69 resultados para phonon anomaly
Resumo:
This research is a step forward in improving the accuracy of detecting anomaly in a data graph representing connectivity between people in an online social network. The proposed hybrid methods are based on fuzzy machine learning techniques utilising different types of structural input features. The methods are presented within a multi-layered framework which provides the full requirements needed for finding anomalies in data graphs generated from online social networks, including data modelling and analysis, labelling, and evaluation.
Resumo:
Reflective writing is an important learning task to help foster reflective practice, but even when assessed it is rarely analysed or critically reviewed due to its subjective and affective nature. We propose a process for capturing subjective and affective analytics based on the identification and recontextualisation of anomalous features within reflective text. We evaluate 2 human supervised trials of the process, and so demonstrate the potential for an automated Anomaly Recontextualisation process for Learning Analytics.
Resumo:
Bearing faults are the most common cause of wind turbine failures. Unavailability and maintenance cost of wind turbines are becoming critically important, with their fast growing in electric networks. Early fault detection can reduce outage time and costs. This paper proposes Anomaly Detection (AD) machine learning algorithms for fault diagnosis of wind turbine bearings. The application of this method on a real data set was conducted and is presented in this paper. For validation and comparison purposes, a set of baseline results are produced using the popular one-class SVM methods to examine the ability of the proposed technique in detecting incipient faults.
Resumo:
Rolling-element bearing failures are the most frequent problems in rotating machinery, which can be catastrophic and cause major downtime. Hence, providing advance failure warning and precise fault detection in such components are pivotal and cost-effective. The vast majority of past research has focused on signal processing and spectral analysis for fault diagnostics in rotating components. In this study, a data mining approach using a machine learning technique called anomaly detection (AD) is presented. This method employs classification techniques to discriminate between defect examples. Two features, kurtosis and Non-Gaussianity Score (NGS), are extracted to develop anomaly detection algorithms. The performance of the developed algorithms was examined through real data from a test to failure bearing. Finally, the application of anomaly detection is compared with one of the popular methods called Support Vector Machine (SVM) to investigate the sensitivity and accuracy of this approach and its ability to detect the anomalies in early stages.
Resumo:
The problem of unsupervised anomaly detection arises in a wide variety of practical applications. While one-class support vector machines have demonstrated their effectiveness as an anomaly detection technique, their ability to model large datasets is limited due to their memory and time complexity for training. To address this issue for supervised learning of kernel machines, there has been growing interest in random projection methods as an alternative to the computationally expensive problems of kernel matrix construction and sup-port vector optimisation. In this paper we leverage the theory of nonlinear random projections and propose the Randomised One-class SVM (R1SVM), which is an efficient and scalable anomaly detection technique that can be trained on large-scale datasets. Our empirical analysis on several real-life and synthetic datasets shows that our randomised 1SVM algorithm achieves comparable or better accuracy to deep auto encoder and traditional kernelised approaches for anomaly detection, while being approximately 100 times faster in training and testing.
Resumo:
Automatic detection of suspicious activities in CCTV camera feeds is crucial to the success of video surveillance systems. Such a capability can help transform the dumb CCTV cameras into smart surveillance tools for fighting crime and terror. Learning and classification of basic human actions is a precursor to detecting suspicious activities. Most of the current approaches rely on a non-realistic assumption that a complete dataset of normal human actions is available. This paper presents a different approach to deal with the problem of understanding human actions in video when no prior information is available. This is achieved by working with an incomplete dataset of basic actions which are continuously updated. Initially, all video segments are represented by Bags-Of-Words (BOW) method using only Term Frequency-Inverse Document Frequency (TF-IDF) features. Then, a data-stream clustering algorithm is applied for updating the system's knowledge from the incoming video feeds. Finally, all the actions are classified into different sets. Experiments and comparisons are conducted on the well known Weizmann and KTH datasets to show the efficacy of the proposed approach.
Resumo:
This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
Australia and New Zealand, as English-speaking nations with dominant white populations, present an ethnic anomaly not only in South East Asia, but also in the Southern Hemisphere. Colonised by predominantly workingclass British immigrants from the late eighteenth century, an ethnic and cultural connection grew between these two countries even though their indigenous populations and ecological environments were otherwise very different. Building a new life in Australia and New Zealand, the colonists shared similar historic perceptions of poverty – perceptions from their homelands that they did not want to see replicated in their new adopted countries. Dreams of a better life shaped their aspirations, self-identity and nationalistic outlook. By the twentieth century, national independence and self-government had replaced British colonial rule. The inveterate occurrence of poverty in Australia and New Zealand had created new local perspectives and different perceptions of, and about, poverty. This study analyses what relationship existed between the political directions adopted by the twentieth-century prime ministers of Australia and New Zealand and their perceptions of poverty. Using the existential phenomenological theory and methodology of Maurice Merleau-Ponty, the study adds to the body of knowledge about poverty in Australia and New Zealand by revealing the structure and origin of the poverty perceptions of the twentieth-century prime ministers.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.
Resumo:
Tilted disc syndrome can cause visual field defects due to an optic disc anomaly. Recent electrophysiological findings demonstrate reduced central outer retinal function with ophthalmoscopically normal maculae. We measured macular sensitivity with the microperimeter and performed psychophysical assessment of mesopic rod and cone luminance temporal sensitivity (critical fusion frequency)in a 52-year-old male patient with tilted disc syndrome and ophthalmoscopically normal maculae. We found a marked reduction of sensitivity in the central 20 degrees and reduced rod- and cone-mediated mesopic visual function. Our findings extend previous electrophysiological data that suggest an outer retinal involvement of cone pathways and present a case with rod and cone impairment mediated via the magnocellular pathway in uncomplicated tilted disc syndrome.
Resumo:
This paper proposes a simple variation of the Allingham and Sandmo (1972) construct and integrates it to a dynamic general equilibrium framework with heterogeneous agents. We study an overlapping generations framework i n which agents must initially decide whether to evade taxes or not. In the event they decide to evade, they then have to decide the extent of income or wealth they wish to under-report. We find that in comparison with the basic approach, the ‘evade or not’ choice drastically reduced the extent of evasion in the economy. This outcome is the result of an anomaly intrinsic to the basic Allingham and Sandmo version of the model, which makes the evade-or-not extension a more suitable approach to modelling the issue. We also find that the basic model, and the model with and ‘evade-or-not’ choice have strikingly different political economy implications, , which suggest fruitful avenues of empirical research.
Resumo:
Traders in the financial world are assessed by the amount of money they make and, increasingly, by the amount of money they make per unit of risk taken, a measure known as the Sharpe Ratio. Little is known about the average Sharpe Ratio among traders, but the Efficient Market Hypothesis suggests that traders, like asset managers, should not outperform the broad market. Here we report the findings of a study conducted in the City of London which shows that a population of experienced traders attain Sharpe Ratios significantly higher than the broad market. To explain this anomaly we examine a surrogate marker of prenatal androgen exposure, the second-to-fourth finger length ratio (2D:4D), which has previously been identified as predicting a trader's long term profitability. We find that it predicts the amount of risk taken by traders but not their Sharpe Ratios. We do, however, find that the traders' Sharpe Ratios increase markedly with the number of years they have traded, a result suggesting that learning plays a role in increasing the returns of traders. Our findings present anomalous data for the Efficient Markets Hypothesis.