Search results for: surface damage detection
10982 Data-Centric Anomaly Detection with Diffusion Models
Authors: Sheldon Liu, Gordon Wang, Lei Liu, Xuefeng Liu
Abstract:
Anomaly detection, also referred to as one-class classification, plays a crucial role in identifying product images that deviate from the expected distribution. This study introduces Data-centric Anomaly Detection with Diffusion Models (DCADDM), presenting a systematic strategy for data collection and further diversifying the data with image generation via diffusion models. The algorithm addresses data collection challenges in real-world scenarios and points toward data augmentation with the integration of generative AI capabilities. The paper explores the generation of normal images using diffusion models. The experiments demonstrate that with 30% of the original normal image size, modeling in an unsupervised setting with state-of-the-art approaches can achieve equivalent performances. With the addition of generated images via diffusion models (10% equivalence of the original dataset size), the proposed algorithm achieves better or equivalent anomaly localization performance.Keywords: diffusion models, anomaly detection, data-centric, generative AI
Procedia PDF Downloads 8110981 Approximation of Intersection Curves of Two Parametric Surfaces
Authors: Misbah Irshad, Faiza Sarfraz
Abstract:
The problem of approximating surface to surface intersection is considered to be very important in computer aided geometric design and computer aided manufacturing. Although it is a complex problem to handle, its continuous need in the industry makes it an active topic in research. A technique for approximating intersection curves of two parametric surfaces is proposed, which extracts boundary points and turning points from a sequence of intersection points and interpolate them with the help of rational cubic spline functions. The proposed approach is demonstrated with the help of examples and analyzed by calculating error.Keywords: approximation, parametric surface, spline function, surface intersection
Procedia PDF Downloads 26810980 An Electrocardiography Deep Learning Model to Detect Atrial Fibrillation on Clinical Application
Authors: Jui-Chien Hsieh
Abstract:
Background:12-lead electrocardiography(ECG) is one of frequently-used tools to detect atrial fibrillation (AF), which might degenerate into life-threaten stroke, in clinical Practice. Based on this study, the AF detection by the clinically-used 12-lead ECG device has only 0.73~0.77 positive predictive value (ppv). Objective: It is on great demand to develop a new algorithm to improve the precision of AF detection using 12-lead ECG. Due to the progress on artificial intelligence (AI), we develop an ECG deep model that has the ability to recognize AF patterns and reduce false-positive errors. Methods: In this study, (1) 570-sample 12-lead ECG reports whose computer interpretation by the ECG device was AF were collected as the training dataset. The ECG reports were interpreted by 2 senior cardiologists, and confirmed that the precision of AF detection by the ECG device is 0.73.; (2) 88 12-lead ECG reports whose computer interpretation generated by the ECG device was AF were used as test dataset. Cardiologist confirmed that 68 cases of 88 reports were AF, and others were not AF. The precision of AF detection by ECG device is about 0.77; (3) A parallel 4-layer 1 dimensional convolutional neural network (CNN) was developed to identify AF based on limb-lead ECGs and chest-lead ECGs. Results: The results indicated that this model has better performance on AF detection than traditional computer interpretation of the ECG device in 88 test samples with 0.94 ppv, 0.98 sensitivity, 0.80 specificity. Conclusions: As compared to the clinical ECG device, this AI ECG model promotes the precision of AF detection from 0.77 to 0.94, and can generate impacts on clinical applications.Keywords: 12-lead ECG, atrial fibrillation, deep learning, convolutional neural network
Procedia PDF Downloads 11310979 Adaptive Target Detection of High-Range-Resolution Radar in Non-Gaussian Clutter
Authors: Lina Pan
Abstract:
In non-Gaussian clutter of a spherically invariant random vector, in the cases that a certain estimated covariance matrix could become singular, the adaptive target detection of high-range-resolution radar is addressed. Firstly, the restricted maximum likelihood (RML) estimates of unknown covariance matrix and scatterer amplitudes are derived for non-Gaussian clutter. And then the RML estimate of texture is obtained. Finally, a novel detector is devised. It is showed that, without secondary data, the proposed detector outperforms the existing Kelly binary integrator.Keywords: non-Gaussian clutter, covariance matrix estimation, target detection, maximum likelihood
Procedia PDF Downloads 46210978 A Numerical Investigation of Lamb Wave Damage Diagnosis for Composite Delamination Using Instantaneous Phase
Authors: Haode Huo, Jingjing He, Rui Kang, Xuefei Guan
Abstract:
This paper presents a study of Lamb wave damage diagnosis of composite delamination using instantaneous phase data. Numerical experiments are performed using the finite element method. Different sizes of delamination damages are modeled using finite element package ABAQUS. Lamb wave excitation and responses data are obtained using a pitch-catch configuration. Empirical mode decomposition is employed to extract the intrinsic mode functions (IMF). Hilbert–Huang Transform is applied to each of the resulting IMFs to obtain the instantaneous phase information. The baseline data for healthy plates are also generated using the same procedure. The size of delamination is correlated with the instantaneous phase change for damage diagnosis. It is observed that the unwrapped instantaneous phase of shows a consistent behavior with the increasing delamination size.Keywords: delamination, lamb wave, finite element method, EMD, instantaneous phase
Procedia PDF Downloads 31910977 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 39610976 Applying Knowledge Management and Attitude Based on Holistic Approach in Learning Andragogy, as an Effort to Solve Environmental Problems after Mining Activities
Authors: Aloysius Hardoko, Susilo
Abstract:
The root cause of environmental damage post coal mining activities as determined by the province of East Kalimantan as a corridor of economic activity masterplan acceleration of economic development expansion (MP3EI) is the behavior of adults. Adult behavior can be changed through knowledge management and attitude. Based on the root of the problem, the objective of the research is to apply knowledge management and attitude based on holistic approach in learning andragogy as an effort to solve environmental problems after coal mining activities. Research methods to achieve the objective of using quantitative research with pretest posttest group design. Knowledge management and attitudes based on a holistic approach in adult learning are applied through initial learning activities, core and case-based cover of environmental damage. The research instrument is a description of the case of environmental damage. The data analysis uses t-test to see the effect of knowledge management attitude based on holistic approach before and after adult learning. Location and sample of representative research of adults as many as 20 people in Kutai Kertanegara District, one of the districts in East Kalimantan province, which suffered the worst environmental damage. The conclusion of the research result is the application of knowledge management and attitude in adult learning influence to adult knowledge and attitude to overcome environmental problem post coal mining activity.Keywords: knowledge management and attitude, holistic approach, andragogy learning, environmental damage
Procedia PDF Downloads 23910975 A Case Study of Deep Learning for Disease Detection in Crops
Authors: Felipe A. Guth, Shane Ward, Kevin McDonnell
Abstract:
In the precision agriculture area, one of the main tasks is the automated detection of diseases in crops. Machine Learning algorithms have been studied in recent decades for such tasks in view of their potential for improving economic outcomes that automated disease detection may attain over crop fields. The latest generation of deep learning convolution neural networks has presented significant results in the area of image classification. In this way, this work has tested the implementation of an architecture of deep learning convolution neural network for the detection of diseases in different types of crops. A data augmentation strategy was used to meet the requirements of the algorithm implemented with a deep learning framework. Two test scenarios were deployed. The first scenario implemented a neural network under images extracted from a controlled environment while the second one took images both from the field and the controlled environment. The results evaluated the generalisation capacity of the neural networks in relation to the two types of images presented. Results yielded a general classification accuracy of 59% in scenario 1 and 96% in scenario 2.Keywords: convolutional neural networks, deep learning, disease detection, precision agriculture
Procedia PDF Downloads 25710974 Study on Filter for Semiconductor of Minimizing Damage by X-Ray Laminography
Authors: Chan Jong Park, Hye Min Park, Jeong Ho Kim, Ki Hyun Park, Koan Sik Joo
Abstract:
This research used the MCNPX simulation program to evaluate the utility of a filter that was developed to minimize the damage to a semiconductor device during defect testing with X-ray. The X-ray generator was designed using the MCNPX code, and the X-ray absorption spectrum of the semiconductor device was obtained based on the designed X-ray generator code. To evaluate the utility of the filter, the X-ray absorption rates of the semiconductor device were calculated and compared for Ag, Rh, Mo and V filters with thicknesses of 25μm, 50μm, and 75μm. The results showed that the X-ray absorption rate varied with the type and thickness of the filter, ranging from 8.74% to 49.28%. The Rh filter showed the highest X-ray absorption rates of 29.8%, 15.18% and 8.74% for the above-mentioned filter thicknesses. As shown above, the characteristics of the X-ray absorption with respect to the type and thickness of the filter were identified using MCNPX simulation. With these results, both time and expense could be saved in the production of the desired filter. In the future, this filter will be produced, and its performance will be evaluated.Keywords: X-ray, MCNPX, filter, semiconductor, damage
Procedia PDF Downloads 42110973 Involvement of Multi-Drug Resistance Protein (Mrp) 3 in Resveratrol Protection against Methotrexate-Induced Testicular Damage
Authors: Mohamed A. Morsy, Azza A. K. El-Sheikh, Abdulla Y. Al-Taher
Abstract:
The aim of the present study is to investigate the effect of resveratrol (RES) on methotrexate (MTX)-induced testicular damage. RES (10 mg/kg/day) was given for 8 days orally and MTX (20 mg/kg i.p.) was given at day 4 of experiment, with or without RES in rats. MTX decreased serum testosterone, induced histopathological testicular damage, increased testicular tumor necrosis factor-α level and expression of nuclear factor-κB and cyclooxygenase-2. In MTX/RES group, significant reversal of these parameters was noticed, compared to MTX group. Testicular expression of multidrug resistance protein (Mrp) 3 was three- and five-folds higher in RES- and MTX/RES-treated groups, respectively. In vitro, using prostate cancer cells, each of MTX and RES alone induced cytotoxicity with IC50 0.18 ± 0.08 and 20.5 ± 3.6 µM, respectively. RES also significantly enhanced cytotoxicity of MTX. In conclusion, RES appears to have dual beneficial effect, as it promotes MTX tumor cytotoxicity, while protecting the testes, probably via up-regulation of testicular Mrp3 as a novel mechanism.Keywords: resveratrol, methotrexate, multidrug resistance protein 3, tumor necrosis factor-α, nuclear factor-κB, cyclooxygenase-2
Procedia PDF Downloads 45110972 Modeling and Simulations of Surface Plasmon Waveguide Structures
Authors: Moussa Hamdan, Abdulati Abdullah
Abstract:
This paper presents an investigation of the fabrication of the optical devices in terms of their characteristics based on the use of the electromagnetic waves. Planar waveguides are used to examine the field modes (bound modes) and the parameters required for this structure. The modifications are conducted on surface plasmons based waveguides. Simple symmetric dielectric slab structure is used and analyzed in terms of transverse electric mode (TE-Mode) and transverse magnetic mode (TM-Mode. The paper presents mathematical and numerical solutions for solving simple symmetric plasmons and provides simulations of surface plasmons for field confinement. Asymmetric TM-mode calculations for dielectric surface plasmons are also provided.Keywords: surface plasmons, optical waveguides, semiconductor lasers, refractive index, slab dialectical
Procedia PDF Downloads 30310971 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 22110970 Localising Gauss’s Law and the Electric Charge Induction on a Conducting Sphere
Authors: Sirapat Lookrak, Anol Paisal
Abstract:
Space debris has numerous manifestations, including ferro-metalize and non-ferrous. The electric field will induce negative charges to split from positive charges inside the space debris. In this research, we focus only on conducting materials. The assumption is that the electric charge density of a conducting surface is proportional to the electric field on that surface due to Gauss's Law. We are trying to find the induced charge density from an external electric field perpendicular to a conducting spherical surface. An object is a sphere on which the external electric field is not uniform. The electric field is, therefore, considered locally. The localised spherical surface is a tangent plane, so the Gaussian surface is a very small cylinder, and every point on a spherical surface has its own cylinder. The electric field from a circular electrode has been calculated in near-field and far-field approximation and shown Explanation Touchless maneuvering space debris orbit properties. The electric charge density calculation from a near-field and far-field approximation is done.Keywords: near-field approximation, far-field approximation, localized Gauss’s law, electric charge density
Procedia PDF Downloads 12910969 Continuous Land Cover Change Detection in Subtropical Thicket Ecosystems
Authors: Craig Mahlasi
Abstract:
The Subtropical Thicket Biome has been in peril of transformation. Estimates indicate that as much as 63% of the Subtropical Thicket Biome is severely degraded. Agricultural expansion is the main driver of transformation. While several studies have sought to document and map the long term transformations, there is a lack of information on disturbance events that allow for timely intervention by authorities. Furthermore, tools that seek to perform continuous land cover change detection are often developed for forests and thus tend to perform poorly in thicket ecosystems. This study investigates the utility of Earth Observation data for continuous land cover change detection in Subtropical Thicket ecosystems. Temporal Neural Networks are implemented on a time series of Sentinel-2 observations. The model obtained 0.93 accuracy, a recall score of 0.93, and a precision score of 0.91 in detecting Thicket disturbances. The study demonstrates the potential of continuous land cover change in Subtropical Thicket ecosystems.Keywords: remote sensing, land cover change detection, subtropical thickets, near-real time
Procedia PDF Downloads 16110968 Prediction of Damage to Cutting Tools in an Earth Pressure Balance Tunnel Boring Machine EPB TBM: A Case Study L3 Guadalajara Metro Line (Mexico)
Authors: Silvia Arrate, Waldo Salud, Eloy París
Abstract:
The wear of cutting tools is one of the most decisive elements when planning tunneling works, programming the maintenance stops and saving the optimum stock of spare parts during the evolution of the excavation. Being able to predict the behavior of cutting tools can give a very competitive advantage in terms of costs and excavation performance, optimized to the needs of the TBM itself. The incredible evolution of data science in recent years gives the option to implement it at the time of analyzing the key and most critical parameters related to machinery with the purpose of knowing how the cutting head is performing in front of the excavated ground. Taking this as a case study, Metro Line 3 of Guadalajara in Mexico will develop the feasibility of using Specific Energy versus data science applied over parameters of Torque, Penetration, and Contact Force, among others, to predict the behavior and status of cutting tools. The results obtained through both techniques are analyzed and verified in the function of the wear and the field situations observed in the excavation in order to determine its effectiveness regarding its predictive capacity. In conclusion, the possibilities and improvements offered by the application of digital tools and the programming of calculation algorithms for the analysis of wear of cutting head elements compared to purely empirical methods allow early detection of possible damage to cutting tools, which is reflected in optimization of excavation performance and a significant improvement in costs and deadlines.Keywords: cutting tools, data science, prediction, TBM, wear
Procedia PDF Downloads 4610967 Optimal Continuous Scheduled Time for a Cumulative Damage System with Age-Dependent Imperfect Maintenance
Authors: Chin-Chih Chang
Abstract:
Many manufacturing systems suffer failures due to complex degradation processes and various environment conditions such as random shocks. Consider an operating system is subject to random shocks and works at random times for successive jobs. When successive jobs often result in production losses and performance deterioration, it would be better to do maintenance or replacement at a planned time. A preventive replacement (PR) policy is presented to replace the system before a failure occurs at a continuous time T. In such a policy, the failure characteristics of the system are designed as follows. Each job would cause a random amount of additive damage to the system, and the system fails when the cumulative damage has exceeded a failure threshold. Suppose that the deteriorating system suffers one of the two types of shocks with age-dependent probabilities: type-I (minor) shock is rectified by a minimal repair, or type-II (catastrophic) shock causes the system to fail. A corrective replacement (CR) is performed immediately when the system fails. In summary, a generalized maintenance model to scheduling replacement plan for an operating system is presented below. PR is carried out at time T, whereas CR is carried out when any type-II shock occurs and the total damage exceeded a failure level. The main objective is to determine the optimal continuous schedule time of preventive replacement through minimizing the mean cost rate function. The existence and uniqueness of optimal replacement policy are derived analytically. It can be seen that the present model is a generalization of the previous models, and the policy with preventive replacement outperforms the one without preventive replacement.Keywords: preventive replacement, working time, cumulative damage model, minimal repair, imperfect maintenance, optimization
Procedia PDF Downloads 36110966 Determining Full Stage Creep Properties from Miniature Specimen Creep Test
Authors: W. Sun, W. Wen, J. Lu, A. A. Becker
Abstract:
In this work, methods for determining creep properties which can be used to represent the full life until failure from miniature specimen creep tests based on analytical solutions are presented. Examples used to demonstrate the application of the methods include a miniature rectangular thin beam specimen creep test under three-point bending and a miniature two-material tensile specimen creep test subjected to a steady load. Mathematical expressions for deflection and creep strain rate of the two specimens were presented for the Kachanov-Rabotnov creep damage model. On this basis, an inverse procedure was developed which has potential applications for deriving the full life creep damage constitutive properties from a very small volume of material, in particular, for various microstructure constitutive regions, e.g. within heat-affected zones of power plant pipe weldments. Further work on validation and improvement of the method is addressed.Keywords: creep damage property, miniature specimen, inverse approach, finite element modeling
Procedia PDF Downloads 23010965 Actuator Fault Detection and Fault Tolerant Control of a Nonlinear System Using Sliding Mode Observer
Authors: R. Loukil, M. Chtourou, T. Damak
Abstract:
In this work, we use the Fault detection and isolation and the Fault tolerant control based on sliding mode observer in order to introduce the well diagnosis of a nonlinear system. The robustness of the proposed observer for the two techniques is tested through a physical example. The results in this paper show the interaction between the Fault tolerant control and the Diagnosis procedure.Keywords: fault detection and isolation FDI, fault tolerant control FTC, sliding mode observer, nonlinear system, robustness, stability
Procedia PDF Downloads 37310964 Experimental Investigation of Stain Removal Performance of Different Types of Top Load Washing Machines with Textile Mechanical Damage Consideration
Authors: Ehsan Tuzcuoğlu, Muhammed Emin Çoban, Songül Byraktar
Abstract:
One of the main targets of the washing machine is to remove any dirt and stains from the clothes. Especially, the stain removal is significantly important in the Far East market, where the high percentage of the consumers use the top load washing machines as washing appliance. They use all pretreatment methods (i.e. soaking, prewash, and heavy functions) to eliminate the stains from their clothes. Therefore, with this study it is aimed to study experimentally the stain removal performance of 3 different Top-Loading washing machines of the Far East market with 24 different types of stains which are mostly related to Far East culture. In the meanwhile, the mechanical damge on laundry is examined for each machine to see the mechanical effect of the related stain programs on the textile load of the machines. The test machines vary according to have a heater, moving part(s)on their impeller, and to be in different height/width ratio of the drum. The results indicate that decreasing the water level inside the washing machine might result in better soil removal as well as less textile damage. Beside this, the experimental results reveal that heating has the main effect on stain removal. Two-step (or delayed) heating and a lower amount of water can also be considered as the further parametersKeywords: laundry, washing machine, top load washing machine, stain removal, textile damage, mechanical textile damage
Procedia PDF Downloads 12210963 Surface Nanocrystalline and Hardening Effects of Ti–Al–V Alloy by Electropulsing Ultrasonic Shock
Authors: Xiaoxin Ye, Guoyi Tang
Abstract:
The effect of electropulsing ultrasonic shock (EUS) on the surface hardening and microstructure of Ti6Al4V alloy was studied. It was found that electropulsing improved the microhardness dramatically both in the influential depth and maximum value, compared with the only ultrasonic-shocked sample. It’s indicated that refined surface layer with nanocrystalline and improved microhardness were obtained on account of surface severe plastic deformation, dynamic recrystallization (DRX) and phase change, which was implemented at relative low temperature and high strain rate/capacity due to the coupling of the thermal and athermal effects of EUS. It’s different from conventional experiments and theory. It’s discussed that the positive contributions of EPT in the thermodynamics and kinetics of microstructure and properties change were attributed to the reduction of nucleation energy barrier and acceleration of atomic diffusion. Therefore, it’s supposed that EUS is an energy-saving and high-efficiency method of surface treatment technique with the help of high-energy electropulses, which is promising in cost reduction of the surface engineering and energy management.Keywords: titanium alloys, electropulsing, ultrasonic shock, microhardness, nanocrystalline
Procedia PDF Downloads 29110962 A Finite Memory Residual Generation Filter for Fault Detection
Authors: Pyung Soo Kim, Eung Hyuk Lee, Mun Suck Jang
Abstract:
In the current paper, a residual generation filter with finite memory structure is proposed for fault detection. The proposed finite memory residual generation filter provides the residual by real-time filtering of fault vector using only the most recent finite observations and inputs on the window. It is shown that the residual given by the proposed residual generation filter provides the exact fault for noise-free systems. Finally, to illustrate the capability of the proposed residual generation filter, numerical examples are performed for the discretized DC motor system having the multiple sensor faults.Keywords: residual generation filter, finite memory structure, kalman filter, fast detection
Procedia PDF Downloads 69610961 Detectability Analysis of Typical Aerial Targets from Space-Based Platforms
Authors: Yin Zhang, Kai Qiao, Xiyang Zhi, Jinnan Gong, Jianming Hu
Abstract:
In order to achieve effective detection of aerial targets over long distances from space-based platforms, the mechanism of interaction between the radiation characteristics of the aerial targets and the complex scene environment including the sunlight conditions, underlying surfaces and the atmosphere are analyzed. A large simulated database of space-based radiance images is constructed considering several typical aerial targets, target working modes (flight velocity and altitude), illumination and observation angles, background types (cloud, ocean, and urban areas) and sensor spectrums ranging from visible to thermal infrared. The target detectability is characterized by the signal-to-clutter ratio (SCR) extracted from the images. The influence laws of the target detectability are discussed under different detection bands and instantaneous fields of view (IFOV). Furthermore, the optimal center wavelengths and widths of the detection bands are suggested, and the minimum IFOV requirements are proposed. The research can provide theoretical support and scientific guidance for the design of space-based detection systems and on-board information processing algorithms.Keywords: space-based detection, aerial targets, detectability analysis, scene environment
Procedia PDF Downloads 14410960 Integrating RAG with Prompt Engineering for Dynamic Log Parsing and Anomaly Detections
Authors: Liu Lin Xin
Abstract:
With the increasing complexity of systems, log parsing and anomaly detection have become crucial for maintaining system stability. However, traditional methods often struggle with adaptability and accuracy, especially when dealing with rapidly evolving log content and unfamiliar domains. To address these challenges, this paper proposes approach that integrates Retrieval Augmented Generation (RAG) technology with Prompt Engineering for Large Language Models, applied specifically in LogPrompt. This approach enables dynamic log parsing and intelligent anomaly detection by combining real-time information retrieval with prompt optimization. The proposed method significantly enhances the adaptability of log analysis and improves the interpretability of results. Experimental results on several public datasets demonstrate the method's superior performance, particularly in scenarios lacking training data, where it significantly outperforms traditional methods. This paper introduces a novel technical pathway for log parsing and anomaly detection, showcasing the substantial theoretical value and practical potential.Keywords: log parsing, anomaly detection, RAG, prompt engineering, LLMs
Procedia PDF Downloads 3110959 Surface Water Quality in Orchard Area, Amphawa District, Samut Songkram Province, Thailand
Authors: Sisuwan Kaseamsawat, Sivapan Choo-In
Abstract:
This study aimed to evaluated the surface water quality for agriculture and consumption in the district. Surface water quality parameters in this study in cluding water temperature, turbidity, conductivity. salinity, pH, dissolved oxygen, BOD, nitrate, Suspended solids, phosphorus. Total dissolve solids, iron, copper, zinc, manganese, lead and cadmium. Water samples were collected from small excavation, Lychee, Pomelo, and Coconut orchard for 3 season during January to December 2011. The surface water quality from small excavation, Lychee, pomelo, and coconut orchard are meet the type III of surface water quality standard issued by the National Environmental Quality Act B. E. 1992. except the concentration of heavy metal. And did not differ significantly at 0.05 level, except dissolved oxygen. The water is suitable for consumption by the usual sterile and generally improving water quality through the process before. And is suitable for agriculture.Keywords: water quality, surface water quality, Thailand, water
Procedia PDF Downloads 35510958 Building and Tree Detection Using Multiscale Matched Filtering
Authors: Abdullah H. Özcan, Dilara Hisar, Yetkin Sayar, Cem Ünsalan
Abstract:
In this study, an automated building and tree detection method is proposed using DSM data and true orthophoto image. A multiscale matched filtering is used on DSM data. Therefore, first watershed transform is applied. Then, Otsu’s thresholding method is used as an adaptive threshold to segment each watershed region. Detected objects are masked with NDVI to separate buildings and trees. The proposed method is able to detect buildings and trees without entering any elevation threshold. We tested our method on ISPRS semantic labeling dataset and obtained promising results.Keywords: building detection, local maximum filtering, matched filtering, multiscale
Procedia PDF Downloads 31810957 Optimization of End Milling Process Parameters for Minimization of Surface Roughness of AISI D2 Steel
Authors: Pankaj Chandna, Dinesh Kumar
Abstract:
The present work analyses different parameters of end milling to minimize the surface roughness for AISI D2 steel. D2 Steel is generally used for stamping or forming dies, punches, forming rolls, knives, slitters, shear blades, tools, scrap choppers, tyre shredders etc. Surface roughness is one of the main indices that determines the quality of machined products and is influenced by various cutting parameters. In machining operations, achieving desired surface quality by optimization of machining parameters, is a challenging job. In case of mating components the surface roughness become more essential and is influenced by the cutting parameters, because, these quality structures are highly correlated and are expected to be influenced directly or indirectly by the direct effect of process parameters or their interactive effects (i.e. on process environment). In this work, the effects of selected process parameters on surface roughness and subsequent setting of parameters with the levels have been accomplished by Taguchi’s parameter design approach. The experiments have been performed as per the combination of levels of different process parameters suggested by L9 orthogonal array. Experimental investigation of the end milling of AISI D2 steel with carbide tool by varying feed, speed and depth of cut and the surface roughness has been measured using surface roughness tester. Analyses of variance have been performed for mean and signal-to-noise ratio to estimate the contribution of the different process parameters on the process.Keywords: D2 steel, orthogonal array, optimization, surface roughness, Taguchi methodology
Procedia PDF Downloads 54310956 Detecting Anomalous Matches: An Empirical Study from National Basketball Association
Authors: Jacky Liu, Dulani Jayasuriya, Ryan Elmore
Abstract:
Match fixing and anomalous sports events have increasingly threatened the integrity of professional sports, prompting concerns about existing detection methods. This study addresses prior research limitations in match fixing detection, improving the identification of potential fraudulent matches by incorporating advanced anomaly detection techniques. We develop a novel method to identify anomalous matches and player performances by examining series of matches, such as playoffs. Additionally, we investigate bettors' potential profits when avoiding anomaly matches and explore factors behind unusual player performances. Our literature review covers match fixing detection, match outcome forecasting models, and anomaly detection methods, underscoring current limitations and proposing a new sports anomaly detection method. Our findings reveal anomalous series in the 2022 NBA playoffs, with the Phoenix Suns vs Dallas Mavericks series having the lowest natural occurrence probability. We identify abnormal player performances and bettors' profits significantly decrease when post-season matches are included. This study contributes by developing a new approach to detect anomalous matches and player performances, and assisting investigators in identifying responsible parties. While we cannot conclusively establish reasons behind unusual player performances, our findings suggest factors such as team financial difficulties, executive mismanagement, and individual player contract issues.Keywords: anomaly match detection, match fixing, match outcome forecasting, problematic players identification
Procedia PDF Downloads 7810955 Digital Forgery Detection by Signal Noise Inconsistency
Authors: Bo Liu, Chi-Man Pun
Abstract:
A novel technique for digital forgery detection by signal noise inconsistency is proposed in this paper. The forged area spliced from the other picture contains some features which may be inconsistent with the rest part of the image. Noise pattern and the level is a possible factor to reveal such inconsistency. To detect such noise discrepancies, the test picture is initially segmented into small pieces. The noise pattern and level of each segment are then estimated by using various filters. The noise features constructed in this step are utilized in energy-based graph cut to expose forged area in the final step. Experimental results show that our method provides a good illustration of regions with noise inconsistency in various scenarios.Keywords: forgery detection, splicing forgery, noise estimation, noise
Procedia PDF Downloads 45910954 Reliability Analysis of Glass Epoxy Composite Plate under Low Velocity
Authors: Shivdayal Patel, Suhail Ahmad
Abstract:
Safety assurance and failure prediction of composite material component of an offshore structure due to low velocity impact is essential for associated risk assessment. It is important to incorporate uncertainties associated with material properties and load due to an impact. Likelihood of this hazard causing a chain of failure events plays an important role in risk assessment. The material properties of composites mostly exhibit a scatter due to their in-homogeneity and anisotropic characteristics, brittleness of the matrix and fiber and manufacturing defects. In fact, the probability of occurrence of such a scenario is due to large uncertainties arising in the system. Probabilistic finite element analysis of composite plates due to low-velocity impact is carried out considering uncertainties of material properties and initial impact velocity. Impact-induced damage of composite plate is a probabilistic phenomenon due to a wide range of uncertainties arising in material and loading behavior. A typical failure crack initiates and propagates further into the interface causing de-lamination between dissimilar plies. Since individual crack in the ply is difficult to track. The progressive damage model is implemented in the FE code by a user-defined material subroutine (VUMAT) to overcome these problems. The limit state function is accordingly established while the stresses in the lamina are such that the limit state function (g(x)>0). The Gaussian process response surface method is presently adopted to determine the probability of failure. A comparative study is also carried out for different combination of impactor masses and velocities. The sensitivity based probabilistic design optimization procedure is investigated to achieve better strength and lighter weight of composite structures. Chain of failure events due to different modes of failure is considered to estimate the consequences of failure scenario. Frequencies of occurrence of specific impact hazards yield the expected risk due to economic loss.Keywords: composites, damage propagation, low velocity impact, probability of failure, uncertainty modeling
Procedia PDF Downloads 27710953 Application of Subversion Analysis in the Search for the Causes of Cracking in a Marine Engine Injector Nozzle
Authors: Leszek Chybowski, Artur Bejger, Katarzyna Gawdzińska
Abstract:
Subversion analysis is a tool used in the TRIZ (Theory of Inventive Problem Solving) methodology. This article introduces the history and describes the process of subversion analysis, as well as function analysis and analysis of the resources, used at the design stage when generating possible undesirable situations. The article charts the course of subversion analysis when applied to a fuel injection nozzle of a marine engine. The work describes the fuel injector nozzle as a technological system and presents principles of analysis for the causes of a cracked tip of the nozzle body. The system is modelled with functional analysis. A search for potential causes of the damage is undertaken and a cause-and-effect analysis for various hypotheses concerning the damage is drawn up. The importance of particular hypotheses is evaluated and the most likely causes of damage identified.Keywords: complex technical system, fuel injector, function analysis, importance analysis, resource analysis, sabotage analysis, subversion analysis, TRIZ (Theory of Inventive Problem Solving)
Procedia PDF Downloads 616