990 resultados para Damage Detection
Resumo:
Reliability of power converters is of crucial importance in switched reluctance motor drives used for safety-critical applications. Open-circuit faults in power converters will cause the motor to run in unbalanced states, and if left untreated, they will lead to damage to the motor and power modules, and even cause a catastrophic failure of the whole drive system. This study is focused on using a single current sensor to detect open-circuit faults accurately. An asymmetrical half-bridge converter is considered in this study and the faults of single-phase open and two-phase open are analysed. Three different bus positions are defined. On the basis of a fast Fourier transform algorithm with Blackman window interpolation, the bus current spectrums before and after open-circuit faults are analysed in details. Their fault characteristics are extracted accurately by the normalisations of the phase fundamental frequency component and double phase fundamental frequency component, and the fault characteristics of the three bus detection schemes are also compared. The open-circuit faults can be located by finding the relationship between the bus current and rotor position. The effectiveness of the proposed diagnosis method is validated by the simulation results and experimental tests.
Resumo:
Phospholipid oxidation by adventitious damage generates a wide variety of products with potentially novel biological activities that can modulate inflammatory processes associated with various diseases. To understand the biological importance of oxidised phospholipids (OxPL) and their potential role as disease biomarkers requires precise information about the abundance of these compounds in cells and tissues. There are many chemiluminescence and spectrophotometric assays available for detecting oxidised phospholipids, but they all have some limitations. Mass spectrometry coupled with liquid chromatography is a powerful and sensitive approach that can provide detailed information about the oxidative lipidome, but challenges still remain. The aim of this work is to develop improved methods for detection of OxPLs by optimisation of chromatographic separation through testing several reverse phase columns and solvent systems, and using targeted mass spectrometry approaches. Initial experiments were carried out using oxidation products generated in vitro to optimise the chromatography separation parameters and mass spectrometry parameters. We have evaluated the chromatographic separation of oxidised phosphatidylcholines (OxPCs) and oxidised phosphatidylethanolamines (OXPEs) using C8, C18 and C30 reverse phase, polystyrene – divinylbenzene based monolithic and mixed – mode hydrophilic interaction (HILIC) columns, interfaced with mass spectrometry. Our results suggest that the monolithic column was best able to separate short chain OxPCs and OxPEs from long chain oxidised and native PCs and PEs. However, variation in charge of polar head groups and extreme diversity of oxidised species make analysis of several classes of OxPLs within one analytical run impractical. We evaluated and optimised the chromatographic separation of OxPLs by serially coupling two columns: HILIC and monolith column that provided us the larger coverage of OxPL species in a single analytical run.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
Fast spreading unknown viruses have caused major damage on computer systems upon their initial release. Current detection methods have lacked capabilities to detect unknown viruses quickly enough to avoid mass spreading and damage. This dissertation has presented a behavior based approach to detecting known and unknown viruses based on their attempt to replicate. Replication is the qualifying fundamental characteristic of a virus and is consistently present in all viruses making this approach applicable to viruses belonging to many classes and executing under several conditions. A form of replication called self-reference replication, (SR-replication), has been formalized as one main type of replication which specifically replicates by modifying or creating other files on a system to include the virus itself. This replication type was used to detect viruses attempting replication by referencing themselves which is a necessary step to successfully replicate files. The approach does not require a priori knowledge about known viruses. Detection was accomplished at runtime by monitoring currently executing processes attempting to replicate. Two implementation prototypes of the detection approach called SRRAT were created and tested on the Microsoft Windows operating systems focusing on the tracking of user mode Win32 API system calls and Kernel mode system services. The research results showed SR-replication capable of distinguishing between file infecting viruses and benign processes with little or no false positives and false negatives. ^
Resumo:
Fast spreading unknown viruses have caused major damage on computer systems upon their initial release. Current detection methods have lacked capabilities to detect unknown virus quickly enough to avoid mass spreading and damage. This dissertation has presented a behavior based approach to detecting known and unknown viruses based on their attempt to replicate. Replication is the qualifying fundamental characteristic of a virus and is consistently present in all viruses making this approach applicable to viruses belonging to many classes and executing under several conditions. A form of replication called self-reference replication, (SR-replication), has been formalized as one main type of replication which specifically replicates by modifying or creating other files on a system to include the virus itself. This replication type was used to detect viruses attempting replication by referencing themselves which is a necessary step to successfully replicate files. The approach does not require a priori knowledge about known viruses. Detection was accomplished at runtime by monitoring currently executing processes attempting to replicate. Two implementation prototypes of the detection approach called SRRAT were created and tested on the Microsoft Windows operating systems focusing on the tracking of user mode Win32 API system calls and Kernel mode system services. The research results showed SR-replication capable of distinguishing between file infecting viruses and benign processes with little or no false positives and false negatives.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
With applications ranging from aerospace to biomedicine, additive manufacturing (AM) has been revolutionizing the manufacturing industry. The ability of additive techniques, such as selective laser melting (SLM), to create fully functional, geometrically complex, and unique parts out of high strength materials is of great interest. Unfortunately, despite numerous advantages afforded by this technology, its widespread adoption is hindered by a lack of on-line, real time feedback control and quality assurance techniques. In this thesis, inline coherent imaging (ICI), a broadband, spatially coherent imaging technique, is used to observe the SLM process in 15 - 45 $\mu m$ 316L stainless steel. Imaging of both single and multilayer builds is performed at a rate of 200 $kHz$, with a resolution of tens of microns, and a high dynamic range rendering it impervious to blinding from the process beam. This allows imaging before, during, and after laser processing to observe changes in the morphology and stability of the melt. Galvanometer-based scanning of the imaging beam relative to the process beam during the creation of single tracks is used to gain a unique perspective of the SLM process that has been so far unobservable by other monitoring techniques. Single track processing is also used to investigate the possibility of a preliminary feedback control parameter based on the process beam power, through imaging with both coaxial and 100 $\mu m$ offset alignment with respect to the process beam. The 100 $\mu m$ offset improved imaging by increasing the number of bright A-lines (i.e. with signal greater than the 10 $dB$ noise floor) by 300\%. The overlap between adjacent tracks in a single layer is imaged to detect characteristic fault signatures. Full multilayer builds are carried out and the resultant ICI images are used to detect defects in the finished part and improve upon the initial design of the build system. Damage to the recoater blade is assessed using powder layer scans acquired during a 3D build. The ability of ICI to monitor SLM processes at such high rates with high resolution offers extraordinary potential for future advances in on-line feedback control of additive manufacturing.
Resumo:
Le dimensionnement basé sur la performance (DBP), dans une approche déterministe, caractérise les objectifs de performance par rapport aux niveaux de performance souhaités. Les objectifs de performance sont alors associés à l'état d'endommagement et au niveau de risque sismique établis. Malgré cette approche rationnelle, son application est encore difficile. De ce fait, des outils fiables pour la capture de l'évolution, de la distribution et de la quantification de l'endommagement sont nécessaires. De plus, tous les phénomènes liés à la non-linéarité (matériaux et déformations) doivent également être pris en considération. Ainsi, cette recherche montre comment la mécanique de l'endommagement pourrait contribuer à résoudre cette problématique avec une adaptation de la théorie du champ de compression modifiée et d'autres théories complémentaires. La formulation proposée adaptée pour des charges monotones, cycliques et de type pushover permet de considérer les effets non linéaires liés au cisaillement couplé avec les mécanismes de flexion et de charge axiale. Cette formulation est spécialement appliquée à l'analyse non linéaire des éléments structuraux en béton soumis aux effets de cisaillement non égligeables. Cette nouvelle approche mise en œuvre dans EfiCoS (programme d'éléments finis basé sur la mécanique de l'endommagement), y compris les critères de modélisation, sont également présentés ici. Des calibrations de cette nouvelle approche en comparant les prédictions avec des données expérimentales ont été réalisées pour les murs de refend en béton armé ainsi que pour des poutres et des piliers de pont où les effets de cisaillement doivent être pris en considération. Cette nouvelle version améliorée du logiciel EFiCoS a démontrée être capable d'évaluer avec précision les paramètres associés à la performance globale tels que les déplacements, la résistance du système, les effets liés à la réponse cyclique et la quantification, l'évolution et la distribution de l'endommagement. Des résultats remarquables ont également été obtenus en référence à la détection appropriée des états limites d'ingénierie tels que la fissuration, les déformations unitaires, l'éclatement de l'enrobage, l'écrasement du noyau, la plastification locale des barres d'armature et la dégradation du système, entre autres. Comme un outil pratique d'application du DBP, des relations entre les indices d'endommagement prédits et les niveaux de performance ont été obtenus et exprimés sous forme de graphiques et de tableaux. Ces graphiques ont été développés en fonction du déplacement relatif et de la ductilité de déplacement. Un tableau particulier a été développé pour relier les états limites d'ingénierie, l'endommagement, le déplacement relatif et les niveaux de performance traditionnels. Les résultats ont démontré une excellente correspondance avec les données expérimentales, faisant de la formulation proposée et de la nouvelle version d'EfiCoS des outils puissants pour l'application de la méthodologie du DBP, dans une approche déterministe.
Resumo:
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.
Resumo:
Poultry colibacillosis due to Avian Pathogenic Escherichia coli (APEC) is responsible for several extra-intestinal pathological conditions, leading to serious economic damage in poultry production. The most commonly associated pathologies are airsacculitis, colisepticemia, and cellulitis in broiler chickens, and salpingitis and peritonitis in broiler breeders. In this work a total of 66 strains isolated from dead broiler breeders affected with colibacillosis and 61 strains from healthy broilers were studied. Strains from broiler breeders were typified with serogroups O2, O18, and O78, which are mainly associated with disease. The serogroup O78 was the most prevalent (58%). All the strains were checked for the presence of 11 virulence genes: 1) arginine succinyltransferase A (astA); ii) E. coli hemeutilization protein A (chuA); iii) colicin V A/B (cvaA/B); iv) fimbriae mannose-binding type 1 (fimC); v) ferric yersiniabactin uptake A (fyuA); vi) iron-repressible high-molecular-weight proteins 2 (irp2); vii) increased serum survival (iss); viii) iron-uptake systems of E. coli D (iucD); ix) pielonefritis associated to pili C (papC); x) temperature sensitive haemaglutinin (tsh), and xi) vacuolating autotransporter toxin (vat), by Multiplex-PCR. The results showed that all genes are present in both commensal and pathogenic E. coli strains. The iron uptake-related genes and the serum survival gene were more prevalent among APEC. The adhesin genes, except tsh, and the toxin genes, except astA, were also more prevalent among APEC isolates. Except for astA and tsh, APEC strains harbored the majority of the virulence-associated genes studied and fimC was the most prevalent gene, detected in 96.97 and 88.52% of APEC and AFEC strains, respectively. Possession of more than one iron transport system seems to play an important role on APEC survival.
Resumo:
Chemical pollution by pesticides has been identified as a possible contributing factor to the massive mortality outbreaks observed in Crassostrea gigas for several years. A previous study demonstrated the vertical transmission of DNA damage by subjecting oyster genitors to the herbicide diuron at environmental concentrations during gametogenesis. This trans-generational effect occurs through damage to genitor-exposed gametes, as measured by the comet-assay. The presence of DNA damage in gametes could be linked to the formation of DNA damage in other germ cells. In order to explore this question, the levels and cell distribution of the oxidized base lesion 8-oxodGuo were studied in the gonads of exposed genitors. High-performance liquid chromatography coupled with UV and electrochemical detection analysis showed an increase in 8-oxodGuo levels in both male and female gonads after exposure to diuron. Immunohistochemistry analysis showed the presence of 8-oxodGuo at all stages of male germ cells, from early to mature stages. Conversely, the oxidized base was only present in early germ cell stages in female gonads. These results indicate that male and female genitors underwent oxidative stress following exposure to diuron, resulting in DNA oxidation in both early germ cells and gametes, such as spermatozoa, which could explain the transmission of diuron-induced DNA damage to offspring. Furthermore, immunostaining of early germ cells seems indicates that damages caused by exposure to diuron on germ line not only affect the current sexual cycle but also could affect future gametogenesis.
Resumo:
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.
Resumo:
Human cytomegalovirus (HCMV) causes congenital neurological lifelong disabilities. The study analyzed 10 HCMV-infected human fetuses at 21 weeks of gestation to evaluate the characteristics and pathogenesis of brain injury related to congenital human CMV (cCMV) infection. Specifically, tissues from cortical and white matter areas, subventricular zone, thalamus, hypothalamus, hippocampus, basal ganglia and cerebellum were analysed by: i) immunohistochemistry (IHC) to detect HCMV-infected cell distribution, ii) hematoxylin-eosin staining to evaluate histological damage and iii) real-time PCR to quantify tissue viral load (HCMV-DNA). Viral tropism was assessed by double IHC to detect HCMV-antigens and neural/neuronal markers: nestin (expressed in early differentiation stage), doublecortin (DCX, identifying neuronal precursor cells) and neuronal nuclei (NeuN, identifying mature neurons). HCMV-positive cells and viral DNA were found in the brain of 8/10 (80%) fetuses. For these cases, brain damage was classified in mild (n=4, 50%), moderate (n=3, 37.5%) and severe (n=1, 12.5%) based on presence of i) diffuse astrocytosis, microglial activation and vascular changes; ii) occasional (in mild) or multiple (in moderate/severe) microglial nodules and iii) necrosis (in severe). The highest median HCMV-DNA level was found in the hippocampus (212 copies/5ng of humanDNA [hDNA], range: 10-7,505) as well as the highest mean HCMV-infected cell value (2.9 cells, range: 0-23), followed by that detected in subventricular zone (1.8 cells, range: 0-19). This suggests a preferential HCMV tropism for immature neuronal cells, residing in these regions, confirmed by the detection of DCX and nestin in 94% and 63.3% of HCMV-positive cells, respectively. NeuN was not found among HCMV-positive cells and was nearly absent in the brain with severe damage, suggesting HCMV does not infect mature neurons and immature HCMV-infected neuronal cells do not differentiate into neurons. HCMV preferential tropism in immature neural/neuronal cells delays/inhibits their differentiation interfering with brain development processes that lead to structural and functional brain defects.
Resumo:
Acoustic Emission (AE) monitoring can be used to detect the presence of damage as well as determine its location in Structural Health Monitoring (SHM) applications. Information on the time difference of the signal generated by the damage event arriving at different sensors is essential in performing localization. This makes the time of arrival (ToA) an important piece of information to retrieve from the AE signal. Generally, this is determined using statistical methods such as the Akaike Information Criterion (AIC) which is particularly prone to errors in the presence of noise. And given that the structures of interest are surrounded with harsh environments, a way to accurately estimate the arrival time in such noisy scenarios is of particular interest. In this work, two new methods are presented to estimate the arrival times of AE signals which are based on Machine Learning. Inspired by great results in the field, two models are presented which are Deep Learning models - a subset of machine learning. They are based on Convolutional Neural Network (CNN) and Capsule Neural Network (CapsNet). The primary advantage of such models is that they do not require the user to pre-define selected features but only require raw data to be given and the models establish non-linear relationships between the inputs and outputs. The performance of the models is evaluated using AE signals generated by a custom ray-tracing algorithm by propagating them on an aluminium plate and compared to AIC. It was found that the relative error in estimation on the test set was < 5% for the models compared to around 45% of AIC. The testing process was further continued by preparing an experimental setup and acquiring real AE signals to test on. Similar performances were observed where the two models not only outperform AIC by more than a magnitude in their average errors but also they were shown to be a lot more robust as compared to AIC which fails in the presence of noise.
Resumo:
The thesis has been carried out within the “SHAPE Project - Predicting Strength Changes in Bridges from Frequency Data Safety, Hazard, and Poly-harmonic Evaluation” (ERA-NET Plus Infravation Call 2014) which dealt with the structural assessment of existing bridges and laboratory structural reproductions through the use of vibration-based monitoring systems, for detecting changes in their natural frequencies and correlating them with the occurrence of damage. The main purpose of this PhD dissertation has been the detection of the variation of the main natural frequencies as a consequence of a previous-established damage configuration provided on a structure. Firstly, the effect of local damage on the modal feature has been discussed mainly concerning a steel frame and a composite steel-concrete bridge. Concerning the variation of the fundamental frequency of the small bridge, the increasing severity of two local damages has been investigated. Moreover, the comparison with a 3D FE model is even presented establishing a link between the dynamic properties and the damage features. Then, moving towards a diffused damage pattern, four concrete beams and a small concrete deck were loaded achieving the yielding of the steel reinforcement. The stiffness deterioration in terms of frequency shifts has been reconsidered by collecting a large set of dynamic experiments on simply supported R.C. beams discussed in the literature. The comparison of the load-frequency curves suggested a significant agreement among all the experiments. Thus, in the framework of damage mechanics, the “breathing cracks” phenomenon has been discussed leading to an analytical formula able to explain the frequency decay observed experimentally. Lastly, some dynamic investigations of two existing bridges and the corresponding FE Models are presented in Chapter 4. Moreover, concerning the bridge in Bologna, two prototypes of a network of accelerometers were installed and the data of a few months of monitoring have been discussed.