Abstract: The critical concern of satellite operations is to ensure
the health and safety of satellites. The worst case in this perspective
is probably the loss of a mission, but the more common interruption
of satellite functionality can result in compromised mission
objectives. All the data acquiring from the spacecraft are known as
Telemetry (TM), which contains the wealth information related to the
health of all its subsystems. Each single item of information is
contained in a telemetry parameter, which represents a time-variant
property (i.e. a status or a measurement) to be checked. As a
consequence, there is a continuous improvement of TM monitoring
systems to reduce the time required to respond to changes in a
satellite's state of health. A fast conception of the current state of the
satellite is thus very important to respond to occurring failures.
Statistical multivariate latent techniques are one of the vital learning
tools that are used to tackle the problem above coherently.
Information extraction from such rich data sources using advanced
statistical methodologies is a challenging task due to the massive
volume of data. To solve this problem, in this paper, we present a
proposed unsupervised learning algorithm based on Principle
Component Analysis (PCA) technique. The algorithm is particularly
applied on an actual remote sensing spacecraft. Data from the
Attitude Determination and Control System (ADCS) was acquired
under two operation conditions: normal and faulty states. The models
were built and tested under these conditions, and the results show that
the algorithm could successfully differentiate between these
operations conditions. Furthermore, the algorithm provides
competent information in prediction as well as adding more insight
and physical interpretation to the ADCS operation.
Abstract: One of the tasks of optical surveillance is to detect
anomalies in large amounts of image data. However, if the size of the
anomaly is very small, limited information is available to distinguish
it from the surrounding environment. Spectral detection provides a
useful source of additional information and may help to detect
anomalies with a size of a few pixels or less. Unfortunately, spectral
cameras are expensive because of the difficulty of separating two
spatial in addition to one spectral dimension. We investigate the
possibility of modifying a simple spectral line detector for outdoor
detection. This may be especially useful if the area of interest forms a
line, such as the horizon. We use a monochrome CCD that also
enables detection into the near infrared. A simple camera is attached
to the setup to determine which part of the environment is spectrally
imaged. Our preliminary results indicate that sensitive detection of
very small targets is indeed possible. Spectra could be taken from the
various targets by averaging columns in the line image. By imaging a
set of lines of various widths we found narrow lines that could not be
seen in the color image but remained visible in the spectral line
image. A simultaneous analysis of the entire spectra can produce
better results than visual inspection of the line spectral image. We are
presently developing calibration targets for spatial and spectral
focusing and alignment with the spatial camera. This will present
improved results and more use in outdoor application.
Abstract: The borate glasses are known by their structural
characterized by existence of unit’s structural composed by triangles
and tetrahedrons boron in different configurations depending on the
percentage of B2O3 in the glass chemical composition. In this paper,
effect of lithium oxide addition on the thermal and physical
properties of an alumina borate glass, was investigated. It was found
that the boron abnormality has a significant effect in the change of
glass properties according to the addition rate of lithium oxide.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: Analysis of real life problems often results in linear
systems of equations for which solutions are sought. The method to
employ depends, to some extent, on the properties of the coefficient
matrix. It is not always feasible to solve linear systems of equations
by direct methods, as such the need to use an iterative method
becomes imperative. Before an iterative method can be employed
to solve a linear system of equations there must be a guaranty that
the process of solution will converge. This guaranty, which must
be determined apriori, involve the use of some criterion expressible
in terms of the entries of the coefficient matrix. It is, therefore,
logical that the convergence criterion should depend implicitly on the
algebraic structure of such a method. However, in deference to this
view is the practice of conducting convergence analysis for Gauss-
Seidel iteration on a criterion formulated based on the algebraic
structure of Jacobi iteration. To remedy this anomaly, the Gauss-
Seidel iteration was studied for its algebraic structure and contrary
to the usual assumption, it was discovered that some property of the
iteration matrix of Gauss-Seidel method is only diagonally dominant
in its first row while the other rows do not satisfy diagonal dominance.
With the aid of this structure we herein fashion out an improved
version of Gauss-Seidel iteration with the prospect of enhancing
convergence and robustness of the method. A numerical section is
included to demonstrate the validity of the theoretical results obtained
for the improved Gauss-Seidel method.
Abstract: IEEE 802.11a/b/g standards support multiple transmission rates. Even though the use of multiple transmission rates increase the WLAN capacity, this feature leads to the performance anomaly problem. Cooperative communication was introduced to relieve the performance anomaly problem. Data packets are delivered to the destination much faster through a relay node with high rate than through direct transmission to the destination at low rate. In the legacy cooperative protocols, a source node chooses a relay node only based on the transmission rate. Therefore, they are not so feasible in multi-flow environments since they do not consider the effect of other flows. To alleviate the effect, we propose a new relay node selection algorithm based on the transmission rate and channel contention level. Performance evaluation is conducted using simulation, and shows that the proposed protocol significantly outperforms the previous protocol in terms of throughput and delay.
Abstract: Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors, such as information leaks, using the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection, and discusses applications of this method in BYOD environment.
Abstract: Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one is the analysis performed over the obtained data. The goal of this paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with different setups. The independent variables are as follows: the number of system inputs, the way the inputs are codified and the complexity of the analysis techniques. For the analysis, some approaches of artificial neural networks are implemented with different number of layers. The obtained results show the influence that each of these variables has in the system performance.
Abstract: LTCC (Low Temperature Co-fired Ceramics) being the most advantageous technology towards the multilayer substrates for various applications, demands an extensive study of its raw materials. In the present work, a series of CuxMg1-xNb2O6 (x=0,0.4,0.6,1) has been prepared using sol-gel synthesis route and sintered at a temperature of 900°C to study its applicability for LTCC technology as the firing temperature is 900°C in this technology. The phase formation has been confirmed using X-ray Diffraction. Thermal properties like thermal conductivity and thermal expansion being very important aspect as the former defines the heat flow to avoid thermal instability in layers and the later provides the dimensional congruency of the dielectric material and the conductors, are studied here over high temperature up to the firing temperature. Although the values are quite satisfactory from substrate requirement point view, results have shown anomaly over temperature. The anomalous thermal behavior has been further analyzed using TG-DTA.
Abstract: A novel behavioral detection framework is proposed
to detect zero day buffer overflow vulnerabilities (based on network
behavioral signatures) using zero-day exploits, instead of the
signature-based or anomaly-based detection solutions currently
available for IDPS techniques. At first we present the detection
model that uses shadow honeypot. Our system is used for the online
processing of network attacks and generating a behavior detection
profile. The detection profile represents the dataset of 112 types of
metrics describing the exact behavior of malware in the network. In
this paper we present the examples of generating behavioral
signatures for two attacks – a buffer overflow exploit on FTP server
and well known Conficker worm. We demonstrated the visualization
of important aspects by showing the differences between valid
behavior and the attacks. Based on these metrics we can detect
attacks with a very high probability of success, the process of
detection is however very expensive.
Abstract: One main drawback of intrusion detection system is the
inability of detecting new attacks which do not have known
signatures. In this paper we discuss an intrusion detection method
that proposes independent component analysis (ICA) based feature
selection heuristics and using rough fuzzy for clustering data. ICA is
to separate these independent components (ICs) from the monitored
variables. Rough set has to decrease the amount of data and get rid of
redundancy and Fuzzy methods allow objects to belong to several
clusters simultaneously, with different degrees of membership. Our
approach allows us to recognize not only known attacks but also to
detect activity that may be the result of a new, unknown attack. The
experimental results on Knowledge Discovery and Data Mining-
(KDDCup 1999) dataset.
Abstract: Heat Index describes the combined effect of
temperature and humidity on human body. This combined effect is
causing a serious threat to the health of people because of the
changing climate. With climate change, climate variability and thus
the occurrence of heat waves is likely to increase. Evidence is
emerging from the analysis of long-term climate records of an
increase in the frequency and duration of extreme temperature events
in all over Bangladesh particularly during summer. Summer season
has prolonged while winters have become short in Bangladesh.
Summers have become hotter and thus affecting the lives of the
people engaged in outdoor activities during scorching sun hours. In
2003 around 62 people died due to heat wave across the country. In
this paper Bangladesh is divided in four regions and heat index has
been calculated from 1960 to 2010 in these regions of the country.
The aim of this paper is to identify the spots most vulnerable to heat
strokes and heat waves due to high heat index. The results show
upward trend of heat index in almost all the regions of Bangladesh.
The highest increase in heat index value has been observed in areas
of South-west region and North-west Region. The highest change in
average heat index has been found in Jessore by almost 5.50C.
Abstract: Intrusion detection is a mechanism used to protect a
system and analyse and predict the behaviours of system users. An
ideal intrusion detection system is hard to achieve due to
nonlinearity, and irrelevant or redundant features. This study
introduces a new anomaly-based intrusion detection model. The
suggested model is based on particle swarm optimisation and
nonlinear, multi-class and multi-kernel support vector machines.
Particle swarm optimisation is used for feature selection by applying
a new formula to update the position and the velocity of a particle;
the support vector machine is used as a classifier. The proposed
model is tested and compared with the other methods using the KDD
CUP 1999 dataset. The results indicate that this new method achieves
better accuracy rates than previous methods.
Abstract: Nowaday-s, many organizations use systems that
support business process as a whole or partially. However, in some
application domains, like software development and health care
processes, a normative Process Aware System (PAS) is not suitable,
because a flexible support is needed to respond rapidly to new
process models. On the other hand, a flexible Process Aware System
may be vulnerable to undesirable and fraudulent executions, which
imposes a tradeoff between flexibility and security. In order to make
this tradeoff available, a genetic-based anomaly detection model for
logs of Process Aware Systems is presented in this paper. The
detection of an anomalous trace is based on discovering an
appropriate process model by using genetic process mining and
detecting traces that do not fit the appropriate model as anomalous
trace; therefore, when used in PAS, this model is an automated
solution that can support coexistence of flexibility and security.
Abstract: With increasing data in medical databases, medical
data retrieval is growing in popularity. Some of this analysis
including inducing propositional rules from databases using many
soft techniques, and then using these rules in an expert system.
Diagnostic rules and information on features are extracted from
clinical databases on diseases of congenital anomaly. This paper
explain the latest soft computing techniques and some of the
adaptive techniques encompasses an extensive group of methods
that have been applied in the medical domain and that are used for
the discovery of data dependencies, importance of features,
patterns in sample data, and feature space dimensionality
reduction. These approaches pave the way for new and interesting
avenues of research in medical imaging and represent an important
challenge for researchers.
Abstract: In this report we present a rule-based approach to
detect anomalous telephone calls. The method described here uses
subscriber usage CDR (call detail record) data sampled over two
observation periods: study period and test period. The study period
contains call records of customers- non-anomalous behaviour.
Customers are first grouped according to their similar usage
behaviour (like, average number of local calls per week, etc). For
customers in each group, we develop a probabilistic model to describe
their usage. Next, we use maximum likelihood estimation (MLE) to
estimate the parameters of the calling behaviour. Then we determine
thresholds by calculating acceptable change within a group. MLE is
used on the data in the test period to estimate the parameters of the
calling behaviour. These parameters are compared against thresholds.
Any deviation beyond the threshold is used to raise an alarm. This
method has the advantage of identifying local anomalies as compared
to techniques which identify global anomalies. The method is tested
for 90 days of study data and 10 days of test data of telecom
customers. For medium to large deviations in the data in test window,
the method is able to identify 90% of anomalous usage with less than
1% false alarm rate.
Abstract: This paper represents four unsupervised clustering algorithms namely sIB, RandomFlatClustering, FarthestFirst, and FilteredClusterer that previously works have not been used for network traffic classification. The methodology, the result, the products of the cluster and evaluation of these algorithms with efficiency of each algorithm from accuracy are shown. Otherwise, the efficiency of these algorithms considering form the time that it use to generate the cluster quickly and correctly. Our work study and test the best algorithm by using classify traffic anomaly in network traffic with different attribute that have not been used before. We analyses the algorithm that have the best efficiency or the best learning and compare it to the previously used (K-Means). Our research will be use to develop anomaly detection system to more efficiency and more require in the future.
Abstract: Weblogs are resource of social structure to discover and track the various type of information written by blogger. In this paper, we proposed to use mining weblogs technique for identifying the trends of influenza where blogger had disseminated their opinion for the anomaly disease. In order to identify the trends, web crawler is applied to perform a search and generated a list of visited links based on a set of influenza keywords. This information is used to implement the analytics report system for monitoring and analyzing the pattern and trends of influenza (H1N1). Statistical and graphical analysis reports are generated. Both types of the report have shown satisfactory reports that reflect the awareness of Malaysian on the issue of influenza outbreak through blogs.
Abstract: As the network based technologies become
omnipresent, demands to secure networks/systems against threat
increase. One of the effective ways to achieve higher security is
through the use of intrusion detection systems (IDS), which are a
software tool to detect anomalous in the computer or network. In this
paper, an IDS has been developed using an improved machine
learning based algorithm, Locally Linear Neuro Fuzzy Model
(LLNF) for classification whereas this model is originally used for
system identification. A key technical challenge in IDS and LLNF
learning is the curse of high dimensionality. Therefore a feature
selection phase is proposed which is applicable to any IDS. While
investigating the use of three feature selection algorithms, in this
model, it is shown that adding feature selection phase reduces
computational complexity of our model. Feature selection algorithms
require the use of a feature goodness measure. The use of both a
linear and a non-linear measure - linear correlation coefficient and
mutual information- is investigated respectively
Abstract: A prototype of an anomaly detection system was
developed to automate process of recognizing an anomaly of
roentgen image by utilizing fuzzy histogram hyperbolization image
enhancement and back propagation artificial neural network.
The system consists of image acquisition, pre-processor, feature
extractor, response selector and output. Fuzzy Histogram
Hyperbolization is chosen to improve the quality of the roentgen
image. The fuzzy histogram hyperbolization steps consist of
fuzzyfication, modification of values of membership functions and
defuzzyfication. Image features are extracted after the the quality of
the image is improved. The extracted image features are input to the
artificial neural network for detecting anomaly. The number of nodes
in the proposed ANN layers was made small.
Experimental results indicate that the fuzzy histogram
hyperbolization method can be used to improve the quality of the
image. The system is capable to detect the anomaly in the roentgen
image.