• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.028 seconds

An Open Circuit Fault Diagnostic Technique in IGBTs for AC to DC Converters Applied in Microgrid Applications

  • Khomfoi, Surin;Sae-Kok, Warachart;Ngamroo, Issarachai
    • Journal of Power Electronics
    • /
    • v.11 no.6
    • /
    • pp.801-810
    • /
    • 2011
  • An open circuit fault diagnostic method in IGBTs for the ac to dc converters used in microgrid applications is developed in this paper. An ac to dc converter is a key technology for microgrids in order to interface both distributed generation (DG) and renewable energy resources (RES). Also, highly reliable ac to dc converters are necessary to keep converters in continuous operation as long as possible during power switch fault conditions. Therefore, the proposed fault diagnostic method is developed to reduce the fault detection time and to avoid any other fault alarms because continuous operation is desired. The proposed diagnostic method is a combination of the absolute normalized dc current technique and the false alarm suppression algorithm to overcome the long fault detection time and fault alarm problems. The simulation and experimental results show that the developed fault diagnostic method can perform fault detection within about one cycle. The results illustrate that the reliability of an ac to dc converter interfaced with a microgrid can be improved by using the proposed fault diagnostic method.

A FRF-based algorithm for damage detection using experimentally collected data

  • Garcia-Palencia, Antonio;Santini-Bell, Erin;Gul, Mustafa;Catbas, Necati
    • Structural Monitoring and Maintenance
    • /
    • v.2 no.4
    • /
    • pp.399-418
    • /
    • 2015
  • Automated damage detection through Structural Health Monitoring (SHM) techniques has become an active area of research in the bridge engineering community but widespread implementation on in-service infrastructure still presents some challenges. In the meantime, visual inspection remains as the most common method for condition assessment even though collected information is highly subjective and certain types of damage can be overlooked by the inspector. In this article, a Frequency Response Functions-based model updating algorithm is evaluated using experimentally collected data from the University of Central Florida (UCF)-Benchmark Structure. A protocol for measurement selection and a regularization technique are presented in this work in order to provide the most well-conditioned model updating scenario for the target structure. The proposed technique is composed of two main stages. First, the initial finite element model (FEM) is calibrated through model updating so that it captures the dynamic signature of the UCF Benchmark Structure in its healthy condition. Second, based upon collected data from the damaged condition, the updating process is repeated on the baseline (healthy) FEM. The difference between the updated parameters from subsequent stages revealed both location and extent of damage in a "blind" scenario, without any previous information about type and location of damage.

Multiple Fault Detection in Combinational Logic Networks (조합논리회로의 다중결함검출)

  • 고경식;김흥수
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.12 no.4
    • /
    • pp.21-27
    • /
    • 1975
  • In this paper, a procedure for deriving of multiple fault detection test sets is presented for fan-out reconvergent combinational logic networks. A fan-out network is decomposed into a set of fan-out free subnetworks by breaking the internal fan-out points, and the minimal detecting test sets for each subnetwork are found separately. And then, the compatible tests amonng each test set are combined maximally into composite tests to generate primary input binary vectors. The technique for generating minimal test experiments which cover all the possible faults is illustrated in detail by examples.

  • PDF

A Forgery detection protocol for protection of mobile agent execution results (이동 에이전트 수행 결과에 대한 부정 검출 프로토콜)

  • Kim, Hee-Yeon;Shin, Jung-Hwa;Shin, Weon;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.517-522
    • /
    • 2002
  • Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.

Study on the applicability of the principal component analysis for detecting leaks in water pipe networks (상수관망의 누수감지를 위한 주성분 분석의 적용 가능성에 대한 연구)

  • Kim, Kimin;Park, Suwan
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.2
    • /
    • pp.159-167
    • /
    • 2019
  • In this paper the potential of the principal component analysis(PCA) technique for the application of detecting leaks in water pipe networks was evaluated. For this purpose the PCA was conducted to evaluate the relevance of the calculated outliers of a PCA model utilizing the recorded pipe flows and the recorded pipe leak incidents of a case study water distribution system. The PCA technique was enhanced by applying the computational algorithms developed in this study which were designed to extract a partial set of flow data from the original 24 hour flow data so that the effective outlier detection rate was maximized. The relevance of the calculated outliers of a PCA model and the recorded pipe leak incidents was analyzed. The developed algorithm may be applied in determining further leak detection field work for water distribution blocks that have more than 70% of the effective outlier detection rate. However, the analysis suggested that further development on the algorithm is needed to enhance the applicability of the PCA in detecting leaks by considering series of leak reports happening in a relatively short period.

Intelligent Piracy Site Detection Technique with High Accuracy

  • Kim, Eui-Jin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.285-301
    • /
    • 2021
  • Recently, with the diversification of media services and the development of smart devices, users have more opportunities to use digital content, such as movies, dramas, and music; consequently, the size of the copyright market expands simultaneously. However, there are piracy sites that generate revenue by illegal use of copyrighted works. This has led to losses for copyright holders, and the scale of copyrighted works infringed due to the ever-increasing number of piracy sites has increased. To prevent this, government agencies respond to copyright infringement by monitoring piracy sites using online monitoring and countermeasure strategies for infringement. However, the detection and blocking process consumes a significant amount of time when compared to the rate of generating new piracy sites. Hence, online monitoring is less effective. Additionally, given that piracy sites are sophisticated and refined in the same way as legitimate sites, it is necessary to accurately distinguish and block a site that is involved in copyright infringement. Therefore, in this study, we analyze features of piracy sites and based on this analysis, we propose an intelligent detection technique for piracy sites that automatically classifies and detects whether a site is involved in infringement.

Generate Optimal Number of Features in Mobile Malware Classification using Venn Diagram Intersection

  • Ismail, Najiahtul Syafiqah;Yusof, Robiah Binti;MA, Faiza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.389-396
    • /
    • 2022
  • Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms.

Crack detection method for step-changed non-uniform beams using natural frequencies

  • Lee, Jong-Won
    • Smart Structures and Systems
    • /
    • v.30 no.2
    • /
    • pp.173-181
    • /
    • 2022
  • The current paper presents a technique to detect crack in non-uniform cantilever-type pipe beams, that have step changes in the properties of their cross sections, restrained by a translational and rotational spring with a tip mass at the free end. An equation for estimating the natural frequencies for the non-uniform beams is derived using the boundary and continuity conditions, and an equivalent bending stiffness for cracked beam is applied to calculate the natural frequencies of the cracked beam. An experimental study for a step-changed non-uniform cantilever-type pipe beam restrained by bolts with a tip mass is carried out to verify the proposed method. The translational and rotational spring constants are updated using the neural network technique to the results of the experiment for intact case in order to establish a baseline model for the subsequent crack detection. Then, several numerical simulations for the specimen are carried out using the derived equation for estimating the natural frequencies of the cracked beam to construct a set of training patterns of a neural network. The crack locations and sizes are identified using the trained neural network for the 5 damage cases. It is found that the crack locations and sizes are reasonably well estimated from a practical point of view. And it is considered that the usefulness of the proposed method for structural health monitoring of the step-changed non-uniform cantilever-type pipe beam-like structures elastically restrained in the ground and have a tip mass at the free end could be verified.

Anomaly Detection and Performance Analysis using Deep Learning (딥러닝을 활용한 설비 이상 탐지 및 성능 분석)

  • Hwang, Ju-hyo;Jin, Kyo-hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.78-81
    • /
    • 2021
  • Through the smart factory construction project, sensors can be installed in manufacturing production facilities and various process data can be collected in real time. Through this, research on real-time facility anomaly detection is being actively conducted to reduce production interruption due to facility abnormality in the manufacturing process. In this paper, to detect abnormalities in production facilities, the manufacturing data was applied to deep learning models Autoencoder(AE), VAE(Variational Autoencoder), and AAE(Adversarial Autoencoder) to derive the results. Manufacturing data was used as input data through a simple moving average technique and preprocessing process, and performance analysis was conducted according to the window size of the simple movement average technique and the feature vector size of the AE model.

  • PDF

Accuracy Assessment of Unsupervised Change Detection Using Automated Threshold Selection Algorithms and KOMPSAT-3A (자동 임계값 추출 알고리즘과 KOMPSAT-3A를 활용한 무감독 변화탐지의 정확도 평가)

  • Lee, Seung-Min;Jeong, Jong-Chul
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_2
    • /
    • pp.975-988
    • /
    • 2020
  • Change detection is the process of identifying changes by observing the multi-temporal images at different times, and it is an important technique in remote sensing using satellite images. Among the change detection methods, the unsupervised change detection technique has the advantage of extracting rapidly the change area as a binary image. However, it is difficult to understand the changing pattern of land cover in binary images. This study used grid points generated from seamless digital map to evaluate the satellite image change detection results. The land cover change results were extracted using multi-temporal KOMPSAT-3A (K3A) data taken by Gimje Free Trade Zone and change detection algorithm used Spectral Angle Mapper (SAM). Change detection results were presented as binary images using the methods Otsu, Kittler, Kapur, and Tsai among the automated threshold selection algorithms. To consider the seasonal change of vegetation in the change detection process, we used the threshold of Differenced Normalized Difference Vegetation Index (dNDVI) through the probability density function. The experimental results showed the accuracy of the Otsu and Kapur was the highest at 58.16%, and the accuracy improved to 85.47% when the seasonal effects were removed through dNDVI. The algorithm generated based on this research is considered to be an effective method for accuracy assessment and identifying changes pattern when applied to unsupervised change detection.