• Title/Summary/Keyword: concept-based detection

Search Result 253, Processing Time 0.022 seconds

Integrated vibration control and health monitoring of building structures: a time-domain approach

  • Chen, B.;Xu, Y.L.;Zhao, X.
    • Smart Structures and Systems
    • /
    • v.6 no.7
    • /
    • pp.811-833
    • /
    • 2010
  • Vibration control and health monitoring of building structures have been actively investigated in recent years but treated separately according to the primary objective pursued. This paper presents a general approach in the time domain for integrating vibration control and health monitoring of a building structure to accommodate various types of control devices and on-line damage detection. The concept of the time-domain approach for integrated vibration control and health monitoring is first introduced. A parameter identification scheme is then developed to identify structural stiffness parameters and update the structural analytical model. Based on the updated analytical model, vibration control of the building using semi-active friction dampers against earthquake excitation is carried out. By assuming that the building suffers certain damage after extreme event or long service and by using the previously identified original structural parameters, a damage detection scheme is finally proposed and used for damage detection. The feasibility of the proposed approach is demonstrated through detailed numerical examples and extensive parameter studies.

Online damage detection using pair cointegration method of time-varying displacement

  • Zhou, Cui;Li, Hong-Nan;Li, Dong-Sheng;Lin, You-Xin;Yi, Ting-Hua
    • Smart Structures and Systems
    • /
    • v.12 no.3_4
    • /
    • pp.309-325
    • /
    • 2013
  • Environmental and operational variables are inevitable concerns by researchers and engineers when implementing the damage detection algorithm in practical projects, because the change of structural behavior could be masked by the conditions in a large extent. Thus, reliable damage detection methods should have a virtue of immunity from environmental and operational variables. In this paper, the pair cointegration method was presented as a novel way to remove the effect of environmental variables. At the beginning, the concept and procedure of this approach were introduced, and then the theoretical formulation and numerical simulations were put forward to illustrate the feasibility. The jump exceeding the control limit in the residual indicates the occurrence of damage, while the direction and magnitude imply the most potential damage location. In addition, the simulation results show that the proposed method has strong ability to resist the noise.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Tree-Pattern-Based Clone Detection with High Precision and Recall

  • Lee, Hyo-Sub;Choi, Myung-Ryul;Doh, Kyung-Goo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.1932-1950
    • /
    • 2018
  • The paper proposes a code-clone detection method that gives the highest possible precision and recall, without giving much attention to efficiency and scalability. The goal is to automatically create a reliable reference corpus that can be used as a basis for evaluating the precision and recall of clone detection tools. The algorithm takes an abstract-syntax-tree representation of source code and thoroughly examines every possible pair of all duplicate tree patterns in the tree, while avoiding unnecessary and duplicated comparisons wherever possible. The largest possible duplicate patterns are then collected in the set of pattern clusters that are used to identify code clones. The method is implemented and evaluated for a standard set of open-source Java applications. The experimental result shows very high precision and recall. False-negative clones missed by our method are all non-contiguous clones. Finally, the concept of neighbor patterns, which can be used to improve recall by detecting non-contiguous clones and intertwined clones, is proposed.

Introduction to a Novel Optimization Method : Artificial Immune Systems (새로운 최적화 기법 소개 : 인공면역시스템)

  • Yang, Byung-Hak
    • IE interfaces
    • /
    • v.20 no.4
    • /
    • pp.458-468
    • /
    • 2007
  • Artificial immune systems (AIS) are one of natural computing inspired by the natural immune system. The fault detection, the pattern recognition, the system control and the optimization are major application area of artificial immune systems. This paper gives a concept of artificial immune systems and useful techniques as like the clonal selection, the immune network theory and the negative selection. A concise survey on the optimization problem based on artificial immune systems is generated. The overall performance of artificial immune systems for the optimization problem is discussed.

The Weld Defects Expression Method by the Concept of Segment Splitting Method and Mean Distance (분할법과 평균거리 개념에 의한 용접 결함 표현 방법)

  • Lee, Jeong-Ick;Koh, Byung-Kab
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.16 no.2
    • /
    • pp.37-43
    • /
    • 2007
  • In this paper, laser vision sensor is used to detect some defects any $co_{2}$ welded specimen in hardware. But, as the best expression of defects of welded specimen, the concept of segment splitting method and mean distance are introduced in software. The developed GUI software is used for deriding whether any welded specimen makes as proper shape or detects in real time. The criteria are based upon ISO 5817 as limits of imperfections in metallic fusion welds.

Integrated Logical Model Based on Sensor and Guidance Light Networks for Fire Evacuation (화재 대피 유도를 위한 센서 및 유도등 네트워크 기반의 통합 논리 모델)

  • Boo, Jun-Pil;Kim, Do-Hyeun;Park, Dong-Gook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.109-114
    • /
    • 2009
  • At the present time, buildings are designed higher and more complex than ever before. Therefore the potential disasters are happened such as fire, power outage, earthquake, flood, hurricanes. Their disasters require people inside buildings to be evacuated as soon as possible. This paper presents a new disaster evacuation guidance concept of inner buildings, whiche aims at integrated the constructing of a sensor network and a guidance light networks in order to provide a quick detection of disasters and accurate evacuation guidance based on indoor geo-information, and sends these instructions to people. In this paper, we present the integrated logical model based on sensor and guidance light networks for the fire disaster management in inner building using our concept. And we verify proposed logical model according to experiments with visualization and operations on map.

  • PDF

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

Anomaly Detection Mechanism based on the Session Patterns and Fuzzy Cognitive Maps (퍼지인식도와 세션패턴 기반의 비정상 탐지 메커니즘)

  • Ryu Dae-Hee;Lee Se-Yul;Kim Hyeock-Jin;Song Young-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.9-16
    • /
    • 2005
  • Recently, since the number of internet users is increasing rapidly and, by using the Public hacking tools, general network users can intrude computer systems easily, the hacking problem is setting more serious. In order to prevent the intrusion. it is needed to detect the sign in advance of intrusion in a Positive Prevention by detecting the various forms of hackers intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port-scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various. In this Paper, we propose a detection algorithm for session patterns and FCM.

  • PDF

Active Sonar Target Detection Using Fractional Fourier Transform (Fractional 푸리에 변환을 이용한 능동소나 표적탐지)

  • Baek, Jongdae;Seok, Jongwon;Bae, Keunsung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.22-29
    • /
    • 2016
  • Many studies in detection and classification of the targets in the underwater environments have been conducted for military purposes, as well as for non-military purpose. Due to the complicated characteristics of underwater acoustic signal reflecting multipath environments and spatio-temporal varying characteristics, active sonar target detection technique has been considered as a difficult technique. In this paper, we describe the basic concept of Fractional Fourier transform and optimal transform order. Then we analyze the relationship between time-frequency characteristics of an LFM signal and its spectrum using Fractional Fourier transform. Based on the analysis results, we present active sonar target detection method. To verify the performance of proposed methods, we compared the results with conventional FFT-based matched filter. The experimental results demonstrate the superiority of the proposed method compared to the conventional method in the aspect of AUC(Area Under the ROC Curve).