• Title/Summary/Keyword: Behavior detection

Search Result 935, Processing Time 0.027 seconds

Use of hybrid materials in the trace determination of As(V) from aqueous solutions: An electrochemical study

  • Tiwari, Diwakar;Jamsheera, A.;Zirlianngura, Zirlianngura;Lee, Seung Mok
    • Environmental Engineering Research
    • /
    • v.22 no.2
    • /
    • pp.186-192
    • /
    • 2017
  • The carbon paste electrode (CPE) was modified with the pristine bentonite and hybrid material (HDTMA-modified bentonite). The modified-CPEs are then employed as working electrode in an electrochemical detection of As(V) from aqueous solutions using the cyclic voltammetric measurements. Cyclic voltammograms revealed that As(V) showed reversible behavior onto the working electrode. The hybrid material-modified carbon paste electrode showed significantly enhanced electrochemical signal which was then utilized in the low level detection of As(V). Moreover, the studies were conducted at neutral pH conditions. The electrochemical studies were conducted with scan rates (20 to 200 mV/s) to deduce the mechanism of redox processes involved at the electrode surface. The anodic current was linearly increased, increasing the concentration of As(V) from 5.0 to $35.0{\mu}g/g$ using the hybrid material-modified electrode. This provided fairly a good calibration line for As(V) detection. The presence of varied concentrations of As(III) in the determination of total arsenic was studied. The influence of several cations and anions viz., Cu(II), Mn(II), Zn(II), Pb(II), Cd(II), Fe(III), $Cl^-$, $NO_3{^-}$, $PO_4{^{3-}}$, EDTA and glycine in the detection of As(V) from aqueous solution was also studied. Further, in an attempt to simulate the real matrix analysis, the tap water sample was spiked with As(V) and subjected for As(V) detection using the modified-CPE.

A Study on Anomaly Detection based on User's Command Analysis (사용자 명령어 분석을 통한 비정상 행위 판정에 관한 연구)

  • 윤정혁;오상현;이원석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.59-71
    • /
    • 2000
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while various information has been provided to users conveniently. As a results, many studies are necessary to detect the activities of intruders effectively. In this paper, a new association algorithm for the anomaly detection model is proposed in the process of generating user\`s normal patterns. It is that more recently observed behavior get more affection on the process of data mining. In addition, by clustering generated normal patterns for each use or a group of similar users, it is possible to identify the usual frequency of programs or command usage for each user or a group of uses. The performance of the proposed anomaly detection system has been tested on various system Parameters in order to identify their practical ranges for maximizing its detection rate.

An Intelligent Bluetooth Intrusion Detection System for the Real Time Detection in Electric Vehicle Charging System (전기차 무선 충전 시스템에서 실시간 탐지를 위한 지능형 Bluetooth 침입 탐지 시스템 연구)

  • Yun, Young-Hoon;Kim, Dae-Woon;Choi, Jung-Ahn;Kang, Seung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.11-17
    • /
    • 2020
  • With the increase in cases of using Bluetooth devices used in the electric vehicle charging systems, security issues are also raised. Although various technical efforts have beed made to enhance security of bluetooth technology, various attack methods exist. In this paper, we propose an intelligent Bluetooth intrusion detection system based on a well-known machine learning method, Hidden Markov Model, for the purpose of detecting intelligently representative Bluetooth attack methods. The proposed approach combines packet types of H4, which is bluetooth transport layer protocol, and the transport directions of the packet firstly to represent the behavior of current traffic, and uses the temporal deployment of these combined types as the final input features for detecting attacks in real time as well as accurate detection. We construct the experimental environment for the data acquisition and analysis the performance of the proposed system against obtained data set.

Object detection within the region of interest based on gaze estimation (응시점 추정 기반 관심 영역 내 객체 탐지)

  • Seok-Ho Han;Hoon-Seok Jang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.3
    • /
    • pp.117-122
    • /
    • 2023
  • Gaze estimation, which automatically recognizes where a user is currently staring, and object detection based on estimated gaze point, can be a more accurate and efficient way to understand human visual behavior. in this paper, we propose a method to detect the objects within the region of interest around the gaze point. Specifically, after estimating the 3D gaze point, a region of interest based on the estimated gaze point is created to ensure that object detection occurs only within the region of interest. In our experiments, we compared the performance of general object detection, and the proposed object detection based on region of interest, and found that the processing time per frame was 1.4ms and 1.1ms, respectively, indicating that the proposed method was faster in terms of processing speed.

Thermal imaging and computer vision technologies for the enhancement of pig husbandry: a review

  • Md Nasim Reza;Md Razob Ali;Samsuzzaman;Md Shaha Nur Kabir;Md Rejaul Karim;Shahriar Ahmed;Hyunjin Kyoung;Gookhwan Kim;Sun-Ok Chung
    • Journal of Animal Science and Technology
    • /
    • v.66 no.1
    • /
    • pp.31-56
    • /
    • 2024
  • Pig farming, a vital industry, necessitates proactive measures for early disease detection and crush symptom monitoring to ensure optimum pig health and safety. This review explores advanced thermal sensing technologies and computer vision-based thermal imaging techniques employed for pig disease and piglet crush symptom monitoring on pig farms. Infrared thermography (IRT) is a non-invasive and efficient technology for measuring pig body temperature, providing advantages such as non-destructive, long-distance, and high-sensitivity measurements. Unlike traditional methods, IRT offers a quick and labor-saving approach to acquiring physiological data impacted by environmental temperature, crucial for understanding pig body physiology and metabolism. IRT aids in early disease detection, respiratory health monitoring, and evaluating vaccination effectiveness. Challenges include body surface emissivity variations affecting measurement accuracy. Thermal imaging and deep learning algorithms are used for pig behavior recognition, with the dorsal plane effective for stress detection. Remote health monitoring through thermal imaging, deep learning, and wearable devices facilitates non-invasive assessment of pig health, minimizing medication use. Integration of advanced sensors, thermal imaging, and deep learning shows potential for disease detection and improvement in pig farming, but challenges and ethical considerations must be addressed for successful implementation. This review summarizes the state-of-the-art technologies used in the pig farming industry, including computer vision algorithms such as object detection, image segmentation, and deep learning techniques. It also discusses the benefits and limitations of IRT technology, providing an overview of the current research field. This study provides valuable insights for researchers and farmers regarding IRT application in pig production, highlighting notable approaches and the latest research findings in this field.

Detecting Insider Threat Based on Machine Learning: Anomaly Detection Using RNN Autoencoder (기계학습 기반 내부자위협 탐지기술: RNN Autoencoder를 이용한 비정상행위 탐지)

  • Ha, Dong-wook;Kang, Ki-tae;Ryu, Yeonseung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.763-773
    • /
    • 2017
  • In recent years, personal information leakage and technology leakage accidents are frequently occurring. According to the survey, the most important part of this spill is the 'insider' within the organization, and the leakage of technology by insiders is considered to be an increasingly important issue because it causes huge damage to the organization. In this paper, we try to learn the normal behavior of employees using machine learning to prevent insider threats, and to investigate how to detect abnormal behavior. Experiments on the detection of abnormal behavior by implementing an Autoencoder composed of Recurrent Neural Network suitable for learning time series data among the neural network models were conducted and the validity of this method was verified.

Satellite Anomalous Behavior Detection System through Rough-Set and Fuzzy Model (러프집합과 퍼지 모델을 이용한 인공위성의 이상 동작 검출 시스템)

  • Yang, Seung-Eun
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.3
    • /
    • pp.35-40
    • /
    • 2017
  • Out-of-limit (OOL) alarm method that is threshold checking of telemetry value is widely used for the satellites fault diagnosis and health monitoring. However, it requires engineering knowledge and effort to define delicate threshold value and has limitations that anomalous behaviors within the defined limits can't be detected. In this paper, we propose a satellite anomalous behavior detection system through fuzzy model that is composed by important statistical feature selected by rough-set theory. Not pre-defined anomaly is detected because only normal state data is used for fuzzy model. Also, anomalous behavior within the threshold limit is detected by using statistic feature that can be collected without engineering knowledge. The proposed system successfully detected non-ordinary state for battery temperature telemetry.

Rank Correlation Coefficient of Energy Data for Identification of Abnormal Sensors in Buildings (에너지 데이터의 순위상관계수 기반 건물 내 오작동 기기 탐지)

  • Kim, Naeon;Jeong, Sihyun;Jang, Boyeon;Kim, Chong-Kwon
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.417-422
    • /
    • 2017
  • Anomaly detection is the identification of data that do not conform to a normal pattern or behavior model in a dataset. It can be utilized for detecting errors among data generated by devices or user behavior change in a social network data set. In this study, we proposed a new approach using rank correlation coefficient to efficiently detect abnormal data in devices of a building. With the increased push for energy conservation, many energy efficiency solutions have been proposed over the years. HVAC (Heating, Ventilating and Air Conditioning) system monitors and manages thousands of sensors such as thermostats, air conditioners, and lighting in large buildings. Currently, operators use the building's HVAC system for controlling efficient energy consumption. By using the proposed approach, it is possible to observe changes of ranking relationship between the devices in HVAC system and identify abnormal behavior in social network.

Intrusion Detection based on Clustering a Data Stream (데이터 스트림 클러스터링을 이용한 침임탐지)

  • Oh Sang-Hyun;Kang Jin-Suk;Byun Yung-Cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.529-532
    • /
    • 2005
  • In anomaly intrusion detection, how to model the normal behavior of activities performed by a user is an important issue. To extract the normal behavior as a profile, conventional data mining techniques are widely applied to a finite audit data set. However, these approaches can only model the static behavior of a user in the audit data set This drawback can be overcome by viewing the continuous activities of a user as an audit data stream. This paper proposes a new clustering algorithm which continuously models a data stream. A set of features is used to represent the characteristics of an activity. For each feature, the clusters of feature values corresponding to activities observed so far in an audit data stream are identified by the proposed clustering algorithm for data streams. As a result, without maintaining any historical activity of a user physically, new activities of the user can be continuously reflected to the on-going result of clustering.

  • PDF

An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents (악성코드 은닉 문서파일 탐지를 위한 이메일 백신 클라우드 시스템)

  • Park, Choon-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.754-762
    • /
    • 2010
  • Nowadays, email-based targeted attacks using malcode-bearing documents have been steadily increased. To improve the success rate of the attack and avoid anti-viruses, attackers mainly employ zero-day exploits and relevant social engineering techniques. In this paper, we propose an architecture of the email vaccine cloud system to prevent targeted attacks using malcode-bearing documents. The system extracts attached document files from email messages, performs behavior analysis as well as signature-based detection in the virtual machine environment, and completely removes malicious documents from the messages. In the process of behavior analysis, the documents are regarded as malicious ones in cases of creating executable files, launching new processes, accessing critical registry entries, connecting to the Internet. The email vaccine cloud system will help prevent various cyber terrors such as information leakages by preventing email based targeted attacks.