• Title/Summary/Keyword: anomaly-based detection

Search Result 447, Processing Time 0.024 seconds

Design of Monitoring System for Network RTK (네트워크 RTK 환경에 적합한 감시 시스템 설계)

  • Shin, Mi-Young;Han, Young-Hoon;Ko, Jae-Young;Cho, Deuk-Jae
    • Journal of Navigation and Port Research
    • /
    • v.39 no.6
    • /
    • pp.479-484
    • /
    • 2015
  • Network RTK is a precise positioning technique using carrier phase correction data from reference stations within the network, and is constantly being researched for improved performance. However, the study for the system accuracy has been performed but system integrity research has not been done as much as system accuracy, because network RTK has been mainly used on surveying for static or kinematic positioning. In this paper, adequate monitoring system for network RTK is designed as basis research for integrity monitoring on network RTK. To this, fault tree on network RTK is analyzed, and a countermeasure is prepared to detect and identify the each fault items. Based these algorithms, monitoring system to use on central processing facility is designed for network RTK service.

Designing an GRU-based on-farm power management and anomaly detection automation system (GRU 기반의 농장 내 전력량 관리 및 이상탐지 자동화 시스템 설계)

  • Hyeon seo Kim;Meong Hun Lee
    • Smart Media Journal
    • /
    • v.13 no.1
    • /
    • pp.18-23
    • /
    • 2024
  • Power efficiency management in smart farms is important due to its link to climate change. As climate change negatively impacts agriculture, future agriculture is expected to utilize smart farms to minimize climate impacts, but smart farms' power consumption may exacerbate the climate crisis due to the current electricity production system. Therefore, it is essential to efficiently manage and optimize the power usage of smart farms. In this study, we propose a system that monitors the power usage of smart farm equipment in real time and predicts the power usage one hour later using GRU. CT sensors are installed to collect power usage data, which are analyzed to detect and prevent abnormal patterns, and combined with IoT technology to efficiently manage and monitor the overall power usage. This helps to optimize power usage, improve energy efficiency, and reduce carbon emissions. The system is expected to improve not only the energy management of smart farms, but also the overall efficiency of energy use.

Decoding Brain States during Auditory Perception by Supervising Unsupervised Learning

  • Porbadnigk, Anne K.;Gornitz, Nico;Kloft, Marius;Muller, Klaus-Robert
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.2
    • /
    • pp.112-121
    • /
    • 2013
  • The last years have seen a rise of interest in using electroencephalography-based brain computer interfacing methodology for investigating non-medical questions, beyond the purpose of communication and control. One of these novel applications is to examine how signal quality is being processed neurally, which is of particular interest for industry, besides providing neuroscientific insights. As for most behavioral experiments in the neurosciences, the assessment of a given stimulus by a subject is required. Based on an EEG study on speech quality of phonemes, we will first discuss the information contained in the neural correlate of this judgement. Typically, this is done by analyzing the data along behavioral responses/labels. However, participants in such complex experiments often guess at the threshold of perception. This leads to labels that are only partly correct, and oftentimes random, which is a problematic scenario for using supervised learning. Therefore, we propose a novel supervised-unsupervised learning scheme, which aims to differentiate true labels from random ones in a data-driven way. We show that this approach provides a more crisp view of the brain states that experimenters are looking for, besides discovering additional brain states to which the classical analysis is blind.

Development of Nuclear Power Plant Instrumentation Signal Faults Identification Algorithm (원전 계측 신호 오류 식별 알고리즘 개발)

  • Kim, SeungGeun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.6
    • /
    • pp.1-13
    • /
    • 2020
  • In this paper, the author proposed a nuclear power plant (NPP) instrumentation signal faults identification algorithm. A variational autoencoder (VAE)-based model is trained by using only normal dataset as same as existing anomaly detection method, and trained model predicts which signal within the entire signal set is anomalous. Classification of anomalous signals is performed based on the reconstruction error for each kind of signal and partial derivatives of reconstruction error with respect to the specific part of an input. Simulation was conducted to acquire the data for the experiments. Through the experiments, it was identified that the proposed signal fault identification method can specify the anomalous signals within acceptable range of error.

Detecting Android Malware Based on Analyzing Abnormal Behaviors of APK File

  • Xuan, Cho Do
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.17-22
    • /
    • 2021
  • The attack trend on end-users via mobile devices is increasing in both the danger level and the number of attacks. Especially, mobile devices using the Android operating system are being recognized as increasingly being exploited and attacked strongly. In addition, one of the recent attack methods on the Android operating system is to take advantage of Android Package Kit (APK) files. Therefore, the problem of early detecting and warning attacks on mobile devices using the Android operating system through the APK file is very necessary today. This paper proposes to use the method of analyzing abnormal behavior of APK files and use it as a basis to conclude about signs of malware attacking the Android operating system. In order to achieve this purpose, we propose 2 main tasks: i) analyzing and extracting abnormal behavior of APK files; ii) detecting malware in APK files based on behavior analysis techniques using machine learning or deep learning algorithms. The difference between our research and other related studies is that instead of focusing on analyzing and extracting typical features of APK files, we will try to analyze and enumerate all the features of the APK file as the basis for classifying malicious APK files and clean APK files.

Designing a quality inspection system using Deep SVDD

  • Jungjun Kim;Sung-Chul Jee;Seungwoo Kim;Kwang-Woo Jeon;Jeon-Sung Kang;Hyun-Joon Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.21-28
    • /
    • 2023
  • In manufacturing companies that focus on small-scale production of multiple product varieties, defective products are manually selected by workers rather than relying on automated inspection. Consequently, there is a higher risk of incorrect sorting due to variations in selection criteria based on the workers' experience and expertise, without consistent standards. Moreover, for non-standardized flexible objects with varying sizes and shapes, there can be even greater deviations in the selection criteria. To address these issues, this paper designs a quality inspection system using artificial intelligence-based unsupervised learning methods and conducts research by experimenting with accuracy using a dataset obtained from real manufacturing environments.

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.

An Anomalous Sequence Detection Method Based on An Extended LSTM Autoencoder (확장된 LSTM 오토인코더 기반 이상 시퀀스 탐지 기법)

  • Lee, Jooyeon;Lee, Ki Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.1
    • /
    • pp.127-140
    • /
    • 2021
  • Recently, sequence data containing time information, such as sensor measurement data and purchase history, has been generated in various applications. So far, many methods for finding sequences that are significantly different from other sequences among given sequences have been proposed. However, most of them have a limitation that they consider only the order of elements in the sequences. Therefore, in this paper, we propose a new anomalous sequence detection method that considers both the order of elements and the time interval between elements. The proposed method uses an extended LSTM autoencoder model, which has an additional layer that converts a sequence into a form that can help effectively learn both the order of elements and the time interval between elements. The proposed method learns the features of the given sequences with the extended LSTM autoencoder model, and then detects sequences that the model does not reconstruct well as anomalous sequences. Using experiments on synthetic data that contains both normal and anomalous sequences, we show that the proposed method achieves an accuracy close to 100% compared to the method that uses only the traditional LSTM autoencoder.

Abnormality Detection Method of Factory Roof Fixation Bolt by Using AI

  • Kim, Su-Min;Sohn, Jung-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.33-40
    • /
    • 2022
  • In this paper, we propose a system that analyzes drone photographic images of panel-type factory roofs and conducts abnormal detection of bolts. Currently, inspectors directly climb onto the roof to carry out the inspection. However, safety accidents caused by working conditions at high places are continuously occurring, and new alternatives are needed. In response, the results of drone photography, which has recently emerged as an alternative to the dangerous environment inspection plan, will be easily inspected by finding the location of abnormal bolts using deep learning. The system proposed in this study proceeds with scanning the captured drone image using a sample image for the situation where the bolt cap is released. Furthermore, the scanned position is discriminated by using AI, and the presence/absence of the bolt abnormality is accurately discriminated. The AI used in this study showed 99% accuracy in test results based on VGGNet.

Automatic False-Alarm Labeling for Sensor Data

  • Adi, Taufik Nur;Bae, Hyerim;Wahid, Nur Ahmad
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A false alarm, which is an incorrect report of an emergency, could trigger an unnecessary action. The predictive maintenance framework developed in our previous work has a feature whereby a machine alarm is triggered based on sensor data evaluation. The sensor data evaluator performs three essential evaluation steps. First, it evaluates each sensor data value based on its threshold (lower and upper bound) and labels the data value as "alarm" when the threshold is exceeded. Second, it calculates the duration of the occurrence of the alarm. Finally, in the third step, a domain expert is required to assess the results from the previous two steps and to determine, thereby, whether the alarm is true or false. There are drawbacks of the current evaluation method. It suffers from a high false-alarm ratio, and moreover, given the vast amount of sensor data to be assessed by the domain expert, the process of evaluation is prolonged and inefficient. In this paper, we propose a method for automatic false-alarm labeling that mimics how the domain expert determines false alarms. The domain expert determines false alarms by evaluating two critical factors, specifically the duration of alarm occurrence and identification of anomalies before or while the alarm occurs. In our proposed method, Hierarchical Temporal Memory (HTM) is utilized to detect anomalies. It is an unsupervised approach that is suitable to our main data characteristic, which is the lack of an example of the normal form of sensor data. The result shows that the technique is effective for automatic labeling of false alarms in sensor data.