Search results for: geochemical anomaly
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 317

Search results for: geochemical anomaly

317 Anomaly Detection Based Fuzzy K-Mode Clustering for Categorical Data

Authors: Murat Yazici

Abstract:

Anomalies are irregularities found in data that do not adhere to a well-defined standard of normal behavior. The identification of outliers or anomalies in data has been a subject of study within the statistics field since the 1800s. Over time, a variety of anomaly detection techniques have been developed in several research communities. The cluster analysis can be used to detect anomalies. It is the process of associating data with clusters that are as similar as possible while dissimilar clusters are associated with each other. Many of the traditional cluster algorithms have limitations in dealing with data sets containing categorical properties. To detect anomalies in categorical data, fuzzy clustering approach can be used with its advantages. The fuzzy k-Mode (FKM) clustering algorithm, which is one of the fuzzy clustering approaches, by extension to the k-means algorithm, is reported for clustering datasets with categorical values. It is a form of clustering: each point can be associated with more than one cluster. In this paper, anomaly detection is performed on two simulated data by using the FKM cluster algorithm. As a significance of the study, the FKM cluster algorithm allows to determine anomalies with their abnormality degree in contrast to numerous anomaly detection algorithms. According to the results, the FKM cluster algorithm illustrated good performance in the anomaly detection of data, including both one anomaly and more than one anomaly.

Keywords: fuzzy k-mode clustering, anomaly detection, noise, categorical data

Procedia PDF Downloads 6
316 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection

Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi

Abstract:

In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.

Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection

Procedia PDF Downloads 184
315 Facility Anomaly Detection with Gaussian Mixture Model

Authors: Sunghoon Park, Hank Kim, Jinwon An, Sungzoon Cho

Abstract:

Internet of Things allows one to collect data from facilities which are then used to monitor them and even predict malfunctions in advance. Conventional quality control methods focus on setting a normal range on a sensor value defined between a lower control limit and an upper control limit, and declaring as an anomaly anything falling outside it. However, interactions among sensor values are ignored, thus leading to suboptimal performance. We propose a multivariate approach which takes into account many sensor values at the same time. In particular Gaussian Mixture Model is used which is trained to maximize likelihood value using Expectation-Maximization algorithm. The number of Gaussian component distributions is determined by Bayesian Information Criterion. The negative Log likelihood value is used as an anomaly score. The actual usage scenario goes like a following. For each instance of sensor values from a facility, an anomaly score is computed. If it is larger than a threshold, an alarm will go off and a human expert intervenes and checks the system. A real world data from Building energy system was used to test the model.

Keywords: facility anomaly detection, gaussian mixture model, anomaly score, expectation maximization algorithm

Procedia PDF Downloads 240
314 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic

Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato

Abstract:

Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.

Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security

Procedia PDF Downloads 326
313 Data-Centric Anomaly Detection with Diffusion Models

Authors: Sheldon Liu, Gordon Wang, Lei Liu, Xuefeng Liu

Abstract:

Anomaly detection, also referred to as one-class classification, plays a crucial role in identifying product images that deviate from the expected distribution. This study introduces Data-centric Anomaly Detection with Diffusion Models (DCADDM), presenting a systematic strategy for data collection and further diversifying the data with image generation via diffusion models. The algorithm addresses data collection challenges in real-world scenarios and points toward data augmentation with the integration of generative AI capabilities. The paper explores the generation of normal images using diffusion models. The experiments demonstrate that with 30% of the original normal image size, modeling in an unsupervised setting with state-of-the-art approaches can achieve equivalent performances. With the addition of generated images via diffusion models (10% equivalence of the original dataset size), the proposed algorithm achieves better or equivalent anomaly localization performance.

Keywords: diffusion models, anomaly detection, data-centric, generative AI

Procedia PDF Downloads 37
312 Spatial REE Geochemical Modeling at Lake Acıgöl, Denizli, Turkey: Analytical Approaches on Spatial Interpolation and Spatial Correlation

Authors: M. Budakoglu, M. Karaman, A. Abdelnasser, M. Kumral

Abstract:

The spatial interpolation and spatial correlation of the rare earth elements (REE) of lake surface sediments of Lake Acıgöl and its surrounding lithological units is carried out by using GIS techniques like Inverse Distance Weighted (IDW) and Geographically Weighted Regression (GWR) techniques. IDW technique which makes the spatial interpolation shows that the lithological units like Hayrettin Formation at north of Lake Acigol have high REE contents than lake sediments as well as ∑LREE and ∑HREE contents. However, Eu/Eu* values (based on chondrite-normalized REE pattern) show high value in some lake surface sediments than in lithological units and that refers to negative Eu-anomaly. Also, the spatial interpolation of the V/Cr ratio indicated that Acıgöl lithological units and lake sediments deposited in in oxic and dysoxic conditions. But, the spatial correlation is carried out by GWR technique. This technique shows high spatial correlation coefficient between ∑LREE and ∑HREE which is higher in the lithological units (Hayrettin Formation and Cameli Formation) than in the other lithological units and lake surface sediments. Also, the matching between REEs and Sc and Al refers to REE abundances of Lake Acıgöl sediments weathered from local bedrock around the lake.

Keywords: spatial geochemical modeling, IDW, GWR techniques, REE, lake sediments, Lake Acıgöl, Turkey

Procedia PDF Downloads 518
311 Distribution Patterns of Trace Metals in Soils of Gbongan-Odeyinka-Orileowu Area, Southwestern Nigeria

Authors: T. A. Adesiyan, J. A. Adekoya A. Akinlua, N. Torto

Abstract:

One hundred and eighty six in situ soil samples of the B–horizon were collected around Gbongan–Odeyinka-Orileowu area, southwestern Nigeria, delineated by longitude 4°15l and 4°30l and latitude 7°14l and 7°31 for a reconnaissance geochemical soil survey. The objective was to determine the distribution pattern of some trace metals in the area with a view to discovering any indication of metallic mineralization. The samples were air–dried and sieved to obtain the minus 230 µ fractions which were used for pH determinations and subjected to hot aqua regia acid digestion. The solutions obtained were analyzed for Ag, As, Au, Cd, Co, Cr, Cu, Fe, Mn, Ni, Pb, Sn, and Zn using atomic absorption spectrometric methods. The resulting data were subjected to simple statistical treatment and used in preparing distribution maps of the elements. With these, the spatial distributions of the elements in the area were discussed. The pH of the soils range from 4.70 to 7.59 and this reflects the geochemical distribution patterns of trace metals in the area. The spatial distribution maps of the elements showed similarity in the distributions of Co, Cr, Fe, Ni, Mn and Pb. This suggests close associations between these elements none of which showed any significant anomaly in the study. The associations might be due to the scavenging actions of Fe–Mn oxides on the elements. Only Ag, Au and Sn on one hand and Zn on the other hand showed significant anomalies, which are thought to be due to mineralization and anthropogenic activities respectively.

Keywords: distribution, metals, Gbongan, Nigeria, mineralization anthropogenic

Procedia PDF Downloads 290
310 Geochemical and Petrological Survey in Northern Ethiopia Basement Rocks for Investigation of Gold and Base Metal Mineral Potential in Finarwa, Southeast Tigray, Ethiopia

Authors: Siraj Beyan Mohamed, Woldia University

Abstract:

The study is accompanied in northern Ethiopian basement rocks, Finarwa area, and its surrounding areas, south eastern Tigray. From the field observations, the geology of the area haven been described and mapped based on mineral composition, texture, structure, and colour of both fresh and weather rocks. Inductively coupled plasma mass spectrometry (ICP-MS) and atomic absorption spectrometry (AAS) have conducted to analysis gold and base metal mineralization. The ore mineral under microscope are commonly base metal sulphides pyrrhotite, Chalcopyrite, pentilanditeoccurring in variable proportions. Galena, chalcopyrite, pyrite, and gold mineral are hosted in quartz vein. Pyrite occurs both in quartz vein and enclosing rocks as a primary mineral. The base metal sulfides occur as disseminated, vein filling, and replacement. Geochemical analyses result determination of the threshold of geochemical anomalies is directly related to the identification of mineralization information. From samples, stream sediment samples and the soil samples indicated that the most promising mineralization occur in the prospect area are gold(Au), copper (Cu), and zinc (Zn). This is also supported by the abundance of chalcopyrite and sphalerite in some highly altered samples. The stream sediment geochemical survey data shows relatively higher values for zinc compared to Pb and Cu. The moderate concentration of the base metals in some of the samples indicates availability base metal mineralization in the study area requiring further investigation. The rock and soil geochemistry shows the significant concentration of gold with maximum value of 0.33ppm and 0.97 ppm in the south western part of the study area. In Finarwa, artisanal gold mining has become an increasingly widespread economic activity of the local people undertaken by socially differentiated groups with a wide range of education levels and economic backgrounds incorporating a wide variety of ‘labour intensive activities without mechanisation.

Keywords: gold, base metal, anomaly, threshold

Procedia PDF Downloads 67
309 Incorporating Anomaly Detection in a Digital Twin Scenario Using Symbolic Regression

Authors: Manuel Alves, Angelica Reis, Armindo Lobo, Valdemar Leiras

Abstract:

In industry 4.0, it is common to have a lot of sensor data. In this deluge of data, hints of possible problems are difficult to spot. The digital twin concept aims to help answer this problem, but it is mainly used as a monitoring tool to handle the visualisation of data. Failure detection is of paramount importance in any industry, and it consumes a lot of resources. Any improvement in this regard is of tangible value to the organisation. The aim of this paper is to add the ability to forecast test failures, curtailing detection times. To achieve this, several anomaly detection algorithms were compared with a symbolic regression approach. To this end, Isolation Forest, One-Class SVM and an auto-encoder have been explored. For the symbolic regression PySR library was used. The first results show that this approach is valid and can be added to the tools available in this context as a low resource anomaly detection method since, after training, the only requirement is the calculation of a polynomial, a useful feature in the digital twin context.

Keywords: anomaly detection, digital twin, industry 4.0, symbolic regression

Procedia PDF Downloads 85
308 A Dynamic Ensemble Learning Approach for Online Anomaly Detection in Alibaba Datacenters

Authors: Wanyi Zhu, Xia Ming, Huafeng Wang, Junda Chen, Lu Liu, Jiangwei Jiang, Guohua Liu

Abstract:

Anomaly detection is a first and imperative step needed to respond to unexpected problems and to assure high performance and security in large data center management. This paper presents an online anomaly detection system through an innovative approach of ensemble machine learning and adaptive differentiation algorithms, and applies them to performance data collected from a continuous monitoring system for multi-tier web applications running in Alibaba data centers. We evaluate the effectiveness and efficiency of this algorithm with production traffic data and compare with the traditional anomaly detection approaches such as a static threshold and other deviation-based detection techniques. The experiment results show that our algorithm correctly identifies the unexpected performance variances of any running application, with an acceptable false positive rate. This proposed approach has already been deployed in real-time production environments to enhance the efficiency and stability in daily data center operations.

Keywords: Alibaba data centers, anomaly detection, big data computation, dynamic ensemble learning

Procedia PDF Downloads 166
307 Manufacturing Anomaly Detection Using a Combination of Gated Recurrent Unit Network and Random Forest Algorithm

Authors: Atinkut Atinafu Yilma, Eyob Messele Sefene

Abstract:

Anomaly detection is one of the essential mechanisms to control and reduce production loss, especially in today's smart manufacturing. Quick anomaly detection aids in reducing the cost of production by minimizing the possibility of producing defective products. However, developing an anomaly detection model that can rapidly detect a production change is challenging. This paper proposes Gated Recurrent Unit (GRU) combined with Random Forest (RF) to detect anomalies in the production process in real-time quickly. The GRU is used as a feature detector, and RF as a classifier using the input features from GRU. The model was tested using various synthesis and real-world datasets against benchmark methods. The results show that the proposed GRU-RF outperforms the benchmark methods with the shortest time taken to detect anomalies in the production process. Based on the investigation from the study, this proposed model can eliminate or reduce unnecessary production costs and bring a competitive advantage to manufacturing industries.

Keywords: anomaly detection, multivariate time series data, smart manufacturing, gated recurrent unit network, random forest

Procedia PDF Downloads 72
306 Magnetic Investigation and 2½D Gravity Profile Modelling across the Beattie Magnetic Anomaly in the Southeastern Karoo Basin, South Africa

Authors: Christopher Baiyegunhi, Oswald Gwavava

Abstract:

The location/source of the Beattie magnetic anomaly (BMA) and interconnectivity of geologic structures at depth have been a topic of investigation for over 30 years. Up to now, no relationship between geological structures (interconnectivity of dolerite intrusions) at depth has been established. Therefore, the environmental impact of fracking the Karoo for shale gas could not be assessed despite the fact that dolerite dykes are groundwater localizers in the Karoo. In this paper, we shed more light to the unanswered questions concerning the possible location of the source of the BMA, the connectivity of geologic structures like dolerite dykes and sills at depth and this relationship needs to be established before the tectonic evolution of the Karoo basin can be fully understood and related to fracking of the Karoo for shale gas. The result of the magnetic investigation and modelling of four gravity profiles that crosses the BMA in the study area reveals that the anomaly, which is part of the Beattie magnetic anomaly tends to divide into two anomalies and continue to trend in an NE-SW direction, the dominant gravity signatures is of long wavelength that is due to a deep source/interface inland and shallows towards the coast, the average depth to the top of the shallow and deep magnetic sources was estimated to be approximately 0.6 km and 15 km, respectively. The BMA become stronger with depth which could be an indication that the source(s) is deep possibly a buried body in the basement. The bean-shaped anomaly also behaves in a similar manner like the BMA thus it could possibly share the same source(s) with the BMA.

Keywords: Beattie magnetic anomaly, magnetic sources, modelling, Karoo Basin

Procedia PDF Downloads 517
305 STTS-EAD: Improving Spatio-Temporal Learning Based Time Series Prediction via Embedded Anomaly Detection

Authors: Tianhao Zhang, Cen Chen, Dawei Cheng, Yuqi Liang, Yuanyuan Liang

Abstract:

Dealing with anomalies is a crucial preprocessing step for multivariate time series prediction. However, existing methods that separate anomaly preprocessing and model training into two stages have certain limitations. Specifically, these methods fail to leverage auxiliary information necessary to distinguish latent anomalies related to spatiotemporal factors during the preprocessing stage. Instead, they solely rely on data distribution for detection which may lead to incorrect processing of many samples that are beneficial for training. To address this, we propose STTS-EAD, an end-to-end method that seamlessly integrates anomaly detection into the training process of multivariate time series forecasting and aims to improve Spatio-Temporal learning based Time Series prediction via Embedded Anomaly Detection. Our proposed STTS-EAD leverages spatio-temporal information for forecasting and anomaly detection, with the two parts alternately executed and optimized for each other. To the best of our knowledge, STTS-EAD is the first to integrate anomaly detection and forecasting tasks in the training phase for improving the accuracy of multivariate time series forecasting. Extensive experiments on a public stock dataset and two real-world sales datasets from a renowned coffee chain enterprise show that our proposed method can effectively process detected anomalies in the training stage to improve forecasting performance in the inference stage and significantly outperform baselines.

Keywords: multivariate time series, anomaly detection, time series forecasting, spatiotemporal feature learning

Procedia PDF Downloads 7
304 Petrology and Petrochemistry of Basement Rocks in Ila Orangun Area, Southwestern Nigeria

Authors: Jayeola A. O., Ayodele O. S., Olususi J. I.

Abstract:

From field studies, six (6) lithological units were identified to be common around the study area, which includes quartzites, granites, granite gneiss, porphyritic granites, amphibolite and pegmatites. Petrographical analysis was done to establish the major mineral assemblages and accessory minerals present in selected rock samples, which represents the major rock types in the area. For the purpose of this study, twenty (20) pulverized rock samples were taken to the laboratory for geochemical analysis with their results used in the classification, as well as suggest the geochemical attributes of the rocks. Results from petrographical studies of the rocks under both plane and cross polarized lights revealed the major minerals identified under thin sections to include quartz, feldspar, biotite, hornblende, plagioclase and muscovite with opaque other accessory minerals, which include actinolite, spinel and myrmekite. Geochemical results obtained and interpreted using various geochemical plots or discrimination plots all classified the rocks in the area as belonging to both the peralkaline metaluminous and peraluminous types. Results for the major oxides ratios produced for Na₂O/K₂O, Al₂O₃/Na₂O + CaO + K₂O and Na₂O + CaO + K₂O/Al₂O₃ show the excess of alumina, Al₂O₃ over the alkaline Na₂O +CaO +K₂O thus suggesting peraluminous rocks. While the excess of the alkali over the alumina suggests the peralkaline metaluminous rock type. The results of correlation coefficient show a perfect strong positive correlation, which shows that they are of same geogenic sources, while negative correlation coefficient values indicate a perfect weak negative correlation, suggesting that they are of heterogeneous geogenic sources. From factor analysis, five component groups were identified as Group 1 consists of Ag-Cr-Ni elemental associations suggesting Ag, Cr, and Ni mineralization, predicting the possibility of sulphide mineralization. in the study area. Group ll and lll consist of As-Ni-Hg-Fe-Sn-Co-Pb-Hg element association, which are pathfinder elements to the mineralization of gold. Group 1V and V consist of Cd-Cu-Ag-Co-Zn, which concentrations are significant to elemental associations and mineralization. In conclusion, from the potassium radiometric anomaly map produced, the eastern section (northeastern and southeastern) is observed to be the hot spot and mineralization zone for the study area.

Keywords: petrography, Ila Orangun, petrochemistry, pegmatites, peraluminous

Procedia PDF Downloads 28
303 Geological, Geochronological, Geochemical, and Geophysical Characteristics of the Dalli Porphyry Cu-Au Deposit in Central Iran; Implications for Exploration

Authors: Hooshag Asadi Haroni, Maryam Veiskarami, Yongjun Lu

Abstract:

The Dalli gold-rich porphyry deposit (17 Mt @ 0.5% Cu and 0.65 g/t Au) is located in the Urumieh-Dokhtar Magmatic Arc (UDMA), a small segment of the Tethyan metallogenic belt, hosting several porphyry Cu (Mo-Au) systems in Iran. This research characterizes the Dalli deposit to define exploration criteria in advanced exploration such as the drilling of possible blind porphyry centers. Geological map, trench/drill hole geochemical and ground magnetic data, and age dating and isotope trace element analyses, carried out at the John De Laeter Research Center of Curtin University, were used to characterize the Delli deposit. Mineralization at Dalli is hosted by NE-trending quartz-diorite porphyry stocks (~ 200m in diameter) intruded by a wall-rock andesite porphyry. Disseminated and stockwork Cu-Au mineralization is related to potassic alteration, comprising magnetite, late K-feldspar and biotite, and quartz-sericite-specularite overprint, surrounded by extensive barren argillic and propylitic alterations. In the peripheries of the porphyry centers, there are N-trending vuggy quartz veins, hosting epithermal Au-Ag-As-Sb mineralization. Geochemical analyses of drill core samples showed that the core of the porphyry stocks is low-grade, whereas the high-grade disseminated and stockwork mineralization (~ 1% Cu and ~ 1.2 g/t Au) occurred at the contact of the porphyry stocks and andesite porphyry. Geochemical studies of the drill hole and trench samples showed a strong correlation between Cu and Au and both show a second-order correlation with Fe and As. Magnetic survey revealed two significant magnetic anomalies, associated with intensive potassic alteration, in the reduced-to-the-pole magnetic map of the area. A relatively weaker magnetic anomaly, showing no surface porphyry expressions, is located on a lithocap, consisting of advanced argillic alteration, vuggy quartz veins, and surface expressions of epithermal geochemical signatures. The association of the lithocap and the weak magnetic anomaly could be indicative of a hidden mineralized porphyry center. Litho-geochemical analyses of the least altered Dalli intrusions and volcanic rocks indicated high Sr/Y (49-61) and Eu/Eu* (0.89-0.92), features typical of Cu porphyries. The U-Pb dating of zircons of the mineralized quartz diorite and andesite porphyry, carried out by laser ablation inductively coupled plasma mass spectrometry, yielded magmatic crystallization ages of 15.4-16.0 Ma (Middle Miocene). The zircon trace element concentrations of Dalli are characterized by high Eu/Eu* (0.3-0.8), (Ce/Nd)/Y (0.01-0.3), and 10000*(Eu/Eu*)/Y (2-15) ratios, similar to fertile porphyry suites such as the giant Sar-Cheshmeh and Qulong porphyry Cu deposits along the Tethyan belt. This suggests that the Middle Miocene Dalli intrusions are fertile and require extensive deep drillings to define their potential. Chondrite-normalized rare earth element (REE) patterns show no significant Eu anomalies, and are characterized by light-REE enrichments (La/Sm)n = 2.57–6.40). In normalized multi-element diagrams, analyzed rocks are characterized by enrichments in large ion lithophile elements (LILE) and depletions in high field strength elements (HFSE), and display typical features of subduction-related calc-alkaline magmas. The characteristics of the Dalli deposit provided several recognition criteria for detailed exploration of Cu-Au porphyry deposits and highlighted the importance of the UDMA as a potentially significant, economically important, but relatively underexplored porphyry province.

Keywords: porphyry, gold, geochronology, magnetic, exploration

Procedia PDF Downloads 17
302 Depositional Environment of the Babouchite Rocks of Numidian Formation, Northwestern Tunisia: Mineralogical Study and Geochemical Properties

Authors: Ben Yahia Nouha, Harris Chris, Boussen Slim, Chaabani Fredj

Abstract:

The present work has set itself the objective of studying non-detritic siliceous rocks in the extreme northwestern of Tunisia. It aims to discuss the origin and depositional environment of siliceous rocks based on petrographic, mineralogical, and geochemical results. The different sections were made in the area of Babouch and the area of Cap-Serrat. The collected samples were subjected to petrographic, mineralogical, and geochemical characterization using different analytical methods: scanning electron microscopy (SEM), X-ray diffraction (XRD), geochemical analysis (ICP- AES), isotopic geochemistry (δ¹⁸O) to assess their suitability for industrial use. These babouchite shows that the mineralogy consists of quartz as the dominant mineral with the total lack of amorphous silica, while clay represents the minor phase. The petrographic examination revealed allowed to deduce that it is a rock of chemical origin deriving from tests of siliceous organisms (the radiolarians). Chemical analyzes show that SiO₂, Al₂O₃, and Fe₂O₃ represent the most abundant oxides. The other oxides are present in negligible quantity. Geochemical data support a biogenic and non-hydrothermal origin of babouchite silica. Oxygen isotopic has shown that babouchites are formed in an environment with a high temperature, ranging from 56°C to 73°C.

Keywords: siliceous rocks, babouchite formation, XRD, chemical analysis, isotopic geochemistry, Northwestern of Tunisia

Procedia PDF Downloads 131
301 Mineralogical and Geochemical Constraints on the Origin and Environment of Numidian Siliceous Sedimentary Rocks of the Extreme Northwest Tunisia

Authors: Ben Yahia Nouha, Harris Chris, Sebei Abdelaziz, Boussen Slim, Chaabani Fredj

Abstract:

The present work has set itself the objective of studying non-detritic siliceous rocks of the extreme northwest Tunisia. It aims to examine the origin and their sedimentary depositional environment based on mineralogical and geochemical characteristics. The different sections were located in the area of Babouch and the area of Tabarka. The collected samples were subjected to mineralogical and geochemical characterization using different analytical methods: X-ray diffraction (XRD), geochemical analysis (ICP- AES), isotopic geochemistry (δ18O), to assess their suitability for industrial use. X-ray powder diffraction of the pure siliceous rock indicates quartz as the major mineral, with the total lack of amorphous silica. Trace impurities, such as carbonate and clay minerals, are concealed in the analytical results. The petrographic examination revealed allowed us to deduce that this rock was deriving from tests of siliceous organisms (the radiolarians). The chemical composition shows that SiO2, Al2O3, and Fe2O3 represent the most abundant oxides. The other oxides are present in negligible quantities. Geochemical data support a biogenic and non-hydrothermal origin of babouchite silica. Oxygen isotopic has shown that babouchites were formed in an environment with a high temperature ranging from 56 °C to 73 °C.

Keywords: biogenic silica, babouchite formation, XRD, chemical analysis, oxygen isotopic, northwest tunisia

Procedia PDF Downloads 118
300 Anomaly Detection Based on System Log Data

Authors: M. Kamel, A. Hoayek, M. Batton-Hubert

Abstract:

With the increase of network virtualization and the disparity of vendors, the continuous monitoring and detection of anomalies cannot rely on static rules. An advanced analytical methodology is needed to discriminate between ordinary events and unusual anomalies. In this paper, we focus on log data (textual data), which is a crucial source of information for network performance. Then, we introduce an algorithm used as a pipeline to help with the pretreatment of such data, group it into patterns, and dynamically label each pattern as an anomaly or not. Such tools will provide users and experts with continuous real-time logs monitoring capability to detect anomalies and failures in the underlying system that can affect performance. An application of real-world data illustrates the algorithm.

Keywords: logs, anomaly detection, ML, scoring, NLP

Procedia PDF Downloads 58
299 Design of Geochemical Maps of Industrial City Using Gradient Boosting and Geographic Information System

Authors: Ruslan Safarov, Zhanat Shomanova, Yuri Nossenko, Zhandos Mussayev, Ayana Baltabek

Abstract:

Geochemical maps of distribution of polluting elements V, Cr, Mn, Co, Ni, Cu, Zn, Mo, Cd, Pb on the territory of the Pavlodar city (Kazakhstan), which is an industrial hub were designed. The samples of soil were taken from 100 locations. Elemental analysis has been performed using XRF. The obtained data was used for training of the computational model with gradient boosting algorithm. The optimal parameters of model as well as the loss function were selected. The computational model was used for prediction of polluting elements concentration for 1000 evenly distributed points. Based on predicted data geochemical maps were created. Additionally, the total pollution index Zc was calculated for every from 1000 point. The spatial distribution of the Zc index was visualized using GIS (QGIS). It was calculated that the maximum coverage area of the territory of the Pavlodar city belongs to the moderately hazardous category (89.7%). The visualization of the obtained data allowed us to conclude that the main source of contamination goes from the industrial zones where the strategic metallurgical and refining plants are placed.

Keywords: Pavlodar, geochemical map, gradient boosting, CatBoost, QGIS, spatial distribution, heavy metals

Procedia PDF Downloads 48
298 Minimum Pension Guarantee in Funded Pension Schemes: Theoretical Model and Global Implementation

Authors: Ishay Wolf

Abstract:

In this study, the financial position of pension actors in the market during the pension system transition toward a more funded capitalized scheme is explored, mainly via an option benefit model. This is enabled by not considering the economy as a single earning cohort. We analytically demonstrate a socio-economic anomaly in the funded pension system, which is in favor of high earning cohorts on at the expense of low earning cohorts. This anomaly is realized by a lack of insurance and exposure to financial and systemic risks. Furthermore, the anomaly might lead to pension re-reform back to unfunded scheme, mostly due to political pressure. We find that a minimum pension guarantee is a rebalance mechanism to this anomaly, which increases the probability to of the sustainable pension scheme. Specifically, we argue that implementing the guarantee with an intra-generational, risk-sharing mechanism is the most efficient way to reduce the effect of this abnormality. Moreover, we exhibit the convergence process toward implementing minimum pension guarantee in many countries which have capitalized their pension systems during the last three decades, particularly among Latin America and CEE countries.

Keywords: benefits, pension scheme, put option, social security

Procedia PDF Downloads 95
297 Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation

Authors: Edward Guillén, Jhordany Rodriguez, Rafael Páez

Abstract:

Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one is the analysis performed over the obtained data. The goal of this paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with different setups. The independent variables are as follows: the number of system inputs, the way the inputs are codified and the complexity of the analysis techniques. For the analysis, some approaches of artificial neural networks are implemented with different number of layers. The obtained results show the influence that each of these variables has in the system performance.

Keywords: network intrusion detection, machine learning, artificial neural network, anomaly detection module

Procedia PDF Downloads 302
296 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 266
295 Geochemical and Spatial Distribution of Minerals in the Tailings of IFE/IJESA Gold Mine Zone, Nigeria

Authors: Oladejo S. O, Tomori W. B, Adebayo A. O

Abstract:

The main objective of this research is to identify the geochemical and mineralogical characteristics potential of unexplored tailings around the gold deposit region using spatial statistics and map modeling. Some physicochemical parameters such as pH, redox potential, electrical conductivity, cation exchange capacity, total organic carbon, total organic matter, residual humidity, Cation exchange capacity, and particle size were determined from both the mine drains and tailing samples using standard methods. The physicochemical parameters of tailings ranges obtained were pH (6.0 – 7.3), Eh (−16 - 95 Mev), EC (49 - 156 µS/cm), RH (0.20-2.60%), CEC (3.64-6.45 cmol/kg), TOC (3.57-18.62%), TOM (6.15-22.93%). The geochemical oxide composition were identified using Proton Induced X-ray emission and the results indicated that SiO2>Al2O3>Fe2O3>TiO2>K2O>MgO>CaO>Na2O> P2O5>MnO>Cr2O3>SrO>K2O>P2O5. The major mineralogical components in the tailing samples were determined by quantitative X-ray diffraction techniques using the Rietveld method. Geostatistical relationships among the known points were determined using ArcGIS 10.2 software to interpolate mineral concentration with respect to the study area. The Rietveld method gave a general Quartz value of 73.73-92.76%, IImenite as 0.38-4.77%, Kaolinite group as 3.19-20.83%, Muscovite as 0.77-11.70% with a trace of other minerals. The high percentage of quartz is an indication of a sandy environment with a loose binding site.

Keywords: tailings, geochemical, mineralogy, spatial

Procedia PDF Downloads 25
294 Uncertainty Quantification of Corrosion Anomaly Length of Oil and Gas Steel Pipelines Based on Inline Inspection and Field Data

Authors: Tammeen Siraj, Wenxing Zhou, Terry Huang, Mohammad Al-Amin

Abstract:

The high resolution inline inspection (ILI) tool is used extensively in the pipeline industry to identify, locate, and measure metal-loss corrosion anomalies on buried oil and gas steel pipelines. Corrosion anomalies may occur singly (i.e. individual anomalies) or as clusters (i.e. a colony of corrosion anomalies). Although the ILI technology has advanced immensely, there are measurement errors associated with the sizes of corrosion anomalies reported by ILI tools due limitations of the tools and associated sizing algorithms, and detection threshold of the tools (i.e. the minimum detectable feature dimension). Quantifying the measurement error in the ILI data is crucial for corrosion management and developing maintenance strategies that satisfy the safety and economic constraints. Studies on the measurement error associated with the length of the corrosion anomalies (in the longitudinal direction of the pipeline) has been scarcely reported in the literature and will be investigated in the present study. Limitations in the ILI tool and clustering process can sometimes cause clustering error, which is defined as the error introduced during the clustering process by including or excluding a single or group of anomalies in or from a cluster. Clustering error has been found to be one of the biggest contributory factors for relatively high uncertainties associated with ILI reported anomaly length. As such, this study focuses on developing a consistent and comprehensive framework to quantify the measurement errors in the ILI-reported anomaly length by comparing the ILI data and corresponding field measurements for individual and clustered corrosion anomalies. The analysis carried out in this study is based on the ILI and field measurement data for a set of anomalies collected from two segments of a buried natural gas pipeline currently in service in Alberta, Canada. Data analyses showed that the measurement error associated with the ILI-reported length of the anomalies without clustering error, denoted as Type I anomalies is markedly less than that for anomalies with clustering error, denoted as Type II anomalies. A methodology employing data mining techniques is further proposed to classify the Type I and Type II anomalies based on the ILI-reported corrosion anomaly information.

Keywords: clustered corrosion anomaly, corrosion anomaly assessment, corrosion anomaly length, individual corrosion anomaly, metal-loss corrosion, oil and gas steel pipeline

Procedia PDF Downloads 279
293 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 338
292 mKDNAD: A Network Flow Anomaly Detection Method Based On Multi-teacher Knowledge Distillation

Authors: Yang Yang, Dan Liu

Abstract:

Anomaly detection models for network flow based on machine learning have poor detection performance under extremely unbalanced training data conditions and also have slow detection speed and large resource consumption when deploying on network edge devices. Embedding multi-teacher knowledge distillation (mKD) in anomaly detection can transfer knowledge from multiple teacher models to a single model. Inspired by this, we proposed a state-of-the-art model, mKDNAD, to improve detection performance. mKDNAD mine and integrate the knowledge of one-dimensional sequence and two-dimensional image implicit in network flow to improve the detection accuracy of small sample classes. The multi-teacher knowledge distillation method guides the train of the student model, thus speeding up the model's detection speed and reducing the number of model parameters. Experiments in the CICIDS2017 dataset verify the improvements of our method in the detection speed and the detection accuracy in dealing with the small sample classes.

Keywords: network flow anomaly detection (NAD), multi-teacher knowledge distillation, machine learning, deep learning

Procedia PDF Downloads 85
291 Malaysian's Shale Formation Characterizations: Geochemical Properties, Mineralogy, Adsorption and Desorption Behavior

Authors: Ahmed M. Al-Mutarreb, Shiferaw R. Jufar

Abstract:

Global shale gas resource assessment is still in its preliminary stage in most of the countries including the development of shale gas reservoirs in Malaysia. This project presents the main geochemical and mineral characteristics of few Malaysian’s shale samples which contribute on evaluating shale gas reserve world resource evaluations. Three shale samples from the western part of Peninsular Malaysia (Batu-Caja, Kuala Lumpur, and Johor Baru shale formations) were collected for this study. Total organic carbon wt.%, thermal maturity, kerogen type, mineralogy and adsorption/desorption characteristics are measured at Universiti Teknologi PETRONAS laboratories. Two samples show good potential in TOC results exhibited > 2wt.% exceeding the minimum values of Shale gas potential, while the third revealed < 1.5wt. Mineralogical compositions for the three samples are within the acceptable range percentage% of quartz and clays compared to shale plays in USA. This research’s results are promising and recommend to continue exploring and assessing unconventional shale gas reserves values in these areas.

Keywords: shale gas characterizations, geochemical properties, Malaysia, shale gas reserve

Procedia PDF Downloads 275
290 Detecting Anomalous Matches: An Empirical Study from National Basketball Association

Authors: Jacky Liu, Dulani Jayasuriya, Ryan Elmore

Abstract:

Match fixing and anomalous sports events have increasingly threatened the integrity of professional sports, prompting concerns about existing detection methods. This study addresses prior research limitations in match fixing detection, improving the identification of potential fraudulent matches by incorporating advanced anomaly detection techniques. We develop a novel method to identify anomalous matches and player performances by examining series of matches, such as playoffs. Additionally, we investigate bettors' potential profits when avoiding anomaly matches and explore factors behind unusual player performances. Our literature review covers match fixing detection, match outcome forecasting models, and anomaly detection methods, underscoring current limitations and proposing a new sports anomaly detection method. Our findings reveal anomalous series in the 2022 NBA playoffs, with the Phoenix Suns vs Dallas Mavericks series having the lowest natural occurrence probability. We identify abnormal player performances and bettors' profits significantly decrease when post-season matches are included. This study contributes by developing a new approach to detect anomalous matches and player performances, and assisting investigators in identifying responsible parties. While we cannot conclusively establish reasons behind unusual player performances, our findings suggest factors such as team financial difficulties, executive mismanagement, and individual player contract issues.

Keywords: anomaly match detection, match fixing, match outcome forecasting, problematic players identification

Procedia PDF Downloads 49
289 Anomaly Detection in a Data Center with a Reconstruction Method Using a Multi-Autoencoders Model

Authors: Victor Breux, Jérôme Boutet, Alain Goret, Viviane Cattin

Abstract:

Early detection of anomalies in data centers is important to reduce downtimes and the costs of periodic maintenance. However, there is little research on this topic and even fewer on the fusion of sensor data for the detection of abnormal events. The goal of this paper is to propose a method for anomaly detection in data centers by combining sensor data (temperature, humidity, power) and deep learning models. The model described in the paper uses one autoencoder per sensor to reconstruct the inputs. The auto-encoders contain Long-Short Term Memory (LSTM) layers and are trained using the normal samples of the relevant sensors selected by correlation analysis. The difference signal between the input and its reconstruction is then used to classify the samples using feature extraction and a random forest classifier. The data measured by the sensors of a data center between January 2019 and May 2020 are used to train the model, while the data between June 2020 and May 2021 are used to assess it. Performances of the model are assessed a posteriori through F1-score by comparing detected anomalies with the data center’s history. The proposed model outperforms the state-of-the-art reconstruction method, which uses only one autoencoder taking multivariate sequences and detects an anomaly with a threshold on the reconstruction error, with an F1-score of 83.60% compared to 24.16%.

Keywords: anomaly detection, autoencoder, data centers, deep learning

Procedia PDF Downloads 157
288 The Use of Image Processing Responses Tools Applied to Analysing Bouguer Gravity Anomaly Map (Tangier-Tetuan's Area-Morocco)

Authors: Saad Bakkali

Abstract:

Image processing is a powerful tool for the enhancement of edges in images used in the interpretation of geophysical potential field data. Arial and terrestrial gravimetric surveys were carried out in the region of Tangier-Tetuan. From the observed and measured data of gravity Bouguer gravity anomalies map was prepared. This paper reports the results and interpretations of the transformed maps of Bouguer gravity anomaly of the Tangier-Tetuan area using image processing. Filtering analysis based on classical image process was applied. Operator image process like logarithmic and gamma correction are used. This paper also present the results obtained from this image processing analysis of the enhancement edges of the Bouguer gravity anomaly map of the Tangier-Tetuan zone.

Keywords: bouguer, tangier, filtering, gamma correction, logarithmic enhancement edges

Procedia PDF Downloads 394