang-Gyu
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.411-419
    • /
    • 2012
  • This paper proposes a new FDI(Fault Detection and Isolation) method, which is called EPSA(Extended Parity Space Approach). This method is particularly suitable for fault detection and isolation of the system with one faulty sensor or two faulty sensors. In the system with two faulty sensors, the fault detection and isolation probability may be decreased when two faults are occurred between the sensors related to the large fault direction angle. Nonetheless, the previously suggested FDI methods to treat the two-faults problem do not consider the effect of the large fault direction angle. In order to solve this problem, this paper analyzes the effect of the large fault direction angle and proposes how to increase the fault detection and isolation probability. For the increase the detection probability, this paper additionally considers the fault type that is not detected because of the cancellation of the fault biases by the large fault direction angle. Also for the increase the isolation probability, this paper suggests the additional isolation procedure in case of two-faults. EPSA helps that the user can know the exact fault situation. The proposed FDI method is verified through Monte Carlo simulation.

Detection of human faces using skin color and eye feature (피부색과 눈요소 정보를 이용한 얼굴영역 검출)

  • 서정원;박정희;송문섭;윤후병;황호전;김법균;두길수;안동언;정성종
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.531-535
    • /
    • 1999
  • Automatic human face detection in a complex background is one of the difficult problems. In this paper, we propose an effective and robust automatic face detection approach that can locate the face region in natural scene images when the system is used as a pre-processor of a face recognition system . We use two natural and powerful visual cues, the skin color and the eyes. In the first step of the proposed system, the method based on the human skin color space by selecting flesh tone regions using normalized r-g space in color images. In the next step, we extract eye features by calculating moments and using geometrical face model. Experimental results demonstrate that the approach can efficiently detect human faces and satisfactory deal with the problems caused by bad lighting condition, skew face orientation.

  • PDF

An Evolutionary Computing Approach to Building Intelligent Frauds Detection Systems

  • Kim, Jung-Won;Peter Bentley;Park, Jong-Uk
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.06a
    • /
    • pp.293-304
    • /
    • 2001
  • frauds detection is a difficult problem, requiring huge computer resources and complicated search activities. researchers have struggled with the problem. Even though a flew research approaches have claimed that their solution is much bettor than others, research community has not found 'the best solution'well fitting every fraud. Because of the evolving nature of the frauds, a Revel and self-adapting method should be devised. In this research a new approach is suggested to solving frauds in insurance claims and credit card transaction. Based on evolutionary computing approach, the method is itself self-adjusting and evolving enough to generate a new set of decision-making rules. We believe that this new approach will provide a promising alternative to conventional ones, in terms of computation performance and classification accuracy.

  • PDF

Motion Sensor Fault Detection and Failsafe Logic for Vehic1e Stability Control Systems (VSCs)

  • Yi, Kyongsu;Min, Kyongchan
    • Journal of Mechanical Science and Technology
    • /
    • v.18 no.11
    • /
    • pp.1961-1968
    • /
    • 2004
  • The design of a reliable and failsafe control system requires that sensor failures be detected and identified within acceptable time limit so that system malfunction can be prevented. This paper presents a model-based approach to sensor fault detection with applications to vehicle stability control systems. The effectiveness of the proposed method is illustrated through test data-based evaluation. Vehicle test data-based evaluation results show that the proposed fault management scheme can be used for the design of a failsafe VSCs.

Social Media based Real-time Event Detection by using Deep Learning Methods

  • Nguyen, Van Quan;Yang, Hyung-Jeong;Kim, Young-chul;Kim, Soo-hyung;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.41-48
    • /
    • 2017
  • Event detection using social media has been widespread since social network services have been an active communication channel for connecting with others, diffusing news message. Especially, the real-time characteristic of social media has created the opportunity for supporting for real-time applications/systems. Social network such as Twitter is the potential data source to explore useful information by mining messages posted by the user community. This paper proposed a novel system for temporal event detection by analyzing social data. As a result, this information can be used by first responders, decision makers, or news agents to gain insight of the situation. The proposed approach takes advantages of deep learning methods that play core techniques on the main tasks including informative data identifying from a noisy environment and temporal event detection. The former is the responsibility of Convolutional Neural Network model trained from labeled Twitter data. The latter is for event detection supported by Recurrent Neural Network module. We demonstrated our approach and experimental results on the case study of earthquake situations. Our system is more adaptive than other systems used traditional methods since deep learning enables to extract the features of data without spending lots of time constructing feature by hand. This benefit makes our approach adaptive to extend to a new context of practice. Moreover, the proposed system promised to respond to acceptable delay within several minutes that will helpful mean for supporting news channel agents or belief plan in case of disaster events.

Intrusion Detection System for Denial of Service Attack using Performance Signature (성능 시그네쳐를 이용한 서비스 거부 공격 침입탐지 시스템 설계)

  • Kim, Gwang-Deuk;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3011-3019
    • /
    • 1999
  • Denial of service is about knocking off services, without permission for example through crashing the whole system. This kind of attacks are easy to launch and it is hard to protect a system against them. The basic problem is that Unix assumes that users on the system or on other systems will be well behaved. This paper analyses system-based inside denial of services attack(DoS) and system metric for performance of each machine provided. And formalize the conclusions results in ways that clearly expose the performance impact of those observations. So, we present new approach. It is detecting DoS attack using performance signature for system and program behavior. We present new approach. It is detecting DoS attack using performance signature for system and program behavior. We believe that metric will be to guide to automated development of a program to detect the attack. As a results, we propose the AIDPS(Architecture for Intrusion Detection using Performance Signature) model to detect DoS attack using performance signature.

  • PDF

A New Endpoint Detection Method Based on Chaotic System Features for Digital Isolated Word Recognition System

  • Zang, Xian;Chong, Kil-To
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.37-39
    • /
    • 2009
  • In the research of speech recognition, locating the beginning and end of a speech utterance in a background of noise is of great importance. Since the background noise presenting to record will introduce disturbance while we just want to get the stationary parameters to represent the corresponding speech section, in particular, a major source of error in automatic recognition system of isolated words is the inaccurate detection of beginning and ending boundaries of test and reference templates, thus we must find potent method to remove the unnecessary regions of a speech signal. The conventional methods for speech endpoint detection are based on two simple time-domain measurements - short-time energy, and short-time zero-crossing rate, which couldn't guarantee the precise results if in the low signal-to-noise ratio environments. This paper proposes a novel approach that finds the Lyapunov exponent of time-domain waveform. This proposed method has no use for obtaining the frequency-domain parameters for endpoint detection process, e.g. Mel-Scale Features, which have been introduced in other paper. Comparing with the conventional methods based on short-time energy and short-time zero-crossing rate, the novel approach based on time-domain Lyapunov Exponents(LEs) is low complexity and suitable for Digital Isolated Word Recognition System.

  • PDF